US 11,722,469 B2
Method and apparatus for third-party managed data transference and corroboration via tokenization
David William Kravitz, San Jose, CA (US); Mollie Zechlin Halverson, Los Angeles, CA (US); and Matthew Benjamin Smith, Playa Vista, CA (US)
Assigned to Springcoin, Inc., Marina del Rey, CA (US)
Filed by Springcoin, Inc., Marina del Rey, CA (US)
Filed on Jan. 23, 2023, as Appl. No. 18/158,157.
Application 18/158,157 is a continuation of application No. 17/870,408, filed on Jul. 21, 2022, granted, now 11,595,365.
Application 17/870,408 is a continuation of application No. 17/470,097, filed on Sep. 9, 2021, granted, now 11,425,107, issued on Aug. 23, 2022.
Claims priority of provisional application 63/155,179, filed on Mar. 1, 2021.
Claims priority of provisional application 63/139,432, filed on Jan. 20, 2021.
Claims priority of provisional application 63/075,933, filed on Sep. 9, 2020.
Prior Publication US 2023/0164125 A1, May 25, 2023
Int. Cl. G06F 21/62 (2013.01); H04L 9/16 (2006.01); H04L 9/40 (2022.01); H04L 9/32 (2006.01); H04L 9/12 (2006.01)
CPC H04L 63/0435 (2013.01) [G06F 21/6218 (2013.01); H04L 9/3242 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for data corroboration via tokenization, as a process resulting in at least one token, invoking a protocol jointly managed by a first control circuit configured as a first network element and a second control circuit configured as a second network element, the method comprising:
the first network element provisioned with a first set of tokens representing a first set of entities;
the second network element provisioned with a second set of tokens representing a second set of entities;
establishment between the first network element and the second network element of at least one key;
transmission by the first network element to the second network element of a first message comprised, at least in part, of a first set of transformed tokens derived by transforming, as a first transformation process, using a first key of the at least one key each token of a first subset of tokens as a subset of the first set of tokens; and
comparison by the second network element of at least one of the transformed tokens of the first message to at least one transformed token of a second set of transformed tokens derived by transforming, as a second transformation process, using the first key a second subset of tokens as a subset of the second set of tokens.