Accessing information on a network using an extended network universal resource locator
First Claim
1. A method for facilitating access to information on a network, comprising:
- generating an extended network universal resource locator having (i) a network address at which stored information can be accessed on a network, (ii) identity information associated with a first network entity and an integrity value corresponding to the identity information, the identity information and the integrity value being encrypted with a first crypto-key of a second network entity, and (iii) voucher information indicating that a third network entity has authenticated the first network entity and that transmission of the extended network universal resource locator by the third network entity to the first network entity occurred at a particular time, the voucher information being encrypted with a second crypto-key of the third network entity; and
transmitting the extended network universal resource locator via the network to facilitate access, by the first network entity, to the information stored at the network address;
wherein the extended network universal resource locator is generated to also have relationship information indicating that the encrypted identity information and integrity value were received by a fourth network entity from the second network entity and transmitted by the fourth network entity to the third network entity, the relationship information being encrypted with a third crypto-key of the fourth network entity.
1 Assignment
0 Petitions
Accused Products
Abstract
To facilitate access to information on a network, an extended network universal resource locator is generated. The generated extended network universal resource locator has (i) a network address, such as an Internet URL, at which stored information, such as detailed bill information, can be accessed on a network, (ii) identity information associated with a first network entity and an integrity value corresponding to the identity information, and (iii) voucher information indicating that a third network entity has authenticated the first network entity and that transmission of the extended network universal resource locator by the third network entity to the first network entity occurred at a particular time. The identity information could, for example, include an identification of the stored information and an account number associated with the first network entity. The integrity value could, for example, be a hash of the identity information. The identity information and the integrity value are encrypted with a first crypto-key of a second network entity. The voucher information is encrypted with a second crypto-key of the third network entity. The transmission time information is preferably a timestamp. The extended network universal resource locator is transmitted via the network to facilitate access, by the first entity, to the information stored at the network address.
-
Citations
12 Claims
-
1. A method for facilitating access to information on a network, comprising:
-
generating an extended network universal resource locator having (i) a network address at which stored information can be accessed on a network, (ii) identity information associated with a first network entity and an integrity value corresponding to the identity information, the identity information and the integrity value being encrypted with a first crypto-key of a second network entity, and (iii) voucher information indicating that a third network entity has authenticated the first network entity and that transmission of the extended network universal resource locator by the third network entity to the first network entity occurred at a particular time, the voucher information being encrypted with a second crypto-key of the third network entity; and transmitting the extended network universal resource locator via the network to facilitate access, by the first network entity, to the information stored at the network address;
wherein the extended network universal resource locator is generated to also have relationship information indicating that the encrypted identity information and integrity value were received by a fourth network entity from the second network entity and transmitted by the fourth network entity to the third network entity, the relationship information being encrypted with a third crypto-key of the fourth network entity. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An article of manufacture for facilitating access to information on a network, comprising:
-
a memory; and computer programming stored on the memory, wherein the stored computer programming is configured to be readable from the memory and thereby cause a computer to operate so as to; generate an extended network universal resource locator having (i) a network address at which stored information can be accessed on a network, (ii) identity information associated with a first network entity and an integrity value corresponding to the identity information, the identity information and the integrity value being encrypted with a first crypto-key of a second network entity, and (iii) voucher information indicating that a third network entity has authenticated the first network entity and that transmission of the extended network universal resource locator by the third network entity to the first network entity occurred at a particular time, the voucher information being encrypted with a second crypto-key of the third network entity; and transmit the extended network universal resource locator via the network to facilitate access, by the first network entity, to the information stored at the network address;
wherein the extended network universal resource locator is generated to also have relationship information indicating that the encrypted identity information and integrity value were received by a fourth network entity from the second network entity and transmitted by the fourth network entity to the third network entity, the relationship information being encrypted with a third crypto-key of the fourth network entity. - View Dependent Claims (8, 9, 10, 11, 12)
-
Specification