摘要 |
A system including a computer and a computer readable hardware storage device containing instructions which, upon being executed by the computer, implements a method for restricting access to information transmitted over a computing network. A resource request for a resource to be located is received. The resource request contains a universal resource locator (URL). The URL is evaluated to determine whether encryption of none, part, or all of the URL is required. It is determined that the requested resource is available and in response, the requested resource contained in the resource request is located. It is determined whether encryption is required for none, part, or all of a return URL of the requested resource that is to be returned to a location of the resource request. |
主权项 |
1. A system comprising a computer and a computer readable hardware storage device, said storage device containing instructions which, upon being executed by the computer, implements a method for restricting access to information transmitted over a computing network, said method comprising:
receiving, by the computer at a network location, a resource request for a resource to be located, said resource request containing a universal resource locator (URL); evaluating, by the computer, the URL to determine whether encryption of none, part, or all of the URL is required; determining by the computer, that the requested resource is available and in response, locating, by the computer, the requested resource contained in the resource request; and determining, by the computer, whether encryption is required for none, part, or all of a return URL of the requested resource that is to be returned to a location of the resource request. |