发明名称 Authentication method
摘要 A system and method whereby the identity of a person, entity, device or the like attempting to gain access to a secured resource may be securely authenticated includes a means for receiving from a service client a request for access to a secured resource; means for generating and communicating to the purported authorized user a challenge string adapted to provide a basis for authenticating the identity of the requester; a means for receiving from the service client a response string corresponding to the challenge string; and a means for evaluating the response string to authenticate the identity of the requester. The secured resource has a common identifier by which it may be generally identified outside of the authentication system, but the request for access lacks sufficient information content for the service client to be able to determine the common identifier.
申请公布号 US8800014(B2) 申请公布日期 2014.08.05
申请号 US201113279295 申请日期 2011.10.23
申请人 发明人 Nandakumar Gopal
分类号 G06F15/16;G06F17/30;H04L29/06;G06F12/00;G06F13/00;G06F12/14;G11C7/00;G06Q20/40;H04L9/32;G06Q20/38;G06Q20/42 主分类号 G06F15/16
代理机构 代理人
主权项 1. A method for authenticating the identity of a requester of access to a secured resource, said method for authenticating comprising the steps of: receiving from a service client a request for access to a secured resource, said request for access having been submitted to said service client by a requester purporting to be an authorized user of said secured resource; selecting a plurality of randomly selected symbols; generating a challenge string with a computer server contemporaneously with selecting said plurality of randomly selected symbols, said challenge string being a random string comprising said plurality of randomly selected symbols and at least one null character, said null character being a specially designated symbol intended to indicate the absence from said challenge string of a single symbol, wherein said generating step and said selecting step are communicating said challenge string through a discrete channel to said authorized user that said requester purports to be; receiving from said service client a response string formulated by using symbols of a private string to replace the at least one null character of said challenge string, the private string being only known to said authorized user and said computer server; evaluating said response string to authenticate the identity of said requester; and wherein: said secured resource comprises a common identifier by which said secured resource may be generally identified outside of an authentication system; and said request for access comprises insufficient content for said service client to determine said common identifier.
地址