Resource locators with keys
First Claim
Patent Images
1. A method, comprising:
- receiving a request for information from a user, the request including a uniform resource locator comprising a first cryptographic key, a portion signed with the first cryptographic key, and an unsigned portion; and
providing access to the information to the user based, at least in part, on the first cryptographic key and on information in the unsigned portion modified by a third party without affecting validity of the signed portion.
1 Assignment
0 Petitions
Accused Products
Abstract
Requests are pre-generated to include a cryptographic key to be used in fulfilling the requests. The requests may be encoded in uniform resource locators and may include authentication information to enable a service provider to whom the requests are submitted to determine whether the requests are authorized. The requests may be passed to various entities who can then submit the requests to the service provider. The service provider, upon receipt of a request, can verify the authentication information and fulfill the request using a cryptographic key encoded in the request.
221 Citations
20 Claims
-
1. A method, comprising:
-
receiving a request for information from a user, the request including a uniform resource locator comprising a first cryptographic key, a portion signed with the first cryptographic key, and an unsigned portion; and providing access to the information to the user based, at least in part, on the first cryptographic key and on information in the unsigned portion modified by a third party without affecting validity of the signed portion. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system, comprising:
-
one or more processors; and memory including instructions that, as a result of execution by the one or more processors, cause the system to; receive a request for information from a user, the request including a uniform resource locator that includes a first cryptographic key and an unsigned portion, the first cryptographic key associated with a signed portion of the uniform resource locator; and provide access to the requested information to the user based, at least in part, on the first cryptographic key and on information in the unsigned portion modified by a third party, the modification by the third party not affecting validity of the signed portion. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A non-transitory computer-readable storage medium having stored thereon instructions that, as a result of execution by one or more processors of a computer system, cause the computer system to:
-
acquire a request, the request including a first cryptographic key, a signed portion, and an unsigned portion of a uniform resource locator, the signed portion associated with the first cryptographic key; transmit the request; and receive a response to the request generated based at least in part on the first cryptographic key and information in the unsigned portion, the information in the unsigned portion modified without affecting validity of the signed portion. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification