×

Resource locators with keys

  • US 9,237,019 B2
  • Filed: 09/25/2013
  • Issued: 01/12/2016
  • Est. Priority Date: 09/25/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • under the control of one or more computer systems configured with executable instructions,receiving, from a requestor, a request to perform one or more operations using a cryptographic key lacked by the one or more computer systems prior to receipt of the request, the request including a uniform resource locator that;

    indicates the one or more operations;

    includes an electronic signature generated by a first entity based at least in part on a portion of the uniform resource locator and secret information inaccessible to the requestor; and

    includes the cryptographic key;

    making a determination whether the electronic signature is valid;

    on a condition that the determination indicates that the electronic signature is valid, using the cryptographic key from the request to perform the indicated one or more operations on data to generate a result of the one or more operations;

    providing the result of the one or more operations in accordance with the request; and

    after using the cryptographic key from the request to perform the indicated one or more operations on the data, performing one or more operations to lose access to the cryptographic key.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×