US 11,687,930 B2
Systems and methods for authentication of access tokens
Jeffrey Rule, Chevy Chase, MD (US); Kaitlin Newman, Washington, DC (US); and Rajko Ilincic, Annandale, VA (US)
Assigned to CAPITAL ONE SERVICES, LLC, McLean, VA (US)
Filed by Capital One Services, LLC, McLean, VA (US)
Filed on Jan. 28, 2021, as Appl. No. 17/161,488.
Prior Publication US 2022/0237609 A1, Jul. 28, 2022
Int. Cl. G06Q 20/40 (2012.01); G06Q 20/38 (2012.01); H04L 9/08 (2006.01); H04L 9/32 (2006.01)
CPC G06Q 20/401 (2013.01) [G06Q 20/38215 (2013.01); H04L 9/0825 (2013.01); H04L 9/3213 (2013.01); H04L 9/3271 (2013.01); G06Q 2220/00 (2013.01); H04L 2209/56 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A contactless card with writeable access tokens, comprising:
a memory storing a key, an applet in communication with a first application stored on a mobile device, and transmission data comprising one or more identification credentials associated with the user;
a communication interface; and
one or more processors in communication with the applet stored in the memory and the communication interface, wherein the one or more processors are configured to:
execute the applet to create a cryptogram, using the key, wherein:
the cryptogram includes a request for an access token and the transmission data,
transmit the cryptogram to the first application running on the mobile device;
validate, by the first application, the transmission data included in the cryptogram;
generate, by the first application, the access token, upon successful validation of the transmission data, wherein the access token provides access credentials to a second system that is distinct from the contactless card and the mobile device associated with the user;
transmit, by the first application, an encrypted message to the card, wherein the encrypted message includes the access token;
decrypt, by the card, the access token using the key stored in the memory of the card;
store the access token in the memory of the contactless card, the access token being transmittable from the contactless card upon being queried by the second system; and
transmit, after entry of the communication interface into a communication field, the access token to a reader associated with the second system to which the user requires access.