×

Method and system for authenticating a data stream

  • US 10,263,783 B2
  • Filed: 08/23/2013
  • Issued: 04/16/2019
  • Est. Priority Date: 08/23/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method for authenticating, using data transmitted via a secure channel, at least a portion of a data stream transmitted by a sender via an unsecure channel, wherein the sender includes secure hardware storing a secret signing key, the method comprising:

  • receiving, by a verifier from the sender via the unsecure channel, the portion of the data stream transmitted by the sender, wherein the portion of the data stream transmitted by the sender includes a plurality of data fragments on different granularity levels;

    receiving, by the verifier from the sender via the secure channel, a root, signed with a digital signature corresponding to the secret signing key, of a hierarchical authentication structure,wherein the hierarchical authentication structure includes elements representing hash values of the data fragments of the data stream on the different granularity levels,wherein a hash value for a data fragment on a higher granularity level is based on the hash values of the data fragments on a lower granularity level;

    receiving, by the verifier from the sender via the secure channel, a portion of the hash values of the data fragments from the hierarchical authentication structure;

    reconstructing, by the verifier, a top granularity level value of the hierarchical authentication structure by computing the hash values of the plurality of data fragments of the portion of the data stream received by the receiver from the sender via the unsecure channel and using the portion of the hash values received from the sender via the secure channel, andperforming authentication of the portion of the data stream received by the verifier from the sender via the unsecure channel by comparing the reconstructed top granularity level value of the hierarchical authentication structure with the root of the generated hierarchical authentication structure signed with the digital signature,wherein an erasure code is used for transmitting partitions of the portion of the hash values received from the sender, andwherein the data stream is analyzed, and based on a result, the erasure code and/or the different granularity levels are determined.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×