Abstract

One embodiment includes a method performed by an authentication provider. The method includes receiving a sensitive information from a user. For example, the sensitive information may include payment data or a healthcare data of the user. The method includes transmitting the sensitive information to a processing server and receiving a long living token associated with the sensitive information from the processing server. The authentication provider stores the long living token. The method further includes the authentication provider receiving, from a resource provider, a request for a subset of the sensitive information. The method includes transmitting the subset of the sensitive information and the long living token to the processing server; and receiving a short living token representing the subset of the sensitive information from the processing server. The authentication provider transmits the short living token to the resource provider. The resource provider transmits an authorization request message to the processing server for processing a transaction, the authorization request message including at least the short living token and transaction information associated with the transaction authorization response message including the identifier for the alternative funding source.

FIG.1B

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.

Share

COinS