×

Authentication system and method

DC
  • US 9,584,499 B2
  • Filed: 04/23/2014
  • Issued: 02/28/2017
  • Est. Priority Date: 10/23/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method for authorizing transaction specific access to a secured resource having a secured resource identity, said method comprising the steps of:

  • receiving at a messaging gateway having a first set of instructions embodied in a computer readable medium, said first set of instructions operable to receive a request for transaction specific access to a secured resource by a service client;

    determining a key string with a server in communication with said messaging gateway, said server having a second set of instructions embodied in a computer readable medium operable to determine said key string known to both said server and an authorized user of said secured resource, said key string being associated with the secured resource identity within a key string table accessible by the server and providing a basis for authenticating the secured resource identity by searching the key string table for the key string;

    determining transaction specific information with the server in communication with the messaging gateway, said server having a third set of instructions embodied in a computer readable medium operable to identify transaction specific information within the request;

    determining an authentication credential with the server in communication with said messaging gateway, the server having a fourth set of instructions operable to identify within the request an authentication credential uniquely associated with said transaction specific information and said key string, said authentication credential having been provided by the authorized user;

    evaluating said authentication credential by the server, the server having a fifth set of instructions operable to compare the key string and the transaction specific information with the authentication credential to verify that the transaction specific access to the secured resource by the service client is authorized by the authorized user; and

    wherein the key string and authentication credential do not reveal any primary identifier associated with said secured resource.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×