US-20260129056-A1 - PROXY DEVICES FOR MOVING ACROSS CARD NETWORKS
Abstract
In some implementations, a proxy device, configured to receive requests on behalf of a first card network, may receive a request to authorize an event. The request may include a virtual identifier that is associated with the first card network. The proxy device may map the virtual identifier to a permanent identifier that is associated with a second card network different from the first card network. The proxy device may replace the virtual identifier in the request with the permanent identifier in order to generate a detokenized request. The proxy device may transmit the detokenized request to the second card network for processing.
Inventors
- Ian OROURKE
- Timothy E. EMERSON
- Walker MARSH
Assignees
- CAPITAL ONE SERVICES, LLC
Dates
- Publication Date
- 20260507
- Application Date
- 20241106
Claims (20)
- 1 . A system for routing requests across card networks, the system comprising: one or more memories; and one or more processors, communicatively coupled to the one or more memories, configured to: receive a request to authorize an event, wherein the request includes a virtual identifier that is associated with a first card network, wherein the system is configured to receive requests on behalf of the first card network; map the virtual identifier to a permanent identifier that is associated with a second card network different from the first card network; reencode the request into an envelope, using the permanent identifier instead of the virtual identifier, that is transparent to the second card network; and transmit the envelope to the second card network for processing.
- 2 . The system of claim 1 , wherein the envelope is transparent to the second card network by refraining from indicating the system, associated with the first card network, as a source for the envelope.
- 3 . The system of claim 1 , wherein the one or more processors, to map the virtual identifier to the permanent identifier, are configured to: use a data structure, stored in the one or more memories, that stores virtual identifiers in association with permanent identifiers.
- 4 . The system of claim 3 , wherein the one or more processors are configured to: receive the data structure from an issuing device.
- 5 . The system of claim 1 , wherein the one or more processors, to map the virtual identifier to the permanent identifier, are configured to: identify an indicator, included in the virtual identifier, that the virtual identifier is to be detokenized; transmit, to a detokenizer device, a request for the permanent identifier that indicates the virtual identifier; and receive, from the detokenizer device, a response to the request that indicates the permanent identifier.
- 6 . The system of claim 5 , wherein the indicator is associated with the detokenizer device from a plurality of possible detokenizer devices.
- 7 . The system of claim 1 , wherein the request is received from an acquiring device, and the envelope indicates the acquiring device as a source.
- 8 . A method of routing requests across card networks, comprising: receiving, at a proxy device configured to receive requests on behalf of a first card network, a request to authorize an event, wherein the request includes a virtual identifier that is associated with the first card network; mapping, by the proxy device, the virtual identifier to a permanent identifier that is associated with a second card network different from the first card network; replacing, by the proxy device, the virtual identifier in the request with the permanent identifier in order to generate a detokenized request; and transmitting, from the proxy device, the detokenized request to the second card network for processing.
- 9 . The method of claim 8 , wherein transmitting the detokenized request to the second card network comprises: transmitting the detokenized request to an acquiring device for delivery to the second card network.
- 10 . The method of claim 8 , wherein mapping the virtual identifier to the permanent identifier comprises: applying an algorithm, by the proxy device, to convert the virtual identifier into the permanent identifier.
- 11 . The method of claim 8 , wherein mapping the virtual identifier to the permanent identifier comprises: determining, using the virtual identifier, a detokenizer device; transmitting, to the detokenizer device, a request for the permanent identifier that indicates the virtual identifier; and receiving, from the detokenizer device, a response to the request that indicates the permanent identifier.
- 12 . The method of claim 8 , wherein the request is received from an acquiring device, and the detokenized request indicates the acquiring device as a source.
- 13 . The method of claim 8 , wherein the detokenized request indicates the proxy device as a source.
- 14 . A non-transitory computer-readable medium storing a set of instructions for generating a virtual identifier that routes across card networks, the set of instructions comprising: one or more instructions that, when executed by one or more processors of a device, cause the device to: receive a request to link a virtual identifier, associated with a first card network, to a permanent identifier that is associated with a second card network different from the first card network; generate a data structure that stores the virtual identifier in association with the permanent identifier; and transmit the data structure to a detokenizer device associated with a proxy device of the first card network.
- 15 . The non-transitory computer-readable medium of claim 14 , wherein the detokenizer device is at least partially integrated with the proxy device.
- 16 . The non-transitory computer-readable medium of claim 14 , wherein the one or more instructions, when executed by the one or more processors, cause the device to: transmit, to the proxy device, an indication that the data structure was sent to the detokenizer device.
