×

Delegate authorization in cloud-based storage system

  • US 9,209,973 B2
  • Filed: 11/20/2012
  • Issued: 12/08/2015
  • Est. Priority Date: 11/20/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method performed by one or more processors, the method comprising:

  • receiving, at a hosted storage service, a resource and a request to store the resource, the request including a location of an access control service, wherein the access control service is separate from the hosted storage service and controls access permissions for the resource;

    storing, at the hosted storage service, the resource in association with metadata that indicates the location of the access control service;

    receiving, at the hosted storage service and from a client system, a request to access the stored resource;

    accessing, at the hosted storage service, the metadata stored in association with the resource;

    determining, at the hosted storage service and based on the metadata, that access permissions for the resource are controlled by the access control service;

    in response to determining that access permissions for the resource are controlled by the access control service, sending an access request from the hosted storage service to the access control service, the access request identifying the resource and a user of the client system;

    receiving, at the hosted storage service and from the access control service, an access response that indicates the user is permitted to access the resource; and

    in response to receiving the access response, sending the resource from the hosted storage service to the client system, wherein the resource is encrypted by a content provider with a first key before the resource is received at the hosted storage service;

    receiving, at the hosted storage service, the first key encrypted with a client key; and

    sending, by the hosted storage service and to the client system, the first key encrypted with the client key for decryption by the client using the client key, wherein the first key encrypted with a client key is received from an access keystore that is subject to a different administrative control than the hosted storage service and subject to a different administrative control than the access control service.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×