发明名称 Controlled Token Distribution to Protect Against Malicious Data and Resource Access
摘要 Techniques are described for controlling data and resource access. For example, methods and systems can facilitate controlled token distribution across systems and token processing in a manner so as to limit access to and to protect data that includes access codes.
申请公布号 US2016182493(A1) 申请公布日期 2016.06.23
申请号 US201514973205 申请日期 2015.12.17
申请人 Volini Phillip;Werneke John Raymond;Schumaler Carl 发明人 Volini Phillip;Werneke John Raymond;Schumaler Carl
分类号 H04L29/06 主分类号 H04L29/06
代理机构 代理人
主权项 1. A system for generating and transmitting tokens for processing communications received from other devices over a network, the system comprising: a communication engine that: receives a first communication from a second system, the first communication being associated with a credential and having been transmitted by the second system over a wireless network;transmits a second communication over the wireless network to the second system at a first time, the second communication including a token;receives a third communication from the second system, the third communication including the token and being received at a second time that is after the first time; andin response to a determination that the token corresponds to the second system, transmits a fourth communication to the second system or to a third system, the fourth communication including an access-enabling code corresponding to an access right for a resource; an authentication engine that authenticates the credential, the authentication indicating that an entity associated with the second system is authorized to receive secure tokens for facilitating resource access; and a token engine that: in response to the authentication, generates the token, the token being generated based on or to correspond with each of: the entity and the resource;identifies that the resource corresponds to the token; anddetermines that the token corresponds to the second system.
地址 Beverly Hills CA US