Resource locators with keys
First Claim
Patent Images
1. A system, comprising:
- one or more processors; and
memory including instructions that, as a result of execution by the one or more processors, cause the system to;
receive a request associated with a first entity, the request including a pre-generated portion that includes authorization information generated by a second entity and a cryptographic key, wherein the authorization information includes an electronic signature generated based at least in part on a signing key associated with the second entity;
on a condition that the authorization information is determined to indicate authorization by the second entity to fulfill the request, fulfill the request at least in part by performing one or more operations using the cryptographic key by at least using a plaintext version of the cryptographic key as input into a cryptographic algorithm, wherein the authorization information indicating authorization by the second entity requires the electronic signature to be valid; and
provide a result of the performed one or more operations.
1 Assignment
0 Petitions
Accused Products
Abstract
Requests are pre-generated to include a cryptographic key to be used in fulfilling the requests. The requests may be encoded in uniform resource locators and may include authentication information to enable a service provider to whom the requests are submitted to determine whether the requests are authorized. The requests may be passed to various entities who can then submit the requests to the service provider. The service provider, upon receipt of a request, can verify the authentication information and fulfill the request using a cryptographic key encoded in the request.
220 Citations
22 Claims
-
1. A system, comprising:
-
one or more processors; and memory including instructions that, as a result of execution by the one or more processors, cause the system to; receive a request associated with a first entity, the request including a pre-generated portion that includes authorization information generated by a second entity and a cryptographic key, wherein the authorization information includes an electronic signature generated based at least in part on a signing key associated with the second entity; on a condition that the authorization information is determined to indicate authorization by the second entity to fulfill the request, fulfill the request at least in part by performing one or more operations using the cryptographic key by at least using a plaintext version of the cryptographic key as input into a cryptographic algorithm, wherein the authorization information indicating authorization by the second entity requires the electronic signature to be valid; and provide a result of the performed one or more operations. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-implemented method, comprising:
-
receiving a request to perform one or more operations using a cryptographic key lacked by the one or more computer systems prior to receipt of the request, the request associated with a first entity and including a pre-generated portion that includes authorization information generated by a second entity and a cryptographic key, wherein the authorization information includes an electronic signature generated based at least in part on a signing key associated with the second entity; on a condition that the authorization information is determined to indicate authorization by the second entity to fulfill the request, fulfill the request at least in part by performing one or more operations using the cryptographic key by at least using a plaintext version of the cryptographic key as an input into a cryptographic algorithm, wherein the authorization information indicating authorization by the second entity requires the electronic signature to be valid; and providing the result of the one or more operations in accordance with the request. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium having stored thereon instructions that, as a result of execution by one or more processors of a computer system, cause the computer system to:
-
generate information that encodes a request and a cryptographic key; generate authorization information verifiable by a service provider capable of fulfilling the request, wherein the authorization information including an electronic signature generated based at least in part on a signing key and wherein the authorization information indicating authorization to fulfill the request requires the electronic signature to be valid; and make available the information and the authorization information to enable the information and authorization information to be provided to the service provider to cause the service provider to use the cryptographic key to fulfill the request by at least using a plaintext version of the cryptographic key as input into a cryptographic algorithm. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
Specification