×

Method for amortizing authentication overhead

  • US 7,080,046 B1
  • Filed: 10/06/2000
  • Issued: 07/18/2006
  • Est. Priority Date: 09/06/2000
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for authenticating transferred data between a sender computer and a receiver computer over an open network, the method comprising the steps of:

  • establishing a first secure transmission of data between the sender computer and the receiver computer;

    assigning a value to a variable N where the value of N is a positive number and defines a selected number of additional transmissions;

    transmitting selected authentication information including N number of tokens and a checksum value from the sender computer to the receiver computer during the first secure transmission so as to allow the sender computer to authenticate itself, each of the N number of tokens being a unique identifier;

    transmitting an acknowledgment from the receiver computer to the sender computer, upon successful receipt and processing of the first transmission by the receiver computer;

    establishing at least one additional transmission of data between the sender computer and the receiver computer;

    transmitting the data and at least one of the N tokens from the sender computer to the receiver computer during the at least one additional transmission;

    comparing the at least one of the N tokens transmitted from the sender computer during the additional transmission to each of the tokens transmitted from the sender computer during the one or more previous transmissions to determine whether the most recent additional transmission is authentic;

    establishing a second secure transmission between the sender computer and the receiver computer;

    assigning a second value to the variable N where the second value of N is a positive number and defines a second selected number of additional transmissions; and

    transmitting the second value of N, a second value of N number of tokens, and a second checksum value to be used to authenticate the sender computer, from the sender computer to the receiver computer, each of the second N number of tokens being a unique identifier.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×