System and method for authenticating streamed data
First Claim
1. A method of authenticating data streamed as indexed data packets to a device, in which authentication data is not distributed over the packets, the method comprising the steps of:
- a) receiving, at the device, data in a plurality of packets transmitted by a data server;
b) submitting a request for a server-computed authentication value to a data authentication server, wherein the data authentication server is adapted to compute the server-computed authentication value based on a subset of the data transmitted by the data server;
c) receiving, at the device, the server-computed authentication value from the data authentication server in response to the request;
d) computing a device-computed authentication value based on a subset of the data received at the device corresponding to the subset of the data transmitted by the data server; and
e) determining if the subset of the data received at the device is authentic by comparing the server-computed and device-computed authentication values.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method that facilitates the authentication of streamed data received at a device, where authentication information is not distributed over the data stream. One embodiment of a method of authenticating data comprises the steps of: receiving, at the device, data in a plurality of packets transmitted by a data server; submitting a request for a server-computed authentication value to a data authentication server, wherein the data authentication server is adapted to compute the server-computed authentication value based on a subset of the data transmitted by the data server; receiving, at the device, the server-computed authentication value from the data authentication server in response to the request; computing a device-computed authentication value based on a subset of the data received at the device corresponding to the subset of the data transmitted by the data server; and determining if the subset of the data received at the device is authentic by comparing the server-computed and device-computed authentication values.
13 Citations
21 Claims
-
1. A method of authenticating data streamed as indexed data packets to a device, in which authentication data is not distributed over the packets, the method comprising the steps of:
-
a) receiving, at the device, data in a plurality of packets transmitted by a data server;
b) submitting a request for a server-computed authentication value to a data authentication server, wherein the data authentication server is adapted to compute the server-computed authentication value based on a subset of the data transmitted by the data server;
c) receiving, at the device, the server-computed authentication value from the data authentication server in response to the request;
d) computing a device-computed authentication value based on a subset of the data received at the device corresponding to the subset of the data transmitted by the data server; and
e) determining if the subset of the data received at the device is authentic by comparing the server-computed and device-computed authentication values. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system for authenticating data streamed as indexed data packets to a device, wherein authentication data is not distributed over the packets, the system comprising:
-
a) a data server adapted to transmit data in a plurality of packets;
b) a device that receives data in the plurality of packets transmitted by the data server;
c) a data authentication server adapted to compute a server-computed authentication value based on a subset of the data transmitted by the data server;
wherein, in operation, the device receives data transmitted by the data server, submits a request to the data authentication server for the server-computed authentication value, receives the server-computed authentication value in response to the request, computes a device-computed authentication value based on a subset of the data received at the device corresponding to the subset of the data transmitted by the data server, and determines if the subset of the data received at the device is authentic by comparing the server-computed and device-computed authentication values. - View Dependent Claims (17, 18, 19, 20, 21)
-
Specification