A system and method for authenticating the legitimacy of a request for a resource by a user
First Claim
Patent Images
1. A method of authenticating the legitimacy of a request for a resource by a user, the method being executable in an electronic communication system after the following predetermined steps have occurred:
- a structured user message having been created, said structured user message including a resource identifier to identify the resource, and a user identifier to identify the user that is requesting the resource;
a user verified message having been created, said user verified message at least partially comprising a verification string derived from at least part of the structured user message,a user request message having been assembled, said user request message including the user verified message, and the resource identifier to identify the resource being requested of the resource provider,the user request message having been sent to a resource provider,a process having been run by the resource provider receiving the user request message to create a resource provider message that includes a resource provider identification and the user request message,said method including the steps of;
receiving and de-assembling the resource provider message,confirming the integrity of the user request message by checking the verification string accords with a well-formed structured user message,creating a result indicator as to the legitimacy of the resource provider message by performing two or more authenticity checks, including a first authenticity check that the resource identifier in the structured user message is equal or equivalent to the identified resource in the resource provider message, and a second authenticity check that the user identifier in the structured user message is correlated with a known and valid user, andsending an authentication result including said result indicator.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of authenticating the legitimacy of a request for a resource from a resource provider by a user, including providing an authentication process in which a resource provider message is received and de-assembled, the integrity of the user request message is confirmed, a result indicator as to the legitimacy of the resource provider message is created by performing two or more authenticity checks, and an authentication result is sent.
33 Citations
23 Claims
-
1. A method of authenticating the legitimacy of a request for a resource by a user, the method being executable in an electronic communication system after the following predetermined steps have occurred:
-
a structured user message having been created, said structured user message including a resource identifier to identify the resource, and a user identifier to identify the user that is requesting the resource; a user verified message having been created, said user verified message at least partially comprising a verification string derived from at least part of the structured user message, a user request message having been assembled, said user request message including the user verified message, and the resource identifier to identify the resource being requested of the resource provider, the user request message having been sent to a resource provider, a process having been run by the resource provider receiving the user request message to create a resource provider message that includes a resource provider identification and the user request message, said method including the steps of; receiving and de-assembling the resource provider message, confirming the integrity of the user request message by checking the verification string accords with a well-formed structured user message, creating a result indicator as to the legitimacy of the resource provider message by performing two or more authenticity checks, including a first authenticity check that the resource identifier in the structured user message is equal or equivalent to the identified resource in the resource provider message, and a second authenticity check that the user identifier in the structured user message is correlated with a known and valid user, and sending an authentication result including said result indicator. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 23)
-
-
12. An authentication server operably coupled to an electronic communications network,
said authentication server forming part of an authentication system for authenticating the legitimacy of a request for a resource by a user, said authentication system including one or more resource provider servers, arranged to receive a user request message from a user, said user request message comprising a user verified message and a resource identifier that identifies the resource being requested, and said one or more resource servers operable to create and forward a resource provider message including a resource provider identifier, the resource identifier and said user verified message, said user verified message comprising a structured user message including a user identifier and said resource identifier, said user verified message at least partially composed of a verification string derived from at least part the structured user message, said authentication server having a verification module, operable to receive said resource provider message as an input, and said verification module, arranged to confirm said verification string accords with a well-formed structured user message according to a predetermined criteria, said authentication server having a first authenticity module arranged to determine whether the resource identifier in the structured user message is equal or equivalent to the identified resource in the resource provider message, said authentication server having a second authenticity module to determine whether the user identifier in the structured user message is a valid user identifier, said authentication server having an authenticity determinator to generate an authentication result including a result indicator as to the legitimacy of the resource provider message based on the result of said verification module and one more authenticity modules, and said authentication server having a communications means to receive a resource provider message, and return an authentication result determined by said authenticity determinator.
Specification