Network content access control
First Claim
1. A method for preventing unauthorized access by a requester to data sent via computer networks, comprising:
- a) requesting, from a requesting computer, access to data from a first server;
at said first server;
b) determining if said request is a valid request;
c) receiving a ticket from a ticket server;
if said request is a valid request;
d) providing said ticket identifying said requestor to a second server wherein said data is stored;
e) directing said requesting computer to request access to said data from said second server;
at said second server;
f) receiving said request from said requesting computer;
g) verifying said ticket as identifying said requester; and
h) sending said data to said requesting computer in response to said request.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for preventing unauthorized access by a requester to data sent via computer networks, including a) requesting, from a requesting computer, access to data from a first server, at the first server b) determining if the request is a valid request, c) receiving a ticket from a ticket server, if the request is a valid request d) providing the ticket identifying the requestor to a second server the data is stored, e) directing the requesting computer to request access to the data from the second server, at the second server f) receiving the request from the requesting computer, g) verifying the ticket as identifying the requester, and h) sending the data to the requesting computer in response to the request.
-
Citations
40 Claims
-
1. A method for preventing unauthorized access by a requester to data sent via computer networks, comprising:
-
a) requesting, from a requesting computer, access to data from a first server;
at said first server;
b) determining if said request is a valid request;
c) receiving a ticket from a ticket server;
if said request is a valid request;
d) providing said ticket identifying said requestor to a second server wherein said data is stored;
e) directing said requesting computer to request access to said data from said second server;
at said second server;
f) receiving said request from said requesting computer;
g) verifying said ticket as identifying said requester; and
h) sending said data to said requesting computer in response to said request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for preventing unauthorized transfer of data sent via computer networks, the method comprising the steps of:
-
instructing a first server to send content to a second server;
notifying a ticket server of said instructions;
validating said instructions at said ticket server;
if said instructions are valid;
notifying either of said servers that said instructions are valid;
sending said content from said first server to said second server;
if said instructions are invalid;
notifying either of said servers that said instructions are invalid;
performing any of;
ignoring said instructions;
corrupting said content; and
discarding said content. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A data transfer validation server for validating a request for data transfer, the server comprising:
-
a request input for receiving a request from a distribution server to distribute data from said distribution server to a requesting client, a distribution parameter table comprising predetermined distribution parameters, a comparator for comparing said request against said predetermined distribution parameters, a verifier connected to said comparator for verifying said request, at least partly in accordance with an output of said comparator, and a ticket issuer for issuing ticket data indicating acceptance of said request. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
Specification