Method and apparatus for providing a scalable service platform using a network cache
First Claim
1. A method comprising:
- encrypting, utilizing at least one processor, a resource with a second authorization key,wherein the resource is encrypted with the second authorization key through an access control service platform to include information specifying a user entity is permitted to decrypt the encrypted resource,wherein the second authorization key is not specific to the user identity,wherein the second authorization key includes a protocol specific hash associated with the resource,wherein the resource is identified with the user identity through the user entity uploading the resource to the access control service platform,wherein information identifying the user entity is included in a header of a packet including the encrypted resource;
encrypting data known to the user entity with the second authorization key;
determining a first authorization key for the user entity through the access control service platform;
encrypting, utilizing the at least one processor, the second authorization key with the first authorization key,wherein the first authorization key is configured to be utilized by the user entity,wherein the first authorization key is generated based on a previous registration of the user entity with the access control service platform;
initiating a distribution, to the user entity, of the encrypted resource with the encrypted second authorization key,wherein the distribution further includes the encrypted data, the encrypted second authorization key is decrypted with the first authorization key, the encrypted data is decrypted with the decrypted second authorization key, and the encrypted resource is decrypted with the decrypted second authorization key when the decrypted data matches with the data known to the user entity; and
initiating a caching of the encrypted second authorization key with the encrypted resource in a network cache located, remote from an origin point of the distribution, on a network path.
2 Assignments
0 Petitions
Accused Products
Abstract
An approach is provided for building a scalable service platform by initiating transmission of encrypted data from a public network cache. An access control server platform determines a first authorization key for a user and a second authorization key for a resource, and then encrypts the resource with the second authorization key, and encrypts the second authorization key with the first authorization key. The access control server platform initiates distribution of the encrypted second authorization key with the encrypted resource over a network. The access control server platform further initiates caching the encrypted second authorization key with the encrypted resource that meets a predefined threshold value (e.g., a data size, an access frequency, a modification frequency, or an auditing requirement) in a cache in the network, and initiates transmission of the cached and encrypted second authorization key with the cached and encrypted resource from the cache to at least one authorized entity.
-
Citations
20 Claims
-
1. A method comprising:
-
encrypting, utilizing at least one processor, a resource with a second authorization key, wherein the resource is encrypted with the second authorization key through an access control service platform to include information specifying a user entity is permitted to decrypt the encrypted resource, wherein the second authorization key is not specific to the user identity, wherein the second authorization key includes a protocol specific hash associated with the resource, wherein the resource is identified with the user identity through the user entity uploading the resource to the access control service platform, wherein information identifying the user entity is included in a header of a packet including the encrypted resource; encrypting data known to the user entity with the second authorization key; determining a first authorization key for the user entity through the access control service platform; encrypting, utilizing the at least one processor, the second authorization key with the first authorization key, wherein the first authorization key is configured to be utilized by the user entity, wherein the first authorization key is generated based on a previous registration of the user entity with the access control service platform; initiating a distribution, to the user entity, of the encrypted resource with the encrypted second authorization key, wherein the distribution further includes the encrypted data, the encrypted second authorization key is decrypted with the first authorization key, the encrypted data is decrypted with the decrypted second authorization key, and the encrypted resource is decrypted with the decrypted second authorization key when the decrypted data matches with the data known to the user entity; and initiating a caching of the encrypted second authorization key with the encrypted resource in a network cache located, remote from an origin point of the distribution, on a network path. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following; encrypt a resource with a second authorization key, wherein the resource is encrypted with the second authorization key through an access control service platform to include information specifying a user entity is permitted to decrypt the encrypted resource, wherein the second authorization key is not specific to the user identity, wherein the second authorization key includes a protocol specific hash associated with the resource, wherein the resource is identified with the user identity through the user entity uploading the resource to the access control service platform, wherein information identifying the user entity is included in a header of a packet including the encrypted resource, encrypt data known to the user entity with the second authorization key, determine a first authorization key for the user entity through the access control service platform, encrypt the second authorization key with the first authorization key, wherein the first authorization key is configured to be utilized by the user entity, wherein the first authorization key is generated based on a previous registration of the user entity with the access control service platform, initiate a distribution, to the user entity, of the encrypted resource with the encrypted second authorization key, wherein the distribution further includes the encrypted data, the encrypted second authorization key is decrypted with the first authorization key, the encrypted data is decrypted with the decrypted second authorization key, and the encrypted resource is decrypted with the decrypted second authorization key when the decrypted data matches with the data known to the user entity, and initiate a caching of the encrypted second authorization key with the encrypted resource in a network cache located, remote from an origin point of the distribution, on a network path. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium carrying one or more sequences of one or more instructions which, when executed by one or more processors, cause an apparatus to perform at least the following:
-
encrypting, utilizing at least one processor, a resource with a second authorization key, wherein the resource is encrypted with the second authorization key through an access control service platform to include information specifying a user entity is permitted to decrypt the encrypted resource, wherein the second authorization key is not specific to the user identity, wherein the second authorization key includes a protocol specific hash associated with the resource, wherein the resource is identified with the user identity through the user entity uploading the resource to the access control service platform, wherein information identifying the user entity is included in a header of a packet including the encrypted resource; encrypting data known to the user entity with the second authorization key determining a first authorization key for the user entity through the access control service platform; encrypting, utilizing the at least one processor, the second authorization key with a first authorization key, wherein the first authorization key is configured to be utilized by the user entity, wherein the first authorization key is generated based on a previous registration of the user entity with the access control service platform; initiating a distribution, to the user entity, of the encrypted resource with the encrypted second authorization key, wherein the distribution further includes the encrypted data, the encrypted second authorization key is decrypted with the first authorization key, the encrypted data is decrypted with the decrypted second authorization key, and the encrypted resource is decrypted with the decrypted second authorization key when the decrypted data matches with the data known to the user entity; and initiating a caching of the encrypted second authorization key with the encrypted resource in a network cache located, remote from an origin point of the distribution, on a network path. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification