APPARATUS AND METHOD FOR MANAGING USE OF SECURE TOKENS
First Claim
1. A communication device comprising:
- a secure element having a secure element memory with first executable instructions, wherein the secure element, responsive to executing the first executable instructions, performs first operations comprising;
receiving an encrypted secure token from a secure token application function that is remote from the communication device; and
storing the encrypted secure token in the secure element memory;
a secure device processor having a secure device processor memory with second executable instructions, wherein the secure device processor is separate from the secure element and in communication with the secure element, wherein the secure device processor, responsive to executing the second executable instructions, performs second operations comprising;
accessing user input requesting the encrypted secure token;
receiving a modified secure token from the secure element, wherein the modified secure token is generated by the secure element by adding identification information to the encrypted secure token and by performing a second encryption of the encrypted secure token with the identification information; and
providing the modified secure token to a receiving device to enable the receiving device to provide the modified secure token to the secure token application function for decrypting the modified secure token to analyze the identification information and to obtain token information for use by the receiving device.
2 Assignments
0 Petitions
Accused Products
Abstract
A system that incorporates the subject disclosure may perform, for example, operations including receiving an encrypted secure token from a secure token application function that is remote from the communication device, storing the encrypted secure token in a secure element memory of the secure element, accessing user input requesting the encrypted secure token where the secure device processor is separate from the secure element and is in communication with the secure element, generating a modified secure token by adding identification information to the encrypted secure token and by performing a second encryption of the encrypted secure token with the identification information, receiving the modified secure token from the secure element, and providing the modified secure token to a receiving device. Other embodiments are disclosed.
-
Citations
20 Claims
-
1. A communication device comprising:
-
a secure element having a secure element memory with first executable instructions, wherein the secure element, responsive to executing the first executable instructions, performs first operations comprising; receiving an encrypted secure token from a secure token application function that is remote from the communication device; and storing the encrypted secure token in the secure element memory; a secure device processor having a secure device processor memory with second executable instructions, wherein the secure device processor is separate from the secure element and in communication with the secure element, wherein the secure device processor, responsive to executing the second executable instructions, performs second operations comprising; accessing user input requesting the encrypted secure token; receiving a modified secure token from the secure element, wherein the modified secure token is generated by the secure element by adding identification information to the encrypted secure token and by performing a second encryption of the encrypted secure token with the identification information; and providing the modified secure token to a receiving device to enable the receiving device to provide the modified secure token to the secure token application function for decrypting the modified secure token to analyze the identification information and to obtain token information for use by the receiving device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method comprising:
-
receiving, by a secure element of a communication device, an encrypted secure token from a secure token application function that is remote from the communication device; storing the encrypted secure token in a secure element memory of the secure element; accessing, by a secure device processor of the communication device, a request for the encrypted secure token, wherein the secure device processor is separate from the secure element and is in communication with the secure element; generating, by the secure element, a modified secure token by adding identification information to the encrypted secure token and by performing a second encryption of the encrypted secure token with the identification information; receiving, by the secure device processor, the modified secure token from the secure element; and providing, by the secure device processor, the modified secure token to a receiving device to enable the receiving device to provide the modified secure token to the secure token application function for decrypting the modified secure token to analyze the identification information and to obtain token information for use by the receiving device. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A method comprising:
-
providing, by a secure token application function, a token descriptor to a secure device processor of a communication device for storage at the secure device processor; providing, by the secure token application function, an encrypted secure token to a secure element of the communication device for storage at the secure element; receiving, by the secure token application function, a modified secure token from a receiving device that obtained the modified secure token from the communication device according to user input associated with the token descriptor; decrypting, by the secure token application function, the modified secure token to obtain the encrypted secure token and to obtain identification information; verifying, by the secure token application function, the identification information; decrypting, by the secure token application function, the encrypted secure token to obtain a secure token; analyzing, by the secure token application function, the secure token to obtain token information; and providing, by the secure token application function, a notification to the receiving device indicating an acceptance or denial of the token information. - View Dependent Claims (19, 20)
-
Specification