TOKEN MANAGEMENT
First Claim
Patent Images
1. A computer-implemented method comprising:
- receiving a user identifier and one or more encryption keys from a recovery key, the recovery key being associated with a user and enabled to generate replacement tokens;
storing the user identifier and the one or more encryption keys on a replacement token,requesting a passcode from the user;
in response to the request, receiving the passcode from the user; and
upon verification of the passcode, activating the replacement token by updating state information associated with the replacement token.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for generating replacement tokens are described herein.
47 Citations
33 Claims
-
1. A computer-implemented method comprising:
-
receiving a user identifier and one or more encryption keys from a recovery key, the recovery key being associated with a user and enabled to generate replacement tokens; storing the user identifier and the one or more encryption keys on a replacement token, requesting a passcode from the user;
in response to the request, receiving the passcode from the user; andupon verification of the passcode, activating the replacement token by updating state information associated with the replacement token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer program product tangibly embodied in a computer readable medium comprising instructions that, when executed by a processing device, cause the processing device to:
-
receive a user identifier and one or more encryption keys from a recovery key, the recovery key being associated with a user and enabled to generate replacement tokens; store the user identifier and the one or more encryption keys on a replacement token, request a passcode from the user;
in response to the request, receiving the passcode from the user; andupon verification of the passcode, activate the replacement token by updating state information associated with the replacement token. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25)
-
-
26. A system comprising:
-
a processing device; and a memory comprising instructions that, when executed by the processing device, cause the processing device to; receive a user identifier and one or more encryption keys from a recovery key, the recovery key being associated with a user and enabled to generate replacement tokens; store the user identifier and the one or more encryption keys on a replacement token, request a passcode from the user;
in response to the request, receiving the passcode from the user; andupon verification of the passcode, activate the replacement token by updating state information associated with the replacement token. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33)
-
Specification