Examples of 'secure token' in a sentence
Meaning of "secure token"
secure token - a unique code or string of characters used for authentication and authorization purposes to access secured systems or information
How to use "secure token" in a sentence
Basic
Advanced
secure token
Secure token offerings as alternative for private investors.
Method of loading data into a portable secure token.
A secure token can be in the format of a smart card.
Method of sending a data from a secure token to a server.
The secure token comprises a plurality of security domains.
It is known to use a specific application which is embedded in a secure token.
A secure token can comprise an application intended to communicate with a distant applicative server.
The actual bank account number is held safe in a secure token vault.
Second type of secure token is used for the invention in the manner explained hereinafter.
The syndication sends a list of activities to be performed in the portable secure token.
The secure token is configured to handle a second command requesting the sending of the response.
The object of the present invention is a method for loading data into a portable secure token.
The secure token information element may be appended on to the FTM parameter field.
Such a feedback allows avoiding a further sending of the same data to the secure token SC.
A secure token can contain several emulated UICC.
See also
A method as recited in claim 4 wherein the participation signal comprises a secure token.
In some embodiments, a secure token may be based on a symmetric cryptographic key.
Thus a distant server may load, install and register a new applet in a secure token.
A secure token may be received vÃa an out-of-band exchange with a position server.
In some embodiments, the secure token may expire after a preset duration.
Blockchain secures both the user 's data across all accounts and payments by leveraging a secure token.
However, a secure token implementation is not limited to use with any particular authentication module.
In a preferred embodiment, the polling request contains an identifier of the secure token SC.
Authentication module 224 may create a secure token, and transmit the secure token to trusted partner server 180.
Alternatively, the registration may be delegated to another application embedded into the secure token SC.
In the above-described embodiments, the portable secure token SC is a UICC or a SIM card.
Server 140 may store a secret cryptographic key that is used to create the secure token.
The secret, as well as the counter, is stored in a secure token.
FIG.6B is an example of an FTM element with a secure token.
In the present case, equipment item 10 detects the presence of secure token 40.
Alternatively, trusted partner server 180 may create the secure token.
In such embodiments, trusted partner server 180 may create the secure token.
You'll also be interested in:
Examples of using Secure
Show more
Have your men secure the floor
Secure the coaxial cable to the ceiling
Get him to a secure room under observation
Examples of using Token
Show more
Joy sent a little token of her appreciation
The token must be one of the following
And take him in token of our earnest