Systems and methods for device push provisioning

Techniques for provisioning access data may include receiving, by a first application installed on a communication device, user input selecting an account to provision to a second application installed on the communication device. The first application may invoke the second application and send a se...

Full description

Saved in:
Bibliographic Details
Main Authors Petkov, Gueorgui, Nosseir, Mohamed, Chandoor, Madhuri, Chitalia, Jalpesh, Bansal, Parveen, Law, Simon, Bellenger, Thomas
Format Patent
LanguageEnglish
Published 29.10.2020
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Techniques for provisioning access data may include receiving, by a first application installed on a communication device, user input selecting an account to provision to a second application installed on the communication device. The first application may invoke the second application and send a session identifier (ID) to the second application. The second application may send a user ID associated with the second application, a device ID, and the session ID to the first application. The first application may then generate encrypted provisioning request data and send the encrypted provisioning request data to the second application. The second application may send the encrypted provisioning request data to a remote server computer to request access data that can be used to access a resource. The second application may receive the access data provided by the remote server computer based on validation of the encrypted provisioning request data.
Bibliography:Application Number: AU20170206119