Secure Download from internet marketplace
First Claim
1. A computer-implemented method of providing an object to a specifiable requestor, the method comprising:
- receiving, by a processor, a request for the object;
extracting, by the processor, parameters regarding the object and the requestor from the request;
authenticating, by the processor, the requestor;
responsive to the authentication of the requestor, generating, by the processor, at least one unique identifier based on the extracted parameters, wherein the unique identifier encodes at least one of;
an identification of the requested object, an identification of the requestor'"'"'s platform, and a version of the platform;
storing, by the processor, a copy of the requested object in a temporary location;
generating, by the processor, a PLIST file indicating the temporary location of the copy of the requested downloadable object;
generating, by the processor, a path to the copy of the requested object, wherein the path includes the at least one unique identifier, and the path is generated based on the PLIST file; and
returning, by the processor, the path.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for secure download includes generating a path to a location where a downloadable object is temporarily stored. The method can include receiving a request for a downloadable object, generating one or more unique identifiers, creating a path to the requested object using the unique identifiers, storing a copy of the requested object in a temporary location indicated by the path, and returning the generated path to the requestor. The method can further include receiving a path to a downloadable object and, responsive to a determination that the path is valid, returning the downloadable object. A generated path can be rendered obsolete and its corresponding file removed from the temporary location after a predefined time interval has elapsed. A database of the generated paths and associated files may be periodically checked, and those paths and files that have been stored in the database beyond a pre-definable expiry time can be removed.
5 Citations
24 Claims
-
1. A computer-implemented method of providing an object to a specifiable requestor, the method comprising:
-
receiving, by a processor, a request for the object; extracting, by the processor, parameters regarding the object and the requestor from the request; authenticating, by the processor, the requestor; responsive to the authentication of the requestor, generating, by the processor, at least one unique identifier based on the extracted parameters, wherein the unique identifier encodes at least one of;
an identification of the requested object, an identification of the requestor'"'"'s platform, and a version of the platform;storing, by the processor, a copy of the requested object in a temporary location; generating, by the processor, a PLIST file indicating the temporary location of the copy of the requested downloadable object; generating, by the processor, a path to the copy of the requested object, wherein the path includes the at least one unique identifier, and the path is generated based on the PLIST file; and returning, by the processor, the path. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 20)
-
-
13. A non-transitory computer-readable storage device storing program instructions that, when executed, cause an executing device to perform a method for retrieving data from a legacy system, the method comprising:
-
receiving, by a processor, a request for the object; extracting, by the processor, parameters regarding the object and the requestor from the request; authenticating, by the processor, the requestor; responsive to the authentication of the requestor, generating, by the processor, at least one unique identifier based on the extracted parameters, wherein the unique identifier encodes at least one of;
an identification of the requested object, an identification of the requestor'"'"'s platform, and a version of the platform;storing, by the processor, a copy of the requested object in a temporary location; generating, by the processor, a PLIST file indicating the temporary location of the copy of the requested downloadable object; generating, by the processor, a path to the copy of the requested object, wherein the path includes the at least one unique identifier, and the path is generated based on the PLIST file; and returning, by the processor, the path.
-
-
14. A system comprising:
-
at least one processor; and memory storing instructions which, when executed by the at least one processor, result in operations comprising; receiving a request for the object; extracting parameters regarding the object and the requestor from the request; authenticating the requestor; responsive to the authentication of the requestor, generating at least one unique identifier based on the extracted parameters, wherein the unique identifier encodes at least one of;
an identification of the requested object, an identification of the requestor'"'"'s platform, and a version of the platform;storing a copy of the requested object in a temporary location; generating a PLIST file indicating the temporary location of the copy of the requested downloadable object; generating a path to the copy of the requested object, wherein the path includes the at least one unique identifier, and the path is generated based on the PLIST file; and returning the path. - View Dependent Claims (15, 16, 17, 18, 19, 21, 22, 23, 24)
-
Specification