SYSTEM AND METHOD FOR DELIVERING A CHALLENGE RESPONSE IN AN AUTHENTICATION PROTOCOL
First Claim
Patent Images
1. A method for authenticating a user comprising:
- receiving an access-request of a network protocol at a challenge-response server;
determining if an access-challenge message is required;
delivering an active script component through a parameter of an access-challenge message of the network protocol when an access-challenge is required;
receiving a challenge-response of a user;
validating the challenge-response; and
selectively sending an access-accept response for a valid challenge-response and sending an access-denied response for an invalid challenge-response.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method for authenticating a user that includes receiving an access-request of a network protocol at a challenge-response server; determining if an access-challenge message is required; delivering an active script component through a parameter of an access-challenge message of the network protocol when an access-challenge is required; receiving a challenge-response of a user; validating the challenge-response; and selectively sending an access-accept response for a valid challenge-response and sending an access-denied response for an invalid challenge-response.
-
Citations
20 Claims
-
1. A method for authenticating a user comprising:
-
receiving an access-request of a network protocol at a challenge-response server; determining if an access-challenge message is required; delivering an active script component through a parameter of an access-challenge message of the network protocol when an access-challenge is required; receiving a challenge-response of a user; validating the challenge-response; and selectively sending an access-accept response for a valid challenge-response and sending an access-denied response for an invalid challenge-response. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for authenticating a user comprising:
-
at a challenge response server, initiating an access-challenge message of a network protocol; configuring an active script component to update an authentication interface of a user device; embedding the active script component in a reply-message parameter of the access-challenge message; communicating the access-challenge message; receiving a challenge-response of a user; and validating the challenge-response. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A method for authenticating network access comprising:
-
receiving an access-request of a network protocol at a challenge response server; processing the access-request to verify credentials; the challenge response server selectively replying with an access-accepted message for verified credentials, an access-denied message if credentials are denied, and an access-challenge message if the credentials require a challenge to verify the credentials; configuring an active script component to transform an authentication interface of a user device; wherein replying with an access-challenge message includes embedding the active script component in a parameter of the access-challenge; receiving a challenge-response of a user; validating the challenge-response; and selectively sending an access-accept response for a valid challenge-response and sending an access-denied response for an invalid challenge-response. - View Dependent Claims (17, 18, 19, 20)
-
Specification