System, method and program for protecting communication
First Claim
1. A method for transferring data between a first computer and a second computer, said method comprising the steps of:
- said first computer sending a first request to said second computer in a first connection, said first request including a request to start a session, an encrypted ID of said session, and an encrypted hash value for information in said first request, said information in said first request comprising said request to start said session and said encrypted session ID;
said second computer receiving said first request, and as a result, decrypting said encrypted hash value in said first request, independently determining a hash value for said information in said first request and comparing the independently determined hash value to the decrypted hash value, and if there is match, starting a session with said first computer;
subsequently, said first computer sending a second request to said second computer in a second connection in said session, said second request including a request to download or upload data of a file, an encrypted ID of said session, an identity of said file to at least partially upload or download, and an encrypted hash value for information in said second request, said information in said second request comprising said request to download or upload data, said encrypted session ID and said file identity; and
said second computer receiving said second request in said session, and as a result, decrypting said encrypted hash value in said second request, independently determining a hash value for said information in said second request and comparing the independently determined hash value to the decrypted hash value, and if there is match, processing said request to at least partially download or upload said file.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for transferring data between a first computer and a second computer. The first computer sends a first request to the second computer in a first connection. The first request includes a request to start a session, an encrypted ID of the session, and an encrypted hash value for information in the first request. The information in the first request comprises the request to start the session and the encrypted session ID. The second computer receives the first request, and as a result, decrypts the encrypted hash value in the first request, independently determines a hash value for the information in the first request and compares the independently determined hash value to the decrypted hash value. If there is match, the second computer starts a session with the first computer. Subsequently, the first computer sends a second request to the second computer in a second connection in the session. The second request includes a request to download or upload data of a file, an encrypted ID of the session, an identity of the file to at least partially upload or download, and an encrypted hash value for information in the second request. The information in the second request comprises the request to download or upload data, the encrypted session ID and the file identity. The second computer receives the second request in the session, and as a result, decrypts the encrypted hash value in the second request, independently determines a hash value for the information in the second request and compares the independently determined hash value to the decrypted hash value. If there is match, the second computer processes the request to at least partially download or upload the file.
-
Citations
20 Claims
-
1. A method for transferring data between a first computer and a second computer, said method comprising the steps of:
-
said first computer sending a first request to said second computer in a first connection, said first request including a request to start a session, an encrypted ID of said session, and an encrypted hash value for information in said first request, said information in said first request comprising said request to start said session and said encrypted session ID;
said second computer receiving said first request, and as a result, decrypting said encrypted hash value in said first request, independently determining a hash value for said information in said first request and comparing the independently determined hash value to the decrypted hash value, and if there is match, starting a session with said first computer;
subsequently, said first computer sending a second request to said second computer in a second connection in said session, said second request including a request to download or upload data of a file, an encrypted ID of said session, an identity of said file to at least partially upload or download, and an encrypted hash value for information in said second request, said information in said second request comprising said request to download or upload data, said encrypted session ID and said file identity; and
said second computer receiving said second request in said session, and as a result, decrypting said encrypted hash value in said second request, independently determining a hash value for said information in said second request and comparing the independently determined hash value to the decrypted hash value, and if there is match, processing said request to at least partially download or upload said file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for transferring data between a first computer and a second computer, said system comprising:
-
said first computer including means for sending a first request to said second computer in a first connection, said first request including a request to start a session, an encrypted ID of said session, and an encrypted hash value for information in said first request, said information in said first request comprising said request to start said session and said encrypted session ID;
said second computer including means for receiving said first request, and as a result, decrypting said encrypted hash value in said first request, independently determining a hash value for said information in said first request and comparing the independently determined hash value to the decrypted hash value, and if there is match, starting a session with said first computer;
said first computer including means for subsequently sending a second request to said second computer in a second connection in said session, said second request including a request to download or upload data of a file, an encrypted ID of said session, an identity of said file to at least partially upload or download, and an encrypted hash value for information in said second request, said information in said second request comprising said request to download or upload data, said encrypted session ID and said file identity; and
said second computer including means for receiving said second request in said session, and as a result, decrypting said encrypted hash value in said second request, independently determining a hash value for said information in said second request and comparing the independently determined hash value to the decrypted hash value, and if there is match, processing said request to at least partially download or upload said file. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A computer program product for transferring data between a first computer and a second computer, said computer program product comprising:
-
a computer readable medium;
first program instructions within said first computer to send a first request to said second computer in a first connection, said first request including a request to start a session, an encrypted ID of said session, and an encrypted hash value for information in said first request, said information in said first request comprising said request to start said session and said encrypted session ID;
second program instructions within said second computer to receive said first request, and as a result, decrypt said encrypted hash value in said first request, independently determine a hash value for said information in said first request and compare the independently determined hash value to the decrypted hash value, and if there is match, start a session with said first computer;
third program instructions within said first computer to subsequently send a second request to said second computer in a second connection in said session, said second request including a request to download or upload data of a file, an encrypted ID of said session, an identity of said file to at least partially upload or download, and an encrypted hash value for information in said second request, said information in said second request comprising said request to download or upload data, said encrypted session ID and said file identity; and
fourth program instructions within said second computer to receive said second request in said session, and as a result, decrypt said encrypted hash value in said second request, independently determine a hash value for said information in said second request and compare the independently determined hash value to the decrypted hash value, and if there is match, process said request to at least partially download or upload said file; and
whereinsaid first, second, third and fourth program instructions are recorded on said medium. - View Dependent Claims (17, 18, 19, 20)
-
Specification