Secure Token Transfer between Untrusted Entities
Abstract:
Methods and systems for providing a token to a protected portion of a computing device are described herein. A computing device may comprise a first portion and a second portion, and the second portion may be prevented by a security policy from interacting with the first portion. A server may receive, from a first application executing on a first portion of the computing device, a token. The server may generate a key based on the token. The server may send the key to a second portion of the computing device. The second portion of the computing device may send a request for the token, and the request may comprise the key. The server may send the token to the second portion of the computing device. The token may be encrypted such that the unencrypted token is not available to the server.
Information query
Patent Agency Ranking
0/0