Resource locators with keys

ABSTRACT

Requests are pre-generated to include a cryptographic key to be used in fulfilling the requests. The requests may be encoded in uniform resource locators and may include authentication information to enable a service provider to whom the requests are submitted to determine whether the requests are authorized. The requests may be passed to various entities who can then submit the requests to the service provider. The service provider, upon receipt of a request, can verify the authentication information and fulfill the request using a cryptographic key encoded in the request.

CROSS REFERENCE TO RELATED APPLICATIONS

This application incorporates by reference for all purposes the fulldisclosure of co-pending U.S. patent application Ser. No. 14/037,292,filed concurrently herewith, entitled “DATA SECURITY USINGREQUEST-SUPPLIED KEYS”.

BACKGROUND

The security of computing resources and associated data is of highimportance in many contexts. As an example, organizations often utilizenetworks of computing devices to provide a robust set of services totheir users. Networks often span multiple geographic boundaries andoften connect with other networks. An organization, for example, maysupport its operations using both internal networks of computingresources and computing resources managed by others. Computers of theorganization, for instance, may communicate with computers of otherorganizations to access and/or provide data while using services ofanother organization. In many instances, organizations configure andoperate remote networks using hardware managed by other organizations,thereby reducing infrastructure costs and achieving other advantages.With such configurations of computing resources, ensuring that access tothe resources and the data they hold is secure can be challenging,especially as the size and complexity of such configurations grow.

BRIEF DESCRIPTION OF THE DRAWINGS

Various embodiments in accordance with the present disclosure will bedescribed with reference to the drawings, in which:

FIG. 1 shows an illustrative example of an environment in which variousembodiments can be implemented;

FIG. 2 shows an illustrative example of an environment in which variousembodiments can be implemented;

FIG. 3 shows an illustrative example of a uniform resource located (URL)in accordance with at least one embodiment;

FIG. 4 shows another example of a URL in accordance with at least oneembodiment;

FIG. 5 shows an illustrative example of a process for providing accessto data in accordance with at least one embodiment;

FIG. 6 shows an illustrative example of a webpage in accordance with atleast one embodiment;

FIG. 7 shows an illustrative example of a process for obtaining accessto data in accordance with at least one embodiment;

FIG. 8 shows an illustrative example of a process for processing arequest in accordance with at least one embodiment;

FIG. 9 shows an illustrative example of a process for requesting andproviding access to data in accordance with at least one embodiment; and

FIG. 10 illustrates an environment in which various embodiments can beimplemented.

DETAILED DESCRIPTION

In the following description, various embodiments will be described. Forpurposes of explanation, specific configurations and details are setforth in order to provide a thorough understanding of the embodiments.However, it will also be apparent to one skilled in the art that theembodiments may be practiced without the specific details. Furthermore,well-known features may be omitted or simplified in order not to obscurethe embodiment being described.

Techniques described and suggested herein include uses of uniformresource locators (URLs) and other references to computing resources(generally “resource locators”) to enable access to services of aservice provider. While URLs are used throughout the present disclosurefor the purpose of illustration, it should be understood that thetechniques described herein are generally applicable to other resourcelocators (i.e., instances of information usable by a system to locate acomputing resource within the system). Moreover, the techniquesdescribed herein are generally applicable to electronic requests.

In an embodiment, a customer of a service provider (e.g., computingresource service provider) utilizes one or more services of the serviceprovider. As an example, the customer may utilize data storage servicesof the service provider to achieve various advantages, such as reducedcapital expense, simpler data management, higher availability, lowerlatency due to distributed data processing facilities and the like. Toenable others (e.g., customers of the customer or, generally, usersauthorized by the customer) to access resources of the customer managedby the provider, the customer may utilize pre-signed URLs. To generate apre-signed URL, the customer may generate a URL (or, generally, arequest) and an electronic (digital) signature of a portion of the URL.The portion of the URL used to generate the electronic signature mayinclude a cryptographic key to be used in processing the request. Thecryptographic key may be provided in various forms. For example, thecryptographic key may be a plaintext symmetric key, a plaintext publickey of a public-private key pair, or a symmetric key encrypted in a waythat the service provider is able to decrypt or have decrypted to usethe key to perform one or more cryptographic operations to fulfill therequest.

Generally, the URL may be configured to encode a request, acryptographic key, and authorization information which may includeauthentication information (e.g., electronic signature) usable to verifythe request. The URL may be provided from the customer to anotherentity, not necessarily a third party, that, while referred to in thepresent disclosure as a third party, can be any entity authorized by thecustomer to cause the service provider to fulfill the request. The URLmay be provided to the third party in various ways. For example, in someembodiments, the URL is provided in a web page or other organization ofcontent transmitted over a network to the third party. Providing of theURL may be subject to one or more conditions, such as receipt of validlogin credentials from the third party, receipt of payment or a promiseto pay from the third party and/or other conditions.

The third party may submit the request to the service provider to causethe service provider to fulfill the request. Prior to submission of therequest, the third party may add additional information to the request,such as data to be operated on and/or one or more values of one or moreparameters that indicate to the service provider how the request is tobe processed. For example, the parameters may specify a selection of anencryption scheme and/or mode of an encryption scheme to use from aplurality of encryption schemes/modes that the service provider isconfigured with the ability to use.

Upon receipt of the request, the service provider may check the validityof the electronic signature to determine whether to fulfill the request.Other operations may be performed in determining whether to fulfill therequest, such as determining whether fulfillment of the request would bein compliance with any applicable policy and/or with one or moreparameters (e.g., expiration) encoded in the request (e.g., encoded aspart of the authorization information). For requests that the serviceprovider deems fulfillable, the service provider may extract acryptographic key from the request, decrypt the extracted cryptographickey (if applicable), and perform one or more operations involved infulfillment of the request. A response to the customer may be provided,such as an acknowledgment that the request was fulfilled and/or a resultof performance of the one or more operations (e.g., data decrypted usinga key provided in the request).

FIG. 1 shows an illustrative example of an environment 100 in whichvarious embodiments can be implemented. As illustrated in FIG. 1 theenvironment 100 includes a customer 102 and is service provider 104. Thecustomer 102 of the service provider 104 may utilize various services ofthe service provider in order to utilize various computing resourcesoffered by the service provider 104. For example, the customer 102 mayoperate its own services and utilize computing resources of the serviceprovider 104 in order to avoid expense and/or complications ofimplementing the computing resources on one's own. As an example, thecustomer 102 may provide as a service to other customers access to mediafiles such as video files and/or audio files. However, in order to avoidthe expense and trouble of maintaining a sufficiently robust datastorage system the customer 102 may utilize data storage systems of theservice provider 104 who may provide access to data storage systems tonumerous customers such as the customer 102.

As noted above the customer 102 may have one or more of its owncustomers and accordingly various techniques of the present disclosurerelate to allowing the customer 102 to provide services to its customersutilizing services of the service provider 104 without having to serveas a proxy for data stored by the service provider 104. One way of doingthis as illustrated in FIG. 1 includes the customer 102 providing a URL106 to a third party 108 who may be a customer of the customer 102 or,generally, a user of services of the customer 102. As noted in moredetail below, the URL 106 may be provided from the customer 102 to thethird party 108 in various ways.

