Authentication of Service Requests
First Claim
1. A computerized method for authenticating user service requests, comprising:
- transmitting, from a server, data that causes transmission of a service request to the server;
receiving, at the server, data representing the service request and data representing a sender of the service request;
comparing, by the server, (a) the data representing the service request, the data representing the sender of the service request, or both, against (b) pre-defined criteria associated with the data that causes transmission of the service request; and
processing, by the server, the service request from the sender if the comparison authenticates the service request.
1 Assignment
0 Petitions
Accused Products
Abstract
Described are computer-based methods and apparatuses, including computer program products, for authentication of service requests. Data is transmitted that causes transmission of a service request to the server when actuated. Data representing the service request and data representing a sender of the service request is received. The (a) data representing the service request, data representing the sender of the service request, or both, is compared against (b) pre-defined criteria associated with the data that causes transmission of the service request. The service request from the sender is processed if the comparison authenticates the service request.
63 Citations
2 Claims
-
1. A computerized method for authenticating user service requests, comprising:
-
transmitting, from a server, data that causes transmission of a service request to the server; receiving, at the server, data representing the service request and data representing a sender of the service request; comparing, by the server, (a) the data representing the service request, the data representing the sender of the service request, or both, against (b) pre-defined criteria associated with the data that causes transmission of the service request; and processing, by the server, the service request from the sender if the comparison authenticates the service request. - View Dependent Claims (2)
-
Specification