Authentication system and related method
DCFirst Claim
1. An authentication system for authenticating the identity of a requester of access by an unauthorized service client to a secured resource, said authentication system comprising:
- a messaging gateway having a first set of instructions embodied in a computer readable medium, said first set of instructions operable to receive from a requester purporting to be an authorized user of a secured resource a request for access by an unauthorized service client to said secured resource;
a server in secure communication with said messaging gateway, said server having a second set of instructions embodied in a computer readable medium operable to generate a key string adapted to provide a basis for authenticating the identity of said requester;
a service user interface in communication with said server, said service user interface having a third set of instructions embodied in a computer readable medium operable to receive input from said unauthorized service client;
wherein said first set of instructions is further operable to communicate said key string to said authorized user that said requester purports to be;
wherein said second set of instructions is further operable to receive an authentication credential from said unauthorized service client, said authentication credential having been provided to said unauthorized service client by said requester; and
wherein said second set of instructions is further operable to evaluate said authentication credential to authenticate the identity of said requester.
3 Assignments
Litigations
0 Petitions
Accused Products
Abstract
A system and method whereby the identity of a person, entity, device or the like attempting to gain access to a secured resource may be securely authenticated includes a means for receiving from a requester purporting to be an authorized user of a secured resource a request for access by an unauthorized user (such as, for example, a retail store, a service station, an on-line service provider or merchandiser, a healthcare provider, a medical insurer, an information consumer or the like) to the secured resource; a means for generating and communicating to the purported authorized user a key string adapted to provide a basis for authenticating the identity of the requester; a means for receiving an authentication credential associated with the request for access; and a means for evaluating the authentication credential to authenticate the identity of the requester.
28 Citations
20 Claims
-
1. An authentication system for authenticating the identity of a requester of access by an unauthorized service client to a secured resource, said authentication system comprising:
-
a messaging gateway having a first set of instructions embodied in a computer readable medium, said first set of instructions operable to receive from a requester purporting to be an authorized user of a secured resource a request for access by an unauthorized service client to said secured resource; a server in secure communication with said messaging gateway, said server having a second set of instructions embodied in a computer readable medium operable to generate a key string adapted to provide a basis for authenticating the identity of said requester; a service user interface in communication with said server, said service user interface having a third set of instructions embodied in a computer readable medium operable to receive input from said unauthorized service client; wherein said first set of instructions is further operable to communicate said key string to said authorized user that said requester purports to be; wherein said second set of instructions is further operable to receive an authentication credential from said unauthorized service client, said authentication credential having been provided to said unauthorized service client by said requester; and wherein said second set of instructions is further operable to evaluate said authentication credential to authenticate the identity of said requester. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for authenticating the identity of a requester of access to a secured resource, said method for authenticating comprising the steps of:
-
receiving at a messaging gateway having a first set of instructions embodied in a computer readable medium, said first set of instructions operable to receive from a requester purporting to be an authorized user of a secured resource, a request for access by an unauthorized service client to a secured resource from a requester purporting to be an authorized user of said secured resource; generating a key string with a server in secure communication with said messaging gateway, said server having a second set of instructions embodied in a computer readable medium operable to generate a key string adapted to provide a basis for authenticating the identity of said requester; a service user interface in communication with said server, said service user interface having a third set of instructions embodied in a computer readable medium operable to receive input from said unauthorized service client; wherein said first set of instructions is further operable to communicate said key string to said authorized user that said requester purports to be; wherein said second set of instructions is further operable to receive an authentication credential from said unauthorized service client, said authentication credential having been provided to said unauthorized service client by said requester; and wherein said second set of instructions is further operable to evaluate said authentication credential to authenticate the identity of said requester. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification