×

Integrating security by obscurity with access control lists

  • US 7,984,512 B2
  • Filed: 06/14/2007
  • Issued: 07/19/2011
  • Est. Priority Date: 06/14/2007
  • Status: Active Grant
First Claim
Patent Images

1. At least one computer storage medium storing computer-executable instructions that, when executed by a computer, cause the computer to perform a method comprising:

  • providing, by the computer, information that identifies content and a first user, wherein the information includes a uniform resource locator (URL) that is associated with the content by a value of the URL, and wherein the value comprises an encryption of a content identifier and of a user identifier, and wherein the content identifier identifies the content, and wherein the user identifier identifies the first user;

    updating, by the computer, a data structure to indicate that the first user has rights to access to the content;

    receiving, in a request in response to the providing, at least a portion of the information from a second user;

    determining, in response to the receiving, whether the second user desires to access the content anonymously or based on a second user identifier of the second user;

    if anonymously, then granting the second user access to the content according to the rights of the first user; and

    if based on the second user identifier, then;

    obtaining the second user identifier of the second user,updating, in response to the request and the obtaining, the data structure to indicate that the second user has rights to access to the content based on the value of the URL and based on a second user identifier of the second user,granting the second user access to the content according to rights that are most permissive of the rights of the first user and the rights of the second user.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×