Low cost packet originator verification for intermediate nodes
First Claim
Patent Images
1. A method for transmitting data from a sender to a base station via a network, comprising the steps of:
- verifying with a server that the sender is an authorized sender;
when the sender is an authorized sender, transmitting verification information from the server to the sender and to the base station;
transmitting data from the sender to a base station in the network, the data being divided into internet protocol (IP) packets that are each marked with a respective index (i) that marks a position in a sequence in a corresponding packet;
generating, for each of the IP packets, a separate respective proof (Pi) used to prove authentication based on both the verification information and the respective index (i);
transmitting each respective said proof (Pi) with the respective one of the IP packets; and
calculating, for each of the IP packets received at the base station, a separate respective base station proof (PiBs) based on the verification information and on the respective index (i); and
comparing the proof (Pi) with the base station proof (PiBs),wherein the verification information includes a random bit array b1, . . . bn,wherein the proof (Pi) for each of the IP packets is calculated using Pi;
=b(i−
1) |p|+1, . . . , bilpl, for the i-th sent packet, where the value |p| denotes the number of each proof'"'"'s bits.
1 Assignment
0 Petitions
Accused Products
Abstract
A technique to transmit data from a sender to a receiver via a network, preferably a LAN and/or the Internet etc., where the sender transmits the data to a base station, and where the sender is verified by a server, in particular a AAA-server etc. In order to prevent the transmission of data from an illegitimate sender at the expense of a legitimate sender to the greatest extent possible, the server transmits verification data from the server to the sender and/or base station.
7 Citations
2 Claims
-
1. A method for transmitting data from a sender to a base station via a network, comprising the steps of:
-
verifying with a server that the sender is an authorized sender;
when the sender is an authorized sender, transmitting verification information from the server to the sender and to the base station;
transmitting data from the sender to a base station in the network, the data being divided into internet protocol (IP) packets that are each marked with a respective index (i) that marks a position in a sequence in a corresponding packet;
generating, for each of the IP packets, a separate respective proof (Pi) used to prove authentication based on both the verification information and the respective index (i);
transmitting each respective said proof (Pi) with the respective one of the IP packets; and
calculating, for each of the IP packets received at the base station, a separate respective base station proof (PiBs) based on the verification information and on the respective index (i); and
comparing the proof (Pi) with the base station proof (PiBs),wherein the verification information includes a random bit array b1, . . . bn, wherein the proof (Pi) for each of the IP packets is calculated using Pi;
=b(i−
1) |p|+1, . . . , bilpl, for the i-th sent packet, where the value |p| denotes the number of each proof'"'"'s bits. - View Dependent Claims (2)
-
Specification