Authentication System and Method
First Claim
1. A method for authenticating the identity of a requester of access to a secured resource, said method for authenticating comprising the steps of:
- receiving at a messaging gateway having a first set of instructions embodied in a computer readable medium, said first set of instructions operable to receive from a requester purporting to be an authorized user of a secured resource, a request for access by an unauthorized service client to a secured resource from a requester purporting to be an authorized user of said secured resource;
determining a key string with a server in secure communication with said messaging gateway, said server having a second set of instructions embodied in a computer readable medium operable to determine a key string known to both said secured resource and the authorized user said requestor purports to be, said key string being adapted to provide a basis for authenticating the identity of said requester;
a service user interface in communication with said server, said service user interface having a third set of instructions embodied in a computer readable medium operable to receive input from said unauthorized service client;
wherein said second set of instructions is further operable to receive from said unauthorized service client an authentication credential associated with said request for access, said authentication credential having been provided to said unauthorized service client by said requestor; and
wherein said second set of instructions is further operable for evaluating said authentication credential to authenticate the identity of said requester.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method whereby the identity of a person, entity, device or the like attempting to gain access to a secured resource may be securely authenticated includes a means for receiving from a requester purporting to be an authorized user of a secured resource a request for access to the secured resource; means for generating and communicating to the purported authorized user a challenge string adapted to provide a basis for authenticating the identity of the requester; a means for receiving a response string corresponding to the challenge string; and a means for evaluating the response sting to authenticate the identity of the requestor.
-
Citations
3 Claims
-
1. A method for authenticating the identity of a requester of access to a secured resource, said method for authenticating comprising the steps of:
-
receiving at a messaging gateway having a first set of instructions embodied in a computer readable medium, said first set of instructions operable to receive from a requester purporting to be an authorized user of a secured resource, a request for access by an unauthorized service client to a secured resource from a requester purporting to be an authorized user of said secured resource; determining a key string with a server in secure communication with said messaging gateway, said server having a second set of instructions embodied in a computer readable medium operable to determine a key string known to both said secured resource and the authorized user said requestor purports to be, said key string being adapted to provide a basis for authenticating the identity of said requester; a service user interface in communication with said server, said service user interface having a third set of instructions embodied in a computer readable medium operable to receive input from said unauthorized service client; wherein said second set of instructions is further operable to receive from said unauthorized service client an authentication credential associated with said request for access, said authentication credential having been provided to said unauthorized service client by said requestor; and wherein said second set of instructions is further operable for evaluating said authentication credential to authenticate the identity of said requester.
-
-
2. A method for authenticating the identity of a requester of access to a secured resource, said method for authenticating comprising the steps of:
-
receiving at a messaging gateway having a first set of instructions embodied in a computer readable medium, said first set of instructions operable to receive from a requester purporting to be an authorized user of a secured resource, a request for access by an unauthorized service client to a secured resource from a requester purporting to be an authorized user of said secured resource; generating a key string with a server in secure communication with said messaging gateway, said server having a second set of instructions embodied in a computer readable medium operable to generate a key string adapted to provide a basis for authenticating the identity of said requester; a service user interface in communication with said server, said service user interface having a third set of instructions embodied in a computer readable medium operable to receive input from said unauthorized service client; wherein said first set of instructions is further operable to communicate said key string to said authorized user that said requester purports to be; wherein said second set of instructions is further operable to receive an authentication credential from said unauthorized service client, said authentication credential having been provided to said unauthorized service client by said requestor; and wherein said second set of instructions is further operable to evaluate said authentication credential to authenticate the identity of said requester.
-
-
3. A method for authenticating the identity of a requester of access to a secured resource, said method for authenticating comprising the steps of:
-
receiving from a requester purporting to be an authorized user of a secured resource a request for access to said secured resource, said authorized user having a private string; generating a challenge message with a computer server, said challenge message having a challenge string, said challenge string being a random string having a plurality of randomly selected symbols and at least one null character, said null character being a specially designated symbol intended to indicate the absence from said challenge string of a single symbol; communicating said challenge message through a discrete channel to said authorized user that said requester purports to be; receiving a response message corresponding to said challenge message, said response message having a response string; and evaluating said response string against a key string based on said challenge string and said private string.
-
Specification