Adaptive method for amortizing authentication overhead
First Claim
1. A method for authenticating transferred data between a sender computer and a receiver computer of a service broker system for interactive monitoring and control of data to and from Internet enabled devices of a sender/receiver computer security system over the Internet, the method comprising the steps of:
- establishing a first secure transmission of data over the Internet between a virtual gateway of the sender computer and a Web site of the receiver computer, the computers being provided with browser programming for accessing and/or displaying files and other data between the sender and receiver computers over the Internet;
establishing at least one additional transmission of data between the sender computer gateway and the receiver computer Web site;
adaptively determining the number of additional transmissions between the sender computer gateway and the receiver computer Web site;
transmitting the data during at least one of the additional transmissions; and
authenticating each transmission in which data is transmitted.
4 Assignments
0 Petitions
Accused Products
Abstract
A method is disclosed for amortizing the authentication overhead of data transmissions. The method comprises establishing a first secure transmission of data between a transmitter and a receiver by transmitting at least one token to the receiver during the first secure transmission. There may be any number of senders and receivers, and any receivers may be a sender and vice versa. The method also comprises establishing at least one additional transmission of data between the sender and the receiver and transmitting the data and at least one token during the at least one additional transmission. In addition, the method compares the at least one token transmitted during the at least one additional transmission to the token transmitted during the first secure transmission to guarantee the authenticity of that at least one additional transmission. The method may also include transmitting a preselected number of tokens during the first secure transmission. The number of additional transmissions may or may not correspond to the preselected number of tokens. The at least one additional transmission may be conducted over an unsecure connection using open communication. The first secure transmission may be protected or encrypted.
216 Citations
17 Claims
-
1. A method for authenticating transferred data between a sender computer and a receiver computer of a service broker system for interactive monitoring and control of data to and from Internet enabled devices of a sender/receiver computer security system over the Internet, the method comprising the steps of:
-
establishing a first secure transmission of data over the Internet between a virtual gateway of the sender computer and a Web site of the receiver computer, the computers being provided with browser programming for accessing and/or displaying files and other data between the sender and receiver computers over the Internet;
establishing at least one additional transmission of data between the sender computer gateway and the receiver computer Web site;
adaptively determining the number of additional transmissions between the sender computer gateway and the receiver computer Web site;
transmitting the data during at least one of the additional transmissions; and
authenticating each transmission in which data is transmitted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for authenticating transferred data between a sender computer and a receiver computer of a service broker system for interactive monitoring and control of data to and from one or more Internet enabled devices of a client/server security system over the Internet, the method comprising the steps of:
-
establishing a first secure transmission of data over the Internet between the sender computer and the receiver computer, each of the sender and receiver computers having a virtual gateway and/or a Web site for directing data therebetween, and browser programming for accessing and/or displaying files and other data between the sender and receiver computers over the Internet;
establishing at least one additional transmission of data between the sender computer and the receiver computer;
adaptively determining the number of additional transmissions between the sender computer and the receiver computer;
transmitting the data during at least one of the additional transmissions; and
authenticating each transmission in which data is transmitted, wherein the number of additional transmissions is variable and adaptively selected, at least in part, based upon the performance overhead of the system, and, at least in part, based upon a set of criteria used in an algorithm to determine the number of additional transmissions, the criteria being selected from the group consisting of the frequency of transmissions between the sender computer and receiver computer, the closeness of the sender computer to the source of the transactions, and the usage patterns of the sender computer.
-
-
17. A method for authenticating transferred data between a sender computer and a receiver computer of a service broker system for interactive monitoring and control of data to and from Internet enabled devices of a sender/receiver computer security system over the Internet, the method comprising the steps of:
-
establishing a first secure transmission of data over the Internet between a Web site of the sender computer and a virtual gateway of the receiver computer, the computers being provided with browser programming for accessing and/or displaying files and other data between the sender and receiver computers over the Internet;
establishing at least one additional transmission of data between the sender computer Web site and the receiver computer gateway;
adaptively determining the number of additional transmissions between the sender computer Web site and the receiver computer gateway site;
transmitting the data during at least one of the additional transmissions; and
authenticating each transmission in which data is transmitted.
-
Specification