As discussed in more detail below one way of providing the URL 106 tothe third party 108 may be by the use of a webpage or other interfacethat encodes the URL so as to be selectable by a human operator of thethird party 108. As an illustrative example, a human operator with anaccount with the customer 102 may log into a website of the customer 102and as a result of having logged in may have access to the URL 106. TheURL 106 may be provided from the customer 102 to the third party 108 inother ways as well. For example, the URL 106 may be encoded in anelectronic mail message or other message from the customer 102 to thethird party 108. As another example the URL 106 may be encoded in adocument that is provided by in any suitable manner from the customer102 to the third party 108. Generally any method by which the thirdparty 108 has access to the URL 106 is considered as being within thescope of the present disclosure whether or not providing access includestransmission of the URL 106 over a network to the third party 108.

It should be noted that FIG. 1 illustrates flow of information between acustomer 102 and a third party 108 who may be entities such asorganizations and/or individuals. While the data is shown as flowingbetween the entities it should be understood that unless otherwise clearfrom context the data is transferred by way of suitable computingdevices of the respective entities, examples of which are describedbelow in connection with FIG. 10. As an example the URL 106 may beprovided from the customer 102 from a web or other server of a customer102. Similarly a human operator of the third party 108 may receive theURL 106 by way of a suitable device such as a personal computer, mobiledevice, tablet computing device, electronic book reader or generally anydevice configured to receive information through a network or other datareceiving interface.

It should also be noted that while FIG. 1 shows the URL 106 beingprovided directly from the customer 102 to the third party 108, the URL106 may be provided in various ways in accordance with variousembodiments. As noted above for example, a server of the customer 102may provide the URL 106 to the third party 108 such as encoded in a webpage provided to the customer 108. Such a server however may beimplemented using computing resources for example, virtual computersystem and/or one or more storage devices hosted by the service provider104. In other words while the customer 102 may have control overproviding the URL 106 to the third party 108 the resources by which theURL 106 is provided to the third party 108 may not be directly hosted bythe customer 102. In addition, the URL 106 may pass through one or moreintermediaries which are not illustrated in FIG. 1. Other variations arealso considered as being within the scope of the present disclosure.

As noted, the third party 108, upon receipt of the URL 106, can use theURL 106 to access services of the service provider 104. As an examplewhich will be used throughout the present disclosure, the third party108 can use the URL 106 to access data stored by the service provider104 on behalf of the customer 102. In other words the customer 102 ofthe service provider 104 can use the URL 106 to allow third party 108 toobtain access to one or more computing resources such as media filesposted by the service provider 104. It should be noted that while accessto data (e.g., data retrieval) is used as an illustrative examplethroughout the present disclosure the techniques described herein can beused to provide access to services in numerous ways. For example, theURL 106 may be used to allow third party 108 to store data usingresources of the service provider 104. Such use may be useful forexample in instances when the customer 102 provides third parties theability to store data as part of its service offerings. Generally theURL 106 may be used to provide access in any way in accordance withrequests fulfillable by the service provider 104.

Returning to the illustrated embodiment, to gain access to resourceshosted by the service provider 104, the third party 108 may provide theURL to the service provider 104. Various information may be included inthe URL to enable the service provider 104 to determine how and/orwhether to fulfill a request submitted by the third party 108 to theservice provider 104 using the URL 106. For example as illustrated inFIG. 1, the URL 106 includes an electronic signature 110 which isverifiable by the service provider 104 by way of having access to asignature verification key 112 corresponding to the customer 102. Thesignature verification key 112 may be for example a symmetriccryptographic key to which the customer 102 also has access. In such anembodiment, the service provider 104 can verify the electronic signature110 using one or more symmetric cryptographic signature verificationalgorithms in order to determine that the third party 108 is authorizedby the customer 102 to submit a request using the URL 106. As anotherexample the signature verification key 112 can be a public key of apublic-private key pair where the customer 102 has access to a privatekey of the public-private key pair. The customer 102 may generate theelectronic signature 110 using the private key which is may then beverified by the service provider 104 upon receipt of the signature 110from the third party 108. Generally any type of information included inthe URL 106 that allows the service provider 104 to determine that arequest from the customer 108 submitted using the URL 106 is authorizedby the customer 102 may be used.

As illustrated in FIG. 1 the URL 106 may also include a cryptographickey 114. The cryptographic key 114 may be a cryptographic key to whichthe customer 102 has access. The type of cryptographic key included inthe URL 106 may vary in accordance with various embodiments. In someembodiments for example, the cryptographic key 114 is a symmetric key tobe used for encryption or decryption by the service provider 104. Asanother example the cryptographic key 114 may be a public key of apublic-private key pair to which the private key is held by the customer102 but to which access is lacked by the service provider 104. As yetanother example the cryptographic key 114 may be included in the URLthere may be a symmetric key included in the URL 106 in a form that isencrypted under another key where the other key may vary in accordancewith various embodiments but is generally a key such that, upon receiptof the URL 106 from the third party 108, the service provider 104 isable to either on its own by use of another service, e.g., another thirdparty service, to decrypt the cryptographic key 114 for use. Generallyany way by which the cryptographic key 114 may be provided in the URL106 to the third party 108 to enable the third party 108 to provide theURL 106 to the service provider 104 to enable the service provider 104to use the cryptographic key 114 for one or more operations may be used.In this manner the third party 108 is able to utilize the services ofthe service provider 104 using the cryptographic key 114 provided by thecustomer 102.

As an illustrative example of one way in which this is useful thecustomer 102 may store data utilizing a data storage service of theservice provider 104 where the data is stored in encrypted form using akey inaccessible to the service provider 104. By including thecryptographic key 114 in the URL 106 to the third party 108 the thirdparty 108 can submit a request to the service provider 104 using the URL106 in order to enable the service provider 104 to use the cryptographickey 114 to decrypt the data stored in the data storage service by thecustomer 102. Thus until the service provider 104 is provided the URL106, the service provider 104 does not have an ability to access data ofthe customer 102 in plaintext form. It should be noted that the thirdparty 108 may submit the request to the service provider 104 using theURL 106 in various ways. For example, an application of the third party108 may provide the URL as part of a selectable user interface elementon a graphical user interface. Upon selection of the selectable elementan application such as a browser of the third party may contact a domainname service (DNS) in order to determine an internet protocol (IP)address to which a request should be submitted. A request may then besubmitted to the IP address where the request may include the URL 106.Information in the URL 106 may then enable the service provider 104 toprocess the request accordingly.

FIG. 2 shows an illustrative example of an environment of a serviceprovider 200 in accordance with various embodiments. As illustrated inFIG. 2, the service provider 200 includes a customer interface 202. Thecustomer interface may be a subsystem of the service provider 200 whichallows for the submission of requests from customers to be processed bythe service provider 200 such as described above in connection withFIG. 1. The customer interface may accordingly include appropriatecomputing devices for providing the ability for customers to submitrequests to the service provider 200. This customer interface, forexample, may include one or more web servers configured to receiverequests over the internet or another network. While not illustrated assuch, other infrastructure may also be included in the customerinterface 202, such as appropriate networking equipment that enable thecustomer interface 202 to operate suitably for the customer of theservice provider 200.

