CPC G06F 21/629 (2013.01) [G06F 9/5077 (2013.01); G06F 21/10 (2013.01); G06F 21/54 (2013.01); G06F 21/602 (2013.01); H04L 9/3213 (2013.01)] | 20 Claims |
1. A computer-implemented method comprising:
sending, by a requester, a request via a first communication protocol, for accessing a content resource;
receiving, by the requester, a session at a content server to access the content resource for the requester;
receiving, by the requester, a payload from the content server;
identifying the content resource on a resource server, wherein the payload comprises a cryptographic content embedded in the payload, wherein the embedded cryptographic content is accessible via the content server;
sending, by the requester, an authentication access request, via a second communication protocol, in response to executing the identified cryptographic content, wherein the second communication protocol is different from the first communication protocol; and
receiving, by the requester, access to the content resource based on authenticating the authentication access request.
|