Telephone-based payments using tokens

ABSTRACT

According to one embodiment, a system includes a memory comprising instructions, an interface, and a processor communicatively coupled to the memory and the interface. The interface is configured to receive, from a user telephone device, a request to complete a transaction using a token associated with the user telephone device. The processor is configured, when executing the instructions, to determine one or more tokens associated with the user telephone device. The interface is further configured to send, to an issuer server, a verification request for the token, and receive, in response to the verification request, translated information associated with the token. The processor is further configured to complete the transaction using the translated information.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.14/884,950 filed Oct. 16, 2015, by Zafer Mohamed, and entitled“Telephone-Based Payments Using Tokens,” which is incorporated herein byreference.

TECHNICAL FIELD

This disclosure relates generally to the tokenization of information,and more particularly to the usage of tokens for telephone-basedpayments.

BACKGROUND

Transactions that take place over a network may include the use ofpersonal sensitive data, such as personal identification information orfinancial account information. This sensitive data may be targeted byunauthorized individuals such as hackers. For example, in an onlinetransaction, a user's identification information and/or financialaccount information may be transmitted to a merchant for use incompleting the transaction. This information may be intercepted duringtransmission or may be accessed by unauthorized individuals after it isstored on databases associated with the merchant, creating the potentialfor identity or monetary theft.

SUMMARY OF THE DISCLOSURE

In accordance with the present disclosure, disadvantages and problemsassociated with telephone-based payments may be reduced or eliminated.

According to one embodiment, a system includes a memory comprisinginstructions, an interface, and a processor communicatively coupled tothe memory and the interface. The interface is configured to receive,from a user telephone device, a request to complete a transaction usinga token associated with the user telephone device. The processor isconfigured, when executing the instructions, to determine one or moretokens associated with the user telephone device. The interface isfurther configured to send, to an issuer server, a verification requestfor the token, and receive, in response to the verification request,translated information associated with the token. The processor isfurther configured to complete the transaction using the translatedinformation.

According to one embodiment, a method is provided that comprises thesteps of receiving, from a user telephone device, a request to completea transaction using a token associated with the user telephone device,determining one or more tokens associated with the user telephonedevice, sending, to an issuer server, a verification request for thetoken, receiving, in response to the verification request, translatedinformation associated with the token, and completing the transactionusing the translated information.

According to one embodiment, a computer-readable medium comprisinginstructions is provided. The instructions are configured when executedto receive, from a user telephone device, a request to complete atransaction using a token associated with the user telephone device,determine one or more tokens associated with the user telephone device,send, to an issuer server, a verification request for the token,receive, in response to the verification request, translated informationassociated with the token, and complete the transaction using thetranslated information.

Technical advantages of certain embodiments of the present disclosureinclude providing more secure electronic transactions by using tokensfor telephone-based payments. Other technical advantages will be readilyapparent to one skilled in the art from the following figures,descriptions, and claims. Moreover, while specific advantages have beenenumerated above, various embodiments may include all, some, or none ofthe enumerated advantages.

BRIEF DESCRIPTION OF THE DRAWINGS

For a more complete understanding of the present invention and forfurther features and advantages thereof, reference is now made to thefollowing description taken in conjunction with the accompanyingdrawings, in which:

FIG. 1 illustrates an example system utilizing tokenization of sensitivepersonal information in accordance with embodiments the presentdisclosure;

FIG. 2 illustrates an example computer system in accordance withembodiments of the present disclosure;

FIGS. 3A-3B illustrate example token records of a database in accordancewith embodiments of the present disclosure;

FIGS. 4A-4B illustrate example user interfaces associated with tokenrecords in accordance with embodiments of the present disclosure;

FIG. 5 illustrates an example method for generating account tokens andtoken records in accordance with embodiments of the present disclosure;

FIG. 6 illustrates an example method for generating identificationtokens and token records in accordance with embodiments of the presentdisclosure;

FIG. 7 illustrates an example method for storing user tokens at amerchant server in accordance with embodiments of the presentdisclosure;

FIG. 8 illustrates an example method for performing transactions usingtokens in accordance with embodiments of the present disclosure;

FIG. 9 illustrates an example method for generating alerts associatedwith token usage in accordance with embodiments of the presentdisclosure;

FIG. 10 illustrates an example method for using tokens in response torequests received by telephone in accordance with embodiments of thepresent disclosure; and

FIG. 11 illustrates an example method for generating notifications basedon token usage information in accordance with embodiments of the presentdisclosure

DETAILED DESCRIPTION

The present disclosure describes systems and methods for tokenizingpersonal information, such as financial account information,governmental account information, or other sensitive user information.Tokenization may refer to the use of non-exploitable information inplace of sensitive information that may be exploitable. When a token ispresented and verified, the sensitive information may be exchangedtherefor by a secure token issuer. In particular embodiments of thepresent disclosure, for instance, a token comprising non-sensitive datamay be provided for the completion of electronic transactions in lieu ofproviding personal sensitive information, such as financial accountinformation or personal identification information. Tokens according tothe present disclosure may thus take the place of debit cards, creditcards, identification cards, and the like. For example, instead ofproviding a debit card number to a merchant to complete a transaction, atoken comprising information corresponding to an account number and/orrouting number of the checking account may be provided. As anotherexample, instead of storing checking account information with a merchantto complete recurring transactions, a token comprising informationcorresponding to the checking account (e.g., an account number and/orrouting number of the checking account) may be stored. The sensitiveinformation (with which the tokens according to the present disclosuremay correspond) may be stored in a central, secure location thatprovides the information in response to token verification requests(e.g., from merchants attempting to complete transactions using tokens).By tokenizing such types of sensitive user information and storing thesensitive information in a centralized record system in accordance withembodiments of the present disclosure, such information may be moresecure and less vulnerable to misappropriation or theft by unauthorizedindividuals, such as hackers.

