IMPLEMENTING SECURITY MEASURES FOR AUTHORIZED TOKENS USED IN MOBILE TRANSACTIONS
First Claim
Patent Images
1. An apparatus, comprising:
- a memory operable to store security rules associated with a generated token;
a processor communicatively coupled to the memory, the processor operable to;
access the security rules associated with the generated token;
determine whether to encrypt the generated token by applying at least a portion of the security rules to the generated token; and
encrypt the generated token; and
an interface communicatively coupled to the processor, the interface operable to communicate the encrypted token to a mobile device associated with a user.
1 Assignment
0 Petitions
Accused Products
Abstract
Security measures for tokens comprise storing security rules associated with a generated token in a memory. A processor, communicatively coupled to the memory, accesses the security rules associated with the generated token and determines whether to encrypt the generated token by applying at least a portion of the security rules to the generated token. The processor encrypts the generated token. An interface, communicatively coupled to the processor, communicates the encrypted token to a mobile device associated with a user.
-
Citations
18 Claims
-
1. An apparatus, comprising:
-
a memory operable to store security rules associated with a generated token; a processor communicatively coupled to the memory, the processor operable to; access the security rules associated with the generated token; determine whether to encrypt the generated token by applying at least a portion of the security rules to the generated token; and encrypt the generated token; and an interface communicatively coupled to the processor, the interface operable to communicate the encrypted token to a mobile device associated with a user. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method, comprising:
-
storing security rules associated with a generated token; accessing the security rules associated with the generated token; determining whether to encrypt the generated token by applying at least a portion of the security rules to the generated token; encrypting, by the processor, the generated token; and communicating the encrypted token to a mobile device associated with a user. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer readable medium comprising logic, the logic, when executed by a processor, operable to:
-
store security rules associated with a generated token; access the security rules associated with the generated token; determine whether to encrypt the generated token by applying at least a portion of the security rules to the generated token; encrypt the generated token; and communicate the encrypted token to a mobile device associated with a user. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification