Method for encrypting and embedding information in a URL for content delivery

Information

  • Patent Grant
  • 8887292
  • Patent Number
    8,887,292
  • Date Filed
    Monday, April 15, 2013
    11 years ago
  • Date Issued
    Tuesday, November 11, 2014
    10 years ago
Abstract
A method for accessing a remote network includes identifying a content server associated with the remote network, generating a uniform resource locator, embedding additional data in the uniform resource locator, encrypting the uniform resource locator, and accessing a server in the remote network identified by the uniform resource locator. The method further includes wherein the additional data comprises authentication data, a delivery session identification, a time stamp, or comprises subscriber identification data. The URL may provide access to the content server for a time period indicated by the time stamp. The method includes wherein at least the subscriber identification data prevents unauthorized sharing of the URL.
Description
TECHNICAL FIELD

This application is directed to a service delivery platform, and more particularly, to a system, apparatus, and method for embedding information in an encrypted uniform resource locator (URL).


BACKGROUND

With the proliferation of the interoperability of networks and the ability to have a single network access multiple remote networks, there is now the ability for a user on one network to access content on one of the other remote networks. Access to such remote networks is typically provided through a uniform resource locator (“URL”). A user will provide the URL to his or her home network and the home network will resolve the URL to determine the appropriate network which to route the requests. For example, a user in Mexico may want to access content on a network in the United States. The network in Mexico would have to know something about the structure of the network in the United States for this to occur. Assuming the proper routing logic and interconnections are in place, a URL may provide the destination point for the user.


Such remote access is powerful for those seeking content, but provides serious security risks for the content providers and the remote network being accessed. There is no way of uniquely identifying or authorizing an individual user or subscriber to access content. Moreover, once releasing the URL, there is no way for the content provider to prevent the sharing of the URL with unauthorized users. Finally, there is currently no way to limit the time duration that such access is granted, leaving the content owner exposed to obligations to provide access to content it may have legitimately sold that has never been accessed by the purchaser, even as that content has been updated.


As such, there is a need for a system and method for embedding additional data in a URL and further encrypting that URL with the additional data to provide secure access to a user on a remote network.


SUMMARY

A method for accessing a remote network includes identifying a content server associated with the remote network, generating a uniform resource locator, embedding additional data in the uniform resource locator, encrypting the uniform resource locator, and accessing a server in the remote network identified by the uniform resource locator. The method further includes wherein the additional data comprises authentication data, a delivery session identification, a time stamp, or comprises subscriber identification data. The URL may provide access to the content server for a time period indicated by the time stamp. The method includes wherein at least the subscriber identification data prevents unauthorized sharing of the URL.


The disclosure also includes a method of embedding additional data in a uniform resource locator, including generating a unique uniform resource locator comprising a data path, identifying additional data to be embedded in the URL, the additional data comprising a user identifier and a unique delivery session ID; and encrypting the unique URL including the additional data. The method further includes embedding a time stamp indicating a time period during which the URL will provide access. The additional data prevents unauthorized use of the URL.





BRIEF DESCRIPTION OF THE DRAWINGS

The following description is better understood when read in conjunction with the appended drawings, wherein



FIG. 1 is a simplified block diagram illustrating the addressing of content in a remote network in accordance with an exemplary embodiment of the disclosure;



FIG. 2 is a system diagram of an exemplary embodiment of the disclosure illustrating a service delivery hub in communication with remote networks; and



FIG. 3 is a description of an exemplary embodiment of an encrypted uniform resource locator.





DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS

For the purposes of describing an exemplary embodiment of the disclosure, reference will be made to the figures set forth above. With reference to FIG. 1, there is shown an exemplary block diagram of a computing environment 10 in which the present disclosure may be implemented. There is shown a network 112 which may, for example, be a cellular wireless network, including but not limited to CDMA, TDMA, 2.5G, 3G and 4G type networks. Network 112 may be any other type of communications network as well, including but not limited to LANa, WANa, Wi-Fi, Wi-Max, IP and other data networks, including the Internet. Network 112 may be wired or wireless or a combination of the two. Exemplary user equipment (UE) is shown as handset 114 and laptop 116, each of which is connected to network 112 via a cellular network. For the purposes of description of an embodiment, UE will be referred to generically in this disclosure as UE 114. Also connected to network 112 are external networks 118, 120, and 122. Each of the external networks 118, 120, and 122 are connected to network 112 through gateways or other communications network elements as known by those skilled in the art, and may include, for example, other cellular networks or the internet. Exemplary servers 124, 126, 128 are shown in communication with external network 118. Exemplary servers 124, 126, 128 may include servers operated by content providers or content aggregators which may be accessible by users of external network 118 or any other external networks.


An exemplary embodiment of a more robust network system in which the disclosure may be implemented is shown in FIG. 2 in which a service delivery hub 12 is used as an access point to several external networks. While the present disclosure will be described at least in part with respect to FIG. 2, there is no requirement that a service delivery hub 12 architecture be used. The disclosure is applicable to any server or sales portal. With reference to FIG. 2, there is shown a system 10 having a service delivery hub 12 in communication with network operations 16, 18, and 20. As described more fully herein, the service delivery hub 12 provides a central access point for third party application service providers (ASPs), aggregators, and enabler providers and includes a set of application programming interfaces (APIs) provided by the network provider or other third parties. The service delivery hub 12 also includes a charging gateway which provides the capability for third parties to monetize applications and a settlement center which balances accounts of multiple parties and network operators in accordance with contractual fee splitting arrangements or other mechanisms determined by the parties, so-called recursive settlements. The service delivery hub 12 also includes a control center to manage access to the system.


Referring again to FIG. 2, there is shown a third party application server 14 in communication with the service delivery hub 12. The service delivery hub 12 is targeted to produce an integration layer for access to the network operations 16, 18, and 20, specifically network elements, operational support systems and business support systems (OSS/BSS), and Internet application service providers (ASPs). The network operations 16, 18, and 20 (also referred to as networks herein) are illustrative only and could vary in number from one to many networks. The networks may be stand alone networks in a particular geographic area, which areas may be delineated on a country or state basis or any other geographic distinction. The networks may also be delineated by network operator or network type. There may also be more than one network in any one geographic region.


In the exemplary embodiment of FIG. 2, network operations 16 are designated as being in the country of Columbia, network operations 18 in Peru, and network operations 20 in Ecuador. Within each network operations 16, 18, 20, there is shown a representative sample of network subsystems contained therein and, in the case of network operations 16 in Columbia, shown numbered as 16a-16i. Those subsystems within network operations 16 include the short message service center (SMSC) 16a, multi-media service center (MMSC)16b, wireless access protocol (WAP) gateway 16c, CPW 16d, CMG 16e, enterprise data warehouse (EDW) 16f, customer care 16g, subscriber interface module (SIM) browsing 16h, and operations and maintenance (O&M)16i. It will be understood by those skilled in the art that not all subsystems are necessarily found in each network operations 16, 18, 20 and there may be other subsystems not listed above, for example, enterprise application integration (PGW) 18j, and emergency management systems (EMS) 18k are illustrated as part of network operation 18 but not as part of network operation 16.


The service delivery hub 12 exposes access to third party applications to network services provided by the network subsystems. The service delivery hub 12 supports third party developed services and controls application usage of network operations and third party services. It is preferred that the service delivery hub employ industry standards known to those skilled in the art or to be developed by the industry, including but not limited to Parlay X, SOAP, REST, HTTPS, JKD 1.5, XML, SSL+X509 certification for transport security, and WSSE username token profile security.


