18610951. VALIDATIONS USING VERIFICATION VALUES simplified abstract (Visa International Service Association)
Contents
VALIDATIONS USING VERIFICATION VALUES
Organization Name
Visa International Service Association
Inventor(s)
Sheldon Banow of Castro Valley CA (US)
Eduardo Lopez of Menlo Park CA (US)
Sayeed Mohammed of Foster City CA (US)
VALIDATIONS USING VERIFICATION VALUES - A simplified explanation of the abstract
This abstract first appeared for US patent application 18610951 titled 'VALIDATIONS USING VERIFICATION VALUES
The abstract of the patent application describes a method that involves receiving a token data request message from a token requestor, determining a permanent resource provider identifier, associating it with a token and a verification value, providing a token data response message, receiving an authorization request message, and verifying the verification value.
- The method involves receiving a token data request message with an initial resource provider identifier.
- It determines a permanent resource provider identifier using the initial identifier.
- A verification value is determined and associated with the permanent resource provider identifier and the token.
- A token data response message is provided to the token requestor.
- An authorization request message is received with the token, verification value, and data elements.
- The permanent resource provider identifier is determined using the data elements, and the verification value is verified.
Potential Applications: - Secure authentication systems - Access control mechanisms - Identity verification processes
Problems Solved: - Ensuring secure and accurate verification of resource providers - Streamlining authorization processes - Enhancing data security measures
Benefits: - Improved security for token-based systems - Efficient verification and authentication procedures - Enhanced protection against unauthorized access
Commercial Applications: Title: Secure Token-Based Authentication System This technology can be utilized in industries such as: - Financial services - Healthcare - Information technology - Government agencies
Questions about Secure Token-Based Authentication System: 1. How does this method enhance data security in token-based systems? 2. What are the potential implications of this technology in the financial sector?
Frequently Updated Research: Stay updated on advancements in token-based authentication systems and data security protocols to ensure the most effective implementation of this technology.
Original Abstract Submitted
A method is disclosed, and includes receiving from a token requestor, a token data request message comprising an initial resource provider identifier, and determining a permanent resource provider identifier using the initial resource provider identifier. The method also includes determining a verification value, and associating the permanent resource provider identifier with a token, the verification value. The method also includes providing a token data response message including a verification value to the token requestor, receiving an authorization request message comprising the token, the verification value, and one or more data elements in a plurality of data fields, determining the permanent resource provider identifier using the one or more data elements in the plurality of data fields, and determining that the verification value in the authorization request message matches the verification value that was provided to the token requestor.