Controlled token distribution to protect against malicious data and resource access
First Claim
Patent Images
1. A computer-implemented method for token-based generation of access rights to resources, the method comprising:
- receiving, at a first system, a first communication from a second system, the first communication corresponding to a credential of the second system, and the second system corresponding to an entity;
in response to the receiving, generating, at the first system, a token based on or to correspond with each of the entity and a resource;
transmitting, from the first system, a second communication to the second system at a first time, the second communication including the token;
receiving, at the first system, a third communication from the second system, the third communication corresponding to a notification that the token has been transferred to a data requesting system, and the third communication being received at a second time that is after the first time;
identifying, at the first system, the resource that corresponds to the token based on the received third communication corresponding to the notification;
in response to identifying the resource that corresponds to the token, generating an access-enabling code for the token, the access-enabling code granting the data requesting system access to the resource during a defined time period;
receiving, at the first system, a fourth communication from the data requesting system, the fourth communication corresponding to a request for access to the resource and including the token, the fourth communication being received at a third time that is after the second time; and
determining whether the token corresponds to the access-enabling code, and when the determination indicates that the token corresponds to the access-enabling code, facilitating access to the resource for the data requesting system, the access to the resource for the data requesting system being facilitated using the access-enabling code.
3 Assignments
0 Petitions
Accused Products
Abstract
Techniques are described for controlling data and resource access. For example, methods and systems can facilitate controlled token distribution across systems and token processing in a manner so as to limit access to and to protect data that includes access codes.
483 Citations
20 Claims
-
1. A computer-implemented method for token-based generation of access rights to resources, the method comprising:
-
receiving, at a first system, a first communication from a second system, the first communication corresponding to a credential of the second system, and the second system corresponding to an entity; in response to the receiving, generating, at the first system, a token based on or to correspond with each of the entity and a resource; transmitting, from the first system, a second communication to the second system at a first time, the second communication including the token; receiving, at the first system, a third communication from the second system, the third communication corresponding to a notification that the token has been transferred to a data requesting system, and the third communication being received at a second time that is after the first time; identifying, at the first system, the resource that corresponds to the token based on the received third communication corresponding to the notification; in response to identifying the resource that corresponds to the token, generating an access-enabling code for the token, the access-enabling code granting the data requesting system access to the resource during a defined time period; receiving, at the first system, a fourth communication from the data requesting system, the fourth communication corresponding to a request for access to the resource and including the token, the fourth communication being received at a third time that is after the second time; and determining whether the token corresponds to the access-enabling code, and when the determination indicates that the token corresponds to the access-enabling code, facilitating access to the resource for the data requesting system, the access to the resource for the data requesting system being facilitated using the access-enabling code. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for token-based generation of access rights to resources, the system comprising:
-
one or more data processors; and a non-transitory computer-readable storage medium containing instructions which, when executed on the one or more data processors, cause the one or more data processors to perform operations including; receiving, at a first system, a first communication from a second system, the first communication corresponding to a credential of the second system, and the second system corresponding to an entity; in response to the receiving, generating, at the first system, a token based on or to correspond with each of the entity and a resource; transmitting, from the first system, a second communication to the second system at a first time, the second communication including the token; receiving, at the first system, a third communication from the second system, the third communication corresponding to a notification that the token has been transferred to a data requesting system, and the third communication being received at a second time that is after the first time; identifying, at the first system, the resource that corresponds to the token based on the received third communication corresponding to the notification; in response to identifying the resource that corresponds to the token, generating an access-enabling code for the token, the access-enabling code granting the data requesting system access to the resource during a defined time period; receiving, at the first system, a fourth communication from the data requesting system, the fourth communication corresponding to a request for access to the resource and including the token, the fourth communication being received at a third time that is after the second time; and determining whether the token corresponds to the access-enabling code, and when the determination indicates that the token corresponds to the access-enabling code, facilitating access to the resource for the data requesting system, the access to the resource for the data requesting system being facilitated using the access-enabling code. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-program product tangibly embodied in a non-transitory machine-readable storage medium, including instructions configured to cause a data processing apparatus to perform operations including:
-
receiving, at a first system, a first communication from a second system, the first communication corresponding to a credential of the second system, and the second system corresponding to an entity; in response to the receiving, generating, at the first system, a token based on or to correspond with each of the entity and a resource; transmitting, from the first system, a second communication to the second system at a first time, the second communication including the token; receiving, at the first system, a third communication from the second system, the third communication corresponding to a notification that the token has been transferred to a data requesting system, and the third communication being received at a second time that is after the first time; identifying, at the first system, the resource that corresponds to the token based on the received third communication corresponding to the notification; in response to identifying the resource that corresponds to the token, generating an access-enabling code for the token, the access-enabling code granting the data requesting system access to the resource during a defined time period; receiving, at the first system, a fourth communication from the data requesting system, the fourth communication corresponding to a request for access to the resource and including the token, the fourth communication being received at a third time that is after the second time; and determining whether the token corresponds to the access-enabling code, and when the determination indicates that the token corresponds to the access-enabling code, facilitating access to the resource for the data requesting system, the access to the resource for the data requesting system being facilitated using the access-enabling code. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification