SYSTEM AND METHOD FOR AUTHENTICATING A WEB PAGE
First Claim
1. A method for authenticating data and indicating an authentication of the data, the method comprising:
- receiving a data request from a client;
retrieving data based on the data request to obtain retrieved data;
formatting the retrieved data to create formatted data, wherein the formatted data includes an authenticity key; and
returning the formatted data to the client.
6 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides for an icon with an additional level of functionality that allows a user to validate that current information (e.g., a web page) originates from the true owner of the icon and is not merely a copy. The method includes a user requesting a web page from a web site using a web browser. The web server receives the request, retrieves the web page and forwards it to an authentication server. The authentication server inserts an authenticity key into the web page, then the page (including the authenticity key) is returned to the user. If the page includes an authenticity key, the authenticity is verified at the user'"'"'s computer because the user computer includes logic (e.g., software) to verify the authenticity. During the user configuration process, the user defines an authenticity stamp which determines the format of an authenticated page.
-
Citations
24 Claims
-
1. A method for authenticating data and indicating an authentication of the data, the method comprising:
-
receiving a data request from a client;
retrieving data based on the data request to obtain retrieved data;
formatting the retrieved data to create formatted data, wherein the formatted data includes an authenticity key; and
returning the formatted data to the client. - View Dependent Claims (2, 3, 4, 5, 6, 7, 24)
-
-
8. A system for authenticating data and indicating an authentication of the data, the system comprising:
-
a client;
a server;
a network, wherein the client and the server communicate via the network; and
an authentication server, wherein said authentication server is in communication with said server, the authentication server being configured to insert an authenticity key in real time into the data requested from the client, thereby facilitating the client to authenticate the authenticity key to verify the source of the data. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A system configured for authenticating data and indicating an authentication of the data, the system comprising:
-
a client;
a server, wherein said server sends a page, wherein the page includes a graphic image and wherein each of said graphic images includes an authenticity key; and
,a network, wherein the client and the server communicate via the network. - View Dependent Claims (22, 23)
-
-
14. In a computer system for authenticating data and indicating an authentication of the data, a computer-readable medium holding computer executable instructions for performing a method comprising the steps of:
-
receiving a data request from a client;
retrieving data based on the data request to obtain retrieved data;
formatting the retrieved data to create formatted data, wherein the formatted data includes an authenticity key; and
returning the formatted data to the client. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
Specification