ABDS System Utilizing Security Information in Authenticating Entity Access
First Claim
1. A system for authenticating a requesting entity for access to a controlled resource by communicating electronically over a communications medium to an access authentication component for the controlled resource, comprising,
8 Assignments
0 Petitions
Accused Products
Abstract
AA system in which a requesting entity seeking access to a controlled resource is authenticated by an access authentication component includes the requesting entity initially opening a security account with the access authentication component, the access authentication component establishing and maintaining a record including information pertaining to the account and being retrievable based on a unique identifier for the requesting entity, and associating a public key of a public-private key pair with the record; the requesting entity originating an electronic message and generating a digital signature using a private key of the key pair, and sending the digitally signed electronic message to the access authentication component with the unique identifier; authenticating the electronic message using the public key associated with the record identified by the unique identifier; and upon successful authentication, authenticating access to the controlled resource. Security information is considered in authenticating the requesting entity
127 Citations
18 Claims
- 1. A system for authenticating a requesting entity for access to a controlled resource by communicating electronically over a communications medium to an access authentication component for the controlled resource, comprising,
- 8. A system for authenticating a requesting entity for continuing access to a controlled resource by communicating electronically over a communications medium to an access authentication component for the controlled resource, the requesting entity having a device with a security profile associated therewith and including a public-private key pair in the device, the access authentication component having evaluated the security profile status and authenticated access to the controlled resource for the requesting entity, the access authentication component maintaining business rules and now requesting in accordance with one of the rules that the security profile be reconfirmed by the requesting entity, comprising,
- 13. A system for initially authenticating a requesting entity for access to a controlled resource by communicating electronically over a communications medium to an access authentication component for the controlled resource, comprising,
-
16. A system for authenticating a requesting entity for access to a controlled resource by communicating electronically over a communications medium to an access authentication component for the controlled resource, comprising,
-
17. A system for authenticating a requesting entity for continuing access to a controlled resource by communicating electronically over a communications medium to an access authentication component for the controlled resource, the requesting entity having a device with a security profile associated therewith and including a public-private key pair in the device, storing the security profile in a secure database, the access authentication component having evaluated the security profile and authenticated access to a session in an account in the controlled resource for the requesting entity, the access authentication component maintaining business rules and now requesting in accordance with one of the rules that the security profile be reconfirmed by the requesting entity to continue the session with the account, comprising,
-
18. A system for initially authenticating a requesting entity for access to a controlled resource by communicating electronically over a communications medium to an access authentication component for the controlled resource, comprising,
Specification