System and method for authenticating the legitimacy of a request for a resource by a user
First Claim
Patent Images
1. A method of authenticating the legitimacy of a request for a resource by a user, the method being executable in an electronic communication system after the following predetermined steps have occurred:
- a structured user message having been created, said structured user message including a resource identifier to identify the resource, and a user identifier to identify the user that is requesting the resource;
a user request message having been assembled, said user request message including the structured user message, and the resource identifier to identify the resource being requested of a resource provider,the user request message having been sent to the resource provider,a process having been run by the resource provider receiving the user request message to create a resource provider message that includes a second resource identifier and the user request message,said method including the steps of;
receiving and de-assembling the resource provider message,creating a result indicator as to the legitimacy of the resource provider message by at least determining the resource identifier in the structured user message is equal or equivalent to the second resource identifier in the resource provider message, andsending an authentication result including said result indicator.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of authenticating the legitimacy of a request for a resource from a resource provider by a user, including providing an authentication process in which a resource provider message is received and de-assembled, the integrity of the user request message is confirmed, a result indicator as to the legitimacy of the resource provider message is created by performing two or more authenticity checks, and an authentication result is sent.
12 Citations
22 Claims
-
1. A method of authenticating the legitimacy of a request for a resource by a user, the method being executable in an electronic communication system after the following predetermined steps have occurred:
-
a structured user message having been created, said structured user message including a resource identifier to identify the resource, and a user identifier to identify the user that is requesting the resource; a user request message having been assembled, said user request message including the structured user message, and the resource identifier to identify the resource being requested of a resource provider, the user request message having been sent to the resource provider, a process having been run by the resource provider receiving the user request message to create a resource provider message that includes a second resource identifier and the user request message, said method including the steps of; receiving and de-assembling the resource provider message, creating a result indicator as to the legitimacy of the resource provider message by at least determining the resource identifier in the structured user message is equal or equivalent to the second resource identifier in the resource provider message, and sending an authentication result including said result indicator. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An authentication server comprising a memory operably coupled to an electronic communications network,
said authentication server forming part of an authentication system for authenticating the legitimacy of a request for a resource by a user, said authentication system including one or more resource provider servers, arranged to receive a user request message from the user, said user request message comprising a structured user message including a user identifier and a resource identifier, and said one or more resource provider servers operable to create a resource provider message that includes a second resource identifier and the user request message, said authentication server being operable to receive and de-assemble said resource provider message as an input, said authentication server being arranged to determine whether the resource identifier in the structured user message is equal or equivalent to the second resource identifier in the resource provider message, said authentication server being operable to generate an authentication result including a result indicator as to the legitimacy of the resource provider message based on the result of determining, and said authentication server being operable to receive the resource provider message, and return the authentication result determined.
Specification