MULTI-FACTOR AUTHENTICATION AND COMPREHENSIVE LOGIN SYSTEM FOR CLIENT-SERVER NETWORKS
First Claim
1. A method for authenticating a user of a client computer making a request to a server computer providing access to a network resource, the method comprising:
- issuing a challenge in response to the request requiring authentication of the user identity through a reply from the client computer;
determining one or more items of context information related to at least one of the user, the request, and the client computer; and
determining a disposition of the request based on the reply and the one or more items of context information.
7 Assignments
0 Petitions
Accused Products
Abstract
Embodiments are directed to a system and method for authenticating a user of a client computer making a request to a server computer providing access to a network resource through an authentication platform that issues a challenge in response to the request requiring authentication of the user identity through a reply from the client computer, determining one or more items of context information related to at least one of the user, the request, and the client computer, and determining a disposition of the request based on the reply and the one or more items of context information. The reply includes a user password and may be provided by an authorizing client device coupled to the client computer over a wireless communications link.
886 Citations
50 Claims
-
1. A method for authenticating a user of a client computer making a request to a server computer providing access to a network resource, the method comprising:
-
issuing a challenge in response to the request requiring authentication of the user identity through a reply from the client computer; determining one or more items of context information related to at least one of the user, the request, and the client computer; and determining a disposition of the request based on the reply and the one or more items of context information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for processing a request from a client computer to access a target server over a network, the method comprising:
-
issuing a challenge requiring validation of a user identity in response to the request; receiving user credentials from an authorizing client coupled to the client computer; and comparing the received user credentials with stored user credentials to determine a disposition of the request. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A system for allowing a user to login to different websites using a global password, comprising:
-
an authentication server coupled to one or more target servers and a client computer over a network; a data store coupled to the authentication server storing a password allowing the client computer to access the one or more target computers; and an authorization component verifying an identify of a user of the client computer to allows access to the one or more target servers. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
-
25. A method of processing electronic mail (e-mail) messages transmitted among client and server computers in a network, comprising:
-
generating an assigned e-mail address for a user of a client computer that provides login credentials to an authentication server for access to at least one of the servers on the network; storing an assigned e-mail address associated with the user and a service of the at least one server in a database; and validating a source of an e-mail message sent to the assigned e-mail address for the user upon receipt of the e-mail message at an e-mail server on the network by checking source and service information against the database to determine whether or not the received e-mail message is from an appropriate sender for the service. - View Dependent Claims (26, 27, 28, 29, 30)
-
-
31. A system for authenticating a user of a client computer making a request to a target server computer providing access to a network resource, the system comprising:
-
a requesting client receiving the request from a user to access the target server; and an authorizing client coupled to the requesting client over a link, the authorizing client configured to exchange credential information with an authentication server storing proprietary information of the user to enable access to the target server. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
-
43. A method for authenticating a user of a requesting client computer making a request to a target server computer providing access to a network resource, the system comprising:
-
receiving an unlock code into an authorizing client coupled to the requesting client; pushing an authorization request from an authentication server to the authorizing client; receiving an acknowledgment request from the user through the authorizing client; and sending an access command to the target server from the authentication server. - View Dependent Claims (44, 45, 46, 47, 48, 49, 50)
-
Specification