- 17 . The non-transitory computer-readable medium of claim 14 , wherein the one or more instructions, that cause the device to receive the request to link the virtual identifier to the permanent identifier, cause the device to: receive the request from a user device.
- 18 . The non-transitory computer-readable medium of claim 17 , wherein the one or more instructions, when executed by the one or more processors, cause the device to: receive, from the user device, a set of credentials, wherein the request is received based on verifying the set of credentials.
- 19 . The non-transitory computer-readable medium of claim 14 , wherein the one or more instructions, when executed by the one or more processors, cause the device to: validate the permanent identifier, wherein the data structure is generated in response to validating the permanent identifier.
- 20 . The non-transitory computer-readable medium of claim 14 , wherein the one or more instructions, when executed by the one or more processors, cause the device to: transmit, to a user device, a confirmation that the virtual identifier was linked to the permanent identifier.
Description
BACKGROUND To improve security in a computerized system, virtual identifiers may be used in place of permanent identifiers. For example, a virtual card number (VCN) may be used in place of a payment account number (PAN). Tokenizing the PAN into the VCN improves security because the VCN may be replaced, if compromised, more easily than the PAN. SUMMARY Some implementations described herein relate to a system for routing requests across card networks. The system may include one or more memories and one or more processors communicatively coupled to the one or more memories. The one or more processors may be configured to receive a request to authorize an event, wherein the request includes a virtual identifier that is associated with a first card network, wherein the system is configured to receive requests on behalf of the first card network. The one or more processors may be configured to map the virtual identifier to a permanent identifier that is associated with a second card network different from the first card network. The one or more processors may be configured to reencode the request into an envelope, using the permanent identifier instead of the virtual identifier, that is transparent to the second card network. The one or more processors may be configured to transmit the envelope to the second card network for processing. Some implementations described herein relate to a method of routing requests across card networks. The method may include receiving, at a proxy device configured to receive requests on behalf of a first card network, a request to authorize an event, wherein the request includes a virtual identifier that is associated with the first card network. The method may include mapping, by the proxy device, the virtual identifier to a permanent identifier that is associated with a second card network different from the first card network. The method may include replacing, by the proxy device, the virtual identifier in the request with the permanent identifier in order to generate a detokenized request. The method may include transmitting, from the proxy device, the detokenized request to the second card network for processing. Some implementations described herein relate to a non-transitory computer-readable medium that stores a set of instructions for generating a virtual identifier that routes across card networks. The set of instructions, when executed by one or more processors of a device, may cause the device to receive a request to link a virtual identifier, associated with a first card network, to a permanent identifier that is associated with a second card network different from the first card network. The set of instructions, when executed by one or more processors of the device, may cause the device to generate a data structure that stores the virtual identifier in association with the permanent identifier. The set of instructions, when executed by one or more processors of the device, may cause the device to transmit the data structure to a detokenizer device associated with a proxy device of the first card network. BRIEF DESCRIPTION OF THE DRAWINGS FIGS. 1A-1F are diagrams of an example implementation relating to moving across card networks, in accordance with some embodiments of the present disclosure. FIG. 2 is a diagram of an example environment in which systems and/or methods described herein may be implemented, in accordance with some embodiments of the present disclosure. FIG. 3 is a diagram of example components of one or more devices of FIG. 2, in accordance with some embodiments of the present disclosure. FIG. 4 is a flowchart of an example process relating to moving across card networks, in accordance with some embodiments of the present disclosure. FIG. 5 is a flowchart of an example process relating to generating virtual identifiers across card networks, in accordance with some embodiments of the present disclosure. DETAILED DESCRIPTION The following detailed description of example implementations refers to the accompanying drawings. The same reference numbers in different drawings may identify the same or similar elements. To improve security in a computerized system, virtual identifiers may be used in place of permanent identifiers. For example, a VCN may be used in place of a PAN. Tokenizing the PAN into the VCN improves security because the VCN may be replaced, if compromised, more easily than the PAN. As a result, computer resources are conserved. Generally, a VCN is detokenized (e.g., into a PAN) at an issuing device. Therefore, a request (e.g., for a transaction or another type of event) is routed from an acquiring device to the issuing device, via a card network, using the VCN. As a result, the VCN generally has to be associated with a same card network as the PAN to which the VCN maps. Some implementations described herein enable a proxy device, associated with a card network, to detokenize a virtual identifier into a permanent identifier, before a request i