최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0597841 (2017-05-17) |
등록번호 | US-10135620 (2018-11-20) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 2 인용 특허 : 483 |
A system, method, and computer readable medium for managing secure content by CDN service providers are provided. A network storage provider stores one or more resources on behalf of a content provider. A CDN service provider obtains client computing device requests for secure content. Based on proc
A system, method, and computer readable medium for managing secure content by CDN service providers are provided. A network storage provider stores one or more resources on behalf of a content provider. A CDN service provider obtains client computing device requests for secure content. Based on processing first signature information, the CDN service provider determines whether the secure content is available to the client computing device. If the CDN service provider does not maintain the requested content, the CDN service provider transmits a request to the network storage provider. Based on second signature information and an identifier associated with the CDN service provider, the network storage provider processes the request based policy information associated with the identifier.
1. A system for managing content requests comprising: one or more first storage devices including a hardware processor and a memory, the one or more first storage devices configured to: receive a client request for a resource from a client computing device, the client request including first signatu
1. A system for managing content requests comprising: one or more first storage devices including a hardware processor and a memory, the one or more first storage devices configured to: receive a client request for a resource from a client computing device, the client request including first signature information; andprovide the resource to the client computing device based on processing the first signature information to authorize the client request; andone or more second storage devices including a hardware processor and a memory, the one or more second storage devices configured to: receive a first storage device request for the resource from one of the one or more first storage devices, the first storage device request including second signature information, the second signature information being different from the first signature information; andprovide the resource to the first storage device based on processing the second signature information to authorize the first storage device request. 2. The system as recited in claim 1, wherein the client request comprises a DNS query associated with the resource. 3. The system as recited in claim 1, wherein the second signature information is originally provided by the one or more second storage devices. 4. The system as recited in claim 1, wherein processing the first signature information to authorize the client request comprises using the first signature information to verify that the client request for the resource is authorized by an original content provider. 5. The system as recited in claim 1, wherein the one or more first storage devices are provided by a content delivery network (CDN) provider. 6. The system as recited in claim 5, wherein the one or more second storage devices are provided by a network storage provider. 7. The system as recited in claim 6, wherein the resource is originally provided by an original content provider. 8. The system as recited in claim 1, wherein the one or more second storage devices provide the resource further in accordance with policies associated with a uniform resource locator (URL) corresponding to the client request. 9. The system as recited in claim 8, wherein the policies associated with the URL correspond to an access control list associated with the URL. 10. The system as recited in claim 9, wherein the access control list identifies one or more entities that may access the resource. 11. The system as recited in claim 10, wherein the access control list defines one or more parameters associated with access to the resource by the one or more identified entities. 12. A computer-implemented method comprising: receiving, from one or more first storage devices, a client request for a resource from a client computing device, the client request including first signature information;receiving, from one or more second storage devices, a first storage device request for the resource from one of the one or more first storage devices, the first storage device request including second signature information, the second signature information being different from the first signature information;providing, by the one or more second storage devices, the resource to the first storage device based on processing the second signature information to authorize the first storage device request; andproviding, by the one or more first storage devices, the resource to the client computing device based on processing the first signature information to authorize the client request. 13. The computer-implemented method as recited in claim 12, wherein the client request comprises a DNS query associated with the resource. 14. The computer-implemented method as recited in claim 12, wherein the second signature information is originally provided by the one or more second storage devices. 15. The computer-implemented method as recited in claim 12, wherein processing the first signature information to authorize the client request comprises using the first signature information to verify that the client request for the resource is authorized by an original content provider. 16. The computer-implemented method as recited in claim 12, wherein the one or more first storage devices are provided by a content delivery network (CDN) provider. 17. The computer-implemented method as recited in claim 16, wherein the one or more second storage devices are provided by a network storage provider. 18. The computer-implemented method as recited in claim 17, wherein the resource is originally provided by an original content provider. 19. The computer-implemented method as recited in claim 12, wherein the one or more second storage devices provide the resource further in accordance with policies associated with a uniform resource locator (URL) corresponding to the client request. 20. The computer-implemented method as recited in claim 19, wherein the policies associated with the URL correspond to an access control list associated with the URL. 21. The computer-implemented method as recited in claim 20, wherein the access control list identifies one or more entities that may access the resource. 22. The computer-implemented method as recited in claim 21, wherein the access control list defines one or more parameters associated with access to the resource by the one or more identified entities.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.