In particular embodiments, the information may be stored in a digitalwallet on a user device or on a server (e.g., a merchant server). Adigital wallet may refer to a portion of storage on a user device orserver that includes digital information analogous to information thatmaybe kept in a user's wallet. As an example, a digital wallet may storepersonal information for a user that is similar to the information on auser's driver's license, passport, tax return, a personal identificationnumber (PIN), or the like. As another example, a digital wallet maystore financial account information for a user, such as checking accountinformation, credit account information, or other information that linksto other types of financial accounts (e.g., investment accounts).Furthermore, in particular embodiments, a centralized record system maybe kept for all tokens issued by an issuer, which may include thecollection of information underlying each token (e.g., the sensitivepersonal information), information related to where each token is storedor used (e.g., which user devices or servers are storing each particulartoken), and information associated with the usage of each token (e.g.,transaction histories).

To facilitate a better understanding of the present disclosure, thefollowing examples of certain embodiments are given. In no way shouldthe following examples be read to limit, or define, the scope of thedisclosure. Embodiments of the present disclosure and its advantages maybe best understood by referring to FIGS. 1-11, where like numbers areused to indicate like and corresponding parts.

FIG. 1 illustrates an example system 100 utilizing tokenization ofsensitive personal information in accordance with embodiments thepresent disclosure. In particular, system 100 includes user devices 110performing one or more transactions using tokens over network 120, usingissuer server 130 and merchant server 140. User devices 110 may includeany suitable computing device that may be used to perform transactionsover network 140. User devices 110 may include mobile computing deviceswith wireless network connection capabilities (e.g., wireless-fidelity(WI-FI), and/or BLUETOOTH capabilities). For example, user devices 120may include laptop computers, smartphones, or tablet computers. Userdevices 110 may also include non-mobile devices such as desktopcomputers. Network 120 may include any suitable technique forcommunicably coupling user devices 110 with issuer server 130 andmerchant server 140. For example, network 120 may include an ad-hocnetwork, an intranet, an extranet, a virtual private network (VPN), awired or wireless local area network (LAN), wide area network (WAN),metropolitan area network (MAN), a portion of the Internet, a portion ofthe Public Switched Telephone Network (PSTN), a portion of a cellulartelephone network, or any combination thereof. Issuer server 130 mayinclude any suitable device configured to issue tokens 115 associatedwith one or more user devices 110, and may generate and storeinformation associated with such tokens 115 in database 135 (includingthe information to be translated in the token verification process(e.g., the personal data associated with each particular token)) andinformation regarding the usage of each token (e.g., transactionhistories for the tokens)), as described below. In certain embodiments,each token 115 may be associated with a particular user account and aparticular user device 110. Further, in certain embodiments, issuerserver 130 may be associated with the holder of the user account withwhich tokens 115 are associated. For instance, issuer server 130 may beassociated with the financial institution or bank that holds a checkingaccount with which a token 115 is associated. Issuer server 130 may alsoparticipate in verification operations for tokens 115 with one or moremerchant servers 140 in connection with user transactions, as describedbelow. Merchant server 140 may include any suitable device configured toperform user transactions using tokens 115, and/or participate inverification operations with issuer server 130 for tokens 115 presentedby user devices 110 to merchant server 140 during such transactions, asdescribed below.

In operation, for example, a user device 110 (e.g., user device 110 d)may issue a request to issuer sever 130 to create a token 115 (e.g.,token 115 d) for use with the particular user device 110. The token 115d may be associated with a particular user account that is serviced byissuer server 130 (or an associated server), such as a financialaccount, governmental information account, or other user data account,and may be created such that it may only be used in conjunction with theparticular user device 110. The token 115, in certain embodiments, mayrepresent sensitive information associated with the user (e.g.,financial account information) as a substitution therefore. In otherwords, token 115 may include non-sensitive, non-exploitable data that isrepresentative of the sensitive data. Once generated, the token 115 maybe stored on user device 110 or on a merchant server 140 for later use.In some embodiments, the token 115 may be stored in a digital wallet 111located on the user device 110, or in a digital wallet 141 located at amerchant server 140. After token 115 has been generated, a recordassociated with the token may be created in database 135. The record mayinclude information about token 115 (e.g., which user, user device,account, or the like are associated with the token) and/or informationassociated with the usage of the token 115 (e.g., transactionhistories).

