×

Application authentication system and method

  • US 8,713,705 B2
  • Filed: 02/26/2010
  • Issued: 04/29/2014
  • Est. Priority Date: 08/03/2009
  • Status: Active Grant
First Claim
Patent Images

1. A method for validating executable program code operating on at least one computing device, the method comprising:

  • executing first program instructions on a first computing device, wherein the first program instructions include a request for access to at least one sensitive resource pertaining to a second computing device;

    transmitting from the first computing device to the second computing device an authentication request for access to the at least one sensitive resource pertaining to the second computing device;

    generating, in real-time, by the second computing device, in response to the authentication request required for access to the at least one sensitive resource and received from the first computing device, an authentication challenge comprising a non-predetermined set of instructions performing an operation in response to the authentication request;

    executing, by the second computing device, the authentication challenge, and generating an expected authentication response of the second computing device from said execution by the second computing device;

    transmitting the authentication challenge from the second computing device to the first computing device;

    executing, by the first computing device, the authentication challenge, and generating a pre-validated authentication response from said execution by the first computing device;

    receiving from the first computing device by the second computing device the pre-validated authentication challenge;

    performing validation by determining whether the pre-validated authentication response is a validated authentication response by comparing the pre-validated authentication response to the expected authentication response; and

    granting the first computing device access to the at least one sensitive resource pertaining to the second computing device if the pre-validated authentication response is determined to be a validated authentication response.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×