Database layer caching for video communications

ABSTRACT

An apparatus includes a storage, a network interface, and a processor. The storage is to store content within a webcast or a virtual event. The network interface transmits a CDN token key and receives a client content request including a content hash and a message authentication code. The processor performs a decryption of the message authentication code, at least in part based on the CDN token key, and performs a reverse hash on the content hash to obtain a content ID that identifies the content. The network interface transmits the content, at least in part based on the content ID.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation of U.S. patent application Ser. No.17/379,177 filed on Jul. 19, 2021 and entitled “DATABASE LAYER CACHINGFOR VIDEO COMMUNICATIONS,” which is hereby incorporated by referenceherein in its entirety.

BACKGROUND Technical Field

This disclosure relates to retrieving digital information stored in acontent delivery network and, in particular, where the digitalinformation is static content for a studio webcast or a virtual event.

Related Art

Conventional video communication software distributes video content tosmall audiences, such as in a videoconference. This software is oftenproprietary to a particular company and, therefore, requiresinstallation and configuration of the software by members of theaudience.

Because the videoconference has relatively few audience members, thevideoconference host might ask the audience members to install andconfigure the proprietary software. If the audience members areaffiliated with the same business, then the business can providetechnical support for configuring the software.

In some situations, it is unreasonable to ask audience members toinstall the proprietary software for the videoconference. Similarly, itcan be unreasonable to provide technical support for the proprietarysoftware in some situations. These situations include largeenvironments, such as trade shows, professional conferences, universitystudent orientations, and videoconferences with thousands of employeesof transnational companies across separately-configured networks.

In these situations, the environment hosts might provide content viacommon software, such as a web browser. This content can be providedthrough studio webcasting and/or virtual events.

A virtual event simulates a physical presence in a virtual place similarto the real world, such as a trade show, a business convention, aconference, or a sales meeting. A virtual event can include, forexample, virtual booths, show floors or show rooms, custom navigationcapabilities, or studio webcasts.

A studio webcast is an audio or video presentation for internal andexternal audiences. The audience can receive the studio webcast via abrowser, without software such as Adobe Flash. The studio webcast caninclude video programs using multiple video sources, including screenshares.

In addition, Content Delivery Networks (CDNs) are traditionally employedto serve static unchanging content. Studio webcasting and virtual eventsoften do not include CDNs.

BRIEF SUMMARY

In a large event, similar or identical requests from audiences can beexpressed to allow a CDN to cache the results of database queries,greatly reducing contention on the database. Additionally, this systemcan incorporate security into the retrieval of cached information, sothat there is no degradation of security by using the CDN.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

FIG. 1 illustrates an exemplary network including a host, a contentdelivery network, and clients according to an implementation of thepresent disclosure.

FIG. 2 illustrates an exemplary screen shot of a virtual event.

FIG. 3 illustrates a signal flow for database layer caching in a studiowebcast or a virtual event, according to an implementation of thepresent disclosure.

FIG. 4 illustrates a data structure, according to an implementation ofthe present disclosure.

FIG. 5 illustrates an algorithm performed by a host for database layercaching, according to an implementation of the present disclosure.

FIG. 6 illustrates an algorithm performed by a content delivery networkfor database layer caching, according to an implementation of thepresent disclosure.

FIG. 7 illustrates an algorithm performed by a client for database layercaching, according to an implementation of the present disclosure.

FIG. 8 illustrates an algorithm performed by a host to generate ahash-based message authentication code, according to an implementationof the present disclosure.

FIG. 9 illustrates a computing device, according to an implementation ofthe present disclosure.

DETAILED DESCRIPTION

FIG. 1 illustrates an exemplary network including a host, a contentdelivery network, and clients according to an implementation of thepresent disclosure. As illustrated in FIG. 1, host 120, CDN 140, andclients 160A, 160B are connected via network 180.

Host 120, CDN 140, and clients 160A, 160B include, for example,computing devices.

Although host 120 and CDN 140 each are illustrated as a single computingdevice, host 120 and CDN 140 typically include more than one computingdevice. The computing devices of CDN 140 are typically separated by anetwork to provide geographic proximity to a diverse array of clients160A, 160B.

Clients 160A, 160B are labeled individually to provide context for thisdisclosure. In most implementations, there are a greater number ofclients than the two clients 160A, 160B. When it is not necessary tospecify an individual client, clients 160A, 160B are referred to asclient 160.

Network 180 is a network of an unspecified numbers of computers. Network180 can be, for example, the Internet or an intranet.

Conventionally, clients 160A, 160B directly communicate with host 120 ofan environment, such as a studio webcast and/or a virtual event. Thesecommunications involve a company key, a show UUID (universally uniqueidentifier), an event key, a user key, and a user type.

The company key identifies a tenant of the host 120 and is, for example,a sponsor of the environment. The company key is static and is tied tothe tenant.

The show UUID is a randomized, unique string that represents theenvironment in which the clients 160A, 160B are participating. The showUUID generally differs for each environment.

The event key is data associated to a specific presentation within theenvironment. The event key generally differs for each environment.

The user key is a user-specific value identifying a user of client 160Aor a user of client 160B.

The user type identifies a type of the user of client 160A or of theuser of client 160B. The user type is, for example, a sponsorrepresentative, a presenter, or one or more levels of attendee (e.g.,normal or premium).

The host 120 can assign the user key and the user type when a user ofclient 160 registers for the environment with the host 120. The user keyand the user type do not change per login. The user type can changeduring an event.

Very large audiences attending webcasts or virtual events tend torequest data from a database of the host 120 at the same time. Forexample, clients 160A, 160B can request static content, such as a video,at the same time. This sudden traffic can easily overwhelm the databaseof the host 120 for short periods of times, resulting in noticeableslowdown in response times.

FIG. 2 illustrates an exemplary screen shot of a virtual event. Thescreen shot of FIG. 2 shows a Live & Upcoming tab 210 and an On Demandtab 220.

In a common implementation, an On Demand video is an example of thestatic content requested by clients 160A, 160B.

The static content is not limited to an On Demand video. For example,the static content can be an audio file, an image, a program (e.g., agame or an application), source code, a text file, or any other content.

FIG. 3 illustrates a signal flow for database layer caching in a studiowebcast or a virtual event, according to an implementation of thepresent disclosure. Signal flow 300 begins at S310, where the client 160can transmit an event registration indicating an event ID and an addressof the client 160. The event registration can also include a user IDidentifying a user of the client 160. The host 120 receives the eventregistration from the client 160.

The host 120 can generate a user value. For example, the user value canbe based on the user ID. In implementations in which the client 160 doesnot transmit a user ID, the host 120 can assign an arbitrary (e.g.,random or sequential) user value. In particular, the host 120 determinesa user key for the user ID. The host 120 determines a show UUID for theevent ID. The host 120 can also determine a user type based on the eventID and, in some implementations, the user ID. Signal flow 300 thenadvances to S320.

