Privacy enhancements for server-side cookies
First Claim
1. A computer-implemented method of accessing cryptographically protected information comprising, on a server system:
- receiving a request from a client system, the request including a cryptographic object;
processing the request by;
identifying, at the server system, cryptographically protected information associated with the cryptographic object;
accessing the cryptographically protected information using the cryptographic object;
sending, to the client system, data based at least in part on the cryptographically protected information; and
in conjunction with completing processing of the request, irreversibly modifying the cryptographic object on the server system;
wherein irreversibly modifying the cryptographic object on the server system comprises truncating the cryptographic object on the server system to generate a truncated cryptographic object.
2 Assignments
0 Petitions
Accused Products
Abstract
A server system receives requests from client systems and sends responses back to the client systems. For a subset of the requests, in addition to responding to a request from a client system, the method includes creating a cryptographic object at the server system. The cryptographic object is used to cryptographically protect information related to the request, and the cryptographically protected information associated with the cryptographic object is stored at the server system. The server system then sends the cryptographic object to the client system, and in conjunction with sending the cryptographic object to the client system, irreversibly modifies the cryptographic object on the server system. For example, in some embodiments the cryptographic object includes an cryptographic key, and the server system deletes or truncates the only instances of the cryptographic object on the server system when the server system finishes responding to the request from the client system.
75 Citations
25 Claims
-
1. A computer-implemented method of accessing cryptographically protected information comprising, on a server system:
receiving a request from a client system, the request including a cryptographic object;
processing the request by;identifying, at the server system, cryptographically protected information associated with the cryptographic object; accessing the cryptographically protected information using the cryptographic object; sending, to the client system, data based at least in part on the cryptographically protected information; and in conjunction with completing processing of the request, irreversibly modifying the cryptographic object on the server system;
wherein irreversibly modifying the cryptographic object on the server system comprises truncating the cryptographic object on the server system to generate a truncated cryptographic object.- View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
14. A system for accessing cryptographically protected information comprising:
-
memory one or more processors; and one or more modules stored in the memory, the one or more modules including instructions which when executed by the one or more processors cause the system; to process a request received from a client system, wherein the request includes a cryptographic object, by; identifying, at the server system, cryptographically protected information associated with the cryptographic object; accessing the cryptographically protected information using the cryptographic object; sending, to the client system, data based at least in part on the cryptographically protected information; and in conjunction with completing processing of the request, irreversibly modifying the cryptographic object on the server system;
wherein irreversibly modifying the cryptographic object on the server system comprises truncating the cryptographic object on the server system to generate a truncated cryptographic object. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A non-transitory computer readable storage medium storing one or more programs for execution by one or more processors of a computer system, the one or more programs comprising instructions:
to process a request received from a client system, wherein the request includes a cryptographic object, by; identifying, at the server system, cryptographically protected information associated with the cryptographic object; accessing the cryptographically protected information using the cryptographic object; sending, to the client system, data based at least in part on the cryptographically protected information; and in conjunction with completing processing of the request, irreversibly modifying the cryptographic object on the server system;
wherein irreversibly modifying the cryptographic object on the server system comprises truncating the cryptographic object on the server system to generate a truncated cryptographic object.- View Dependent Claims (21, 22, 23, 24, 25)
Specification