METHOD AND APPARATUS FOR PROVIDING A SCALABLE SERVICE PLATFORM USING A NETWORK CACHE
First Claim
1. A method comprising:
- encrypting a resource with a first authorization key;
encrypting the first authorization key with a second authorization key, the second authorization key being for a user entity; and
initiating a distribution of the encrypted resource with the encrypted first authorization key and information indicating the user entity.
2 Assignments
0 Petitions
Accused Products
Abstract
An approach is provided for building a scalable service platform by initiating transmission of encrypted data from a public network cache. An access control server platform determines a first authorization key for a user and a second authorization key for a resource, and then encrypts the resource with the second authorization key, and encrypts the second authorization key with the first authorization key. The access control server platform initiates distribution of the encrypted second authorization key with the encrypted resource over a network. The access control server platform further initiates caching the encrypted second authorization key with the encrypted resource that meets a predefined threshold value (e.g., a data size, an access frequency, a modification frequency, or an auditing requirement) in a cache in the network, and initiates transmission of the cached and encrypted second authorization key with the cached and encrypted resource from the cache to at least one authorized entity.
-
Citations
20 Claims
-
1. A method comprising:
-
encrypting a resource with a first authorization key; encrypting the first authorization key with a second authorization key, the second authorization key being for a user entity; and initiating a distribution of the encrypted resource with the encrypted first authorization key and information indicating the user entity. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following; encrypt a resource with a first authorization key; encrypt the first authorization key with a second authorization key, the second authorization key being for a user entity; and initiate a distribution of the encrypted resource with the encrypted first authorization key and information indicating the user entity. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium carrying one or more sequences of one or more instructions which, when executed by one or more processors, cause an apparatus to perform at least the following:
-
encrypting a resource with a first authorization key; encrypting the first authorization key with a second authorization key, the second authorization key being for a user entity; and initiating a distribution of the encrypted resource with the encrypted first authorization key and information indicating the user entity. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification