Separating Control and Data Operations to Support Secured Data Transfers
First Claim
Patent Images
1. One or more processor-accessible media including processor-executable instructions, the processor-executable instructions comprising:
- a protocol unit that includes a first protocol module and a second protocol module;
the first protocol module to communicate over at least one control channel in accordance with a first protocol, the second protocol module to communicate over one or more data channels in accordance with a second protocol; and
a security unit that includes a security negotiator;
the security negotiator to negotiate security via the at least one control channel using the first protocol module, the negotiated security to be used on the one or more data channels to transmit data.
2 Assignments
0 Petitions
Accused Products
Abstract
For a data transfer, security is negotiated via a control channel operating in accordance with a first protocol. The data is transmitted responsive to the security negotiation on a data channel operating in accordance with a second protocol.
-
Citations
20 Claims
-
1. One or more processor-accessible media including processor-executable instructions, the processor-executable instructions comprising:
-
a protocol unit that includes a first protocol module and a second protocol module;
the first protocol module to communicate over at least one control channel in accordance with a first protocol, the second protocol module to communicate over one or more data channels in accordance with a second protocol; anda security unit that includes a security negotiator;
the security negotiator to negotiate security via the at least one control channel using the first protocol module, the negotiated security to be used on the one or more data channels to transmit data. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
via at least one control channel operating in accordance with a first protocol, negotiating confidentiality information for a data transfer; via the at least one control channel operating in accordance with the first protocol, negotiating integrity information for the data transfer; and via one or more data channels operating in accordance with a second protocol, transferring data responsive to the negotiated confidentiality information and the negotiated integrity information. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A device comprising:
an application that is to negotiate security in a security negotiation performed via at least one control channel operating in accordance with a first protocol, the application to implement a data transmission that is responsive to the negotiated security via one or more data channels operating in accordance with a second protocol;
wherein the negotiated security creates a binding between the security negotiation and the data transmission such that security information negotiated via the at least one control channel can be applied to data transmitted on the one or more data channels.- View Dependent Claims (16, 17, 18, 19, 20)
Specification