Token management
First Claim
Patent Images
1. A computer-implemented method comprising:
- receiving a user identifier and one or more encryption keys from a recovery key, the recovery key being associated with a user and enabled to generate replacement tokens;
receiving an encryption algorithm identification associated with each of the one or more encryption keys from the recovery key;
storing the user identifier, the one or more encryption keys, and the encryption algorithm identification on the replacement token;
requesting a passcode from the user;
in response to the request, receiving the passcode from the user; and
upon verification of the passcode, activating the replacement token by updating state information associated with the replacement token.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for generating replacement tokens are described herein.
442 Citations
30 Claims
-
1. A computer-implemented method comprising:
-
receiving a user identifier and one or more encryption keys from a recovery key, the recovery key being associated with a user and enabled to generate replacement tokens; receiving an encryption algorithm identification associated with each of the one or more encryption keys from the recovery key; storing the user identifier, the one or more encryption keys, and the encryption algorithm identification on the replacement token; requesting a passcode from the user;
in response to the request, receiving the passcode from the user; andupon verification of the passcode, activating the replacement token by updating state information associated with the replacement token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program product tangibly embodied in a non-transitory computer readable medium comprising instructions that, when executed by a processing device, cause the processing device to:
-
receive a user identifier and one or more encryption keys from a recovery key, the recovery key being associated with a user and enabled to generate replacement tokens; receive an encryption algorithm identification associated with each of the one or more encryption keys from the recovery key; store the user identifier, the one or more encryption keys, and the encryption algorithm identification on the replacement token; request a passcode from the user;
in response to the request, receiving the passcode from the user; andupon verification of the passcode, activate the replacement token by updating state information associated with the replacement token. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
-
24. A system comprising:
-
a processing device; and a memory comprising instructions that, when executed by the processing device, cause the processing device to; receive a user identifier and one or more encryption keys from a recovery key, the recovery key being associated with a user and enabled to generate replacement tokens; receive an encryption algorithm identification associated with each of the one or more encryption keys from the recovery key; store the user identifier, the one or more encryption keys, and the encryption algorithm identification on the replacement token; request a passcode from the user;
in response to the request, receiving the passcode from the user; andupon verification of the passcode, activate the replacement token by updating state information associated with the replacement token. - View Dependent Claims (25, 26, 27, 28, 29, 30)
-
Specification