SYSTEMS AND METHODS FOR LOCALLY DERIVED TOKENS
First Claim
1. A method for generating a token, comprising:
- receiving, by an access device and from a token vault computer, an encryption key and a credential identifier;
generating, by the access device, a token using the encryption key and a current time; and
transmitting, by the access device, the token, the current time, and the credential identifier to the token vault computer.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for generating a token are provided. An access device may receive, from a token vault computer, an encryption key and a credential identifier. The access device may generate a token using the encryption key and a current time. The access device may then transmit the token, the current time, and the credential identifier to the token vault computer. The token vault computer may receive the token, a current time, and a credential identifier. The token vault computer may retrieve an encryption key associated with the received credential identifier. The token vault computer may then validate the token based at least in part on the received current time and the retrieved encryption key.
260 Citations
20 Claims
-
1. A method for generating a token, comprising:
-
receiving, by an access device and from a token vault computer, an encryption key and a credential identifier; generating, by the access device, a token using the encryption key and a current time; and transmitting, by the access device, the token, the current time, and the credential identifier to the token vault computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An access device for generating a token, comprising:
-
a processor; and a computer readable medium coupled the processor, the computer readable medium comprising code, executable by the processor, for implementing a method comprising; receiving, by an access device and from a token vault computer, an encryption key and a credential identifier; generating, by the access device, a token using the encryption key and a current time; and transmitting, by the access device, the token, the current time, and the credential identifier to the token vault computer. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for offline token generation, comprising:
-
receiving, by a token vault computer and from an access device, a token, a current time, and a credential identifier; retrieving, by the token vault computer, an encryption key associated with the received credential identifier; and validating, by the token vault computer, the token based at least in part on the received current time and the retrieved encryption key, wherein the token is generated by the access device. - View Dependent Claims (18)
-
-
19. A token vault computer, comprising:
-
a processor; and a computer readable medium coupled the processor, the computer readable medium comprising code, executable by the processor, for implementing a method comprising; receiving, by a token vault computer and from an access device, a token, a current time, and a credential identifier; retrieving, by the token vault computer, an encryption key associated with the received credential identifier; and validating, by the token vault computer, the token based at least in part on the received current time and the retrieved encryption key, wherein the token is generated by the access device. - View Dependent Claims (20)
-
Specification