×

Controlled token distribution to protect against malicious data and resource access

  • US 9,912,653 B2
  • Filed: 12/23/2016
  • Issued: 03/06/2018
  • Est. Priority Date: 09/04/2007
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for token-based generation of access rights to resources, the method comprising:

  • receiving, at a first system, a first communication from a second system, the first communication corresponding to a credential of the second system, and the second system corresponding to an entity;

    in response to the receiving, generating, at the first system, a token based on or to correspond with each of the entity and a resource;

    transmitting, from the first system, a second communication to the second system at a first time, the second communication including the token;

    receiving, at the first system, a third communication from the second system, the third communication corresponding to a notification that the token has been transferred to a data requesting system, and the third communication being received at a second time that is after the first time;

    identifying, at the first system, the resource that corresponds to the token based on the received third communication corresponding to the notification;

    in response to identifying the resource that corresponds to the token, generating an access-enabling code for the token, the access-enabling code granting the data requesting system access to the resource during a defined time period;

    receiving, at the first system, a fourth communication from the data requesting system, the fourth communication corresponding to a request for access to the resource and including the token, the fourth communication being received at a third time that is after the second time; and

    determining whether the token corresponds to the access-enabling code, and when the determination indicates that the token corresponds to the access-enabling code, facilitating access to the resource for the data requesting system, the access to the resource for the data requesting system being facilitated using the access-enabling code.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×