Once the token 115 is generated and stored, it may be used toparticipate in one or more transaction with merchant server 140. Incertain embodiments, the token 115 (e.g., token 115 a from digitalwallet 111 a of user device 110 a) may be used in lieu of the sensitiveinformation that it represents. For instance, where token 115 arepresents financial account information associated with a user of userdevice 110 a (e.g., checking account information), token 115 a may beprovided to merchant server 140 for payment in lieu of the financialaccount information. In certain embodiments, instead of providing thetoken 115 from user device 110 during a transaction, the token 115 maybe stored at the merchant server 140 already in a digital wallet 141associated with the user, and the user of user device 110 may selectfrom the one or more tokens stored

After receiving a token 115 at merchant server 140 during a transaction,merchant server 140 may send a verification request to issuer server130. The request may ask issuer server 130 to translate the informationcontained in token 115. For example, where token 115 is associated withfinancial account information, the request from merchant server 140 mayask issuer server 130 to provide the financial account information(i.e., translated information) in exchange for the token 115. In certainembodiments, due to the sensitive nature of the translated information,the request may be sent to issuer server 130 using a secure connectionbetween merchant server 140 and issuer server 130 to preventunauthorized access to the translated information. Issuer server 130,after receiving the verification request from merchant server 140, maythen verify that the token 115 is authentic (e.g., by verifying that thetoken was sent by the user device 110 associated with the particulartoken 115) and, if it is authentic, may provide the translated sensitiveinformation to merchant server 140 in response. Merchant server 140 mayaccordingly use the translated information (the financial accountinformation) to complete one or more portions of the transaction withuser device 110.

Modifications, additions, or omissions may be made to FIG. 1 withoutdeparting from the scope of the present disclosure. For example, FIG. 1illustrates a particular configuration of user devices 110 with digitalwallets 111 storing tokens 115 and merchant server 140 with digitalwallets 141 containing tokens 145. However, it will be understood thatany suitable configuration of token generation, storage, and use iscontemplated by the present disclosure. As another example, althoughillustrated as a single server, issuer server 130 or merchant server 140may include a plurality of servers in certain embodiments. Similarly,although illustrated as a single database, database 135 may include aplurality of databases in certain embodiments.

FIG. 2 illustrates an example computer system 200 in accordance withembodiments of the present disclosure. One or more aspects of computersystem 200 may be used in user devices 110, components of network 120,issuer server 130, database 135, or merchant server 140 of FIG. 1. Forexample, each of user devices 110, issuer server 130, and merchantserver 140 may include a computer system 200. As another example, insome embodiments, one or more of user devices 110, issuer server 130,and merchant server 140 may include a plurality of computer systems 200.

Computer system 200 may include a processor 210, memory 220 comprisinginstructions 230, storage 240, interface 250, and bus 260. Thesecomponents may work together to perform one or more steps of one or moremethods (e.g. method 500 of FIG. 5) and provide the functionalitydescribed herein. For example, in particular embodiments, instructions230 in memory 220 may be executed on processor 210 in order to processrequests received by interface 250 using common function modules. Incertain embodiments, instructions 230 may reside in storage 240 insteadof, or in addition to, memory 220.

Processor 210 may be a microprocessor, controller, application specificintegrated circuit (ASIC), or any other suitable device or logicoperable to provide, either alone or in conjunction with othercomponents (e.g., memory 220 and instructions 230) functionalityaccording to the present disclosure. Such functionality may includeprocessing application functions using remotely-located common functionmodules, as discussed herein. In particular embodiments, processor 210may include hardware for executing instructions 230, such as thosemaking up a computer program or application. As an example and not byway of limitation, to execute instructions 230, processor 210 mayretrieve (or fetch) instructions 230 from an internal register, aninternal cache, memory 220, or storage 240; decode and execute them; andthen write one or more results of the execution to an internal register,an internal cache, memory 220, or storage 240.

Memory 220 may be any form of volatile or non-volatile memory including,without limitation, magnetic media, optical media, random access memory(RAM), read-only memory (ROM), flash memory, removable media, or anyother suitable local or remote memory component or components. Memory220 may store any suitable data or information utilized by computersystem 200, including software (e.g., instructions 230) embedded in acomputer readable medium, and/or encoded logic incorporated in hardwareor otherwise stored (e.g., firmware). In particular embodiments, memory220 may include main memory for storing instructions 230 for processor210 to execute or data for processor 210 to operate on. In particularembodiments, one or more memory management units (MMUs) may residebetween processor 210 and memory 220 and facilitate accesses to memory220 requested by processor 210.

Storage 240 may include mass storage for data or instructions (e.g.,instructions 230). As an example and not by way of limitation, storage240 may include a hard disk drive (HDD), a floppy disk drive, flashmemory, an optical disc, a magneto-optical disc, magnetic tape, aUniversal Serial Bus (USB) drive, a combination of two or more of these,or any suitable computer readable medium. Storage 240 may includeremovable or non-removable (or fixed) media, where appropriate. Storage240 may be internal or external to computer system 200, whereappropriate. In some embodiments, instructions 230 may be encoded instorage 240 in addition to, in lieu of, memory 220.

Interface 250 may include hardware, encoded software, or both providingone or more interfaces for communication (such as, for example,packet-based communication) between computer systems on a network (e.g.,between user devices 110 and merchant server 140 of FIG. 1). As anexample, and not by way of limitation, interface 250 may include anetwork interface controller (NIC) or network adapter for communicatingwith an Ethernet or other wire-based network and/or a wireless NIC(WNIC) or wireless adapter for communicating with a wireless network.Interface 250 may include one or more connectors for communicatingtraffic (e.g., IP packets) via a bridge card. Depending on theembodiment, interface 250 may be any type of interface suitable for anytype of network in which computer system 200 is used. In someembodiments, interface 250 may include one or more interfaces for one ormore I/O devices. One or more of these I/O devices may enablecommunication between a person and computer system 200. As an example,and not by way of limitation, an I/O device may include a keyboard,keypad, microphone, monitor, mouse, printer, scanner, speaker, stillcamera, stylus, tablet, touchscreen, trackball, video camera, anothersuitable I/O device or a combination of two or more of these.

