Secure resource distribution through encrypted pointers
First Claim
1. A method for securely distributing a requested resource to a requesting client over a computer communications network, the method comprising steps of:
- identifying a public encryption key for a requesting client requesting the requested resource;
locating the requested resource;
composing a pointer to the requested resource based upon said location and encrypting said composed pointer using a local encryption/decryption key;
combining said encrypted pointer with a network address of a server coupled to a decoding processor configured to decrypt said encrypted pointer with said local encryption/decryption key to return the requested resource to the requesting client; and
,encrypting said combination with said public encryption key and forwarding said encrypted combination to the requesting client;
whereby the requesting client both can decrypt said encrypted combination using a private encryption key corresponding to said public encryption key, and also can access the requested resource by transmitting said combination to said server coupled to said decoding processor.
1 Assignment
0 Petitions
Accused Products
Abstract
A secure pointer. The secure pointer can include an encrypted pointer to a resource disposed in a communicatively coupled computing device. The secure pointer also can include a network address of a server computing device able to locate the resource based upon a decrypted form of the encrypted pointer. Finally, the secure pointer can include an encrypted wrapper about the encrypted pointer and the network address. Notably, the encrypted pointer can be encrypted and decrypted according to a local encryption/decryption key known to the server computing device. Yet, the encrypted wrapper can be encrypted according to a public encryption key while the encrypted wrapper can be decrypted according to a private encryption key corresponding to the public encryption key.
21 Citations
8 Claims
-
1. A method for securely distributing a requested resource to a requesting client over a computer communications network, the method comprising steps of:
-
identifying a public encryption key for a requesting client requesting the requested resource; locating the requested resource; composing a pointer to the requested resource based upon said location and encrypting said composed pointer using a local encryption/decryption key; combining said encrypted pointer with a network address of a server coupled to a decoding processor configured to decrypt said encrypted pointer with said local encryption/decryption key to return the requested resource to the requesting client; and
,encrypting said combination with said public encryption key and forwarding said encrypted combination to the requesting client; whereby the requesting client both can decrypt said encrypted combination using a private encryption key corresponding to said public encryption key, and also can access the requested resource by transmitting said combination to said server coupled to said decoding processor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
Specification