| CPC G06Q 40/04 (2013.01) [H04L 9/007 (2013.01); H04L 9/3066 (2013.01); H04L 9/3213 (2013.01); H04L 2209/56 (2013.01)] | 20 Claims |

|
1. A computer implemented method comprising:
generating, by a first processor of a plurality of processors communicatively coupled with an electronic communications network, a first request message;
generating, by the first processor, a first public token derived from a first private token;
augmenting, by the first processor, the first request message with the first public token;
transmitting, from the first processor via the electronic communications network, the augmented first request message to a second processor of the plurality of processors;
generating, by the second processor, a second request message based on the augmented first request message;
augmenting, by the second processor, the second request message with a second public token derived from the first public token, wherein the second public token is derived indirectly from the first private token;
transmitting, by the second processor via the electronic communications network, the augmented second request message to a third processor of the plurality of processors;
generating, by the third processor, in response to processing the augmented second request message, a first result message associated with the second public token;
storing, by the third processor, the first result message in a universal data source of result messages, wherein the universal data source is accessible to any of the plurality of processors over the electronic communications network; and
receiving, by a fourth processor of the plurality of processors, a request, based on a specific private token, for all result messages stored in the universal data source associated with any public token directly or indirectly derived from the specific private token and, based thereon, accessing the universal data source and identifying all result messages stored in the universal data source associated with a public token derived directly or indirectly from the specific private token, including the second public token, the fourth processor, using the specific private token, decrypting any encrypted confidential data included therein.
|