Controlled token distribution to protect against malicious data and resource access
Abstract:
Techniques are described for controlling data and resource access. For example, methods and systems can facilitate controlled token distribution across systems and token processing in a manner so as to limit access to and to protect data that includes access codes.
Information query
Patent Agency Ranking
0/0