×

Method and apparatus for providing a scalable service platform using a network cache

  • US 9,992,015 B2
  • Filed: 04/30/2013
  • Issued: 06/05/2018
  • Est. Priority Date: 06/30/2009
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • encrypting, utilizing at least one processor, a resource with a second authorization key,wherein the resource is encrypted with the second authorization key through an access control service platform to include information specifying a user entity is permitted to decrypt the encrypted resource,wherein the second authorization key is not specific to the user identity,wherein the second authorization key includes a protocol specific hash associated with the resource,wherein the resource is identified with the user identity through the user entity uploading the resource to the access control service platform,wherein information identifying the user entity is included in a header of a packet including the encrypted resource;

    encrypting data known to the user entity with the second authorization key;

    determining a first authorization key for the user entity through the access control service platform;

    encrypting, utilizing the at least one processor, the second authorization key with the first authorization key,wherein the first authorization key is configured to be utilized by the user entity,wherein the first authorization key is generated based on a previous registration of the user entity with the access control service platform;

    initiating a distribution, to the user entity, of the encrypted resource with the encrypted second authorization key,wherein the distribution further includes the encrypted data, the encrypted second authorization key is decrypted with the first authorization key, the encrypted data is decrypted with the decrypted second authorization key, and the encrypted resource is decrypted with the decrypted second authorization key when the decrypted data matches with the data known to the user entity; and

    initiating a caching of the encrypted second authorization key with the encrypted resource in a network cache located, remote from an origin point of the distribution, on a network path.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×