×

Controlling access to information on a network using an extended network universal resource locator

  • US 7,426,638 B2
  • Filed: 06/30/2006
  • Issued: 09/16/2008
  • Est. Priority Date: 12/23/1999
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method comprising:

  • receiving via a network communication, by a first network entity that controls access to stored information, a message requesting access to the stored information, wherein the message includes a first component, a second component, and a third component, wherein the first component is encrypted with a first crypto-key associated with the first network entity that can be decrypted by the first network entity, wherein the second component is encrypted with a second crypto-key associated with a second network entity that controls access to the network by a user and that can be decrypted by the first network entity, and wherein the third component is encrypted with a third crypto-key associated with a third network entity associated with a service provider that can be decrypted by the first network entity;

    decrypting, by the first network entity, the received encrypted first component, the received encrypted second component, and the received encrypted third component; and

    transmitting the stored information to the user based at least in part on the decrypted first component, at least in part on the decrypted second component, and at least in part on the decrypted third component of the received message requesting access to the stored information,wherein the first component includes user identity information associated with the user and integrity information corresponding to the user identity information, andwherein the third component includes relationship information indicating a relationship between the third network entity and the first network entity wherein the user identity information and the integrity information were received by the third network entity from the first network entity and (ii) indicating a relationship between the third network entity and the second network entity wherein the user identity information and the integrity information were transmitted by the third network entity to the second network entity.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×