In S320, the CDN 140 assigns and transmits a CDN token key to the host120. In some implementations, the CDN token key is a static valueretrieved by the host 120. Signal flow 300 then advances to S330.

In S330, the host 120 generates a hash-based message authentication code(HMAC), based on the user value and the CDN token key. In someimplementations, the host 120 generates the HMAC also based on a contenthash.

The host 120 can determine the company key and the event key, based onthe event ID. The host 120 can determine the content IDs and languagelocales therefor, based on the show UUID. The language locale is thelanguage in which the static content is to be presented to the user ofthe client 160.

The host 120 can generate the content hash, based on the show UUID, thecompany key, the event key, and a content ID. For example, the host 120concatenates the show UUID, the company key, the event key, and thecontent ID to produce a respective content hash concatenation. The host120 then generates a respective Base 64 hash of the respective contenthash concatenation to produce the respective content hash.

In some implementations, the host 120 generates the respective contenthash additionally based on the language locale. In such animplementation, the language locale is additionally concatenated withinthe respective content hash concatenation.

Data within the respective content hash concatenation can beconcatenated in any predetermined order (e.g., with the show UUIDsecond-to-last, rather than first).

The host 120 then can generate an access control list (ACL), based onthe user value. The host 120 generates the ACL also based on therespective content hashes for the static contents in the event.

For example, if the event includes only one static content, then the ACLincludes at least a portion of a Uniform Resource Locator (URL) (e.g., atext string) identifying the user value and the content hash.

If the event includes more than one static content, then the ACL caninclude the user value and the content hashes for the static contents.In some implementations, if the event includes an unknown amount ofstatic content, the content hash can be represented by a wildcardcharacter.

The host 120 then hashes the ACL with the CDN token key to generate theHMAC. In one implementation, this hashing is based on Secure HashAlgorithm (SHA) 256.

Signal flow 300 then advances to S340.

In S340, the host 120 transmits event data, for example, to the addressof the client 160. The event data can include the company key, the showUUID, the event key, the user value, and the HMAC. The event data alsoincludes one or more content IDs identifying static content within theenvironment. In some implementations, the event data also includespreview images and/or content titles for the static content. In someimplementations, the event data includes an address of the CDN 140. Insome implementations, the event data includes the user key and usertype. The event data optionally includes the language locale for thestatic content. The client 160 receives the event data.

In S350, the client 160 generates a client content request for theselected static content. If only one static content is available foraccess in this environment, then the client 160 generates the clientcontent request for the one static content. If more than one staticcontent is available in this show, then the client 160 generates theclient content request for the selected static content. Of course, theclient 160 can also generate the client content request for more thanone of the static contents.

The client content request includes a content hash and an address of theclient 160.

In one implementation, the client produces the content hash by combiningthe show UUID, the company key, the event key, the content ID of theselected static content, and the language locale (optionally). Forexample, the combining is a concatenation. The concatenation is notlimited to this order. In addition, other forms of combining the showUUID, the company key, the event key, and the content ID to generate thecontent hash are possible. The client 160 then produces the content hashby hashing the combined data using a reversible hash, e.g., Base 64.

The client 160 can combine (e.g., concatenate) the user key, the usertype, and the show UUID. The concatenation is not limited to this order.In addition, other forms of combining the user key, user type, and showUUID are possible. The client 160 can take a reversible hash, e.g., Base64, over the combined data to produce the user value.

The signal flow 300 then advances to S360.

In S360, the client 160 transmits the client content request to the CDN140. The client content request includes the user value and the contenthash. The client content request can also include the HMAC and anaddress of the client 160. The CDN 140 receives the client contentrequest from the client. The signal flow 300 then advances to S370.

In S370, the CDN 140 extracts the HMAC, the content hash, and the uservalue from the client content request.

The CDN 140 decrypts the HMAC using the CDN Token Key to produce adecryption result. The CDN 140 performs an operation on the decryptionresult to produce one or more operation results. This operationgenerally is the reverse operation performed by the host 120 inproducing the HMAC. For example, if the host 120 generated the HMAC byconcatenating the content hash and the user, then the CDN 140 splits thedecryption result into the one or more operation results.

The CDN 140 determines whether the one or more operation results match(e.g., are the same as) the content hash and the user value included inthe client content request. If the one or more operation results do notmatch the content hash and the user value, then the CDN 140 determinesthe client content request is invalid. Thus, the CDN 140 can ignore theclient content request. In this way, the CDN 140 can verify the user ofclient 160 has been authorized to retrieve the static content by thehost 120.

If the CDN 140 determines the one or more operation results match thecontent hash and the user value included in the client content request,then the CDN 140 can determine the content request is valid. The CDN 140then determines whether a storage of the CDN 140 is storing the staticcontent, based on the content hash. For example, the CDN 140 performs areverse hash function on the content hash to produce a reverse hashresult. The CDN 140 then performs a reverse operation of the reversehash result, such as splitting the reverse hash result, to produce thecontent ID (and, optionally, the language locale). The CDN 140 thendetermines whether a local storage is storing the static contentassociated with the content ID (and, optionally, the language locale).For example, the static content can be named with the content ID or betagged with the content ID.

If the CDN 140 determines the local storage includes the static content,then the CDN 140 transmits the static content in a client contentresponse in S390.

Returning to S380, if the CDN 140 determines the local storage does notinclude the content, then the CDN 140 transmits a CDN content request toan address of host 120. The CDN content request includes the contenthash, the user value, and an address of the CDN 140. In someimplementations, the CDN content request includes the HMAC.

The host 120 receives the CDN content request. In some implementations,the host 120 checks the validity of the CDN content request based on theHMAC, in a similar manner to how the CDN 140 checks the validity of theclient content request based on the HMAC in S370. If the host 120determines the HMAC is invalid, then the CDN content request is invalid.Thus, in some implementations, the host 120 can perform an erroroperation. In some implementations, the error operation includestransmitting an error message to the address of the CDN 140 that the CDNcontent request is invalid. In various implementations, the erroroperation includes transmitting a notification to an eventadministrator. In other implementations, the error operation is takingno action, e.g., to avoid inadvertent participation in a distributeddenial-of-service (DDOS) attack.

If the host 120 does not determine the CDN content request is invalid(e.g., if the host 120 does not check the validity of the CDN contentrequest or if the host 120 determines the CDN content request is valid),then the host 120 validates the client 160 based on the user value. Forexample, the host 120 can determine whether the user value or user keyidentifies a valid registrant for the environment associated with theevent key or show UUID. If the user value or user key does not identifya valid registrant, then the host 120 performs an error operation, suchas one of the above error operations.

