APPARATUS AND METHOD FOR MANAGING USE OF SECURE TOKENS
First Claim
1. A communication device comprising:
- a secure element having a secure element memory with first executable instructions, wherein the secure element, responsive to executing the first executable instructions, performs first operations comprising;
modifying a secure token utilizing identification information resulting in a modified secure token; and
receiving token adjustment instructions from a secure token application function, wherein the token adjustment instructions are received via a remote management server;
a secure device processor having a secure device processor memory with second executable instructions, wherein the secure device processor is in communication with the secure element, wherein the secure device processor, responsive to executing the second executable instructions, performs second operations comprising;
receiving the modified secure token from the secure element; and
providing the modified secure token to a receiving device to enable the receiving device to provide the modified secure token to the secure token application function for decrypting the modified secure token to analyze the identification information and to obtain token information for use by the receiving device.
2 Assignments
0 Petitions
Accused Products
Abstract
A system that incorporates the subject disclosure may perform, for example, operations including receiving an encrypted secure token from a secure token application function that is remote from the communication device, storing the encrypted secure token in a secure element memory of the secure element, accessing user input requesting the encrypted secure token where the secure device processor is separate from the secure element and is in communication with the secure element, generating a modified secure token by adding identification information to the encrypted secure token and by performing a second encryption of the encrypted secure token with the identification information, receiving the modified secure token from the secure element, and providing the modified secure token to a receiving device. Other embodiments are disclosed.
27 Citations
20 Claims
-
1. A communication device comprising:
-
a secure element having a secure element memory with first executable instructions, wherein the secure element, responsive to executing the first executable instructions, performs first operations comprising; modifying a secure token utilizing identification information resulting in a modified secure token; and receiving token adjustment instructions from a secure token application function, wherein the token adjustment instructions are received via a remote management server; a secure device processor having a secure device processor memory with second executable instructions, wherein the secure device processor is in communication with the secure element, wherein the secure device processor, responsive to executing the second executable instructions, performs second operations comprising; receiving the modified secure token from the secure element; and providing the modified secure token to a receiving device to enable the receiving device to provide the modified secure token to the secure token application function for decrypting the modified secure token to analyze the identification information and to obtain token information for use by the receiving device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method comprising:
-
modifying, by a communication device, a secure token based on identification information resulting in a modified secure token, wherein the identification information comprises a digital signature, a time stamp or a combination thereof; providing, by the communication device, the modified secure token to a receiving device to enable the receiving device to provide the modified secure token to a secure token application function for decrypting the modified secure token to analyze the identification information and to obtain token information for use by the receiving device; and receiving, by the communication device, token adjustment instructions from the secure token application function, wherein the token adjustment instructions are received via a remote management server, and wherein keysets are utilized for authentication with the remote management server. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A machine-readable storage medium, comprising executable instructions that, when executed by a processing system including a processor executing a secure token application function, facilitate performance of operations, comprising:
-
receiving a modified secure token from a receiving device that obtained the modified secure token from a communication device according to user input associated with a token descriptor; decrypting the modified secure token to obtain an encrypted secure token and to obtain identification information; verifying the identification information; decrypting the encrypted secure token to obtain a secure token; analyzing the secure token to obtain token information; providing a notification to the receiving device indicating a result of the analyzing of the token information; and providing token adjustment instructions to the communication device, wherein the token adjustment instructions are provided via a remote management server, wherein the encrypted secure token is provided to the communication device via the remote management server. - View Dependent Claims (19, 20)
-
Specification