Bus 260 may include any combination of hardware, software embedded in acomputer readable medium, and/or encoded logic incorporated in hardwareor otherwise stored (e.g., firmware) to communicably couple componentsof computer system 200 to each other. As an example and not by way oflimitation, bus 260 may include an Accelerated Graphics Port (AGP) orother graphics bus, an Enhanced Industry Standard Architecture (EISA)bus, a front-side bus (FSB), a HYPERTRANSPORT (HT) interconnect, anIndustry Standard Architecture (ISA) bus, an INFINIBAND interconnect, alow-pin-count (LPC) bus, a memory bus, a Micro Channel Architecture(MCA) bus, a Peripheral Component Interconnect (PCI) bus, a PCI-Express(PCI-X) bus, a serial advanced technology attachment (SATA) bus, a VideoElectronics Standards Association local (VLB) bus, or any other suitablebus or a combination of two or more of these. Bus 260 may include anynumber, type, and/or configuration of buses 260, where appropriate. Inparticular embodiments, one or more buses 260 (which may each include anaddress bus and a data bus) may couple processor 210 to memory 220. Bus260 may include one or more memory buses.

Modifications, additions, or omissions may be made to FIG. 2 withoutdeparting from the scope of the present disclosure. For example, FIG. 2illustrates components of computer system 200 in a particularconfiguration. However, any configuration of processor 210, memory 220,instructions 230, storage 240, interface 250, and bus 260 may be used,including the use of multiple processors 210 and/or buses 260. Inaddition, computer system 200 may be physical or virtual.

FIGS. 3A-3B illustrate example token records 300 of a database inaccordance with embodiments of the present disclosure. Token records 300may be generated in a database by a token issuer, in certainembodiments. For example, referring to FIG. 1, token records 300 may begenerated by issuer server 130 and stored in database 135 after tokens115 have been generated. Token records 300 may include any suitableinformation associated with a generated token. For example, tokenrecords may include information associated with account numbers,identification information for one or more users of the tokens, Tokenrecord 300 a of FIG. 3A illustrates example token records that areassociated with financial account data, where each row includes a tokenrecord. As illustrated, token IDs 1-4 are tokens associated with achecking account, while token IDs 5-7 are tokens associated with a lineof credit account. Each token of token IDs 1-4 is associated with adifferent user (e.g., family members using the same checking account),and each is associated with a different device (e.g., each familymember's particular user device). That is, in order to use eachparticular token, it must be presented by the device with which it isassociated. Token IDs 5-7 are associated with a subset of the users oftoken IDs 1-4 (e.g., parents of the family).

As shown, token IDs 1-2 do not include any token-level restrictions,while token IDs 3-7 have restrictions associated therewith. For example,token ID 3 may not be used to spend greater than $20 per day, and maynot be used outside of certain geographical boundaries. Similarly, tokenID 4 may not be used to spend greater than $50 per month, and may onlybe used at particular merchants and on particular products (which may berepresented by stockkeeping units (SKUs) in certain embodiments). Eachof token IDs 5-6 are similarly restricted to spending less than $500 permonth.

In contrast with Token IDs 1-6, Token ID 7 is not stored on orassociated with a particular user device (although it may be associatedwith a user device, in certain embodiments). Rather, it is associatedwith multiple users and is stored at Merchant1 for usage by either User1or User2 in transactions with Merchant1, such as recurring transactions(e.g., a recurring monthly membership payment or utility payment whereautomatic clearing house (ACH) payments are used). Token ID 7 istherefore analogous to having financial account information “on file”with Merchant1. Accordingly, a user may store tokens at a merchantrather than their sensitive financial account or personal identificationinformation. In certain embodiments, such tokens may or may not beassociated with particular user devices. For instance, User1 or User2may initiate the usage of token ID 7 from any user device. However, auser device association/restriction may be applied to these “on file”tokens, such as token ID 7, such that usage of the token for atransaction must be initiated from a particular user device.

Token records 300 a may be used, for example, in transactions thatrequire financial account information from a user. For example, topurchase particular items, a user may provide a token that representstheir checking account information to merchant. By providing a tokenrepresenting the sensitive information rather than the actual sensitiveinformation, the transaction may be more secure since the sensitiveinformation is not passed between the user and the merchant. Themerchant may then request the appropriate financial information from theissuer (e.g., a bank) by presenting the token to the issuer fortranslation, as described herein. This may occur using a securedconnection between the merchant and the issuer. The issuer may thenprovide the sensitive information after validating the token'sauthenticity.

Token record 300 b of FIG. 3B illustrates example token records that areassociated with personal identification data, where each row includes atoken record. The personal identification data may include informationthat is similar to information contained on items such as driver'slicenses, passports, social security cards, and the like. For example,as shown, token IDs 1 and 2 include social security number information(e.g., number, benefits, or the like), driver's license information(e.g., state, license number, date of birth information, or licenserestriction information, or the like), and passport information (e.g.,number, country, date of birth information, passport stamp information,or the like) for User1 and User2, respectively. Token IDs 3 and 4,however, merely include social security information and passportinformation.

