Secure resource distribution through encrypted pointers
First Claim
1. A secure pointer article of manufacture comprising:
- an encrypted pointer to a resource disposed in a communicatively coupled computing device;
a network address of a server computing device able to locate said resource based upon a decrypted form of said encrypted pointer; and
, an encrypted wrapper about said encrypted pointer and said network address.
1 Assignment
0 Petitions
Accused Products
Abstract
A secure pointer. The secure pointer can include an encrypted pointer to a resource disposed in a communicatively coupled computing device. The secure pointer also can include a network address of a server computing device able to locate the resource based upon a decrypted form of the encrypted pointer. Finally, the secure pointer can include an encrypted wrapper about the encrypted pointer and the network address. Notably, the encrypted pointer can be encrypted and decrypted according to a local encryption/decryption key known to the server computing device. Yet, the encrypted wrapper can be encrypted according to a public encryption key while the encrypted wrapper can be decrypted according to a private encryption key corresponding to the public encryption key.
65 Citations
21 Claims
-
1. A secure pointer article of manufacture comprising:
-
an encrypted pointer to a resource disposed in a communicatively coupled computing device;
a network address of a server computing device able to locate said resource based upon a decrypted form of said encrypted pointer; and
,an encrypted wrapper about said encrypted pointer and said network address. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for securely distributing a requested resource to a requesting client over a computer communications network, the method comprising the steps of:
-
identifying a public encryption key for the requesting client;
locating the requested resource;
composing a pointer based upon said location and encrypting said composed pointer using a local encryption/decryption key;
combining said encrypted pointer with a network address of a server coupled to a decoding processor configured to decrypt said encrypted pointer with said local encryption/decryption key; and
,encrypting said combination with said public encryption key and forwarding said encrypted combination to the requesting client;
whereby the requesting client both can decrypt said encrypted combination using a private encryption key corresponding to said public encryption key, and also can access the requested resource by transmitting said combination to said server coupled to said decoding processor. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13)
-
-
14. A machine readable storage having stored thereon a computer program for securely distributing a requested resource to a requesting client over a computer communications network, the computer program comprising a routine set of instructions for causing the machine to perform the steps of:
-
identifying a public encryption key for the requesting client;
locating the requested resource;
composing a pointer based upon said location and encrypting said composed pointer using a local encryption/decryption key;
combining said encrypted pointer with a network address of a server coupled to a decoding processor configured to decrypt said encrypted pointer with said local encryption/decryption key; and
,encrypting said combination with said public encryption key and forwarding said encrypted combination to the requesting client;
whereby the requesting client both can decrypt said encrypted combination using a private encryption key corresponding to said public encryption key, and also can access the requested resource by transmitting said combination to said server coupled to said decoding processor. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
Specification