Visa International Service Association (20240348444). SECURE INTERACTION USING UNI-DIRECTIONAL DATA CORRELATION TOKENS simplified abstract
Contents
SECURE INTERACTION USING UNI-DIRECTIONAL DATA CORRELATION TOKENS
Organization Name
Visa International Service Association
Inventor(s)
Adam Ratica of San Francisco CA (US)
SECURE INTERACTION USING UNI-DIRECTIONAL DATA CORRELATION TOKENS - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240348444 titled 'SECURE INTERACTION USING UNI-DIRECTIONAL DATA CORRELATION TOKENS
Simplified Explanation:
The patent application describes a method where a tokenization server processes user interactions by generating tokens using cryptographic hash functions and retrieving information based on these tokens to execute the interactions.
Key Features and Innovation:
- Method involves generating tokens using cryptographic hash functions.
- Tokens are used to retrieve information stored in data storage.
- Enables secure processing of user interactions.
Potential Applications: This technology can be applied in:
- Secure communication systems.
- Payment processing platforms.
- Data encryption services.
Problems Solved:
- Ensures user data privacy and security.
- Prevents unauthorized access to sensitive information.
- Facilitates seamless execution of user interactions.
Benefits:
- Enhanced data protection.
- Improved user trust and confidence.
- Efficient processing of user interactions.
Commercial Applications: Title: Secure Data Processing Technology for Financial Transactions This technology can be utilized in:
- Banking and financial institutions for secure transactions.
- E-commerce platforms for safe payment processing.
- Healthcare systems for confidential patient data management.
Prior Art: Readers can explore prior art related to cryptographic hash functions, tokenization methods, and secure data processing technologies.
Frequently Updated Research: Stay updated on advancements in cryptographic techniques, data security protocols, and tokenization algorithms relevant to this technology.
Questions about Secure Data Processing Technology: 1. How does this technology ensure the confidentiality of user information? 2. What are the potential risks associated with using cryptographic hash functions for token generation?
Original Abstract Submitted
a method is disclosed. the method includes receiving by a tokenization server, a request to process an interaction from a user device, where the request includes a user identifier associated with a user. the tokenization server generates a first token using a first one-way cryptographic hash function based on the user identifier, and a second token using a second one-way cryptographic hash function based on the first token. the tokenization server retrieves first information stored in a first data storage associated with the tokenization server based on the second token, and transmits the first token and the first information to a processing computer. the processing computer is programmed to retrieve, from a second data storage associated with the processing computer, second information based on the first token, and execute the interaction based on the first information and the second information.