When a request is received through the customer interface 202, therequest may be received with appropriate authenticating information. Forexample, as illustrated in FIG. 2, a request may be received with a URL204 that includes a signature 206 of a portion of the URL. The signaturemay be generated in accordance with various embodiments. For example, acustomer that generated the URL 204 may generate the signature 206 usingsecret information shared between the customer and the service provider200. As another example, a customer may have used an asymmetric digitalsignature scheme to sign the URL 204 using a private key of aprivate/public key pair. Generally, any type of information which isused to authenticate the URL 204 may be used and, in some embodiments,requests may be submitted without such information.

As illustrated in FIG. 2, however, when a request is received throughthe customer interface 202, a URL 204 of the request is provided (e.g.,over an internal network of the service provider 200) with the signature206 to an authentication system 208 of the service provider 200.Alternatively, a portion of the URL sufficient for generating theelectronic signature 206 may be provided instead of the whole URL. Theauthentication system 208 may be a subsystem of the service provider 200configured to authenticate requests such as by verifying electronicsignatures provided with URLs included with requests. Upon verifying thesignature 206 of the URL 204 the authentication system 208 may provide aresponse to the customer interface 202 that indicates whether thesignature 206 is valid. A device (e.g., web server) of the customerinterface 202 may use the information provided by the authenticationsystem 208 to determine how to process the URL 204. For example, if theauthentication system 208 indicates that the signature 206 is invalid,the customer interface 202 may deny the request. Similarly, if theinformation from authentication system 208 indicates that the signature206 of the URL 204 is valid, the customer interface 202 may cause therequest to be processed.

While not illustrated in the figure, the authentication system 208 oranother system operating within or on behalf of the service provider 200may operate to perform other operations in connection with determininghow to process requests. For example, the authentication system 208 oranother system operating in cooperation therewith may be used to checkone or more policies which may be determinative of whether the requestcan be fulfilled. Policy determinations may be made based at least inpart on various factors such as an identity of the requestor thatsubmitted the request, a time of day, a logical identifier for alocation in which data is stored or is to be stored and other contextualinformation. Policy may be managed through the customer interface 202 oranother interface through appropriately-configured applicationprogramming interface (API) calls.

Returning to the embodiment illustrated in FIG. 2, if the authenticationsystem 208 determines that the signature 206 is valid, the customerinterface 202 may determine to process the request. Processing therequest may involve the transfer of encrypted data 210 between thecustomer interface 202 and request processing infrastructure 212. Therequest processing infrastructure 212 may comprise one or more devicesthat collectively operate to provide a service of the service provider200. For example, as illustrated in FIG. 2, the request processinginfrastructure may comprise a plurality of data storage system 214 usedto store data on behalf of customer of the service provider 200. Otherinfrastructure including networking infrastructure while not illustratedmay also be included. The passage of data, e.g., over a network betweenthe customer interface 202 and the request processing infrastructure 212may occur in various ways in accordance with various embodiments inaccordance with the various types of requests that may be submittedthrough the customer interface 202. For example, if the URL 204 isincluded in a request to store data, a customer interface may utilize akey 216 provided in the URL 204 to encrypt the data and transmit theencrypted data 210 to the request processing infrastructure 212 forstorage in one or more of the data storage systems 214.

Similarly, if the request is a request to retrieve data, a customerinterface 202 may transmit a communication to the request processinginfrastructure 212 that allows data from one or more of the data storagesystems 214 to be provided to the customer interface 202. The customerinterface 202 may then use a key 216 provided in the URL 204 to decryptthe encrypted data 210 and provide the decrypted data to the customerthat submitted the request. It should be noted that the environment ofthe service provider 200 illustrated in FIG. 2 is simplified for thepurpose of illustration and that numerous other devices and subsystemssuch as accounting systems that keep track of usage of the serviceprovider 200 by customers may also be included. Further, a serviceprovider 200 may include facilities located in different geographicallocations for the purpose of redundancy and/or availability.

FIG. 3 shows an illustrative example of a URL 300 in accordance withvarious embodiments. In an embodiment, as noted above, the URL 300 mayinclude an electronic signature 302 of a portion of the URL 300 and acryptographic key 304. The URL 300 may also include other informationsuch as a path 306. The path 306 may include information which enables aservice provider such as described above to locate one or more resourcesassociated with a request submitted via the URL 300. Other informationin the URL 300 may include information indicating one or more operations308 to be performed by fulfillment of the request. Example operationsthat may be specified include, but are not limited to, storing data,retrieving data, generating a digital signature of data and others. Insome embodiments, a URL may specify multiple operations and the order inwhich the operations should be performed.

As illustrated, the URL 300 includes an expiration 310. The expirationmay encode a value for a time at which the URL 300 ceases to be useablefor submission of fulfillable requests to a service provider. In otherwords, the expiration indicates a time at which otherwise fulfillablerequests submitted using the URL become unfulfillable as a result ofreaching the time. As an example, referring to FIG. 1 a customer 102wishing to provide temporary access to certain data may utilize anexpiration 310 in the URL 106 in order to limit the amount of time theURL 106 is useable to the third part 108. The expiration 310 may beincluded in data of the URL 300 used to generate the electronicsignature 302 in order to ensure that the signature 302 is only validwhen the expiration 310 has not been modified since issuance by thecustomer. In this manner, access to the URL at a time after theexpiration does not provide an ability to access data by simplymodifying the expiration. A service provider receiving the URL 300 whendetermining whether to fulfill a request may utilize the expirationand/or other information to determine whether to fulfill a request. Forexample, if the URL provided with a request prior to the expiration 310,the service provider may fulfill the request (assuming all otherrequirements for fulfillment of the request, if any, have beenfulfilled). Similarly, if the URL 300 is provided in connection with therequest to the service provider after the expiration 310, the serviceprovider may deny despite any other requirements for fulfillment of therequest being satisfied. It should be noted that, while expiration isused throughout the present disclosure as a parameter that potentiallyis determinative of whether a provider will fulfill a request, criteriafor fulfillment of a request may be more complex. For example, criteriafor fulfillment of a request may be configured such that a request isfulfillable despite an expiration time having passed. Other contextualinformation (e.g., an identity of a requestor) may, for instance,supersede the expiration.

As illustrated, the URL 300 may also include other parameters 312. Theother parameters may be parameters which enable the service provider todetermine if and/or how to fulfill a request. For example, as notedabove, the URL 300 may include an expiration 310. Another parameterincluded in the other parameters 312 may be a start time indicating atime at which the URL 300 become useable for submission of requests to aservice provider. A combination of a start time and an expiration timemay provide a time window during which a request submitted using the URLis fulfillable. A start time is useful, for example, in instances whereaccess to data is to be prevented until a certain time (e.g., a releaseof a media file). Thus a customer of a service provider can pre-generateone or more URLs that will provide access to data or otherwise will beuseable to submit fulfillable requests to a service provider at a latertime. Such ability to pre-generate URLs that will, at a future time,enable access to data provide technical advantages, such as the abilityto pre-prime a content delivery network (CDN) and/or pre-configurecontent with URLs without providing access to certain data until suchaccess is desired to be given.

Referring to FIG. 1, the other parameters of the URL illustrated in FIG.3 may include other information added by a third party including but notlimited to: data on which one or more cryptographic operations are to beperformed using the cryptographic key 304 (or 114 when referring to FIG.1); parameters for how fulfillment of a request is to be performed.

