17837764. INTERNET PROTOCOL (IP) WHITELISTING FOR SIGNED UNIFORM RESOURCE LOCATORS (URLS) simplified abstract (Capital One Services, LLC)

From WikiPatents
Jump to navigation Jump to search

INTERNET PROTOCOL (IP) WHITELISTING FOR SIGNED UNIFORM RESOURCE LOCATORS (URLS)

Organization Name

Capital One Services, LLC

Inventor(s)

Hari Hara Sudhan Gnanaprakasam of Glen Allen VA (US)

Kimberly Russo of Riverton UT (US)

Sharath Kumar Sheshadri of Livermore CA (US)

INTERNET PROTOCOL (IP) WHITELISTING FOR SIGNED UNIFORM RESOURCE LOCATORS (URLS) - A simplified explanation of the abstract

This abstract first appeared for US patent application 17837764 titled 'INTERNET PROTOCOL (IP) WHITELISTING FOR SIGNED UNIFORM RESOURCE LOCATORS (URLS)

Simplified Explanation

The patent application describes a system for implementing IP address whitelisting for signed URLs. Here is a simplified explanation of the abstract:

  • The system receives a request from a user device to access a resource.
  • It authenticates the user device and generates a pre-signed URL that indicates the location of the resource.
  • The system then generates a signed URL by adding the identifier of the user device to the pre-signed URL.
  • When a second request to access the resource is received, the system compares the identifier of the second request with the identifier in the signed URL.
  • Based on this comparison, the system either grants or denies access to the resource.

Potential applications of this technology:

  • Secure access control for online resources.
  • Protection against unauthorized access to sensitive information.
  • Preventing unauthorized downloads or sharing of files.

Problems solved by this technology:

  • Ensures that only authenticated user devices can access the resource.
  • Provides an additional layer of security by comparing identifiers in the signed URL.
  • Helps prevent unauthorized access and potential data breaches.

Benefits of this technology:

  • Enhanced security for online resources.
  • Simplified access control process.
  • Improved protection against unauthorized access and data breaches.


Original Abstract Submitted

Systems as described herein may implement IP address whitelisting for signed Uniform Resource Locators (URLs). A computing device may receive, from a first user device, a first request to access a resource. The computing device may determine a first identifier of the first user device. After an authentication of the first user device, the computing device may generate a pre-signed URL indicating a location of the resource. The computing device may generate a signed URL by prefixing the pre-signed URL with the first identifier of the first user device. The computing device may receive a second request to access the resource. Based on comparing a second identifier corresponding to the second request with the first identifier in the signed URL, the computing device may grant or deny the second request access to the resource.