18610951. VALIDATIONS USING VERIFICATION VALUES simplified abstract (Visa International Service Association)

From WikiPatents
Jump to navigation Jump to search

VALIDATIONS USING VERIFICATION VALUES

Organization Name

Visa International Service Association

Inventor(s)

Sheldon Banow of Castro Valley CA (US)

Eduardo Lopez of Menlo Park CA (US)

Sayeed Mohammed of Foster City CA (US)

VALIDATIONS USING VERIFICATION VALUES - A simplified explanation of the abstract

This abstract first appeared for US patent application 18610951 titled 'VALIDATIONS USING VERIFICATION VALUES

The abstract of the patent application describes a method that involves receiving a token data request message from a token requestor, determining a permanent resource provider identifier, associating it with a token and a verification value, providing a token data response message, receiving an authorization request message, and verifying the verification value.

  • The method involves receiving a token data request message with an initial resource provider identifier.
  • It determines a permanent resource provider identifier using the initial identifier.
  • A verification value is determined and associated with the permanent resource provider identifier and the token.
  • A token data response message is provided to the token requestor.
  • An authorization request message is received with the token, verification value, and data elements.
  • The permanent resource provider identifier is determined using the data elements, and the verification value is verified.

Potential Applications: - Secure authentication systems - Access control mechanisms - Identity verification processes

Problems Solved: - Ensuring secure and accurate verification of resource providers - Streamlining authorization processes - Enhancing data security measures

Benefits: - Improved security for token-based systems - Efficient verification and authentication procedures - Enhanced protection against unauthorized access

Commercial Applications: Title: Secure Token-Based Authentication System This technology can be utilized in industries such as: - Financial services - Healthcare - Information technology - Government agencies

Questions about Secure Token-Based Authentication System: 1. How does this method enhance data security in token-based systems? 2. What are the potential implications of this technology in the financial sector?

Frequently Updated Research: Stay updated on advancements in token-based authentication systems and data security protocols to ensure the most effective implementation of this technology.


Original Abstract Submitted

A method is disclosed, and includes receiving from a token requestor, a token data request message comprising an initial resource provider identifier, and determining a permanent resource provider identifier using the initial resource provider identifier. The method also includes determining a verification value, and associating the permanent resource provider identifier with a token, the verification value. The method also includes providing a token data response message including a verification value to the token requestor, receiving an authorization request message comprising the token, the verification value, and one or more data elements in a plurality of data fields, determining the permanent resource provider identifier using the one or more data elements in the plurality of data fields, and determining that the verification value in the authorization request message matches the verification value that was provided to the token requestor.