AUTHENTICATION METHOD
First Claim
1. A method for authenticating the identity of a requester of access to a secured resource, said method for authenticating comprising the steps of:
- receiving from a requester purporting to be an authorized user of a secured resource a request for access to said secured resource;
generating a challenge string, said challenge string being adapted to provide a basis for authenticating the identity of said requester;
communicating said challenge string through a discrete channel to said authorized user that said requester purports to be;
receiving a response string corresponding to said challenge string; and
evaluating said response string to authenticate the identity of said requester.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method whereby the identity of a person, entity, device or the like attempting to gain access to a secured resource may be securely authenticated includes a means for receiving from a requester purporting to be an authorized user of a secured resource a request for access to the secured resource; means for generating and communicating to the purported authorized user a challenge string adapted to provide a basis for authenticating the identity of the requester; a means for receiving a response string corresponding to the challenge string; and a means for evaluating the response string to authenticate the identity of the requester.
17 Citations
4 Claims
-
1. A method for authenticating the identity of a requester of access to a secured resource, said method for authenticating comprising the steps of:
-
receiving from a requester purporting to be an authorized user of a secured resource a request for access to said secured resource; generating a challenge string, said challenge string being adapted to provide a basis for authenticating the identity of said requester; communicating said challenge string through a discrete channel to said authorized user that said requester purports to be; receiving a response string corresponding to said challenge string; and evaluating said response string to authenticate the identity of said requester. - View Dependent Claims (2, 3, 4)
-
Specification