Controlling access to information
First Claim
Patent Images
1. A method of controlling access to information in a distributed computing system, the method comprising:
- receiving a request for the information, the request accompanied by encrypted session state data, the encrypted session state data being valid for a limited duration; and
based on the encrypted session state data, determining whether to pass the request to a source of the information.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods are provided for controlling access to information in a distributed computing system. A request for the information is received and is accompanied by encrypted session state data. Based on the encrypted session state data, it is determined whether to pass the request on to a source of the information. In a memory buffer, old data is replaced by overwriting with a unique identifier. After the memory buffer has received new data and a procedure has been executed for copying the contents of the memory buffer to a destination, it is determined whether the unique identifier may be found at the destination.
201 Citations
28 Claims
-
1. A method of controlling access to information in a distributed computing system, the method comprising:
-
receiving a request for the information, the request accompanied by encrypted session state data, the encrypted session state data being valid for a limited duration; and based on the encrypted session state data, determining whether to pass the request to a source of the information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of controlling access to information, the method comprising:
-
in a memory buffer, replacing old data by overwriting with a unique identifier; and after the memory buffer has received new data and a procedure has been executed for copying at least some of the contents of the memory buffer to a destination, determining whether the unique identifier may be found at the destination. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A method of controlling access to information, the method comprising:
-
providing encrypted session state data to browser software running on a client computer, the encrypted session state data including a unique identifier for an information-accessing session; at a gatekeeper computer, receiving a request for the information, the encrypted session state data accompanying the request; based on the encrypted session state data, determining whether to pass the request to a server computer serving as a source for the information; at the server computer, directing that a memory buffer be allocated with a specified size; causing the memory buffer to be allocated with an increased size being larger than the specified size by amount equal to twice the unique identifier'"'"'s size; filling the memory buffer with the unique identifier; providing the information in the memory buffer; at the gatekeeper computer, causing a gatekeeper memory buffer to be allocated with the increased size; copying the contents of the memory buffer to the gatekeeper memory buffer; determining whether the unique identifier may be found in the gatekeeper memory buffer; and if the unique identifier is found in the gatekeeper memory buffer, providing the information in a substantive response to the browser software.
-
-
15. Computer software, residing on a computer-readable storage medium, comprising instructions for use in a computer system to controlling access to information in a distributed computing system, the instructions causing the computer system to:
-
receive a request for the information, the request accompanied by encrypted session state data, the encrypted session state data being valid for a limited duration; and based on the encrypted session state data, determine whether to pass the request to a source of the information. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
-
23. Computer software, residing on a computer-readable storage medium, comprising instructions for use in a computer system to control access to information, the instructions causing the computer system to:
-
in a memory buffer, replace old data by overwriting with a unique identifier; and after the memory buffer has received new data and a procedure has been executed for copying at least some of the contents of the memory buffer to a destination, determine whether the unique identifier may be found at the destination. - View Dependent Claims (24, 25, 26, 27)
-
-
28. Computer software, residing on a computer-readable storage medium, comprising instructions for use in a computer system to control access to information, the instructions causing the computer system to:
-
provide encrypted session state data to browser software running on a client computer, the encrypted session state data including a unique identifier for an information-accessing session; at a gatekeeper computer, receive a request for the information, the encrypted session state data accompanying the request; based on the encrypted session state data, determine whether to pass the request to a server computer serving as a source for the information; at the server computer, direct that a memory buffer be allocated with a specified size; cause the memory buffer to be allocated with an increased size being larger than the specified size by amount equal to twice the unique identifier'"'"'s size; fill the memory buffer with the unique identifier; provide the information in the memory buffer; at the gatekeeper computer, cause a gatekeeper memory buffer to be allocated with the increased size; copy the contents of the memory buffer to the gatekeeper memory buffer; determine whether the unique identifier may be found in the gatekeeper memory buffer; and if the unique identifier is found in the gatekeeper memory buffer, provide the information in a substantive response to the browser software.
-
Specification