Authenticating an entity for access to a controlled resource by an access authentication component for the controlled resource includes the steps of: the requesting entity initially opening a security account with the access authentication component, with the access authentication component establishing and maintaining a record including information pertaining to the account and being retrievable based on a unique identifier for the requesting entity, and associating a public key of a public-private key pair with the record; the requesting entity originating an electronic message and generating a digital signature using a private key of the key pair, and sending the digitally signed electronic message to the access authentication component with the unique identifier; authenticating the electronic message using the public key associated with the record identified by the unique identifier; and upon successful authentication, authenticating access to the controlled resource. Security information is considered in authenticating the requesting entity.

 
Web www.patentalert.com

< Method and apparatus for notifying a party of another party's location and estimated time of arrival at a predetermined destination

< Method for purging abandoned shopping carts from an electronic commerce web site

> Methods for extracting information on interactions between biological entities from natural language text data

> Trusted computing platform using a trusted device assembly

~ 00210