Token records 300 b, for example, may be used in transactions thatrequire identification information from a user. For example, to purchaseparticular items (e.g., alcohol or tobacco), a user may provide a tokenthat represents their date of birth information for age verification bythe merchant. By providing a token representing the sensitiveinformation rather than the actual sensitive information, thetransaction may be more secure.

Modifications, additions, or omissions may be made to FIGS. 3A-3Bwithout departing from the scope of the present disclosure. For example,FIGS. 3A-3B illustrate particular configurations of token records 300that contain particular types of sensitive personal data. However, tokenrecords 300 may include any suitable information associated with tokensthat is sensitive in nature.

FIGS. 4A-4B illustrate example user interfaces 400 associated with tokenrecords (e.g., token records 300 of FIGS. 3A-3B) in accordance withembodiments of the present disclosure. User interfaces 400 may beinterfaces displayed to a user associated with the token records (e.g.,the tokens directly associated with the user or his accounts), and mayinclude any suitable information associated with the token records.Furthermore, user interfaces may display information to a user regardingtokens with which the user is not directly associated, but may beindirectly associated. For example, a user may be associated with one ormore family members' tokens and may accordingly be able to viewinformation about such tokens through user interfaces 400. For example,user interfaces 400 may display token owner information (e.g., the ownerof each token with which the user is directly or indirectly associated),user device association information (e.g., a device identifier), accountassociation information (e.g., the financial account or type offinancial account with which the token is associated), token restrictioninformation (e.g., merchant, SKU, or geographical limitations on usageof the particular token), token usage information (e.g., transactionhistories), or merchant association information (e.g., which merchantsmay have a copy of the token “on file”). User interfaces 400 may bedisplayed to a user upon logging into an online account associated withthe tokens, for example.

FIG. 4A, for instance, illustrates an example user interface 400 a thatdisplays token information for four tokens associated with threedifferent users, along with transaction information for a particulartoken of the four tokens (i.e., Token1). Similarly, FIG. 4B illustratesan example user interface 400 b that displays token information for fourtokens associated with three different users, along with merchantassociation information for a particular token of the four tokens (i.e.,Token2).

User interfaces also include “Refresh” and “Delete” buttons, which mayallow a user to initiate a process for providing a new token or fordeleting a token, respectively. For example, referring to the “Refresh”button, a user may request that a new token be issued in place of analready issued token. This may be done, for example, if the usersuspects that the token has somehow been compromised. Referring to FIG.4A, the user may request that a new token be issued in place of Token ID1, which is associated with a checking account and Device 1234. Theissuer of the token may accordingly issue a new token in place of thepreviously-issued token, remove records associated with thepreviously-issued token, and create a token record associated with thenewly-issued token. As another example, referring to the “Delete”button, a user may request that a previously-issued token be deletedfrom the device with which it is associated and/or have its associatedtoken record deleted. This may be done, for example, if the user losesher device or otherwise will no longer user the device. This may also bedone selectively for particular merchants with which the token isstored, such as when the user cancels a membership with the merchant andno longer wishes to store their token with the merchant. Referring toFIG. 4B, the user may wish that Token ID 2 be deleted from all or someof Merchant1, Merchant2, Merchant3, or Merchant4.

Modifications, additions, or omissions may be made to FIGS. 4A-4Bwithout departing from the scope of the present disclosure. For example,FIGS. 4A-4B illustrate particular combination of certain informationdisplayed in user interfaces 400. However, any suitable information orcombination thereof may be displayed in user interfaces 400.

FIG. 5 illustrates an example method 500 for generating account tokensand token records in accordance with embodiments of the presentdisclosure. The method begins at step 510, where a request to create atoken is received. The request may be a request to create a tokenassociated with a particular account, such as a financial account (e.g.,a checking account). In addition, the request may be a request to createa token associated with a particular device. For example, referring toFIG. 1, a request to create a token may be received at issuer server130, with the request being to create token 115 d that is associatedwith user device 110 d and with a particular user account.

At step 520, a token may be generated in response to the requestreceived at step 510. The token may be associated with a particularaccount and user device. Using the above example, token 115 d may begenerated by issuer server 130, and token 115 d may be uniquelyassociated with user device 110 d (i.e., token 115 d may only be allowedto be used in a transaction if sent from user device 110 d) and with aparticular user account. Next, at step 530, the token is sent to theuser device for storage. Using the same example, token 115 d may be sentto user device 110 d for storage in wallet 111 d after being generatedby issuer server 130.

Finally, at step 540, a token record associated with the token isgenerated. The token record may be generated by a server and stored in adatabase, for instance. Referring to the above example, the token recordmay be generated by issuer server 130 and stored in database 135. Thetoken record may include any suitable information about the generatedtoken, and may be similar to one or more of token records 300 a of FIG.3A. As the token is used by the user device, the token record may beupdated. For example, usage history (e.g., transaction history)associated with the token may be stored in the database. As anotherexample, as token information is updated, the corresponding informationin the database may be updated as well.

Modifications, additions, or omissions may be made to method 500 withoutdeparting from the scope of the present disclosure. For example, theorder of the steps may be performed in a different manner than thatdescribed and some steps may be performed at the same time.Additionally, each individual step may include additional steps withoutdeparting from the scope of the present disclosure.

