Preventing fraudulent internet account access
First Claim
1. A method comprising:
- maintaining network address information associated with a network resource user;
receiving a request to authenticate the network resource user, the request including a network address identifier; and
authenticating the network resource user based on the network address information and the network address identifier.
5 Assignments
0 Petitions
Accused Products
Abstract
A method and system for authenticating requests for accessing network resources are described. Network address information may be associated with a network resource user. An authenticator may maintain the associated network address information. The authenticator may receive, from a requesting party, a request to authenticate the network resource user, where the request may include a network address identifier. The network resource user may be authenticated based on the network address information and the network address identifier. The authentication determination may be forwarded to the requesting party for purposes of controlling access to a network resource of a network resource provider in response to an access request made by the network resource user.
-
Citations
30 Claims
-
1. A method comprising:
-
maintaining network address information associated with a network resource user;
receiving a request to authenticate the network resource user, the request including a network address identifier; and
authenticating the network resource user based on the network address information and the network address identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
establishing an authorization list including at least one network address, the authorization list being associated with at least one network resource;
receiving a request to access the at least one network resource, where the request includes a source network address; and
controlling access to the at least one network resource based on the authorization list and the source network address. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. An apparatus comprising:
a server configured to;
pre-authorize at least one network address to connect to the server;
receive a request, from a client device having a source address, to connect to the server;
determine whether the source address has been pre-authorized to connect to the server; and
selectively grant the request based on the determination of whether the source address has been pre-authorized. - View Dependent Claims (25, 26, 27, 28, 29)
-
30. A system comprising:
-
means for receiving, from a client device having a dynamically assigned source network address from a range of network addresses, a request for connection to a network resource;
means for selectively authenticating the source network address, where the source network address is compared to a list of authorized network addresses; and
means for connecting an authenticated source network address to the network resource.
-
Specification