The service delivery hub 12, has interfaces into each of the subsystems within network operations 16, 18, 20. An exemplary methodology for using those interfaces may include establishing a VPN tunnel from the service delivery hub 12 to the subsystem of interest. Thus, if an application residing on the third party application system server 14 desires access to SMSC 16a, the service delivery hub 12 will establish a VPN tunnel or other connection to SMSC 16a thereby providing the application access to SMSC 16a.


In conjunction with the exemplary embodiments of FIG. 1 and FIG. 2, content may be provided through server 124 on external network 118 and be made available to UE 114 through network 112. In order to provide such access, a modified uniform resource locator (“URL”) may be utilized. An unmodified uniform resource locator is a uniform resource identifier (“URI”) and typically comprises data that specifies where an identified resource is available on a network and the mechanism for retrieving it. Unmodified URLs are known in the art and may comprise a scheme name or protocol, a hostname or an IP address, a port number, the path through the network, a query string and an anchor.


In an embodiment of the present disclosure, content may be made available to UE 114 through network 112 using a modified and then encrypted URL. In addition to the typical data included in a URL, additional data may be included in the modified URL and may, for example, comprise a delivery session identifier (may be a one-time identifier that is verifiable by the remote network); a time stamp, a content identifier, permission and authentication data, a MSISDN or other subscriber or UE information. The additional data may serve the function of uniquely identifying a subscriber authorized to access content found at the URL on the remote network. Such access may be further limited to a time period surrounding the generation of the modified URL. The additional data may also serve to prevent the sharing of a URL with unauthorized subscribers.



FIG. 3 shows an exemplary and non-limiting example of a modified URL. The modified URL may be formatted as shown and includes a string (element “a”) to be encrypted, a number representing the MSISDN, a string representing the URL contact path, a string representing the unique delivery session id, a string representing a time stamp, and a string representing a base 64 encoded 128 bit INITIALIZATION_VECTOR. While FIG. 3 indicates that the data fields in the modified URL are required, in accordance and consistent with the present disclosure, it will be understood that a subset of the data fields may also be present and there may be additional parameters embedded in the modified URL. Such additions or subtractions are considered within the scope of the present disclosure.


The modified URL may be encrypted to prevent or reduce the possibility of unauthorized copying and access. The URL may, for example, be encrypted using the AES256 method of encryption or any other type of encryption method now known or to be developed.


In operation, a UE 114 may desire to access hosted content external to the network 112 managing the current browsing session of the UE 114. The external content may be stored in server 124 on external network 118. In order to securely deliver the hosted content to UE 114, the method includes creating a unique and encrypted path and additional data embedded in a URL that redirects the UE 114 to the server 124 on network 118. The server 118 decrypts the URL which provides access to the content as well as access permission information verifying access to the content. The method securely masks the embedded details of the URL using encryption while providing content identification on the external network 118 without necessarily having knowledge of the external network 118. As part of the creation of the content metadata, the content provider may provide a path structure that may be included in the encrypted data thus when decrypted, the content provider will be able to decipher its own path structure to access the content for delivery. Moreover, the method provides access control limitations so that the URL may not be saved, copied or reused in any fashion without proper authorization. A timer along with user license information may be included in the URL. The timer may be used to register when the content was initially accessed may validate the access for a predetermined or variable time period. Upon the expiration of the time period, the UE 114 must request a new unique URL for access to the same content. The included license serves to identify the user for the content providers records and may also be used in a call-back function to the UE 114 as an additional verification of the validity of the license to the content. 1


The system and method provide certain benefits. It creates a trusted relationship wherein an unknown user operating UE 114 may purchase content on an external network 118 or the Internet and the delivery of such content while providing an excellent user experience. The user is able to pass securely from the purchase process on one site or one network to the delivery process of another site or another network without either entity having any real knowledge of the other's internal processes.


While the method for uniquely embedding additional data in a URL and encrypting that modified URL has been described in connection with the various embodiments of the various figures, it is to be understood that other similar embodiments can be used or modifications and additions can be made to the described embodiment for performing the same types of functionality in service delivery without deviating therefrom. For example, one skilled in the art will recognize that the system and method is not limited to any particular type of network or relationship between a hosted network and a remote network and may include operations on the Internet. Any type of telecommunications network may be supported, including but not limited to GSM, CDMA, EDGE, 3G, 4G, LTE, WiFi, Wi-Max, the Internet or any other wired or wireless network. While an exemplary list of command parameters has been described, a subset of those parameters and additional parameters may be defined by network operators or content providers. Therefore, the system and method should not be limited to any single embodiment, but rather should be construed in breadth and scope in accordance with the appended claims.

Claims
  • 1. A server comprising: a processor; andmemory coupled to the processor, the memory comprising executable instructions that when executed by the processor cause the processor to effectuate operations comprising: generating a uniform resource locator;embedding additional data in the uniform resource locator, wherein:the additional data comprises subscriber identification data; andthe subscriber identification data prevents unauthorized sharing of the uniform resource locator;encrypting the uniform resource locator; andaccessing a server in the remote network identified by the uniform resource locator.
  • 2. The server of claim 1, wherein the additional data comprises authentication data.
  • 3. The server of claim 1, wherein the additional data comprises a delivery session identification.
  • 4. The server of claim 1, wherein the additional data comprises a time stamp.
  • 5. The server of claim 4, wherein the URL provides access to a content server for a time period indicated by the time stamp.
  • 6. The server of claim 1, wherein the additional data comprises subscriber identification data.
  • 7. The server of claim 6, wherein at least the subscriber identification data prevents unauthorized sharing of the URL.
  • 8. The server of claim 1, wherein the additional data prevents unauthorized sharing of the uniform resource locator.
  • 9. A server comprising: a processor; andmemory coupled to the processor, the memory comprising executable instructions that when executed by the processor cause the processor to effectuate operations comprising: generating a unique uniform resource locator comprising a data path;identifying additional data to be embedded in a unique uniform resource locator, the additional data comprising a user identifier and a unique delivery session ID, wherein the user identifier prevents unauthorized sharing of the unique uniform resource locator; andencrypting the unique uniform resource locator including the additional data.
  • 10. The server of claim 9, the operations further comprising embedding a time stamp indicating a time period during which the URL will provide access.
  • 11. The server of claim 10, wherein the additional data prevents unauthorized use of the URL.
  • 12. The server of claim 9, wherein the additional data prevents unauthorized use of the URL.
  • 13. A method comprising: generating a uniform resource locator;embedding additional data in the uniform resource locator, wherein:the additional data comprises subscriber identification data; andthe subscriber identification data prevents unauthorized sharing of the uniform resource locator;encrypting the uniform resource locator; andaccessing a server in the remote network identified by the uniform resource locator.
  • 14. The method of claim 13, wherein the additional data comprises authentication data.
  • 15. The method of claim 13, wherein the additional data comprises a delivery session identification.
  • 16. The method of claim 13, wherein the additional data comprises a time stamp.
  • 17. The method of claim 16, wherein the URL provides access to a content server for a time period indicated by the time stamp.
  • 18. The method of claim 13, wherein the additional data comprises subscriber identification data.
  • 19. The method of claim 18, wherein at least the subscriber identification data prevents unauthorized sharing of the URL.
  • 20. The method of claim 13, wherein the additional data prevents unauthorized sharing of the uniform resource locator.
CROSS-RELATED UNITED STATES APPLICATIONS

The instant application is a continuation application of, and claims priority to, U.S. patent application Ser. No. 12/847,731, filed Jul. 30, 2010 now U.S. Pat. No. 8,479,298. U.S. patent application Ser. No. 12/847,731 is hereby incorporated by reference in its entirety.

