Token activation
First Claim
Patent Images
1. A computer-implemented method comprising:
- generating a recovery key identifiable by a unique token identifier by;
storing a user identifier and one or more encryption keys in a location associated with the recovery key; and
storing an enabled state associated with the token identifier of the recovery key; and
generating a passcode associated with the user;
providing the passcode and the recovery key to the user;
using the recovery key to obtain the user identifier and the one or more encryption keys;
creating an inactive token by storing the user identifier on a blank token; and
activating the inactive token to enable a user to enter a transaction, the activation being based on information received from the recovery key and the passcode received from the user.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for activating a token to enable a user to enter a transaction based on information received from a recovery key and a passcode are described herein.
-
Citations
31 Claims
-
1. A computer-implemented method comprising:
-
generating a recovery key identifiable by a unique token identifier by; storing a user identifier and one or more encryption keys in a location associated with the recovery key; and storing an enabled state associated with the token identifier of the recovery key; and generating a passcode associated with the user; providing the passcode and the recovery key to the user; using the recovery key to obtain the user identifier and the one or more encryption keys; creating an inactive token by storing the user identifier on a blank token; and activating the inactive token to enable a user to enter a transaction, the activation being based on information received from the recovery key and the passcode received from the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer program product tangibly embodied in a non-transitory machine readable medium comprising instructions that when executed cause a processing device to:
-
generate a recovery key identifiable by a unique token identifier by storing a user identifier and one or more encryption keys in a location associated with the recovery key and storing an enabled state associated with the token identifier of the recovery key; and generate a passcode associated with the user; provide the passcode and the recovery key to the user; use the recovery key to obtain the user identifier, the one or more encryption keys; create an inactive token by storing the user identifier on a blank token; and activate the inactive token to enable a user to enter a transaction, the activation being based on information received from the recovery key and the passcode received from the user. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A system comprising:
-
a processing device; and a memory comprising instructions that when executed cause the processing device to; generate a recovery key identifiable by a unique token identifier by storing a user identifier and one or more encryption keys in a location associated with the recovery key and storing an enabled state associated with the token identifier of the recovery key; and generate a passcode associated with the user; provide the passcode and the recovery key to the user; using the recovery key to obtain the user identifier, the one or more encryption keys; creating an inactive token by storing the user identifier on a blank token; and activate the inactive token to enable a user to enter a transaction, the activation being based on information received from the recovery key and the passcode received from the user. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31)
-
Specification