TOKEN ACTIVATION
First Claim
Patent Images
1. A computer-implemented method comprising:
- generating a recovery key identifiable by a unique token identifier by;
storing a user identifier and one or more encryption keys in a location associated with the recovery key; and
storing an enabled state associated with the token identifier of the recovery key; and
generating a passcode associated with the user;
providing the passcode and the recovery key to the user; and
activating a token to enable a user to enter a transaction, the activation being based on information received from the recovery key and the passcode received from the user.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for activating a token to enable a user to enter a transaction based on information received from a recovery key and a passcode are described herein.
-
Citations
37 Claims
-
1. A computer-implemented method comprising:
-
generating a recovery key identifiable by a unique token identifier by; storing a user identifier and one or more encryption keys in a location associated with the recovery key; and storing an enabled state associated with the token identifier of the recovery key; and generating a passcode associated with the user; providing the passcode and the recovery key to the user; and activating a token to enable a user to enter a transaction, the activation being based on information received from the recovery key and the passcode received from the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 24)
-
-
14. A computer program product tangibly embodied in a machine readable medium comprising instructions that when executed cause a processing device to:
-
generate a recovery key identifiable by a unique token identifier by storing a user identifier and one or more encryption keys in a location associated with the recovery key and storing an enabled state associated with the token identifier of the recovery key; and generate a passcode associated with the user; provide the passcode and the recovery key to the user; and activate a token to enable a user to enter a transaction, the activation being based on information received from the recovery key and the passcode received from the user. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 25, 26)
-
-
27. A system comprising:
-
a processing device; and a memory comprising instructions that when executed cause the processing device to; generate a recovery key identifiable by a unique token identifier by storing a user identifier and one or more encryption keys in a location associated with the recovery key and storing an enabled state associated with the token identifier of the recovery key; and generate a passcode associated with the user; provide the passcode and the recovery key to the user; and activate a token to enable a user to enter a transaction, the activation being based on information received from the recovery key and the passcode received from the user. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
Specification