Secure time-to-live
First Claim
Patent Images
1. A computing device comprising:
- an interface configured to;
receive a communication, wherein the communication comprises a time-to-live value;
one or more processors;
memory storing instructions that, when executed by the one or more processors, cause the computing device to;
determine an expiration time of the communication by adding the time-to-live value to a first current time;
transmit the expiration time to one or more devices associated with a user of the computing device;
obtain, based on a request to access the communication, a second current time;
compare the second current time to the expiration time; and
allow, based on a determination that the second current time is less than the expiration time, access to the communication.
4 Assignments
0 Petitions
Accused Products
Abstract
Determining whether to allow access to a message is disclosed. A message is received from a sender. The message is associated with a first time-to-live (TTL) value. A determination is made that the first time-to-live value has not been exceeded. The determination is made at least in part by obtaining an external master clock time. In response to the determination, access is allowed to the message.
385 Citations
16 Claims
-
1. A computing device comprising:
an interface configured to; receive a communication, wherein the communication comprises a time-to-live value; one or more processors; memory storing instructions that, when executed by the one or more processors, cause the computing device to; determine an expiration time of the communication by adding the time-to-live value to a first current time; transmit the expiration time to one or more devices associated with a user of the computing device; obtain, based on a request to access the communication, a second current time; compare the second current time to the expiration time; and allow, based on a determination that the second current time is less than the expiration time, access to the communication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
10. A method comprising:
-
receiving, at a first device, a communication, wherein the communication comprises a time-to-live value; determining an expiration time of the communication by adding the time-to-live value to a first current time; transmitting the expiration time to one or more devices associated with a user of the first device; obtaining, based on a request to access the communication, a second current time; comparing the second current time to the expiration time; and allowing, based on a determination that the second current time is less than the expiration time, access to the communication. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A computer program product embodied in a non-transitory tangible computer readable storage medium and comprising computer instructions for:
-
receiving a communication, wherein the communication comprises a time-to-live value; determining an expiration time of the communication by adding the time-to-live value to a first current time; transmitting the expiration time to one or more devices associated with a user of a first device; obtaining, based on a request to access the communication, a second current time; comparing the second current time to the expiration time; and allowing, based on a determination that the second current time is less than the expiration time, access to the communication.
-
Specification