Apparatus and method for managing use of secure tokens
First Claim
1. A communication device comprising:
- a secure element having a secure element memory with first executable instructions, wherein the secure element, responsive to executing the first executable instructions, facilitates performance of first operations, the first operations comprising;
storing a secure token in the secure element memory;
modifying the secure token utilizing identification information resulting in a modified secure token; and
receiving token adjustment instructions over a network from a secure token application function of a server, wherein the token adjustment instructions are received via a remote management server;
a secure device processing system including a processor and having a secure device processing system memory with second executable instructions, wherein the secure device processing system is in communication with the secure element, wherein the secure device processing system, responsive to executing the second executable instructions, facilitates performance of second operations, the second operations comprising;
receiving the modified secure token from the secure element, wherein the secure device processing system does not have access to the secure token stored in the secure element memory; and
providing the modified secure token over the network to a receiving device to enable the receiving device to provide the modified secure token to the secure token application function of the server for decrypting the modified secure token to analyze the identification information and to obtain token information for use by the receiving device, wherein the server, the communication device and the receiving device are remote from each other; and
a device processing system including processor that is separate from the secure device processing system and in communication with the secure device processing system, wherein the device processing system facilitates wireless communications between the communication device and the receiving device, and wherein the secure device processing system is separate from the secure element.
2 Assignments
0 Petitions
Accused Products
Abstract
A system that incorporates the subject disclosure may perform, for example, operations including receiving an encrypted secure token from a secure token application function that is remote from the communication device, storing the encrypted secure token in a secure element memory of the secure element, accessing user input requesting the encrypted secure token where the secure device processor is separate from the secure element and is in communication with the secure element, generating a modified secure token by adding identification information to the encrypted secure token and by performing a second encryption of the encrypted secure token with the identification information, receiving the modified secure token from the secure element, and providing the modified secure token to a receiving device. Other embodiments are disclosed.
232 Citations
20 Claims
-
1. A communication device comprising:
-
a secure element having a secure element memory with first executable instructions, wherein the secure element, responsive to executing the first executable instructions, facilitates performance of first operations, the first operations comprising; storing a secure token in the secure element memory; modifying the secure token utilizing identification information resulting in a modified secure token; and receiving token adjustment instructions over a network from a secure token application function of a server, wherein the token adjustment instructions are received via a remote management server; a secure device processing system including a processor and having a secure device processing system memory with second executable instructions, wherein the secure device processing system is in communication with the secure element, wherein the secure device processing system, responsive to executing the second executable instructions, facilitates performance of second operations, the second operations comprising; receiving the modified secure token from the secure element, wherein the secure device processing system does not have access to the secure token stored in the secure element memory; and providing the modified secure token over the network to a receiving device to enable the receiving device to provide the modified secure token to the secure token application function of the server for decrypting the modified secure token to analyze the identification information and to obtain token information for use by the receiving device, wherein the server, the communication device and the receiving device are remote from each other; and a device processing system including processor that is separate from the secure device processing system and in communication with the secure device processing system, wherein the device processing system facilitates wireless communications between the communication device and the receiving device, and wherein the secure device processing system is separate from the secure element. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method comprising:
-
modifying, by a communication device comprising a processing system including a processor, a secure token based on identification information resulting in a modified secure token; providing, by the communication device, the modified secure token over a network to a receiving device to enable the receiving device to provide the modified secure token over the network to a secure token application function of a server for decrypting the modified secure token to analyze the identification information and to obtain token information for use by the receiving device, wherein the server, the communication device and the receiving device are remote from each other; and receiving, by the communication device, token adjustment instructions over the network from the secure token application function, wherein the token adjustment instructions are received via a remote management server, and wherein keysets are utilized for authentication with the remote management server. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A non-transitory, machine-readable storage medium, comprising executable instructions that, when executed by a processing system including a processor executing a secure token application function, facilitate performance of operations, comprising:
-
receiving over a network a modified secure token from a receiving device that obtained the modified secure token over the network from a communication device according to user input associated with a token descriptor, wherein the processing system, the receiving device and the communication device are remote from each other; decrypting the modified secure token to obtain an encrypted secure token and to obtain identification information; verifying the identification information; decrypting the encrypted secure token to obtain a secure token; analyzing the secure token to obtain token information; providing a notification over the network to the receiving device indicating a result of the analyzing of the token information; and providing token adjustment instructions over the network to the communication device, wherein the token adjustment instructions are provided via a remote management server, wherein the encrypted secure token is provided over the network to the communication device via the remote management server. - View Dependent Claims (19, 20)
-
Specification