FIG. 4 shows an illustrative example of a URL 400 which may be the URL300 discussed above or generally any URL described herein. Asillustrated the URL 400 includes a signed portion 402 and an unsignedportion 404. The signed portion may include information thatmodification of which can cause the URL 400 to become invalid. As anexample discussed above, the signed portion 402 may include anexpiration 406. In addition the signed portion may include acryptographic key 408. Generally the signed portion may include anyinformation for which the customer providing the URL 400 intends toprevent forgery of such information. The information can include forexample, an identity authorized to submit the URL 400, timinginformation about when the URL 400 is useable (e.g., one or more starttimes and/or one or more expiration times), and other contextualinformation determinative of if and/or how a request submitted using theURL 400 should be processed. The unsigned portion of the URL 400 mayinclude various information such as an electronic signature 410 such asdescribed above an additional request data 412 which may be data addedby third party on which one or more cryptographic operations are to beperformed using the cryptographic key 408 and/or generally informationwhich the third party is able to change without causing invalidity ofthe electronic signature 410.

The URL 400 is illustrated in a particular way to illustrate variousaspects of the present disclosure. Numerous variations are considered asbeing within the scope of the present disclosure. For example, asillustrated in FIG. 4, the URL 400 shows a cryptographic key inside of asigned portion of the URL 400. In addition to or as an alternative to acryptographic key inside of the signed portion of the URL 400, anunsigned portion of a URL may comprise a cryptographic key. For example,in some embodiments, a customer of a service provider may provide a URLwith a signed portion to a third party. The third party may add acryptographic key to the URL and use the URL with additionalcryptographic key to submit a request to the service provider, wherefulfillment of the request is authorized by the customer via thesignature generated based at least in part on the signed portion of theURL. In this manner, the third party may utilize one or more services ofthe service provider without providing access to the cryptographic keyto either the service provider (except when performing one or morecryptographic operations as part of fulfilling a request) or thecustomer. Thus a security breach or other event at either the customeror the service provider does not provide access to the cryptographic keyand, therefore, does not enable access to data in plaintext form.Further, cryptographic operations may be performed using both a key in asigned portion of a URL (supplied by a customer) and a key in anunsigned portion of the URL (supplied by the third party). In thismanner, cooperation between both the third party and the customer isrequired for access to data in plaintext form. Other variations,including variations where a key of the service provider is usedalternatively or in addition are also considered as being within thescope of the present disclosure.

FIG. 5 shows an illustrative example of a process 500 for providingaccess to data in accordance with various embodiments. The process 500may be performed by any suitable system such as a system operated by acustomer such as described above in connection with FIG. 1. In anembodiment, the process 500 includes generating 502 a portion of a URLto be signed. The portion of the URL may include information for whichan entity performing the process 500 desires to prevent forgery. Invarious embodiments, the amount of information included in the portionof the URL to be signed may vary. For example, the portion of the URL tobe signed may include a path to a resource of a customer, acryptographic key, one or more contextual parameters defining whenand/or how the URL is usable to make a request fulfillable by a serviceprovider and/or other information.

Once the portion of the URL to be signed has been generated 502, theprocess 500 may include using 504 a signing key to sign the generatedportion of the URL. The signing key may be any cryptographic key that,when used to generate an electronic signature renders the electronicsignature verifiable by a service provider to which the URL issubmittable. For example, in some embodiments, the signing key may besecret information shared between an entity performing the process 500and the service provider. In other embodiments, the signing key may be aprivate key of a public-private key pair where the service provider canutilize a public key of the public-private key pair (and possibly acertificate authority) to verify the electronic signature. It should benoted that while FIG. 5 shows the portion of the URL that is signedcontaining the cryptographic key, some embodiments may have the signingkey included outside of the portion of the URL that is signed. Suchinclusion of the cryptographic key may be used, for example, whereforgery of the key is not an issue. For instance, if the URL is usableto access data from data storage, a modified cryptographic key wouldgenerally be unusable to decrypt data and, as a result, there may not bea need to protect against modification of the key.

Once the signing key has been used to generate an electronic signatureof the generated portion of the URL, the process 500 may includecompleting 506 construction of the URL to include the electronicsignature. As discussed, other information, such as additionalparameters for the URL, may also be used to complete 506 construction ofthe URL. Once complete 506 the process 500 may include providing 508 thecomplete URL to a third party. The third party may be, for example, acustomer of an entity performing the process 500 such as describedabove. Providing 508 the complete URL to the third party may beperformed in various ways in accordance with various embodiments. Forexample, as discussed in more detail below, the URL may be provided in awebpage to the third party where one or more requirements for access tothe webpage may be required before the webpage is provided. As anillustrative example, the third party may be required to perform alogin/sign-in procedures in order to access the webpage having thecomplete URL. Generally, the URL may be provided in any way, such as inan electronic message or in any way by which data may be passed from onesystem to another. Further, it should be noted that while a third partyis used for the purpose of illustration, the entity to which the URL isprovided is not necessarily a third party to the provider or thecustomer. For example, in an embodiment where the process 500 isperformed by a system of an organization, the techniques describedherein may be used to provide to access to data to employees of theorganization. Thus, instead of a third party, URL may be provided to auser within the organization for which the process 500 is performed.Other variations are also considered as being within the scope of thepresent disclosure.

FIG. 6 is an illustrative example of a webpage 600 which may be used toprovide URLs in accordance with various embodiments. As illustrated inFIG. 6, the webpage 600 includes various content. The contentillustrated in the webpage 600 is illustrative in nature and the typeand appearance and amounts of content may vary in accordance withvarious embodiments. The webpage 600 may be provided in various ways inaccordance with various embodiments. For example, the webpage may beprovided over a network to an application such as a browser applicationof a client such as the third party discussed above in connection withFIG. 1. The webpage 600, however, may be provided generally by anysuitable device capable of receiving and processing a webpage. While awebpage 600 is used for the purpose of illustration, URLs or otherresource locators configured in accordance with the various embodimentsdescribed herein may be provided in content in various ways inaccordance with various embodiments. For example, content may beprovided to a mobile application or other application which is notnecessarily classified as a browser application. Generally, any way bywhich URLs or other resource locators may be provided are considered tobe within the scope of the present disclosure.

As illustrated in FIG. 6, the webpage 600 includes various graphicaluser interface elements that enable navigation throughout a website ofwhich the webpage 600 is a part. In this example, the webpage 600 ispart of an electronic commerce website that provides access to videocontent, such as by providing streaming video content to one or morecustomers. For instance, on the left-hand side of the webpage 600various links 602 to various video genres are provided. In this example,the links appears as textual words which enable the links to be selectedusing an appropriate input device such as a keyboard, mouse,touchscreen, or other input device. Selection of a link may cause anapplication causing the webpage 600 to be displayed to submit, pursuantto a URL associated with the link by the programming of the webpage 600,an http request to a server that provided the webpage 600 or anotherserver. In this example, the webpage 600 also includes a graphical userelement configured as a play button 604. The play button 604 may be agraphical user interface element of the webpage 600 where the underlyingcode of the webpage 600 is configured such that selection by an inputdevice of the button 604 causes a request to be submitted to anappropriate server.

In this example, the code of the webpage 600 includes a URL 606 whichmay be configured in accordance with the various techniques describedherein. In this illustrative example the URL 606 includes a path 608 toa resource which in this instance is a video file. The URL 606 may alsoinclude a cryptographic key 610, an expiration 612, and an electronicsignature 614. The electronic signature may be generated at least inpart on the path 608, cryptographic key 610, and expiration 612 and/orother information. Generally, the URL 606 may include additionalinformation that is not illustrated in the figure. Accordingly, when auser selects the button 604 an appropriately configured request, in thisexample an http request, is submitted to a server using the URL 606.While not illustrated in the figures, such a request may be submitted byusing the path 608 in the URL 606 to obtain an IP address of a serverfrom a domain name service (DNS) and submitting the request with URL 606over the internet or other network to the IP address.

A device processing the webpage 600 may receive a response which, if theURL 606 is valid at the time of submission of the request, may includethe resource to which the path 608 points. As noted elsewhere herein, ifthe URL 606 is invalid, for example because it was submitted past theexpiration 612, or the URL 606 was modified, such a request may bedenied.

FIG. 7 shows an illustrative example of a process 700 for accessing datain accordance with various embodiments. The process 700 may be performedby any suitable system such as a system of a third party described abovein connection with FIG. 1 although, as noted, a system that performs theprocess 700 is not necessarily a third party to other entities involvedwith performance with the process 700. In an embodiment, the process 700includes obtaining 702 a URL from a customer of a provider. The URL maybe obtained 702 in various ways in accordance with various embodimentssuch as through a webpage as described above or in another way. Onceobtain 702, the obtained URL may be used 704 to submit a request to theprovider. In some embodiments, the URL is provided to the provider asrequest formatted in a manner acceptable to the provider such as inaccordance with the HTTP. In some embodiments, however, using 704 theobtained URL to submit a request to the provider may include modifyingthe URL prior to a submission of a request. For example, in someembodiments the URL may be used to submit a request to perform one ormore operations using a cryptographic key supplied by the URL on dataadded to the URL by the system performing the process 700. As anotherexample, a system performing the process 700 may add one or moreparameters to the URL for various purposes such as for instructing theprovider how to process the request and/or to supply information whichmay be required by the provider in addition to a valid signature in theobtained URL to fulfill the request. Other information useful to thesystem performing the process 700 and/or the provider may also beincluded.

Adding to the obtained URL may include adding information to a portionof the URL outside of a portion used to generate an electronic signaturethat was included with the obtain URL. In this manner, information canbe added to the URL without invalidating the electronic signature. Oncethe obtained URL has been used 704 to submit a request to the provider,the process 700 may, assuming the request was properly submitted andotherwise fulfillable, obtain 706 a result of processing the requestfrom the provider. For example, depending on one or more operationsspecified by the request the result may be included in a response fromthe provider. As an example, if the request was to encrypt or decryptdata provided with or otherwise specified by the request, the resultobtained 706 may include encrypted or decrypted data, as appropriate.Generally, depending on the cryptographic operations performed using thecryptographic key provided in the request, the result obtained 706 mayvary.

FIG. 8 shows an illustrative example of a process 800 for providingaccess to data. The process 800 may be performed by a suitable systemsuch as a web server of a service provider such as described above. Inan embodiment, the process 800 includes receiving 802 a request with aURL. The URL may include a cryptographic key and an electronic signatureand/or other information such as described above. An electronicsignature may be extracted 804 from the URL and used to determine 806whether the request is valid. Determining 806 whether the request isvalid may be performed in various ways in accordance with variousembodiments such as by using a symmetric signature verificationalgorithm or an asymmetric signature verification algorithm to verifythe electronic signature, which may include communication with acertificate authority to use a public key of a public-private key pairto determine validity of the electronic signature.

If determined 806 that the signature is invalid, the process 800 mayinclude denying 808 the request. The request may be denied 808 invarious ways in accordance with various embodiments, such as bytransmitting a communication indicated that the request was deniedand/or one or more reasons for its denial. Other ways by which a requestmay be denied may also be used such as by simply not fulfilling therequest, without necessarily transmitting a communication in response tothe request. Generally, any way by which a request may be denied may beused. If, however, it is determined 806 that the signature is valid, theprocess 800 may include extracting 810 a cryptographic key from the URLthat was received 802. The extracted cryptographic key may be used 812to process (i.e., fulfill) the request. Processing the request mayinclude using the cryptographic key to perform one or more cryptographicoperations on data included with or otherwise specified by the request.A response to the request may be provided 814. Providing 814 theresponse may include providing a result of performance of one or morecryptographic operations using the cryptographic key (e.g., encrypteddata, decrypted data, and/or an electronic signature) and/or anacknowledgment that such operations were performed.

While the process 800 is described in a particular way for the purposeof illustration, variations are considered as being within the scope ofthe present disclosure. For example, FIG. 8 shows the request beingprocessed on the condition that the signature is valid. However, one ormore other operations may be performed to determine whether to processthe request. As one example, determining whether the request is validmay include checking whether the request complies with policy.Accordingly, policy configured by a customer of the service provider maybe checked in order to determine whether fulfillment of the request isin compliance with the policy. Further, as noted above, URLs may containvarious contextual conditions about if and/or how the request should beperformed. Accordingly, determining 806 whether the request is validduring performance of the process 800 may include checking whether suchconditions are fulfilled and/or processing the request in accordancewith such information included in the URL. Generally, fulfillment of therequest may require one or more conditions to be satisfied and themanner in which a request is fulfilled may be at least partiallydependent on parameters specified in the request.

Further, in some embodiments, upon use of the cryptographic key theprocess may include performing one or more operations that cause accessto the cryptographic key by a system and generally by entity for whichthe process 800 is performed to be lost. The operations that cause aloss of access to the cryptographic key may include, for example,overwriting one or more memory locations in which the cryptographic keyis stored and/or taking one or more actions that allow such memorylocations to be overwritten such as in order to process subsequentrequests. Generally, any operations which cause access to thecryptographic key to be lost immediately or eventually may be performed.In this manner, the customer that supplied the key in the URL can beensured that the service provider has access to the cryptographic keyfor a limited duration corresponding to when the cryptographic key isneeded to fulfill a request. Other variations are also considered asbeing within the scope of the present disclosure.

FIG. 9 shows an illustrative example of a process for providing accessto data in accordance with an embodiment. As illustrated in FIG. 9 theprocess may be performed by suitable system and, in this particularexample, possibly by multiple systems as indicated by the dashed linesseparating operations of the process 900 from each other. In anembodiment, the process 900 includes a customer wrapping 902 anencryption secret to be unwrappable (obtainable) by a provider. Wrappingthe encryption secret may be performed, for example, by encrypting theencryption secret using a suitable cryptographic key such that the keyis unwrappable (decryptable) by the provider. For example, theencryption secret may be wrapped using secret information shared betweena customer of the provider and the provider. As another example, theencryption secret may be wrapped using a public key of a public-privatekey pair where the provider is able to unwrap the encryption secretusing a private key from the public-private key pair. It should be notedthat while FIG. 9 is illustrated as the wrapped encryption secret beingunwrappable by the provider, generally variations of the presentdisclosure include those where the provider does not unwrap theencryption itself, but is able to have another system (e.g., a thirdparty system) unwrap the encryption secret on its behalf.

