System and method for secure publication of online content
First Claim
1. A computer controlled method for controlling access to data on a server comprising steps of:
- maintaining a data association at said server between a recipient and said data;
activating a link at a client by said recipient to access said data;
maintaining an identity association between a public key and said recipient;
establishing an encrypted data path between said client and said server;
authenticating said recipient responsive to said identity association; and
transferring said data across said encrypted data path responsive to said data association.
2 Assignments
0 Petitions
Accused Products
Abstract
When content publishers announce the availability of new content to one or more recipients, a content server automatically authorizes only those recipients of the announcement to have access to the new content. The authentication of clients is managed in an automated and user-friendly fashion. This may include instantaneous issuance of certificates, as well as quick revocation of certificates should they have been issued to the wrong individual. Quick revocation is facilitated by the fact that identities are associated with public keys in an online database where the association can quickly be undone, rather than in the certificates themselves as is traditionally the case.
-
Citations
21 Claims
-
1. A computer controlled method for controlling access to data on a server comprising steps of:
-
maintaining a data association at said server between a recipient and said data;
activating a link at a client by said recipient to access said data;
maintaining an identity association between a public key and said recipient;
establishing an encrypted data path between said client and said server;
authenticating said recipient responsive to said identity association; and
transferring said data across said encrypted data path responsive to said data association. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer controlled method for controlling access to data comprising steps of:
-
maintaining a data association between a recipient and said data;
maintaining an identity association between a public key and said recipient;
establishing an encrypted data path responsive to a communication request;
authenticating said recipient responsive to said identity association; and
sending said data across said encrypted data path responsive to said data association. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A computer-readable medium encoded with processing instructions for implementing a method, performed by a computer, the method comprising:
-
maintaining a data association between a recipient and said data;
maintaining an identity association between a public key and said recipient;
establishing an encrypted data path responsive to a communication request;
authenticating said recipient responsive to said identity association; and
sending said data across said encrypted data path responsive to said data association. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
-
21. An apparatus comprising:
-
a storage mechanism configured to maintain a data association between a recipient and data, and to maintain an identity association between a public key and said recipient;
an encryption mechanism configured to establish an encrypted data path responsive to a communication request;
an authentication mechanism configured to authenticate said recipient responsive to said identity association; and
a communications mechanism configured to send said data across said encrypted data path responsive to said data association.
-
Specification