PROGRAMMABLE SECURITY TOKEN
First Claim
Patent Images
1. A programmable security token, comprising:
- an input interface configured to receive post-vendor customization of a parameter used to generate a security code;
an authorization module configured to authorize the post-vendor customization;
a configuration module configured to perform the post-vendor customization when the post-vendor customization is authorized;
an execution module configured to generate the security code using at least the customized parameter, wherein the security code is suitable for an authentication server; and
an output interface configured to output the generated security code.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods are described for programmable security token. A programmable security token includes an input interface configured to receive post-vendor customization of a parameter used to generate a security code, an authorization module configured to authorize the post-vendor customization, a configuration module configured to perform the post-vendor customization when the post-vendor customization is authorized, an execution module configured to generate the security code using at least the customized parameter, wherein the security code is suitable for an authentication server, and an output interface configured to output the generated security code.
-
Citations
19 Claims
-
1. A programmable security token, comprising:
-
an input interface configured to receive post-vendor customization of a parameter used to generate a security code; an authorization module configured to authorize the post-vendor customization; a configuration module configured to perform the post-vendor customization when the post-vendor customization is authorized; an execution module configured to generate the security code using at least the customized parameter, wherein the security code is suitable for an authentication server; and an output interface configured to output the generated security code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computerized method of using a programmable security token, comprising:
-
receiving, at the programmable security token, a request to customize a parameter used to generate a security code; determining whether the request to customize the parameter is authorized; performing the post-vendor customization of the parameter as a function of whether the request is authorized; generating a security code using at least the customized parameter; outputting the generated security code; and transmitting the generated security code to an authentication server according to the customization of the parameter. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A programmable security token, comprising:
-
a housing; an input interface configured to receive post-vendor customization of a parameter used to generate a security code; a power source positioned inside the housing configured to provide power to the programmable security token; a non-transitory computer readable medium positioned inside the housing and having executable instructions; a processor positioned inside the housing and configured to execute the executable instructions to; authorize the post-vendor customization of the parameter; perform the post-vendor customization of the parameter; and generate the security code using at least the customized parameter; and an output interface configured to output the generated security code. - View Dependent Claims (16, 17, 18, 19)
-
Specification