Returning to the illustrative example of FIG. 9, the customer mayconstruct 904 a URL with the wrapped secret. The URL may be constructed904 such as described above. A customer then may sign 906 the URL bygenerating an electronic signature of the constructed URL using anappropriate signing key. The URL may then be completed 908 to includethe electronic signature. The completed URL may then be provided 910 toa third party such as described above. Upon having been provided 910 thecompleted URL, a third party may use 912 the completed URL to submit arequest to the provider. As one example, the URL may be coded in awebpage or other content to be selectable by a user of the third partyto cause an application of the third party to submit a request to theprovider using the completed URL.

Once the request has been submitted to the provider, the provider maycanonicalize and validate 914 the request. It should be noted thatcanonicalization may be performed to reverse the various ways by whichrequests may be mutated during their transmission from one entity toanother. Canonicalization may be performed, for instance, in order toensure that validation of the electronic signature is performedcorrectly. For example, additional characters inserted into the requestor removed from the request may be removed and/or added as appropriatein order to ensure that if the request is valid the electronic signaturewill be valid as well. A provider, upon validation of the request, mayunwrap 910 the encryption secret by performing (or otherwise causing tohave performed) an appropriate cryptographic algorithm to decrypt theencryption secret. The encryption secret may then be used 912 to processthe request and the provider may respond 914 to the third party request,such as providing a result of performance of the one or morecryptographic operations that the provider performed and/or anacknowledgement of their performance. As noted above, the provider maythen lose 916 access to the encryption secret such as described above.

Other variations are considered as being within the scope of the presentdisclosure. For example, the types and ways in which keys are providedin URLs or generally requests to providers may vary in accordance withvarious embodiments. Some techniques which may be combined with thetechniques of the present disclosure are described in concurrently filedU.S. patent application Ser. No. 14/037,292, entitled “DATA SECURITYUSING REQUEST-SUPPLIED KEYS” which is incorporated in here by referencefor all purposes.

FIG. 10 illustrates aspects of an example environment 1000 forimplementing aspects in accordance with various embodiments. As will beappreciated, although a web-based environment is used for purposes ofexplanation, different environments may be used, as appropriate, toimplement various embodiments. The environment includes an electronicclient device 1002, which can include any appropriate device operable tosend and receive requests, messages or information over an appropriatenetwork 1004 and convey information back to a user of the device.Examples of such client devices include personal computers, cell phones,handheld messaging devices, laptop computers, tablet computers, set-topboxes, personal data assistants, embedded computer systems, electronicbook readers and the like. The network can include any appropriatenetwork, including an intranet, the Internet, a cellular network, alocal area network or any other such network or combination thereof.Components used for such a system can depend at least in part upon thetype of network and/or environment selected. Protocols and componentsfor communicating via such a network are well known and will not bediscussed herein in detail. Communication over the network can beenabled by wired or wireless connections and combinations thereof. Inthis example, the network includes the Internet, as the environmentincludes a web server 1006 for receiving requests and serving content inresponse thereto, although for other networks an alternative deviceserving a similar purpose could be used as would be apparent to one ofordinary skill in the art.

The illustrative environment includes at least one application server1008 and a data store 1010. It should be understood that there can beseveral application servers, layers or other elements, processes orcomponents, which may be chained or otherwise configured, which caninteract to perform tasks such as obtaining data from an appropriatedata store. Servers, as used herein, may be implemented in various ways,such as hardware devices or virtual computer systems. In some contexts,servers may refer to a programming module being executed on a computersystem. As used herein the term “data store” refers to any device orcombination of devices capable of storing, accessing and retrievingdata, which may include any combination and number of data servers,databases, data storage devices and data storage media, in any standard,distributed or clustered environment. The application server can includeany appropriate hardware and software for integrating with the datastore as needed to execute aspects of one or more applications for theclient device, handling some (even a majority) of the data access andbusiness logic for an application. The application server may provideaccess control services in cooperation with the data store and is ableto generate content such as text, graphics, audio and/or video to betransferred to the user, which may be served to the user by the webserver in the form of HyperText Markup Language (“HTML”), ExtensibleMarkup Language (“XML”) or another appropriate structured language inthis example. The handling of all requests and responses, as well as thedelivery of content between the client device 1002 and the applicationserver 1008, can be handled by the web server. It should be understoodthat the web and application servers are not required and are merelyexample components, as structured code discussed herein can be executedon any appropriate device or host machine as discussed elsewhere herein.Further, operations described herein as being performed by a singledevice may, unless otherwise clear from context, be performedcollectively by multiple devices, which may form a distributed system.

The data store 1010 can include several separate data tables, databasesor other data storage mechanisms and media for storing data relating toa particular aspect of the present disclosure. For example, the datastore illustrated may include mechanisms for storing production data1012 and user information 1016, which can be used to serve content forthe production side. The data store also is shown to include a mechanismfor storing log data 1014, which can be used for reporting, analysis orother such purposes. It should be understood that there can be manyother aspects that may need to be stored in the data store, such as pageimage information and access rights information, which can be stored inany of the above listed mechanisms as appropriate or in additionalmechanisms in the data store 1010. The data store 1010 is operable,through logic associated therewith, to receive instructions from theapplication server 1008 and obtain, update or otherwise process data inresponse thereto. In one example, a user, through a device operated bythe user, might submit a search request for a certain type of item. Inthis case, the data store might access the user information to verifythe identity of the user and can access the catalog detail informationto obtain information about items of that type. The information then canbe returned to the user, such as in a results listing on a web page thatthe user is able to view via a browser on the user device 1002.Information for a particular item of interest can be viewed in adedicated page or window of the browser. It should be noted, however,that embodiments of the present disclosure are not necessarily limitedto the context of web pages, but may be more generally applicable toprocessing requests in general, where the requests are not necessarilyrequests for content.

Each server typically will include an operating system that providesexecutable program instructions for the general administration andoperation of that server and typically will include a computer-readablestorage medium (e.g., a hard disk, random access memory, read onlymemory, etc.) storing instructions that, when executed by a processor ofthe server, allow the server to perform its intended functions. Suitableimplementations for the operating system and general functionality ofthe servers are known or commercially available and are readilyimplemented by persons having ordinary skill in the art, particularly inlight of the disclosure herein.

The environment in one embodiment is a distributed computing environmentutilizing several computer systems and components that areinterconnected via communication links, using one or more computernetworks or direct connections. However, it will be appreciated by thoseof ordinary skill in the art that such a system could operate equallywell in a system having fewer or a greater number of components than areillustrated in FIG. 10. Thus, the depiction of the system 1000 in FIG.10 should be taken as being illustrative in nature and not limiting tothe scope of the disclosure.

The various embodiments further can be implemented in a wide variety ofoperating environments, which in some cases can include one or more usercomputers, computing devices or processing devices which can be used tooperate any of a number of applications. User or client devices caninclude any of a number of general purpose personal computers, such asdesktop, laptop or tablet computers running a standard operating system,as well as cellular, wireless and handheld devices running mobilesoftware and capable of supporting a number of networking and messagingprotocols. Such a system also can include a number of workstationsrunning any of a variety of commercially-available operating systems andother known applications for purposes such as development and databasemanagement. These devices also can include other electronic devices,such as dummy terminals, thin-clients, gaming systems and other devicescapable of communicating via a network.

