Method and system for cryptographically secure hashed end marker of streaming data
First Claim
1. ) A method for transmitting streaming data, comprising:
- establishing a shared secret between a receiving participant and a sending participant;
using the shared secret to initialize a cryptographically secure hashed end of file marker for the streaming data;
transmitting the streaming data from the sending participant to the receiving participant; and
comparing the streaming data with the cryptographically secure hashed end of file marker to determine when an end of the streaming data occurs.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for cryptographically secure hashed end marker of streaming data. In one embodiment, a method for transmitting streaming data comprises establishing a shared secret between a receiving participant and a sending participant; using the shared secret to initialize a cryptographically secure hashed end of file marker for the streaming data that is updated as the streaming data is transmitted or received; transmitting the streaming data from the sending participant to the receiving participant; and comparing the streaming data with the cryptographically secure hashed end of file marker to determine when an end of the streaming data occurs.
-
Citations
20 Claims
-
1. ) A method for transmitting streaming data, comprising:
-
establishing a shared secret between a receiving participant and a sending participant;
using the shared secret to initialize a cryptographically secure hashed end of file marker for the streaming data;
transmitting the streaming data from the sending participant to the receiving participant; and
comparing the streaming data with the cryptographically secure hashed end of file marker to determine when an end of the streaming data occurs.
-
- 2. ) The method of claim I further comprising updating the cryptographically secure hashed end of file marker with contents of each block of the streaming data as the streaming data is transmitted.
-
5. ) The method of claim I further comprising:
calculating, by the receiving participant, the end of file marker, and comparing, by the receiving participant, blocks of data within the streaming data with the end of file marker to determine if any data in the streaming data matches the end of file marker. - View Dependent Claims (6, 7)
-
8. ) A computer-readable medium having computer-readable program code embodied therein for causing a computer system to perform:
-
exchanging a public key between two participants to generate a secret key;
initializing, with the secret key, a cryptographically secure end of file for streaming data;
streaming data between the two participants; and
transmitting the cryptographically secure end of file to signify between the participants an end to the streaming data. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. ) A system for transmitting streaming data, comprising:
-
a network;
a first participant in communication with the network; and
a second participant in communication with the network, wherein the first and second participants communicate via the network to calculate a cryptographically secure end of file marker for the streaming data such that only the first and second participants can recognize the cryptographically secure end of file marker for the streaming data and such that cryptographically secure end of file marker is updated as the streaming data is transmitted or received. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification