Managing secure content in a content delivery network
First Claim
1. A system for managing content requests comprising:
- one or more first storage devices including a hardware processor and a memory, the one or more first storage devices configured to;
receive a client request for a resource from a client computing device, the client request including first signature information; and
provide the resource to the client computing device based on processing the first signature information to authorize the client request; and
one or more second storage devices including a hardware processor and a memory, the one or more second storage devices configured to;
receive a first storage device request for the resource from one of the one or more first storage devices, the first storage device request including second signature information, the second signature information being different from the first signature information; and
provide the resource to the first storage device based on processing the second signature information to authorize the first storage device request.
0 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer readable medium for managing secure content by CDN service providers are provided. A network storage provider stores one or more resources on behalf of a content provider. A CDN service provider obtains client computing device requests for secure content. Based on processing first signature information, the CDN service provider determines whether the secure content is available to the client computing device. If the CDN service provider does not maintain the requested content, the CDN service provider transmits a request to the network storage provider. Based on second signature information and an identifier associated with the CDN service provider, the network storage provider processes the request based policy information associated with the identifier.
-
Citations
22 Claims
-
1. A system for managing content requests comprising:
-
one or more first storage devices including a hardware processor and a memory, the one or more first storage devices configured to; receive a client request for a resource from a client computing device, the client request including first signature information; and provide the resource to the client computing device based on processing the first signature information to authorize the client request; and one or more second storage devices including a hardware processor and a memory, the one or more second storage devices configured to; receive a first storage device request for the resource from one of the one or more first storage devices, the first storage device request including second signature information, the second signature information being different from the first signature information; and provide the resource to the first storage device based on processing the second signature information to authorize the first storage device request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-implemented method comprising:
-
receiving, from one or more first storage devices, a client request for a resource from a client computing device, the client request including first signature information; receiving, from one or more second storage devices, a first storage device request for the resource from one of the one or more first storage devices, the first storage device request including second signature information, the second signature information being different from the first signature information; providing, by the one or more second storage devices, the resource to the first storage device based on processing the second signature information to authorize the first storage device request; and providing, by the one or more first storage devices, the resource to the client computing device based on processing the first signature information to authorize the client request. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification