최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0800591 (2015-07-15) |
등록번호 | US-9712325 (2017-07-18) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 43 인용 특허 : 422 |
A system, method, and computer readable medium for managing secure content by CDN service providers are provided. A network storage provider stores one or more resources on behalf of a content provider. A CDN service provider obtains client computing device requests for secure content. Based on proc
A system, method, and computer readable medium for managing secure content by CDN service providers are provided. A network storage provider stores one or more resources on behalf of a content provider. A CDN service provider obtains client computing device requests for secure content. Based on processing first signature information, the CDN service provider determines whether the secure content is available to the client computing device. If the CDN service provider does not maintain the requested content, the CDN service provider transmits a request to the network storage provider. Based on second signature information and an identifier associated with the CDN service provider, the network storage provider processes the request based policy information associated with the identifier.
1. A system for managing content requests comprising: one or more first storage devices including a hardware processor and a memory, the one or more first storage devices configured to:receive a client request for an embedded resource from a client computing device, the client request including an e
1. A system for managing content requests comprising: one or more first storage devices including a hardware processor and a memory, the one or more first storage devices configured to:receive a client request for an embedded resource from a client computing device, the client request including an embedded resource identifier originally provided to the client computing device from an original content provider, the embedded resource identifier including first signature information; andprovide the embedded resource to the client computing device based on verification of the first signature information; andone or more second storage devices including a hardware processor and a memory, the one or more second storage devices configured to:receive a first storage device request for the embedded resource from one of the one or more first storage devices, the first storage device request including second signature information, the second signature information being different from the first signature information; andresponsive to the first storage device request, provide the embedded resource to the first storage device based on verification of the second signature information. 2. The system as recited in claim 1, wherein the client request comprises a DNS query associated with the embedded resource. 3. The system as recited in claim 1, wherein the second signature information is originally provided by the one or more second storage devices. 4. The system as recited in claim 1, wherein the one or more second storage devices provide the embedded resource further in accordance with policies associated with the embedded resource identifier. 5. The system as recited in claim 4, wherein the policies associated with the embedded resource identifier correspond to an access control list associated with the embedded resource identifier. 6. The system as recited in claim 5, wherein the access control list identifies one or more entities that may access the requested embedded resource. 7. The system as recited in claim 6, wherein the access control list defines one or more parameters associated with access to the embedded resource by the one or more identified entities. 8. The system as recited in claim 5, wherein the access control list defines one or more parameters associated with the requested embedded resource. 9. The system as recited in claim 8, wherein the one or more parameters include expiration data associated with the embedded resource. 10. The system as recited in claim 1, wherein a secure information verification service verifies the first signature information and wherein the secure information verification service is distinct from the one or more first storage devices. 11. The system as recited in claim 1, wherein a secure information verification service verifies the second signature information and wherein the secure information verification service is distinct from the one or more second storage devices. 12. A computer-implemented method for managing content requests comprising: receiving, by a first storage device, a client request for an embedded resource from a client computing device, the client request including an embedded resource identifier originally provided to the client computing device from an original content provider, the embedded resource identifier including first signature information;providing, by the first storage device, the embedded resource to the client computing device based at least in part on verification of the first signature information;receiving, by a second storage device, a first storage device request for the embedded resource from one or more first storage devices, the first storage device request including second signature information, the second signature information being different from the first signature information; andproviding, by the second storage device, the embedded resource to the first storage device based at least in part on verification of the second signature information and in response to the first storage device request. 13. The computer-implemented method as recited in claim 12, wherein the second signature information is originally provided by a network storage computing device. 14. The computer-implemented method as recited in claim 13, wherein the network storage computing device provides the embedded resource further in accordance with policies associated with the embedded resource identifier. 15. The computer-implemented method as recited in claim 14, wherein the policies associated with the embedded resource identifier correspond to an access control list associated with the embedded resource identifier. 16. The computer-implemented method as recited in claim 15, wherein the access control list identifies one or more entities that may access the embedded resource. 17. The computer-implemented method as recited in claim 15, wherein the access control list defines one or more parameters associated with the embedded resource. 18. The computer-implemented method as recited in claim 17, wherein the one or more parameters include expiration data associated with the embedded resource. 19. The computer-implemented method as recited in claim 12 further comprising verifying, by a content delivery network computing device, the first signature information to verify that the client request for the embedded resource has been authorized by the original content provider. 20. The computer-implemented method as recited in claim 12 further comprising verifying, by a network storage computing device, the second signature information to verify that the first storage device request for the embedded resource has been authorized.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.