Solicited authentication of a specific user
First Claim
1. A method for authenticating a first user for a data transmission transaction over a server system between the first user and a second user wherein the second user has identified the first user, the method comprising:
- a server receiving authentication information from the second user;
the server prompting the first user to submit the authentication information;
the server receiving response information from the first user responsive to the prompting;
the server comparing the response information to the authentication information; and
the server authenticating the first user upon a condition in which the response information is equivalent to the authentication information.
2 Assignments
0 Petitions
Accused Products
Abstract
Secure web-based messaging according to a “push” paradigm is augmented by specific, intended recipient authentication. In particular, a document can be sent to a specified, intended recipient through the Web using e-mail recipient notification, and the recipient is authenticated prior to delivering the document to the recipient. Such authentication prevents a cracker from snooping a delivery notification e-mail message and retrieving the document prior to retrieval by the true intended recipient. In addition, such authentication of the recipient is driven by the sender such that prior participation by the recipient in the messaging system according to the present invention is required.
-
Citations
20 Claims
-
1. A method for authenticating a first user for a data transmission transaction over a server system between the first user and a second user wherein the second user has identified the first user, the method comprising:
-
a server receiving authentication information from the second user;
the server prompting the first user to submit the authentication information;
the server receiving response information from the first user responsive to the prompting;
the server comparing the response information to the authentication information; and
the server authenticating the first user upon a condition in which the response information is equivalent to the authentication information. - View Dependent Claims (2, 3, 4)
presenting to the first user prompt information which is received from the second user.
-
-
3. The method of claim 1 further comprising:
-
in a session with the first user, receiving user account information from the first user;
sending identification data which identifies the first user as identified by the second user and the user account information to an information server;
and receiving verification data from the information server which indicates whether the information server'"'"'s associated identification data for the user account information is the same as the identification data which identifies the first user as identified by the second user.
-
-
4. The method of claim 3 further comprising:
authenticating the first user when the identification data associated with the account information is the same as the identification data which identifies the first user as identified by the second user.
-
5. A method for a server authenticating a first user for a data transaction between the first user and a second user wherein the second user has identified the first user, the method comprising:
-
the server sending a message to the first user as identified by the second user;
in a session with the first user in response to the message, the server receiving user account information from the first user;
the server generating transaction data associated with the first user, the transaction data including security data for allowing the first user to proceed with said data transaction between the first user and a second user; and
the server sending a second message to the first user as identified by the second user wherein the second message includes said transaction data which is necessary for proceeding with the data transaction. - View Dependent Claims (6, 7, 8, 9, 10)
receiving the transaction data from the first user; and
proceeding with the data transaction in response to the transaction data.
-
-
11. A method for a data delivery server authenticating a first user for a data transaction between the first user and a second user wherein the second user has identified the first user, the method comprising:
-
a server sending a message to the first user as identified by the second user;
the server in a session with the first user in response to the message, receiving user account information from the first user;
the server sending identification data which identifies the first user as identified by the second user and the user account information to an information server; and
the server receiving verification data from the information server which indicates whether the information server'"'"'s associated identification data for the user account information is the same as the identification data which identifies the first user as identified by the second user. - View Dependent Claims (12)
authenticating the first user when the identification data associated with the account information is the same as the identification data which identifies the first user as identified by the second user.
-
-
13. A computer system comprising:
-
a processor;
a memory operatively coupled to the processor; and
an authentication module (i) which executes in the processor from the memory and (ii) which, when executed by the processor, causes the computer to authenticate a first user for a data transaction between the first user and a second user wherein the second user has identified the first user by;
the authentication module sending a message to the first user as identified by the second user;
in a session with the first user in response to the message, the authentication module receiving user account information from the first user; and
the authentication module sending a second message to the first user as identified by the second user wherein the second message includes transaction data which is necessary for proceeding with the data transaction. - View Dependent Claims (14, 15, 16, 17, 18)
receiving the transaction data from the first user; and
proceeding with the data transaction in response to the transaction data.
-
-
19. A computer system comprising:
-
a processor;
a memory operatively coupled to the processor; and
an authentication module (i) which executes in the processor from the memory and (ii) which, when executed by the processor, causes the computer to authenticate a first user for a data transaction between the first user and a second user wherein the second user has identified the first user by;
the authentication module sending a message to the first user as identified by the second user;
in a session with the first user in response to the message, the authentication module receiving user account information from the first user, said user account information providing secure data which is associated with a user identifier by an information server;
the authentication module sending identification data which identifies the first user as identified by the second user and the user account information to the information server; and
the authentication module receiving verification data from the information server which indicates whether the information server'"'"'s associated identification data for the user account information is the same as the identification data which identifies the first user as identified by the second user. - View Dependent Claims (20)
authenticating the first user when the identification data associated with the account information is the same as the identification data which identifies the first user as identified by the second user.
-
Specification