Methods, Systems And Computer Program Products For Authenticating Computer Processing Devices And Transferring Both Encrypted And Unencrypted Data Therebetween
First Claim
1. A method of transferring a set of data from a first processing device to a second processing device, the method comprising:
- performing a secure shell (“
SSH”
) authentication to authenticate a first user that is logged onto the first processing device to a second user that is logged onto the second processing device;
dividing the set of data into a first data subset and a second data subset;
encrypting the first data subset to provide an encrypted data set;
transferring the encrypted data set from the first processing device to the second processing device; and
transferring the second data subset from the first processing device to the second processing device without encrypting the second data subset.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods for transferring a set of data from a first processing device to a second processing device are provided. Pursuant to these methods a secure shell (“SSH”) authentication is performed to authenticate a first user that is logged onto the first processing device to a second user that is logged onto the second processing device. The set of data is divided into a first data subset and a second data subset. The first data subset is encrypted to provide an encrypted data set. The encrypted data set is transferred from the first processing device to the second processing device. The second data subset is also transferred from the first processing device to the second processing device, but without encrypting the second data subset. Related data transfer systems and computer program products are also provided.
-
Citations
16 Claims
-
1. A method of transferring a set of data from a first processing device to a second processing device, the method comprising:
-
performing a secure shell (“
SSH”
) authentication to authenticate a first user that is logged onto the first processing device to a second user that is logged onto the second processing device;dividing the set of data into a first data subset and a second data subset; encrypting the first data subset to provide an encrypted data set; transferring the encrypted data set from the first processing device to the second processing device; and transferring the second data subset from the first processing device to the second processing device without encrypting the second data subset. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A data processing device, comprising:
-
a data collection unit that is configured to receive raw data from at least one external monitoring system; a data transfer unit that is configured to generate control information to transfer the received data to a second processing device; an authentication unit that is configured to authenticate the data processing device to the second data processing device using an SSH authentication protocol; an encryption unit that is configured to encrypt the control information; and a transmitter that is configured to transmit the received data and the control information to the second processing device, wherein at least some of the received data is transferred without encryption. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A computer program product for transferring a set of data from a first processing device to a second processing device, the computer program product comprising a computer readable medium having computer readable program code embodied therein, the computer readable program code comprising:
-
computer readable program code that is configured to perform an SSH authentication to authenticate a first user that is logged onto the first processing device to a second user that is logged onto the second processing device; computer readable program code that is configured to divide the set of data into a first data subset and a second data subset; computer readable program code that is configured to encrypt the first data subset to provide an encrypted data set; computer readable program code that is configured to transfer the encrypted data set from the first processing device to the second processing device; and computer readable program code that is configured to transfer the second data subset from the first processing device to the second processing device without encrypting the second data subset. - View Dependent Claims (13, 14, 15, 16)
-
Specification