System and method for regulating access to objects in a content repository
First Claim
1. A computer-implemented content management method, comprising:
- storing content access control rules and generating access control tokens that signify content access is to be granted upon token validation, using a library server;
storing content and validating access control tokens, using at least one resource manager; and
selectively delivering requested content upon successful token validation, using a proxy cache.
4 Assignments
0 Petitions
Accused Products
Abstract
A content management system integrated with a web caching proxy that delivers content according to access control rules. An access control token is generated using a secret key when a user selects a desired object (to be provided only upon token validation, thus the object retrieval and delivery task can be delegated). However, tokens for other content and/or for other users could be generated by a rogue resource manager. If the desired object is already cached, the proxy asks the resource manager to validate the token and then selectively provides the desired object without contacting a library server. Alternately, the proxy itself performs the token validation, but must coordinate with the library server to ensure it has the latest secret key. Finally, the tokens may contain digital signatures generated with a private key and validated with a corresponding public key, so that private keys need not be distributed.
158 Citations
23 Claims
-
1. A computer-implemented content management method, comprising:
-
storing content access control rules and generating access control tokens that signify content access is to be granted upon token validation, using a library server;
storing content and validating access control tokens, using at least one resource manager; and
selectively delivering requested content upon successful token validation, using a proxy cache. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A content management system, comprising:
-
a library server that stores content access control rules, and generates access control tokens that signify content access is to be granted upon token validation;
at least one resource manager that stores content and can validate access control tokens; and
a proxy cache that selectively delivers requested content upon successful token validation. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A content management system, comprising:
-
means for storing content access control rules and generating access control tokens that signify content access is to be granted upon token validation;
means for validating access control tokens remotely from said access control rule storing and access control token generating means; and
means for caching and selectively delivering requested content upon successful token validation.
-
-
22. A computer program product comprising a machine-readable medium having computer-executable program instructions thereon for content management, including:
-
a first code means for storing content access control rules and generating access control tokens that signify content access is to be granted upon token validation;
a second code means for remotely validating access control tokens; and
a third code means for caching and selectively delivering requested content upon successful token validation.
-
-
23. A business service enabling enhanced content management and distribution in electronic commerce, comprising:
-
storing content access control rules and generating access control tokens that signify content access is to be granted upon token validation;
validating access control tokens remotely from said access control rule storing and access control token generating means; and
caching and selectively delivering requested content upon successful token validation.
-
Specification