FIG. 6 illustrates a method 600 for generating identification tokens andtoken records in accordance with embodiments of the present disclosure.The method begins at step 610, where a request to create a token isreceived. The request may be a request to create a token associated witha user's identification information, such as driver's licenseinformation, social security information, passport information, or thelike. In addition, the request may be a request to create a tokenassociated with a particular device. For example, referring to FIG. 1, arequest to create a token may be received at issuer server 130, with therequest being to create token 115 d that is associated with user device110 d and with particular user identification information.

At step 620, a token may be generated in response to the requestreceived at step 610. The token may be associated with the useridentification information and a user device. Using the above example,token 115 d may be generated by issuer server 130, and token 115 d maybe uniquely associated with user device 110 d (i.e., token 115 d mayonly be allowed to be used in a transaction if sent from user device 110d) and with particular user identification information. Next, at step530, the token is sent to the user device for storage. Using the sameexample, token 115 d may be sent to user device 110 d for storage inwallet 111 d after being generated by issuer server 130.

Finally, at step 540, a token record associated with the token isgenerated. The token record may be generated by a server and stored in adatabase, for instance. Referring to the above example, the token recordmay be generated by issuer server 130 and stored in database 135. Thetoken record may include any suitable information about the generatedtoken, and may be similar to one or more of token records 300 b of FIG.3B. As the token is used by the user device, the token record may beupdated. For example, usage history (e.g., transaction history)associated with the token may be stored in the database. As anotherexample, as token information is updated, the corresponding informationin the database may be updated as well.

Modifications, additions, or omissions may be made to method 600 withoutdeparting from the scope of the present disclosure. For example, theorder of the steps may be performed in a different manner than thatdescribed and some steps may be performed at the same time.Additionally, each individual step may include additional steps withoutdeparting from the scope of the present disclosure.

FIG. 7 illustrates an example method 700 for storing user tokens at amerchant server in accordance with embodiments of the presentdisclosure. The method begins at step 710, where a request is receivedfrom a merchant server to generate a token associated with a useraccount and the merchant server. The request may be initiated by a userdevice associated with the user account (i.e., the user device requeststhat the merchant server store a token “on file”). The user account withwhich the token is associated may include financial account information(e.g., checking account information), in certain embodiments. Forexample, the merchant server may store the token associated with thefinancial account information in lieu of storing the actual financialaccount information (e.g., storing the financial account information “onfile”). Referring to FIG. 1, this step may include merchant server 140requesting that issuer server 130 generate a token 145 that isassociated with a financial account of a user associated with userdevice 110 b and/or 110 c.

At step 720, a token may be generated in response to the requestreceived at step 710. The token may be associated with a particular useraccount and the merchant server, in certain embodiments. Using the aboveexample, a token 145 may be generated by issuer server 130, and thetoken 145 may be uniquely associated with merchant server 140 (i.e.,token 145 may only be allowed to be used if sent from merchant server140) and with a particular user account associated with the merchantserver 140. Next, at step 730, the token is sent to the merchant serverfor storage. Using the same example, token 145 may be sent to merchantserver 140 for storage in wallet 141 after being generated by issuerserver 130.

Finally, at step 740, a token record associated with the token isgenerated. The token record may be generated by a server and stored in adatabase, for instance. Referring to the above example, the token recordmay be generated by issuer server 130 and stored in database 135. Thetoken record may include any suitable information about the generatedtoken, and may be similar to one or more of token records 300 a of FIG.3A.

Modifications, additions, or omissions may be made to method 700 withoutdeparting from the scope of the present disclosure. For example, theorder of the steps may be performed in a different manner than thatdescribed and some steps may be performed at the same time.Additionally, each individual step may include additional steps withoutdeparting from the scope of the present disclosure.

FIG. 8 illustrates an example method 800 for performing transactionsusing tokens in accordance with embodiments of the present disclosure.The method begins at step 810, where a token is received from a userdevice to complete a transaction. The token may be received at amerchant server, for instance. In certain embodiments, the token mayrepresent financial account information associated with a user of theuser device. As an example, the token may represent informationassociated with a checking account (e.g., checking account and/orrouting number information). In some embodiments, the token mayrepresent user identification information, such as driver's licenseinformation, social security information, passport information, or thelike. Referring to FIG. 1, merchant server 140 may receive token 115 afrom user device 110 a (which may have originated from wallet 111 a onuser device 110 a) to complete a transaction.

At step 820, a verification request is sent to an issuer server inresponse to receiving the token at step 810. The verification requestmay include any suitable information associated with the transaction,such as a merchant identifier, a product identifier, a price of theproduct, information contained in the token, and information associatedwith the user device that provided the token. As an example, referringagain to FIG. 1, the verification request may be sent by merchant server140 to issuer server 130. The verification request may includetransaction information, the information in token 115 a, and theidentity of user device 110 a (since it is the device that provided thetoken to merchant server 140).

At step 830, the issuer server may verify the token or otherwisedetermine whether the token is legitimate. This may include, forexample, comparing the information received in the verification requestfrom the merchant server with the token record associated with the tokento determine whether the user device that provided the token matches theuser device associated with the token in the token record.

If the token is verified by the issuer server, the issuer server maysend translated information for the token back to the merchant server,and the translated information for the token is received at step 840.The translated information may include the exploitable sensitiveinformation stored in the token record for which the token represented anon-exploitable version. For example, in some embodiments, thetranslated information may include financial account information such aschecking account information (e.g., the account number or routingnumber) or credit account information. In some embodiments, thetranslated information may include user identification information. Incertain embodiments, the translated information may include acombination of financial account information and user identificationinformation.

