×

System and method for authenticating the legitimacy of a request for a resource by a user

  • US 9,853,964 B2
  • Filed: 11/27/2012
  • Issued: 12/26/2017
  • Est. Priority Date: 11/27/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method of authenticating the legitimacy of a request for a resource by a user, the method being executable in an electronic communication system after the following predetermined steps have occurred:

  • a structured user message having been created, said structured user message including a resource identifier to identify the resource, a user identifier to identify the user that is requesting the resource and a digital signature having been created using a signing key held by the user;

    a user verified message having been created in part by encrypting the structured user message, said user verified message at least partially comprising a verification string derived from at least part of the structured user message,a user request message having been assembled, said user request message including the user verified message, and the resource identifier to identify the resource being requested of the resource provider,the user request message having been sent to a resource provider,a process having been run by the resource provider receiving the user request message to create a resource provider message by at least adding a resource identifier to the user request message,said method including the steps of;

    receiving and de-assembling the resource provider message,confirming the integrity of the user request message by checking the verification string accords with a well-formed structured user message,decrypting the user verified message to yield the structured user message and verifying the digital signature of the structured user message,creating a result indicator as to the legitimacy of the resource provider message by performing two or more authenticity checks, including a first authenticity check that the resource identifier in the structured user message is equal or equivalent to the identified resource in the resource provider message, and a second authenticity check that the user identifier in the structured user message is correlated with a known and valid user,andsending an authentication result including said result indicator.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×