Data access and ownership management
First Claim
1. A method comprising:
- obtaining, by a data processing device comprising processing circuitry and computer-readable memory, first secret data associated with a first user and corresponding to a first location of a remote resource, the first secret data including a uniform resource locator (URL) transformation including URL encoding information, wherein obtaining the first secret data comprises receiving the first secret data from the remote resource;
generating, by the data processing device using the first secret data, a first URL usable to obtain the first location of the remote resource;
accessing, by the data processing device, the first location of the remote resource using the first URL;
obtaining, by the data processing device in response to a transfer of usage rights of the data processing device from the first user to a second user, second secret data associated with the second user and corresponding to a second location of the remote resource;
generating, by the data processing device using the second secret data, a second URL usable to obtain the second location of the remote resource; and
accessing, by the data processing device, the second location of the remote resource using the second URL;
wherein the second location of the remote resource is inaccessible via the first URL, and wherein the first location of the remote resource is inaccessible via the second URL.
1 Assignment
0 Petitions
Accused Products
Abstract
In one example, a method includes obtaining, by a data processing device, first secret data associated with a first user and corresponding to a first location of a remote resource. The method further includes generating, using the first secret data, a first uniform resource locator (URL) usable to obtain the first location, and accessing the first location using the first URL. The method further includes obtaining, in response to transfer of usage rights of the data processing device from the first user to a second user, second secret data associated with the second user and corresponding to a second location of the remote resource. The method further includes generating, using the second secret data, a second URL usable to obtain the second location, and accessing the second location using the second URL. The second location is inaccessible via the first URL. The first location is inaccessible via the second URL.
-
Citations
22 Claims
-
1. A method comprising:
-
obtaining, by a data processing device comprising processing circuitry and computer-readable memory, first secret data associated with a first user and corresponding to a first location of a remote resource, the first secret data including a uniform resource locator (URL) transformation including URL encoding information, wherein obtaining the first secret data comprises receiving the first secret data from the remote resource; generating, by the data processing device using the first secret data, a first URL usable to obtain the first location of the remote resource; accessing, by the data processing device, the first location of the remote resource using the first URL; obtaining, by the data processing device in response to a transfer of usage rights of the data processing device from the first user to a second user, second secret data associated with the second user and corresponding to a second location of the remote resource; generating, by the data processing device using the second secret data, a second URL usable to obtain the second location of the remote resource; and accessing, by the data processing device, the second location of the remote resource using the second URL; wherein the second location of the remote resource is inaccessible via the first URL, and wherein the first location of the remote resource is inaccessible via the second URL. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A data processing device comprising:
-
processing circuitry; communications circuitry; and computer-readable memory encoded with instructions that, when executed by the processing circuitry, cause the data processing device to; obtain, via the communications circuitry, first secret data associated with a first user and corresponding to a first location of a remote resource, the first secret data including a uniform resource locator (URL) transformation including URL encoding information, wherein obtaining the first secret data comprises receiving the first secret data from the remote resource; generate, using the first secret data, a first URL usable to obtain the first location of the remote resource; access, via the communications circuitry, the first location of the remote resource using the first URL; obtain, via the communications circuitry in response to a transfer of usage rights of the data processing device from the first user to a second user, second secret data associated with the second user and corresponding to a second location of the remote resource; generate, using the second secret data, a second URL usable to obtain the second location of the remote resource; and access, via the communications circuitry, the second location of the remote resource using the second URL; wherein the second location of the remote resource is inaccessible via the first URL, and wherein the first location of the remote resource is inaccessible via the second URL.
-
-
21. A method comprising:
-
generating, by a server system comprising at least one computing device and computer-readable memory, first secret data associated with a first user and corresponding to a first location of the computer-readable memory of the server system, the first secret data including a uniform resource locator (URL) transformation including URL encoding information; providing, by the server system to a data processing device, the first secret data for generating a first URL usable to obtain the first location of the computer-readable memory of the server system; generating, by the server system in response to a transfer of usage rights of the data processing device from the first user to a second user, second secret data associated with the second user and corresponding to a second location of the computer-readable memory of the server system; and providing, by the server system to the data processing device, the second secret data for generating a second URL usable to obtain the second location of the computer-readable memory of the server system; wherein the second location of the computer-readable memory of the server system is inaccessible via the first URL, and wherein the first location of the computer-readable memory of the server system is inaccessible via the second URL. - View Dependent Claims (22)
-
Specification