The host 120 determines the static content based on the content ID. Someimplementations additionally include the language locale as a basis forthe determination.

In some implementations, the host 120 determines whether the user isauthorized to receive the content, based on the user value or user type.For example, in some implementations, the host 120 can determine anormal attendee receives access to public static content, and the host120 can determine a presenter receives access to public content andbehind-the-scenes static content for their presentation software. Insome implementations, the host 120 can determine a sponsorrepresentative receives access to public content and behind-the-scenescontent. The host 120 can determine a premium user receives additionalcontent.

If the host 120 determines the user key is valid and, in someimplementations, that the user type is authorized to receive the staticcontent, then the host 120 transmits a CDN content response to theaddress of the CDN 140. The CDN content response includes the staticcontent (optionally, in the language of the language locale) and thecontent ID. The CDN 140 then receives the CDN content response. Thus,CDN 140 can obtain the static content. Thus, CDN 140 can store thestatic content and tag or otherwise associate the static content withthe content ID.

In S390, the CDN 140 transmits a client content response to the addressof the client 160. The client content response includes the staticcontent. The client 160 receives the client content response.

The client 160 can then reproduce the content on a user outputinterface, such as a display.

FIG. 4 illustrates a data structure for a client content request,according to an implementation of the present disclosure. For example,the data structure can be included in the client content requesttransmitted in S360.

As shown in FIG. 4, the data structure includes a content hash field410, a user value field 430, and an HMAC field 450. The data structureillustrated in FIG. 4 is exemplary. In some implementations, the clientcontent request sets forth the fields as strings in a Hypertext TransferProtocol (HTTP) request or in a web request header.

The content hash field 410 includes a Base 64 hash of the show UUID, thecompany key, the event key, and the content ID. In some implementations,the Base 64 hash is also taken of the language locale.

The user value field 430 includes a Base 64 hash of the user key, theuser type, and the show UUID.

The HMAC field 450 includes a hash of the ACL and the CDN token key. Theaccess control list includes the user value. The access control list caninclude one or more content hashes.

FIG. 5 illustrates an algorithm 500 performed by the host 120 fordatabase layer caching, according to an implementation of the presentdisclosure.

The algorithm 500 begins in S510 and proceeds to S520. In S520, anetwork interface of the host 120 receives an event registration from,for example, the client 160. The event registration can include a userID of a user of the client 160 and an address of the client 160. Thealgorithm 500 then advances to S530.

In S530, the network interface of the host 120 receives a CDN token keyfrom, for example, the CDN 140. In some implementations, the host 120first transmits a token key request to the CDN 140 to provide the CDNtoken key. The CDN token key request can include an address of the host120. The host 120 then receives a CDN token key response including theCDN token key.

In some implementations, a user output interface outputs the CDN tokenkey to a user of the host 120. For example, a display of the host 120can display the CDN token key to the user of the host 120. The user ofthe host 120 can then manually input the CDN token key using a userinput interface, such as a keyboard. In other implementations, the CDNtoken key is input to the host 120 without the intervention of a user.

The algorithm 500 then advances to S540.

In S540, a processor of the host 120 generates the HMAC. As discussedabove, a processor of the host 120 can generate the user value based onthe user ID. The processor of host 120 can also generate content hashesbased on the one or more content IDs of static content within theenvironment. The processor of the host 120 can generate the ACL based onthe user value and, in some implementations, the one or more contenthashes. The processor of the host 120 hashes the ACL with the CDN tokenkey to generate the HMAC. In one implementation, the processor of thehost 120 performs this hashing based on SHA-256. The algorithm 500 thenadvances to S550.

In S550, the network interface of the host 120 transmits the event datato the address of the client 160. The event data can include the companykey, the show UUID, the event key, the user value, and the HMAC. In someimplementations, the event data includes the user key and user typeinstead of, or in addition to, the user value.

The network interface can save on the amount of data transferred bysending the show UUID, company key, event key, and content IDs, ratherthan by sending content hashes for the static content. This savingsarises because the show UUID, company key, and event key can be the samefor the content IDs, but the content hashes would be different. In someimplementations, the network interface can transfer the content hashesinstead of the show UUID, company key, event key, and content IDs, toreduce the processing by the client 160.

The algorithm 500 then advances to S560.

In S560, the network interface of the host 120 can receive a CDN contentrequest. For example, if the static content is determined to not bestored in a local cache of CDN 140, the host 120 can receive the CDNcontent request. The CDN content request can include the address of theCDN 140. The algorithm 500 then advances to S570.

In S570, the processor of the host 120 determines whether the CDNcontent request is valid. As discussed above, the processor of the host120 can determine whether the HMAC is valid, whether the content hashand the user value are valid, and whether the static content isauthorized to be accessed by the user type of the user of client 160. Ifthe processor of the host 120 determines the CDN content request is notvalid, the algorithm 500 advances to S590. If the processor of the hostdetermines the CDN content request is valid, then the algorithm 500advances to S580.

In S580, the network interface of the host 120 transmits the CDN contentresponse to the address of the CDN 140. The CDN content response caninclude the static content. The algorithm 500 then advances to S590.

The algorithm 500 concludes in S590.

FIG. 6 illustrates an algorithm 600 performed by the CDN 140 fordatabase layer caching, according to an implementation of the presentdisclosure.

The algorithm 600 begins at S610 and proceeds to S620. In S620, anetwork interface of the CDN 140 transmits the CDN token key to the host120. For example, the network interface of the CDN 140 can receive atoken key request including an address of the host 120. The CDN 140 cantransmit a token key response including the CDN token key to the addressof the host 120. The algorithm 600 then advances to S630.

In S630, the CDN 140 receives a client content request, for example,from the client 160. The client content request includes the contenthash, the user value, the HMAC, and the address of the client 160. Insome implementations, the client content request includes the address ofthe host 120. The algorithm 600 then advances to S640.

In S640, the processor of the CDN 140 decrypts the HMAC based on the CDNtoken key. For example, the processor of the CDN 140 decrypts the HMACto produce a decrypted content hash and a decrypted user value. Thealgorithm 600 then advances to S650.

In S650, the processor of the CDN 140 determines whether the HMAC isvalid. For example, the processor of the CDN 140 can determine the HMACis invalid, because the HMAC has too many or too few characters. Inother examples, the processor of the CDN 140 can determine the HMAC isinvalid, because the decrypted content hash does not match (e.g., is thesame as) the received content hash or the decrypted user value does notmatch (e.g., is the same as) the received user value.

If the processor of the CDN 140 determines the HMAC value is not valid,then the algorithm 600 advances to S690 and concludes. If the processorof the CDN 140 determines the HMAC is valid, the algorithm 600 advancesto S660.

In S660, the processor of the CDN 140 determines the content ID, basedon the content hash, and whether the static content identified by thecontent ID is cached locally. For example, content requests from client160A and client 160B for the same static content can have different uservalues but the same content hash. If the processor of the CDN 140determines the content having the content ID is cached locally in astorage, then the algorithm 600 advances to S680. If the processor ofthe CDN 140 determines the content is not cached locally in a storage,then the algorithm 600 advances to S670.

In S670, the CDN 140 obtains the content from the host 120.

For example, the network interface of the CDN 140 transmits the CDNcontent request to the address of the host 120. The CDN content requestincludes the content hash and the user value. In some implementations,the CDN content request includes the HMAC. The CDN content request canalso include the address of the CDN 140.

The network interface of the CDN 140 then receives the CDN contentresponse. Typically, the CDN content response includes the content. Insome implementations, the CDN content response includes an address(e.g., a URL) at which the content can be obtained. The networkinterface of the CDN 140 can then request and receive the content fromthe URL. The CDN 140 can locally cache the static content in a storageand tag the static content with the content ID. The algorithm 600 thenadvances to S680.

In S680, the network interface of the CDN 140 transmits the clientcontent response to the address of the client 160. The client contentresponse includes the requested content. The algorithm 600 then advancesto S690 and concludes.

FIG. 7 illustrates an algorithm 700 performed by the client 160 fordatabase layer caching, according to an implementation of the presentdisclosure.

The algorithm 700 begins at S710 and advances to S720.

In S720, a network interface of the client 160 transmits an eventregistration to an address of the host 120. The event registration caninclude a user ID identifying a user of the client 160. The eventregistration includes an address of the client 160. In someimplementations, the event registration includes an event ID to identifyan event. The algorithm 700 then advances to S730.

In S730, the network interface of the client 160 receives the event datafrom the host 120. The event data can include the company key, the showUUID, the event key, the user value, and the HMAC. The event data alsoincludes one or more content IDs. In some implementations, the eventdata also includes preview images and/or content titles. The event dataoptionally includes a language locale for the content. In someimplementations, the event data includes the user key and user typeinstead of, or in addition to, the user value. The algorithm 700 thenadvances to S740.

In S740, a processor of the client 160 generates a client contentrequest. The client 160 can begin this generation process by displaying,on a display of client 160, the preview images and/or content titles ofthe event. In some implementations, the user of client 160 can use auser input interface to select one of the preview images and/or contenttitles. The processor of the client 160 determines the content ID forthe selected preview image and/or content title.

In one implementation, the processor of the client 160 produces thecontent hash by combining the show UUID, the company key, the event key,and the content ID. In some implementations, the processor of the client160 produces the content hash by combining the language locale inaddition. In one example, the combining is a concatenation. Theconcatenation is not limited to this order. In addition, other forms ofcombining the show UUID, the company key, the event key, and the contentID are possible. The processor of the client 160 then produces thecontent hash by taking a hash over the combined data using a reversiblehash, e.g., Base 64.

In some implementations in which the event data does not include theuser value, the processor of the client 160 can combine (e.g.,concatenate) the user key, the user type, and the show UUID.Concatenation is not limited to this order. In addition, other forms ofcombining the user key, user type, and show UUID are possible. Theprocessor of the client 160 can take a reversible hash, e.g., Base 64,over the combined data to produce the user value.

The client content request includes the content hash, the user value,the HMAC, and the address of the client 160. The algorithm 700 thenadvances to S750.

In S750, the network interface of the client 160 transmits the clientcontent request to the address of the CDN 140. The algorithm 700 thenadvances to S760.

In S760, the network interface of the client 160 receives the clientcontent response. The client content response includes the staticcontent. The algorithm 700 then advances to S770.

In S770, a user output interface of the client 160 outputs the electedstatic content. For example, a display of the client 160 can display avideo. The algorithm 700 then advances to S780 and concludes.

FIG. 8 illustrates an algorithm 800 performed by a host to generate ahash-based message authentication code, according to an implementationof the present disclosure.

Algorithm 800 begins at S810 and proceeds to S820. In S820, theprocessor of the host 120 generates a user value.

In some implementations in which the host 120 receives a user ID in theevent registration, the processor of the host 120 determines a user keyand a user type based on the user ID.

In other implementations, such as when the event registration does notinclude the user ID, the processor of the host 120 determines a user keyin an arbitrary manner, such as randomly or sequentially. The processorof the host 120 can assign a generic user type, such as attendee.

In an implementation in which the event registration includes an eventID, the processor of the host 120 can determine a show UUID based on theevent ID. In some implementations, the processor of the host 120 candetermine the show UUID based on the user ID.

The processor of the host 120 then generates a user combination resultbased on the user key, the user value, and the show UUID. The processorof the host 120 can produce the user combination result by concatenatingthe user key, the user value, and the show UUID in a predeterminedorder. The processor of the host 120 then generates the user value byhashing the user combination result using, for example, Base 64. Thealgorithm 800 then advances to S830.

In S830, the processor of the host 120 generates one or more contenthashes, based on the show UUID, a company key, an event key, and one ormore content IDs. The processor of the host 120 can determine thecompany key and the event key based on the show UUID. The processor ofthe host 120 can determine the one or more content IDs, based on any ofthe show UUID, the event key, or, as appropriate, the event ID. Inimplementations involving a language locale for static content, theprocessor of the host 120 can determine the language locales based on arespective content ID for a respective content ID.

The processor of the host 120 then produces a hash combination resultbased on the show UUID, the company key, the event key, and a respectivecontent ID. The processor of the host 120 can produce the hashcombination result by concatenating the show UUID, the company key, theevent key, and the respective content ID in a predetermined order. Insome implementations, the hash combination result is also based on alanguage locale for the respective content ID. The processor of the host120 then generates the content hash by hashing the hash combinationresult using, for example, Base 64. The algorithm 800 then advances toS840.

In S840, the processor of the host 120 generates an ACL, based on theuser value. In many implementations, the processor of the host 120generates the access control list also based on the one or more contenthashes. For example, the processor of the host 120 can generate a textstring including the user value and the one or more content hashes.

In some implementations, the text string includes a plurality ofentries, where the plurality of entries include the user value and arespective one of the one or more content hashes. The plurality ofentries can be delimited within the text string, such as by commas orsemicolons.

In other implementations, the processor of the host 120 generates theaccess control list using a wildcard character instead of the one ormore content hashes. Thus, the text string can include the user valueand the wildcard character. The algorithm 800 then advances to S850.

In S850, the processor of the host 120 generates an HMAC based on theACL and the CDN token key. For example, the processor of the host 120hashes the ACL together with the CDN token key to produce the HMAC. Insome implementations, this hashing is performed with SHA 256.

The algorithm 800 then advances to S860 and concludes.

FIG. 9 illustrates a computing device 900, according to animplementation of the present disclosure. The host 120, CDN 140, andclients 160A, 160B can be or include a computing device, as shown inFIG. 9.

Although illustrated within a single housing, computing device 900 canbe distributed across plural housings or sub-systems that cooperate inexecuting program instructions. In some implementations, the computingdevice 900 can include one or more blade server devices, standaloneserver devices, personal computers, routers, hubs, switches, bridges,firewall devices, intrusion detection devices, mainframe computers,network-attached storage devices, smartphones and other mobiletelephones, and other types of computing devices. The system hardwarecan be configured according to any computer architecture, such as aSymmetric Multi-Processing (SMP) architecture or a Non-Uniform MemoryAccess (NUMA) architecture.

The computing device 900 can include a network interface 910 thatprovides one or more communication connections and/or one or moredevices that allow for communication between the computing device 900and other computing systems (not shown) over a communication network orcollection of networks (not shown) or the air. The network interface cancommunicate using near-field communications (NFC), Wi-Fi™, Bluetooth,Ethernet, facsimile, or any other wired or wireless interface.

The computing device 900 can also include a user input interface 920that receives inputs from a human. The user input interface can be orinclude a mouse, a touchpad, a keyboard, a touchscreen, a trackball, acamera, a microphone, a joystick, a game controller, a scanner, or anyother input device.

The computing device 900 can include a memory 930, also termed a“storage.” The memory 930 can include or be one or morecomputer-readable storage media readable by a processor 940 and thatstore software. The memory 930 can be implemented as one storage deviceand can also be implemented across multiple co-located or distributedstorage devices or sub-systems. The memory 930 can include additionalelements, such as a controller, that communicate with the processor 940.The memory 930 can also include storage devices and/or sub-systems onwhich data and/or instructions are stored. The computing device 900 canaccess one or more storage resources to access information to carry outany of the processes indicated in this disclosure and, in particular,FIGS. 3 and 5-8.

The memory 930 can be or include a read-only memory (ROM), aprogrammable ROM (PROM), an erasable PROM (EPROM), an electricallyerasable PROM (EEPROM), a random-access memory (RAM), a dynamic RAM(DRAM), a static RAM (SRAM), a hard drive, a cache memory, a flashmemory, a removable disk, or a tape reel. The memory 930 can be orinclude resistive RAM (RRAM) or a magneto-resistive RAM (MRAM).

Software stored in memory 930 can include routines for at leastpartially performing at least one of the processes illustrated in FIGS.3 and 5-8 and can be implemented in program instructions. Further, thesoftware, when executed by the computing device 900 in general or theprocessor 940 specifically, can direct, among other functions, thecomputing device 900 or the processor 940 to perform the database layercaching as described herein.

The computing device 900 can include a processor 940. Processor 940 canbe or include one or more hardware processors and/or other circuitrythat retrieve and execute software from the memory 930. The processor940 can be implemented within one processing device, chip, or packageand can also be distributed across multiple processing devices, chips,packages, or sub-systems that cooperate in executing programinstructions. In some implementations, the processor 940 is or includesa Graphics Processing Unit (GPU). The GPU can benefit the visual/imageprocessing in the computing device 900. The GPU, or any second-orderprocessing element independent from the processor 940 dedicated toprocessing imagery and other perception data in real or near real-time,can provide a benefit.

Processor 940 can have any register size, such as a 32-bit register or a64-bit register, among others. Processor 940 can include multiple cores.Implementations of processor 940 are not limited to any particularnumber of threads. Processor 940 can be fabricated by any processtechnology, such as 14 nm process technology.

The computing device 900 can also include a user output interface 950that outputs information to a human user. The user output interface 950can be or include a display (e.g., a screen), a touchscreen, speakers, aprinter, or a haptic feedback unit.

In implementations where the host 130 or CDN 140 includes multiplecomputing devices, a server of the system or, in a serverlessimplementation, a peer can use one or more communications networks thatfacilitate communication among the computing devices. For example, theone or more communications networks can include or be a local areanetwork (LAN) or wide area network (WAN) that facilitate communicationamong the computing devices. One or more direct communication links canbe included between the computing devices. In addition, in some cases,the computing devices can be installed at geographically distributedlocations. In other cases, the multiple computing devices can beinstalled at one geographic location, such as a server farm or anoffice.

As used herein, the terms “storage media,” “computer-readable storagemedia,” or “computer-readable storage medium” can refer tonon-transitory storage media, such as a hard drive, a memory chip, andcache memory, and to transitory storage media, such as carrier waves orpropagating signals.

Aspects of the system for database layer caching can be implemented invarious manners (e.g., as a method, a system, a computer programproduct, or one or more computer-readable storage media). Accordingly,aspects of the present disclosure can take the form of a hardwareimplementation, a software implementation (including firmware, residentsoftware, or micro-code) or an implementation combining software andhardware aspects that can generally be referred to herein as a“circuit,” “module” or “system.” Functions described in this disclosurecan be implemented as an algorithm executed by one or more hardwareprocessing units, e.g., one or more microprocessors of one or morecomputers. In various embodiments, different operations and portions ofthe operations of the methods described can be performed by differentprocessing units. Furthermore, aspects of the present disclosure cantake the form of a computer program product embodied in one or morecomputer-readable media having computer-readable program code embodied,e.g., encoded or stored, thereon. In various implementations, such acomputer program can, for example, be downloaded (or updated) toexisting devices and systems or be stored upon manufacturing of thesedevices and systems.

The detailed description presents various descriptions of specificimplementations. The innovations described can be implemented in amultitude of different ways, for example, as defined and covered by theclaims and/or select examples. In the description, reference is made tothe drawings where like reference numerals can indicate identical orfunctionally similar elements. Elements illustrated in the drawings arenot necessarily drawn to scale. Additionally, certain embodiments caninclude more elements than illustrated in a drawing and/or a subset ofthe elements illustrated in a drawing. Further, some implementations canincorporate a suitable combination of features from two or moredrawings.

The disclosure describes various illustrative implementations andexamples for implementing the features and functionality of the presentdisclosure. The components, arrangements, and/or features are describedin connection with various implementations and are merely examples tosimplify the present disclosure and are not intended to be limiting. Inthe development of actual implementations, implementation-specificdecisions can be made to achieve the developer's specific goals,including compliance with system, business, and/or legal constraints,which can vary from one implementation to another. Additionally, whilesuch a development effort might be complex and time-consuming, it wouldbe a routine undertaking for those of ordinary skill in the art havingthe benefit of this disclosure.

The attached drawings depict spatial relationships between variouscomponents and to the spatial orientation of various aspects ofcomponents. The devices, components, members, and apparatuses can bepositioned in any orientation. Thus, the use of terms such as “above”,“below”, “upper”, “lower”, “top”, “bottom”, or other similar terms todescribe a spatial relationship between various components or todescribe the spatial orientation of aspects of such components describesa relative relationship between the components or a spatial orientationof aspects of such components, respectively, as the components describedcan be oriented in any direction.

The systems, methods and devices of this disclosure have severalinnovative aspects, no one of which is solely responsible for theattributes disclosed herein. Some objects or advantages might not beachieved by implementations described herein. Thus, for example, certainimplementations can operate in a manner that achieves or optimizes oneadvantage or group of advantages as taught herein and not other objectsor advantages as taught or suggested herein.

In one example implementation, electrical circuits of the drawings canbe implemented on a board of an associated electronic device. The boardcan be a general circuit board that can hold various components of theinternal electronic system of the electronic device and, further,provide connectors for other peripherals. More specifically, the boardcan provide the electrical connections by which other components of thesystem can communicate electrically. Any processors (inclusive ofdigital signal processors, microprocessors, supporting chipsets, etc.)and computer-readable non-transitory memory elements can be coupled tothe board based on configurations, processing demands, and computerdesigns. Other components such as external storage, additional sensors,controllers for audio/video display, and peripheral devices can beattached to the board as plug-in cards, via cables, or integrated intothe board itself. In various implementations, the functionalitiesdescribed herein can be implemented in emulation form as software orfirmware running within one or more configurable (e.g., programmable)elements arranged in a structure that supports these functions. Thesoftware or firmware providing the emulation can be provided on one ormore non-transitory, computer-readable storage media includinginstructions to allow one or more processors to carry out thosefunctionalities.

In another example implementation, the electrical circuits of thedrawings can be implemented as stand-alone modules (e.g., a device withassociated components and circuitry configured to perform a specificapplication or function) or implemented as plug-in modules intoapplication specific hardware of electronic devices. Implementations ofthe present disclosure can be readily included in a system-on-chip (SOC)package. An SOC represents an integrated circuit (IC) that integratescomponents of a computer or other electronic system into one chip. TheSOC can contain digital, analog, mixed-signal, and often radio frequencyfunctions that can be provided on one chip substrate. Other embodimentscan include a multi-chip-module (MCM), with a plurality of separate ICslocated within one electronic package and that interact through theelectronic package. In various other implementations, the processors canbe implemented in one or more silicon cores in Application SpecificIntegrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs),programmable array logic (PAL), generic array logic (GAL), and othersemiconductor chips.

The specifications, dimensions, and relationships outlined herein (e.g.,the number of processors and logic operations) have been offered fornon-limiting purposes of example and teaching. Such information can bevaried considerably. For example, various modifications and changes canbe made to arrangements of components. The description and drawings are,accordingly, to be regarded in an illustrative sense, not in arestrictive sense.

With the numerous examples provided herein, interaction was described interms of two, three, four, or more electrical components for purposes ofclarity and example. The system can be consolidated in any manner. Alongsimilar design alternatives, the illustrated components, modules, andelements of the drawings can be combined in various possibleconfigurations within the scope of this disclosure. In certain cases, itmight be easier to describe one or more of the functionalities of agiven set of flows by referencing a limited number of electricalelements. The electrical circuits of the drawings and their teachingsare readily scalable and can accommodate many components, as well asmore complicated/sophisticated arrangements and configurations.Accordingly, the examples provided do not limit the scope or inhibit theteachings of the electrical circuits as potentially applied to a myriadof other architectures.

In this disclosure, references to various features (e.g., elements,structures, modules, components, steps, operations, characteristics,etc.) included in “one implementation”, “example implementation”, “animplementation”, “another implementation”, “some implementations”,“various implementations”, “other implementations”, “alternativeimplementation”, and the like are intended to mean that any suchfeatures are included in one or more implementations of the presentdisclosure and might or might not necessarily be combined in the sameimplementations. Some operations can be deleted or omitted whereappropriate, or these operations can be modified or changedconsiderably. In addition, the timing of these operations can be alteredconsiderably. The preceding operational flows have been offered forpurposes of example and discussion. Implementations described hereinprovide flexibility in that any suitable arrangements, chronologies,configurations, and timing mechanisms can be provided.

Examples

In Example A1, an apparatus includes a network interface that receives aCDN token key and transmits event data including a content ID thatidentifies content within a webcast or a virtual event. The apparatusalso includes a processor configured to generate a messageauthentication code, at least in part based on the content ID and theCDN token key. The event data identifies the message authenticationcode, and the network interface further transmits the content.

Example A2 is the apparatus of example A1, wherein the network interfacereceives an event registration that identifies a user ID for the webcastor virtual event, and the processor further is configured to generatethe message authentication code, at least in part based on the user ID.

Example A3 is the apparatus of any of Examples A1-A2, wherein theprocessor further is configured to generate a content hash, at least inpart based on the content ID, and to generate the message authenticationcode, at least in part based on the content hash.

Example A4 is the apparatus of any of Examples A1-A3, wherein theprocessor further is configured to generate an access control list, atleast in part based on the content ID, and to generate the messageauthentication code, at least in part based on the access control list.

Example A5 is the apparatus of any of Examples A1-A4, wherein thenetwork interface receives a CDN content request for the content andtransmits the content, at least in part based on the CDN contentrequest.

Example A6 is the apparatus of Example A5, wherein the network interfacetransmits the content, at least in part based on a determination thatthe CDN content request is valid.

Example A7 is the apparatus of Example A6, wherein the network interfacereceives an event registration that identifies a user ID for the webcastor virtual event, and the determination is at least in part based on thecontent ID and the user ID.

In Example A8, a non-transitory, computer-readable medium is encodedwith instructions that, when executed by a computer, cause the computerto perform a method including: receiving a CDN token key; transmittingevent data including a content ID that identifies content within awebcast or a virtual event; generating a message authentication code, atleast in part based on the content ID and the CDN token key, wherein theevent data identifies the message authentication code; and transmittingthe content.

Example A9 is the medium of Example A8, the method further comprising:receiving an event registration that identifies a user ID for thewebcast or virtual event; and generating the message authenticationcode, at least in part based on the user ID.

Example A10 is the medium of any of Examples A8-A9, the method furthercomprising: generating a content hash, at least in part based on thecontent ID; and generating the message authentication code, at least inpart based on the content hash.

Example A11 is the medium of any of Examples A8-A9, the method furthercomprising: generating an access control list, at least in part based onthe content ID; and generating the message authentication code, at leastin part based on the access control list.

Example A12 is the medium of any of Examples A8-A11, the method furthercomprising: receiving a CDN content request for the content; andtransmitting the content, at least in part based on the CDN contentrequest.

Example A13 is the medium of Example A12, the method further comprising:transmitting the content, at least in part based on a determination thatthe CDN content request is valid.

