METHOD AND APPARATUS FOR PROVIDING A SCALABLE SERVICE PLATFORM USING A NETWORK CACHE
First Claim
1. A method comprising:
- determining a first authorization key for a user and a second authorization key for a resource;
encrypting the resource with the second authorization key;
encrypting the second authorization key with the first authorization key;
initiating distribution of the encrypted second authorization key with the encrypted resource over a network;
initiating caching the encrypted second authorization key with the encrypted resource in a cache in the network; and
initiating transmission of the cached and encrypted second authorization key with the cached and encrypted resource from the cache to at least one authorized entity.
3 Assignments
0 Petitions
Accused Products
Abstract
An approach is provided for building a scalable service platform by initiating transmission of encrypted data from a public network cache. An access control server platform determines a first authorization key for a user and a second authorization key for a resource, and then encrypts the resource with the second authorization key, and encrypts the second authorization key with the first authorization key. The access control server platform initiates distribution of the encrypted second authorization key with the encrypted resource over a network. The access control server platform further initiates caching the encrypted second authorization key with the encrypted resource that meets a predefined threshold value (e.g., a data size, an access frequency, a modification frequency, or an auditing requirement) in a cache in the network, and initiates transmission of the cached and encrypted second authorization key with the cached and encrypted resource from the cache to at least one authorized entity.
18 Citations
20 Claims
-
1. A method comprising:
-
determining a first authorization key for a user and a second authorization key for a resource; encrypting the resource with the second authorization key; encrypting the second authorization key with the first authorization key; initiating distribution of the encrypted second authorization key with the encrypted resource over a network; initiating caching the encrypted second authorization key with the encrypted resource in a cache in the network; and initiating transmission of the cached and encrypted second authorization key with the cached and encrypted resource from the cache to at least one authorized entity. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following; determine a first authorization key for a user and a second authorization key for a resource; encrypt the resource with the second authorization key; encrypt the second authorization key with the first authorization key; initiate distribution of the encrypted second authorization key with the encrypted resource over a network; initiate caching the encrypted second authorization key with the encrypted resource in a cache in the network; and initiate transmission of the cached and encrypted second authorization key with the cached and encrypted resource from the cache to at least one authorized entity. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-readable storage medium carrying one or more sequences of one or more instructions which, when executed by one or more processors, cause an apparatus to perform at least the following:
-
determining a first authorization key for a user and a second authorization key for a resource; encrypting the resource with the second authorization key; encrypting the second authorization key with the first authorization key; initiating distribution of the encrypted second authorization key with the encrypted resource over a network; initiating caching the encrypted second authorization key with the encrypted resource in a cache in the network; and initiating transmission of the cached and encrypted second authorization key with the cached and encrypted resource from the cache to at least one authorized entity. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification