Live Nation Entertainment, Inc.
CONTROLLED TOKEN DISTRIBUTION TO PROTECT AGAINST MALICIOUS DATA AND RESOURCE ACCESS

Last updated:

Abstract:

Techniques are described for controlling data and resource access. For example, methods and systems can facilitate controlled token distribution across systems and token processing in a manner so as to limit access to and to protect data that includes access codes.

Status:
Application
Type:

Utility

Filling date:

13 Jul 2020

Issue date:

4 Feb 2021