US Referenced Citations (57)
Number Name Date Kind
6317718 Fano Nov 2001 B1
6360167 Millington et al. Mar 2002 B1
6993580 Isherwood et al. Jan 2006 B2
6993707 Baker et al. Jan 2006 B2
7103351 Chaudhari et al. Sep 2006 B2
7127609 Royer et al. Oct 2006 B2
7171567 Bayer et al. Jan 2007 B1
7203838 Glazer et al. Apr 2007 B1
7254387 Dunlop et al. Aug 2007 B2
7299500 Klebe et al. Nov 2007 B1
7533144 Kassab May 2009 B2
7685422 Isozaki et al. Mar 2010 B2
7716077 Mikurak May 2010 B1
7752080 Greener Jul 2010 B1
7752292 Katzer Jul 2010 B1
7870293 Tso Jan 2011 B2
7912445 Maes Mar 2011 B2
7941557 Zhu et al. May 2011 B2
7941562 Cheng et al. May 2011 B2
8032397 Lawless Oct 2011 B2
8086219 O'Neil et al. Dec 2011 B2
8099316 Moukas et al. Jan 2012 B2
8160916 Moukas et al. Apr 2012 B2
8204202 Tao Jun 2012 B2
8479298 Keith et al. Jul 2013 B2
20010005372 Cave et al. Jun 2001 A1
20020087661 Matichuk et al. Jul 2002 A1
20020091568 Kraft et al. Jul 2002 A1
20020138331 Hosea et al. Sep 2002 A1
20030032409 Hutcheson et al. Feb 2003 A1
20030120502 Robb et al. Jun 2003 A1
20030151619 McBride Aug 2003 A1
20030158930 McBride Aug 2003 A1
20050015340 Maes Jan 2005 A1
20050034063 Baker et al. Feb 2005 A1
20070027784 Kahn, IV et al. Feb 2007 A1
20070047523 Jiang Mar 2007 A1
20070130505 Woods Jun 2007 A1
20080154656 Kail et al. Jun 2008 A1
20090019535 Mishra et al. Jan 2009 A1
20090138563 Zhu et al. May 2009 A1
20090156213 Spinelli et al. Jun 2009 A1
20090185669 Zitnik et al. Jul 2009 A1
20090210702 Welingkar et al. Aug 2009 A1
20100042688 Maghraby Feb 2010 A1
20100077321 Shen et al. Mar 2010 A1
20100080361 Houghton Apr 2010 A1
20100138480 Benedetto Jun 2010 A1
20100280962 Chan Nov 2010 A1
20100292556 Golden Nov 2010 A1
20110131408 Cook et al. Jun 2011 A1
20110225060 Dunmire Sep 2011 A1
20110225061 Keith et al. Sep 2011 A1
20110225320 Keith et al. Sep 2011 A1
20110225636 Keith Sep 2011 A1
20120030019 Dunmire et al. Feb 2012 A1
20120030478 Dunmire Feb 2012 A1
Non-Patent Literature Citations (8)
Entry
U.S. Appl. No. 12/720,217, filed Mar. 9, 2010, David Dunmire.
U.S. Appl. No. 12/720,277, filed Mar. 9, 2010, Chad C. Keith.
U.S. Appl. No. 12/720,300, filed Mar. 9, 2010, Chad C. Keith.
U.S. Appl. No. 12/847,635, filed Jul. 30, 2010, David Dunmire.
U.S. Appl. No. 12/847,774, filed Jul. 30, 2010, David Dunmire.
U.S. Appl. No. 12/847,793, filed Jul. 30, 2010, Chad C. Keith.
Kushan, Mitra, “The next 400 million; Through voice still remains the money spinner, telecom operators and handset makers are betting big on services to acquire the next 400 million customers. Kushan Mitra goes into the details”, Business Today, New Delhi, May 3, 2009, pp. 1-7.
M2 Presswire, “IMImobile: IMImobile Announces first fully Integrated MobileAd Platform”, Coventry: Jan. 22, 2008, p. 1.
Related Publications (1)
Number Date Country
20130227713 A1 Aug 2013 US
Continuations (1)
Number Date Country
Parent 12847731 Jul 2010 US
Child 13862534 US