SYSTEMS AND METHODS FOR AUTHENTICATING AN ELECTRONIC TRANSACTION
First Claim
1. A method for authenticating an electronic request between a client computer and a transaction server, the method comprising:
- (A) receiving, at a suitably programmed application server, an electronic application request for an application from the client computer, wherein the electronic request comprises an identity of a user originating the electronic request;
(B) constructing, using the suitably programmed application server and responsive to the receiving (A), a signing key as a first function of a first plurality of parameters, wherein the plurality of parameters comprises (i) an identity of a user originating the electronic request for the application, (ii) a first time based salt value, and (iii) a secret that is shared between the suitably programmed application server and the transaction server; and
(C) embedding the signing key in an unbranded version of the application thereby forming a branded version of the application, wherein the branded version of the application is configured to (i) sign a request with the signing key thereby forming a signed request, and (ii) submit the signed request to the transaction server with the identity of the user and the identifier that identifies the distributor or developer of the application.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for authenticating a request between a client computer and a transaction server are provided. An application request, comprising an identity of a user originating the request, is received at an application server from the client. The application server constructs a signing key based on (i) the identity of the user making the request, (ii) a time based salt value, (iii) a secret shared between the application and transaction servers and, optionally, (iv) an identifier of the distributor or developer of the application. The signing key is embedded in an unbranded version of the application thereby branding the application. The branded application can sign a request with the signing key and submit the signed request to the transaction server with the identity of the user and the identifier of the distributor or developer of the application.
231 Citations
27 Claims
-
1. A method for authenticating an electronic request between a client computer and a transaction server, the method comprising:
-
(A) receiving, at a suitably programmed application server, an electronic application request for an application from the client computer, wherein the electronic request comprises an identity of a user originating the electronic request; (B) constructing, using the suitably programmed application server and responsive to the receiving (A), a signing key as a first function of a first plurality of parameters, wherein the plurality of parameters comprises (i) an identity of a user originating the electronic request for the application, (ii) a first time based salt value, and (iii) a secret that is shared between the suitably programmed application server and the transaction server; and (C) embedding the signing key in an unbranded version of the application thereby forming a branded version of the application, wherein the branded version of the application is configured to (i) sign a request with the signing key thereby forming a signed request, and (ii) submit the signed request to the transaction server with the identity of the user and the identifier that identifies the distributor or developer of the application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A computer program product for use in conjunction with a computer system, the computer program product comprising a computer readable storage medium and a computer program mechanism embedded therein, the computer program mechanism for authenticating an electronic request between a client computer and a transaction server, the computer program mechanism comprising computer executable instructions for:
-
(A) receiving, at a suitably programmed application server, an electronic application request for an application from the client computer, wherein the electronic request comprises an identity of a user originating the electronic request; (B) constructing, using the suitably programmed application server and responsive to the receiving (A), a signing key as a function of a plurality of parameters, wherein the plurality of parameters comprises (i) an identity of a user originating the electronic request for the application, (ii) a first time based salt value, and (iii) a secret that is shared between the suitably programmed application server and the transaction server; and (C1) embedding the signing key in an unbranded version of the application thereby forming a branded version of the application, wherein the branded version of the application is configured to (i) sign a request with the signing key thereby forming a signed request, and (ii) submit the signed request to the transaction server with the identity of the user and the identifier that identifies the distributor or developer of the application or (C2) delivering the signing key to the client computer - View Dependent Claims (25)
-
-
26. A system comprising:
-
(A) means for receiving, at a suitably programmed application server, an electronic application request for an application from the client computer, wherein the electronic request comprises an identity of a user originating the electronic request; (B) means for constructing, using the suitably programmed application server and responsive to the receiving (A), a signing key as a function of a plurality of parameters, wherein the plurality of parameters comprises (i) an identity of a user originating the electronic request for the application, (ii) a first time based salt value, and (iii) a secret that is shared between the suitably programmed application server and the transaction server; and (C1) means for embedding the signing key in an unbranded version of the application thereby forming a branded version of the application, wherein the branded version of the application is configured to (i) sign a request with the signing key thereby forming a signed request, and (ii) submit the signed request to the transaction server with the identity of the user and the identifier that identifies the distributor or developer of the application or (C2) means for delivering the signing key to the client computer. - View Dependent Claims (27)
-
Specification