Various embodiments of the present disclosure utilize at least onenetwork that would be familiar to those skilled in the art forsupporting communications using any of a variety ofcommercially-available protocols, such as Transmission ControlProtocol/Internet Protocol (“TCP/IP”), protocols operating in variouslayers of the Open System Interconnection (“OSI”) model, File TransferProtocol (“FTP”), Universal Plug and Play (“UpnP”), Network File System(“NFS”), Common Internet File System (“CIFS”) and AppleTalk. The networkcan be, for example, a local area network, a wide-area network, avirtual private network, the Internet, an intranet, an extranet, apublic switched telephone network, an infrared network, a wirelessnetwork and any combination thereof.

In embodiments utilizing a web server, the web server can run any of avariety of server or mid-tier applications, including Hypertext TransferProtocol (“HTTP”) servers, FTP servers, Common Gateway Interface (“CGI”)servers, data servers, Java servers and business application servers.The server(s) also may be capable of executing programs or scripts inresponse to requests from user devices, such as by executing one or moreweb applications that may be implemented as one or more scripts orprograms written in any programming language, such as Java®, C, C# orC++, or any scripting language, such as Perl, Python or TCL, as well ascombinations thereof. The server(s) may also include database servers,including without limitation those commercially available from Oracle®,Microsoft®, Sybase® and IBM®.

The environment can include a variety of data stores and other memoryand storage media as discussed above. These can reside in a variety oflocations, such as on a storage medium local to (and/or resident in) oneor more of the computers or remote from any or all of the computersacross the network. In a particular set of embodiments, the informationmay reside in a storage-area network (“SAN”) familiar to those skilledin the art. Similarly, any necessary files for performing the functionsattributed to the computers, servers or other network devices may bestored locally and/or remotely, as appropriate. Where a system includescomputerized devices, each such device can include hardware elementsthat may be electrically coupled via a bus, the elements including, forexample, at least one central processing unit (“CPU” or “processor”), atleast one input device (e.g., a mouse, keyboard, controller, touchscreen or keypad) and at least one output device (e.g., a displaydevice, printer or speaker). Such a system may also include one or morestorage devices, such as disk drives, optical storage devices andsolid-state storage devices such as random access memory (“RAM”) orread-only memory (“ROM”), as well as removable media devices, memorycards, flash cards, etc.

Such devices also can include a computer-readable storage media reader,a communications device (e.g., a modem, a network card (wireless orwired), an infrared communication device, etc.) and working memory asdescribed above. The computer-readable storage media reader can beconnected with, or configured to receive, a computer-readable storagemedium, representing remote, local, fixed and/or removable storagedevices as well as storage media for temporarily and/or more permanentlycontaining, storing, transmitting and retrieving computer-readableinformation. The system and various devices also typically will includea number of software applications, modules, services or other elementslocated within at least one working memory device, including anoperating system and application programs, such as a client applicationor web browser. It should be appreciated that alternate embodiments mayhave numerous variations from that described above. For example,customized hardware might also be used and/or particular elements mightbe implemented in hardware, software (including portable software, suchas applets) or both. Further, connection to other computing devices suchas network input/output devices may be employed.

Storage media and computer readable media for containing code, orportions of code, can include any appropriate media known or used in theart, including storage media and communication media, such as, but notlimited to, volatile and non-volatile, removable and non-removable mediaimplemented in any method or technology for storage and/or transmissionof information such as computer readable instructions, data structures,program modules or other data, including RAM, ROM, Electrically ErasableProgrammable Read-Only Memory (“EEPROM”), flash memory or other memorytechnology, Compact Disc Read-Only Memory (“CD-ROM”), digital versatiledisk (DVD) or other optical storage, magnetic cassettes, magnetic tape,magnetic disk storage or other magnetic storage devices or any othermedium which can be used to store the desired information and which canbe accessed by the system device. Based on the disclosure and teachingsprovided herein, a person of ordinary skill in the art will appreciateother ways and/or methods to implement the various embodiments.

The specification and drawings are, accordingly, to be regarded in anillustrative rather than a restrictive sense. It will, however, beevident that various modifications and changes may be made thereuntowithout departing from the broader spirit and scope of the invention asset forth in the claims.

Other variations are within the spirit of the present disclosure. Thus,while the disclosed techniques are susceptible to various modificationsand alternative constructions, certain illustrated embodiments thereofare shown in the drawings and have been described above in detail. Itshould be understood, however, that there is no intention to limit theinvention to the specific form or forms disclosed, but on the contrary,the intention is to cover all modifications, alternative constructionsand equivalents falling within the spirit and scope of the invention, asdefined in the appended claims.

The use of the terms “a” and “an” and “the” and similar referents in thecontext of describing the disclosed embodiments (especially in thecontext of the following claims) are to be construed to cover both thesingular and the plural, unless otherwise indicated herein or clearlycontradicted by context. The terms “comprising,” “having,” “including”and “containing” are to be construed as open-ended terms (i.e., meaning“including, but not limited to,”) unless otherwise noted. The term“connected,” when unmodified and referring to physical connections, isto be construed as partly or wholly contained within, attached to orjoined together, even if there is something intervening. Recitation ofranges of values herein are merely intended to serve as a shorthandmethod of referring individually to each separate value falling withinthe range, unless otherwise indicated herein and each separate value isincorporated into the specification as if it were individually recitedherein. The use of the term “set” (e.g., “a set of items”) or “subset”unless otherwise noted or contradicted by context, is to be construed asa nonempty collection comprising one or more members. Further, unlessotherwise noted or contradicted by context, the term “subset” of acorresponding set does not necessarily denote a proper subset of thecorresponding set, but the subset and the corresponding set may beequal.

Conjunctive language, such as phrases of the form “at least one of A, B,and C,” or “at least one of A, B and C,” unless specifically statedotherwise or otherwise clearly contradicted by context, is otherwiseunderstood with the context as used in general to present that an item,term, etc., may be either A or B or C, or any nonempty subset of the setof A and B and C. For instance, in the illustrative example of a sethaving three members used in the above conjunctive phrase, “at least oneof A, B, and C” and “at least one of A, B and C” refers to any of thefollowing sets: {A}, {B}, {C}, {A, B}, {A, C}, {B, C}, {A, B, C}. Thus,such conjunctive language is not generally intended to imply thatcertain embodiments require at least one of A, at least one of B and atleast one of C to each be present.

Operations of processes described herein can be performed in anysuitable order unless otherwise indicated herein or otherwise clearlycontradicted by context. Processes described herein (or variationsand/or combinations thereof) may be performed under the control of oneor more computer systems configured with executable instructions and maybe implemented as code (e.g., executable instructions, one or morecomputer programs or one or more applications) executing collectively onone or more processors, by hardware or combinations thereof. The codemay be stored on a computer-readable storage medium, for example, in theform of a computer program comprising a plurality of instructionsexecutable by one or more processors. The computer-readable storagemedium may be non-transitory.

The use of any and all examples, or exemplary language (e.g., “such as”)provided herein, is intended merely to better illuminate embodiments ofthe invention and does not pose a limitation on the scope of theinvention unless otherwise claimed. No language in the specificationshould be construed as indicating any non-claimed element as essentialto the practice of the invention.

Preferred embodiments of this disclosure are described herein, includingthe best mode known to the inventors for carrying out the invention.Variations of those preferred embodiments may become apparent to thoseof ordinary skill in the art upon reading the foregoing description. Theinventors expect skilled artisans to employ such variations asappropriate and the inventors intend for embodiments of the presentdisclosure to be practiced otherwise than as specifically describedherein. Accordingly, the scope of the present disclosure includes allmodifications and equivalents of the subject matter recited in theclaims appended hereto as permitted by applicable law. Moreover, anycombination of the above-described elements in all possible variationsthereof is encompassed by the scope of the present disclosure unlessotherwise indicated herein or otherwise clearly contradicted by context.

All references, including publications, patent applications and patents,cited herein are hereby incorporated by reference to the same extent asif each reference were individually and specifically indicated to beincorporated by reference and were set forth in its entirety herein.

What is claimed is:
 1. A computer-implemented method, comprising: underthe control of one or more computer systems configured with executableinstructions, receiving, from a requestor, a request to perform one ormore operations using a cryptographic key lacked by the one or morecomputer systems prior to receipt of the request, the request includinga uniform resource locator that: indicates the one or more operations;includes an electronic signature generated by a first entity based atleast in part on a portion of the uniform resource locator and secretinformation inaccessible to the requestor; and includes thecryptographic key; making a determination whether the electronicsignature is valid; on a condition that the determination indicates thatthe electronic signature is valid, using the cryptographic key from therequest to perform the indicated one or more operations on data togenerate a result of the one or more operations; providing the result ofthe one or more operations in accordance with the request; and afterusing the cryptographic key from the request to perform the indicatedone or more operations on the data, performing one or more operations tolose access to the cryptographic key.
 2. The computer-implemented methodof claim 1, wherein: the uniform resource locator further encodes a paththat identifies the data; and using the cryptographic key to perform theindicated one or more operations includes using the encoded path toaccess the data.
 3. The computer-implemented method of claim 1, whereinat least some of the data is supplied by the requestor in the request.4. The computer-implemented method of claim 1, wherein: the portion ofthe uniform resource locator indicates an expiration; and using thecryptographic key to perform the indicated one or more operations isperformed on a further condition that the request is received prior tothe expiration.
 5. The computer-implemented method of claim 1, wherein:receiving the request is performed by a service provider; the firstentity is a customer of the service provider; and the requestor is not acustomer of the service provider.
 6. The computer-implemented method ofclaim 1, wherein using the cryptographic key to perform the indicatedone or more operations is performed further on a condition that therequest complies with one or more policies configured by the firstentity.
 7. The computer-implemented method of claim 1, wherein: therequest includes information added to an initial uniform resourcelocator generated by the first entity to generate the request; and theusing the cryptographic key to perform the indicated one or moreoperations is based at least in part on the information added to theinitial uniform resource locator.
 8. The computer-implemented method ofclaim 1, wherein: the uniform resource locator includes thecryptographic key in encrypted form; and the method further comprisesdecrypting the cryptographic key in encrypted form prior to using thecryptographic key to perform the indicated one or more operations.
 9. Anon-transitory computer-readable storage medium having stored thereoninstructions that, when executed by one or more processors of a computersystem, cause the computer system to: generate first information thatencodes a request and a cryptographic key; generate an electronicsignature of information verifiable by a service provider capable offulfilling the request, the electronic signature based at least in parton a portion of a uniform resource locator and secret informationinaccessible to another computer system; and make available the firstinformation and the electronic signature to enable the other computersystem to provide the first information and electronic signature to theservice provider to cause the service provider to use the cryptographickey to fulfill the request by at least: making a determination whetherthe electronic signature is valid; and on a condition that thedetermination indicates that the electronic signature is valid, usingthe cryptographic key to perform one or more operations on data togenerate a result of the one or more operations; and after using thecryptographic key to perform the one or more operations on the data,performing one or more additional operations to lose access to thecryptographic key.
 10. The non-transitory computer-readable storagemedium of claim 9, wherein the instructions further compriseinstructions that, when executed by the one or more processors, causethe computer system to generate the uniform resource locator to includethe first information and the electronic signature.
 11. Thenon-transitory computer-readable storage medium of claim 9, whereinmaking available the first information and the electronic signatureinclude providing a webpage configured with the uniform resource locatorsuch that, selected, causes transmission of the request to the serviceprovider that includes the information and electronic signature.
 12. Thenon-transitory computer-readable storage medium of claim 11, wherein thewebpage is provided to the other computer system.
 13. The non-transitorycomputer-readable storage medium of claim 9, wherein: the firstinformation further encodes an identifier of the data hosted by theservice provider; and the request specifies the one or more operationsto be performed in connection with the data.
 14. The non-transitorycomputer-readable storage medium of claim 9, wherein the firstinformation encodes the cryptographic key in plaintext form.
 15. Thenon-transitory computer-readable storage medium of claim 9, wherein thefirst information encodes one or more conditions on submission of therequest for the request to be fulfillable by the service provider. 16.The non-transitory computer-readable storage medium of claim 9, whereinthe first information encodes a manner of how the request is to befulfilled, where the manner is from a plurality of manners by which therequest is fulfillable.
 17. A computer system, comprising: one or moreprocessors; and memory storing instructions that, when executed by theone or more processors, cause the computer system to: generate firstinformation that encodes a request and a cryptographic key; generate anelectronic signature of information verifiable by a service providercapable of fulfilling the request, the electronic signature based atleast in part on a portion of a uniform resource locator and secretinformation inaccessible to another computer system; and make availablethe first information and the electronic signature to enable the othercomputer system to provide the first information and electronicsignature to the service provider to cause the service provider to usethe cryptographic key to fulfill the request by at least: making adetermination whether the electronic signature is valid; and on acondition that the determination indicates that the electronic signatureis valid, using the cryptographic key to perform one or more operationson data to generate a result of the one or more operations; and afterusing the cryptographic key to perform the one or more operations on thedata, performing one or more additional operations to lose access to thecryptographic key.
 18. The computer system of claim 17, wherein theinstructions further comprise instructions that, when executed by theone or more processors, cause the computer system to generate theuniform resource locator to include the first information and theelectronic signature.
 19. The computer system of claim 17, whereinmaking available the first information and the electronic signatureinclude providing a webpage configured with the uniform resource locatorsuch that, selected, causes transmission of the request to the serviceprovider that includes the information and electronic signature.
 20. Thecomputer system of claim 19, wherein the webpage is provided to theother computer system.
 21. The computer system of claim 17, wherein: thefirst information further encodes an identifier of the data hosted bythe service provider; and the request specifies the one or moreoperations to be performed in connection with the data.
 22. The computersystem of claim 17, wherein the first information encodes thecryptographic key in plaintext form.
 23. The computer system of claim17, wherein the first information encodes one or more conditions onsubmission of the request for the request to be fulfillable by theservice provider.
 24. The computer system of claim 17, wherein the firstinformation encodes a manner of how the request is to be fulfilled,where the manner is from a plurality of manners by which the request isfulfillable.
 25. The computer system of claim 17, wherein the secretinformation comprises a second cryptographic key different from thecryptographic key.