USER-CENTRIC AUTHENTICATION SYSTEM AND METHOD
First Claim
1. An authentication system for authenticating a user in a network, the authentication system comprising:
- a secure computer resource;
an authentication computing system providing dynamic authentication of a user accessing the computer resource; and
a user communication device for communicating between the user and the computer resource;
wherein the computing system presents a challenge for which a specified response is required based upon a pre-determined function;
whereby access is granted by the computing system upon providing the correct response to the presented challenge by the user.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for authenticating a user in a network. The authentication system includes a computer resource having secure data, an authentication computing system providing dynamic authentication of a user accessing the computer resource, and a user communication device for communicating between the user and the computer resource. The computing system presents a challenge for which a specified response is required based upon a pre-determined function. Access is then granted by the computing system upon providing the correct response to the presented challenge by the user.
-
Citations
25 Claims
-
1. An authentication system for authenticating a user in a network, the authentication system comprising:
-
a secure computer resource; an authentication computing system providing dynamic authentication of a user accessing the computer resource; and a user communication device for communicating between the user and the computer resource; wherein the computing system presents a challenge for which a specified response is required based upon a pre-determined function; whereby access is granted by the computing system upon providing the correct response to the presented challenge by the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method of authentication a user in a network, the method comprising the steps of:
-
securing data in a computer resource; dynamically authenticating a user accessing the computer resource, wherein the user is presented a challenge for which a specified response is required based upon a pre-determined function; and upon providing the correct response to the presented challenge by the user, granting access to the computer resource. - View Dependent Claims (21, 22)
-
-
23. An authentication computing system for authenticating a user in a network, the authentication computing system comprising:
-
means for dynamically authenticating a user accessing a computer resource; and means for presenting a challenge for which a specified response is required based upon a pre-determined function; whereby access is granted by the computing system upon providing the correct response to the presented challenge by the user. - View Dependent Claims (24, 25)
-
Specification