Finally, at step 850, the translated information is used to complete thetransaction. Where the translated information is financial accountinformation, this may include using the financial account informationfor payment, for instance. Similarly, where the translated informationis user identification information, this may include using the useridentification information for identification verification purposes, forinstance.

Modifications, additions, or omissions may be made to method 800 withoutdeparting from the scope of the present disclosure. For example, theorder of the steps may be performed in a different manner than thatdescribed and some steps may be performed at the same time.Additionally, each individual step may include additional steps withoutdeparting from the scope of the present disclosure.

FIG. 9 illustrates an example method 900 for generating alertsassociated with token usage in accordance with embodiments of thepresent disclosure. The method begins at step 910, where a token isreceived at an issuer server from a merchant server. In certainembodiments, the token may be sent to the issuer server by the merchantserver for verification in the course of a transaction. For example,referring to FIG. 1, merchant server 140 send the token 115 a to issuerserer 130 for verification after having received token 115 a from userdevice 110 a during the course of a transaction. The verificationrequest may include any suitable information associated with thetransaction, such as a merchant identifier, a product identifier, aprice of the product, a geographical location of the transaction,information contained in the token, and information associated with theuser device that provided the token.

At step 920, the information associated with the transaction is comparedwith one or more token usage rules. The token usage rules may beassociated with the particular token used in the transaction, and mayaccordingly be unique to the particular token. The token usage rules maycomprise any suitable rules or restrictions for usage of the token. Forexample, in particular embodiments the token usage rules may compriseone or more rules indicating geographical locations in whichtransactions may or may not be performed using the token, one or morerules indicating products for which transactions may or may not beperformed using the token, one or more rules indicating monetary amountsover which transactions may not be performed using the token, or acombination thereof.

At step 930, it is determined, based on the comparison of step 920,whether the transaction is within compliance of the one or more tokenusage rules. If so, the method proceeds to step 940, where thetransaction is allowed. Otherwise, the method proceeds to step 950,where the transaction is denied and an alert is generated. The alert maybe in any suitable format, including a short message system (SMS) textmessage, electronic mail message, a pop-up push notification message onthe user device, or the like.

Modifications, additions, or omissions may be made to method 900 withoutdeparting from the scope of the present disclosure. For example, theorder of the steps may be performed in a different manner than thatdescribed and some steps may be performed at the same time.Additionally, each individual step may include additional steps withoutdeparting from the scope of the present disclosure.

FIG. 10 illustrates an example method 1000 for using tokens in responseto requests received by telephone in accordance with embodiments of thepresent disclosure. The method begins at step 1010, where a request tocomplete a transaction is received from a user telephone device. Therequest may be received at a merchant server in any suitable format,including a request submitted via a telephone call or via a SMS message.The request may indicate that the user of the user telephone devicewishes to complete the transaction using a token associated withthemselves, the user telephone device, and/or the merchant that is aparty to the transaction.

At step 1020, one or more tokens associated with the user, usertelephone device, and/or the merchant are determined. This may be donebased on the telephone number from which the request of step 1010originated. For example, caller ID may be used for requests by telephonecall to determine which tokens may be associated with the particulartelephone number. As another example, metadata from SMS message requestsmay be used to determine which tokens may be associated with theparticular telephone number.

At step 1030, the one or more tokens determined at step 1020 areprovided to the user for selection therefrom, and at step 1040, a tokenselection (from among the one or more tokens provided for selection) isreceived back from the user. In certain embodiments, if only one tokenis determined at step 1020 to be associated with the particulartelephone number, then steps 1030 and 1040 may be skipped.

At step 1050, a verification request is sent to an issuer server for theselected token. The verification request may include any suitableinformation associated with the transaction, such as a merchantidentifier, a product identifier, a price of the product, a geographicallocation of the transaction, information contained in the token, andinformation associated with the user device that provided the token.

Finally, at step 1060 (if the token was verified by the issuer server),translated information associated with the token is received and used tocomplete the transaction. Where the translated information is financialaccount information, this may include using the financial accountinformation for payment, for instance. Similarly, where the translatedinformation is user identification information, this may include usingthe user identification information for identification verificationpurposes, for instance.

Modifications, additions, or omissions may be made to method 1000without departing from the scope of the present disclosure. For example,the order of the steps may be performed in a different manner than thatdescribed and some steps may be performed at the same time.Additionally, each individual step may include additional steps withoutdeparting from the scope of the present disclosure.

FIG. 11 illustrates an example method 1100 for generating notificationsbased on token usage information in accordance with embodiments of thepresent disclosure. The method begins at step 1110, where token usageinformation is received. The token usage information may include anysuitable information associated with a token's history. For example, thetoken usage history may include transactions in which the token was used(and all associated information therewith, such as the merchants,products, prices, locations, etc.).

At step 1120, one or more characteristics of the token usage informationare determined. This may include, for example, merchants at which theparticular token was used to complete transactions, products for whichthe particular token was used to complete transactions, or transactionsin which the token was denied.

