METHOD AND SYSTEM FOR MANAGING ACCESS TO PROTECTED COMPUTER RESOURCES PROVIDED VIA AN INTERNET PROTOCOL NETWORK
First Claim
1. A system for securing transactions between at least one client computer device and at least one server via an Internet Protocol network, wherein said transactions are authorized by at least one clearinghouse based upon authentication of identity data associated with said at least one client computer device, said system comprising:
- said at least one clearinghouse having an associated database to store said identity data;
at least one access key associated with said at least one client computer device, said identity data being derived from said at least one access key;
said at least one server adapted to receive at least a portion of said identity data from said at least one client computer device;
said at least one server adapted to forward to said at least one clearinghouse, said at least a portion of said identity data received from said at least one client computer device;
said at least one clearinghouse adapted to authenticate said at least a portion of said identity data responsive to a request by said at least one server, said authentication being based upon said identity data stored in said database; and
said at least one clearinghouse adapted to authorize said transactions based on an outcome of said authentication.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and system for controlling access, by an authentication server, to protected computer resources provided via an Internet Protocol network that includes storing (i) a digital identification associated with at least one client computer device, and (ii) data associated with the protected computer resources in at least one database associated with the authentication server; authenticating, by the authentication server, the digital identification forwarded by at least one access server; authorizing, by the authentication server, the at least one client computer device to receive at least a portion of the protected computer resources requested by the at least one client computer device, based on the stored data associated with the requested protected computer resources; and permitting access, by the authentication server, to the at least the portion of the protected computer resources upon successfully authenticating the digital identification and upon successfully authorizing the at least once client computer device.
-
Citations
20 Claims
-
1. A system for securing transactions between at least one client computer device and at least one server via an Internet Protocol network, wherein said transactions are authorized by at least one clearinghouse based upon authentication of identity data associated with said at least one client computer device, said system comprising:
-
said at least one clearinghouse having an associated database to store said identity data; at least one access key associated with said at least one client computer device, said identity data being derived from said at least one access key; said at least one server adapted to receive at least a portion of said identity data from said at least one client computer device; said at least one server adapted to forward to said at least one clearinghouse, said at least a portion of said identity data received from said at least one client computer device; said at least one clearinghouse adapted to authenticate said at least a portion of said identity data responsive to a request by said at least one server, said authentication being based upon said identity data stored in said database; and said at least one clearinghouse adapted to authorize said transactions based on an outcome of said authentication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of securing a transaction between at least one client computer device and at least one server via an Internet Protocol network, the method comprising:
-
storing, by at least one clearinghouse, identity data associated with the at least one client computer device; deriving the identity data from an access key associated with the at least one client computer device; receiving, at the at least one server, the identity data from the at least one client computer device; transmitting, by the at least one server to the at least one clearinghouse, a request for authorization of the transaction, the request including at least a portion of the identity data received from the at least one client computer device; receiving, by the at least one clearinghouse, the request from the at least one server for authorization of the transaction; authenticating, by the at least one clearinghouse, the at least a portion of the identity data transmitted by the at least one server; and authorizing, by the at least one clearinghouse, the transaction based upon an outcome of the authentication. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification