Managing secure content in a content delivery network
First Claim
1. A system for managing content requests comprising:
- one or more first storage devices including a hardware processor and a memory, the one or more first storage devices configured to;
receive a client request for an embedded resource from a client computing device, the client request including an embedded resource identifier originally provided to the client computing device from an original content provider, the embedded resource identifier including first signature information; and
provide the embedded resource to the client computing device based on verification of the first signature information; and
one or more second storage devices including a hardware processor and a memory, the one or more second storage devices configured to;
receive a first storage device request for the embedded resource from one of the one or more first storage devices, the first storage device request including second signature information, the second signature information being different from the first signature information; and
responsive to the first storage device request, provide the embedded resource to the first storage device based on verification of the second signature information.
0 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer readable medium for managing secure content by CDN service providers are provided. A network storage provider stores one or more resources on behalf of a content provider. A CDN service provider obtains client computing device requests for secure content. Based on processing first signature information, the CDN service provider determines whether the secure content is available to the client computing device. If the CDN service provider does not maintain the requested content, the CDN service provider transmits a request to the network storage provider. Based on second signature information and an identifier associated with the CDN service provider, the network storage provider processes the request based policy information associated with the identifier.
1190 Citations
20 Claims
-
1. A system for managing content requests comprising:
-
one or more first storage devices including a hardware processor and a memory, the one or more first storage devices configured to; receive a client request for an embedded resource from a client computing device, the client request including an embedded resource identifier originally provided to the client computing device from an original content provider, the embedded resource identifier including first signature information; and provide the embedded resource to the client computing device based on verification of the first signature information; and one or more second storage devices including a hardware processor and a memory, the one or more second storage devices configured to; receive a first storage device request for the embedded resource from one of the one or more first storage devices, the first storage device request including second signature information, the second signature information being different from the first signature information; and responsive to the first storage device request, provide the embedded resource to the first storage device based on verification of the second signature information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-implemented method for managing content requests comprising:
-
receiving, by a first storage device, a client request for an embedded resource from a client computing device, the client request including an embedded resource identifier originally provided to the client computing device from an original content provider, the embedded resource identifier including first signature information; providing, by the first storage device, the embedded resource to the client computing device based at least in part on verification of the first signature information; receiving, by a second storage device, a first storage device request for the embedded resource from one or more first storage devices, the first storage device request including second signature information, the second signature information being different from the first signature information; and providing, by the second storage device, the embedded resource to the first storage device based at least in part on verification of the second signature information and in response to the first storage device request. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification