Visa International Service Association (20240348444). SECURE INTERACTION USING UNI-DIRECTIONAL DATA CORRELATION TOKENS simplified abstract

From WikiPatents
Jump to navigation Jump to search

SECURE INTERACTION USING UNI-DIRECTIONAL DATA CORRELATION TOKENS

Organization Name

Visa International Service Association

Inventor(s)

Adam Ratica of San Francisco CA (US)

SECURE INTERACTION USING UNI-DIRECTIONAL DATA CORRELATION TOKENS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240348444 titled 'SECURE INTERACTION USING UNI-DIRECTIONAL DATA CORRELATION TOKENS

Simplified Explanation:

The patent application describes a method where a tokenization server processes user interactions by generating tokens using cryptographic hash functions and retrieving information based on these tokens to execute the interactions.

Key Features and Innovation:

  • Method involves generating tokens using cryptographic hash functions.
  • Tokens are used to retrieve information stored in data storage.
  • Enables secure processing of user interactions.

Potential Applications: This technology can be applied in:

  • Secure communication systems.
  • Payment processing platforms.
  • Data encryption services.

Problems Solved:

  • Ensures user data privacy and security.
  • Prevents unauthorized access to sensitive information.
  • Facilitates seamless execution of user interactions.

Benefits:

  • Enhanced data protection.
  • Improved user trust and confidence.
  • Efficient processing of user interactions.

Commercial Applications: Title: Secure Data Processing Technology for Financial Transactions This technology can be utilized in:

  • Banking and financial institutions for secure transactions.
  • E-commerce platforms for safe payment processing.
  • Healthcare systems for confidential patient data management.

Prior Art: Readers can explore prior art related to cryptographic hash functions, tokenization methods, and secure data processing technologies.

Frequently Updated Research: Stay updated on advancements in cryptographic techniques, data security protocols, and tokenization algorithms relevant to this technology.

Questions about Secure Data Processing Technology: 1. How does this technology ensure the confidentiality of user information? 2. What are the potential risks associated with using cryptographic hash functions for token generation?


Original Abstract Submitted

a method is disclosed. the method includes receiving by a tokenization server, a request to process an interaction from a user device, where the request includes a user identifier associated with a user. the tokenization server generates a first token using a first one-way cryptographic hash function based on the user identifier, and a second token using a second one-way cryptographic hash function based on the first token. the tokenization server retrieves first information stored in a first data storage associated with the tokenization server based on the second token, and transmits the first token and the first information to a processing computer. the processing computer is programmed to retrieve, from a second data storage associated with the processing computer, second information based on the first token, and execute the interaction based on the first information and the second information.