Generation, distribution and verification of tokens using a secure hash algorithm
First Claim
Patent Images
1. A method comprising:
- calculating a hash value from a product key utilizing a secure hash algorithm; and
converting the hash value to form a token for use in validating access to an offer.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and apparatus for generation, distribution and verification of tokens are described. In an implementation, a method is described in which a value of an offer is determined and a token for representing the offer is generated. The token has a number of characters based on the determination of the value of the offer.
-
Citations
20 Claims
-
1. A method comprising:
-
calculating a hash value from a product key utilizing a secure hash algorithm; and
converting the hash value to form a token for use in validating access to an offer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
generating a plurality of hash values from a plurality of tokens, wherein each said token is generated by applying a secure hash algorithm to a respective one of a plurality of product keys; and
importing the plurality of generated hash values into a database configured to validate access to an offer. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
- 18. One or more computer readable media comprising computer executable instructions that, when executed, direct a computer to generate a token by computing a secure hash value from a product key utilizing U.S. Secure Hash Algorithm Version 1.0.
Specification