Finally, at step 1130, one or more notifications are generated based onthe characteristics determined at step 1120. The notifications may be inany suitable format, such as SMS messages, electronic mail messages,pop-up push notification messages, or the like. In particularembodiments, the notifications may be advertisements, fraud alerts, orgeneral usage notifications (e.g., denied transaction, usage limitreached, etc.). For example, it may be determined at step 1120 that aparticular token was used many times at a particular merchant during acertain time period. Accordingly, an advertisement for the merchant (ora competitor merchant) may be sent to the user device associated withthe token. The notifications may be sent to any user device associatedwith a particular token. For example, the notification may be sent tothe user device directly associated with the token (i.e., the specificuser device that may use the token for transactions), and/or to a userdevice indirectly associated with the token (e.g., a parent device for achild token).

Modifications, additions, or omissions may be made to method 1100without departing from the scope of the present disclosure. For example,the order of the steps may be performed in a different manner than thatdescribed and some steps may be performed at the same time.Additionally, each individual step may include additional steps withoutdeparting from the scope of the present disclosure.

Although the present disclosure includes several embodiments, changes,substitutions, variations, alterations, transformations, andmodifications may be suggested to one skilled in the art, and it isintended that the present disclosure encompass such changes,substitutions, variations, alterations, transformations, andmodifications as fall within the spirit and scope of the appendedclaims.

What is claimed is:
 1. A system, comprising: a memory comprisinginstructions; an interface configured to receive, from a user telephonedevice, a request to complete a transaction using a token; a processorcommunicatively coupled to the memory and the interface, the processorconfigured, when executing the instructions, to: use caller ID to detecta telephone number of the telephone device; determine one or more tokensbased on the detected telephone number wherein the interface is furtherconfigured to: provide the one or more tokens to the telephone device;receive, from the telephone device, a first token and a second token;send, to an issuer server, a verification request for the second token,wherein usage of the second token is verified against one or more rulesindicating a geographical boundary outside of which the second token maynot be used, wherein the issue server is configured to generate a tokenrecord and store the token record in a database, the token recordcomprising: a first token identifier for the first token, an accountidentifier for an account corresponding to the first token, a deviceidentifier for the telephone device, and a user identifier for a user ofthe telephone device; and a second token identifier for the secondtoken, an account identifier for an account corresponding to the secondtoken, a device identifier for the telephone device, and a useridentifier for a user of the telephone device; and receive, in responseto the verification request, translated information associated with thesecond token; and wherein the processor is further configured tocomplete the transaction using the translated information.
 2. The systemof claim 1, where the second token comprises a non-exploitablerepresentation of the translated information.
 3. The system of claim 1,wherein the request is received via a telephone call that includes theuser telephone device.
 4. The system of claim 1, wherein the request isreceived via a short message service (SMS) text message sent from theuser telephone device.
 5. The system of claim 1, wherein the token isassociated with financial account information.
 6. A method, comprising:receiving, from a user telephone device, a request to complete atransaction using a token; using caller ID to detect a telephone numberof the telephone device; determining one or more tokens based on thedetected telephone; providing the one or more tokens to the telephonedevice; receiving, from the telephone device, a first token and a secondtoken; sending, to an issuer server, a verification request for thesecond token, wherein usage of the second token is verified against oneor more rules indicating a geographical boundary outside of which thesecond token may not be used, wherein the issue server is configured togenerate a token record and store the token record in a database, thetoken record comprising: a first token identifier for the first token,an account identifier for an account corresponding to the first token, adevice identifier for the telephone device, and a user identifier for auser of the telephone device; and a second token identifier for thesecond token, an account identifier for an account corresponding to thesecond token, a device identifier for the telephone device, and a useridentifier for a user of the telephone device; receiving, in response tothe verification request, translated information associated with thesecond selected token; and completing the transaction using thetranslated information.
 7. The method of claim 6, where the second tokencomprises a non-exploitable representation of the translatedinformation.
 8. The method of claim 6, wherein the request is receivedvia a telephone call that includes the user telephone device.
 9. Themethod of claim 6, wherein the request is received via a short messageservice (SMS) text message sent from the user telephone device.
 10. Themethod of claim 6, wherein the token is associated with financialaccount information.
 11. A computer-readable medium comprisinginstructions that are configured, when executed by a processor, to:receive, from a user telephone device, a request to complete atransaction using a token; use caller ID to detect a telephone number ofthe telephone device; determine one or more tokens based on the detectedtelephone number; provide the one or more tokens to the telephonedevice; receive, from the telephone device, a first token and a secondtoken; send, to an issuer server, a verification request for the secondtoken, wherein usage of the second token is verified against one or morerules indicating a geographical boundary outside of which the secondtoken may not be used, wherein the issue server is configured togenerate a token record and store the token record in a database, thetoken record comprising: a first token identifier for the first token,an account identifier for an account corresponding to the first selectedtoken, a device identifier for the telephone device, and a useridentifier for a user of the telephone device; and a second tokenidentifier for the second token, an account identifier for an accountcorresponding to the second token, a device identifier for the telephonedevice, and a user identifier for a user of the telephone device;receive, in response to the verification request, translated informationassociated with the second token; and complete the transaction using thetranslated information.
 12. The computer-readable medium of claim 11,where the second token comprises a non-exploitable representation of thetranslated information.
 13. The computer-readable medium of claim 11,wherein the request is received via a telephone call that includes theuser telephone device.
 14. The computer-readable medium of claim 11,wherein the request is received via a short message service (SMS) textmessage sent from the user telephone device.