TOKEN IDENTITY AND ATTRIBUTE MANAGEMENT
First Claim
Patent Images
1. A method, comprising:
- receiving a request, from an entity, for one or more tokens based on one or more attributes;
encrypting and masking the one or more attributes;
adding the encrypted and masked one or more attributes to the one or more tokens; and
transmitting the one or more tokens to the entity.
1 Assignment
0 Petitions
Accused Products
Abstract
One example method of operation may include receiving a request, from an entity, for one or more tokens based on one or more attributes, encrypting and masking the one or more attributes, adding the encrypted and masked one or more attributes to the one or more tokens, and transmitting the one or more tokens to the entity.
-
Citations
20 Claims
-
1. A method, comprising:
-
receiving a request, from an entity, for one or more tokens based on one or more attributes; encrypting and masking the one or more attributes; adding the encrypted and masked one or more attributes to the one or more tokens; and transmitting the one or more tokens to the entity. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus, comprising:
-
a receiver configured to receive a request, from an entity, for one or more tokens based on one or more attributes; a processor configured to encrypt and mask the one or more attributes; add the encrypted and masked one or more attributes to the one or more tokens; and a transmitter configured to transmit the one or more tokens to the entity. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable storage medium configured to store instructions that when executed cause a processor to perform:
-
receiving a request, from an entity, for one or more tokens based on one or more attributes; encrypting and masking the one or more attributes; adding the encrypted and masked one or more attributes to the one or more tokens; and transmitting the one or more tokens to the entity. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification