A secure method for requesting resources in a distributed computer network
is described. The method comprises of a means of securely integrating a
request for a resource along with its validation and authentication from
a first server with restrictions for the request such as expiry date and
IP address as well as other request parameters. The resulting request is
placed on a second server which is capable of decoding and responding to
the request or redirects the request securely to a third computer to
respond.