Transfer vip access to another phone6/3/2023 ![]() In particular, embodiments of the present invention relate to a soft token transfer system that can be used to transfer soft tokens from one mobile device to another. BACKGROUND FieldĮmbodiments of the present invention generally relate to the field of data security. The copyright owner has no objection to the facsimile reproduction of the patent disclosure by any person as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all rights to the copyright whatsoever. The method of claim 1, wherein said causing, by the token provisioning server, the TAC to be delivered to a user of the first mobile device via an authentication server associated with an issuer of the soft token comprises preventing potential duplication of the soft token across multiple mobile devices by withholding, by the authentication server, delivery of the TAC to the user of the first mobile device until the authentication server has received confirmation from the mobile soft token application running on the first mobile device that the soft token has been deleted from the first mobile device.Ĭontained herein is material that is subject to copyright protection. The method of claim 1, wherein the authentication server comprises a 2-factor authentication server.ĩ. The method of claim 6, wherein the TAC is delivered to the user encoded in a form of a linear barcode or a matrix barcode via email or SMS.Ĩ. The method of claim 1, wherein the TAC is delivered to the user via a Short Message Service (SMS) message directed to a phone number of the first mobile device, an email message directed to an email account of the user or via a phone call to the user on the phone number of the first mobile device.ħ. The method of claim 1, wherein the authentication server authenticates the user before providing the TAC to the user.Ħ. ![]() The method of claim 1, further comprising deleting the token data associated with the soft token from the first mobile device after receipt of the TAC.ĥ. The method of claim 1, wherein the token data associated with the soft token includes any or a combination of an encrypted token seed, a token serial number, an issuing party, a token type, a One-Time Password (OTP) display length, a counter value, a device fingerprint of the first mobile device, a flag indicative of whether a personal identification number (PIN) is required, a PIN length, PIN policy attributes, and an issuer field to identify the authentication server.Ĥ. The method of claim 1, wherein said unbinding the encrypted token seed from the first mobile device comprises decrypting the encrypted token seed based on a fingerprint of the first mobile device and a key shared by the first mobile device and the token provisioning server.ģ. A method comprising: receiving, by a token provisioning server, from a mobile soft token application running on a first mobile device, a token transfer request (TTR) requesting transfer of a soft token stored on the first mobile device to a second mobile device generating, by the token provisioning server, a transfer activation code (TAC) responsive to receipt of token data associated with the soft token from the first mobile device, wherein the token data includes an encrypted token seed bound to the first mobile device causing, by the token provisioning server, the TAC to be delivered to a user of the first mobile device via an authentication server associated with an issuer of the soft token creating, by the token provisioning server, unbound token data associated with the soft token by unbinding the encrypted token seed from the first mobile device responsive to receipt of the TAC from the second mobile device, transferring, by the token provisioning server, the unbound token data to the second mobile device via a mobile soft token application running on the second mobile device.Ģ. Other names may be trademarks of their respective owners.1. ![]() The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. Alexa and all related logos are trademarks of, Inc. App Store is a service mark of Apple Inc. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Firefox is a trademark of Mozilla Foundation. or its affiliates in the United States and other countries. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. LifeLock identity theft protection is not available in all countries.Ĭopyright © 2023 NortonLifeLock Inc. The Norton and LifeLock Brands are part of NortonLifeLock Inc. ![]()
0 Comments
Leave a Reply. |