MANAGING SECURE CONTENT IN A CONTENT DELIVERY NETWORK
First Claim
1. A system for managing content requests comprising:
- one or more first storage devices including a hardware processor and a memory, the one or more first storage devices configured to;
receive a client request for an embedded resource from a client computing device, the client request being associated with an embedded resource identifier and the client request including first signature information originally provided to the client computing device from an original content provider; and
provide the embedded resource to the client computing device based on verification of the first signature information; and
one or more second storage devices including a hardware processor and a memory, the one or more second storage devices configured to;
receive a first storage device request for an embedded resource from one of the one or more first storage devices, the first storage device request including second signature information, the second signature information being different from the first signature information; and
responsive to the first storage device request, provide the embedded resource to the first storage device based on verification of the second signature information.
0 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer readable medium for managing secure content by CDN service providers are provided. A network storage provider stores one or more resources on behalf of a content provider. A CDN service provider obtains client computing device requests for secure content. Based on processing first signature information, the CDN service provider determines whether the secure content is available to the client computing device. If the CDN service provider does not maintain the requested content, the CDN service provider transmits a request to the network storage provider. Based on second signature information and an identifier associated with the CDN service provider, the network storage provider processes the request based policy information associated with the identifier.
-
Citations
20 Claims
-
1. A system for managing content requests comprising:
-
one or more first storage devices including a hardware processor and a memory, the one or more first storage devices configured to; receive a client request for an embedded resource from a client computing device, the client request being associated with an embedded resource identifier and the client request including first signature information originally provided to the client computing device from an original content provider; and provide the embedded resource to the client computing device based on verification of the first signature information; and one or more second storage devices including a hardware processor and a memory, the one or more second storage devices configured to; receive a first storage device request for an embedded resource from one of the one or more first storage devices, the first storage device request including second signature information, the second signature information being different from the first signature information; and responsive to the first storage device request, provide the embedded resource to the first storage device based on verification of the second signature information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-implemented method for managing content requests comprising:
-
receiving a client request for an embedded resource from a client computing device, the client request being associated with an embedded resource identifier and the client request including first signature information originally provided to the client computing device from an original content provider; providing the embedded resource to the client computing device based at least in part on verification of the first signature information; receiving a first storage device request for an embedded resource from one or more first storage devices, the first storage device request including second signature information, the second signature information being different from the first signature information; and providing, the embedded resource to the first storage device based at least in part on verification of the second signature information. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification