Authentication system and related method
DCFirst Claim
1. An authentication system for authenticating the identity of a requester of access by an unauthorized service client to a secured resource, said authentication system comprising:
- a messaging gateway having a first set of instructions embodied in a computer readable medium, said first set of instructions operable to receive from a requester purporting to be an authorized user of a secured resource a request for access by an unauthorized service client to said secured resource;
a server in secure communication with said messaging gateway, said server having a second set of instructions embodied in a computer readable medium operable to determine a key string known to both said secured resource and the authorized user said requestor purports to be, said key string being adapted to provide a basis for authenticating the identity of said requester;
a service user interface in communication with said server, said service user interface having a third set of instructions embodied in a computer readable medium operable to receive input from said unauthorized service client;
wherein said second set of instructions is further operable to receive an authentication credential from said unauthorized service client associated with said request for access, said authentication credential having been provided to said unauthorized service client by said requestor; and
wherein said second set of instructions is further operable to evaluate said authentication credential to authenticate the identity of said requester.
3 Assignments
Litigations
1 Petition
Accused Products
Abstract
A system and method whereby the identity of a person, entity, device or the like attempting to gain access to a secured resource may be securely authenticated includes a means for receiving from a requester purporting to be an authorized user of a secured resource a request for access by an unauthorized user (such as, for example, a retail store, a service station, an on-line service provider or merchandiser, a healthcare provider, a medical insurer, an information consumer or the like) to the secured resource; a means for determining a key string adapted to provide a basis for authenticating the identity of the requester; a means for receiving an authentication credential associated with the request for access; and a means for evaluating the authentication credential to authenticate the identity of the requester.
28 Citations
20 Claims
-
1. An authentication system for authenticating the identity of a requester of access by an unauthorized service client to a secured resource, said authentication system comprising:
-
a messaging gateway having a first set of instructions embodied in a computer readable medium, said first set of instructions operable to receive from a requester purporting to be an authorized user of a secured resource a request for access by an unauthorized service client to said secured resource; a server in secure communication with said messaging gateway, said server having a second set of instructions embodied in a computer readable medium operable to determine a key string known to both said secured resource and the authorized user said requestor purports to be, said key string being adapted to provide a basis for authenticating the identity of said requester; a service user interface in communication with said server, said service user interface having a third set of instructions embodied in a computer readable medium operable to receive input from said unauthorized service client; wherein said second set of instructions is further operable to receive an authentication credential from said unauthorized service client associated with said request for access, said authentication credential having been provided to said unauthorized service client by said requestor; and wherein said second set of instructions is further operable to evaluate said authentication credential to authenticate the identity of said requester. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for authenticating the identity of a requester of access to a secured resource, said method for authenticating comprising the steps of:
-
receiving at a messaging gateway having a first set of instructions embodied in a computer readable medium, said first set of instructions operable to receive from a requester purporting to be an authorized user of a secured resource, a request for access by an unauthorized service client to a secured resource from a requester purporting to be an authorized user of said secured resource; determining a key string with a server in secure communication with said messaging gateway, said server having a second set of instructions embodied in a computer readable medium operable to determine a key string known to both said secured resource and the authorized user said requestor purports to be, said key string being adapted to provide a basis for authenticating the identity of said requester; a service user interface in communication with said server, said service user interface having a third set of instructions embodied in a computer readable medium operable to receive input from said unauthorized service client; wherein said second set of instructions is further operable to receive from said unauthorized service client an authentication credential associated with said request for access, said authentication credential having been provided to said unauthorized service client by said requestor; and wherein said second set of instructions is further operable for evaluating said authentication credential to authenticate the identity of said requester. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification