RESOURCE LOCATORS WITH KEYS

Requests are pre-generated to include a cryptographic key to be used in fulfilling the requests. The requests may be encoded in uniform resource locators and may include authentication information to enable a services provider to whom the requests are submitted to determine whether the requests are...

Full description

Saved in:
Bibliographic Details
Main Authors ROTH, Gregory Branchek, BRANDWINE, Eric Jason
Format Patent
LanguageEnglish
French
German
Published 06.09.2023
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Requests are pre-generated to include a cryptographic key to be used in fulfilling the requests. The requests may be encoded in uniform resource locators and may include authentication information to enable a services provider to whom the requests are submitted to determine whether the requests are authorized. The requests may be passed to various entities who can then submit the requests to the service provider. The service provider, upon receipt of a request, can verify the authentication information and fulfill the request using a cryptographic key encoded in the request.
Bibliography:Application Number: EP20220155709