AUTHENTICATION SYSTEM AND RELATED METHOD
First Claim
1. An authentication system for authenticating the identity of a requester of access by an unauthorized user to a secured resource, said authentication system comprising:
- means for receiving from a requester purporting to be an authorized user of a secured resource a request for access by an unauthorized user to said secured resource;
means for determining a key string, said key string being adapted to provide a basis for authenticating the identity of said requester;
means for receiving an authentication credential associated with said request for access; and
means for evaluating said authentication credential to authenticate the identity of said requester.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method whereby the identity of a person, entity, device or the like attempting to gain access to a secured resource may be securely authenticated includes a means for receiving from a requester purporting to be an authorized user of a secured resource a request for access by an unauthorized user (such as, for example, a retail store, a service station, an on-line service provider or merchandiser, a healthcare provider, a medical insurer, an information consumer or the like) to the secured resource; a means for determining a key string adapted to provide a basis for authenticating the identity of the requester; a means for receiving an authentication credential associated with the request for access; and a means for evaluating the authentication credential to authenticate the identity of the requester.
4 Citations
20 Claims
-
1. An authentication system for authenticating the identity of a requester of access by an unauthorized user to a secured resource, said authentication system comprising:
-
means for receiving from a requester purporting to be an authorized user of a secured resource a request for access by an unauthorized user to said secured resource; means for determining a key string, said key string being adapted to provide a basis for authenticating the identity of said requester; means for receiving an authentication credential associated with said request for access; and means for evaluating said authentication credential to authenticate the identity of said requester. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 12)
-
-
11. A method for authenticating the identity of a requester of access to a secured resource, said method for authenticating comprising the steps of:
-
receiving a request for access by an unauthorized user to a secured resource from a requester purporting to be an authorized user of said secured resource; determining a key string, said key string being adapted to provide a basis for authenticating the identity of said requester; receiving from said unauthorized user an authentication credential associated with said request for access; and evaluating said authentication credential to authenticate the identity of said requester. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification