Secure file transfer
First Claim
Patent Images
1. Method of authentication, wherein a client requests a file from a server, whereby the client and the server share a common secret value and thereby belong to an accepted group, comprising the step of:
- the client forms a first message including a filename, a nonce which is associated with the given filename, a first hash value according to a first hash function formed from the filename and the secret value.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus are provided for identification/authentication of file transfers, that limits the attackers window of opportunity and that aims at incurring a minimum of overhead on the information processing between a client (CL) and a server (SV). According to a preferred embodiment of the invention hash functions (H1-H4) are involved at the server side and the client side. The client and server share a common secret value (S).
26 Citations
9 Claims
-
1. Method of authentication, wherein a client requests a file from a server, whereby the client and the server share a common secret value and thereby belong to an accepted group, comprising the step of:
-
the client forms a first message including a filename, a nonce which is associated with the given filename, a first hash value according to a first hash function formed from the filename and the secret value. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. Client sharing a common secret value with a server, the client and the server thereby belonging to an accepted group, whereby
the client forms a first message comprising a filename, a nonce which is associated with the given filename, a first hash value according to a first hash function formed from the values of the filename and the secret value, and whereby the client receives a second message from the server, the client extracting a file of the received second message, extracting a third hash value from the second message, forming a value of the nonce and the secret value, forming a fourth hash value according to a second hash function formed from the value of the nonce associated with the requested filename and the secret value, comparing the third hash value with the fourth hash value and if the values are the same establishing that the second message stems from a server belonging to the accepted group, and if otherwise, establishing that the server does not belong to the accepted group.
-
8. Server sharing a common secret value with a client, the client and the server thereby belonging to an accepted group, whereby the server receives a first message from the client, the server
extracting the filename from the received first message, extracting a first hash value from the received first message, forming a value of the received filename and the secret value, forming a second hash value according to the first hash function formed from the value of the filename and the secret value, comparing the first hash value with the second hash value and if the values are the same establishing that the first message stems from a client belonging to the accepted group, otherwise establishing that the client does not belong to the accepted group.
Specification