Method for amortizing authentication overhead
First Claim
1. A method for authenticating transferred data between a sender computer and a receiver computer over an open network, the method comprising the steps of:
- establishing a first secure transmission of data between the sender computer and the receiver computer;
assigning a value to a variable N where the value of N is a positive number and defines a selected number of additional transmissions;
transmitting selected authentication information including N number of tokens and a checksum value from the sender computer to the receiver computer during the first secure transmission so as to allow the sender computer to authenticate itself, each of the N number of tokens being a unique identifier;
transmitting an acknowledgment from the receiver computer to the sender computer, upon successful receipt and processing of the first transmission by the receiver computer;
establishing at least one additional transmission of data between the sender computer and the receiver computer;
transmitting the data and at least one of the N tokens from the sender computer to the receiver computer during the at least one additional transmission;
comparing the at least one of the N tokens transmitted from the sender computer during the additional transmission to each of the tokens transmitted from the sender computer during the one or more previous transmissions to determine whether the most recent additional transmission is authentic;
establishing a second secure transmission between the sender computer and the receiver computer;
assigning a second value to the variable N where the second value of N is a positive number and defines a second selected number of additional transmissions; and
transmitting the second value of N, a second value of N number of tokens, and a second checksum value to be used to authenticate the sender computer, from the sender computer to the receiver computer, each of the second N number of tokens being a unique identifier.
4 Assignments
0 Petitions
Accused Products
Abstract
A method is disclosed for amortizing the authentication overhead of data transmissions. The method comprises establishing a first secure transmission of data between a transmitter and a receiver by transmitting at least one token to the receiver during the first secure transmission. There may be any number of senders and receivers, and any receivers may be a sender and vice versa. The method also comprises establishing at least one additional transmission of data between the sender and the receiver and transmitting the data and at least one token during the at least one additional transmission. In addition, the method compares the at least one token transmitted during the at least one additional transmission to the token transmitted during the first secure transmission to guarantee the authenticity of that at least one additional transmission.
The method may also include transmitting a preselected number of tokens during the first secure transmission. The number of additional transmissions may or may not correspond to the preselected number of tokens. The at least one additional transmission may be conducted over an unsecure connection using open communication. The first secure transmission may be protected or encrypted.
-
Citations
21 Claims
-
1. A method for authenticating transferred data between a sender computer and a receiver computer over an open network, the method comprising the steps of:
-
establishing a first secure transmission of data between the sender computer and the receiver computer; assigning a value to a variable N where the value of N is a positive number and defines a selected number of additional transmissions; transmitting selected authentication information including N number of tokens and a checksum value from the sender computer to the receiver computer during the first secure transmission so as to allow the sender computer to authenticate itself, each of the N number of tokens being a unique identifier; transmitting an acknowledgment from the receiver computer to the sender computer, upon successful receipt and processing of the first transmission by the receiver computer; establishing at least one additional transmission of data between the sender computer and the receiver computer; transmitting the data and at least one of the N tokens from the sender computer to the receiver computer during the at least one additional transmission; comparing the at least one of the N tokens transmitted from the sender computer during the additional transmission to each of the tokens transmitted from the sender computer during the one or more previous transmissions to determine whether the most recent additional transmission is authentic; establishing a second secure transmission between the sender computer and the receiver computer; assigning a second value to the variable N where the second value of N is a positive number and defines a second selected number of additional transmissions; and transmitting the second value of N, a second value of N number of tokens, and a second checksum value to be used to authenticate the sender computer, from the sender computer to the receiver computer, each of the second N number of tokens being a unique identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 20)
-
-
16. A method for securely transferring data between a client computer and a server over an open network, the method comprising the steps of:
-
establishing a first secure transmission between the client computer and the server which is encrypted; assigning a preselected value to a variable N where the preselected value of N is a positive number and defines a selected number of additional transmissions; transmitting selected authentication information including the preselected value of N number of tokens and a checksum value from the client computer to the server during the first secure transmission so as to allow the sender computer to authenticate itself, each of the N number of tokens being a unique identifier; transmitting an acknowledgment from the server to the client computer, upon successful receipt and processing of the first transmission by the client computer; establishing additional transmissions between the client computer and the server corresponding to the preselected number of tokens N; transmitting the data, one of the preselected value of N number of tokens and the checksum value from the client computer to the server during each additional transmission; during each additional transmission, comparing the token transmitted from the client computer to the server during such additional transmission to the corresponding token transmitted during the first secure transmission to determine whether the additional transmission is authentic; establishing a second secure transmission between the client computer and the server; assigning a second value to the variable N where the second value of N is a positive number and defines a second selected number of additional transmissions; and transmitting the second value of N, a second value of N number of tokens, and a second checksum value to be used to authenticate the client computer, from the client computer to the server, each of the second N number of tokens being a unique identifier. - View Dependent Claims (17, 18, 19)
-
-
21. A method for authenticating transferred data between a sender computer and a receiver computer over an open network, the method comprising the steps of:
-
establishing a first secure transmission of data between the sender computer and the receiver computer; assigning a value to a variable N where the value of N is a positive number and defines a selected number of additional transmissions; transmitting selected authentication information including N number of tokens and a checksum value from the sender computer to the receiver computer during the first secure transmission so as to allow the sender computer to authenticate itself, each of the N number of tokens being a unique identifier; transmitting an acknowledgement from the receiver computer to the sender computer, upon successful receipt and processing of the first transmission by the receiver computer; establishing at least one additional transmission of data between the sender computer and the receiver computer; transmitting the data and at least one of the N tokens from the sender computer to the receiver computer during the at least one additional transmission; comparing the at least one of the N tokens transmitted from the sender computer during the additional transmission to each of the tokens transmitted from the the sender computer during the one or more previous transmission(s) to determine whether the most recent additional transmission is authentic; and establishing a second secure transmission between the sender computer and the receiver computer; assigning a second value to the variable N where the second value of N is a positive number and defines a second selected number of additional transmissions; transmitting the second value of N, a second value of N number of tokens, and a second checksum value to be used to authenticate the sender computer, from the sender computer to the receiver computer, each of the second N number of tokens being a unique identifier; and each of the additional transmissions being variable and adaptively selected, at least in part, based upon a set of criteria used in an algorithm to determine the number of additional transmissions, the criteria being selected from a group consisting of the frequency of transmissions between the sender computer and the receiver computer, the closeness of the sender computer to the source of the transactions, and the usage patterns of the sender computer.
-
Specification