Payload layer security for file transfer
First Claim
1. A method for providing file transfer security, the method comprising the steps of:
- receiving an authentication file that includes decrypting information; and
receiving an encrypted payload file, the decrypting information being configured to facilitate decryption of the payload file.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for providing file transfer security includes receiving an authentication file including a first key and authentication information, extracting the first key from the authentication file, decrypting the authentication information with the first key, and validating the authentication information. The authentication information is encrypted, and may include a nonce, a timestamp, and/or a second key. A system for providing file transfer security includes a DMZ proxy programmed and configured to receive an authentication file from a client including authentication information. The DMZ proxy extracts a first key from the authentication file, decrypts the authentication information with the first key, and validates the authentication information.
124 Citations
80 Claims
-
1. A method for providing file transfer security, the method comprising the steps of:
-
receiving an authentication file that includes decrypting information; and
receiving an encrypted payload file, the decrypting information being configured to facilitate decryption of the payload file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for providing file transfer security, the method comprising the steps of:
-
receiving a payload file on a block-by-block basis;
if an error is present in a received block, detecting the error; and
upon detection of an error in a received block, terminating the receiving of the payload file wherein the provided file transfer security is File Transfer Connection Secure. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method for providing file transfer security, the method comprising the steps of:
-
receiving an authentication file including a first key and authentication information, wherein the authentication file is associated with a payload file;
extracting the first key from the authentication file; and
decrypting the authentication information with the first key. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
- 34. A connection-secure system for providing File Transfer Security in which a sender performs all cryptographic operations before transmitting any or all of a payload file to the recipient.
-
40. A system for providing file transfer security, the system comprising one or more processors configured to perform the steps of:
-
receiving an authentication file that includes decrypting information; and
receiving an encrypted payload file, the decrypting information being configured to facilitate decryption of the payload file. - View Dependent Claims (41, 42, 43, 44, 45, 46, 47)
-
-
48. A system for providing file transfer security, the system comprising one or more processors configured to perform the steps of steps of:
-
receiving a payload file on a block-by-block basis;
if an error is present in a received block, detecting the error; and
upon detection of an error in a received block, terminating the receiving of the payload file wherein the provided file transfer security is File Transfer Connection Secure. - View Dependent Claims (49, 50, 51, 52, 53, 54, 55, 56)
-
-
57. A system for providing file transfer security, the system comprising one or more processors configured to perform the steps of:
-
receiving an authentication file including a first key and authentication information, wherein the authentication file is associated with a payload file;
extracting the first key from the authentication file; and
decrypting the authentication information with the first key. - View Dependent Claims (58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72)
-
- 73. A connection-secure system, comprising one or more processors, for providing File Transfer Security in which a sender performs all cryptographic operations before transmitting any or all of a payload file to the recipient.
-
79. A method for providing file transfer security, the method comprising the steps of:
-
receiving an authentication file that includes decrypting information;
receiving an encrypted payload file, the decrypting information being configured to facilitate decryption of the payload file;
decrypting the payload file by use of the decrypting information; and
detecting an error in the payload file by way of cryptographically secure error detection method;
wherein a key is used to secure the error detection algorithm, the key having a selectable entropy.
-
-
80. A method for providing file transfer security, the method comprising the steps of:
-
receiving an authentication file including a first key and authentication information, wherein the authentication file is associated with a payload file;
extracting the first key from the authentication file;
decrypting the authentication information with the first key;
receiving a payload file associated with the authentication file;
the authentication file comprising a second key, wherein the payload is encrypted with the second key, decrypting the payload file with the second key;
validating the decrypted payload on a block-by-block basis;
if an error is present in a received block, detecting the error; and
upon detection of an error in a received block, terminating the receiving of the payload file.
-
Specification