Token security on a communication device
First Claim
Patent Images
1. A communication device comprising:
- a processor; and
a non-transitory computer readable medium coupled to the processor and implementing an application that performs operations for enhancing security of storing a token on the communication device, the operations including;
sending, to a token request computer, a request for the token, wherein the token is a substitute for an account identifier associated with an account of the user, and the account identifier is not computationally derivable from the token;
receiving from the token requester computer;
a session key encrypted with a hash value derived from user authentication data that authenticates a user of the communication device; and
the token encrypted with the session key;
storing the session key encrypted with the hash value and the token encrypted with the session key in a memory of the communication device, wherein the encrypted session key and the encrypted token are automatically deleted from the communication device when power to the communication device is interrupted; and
subsequent to storing the encrypted session key and the encrypted token on the communication device;
receiving user authentication data on a user interface of the communication device to initiate a transaction via the application;
computing the hash value from the received user authentication data;
decrypting the encrypted session key using the hash value;
decrypting the encrypted token using the decrypted session key;
temporarily storing the decrypted token on the communication device;
initiating the transaction using the decrypted token instead of the account identifier; and
removing the decrypted token from the communication device, wherein the decrypted token is removed from the communication device upon detecting that the application is no longer active.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for enhancing the security of storing sensitive information or a token on a communication device may include sending a request for the sensitive information or token. The communication device may receive a session key encrypted with a hash value derived from user authentication data that authenticates the user of the communication device, and the sensitive information or token encrypted with the session key. The session key encrypted with the hash value, and the sensitive information or token encrypted with the session key can be stored in a memory of the communication device.
-
Citations
18 Claims
-
1. A communication device comprising:
-
a processor; and a non-transitory computer readable medium coupled to the processor and implementing an application that performs operations for enhancing security of storing a token on the communication device, the operations including; sending, to a token request computer, a request for the token, wherein the token is a substitute for an account identifier associated with an account of the user, and the account identifier is not computationally derivable from the token; receiving from the token requester computer; a session key encrypted with a hash value derived from user authentication data that authenticates a user of the communication device; and the token encrypted with the session key; storing the session key encrypted with the hash value and the token encrypted with the session key in a memory of the communication device, wherein the encrypted session key and the encrypted token are automatically deleted from the communication device when power to the communication device is interrupted; and subsequent to storing the encrypted session key and the encrypted token on the communication device; receiving user authentication data on a user interface of the communication device to initiate a transaction via the application; computing the hash value from the received user authentication data; decrypting the encrypted session key using the hash value; decrypting the encrypted token using the decrypted session key; temporarily storing the decrypted token on the communication device; initiating the transaction using the decrypted token instead of the account identifier; and removing the decrypted token from the communication device, wherein the decrypted token is removed from the communication device upon detecting that the application is no longer active. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for enhancing security of storing a token on a communication device comprising:
-
receiving, by a token request computer, a request for a token from the communication device, wherein the token is a substitute for an account identifier associated with an account of a user, and the account identifier is not computationally derivable from the token; sending, by the token request computer, the request to a token server; receiving, from the token server, a session key associated with the request, and the token encrypted with the session key; encrypting the session key with a hash value derived from user authentication data for authenticating a user of the communication device; and sending the session key encrypted with the hash value, and the token encrypted with the session key to the communication device, wherein the session key encrypted with the hash value and the token encrypted with the session key are stored in a memory of the communication device, wherein the encrypted session key and the encrypted token are automatically deleted from the communication device when power to the communication device is interrupted, and wherein subsequent to storing the encrypted session key and the encrypted token on the communication device, the communication device receives user authentication data on a user interface of the communication device to initiate a transaction, computes the hash value from the received user authentication data, decrypts the encrypted session key using the hash value, decrypts the encrypted token using the decrypted session key, temporarily stores the decrypted token on the communication device, initiates the transaction using the decrypted token instead of the account identifier, and removes the decrypted token from the communication device upon detecting that the application is no longer active. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A method for enhancing security of storing a token on a communication device, the method comprising:
-
sending, to a token request computer, a request for the token, wherein the token is a substitute for an account identifier associated with an account of a user, and the account identifier is not computationally derivable from the token; receiving from the token requester computer; a session key encrypted with a hash value derived from user authentication data for authenticating the user of the communication device; and the token encrypted with the session key; and storing the session key encrypted with the hash value and the token encrypted with the session key in a memory of the communication device, wherein the encrypted session key and the encrypted token are automatically deleted from the communication device when power to the communication device is interrupted; subsequent to storing the encrypted session key and the encrypted token on the communication device; receiving user authentication data on a user interface of the communication device to initiate a transaction via the application; computing the hash value from the received user authentication data; decrypting the encrypted session key using the hash value; decrypting the encrypted token using the decrypted session key; temporarily storing the decrypted token on the communication device; initiating the transaction using the decrypted token instead of the account identifier; and removing the decrypted token from the communication device, wherein the decrypted token is removed from the communication device upon detecting that the application is no longer active. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
Specification