Example A14 is the medium of Example A13, the method further comprising:receiving an event registration that identifies a user ID for thewebcast or virtual event, wherein the determination is at least in partbased on the content ID and the user ID.

In Example A15, a method is implemented by a host apparatus, the methodincluding: receiving a CDN token key; transmitting event data includinga content ID that identifies content within a webcast or a virtualevent; generating a message authentication code, at least in part basedon the content ID and the CDN token key, wherein the event dataidentifies the message authentication code; and transmitting thecontent.

Example A16 is the method of Example A15, further comprising: receivingan event registration that identifies a user ID for the webcast orvirtual event; and generating the message authentication code, at leastin part based on the user ID.

Example A17 is the method of any of Examples A15-A16, furthercomprising: generating a content hash, at least in part based on thecontent ID; and generating the message authentication code, at least inpart based on the content hash.

Example A18 is the method of any of Examples A15-A17, furthercomprising: generating an access control list, at least in part based onthe content ID; and generating the message authentication code, at leastin part based on the access control list.

Example A19 is the method of any of Examples A15-A18, furthercomprising: receiving a CDN content request for the content; andtransmitting the content, at least in part based on the CDN contentrequest.

Example A20 is the method of Example A19, further comprising:transmitting the content, at least in part based on a determination thatthe CDN content request is valid.

Example A21 is the method of Example A20 wherein the network interfacereceives an event registration that identifies a user ID for the webcastor virtual event, and the determination is at least in part based on thecontent ID and the user ID.

In Example B1, an apparatus includes a storage to store content within awebcast or a virtual event; a network interface that transmits a CDNtoken key and receives a client content request including a firstcontent hash and a message authentication code; and a processorconfigured to perform a decryption of the message authentication code,at least in part based on the CDN token key, and to perform a reversehash on the content hash to obtain a content ID that identifies thecontent. The network interface transmits the content, at least in partbased on the content ID.

Example B2 is the apparatus of Example B1, wherein the network interfacetransmits a CDN content request, at least in part based on adetermination the content is not stored in the storage, and the networkinterface receives the content.

Example B3 is the apparatus of Example B2, wherein the CDN contentrequest includes the content hash.

Example B4 is the apparatus of any of Examples B1-B3, wherein the clientcontent request includes a first user value, the decryption produces asecond user value, and the processor further is configured to perform adetermination that the first user value matches the second user value.

Example B5 is the apparatus of Example B4, wherein the network interfacefurther transmits the content, at least in part based on thedetermination that the first user value matches the second user value.

Example B6 is the apparatus of any of Examples B1-B5, wherein thedecryption produces a second content hash, and the processor further isconfigured to perform a determination that the first content hashmatches the second content hash.

Example B7 is the apparatus of any of Examples B1-B6, wherein thenetwork interface further transmits the content, at least in part basedon the determination that the first content hash matches the secondcontent hash.

In Example B8, a non-transitory, computer-readable medium is encodedwith instructions that, when executed by a computer, cause the computerto perform a method including: transmitting a CDN token key; receiving aclient content request including a first content hash and a messageauthentication code; performing a decryption of the messageauthentication code, at least in part based on the CDN token key;performing a reverse hash on the content hash to obtain a content IDthat identifies content within a webcast or a virtual event; andtransmitting the content, at least in part based on the content ID.

Example B9 is the medium of Example B8, the method further comprising:transmitting a CDN content request, at least in part based on adetermination the content is not stored in a storage; and receiving thecontent.

Example B10 is the medium of Example B9, wherein the CDN content requestincludes the content hash.

Example B11 is the medium of any of Examples B8-B10, wherein the clientcontent request includes a first user value, the decryption produces asecond user value; and the method further includes: performing adetermination that the first user value matches the second user value.

Example B12 is the medium of Example B11, the method further comprising:transmitting the content, at least in part based on the determinationthat the first user value matches the second user value.

Example B13 is the medium of any of Examples B8-B12, wherein thedecryption produces a second content hash, and the method furthercomprises: performing a determination that the first content hashmatches the second content hash.

Example B14 is the medium of any of Examples B8-B13, the method furthercomprising: transmitting the content, at least in part based on thedetermination that the first content hash matches the second contenthash.

In Example B15, a method includes: transmitting a CDN token key;receiving a client content request including a first content hash and amessage authentication code; performing a decryption of the messageauthentication code, at least in part based on the CDN token key;performing a reverse hash on the content hash to obtain a content IDthat identifies content within a webcast or a virtual event; andtransmitting the content, at least in part based on the content ID.

Example B16 is the method of Example B15, further comprising:transmitting a CDN content request, at least in part based on adetermination the content is not stored in a storage; and receiving thecontent.

Example B17 is the method of Example B16, wherein the CDN contentrequest includes the content hash.

Example B18 is the method of any of Examples B15-B17, wherein the clientcontent request includes a first user value, the decryption produces asecond user value; and the method further includes: performing adetermination that the first user value matches the second user value.

Example B19 is the method of Example B18, further comprising:transmitting the content, at least in part based on the determinationthat the first user value matches the second user value.

Example B20 is the method of any of Examples B15-B19, wherein thedecryption produces a second content hash, and the method furthercomprises: performing a determination that the first content hashmatches the second content hash.

Example B21 is the method of any of Examples B15-B20, furthercomprising: transmitting the content, at least in part based on thedetermination that the first content hash matches the second contenthash.

In Example C1, an apparatus includes a network interface that receivesevent data that identifies a content ID and a message authenticationcode, wherein the content ID identifies a content within a webcast or avirtual event; and a processor configured to generate a content hash, atleast in part based on the content ID. The network interface transmits acontent request and receives the content, and the content requestidentifies the content hash and the message authentication code.

Example C2 is the apparatus of Example C1, wherein the network interfacetransmits an event registration that identifies an address of the clientapparatus.

Example C3 is the apparatus of Example C2, wherein the event dataidentifies a user value, and the content request identifies the uservalue.

Example C4 is the apparatus of any of Examples C2-C3, wherein the eventregistration includes an event ID to identify the webcast or the virtualevent.

Example C5 is the apparatus of any of Examples C1-C4, wherein the eventdata identifies a company key, a show ID, and an event key, and theprocessor further is configured to generate the content hash, at leastin part based on the company key, the show ID, and the event key.

Example C6 is the apparatus of any of Examples C1-C5, furthercomprising: a display that displays the content.

Example C7 is the apparatus of Example C6, further comprising: a userinput interface, wherein the event data identifies a preview image ortitle of the content ID, the event data further identifies a pluralityof content IDs including the content ID, the display performs a displayof the preview image or title, the apparatus receives an input from theuser input interface, at least in part based on the display of thepreview image or title, and the processor further is configured togenerate the content hash, at least in part based on the input.

In Example C8, a non-transitory, computer-readable medium is encodedwith instructions that, when executed by a computer, cause the computerto perform a method including: receiving event data that identifies acontent ID and a message authentication code, wherein the content IDidentifies a content within a webcast or a virtual event; generating acontent hash, at least in part based on the content ID; transmitting acontent request; and receiving the content. The content requestidentifies the content hash and the message authentication code.

Example C9 is the medium of Example C8, the method further comprising:transmitting an event registration that identifies an address of thecomputer.

Example C10 is the medium of Example C9, wherein the event dataidentifies a user value, and the content request identifies the uservalue.

Example C11 is the medium of any of Examples C9-C10, wherein the eventregistration includes an event ID to identify the webcast or the virtualevent.

Example C12 is the medium of any of Examples C8-C11, wherein the eventdata identifies a company key, a show ID, and an event key, and themethod further includes: generating the content hash, at least in partbased on the company key, the show ID, and the event key.

Example C13 is the medium of any of Examples C8-C12, the method furthercomprising: displaying, on a display, the content.

Example C14 is the medium of Example C13, wherein the event dataidentifies a preview image or title of the content ID, the event datafurther identifies a plurality of content IDs including the content ID,and the method further comprises: displaying, on the display, thepreview image or title; receiving an input from a user input interface,at least in part based on the displaying the preview image or title; andgenerating the content hash, at least in part based on the input.

In Example C15, a method includes: receiving event data that identifiesa content ID and a message authentication code, wherein the content IDidentifies a content within a webcast or a virtual event; generating acontent hash, at least in part based on the content ID; transmitting acontent request; and receiving the content. The content requestidentifies the content hash and the message authentication code.

Example C16 is the method of Example C15, further comprising:transmitting an event registration that identifies an address of thecomputer.

Example C17 is the method of Example C16, wherein the event dataidentifies a user value, and the content request identifies the uservalue.

Example C18 is the method of any of Examples C16-C17, wherein the eventregistration includes an event ID to identify the webcast or the virtualevent.

Example C19 is the method of any of Examples C15-C18, wherein the eventdata identifies a company key, a show ID, and an event key, and themethod further includes: generating the content hash, at least in partbased on the company key, the show ID, and the event key.

Example C20 is the method of any of Examples C15-C19, furthercomprising: displaying, on a display, the content.

Example C21 is the method of Example C20, wherein the event dataidentifies a preview image or title of the content ID, the event datafurther identifies a plurality of content IDs including the content ID,and the method further comprises: displaying, on the display, thepreview image or title; receiving an input from a user input interface,at least in part based on the displaying the preview image or title; andgenerating the content hash, at least in part based on the input.

I claim:
 1. An apparatus, comprising: a storage to store content withina webcast or a virtual event; a network interface that transmits aContent Delivery Network (CDN) token key and receives a client contentrequest including a first content hash and a message authenticationcode; and a processor configured to perform a decryption of the messageauthentication code, at least in part based on the CDN token key, and toperform a reverse hash on the first content hash to obtain a content IDthat identifies the content, wherein the network interface transmits thecontent, at least in part based on the content ID.
 2. The apparatus ofclaim 1, wherein the network interface transmits a CDN content request,at least in part based on a determination the content is not stored inthe storage, the CDN content request includes the first content hash,and the network interface receives the content.
 3. The apparatus ofclaim 1, wherein the client content request includes a first user value,the decryption produces a second user value, and the processor furtheris configured to perform a determination that the first user valuematches the second user value.
 4. The apparatus of claim 3, wherein thenetwork interface further transmits the content, at least in part basedon the determination that the first user value matches the second uservalue.
 5. The apparatus of claim 1, wherein the decryption produces asecond content hash, and the processor further is configured to performa determination that the first content hash matches the second contenthash.
 6. The apparatus of claim 5, wherein the network interface furthertransmits the content, at least in part based on the determination thatthe first content hash matches the second content hash.
 7. The apparatusof claim 1, wherein the first content hash includes a hash of a showidentifier, a company key, an event key, and the content ID, the showidentifier is a randomized string, the company key identifies a tenantof the apparatus, and the event key is associated with a presentationwithin an environment.
 8. A non-transitory, computer-readable mediumencoded with instructions that, when executed by a computer, cause thecomputer to perform a method including: transmitting a CDN token key;receiving a client content request including a first content hash and amessage authentication code; performing a decryption of the messageauthentication code, at least in part based on the CDN token key;performing a reverse hash on the first content hash to obtain a contentID that identifies content within a webcast or a virtual event; andtransmitting the content, at least in part based on the content ID. 9.The medium of claim 8, the method further comprising: transmitting a CDNcontent request, at least in part based on a determination the contentis not stored in a storage, wherein the CDN content request includes thefirst content hash; and receiving the content.
 10. The medium of claim8, the method further comprising: performing a determination that afirst user value matches a second user value, wherein the client contentrequest includes the first user value, and the decryption produces thesecond user value.
 11. The medium of claim 10, wherein the content istransmitted, at least in part based on the determination that the firstuser value matches the second user value.
 12. The medium of claim 8, themethod further comprising: performing a determination that the firstcontent hash matches a second content hash, wherein the decryptionproduces the second content hash.
 13. The medium of claim 12, whereinthe content is transmitted, at least in part based on the determinationthat the first content hash matches the second content hash.
 14. Themedium of claim 8, wherein the first content hash includes a hash of ashow identifier, a company key, an event key, and the content ID, theshow identifier is a randomized string, the company key identifies atenant of the computer, and the event key is associated with apresentation within an environment.
 15. A method implemented by acomputing device, the method comprising: transmitting a CDN token key;receiving a client content request including a first content hash and amessage authentication code; performing a decryption of the messageauthentication code, at least in part based on the CDN token key;performing a reverse hash on the first content hash to obtain a contentID that identifies content within a webcast or a virtual event; andtransmitting the content, at least in part based on the content ID. 16.The method of claim 15, further comprising: transmitting a CDN contentrequest, at least in part based on a determination the content is notstored in a storage of the computing device, the CDN content requestincluding the first content hash; and receiving the content.
 17. Themethod of claim 15, further comprising: performing a determination thata first user value matches a second user value, wherein the clientcontent request includes the first user value, and the decryptionproduces the second user value.
 18. The method of claim 17, wherein thecontent is transmitted, at least in part based on the determination thatthe first user value matches the second user value.
 19. The method ofclaim 15, further comprising: performing a determination that the firstcontent hash matches a second content hash, wherein the decryptionproduces the second content hash, and the content is transmitted, atleast in part based on the determination that the first content hashmatches the second content hash.
 20. The method of claim 15, wherein thefirst content hash includes a hash of a show identifier, a company key,an event key, and the content ID, the show identifier is a randomizedstring, the company key identifies a tenant of the computing device, andthe event key is associated with a presentation within an environment.