Secure Socket Policy Files For Establishing Secure Socket Connections
First Claim
1. A method comprising:
- requesting, by a computing system configured by media content, a socket policy file from a policy file server via a first secure socket connection, wherein the socket policy file specifies a security policy governing socket connections for accessing additional media content on a content server over a transport protocol layer;
receiving, by the computing system, the socket policy file via the first secure socket connection;
identifying, by the computing system, that the security policy requires communication with the content server via a second secure socket connection; and
communicating, by the computing system, with the content server via the second secure socket connection to access the additional media content.
2 Assignments
0 Petitions
Accused Products
Abstract
Exemplary embodiments involve a computing system requesting and receiving a socket policy file from a policy file server via a secure socket connection, identifying that the security policy requires communicating with a content server via a secure socket connection, and communicating with the content server via a second secure socket connection. The socket policy file specifies a security policy governing socket connections to a content server over a transport protocol layer. Additional embodiments involve requesting a socket policy file via a non-secure socket connection, receiving (via the non-secure socket connection) a placeholder socket policy file requiring requests for socket policy files to be communicated via a secure socket connection, establishing a secure socket connection with the policy file server, and submitting a request for the socket policy file to the policy file server via the secure socket connection.
13 Citations
20 Claims
-
1. A method comprising:
-
requesting, by a computing system configured by media content, a socket policy file from a policy file server via a first secure socket connection, wherein the socket policy file specifies a security policy governing socket connections for accessing additional media content on a content server over a transport protocol layer; receiving, by the computing system, the socket policy file via the first secure socket connection; identifying, by the computing system, that the security policy requires communication with the content server via a second secure socket connection; and communicating, by the computing system, with the content server via the second secure socket connection to access the additional media content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computing system comprising:
-
a processor for executing instructions stored in a computer-readable medium on one or more devices providing an application; wherein the application comprises one or more modules configured to perform operations when the computing system is configured by media content, the operations comprising; requesting a socket policy file from a policy file server via a first secure socket connection, wherein the socket policy file specifies a security policy governing socket connections for accessing additional media content on a content server over a transport protocol layer; receiving the socket policy file via the first secure socket connection; identifying that the security policy requires communication with the content server via a second secure socket connection; and communicating with the content server via the second secure socket connection to access the additional media content. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A computer-readable medium stored on a storage device, the computer-readable medium embodying program code executable by a computer system configured by media content, the computer-readable medium comprising:
-
program code for requesting a socket policy file from a policy file server via a first secure socket connection, wherein the socket policy file specifies a security policy governing socket connections for accessing additional media content on a content server over a transport protocol layer; program code for receiving the socket policy file via the first secure socket connection; program code for identifying that the security policy requires communication with the content server via a second secure socket connection; and program code for communicating with the content server via the second secure socket connection to access the additional media content. - View Dependent Claims (18, 19, 20)
-
Specification