ACCESS CONTROL FOR NAMED DOMAIN NETWORKING
First Claim
1. A method comprising:
- sending to a content provider of an ICN network, by a computing device, an access request for content in response to receiving a first content request from a client;
receiving from the content provider, by the computing device, access control information for the content;
sending to the client, by the computing device, a challenge;
receiving from the client, by the computing device, an authorization of the content provider, the authorization of the content provider including information obtained by the client from the content provider based on the challenge;
verifying, by the computing device, the authorization received from the client using the access control information received from the content provider; and
sending to the client, by the computing device, the content.
1 Assignment
0 Petitions
Accused Products
Abstract
The disclosure is directed to providing content access control in information centric networking (ICN) networks. Methods and systems include hardware and/or software that perform operations for sending to a content provider of an ICN network an access request for content in response to receiving a first content request from a client. The operations also include receiving from the content provider access control information for the content. The operations further include sending to the client a challenge. Additionally, the operations include receiving from the client an authorization of the content provider that includes information obtained by the client from the content provider based on the challenge. Furthermore, the operations include verifying the authorization received from the client using the access control information received from the content provider. Moreover, the operations include sending to the client the content.
9 Citations
20 Claims
-
1. A method comprising:
-
sending to a content provider of an ICN network, by a computing device, an access request for content in response to receiving a first content request from a client; receiving from the content provider, by the computing device, access control information for the content; sending to the client, by the computing device, a challenge; receiving from the client, by the computing device, an authorization of the content provider, the authorization of the content provider including information obtained by the client from the content provider based on the challenge; verifying, by the computing device, the authorization received from the client using the access control information received from the content provider; and sending to the client, by the computing device, the content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising a processor, a data storage device, and program instruction stored on the data storage device that, when executed by the processor, control the system to perform operations comprising:
-
sending to a content provider of an ICN network an access request for content in response to receiving a first content request from a client; receiving from the content provider access control information for the content; sending to the client a challenge; receiving from the client an authorization of the content provider, the authorization of the content provider including information obtained by the client from the content provider based on the challenge; verifying the authorization received from the client using the access control information received from the content provider; and sending to the client the content. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An information centric networking (ICN) server communicatively linked to at least one client and at least one content provider by an ICN network, wherein the ICN server performs operations comprising:
-
receiving from the client a first content request naming content; sending the content provider an access request for the content; receiving a key for the content from the content provider; storing the key in an access control database of the ICN server; sending a challenge to the client, the challenge including a problem only solvable by the content provider; receiving an authorization of the content provider from the client, the authorization of the content provider including a solution to the problem obtained from the content provider; verifying the authorization received from the client using the key received from the content provider; after the verifying, sending to the content provider a second content request naming the content; receiving the content from the provider in response to the second content request; storing the content in a content store of the ICN server; and sending to the client the content. - View Dependent Claims (20)
-
Specification