Controlling access to information on a network using an extended network universal resource locator
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for controlling access to information on a network where a first network entity receives a message requesting access to stored information via a network communication. The received message includes a first component encrypted with a first crypto-key associated with the first network entity and a second component encrypted with a second crypto-key associated with a second network entity such that both can be decrypted by the first network entity. The second network entity controls access to the network by the user. After receiving the message, the first network entity decrypts the first component and the second component and then transmits the stored information to the user based on the content of the first component and the second component.
-
Citations
42 Claims
-
1-14. -14. (canceled)
-
15. A method comprising:
-
receiving via a network communication, by a first network entity that controls access to stored information, a message requesting access to the stored information, wherein the message includes a first component and a second component, wherein the first component is encrypted with a first crypto-key associated with the first network entity that can be decrypted by the first network entity, wherein the second component is encrypted with a second crypto-key associated with a second network entity that controls access to the network by the user and wherein the second component can be decrypted by the first network entity;
decrypting, by the first network entity, the received encrypted first component and the received encrypted second component; and
transmitting the stored information to the user based at least in part on the decrypted first component and the decrypted second component of the received message requesting access to the stored information. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
-
38. A system for providing access to information stored on a network, comprising:
-
a data store, wherein the data store contains information associated with a user; and
a network device, wherein the network device is configured to;
receive, via a network communication, a message requesting access to the stored information, wherein the message has an encrypted first component and an encrypted second component, wherein the first component is encrypted with a first crypto-key associated with the first network entity that can be decrypted by the first network entity, wherein the second component is encrypted with a second crypto-key associated with a second network entity that controls access to the network by the user and wherein the second component can be decrypted by the first network entity, decrypt the received encrypted first component and the received encrypted second component, and transmitting the stored information to the user based the decrypted first component and the decrypted second component of the received message requesting access to the stored information. - View Dependent Claims (39, 40, 41, 42)
-
Specification