A secure method for requesting resources in a distributed computer network is described. The method comprises of a means of securely integrating a request for a resource along with its validation and authentication from a first server with restrictions for the request such as expiry date and IP address as well as other request parameters. The resulting request is placed on a second server which is capable of decoding and responding to the request or redirects the request securely to a third computer to respond.

 
Web www.patentalert.com

< Inbred broccoli line GKO-1

> Wireless architecture with malware scanning component manager and associated API

> Universal application network architecture

~ 00570