Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols
First Claim
1. A method of transmitting data securely over a computer network, comprising the steps of:
- (1) establishing a communication path between a first computer and a second computer;
(2) encrypting and transmitting data records between the first computer and the second computer using an unreliable communication protocol, wherein each data record is encrypted without reference to a previously transmitted data record;
(3) in the second computer, receiving and decrypting the data records transmitted in step (2) without reference to a previously received data record; and
(4) in the second computer, transmitting session information for encrypting and decrypting the data records to a third computer,wherein step (2) comprises the step of embedding an indicator in each of the data records indicating that the data records are encrypted according to an encryption scheme that encrypts records without regard to any previously transmitted data records, andwherein step (3) comprises the step of determining whether the indicator is present in each record and, in response to determining that the indicator is not present, processing each such record differently than if the indicator is set.
18 Assignments
0 Petitions
Accused Products
Abstract
The invention provides a method and apparatus for transmitting data securely using an unreliable communication protocol, such as User Datagram Protocol. In one variation, the invention retains compatibility with conventional Secure Sockets Layer (SSL) and SOCKS protocols, such that secure UDP datagrams can be transmitted between a proxy server and a client computer in a manner analogous to conventional SOCKS processing. In contrast to conventional SSL processing, which relies on a guaranteed delivery service such as TCP and encrypts successive data records with reference to a previously-transmitted data record, encryption is performed using a nonce that is embedded in each transmitted data record. This nonce acts both as an initialization vector for encryption/decryption of the record, and as a unique identifier to authenticate the record. Because decryption of any particular record does not rely on receipt of a previously received data record, the scheme will operate over an unreliable communication protocol. The system and method allows secure packet transmission to be provided with a minimum amount of overhead. Further, the invention provides a network arrangement that employs a cache having copies distributed among a plurality of different locations. SSL/TLS session information for a session with each of the proxy servers is stored in the cache so that it is accessible to at least one other proxy server. Using this arrangement, when a client computer switches from a connection with a first proxy server to a connection with a second proxy server, the second proxy server can retrieve SSL/TLS session information from the cache corresponding to the SSL/TLS communication session between the client device and the first proxy server. The second proxy server can then use the retrieved SSL/TLS session information to accept a session with the client device.
-
Citations
41 Claims
-
1. A method of transmitting data securely over a computer network, comprising the steps of:
-
(1) establishing a communication path between a first computer and a second computer; (2) encrypting and transmitting data records between the first computer and the second computer using an unreliable communication protocol, wherein each data record is encrypted without reference to a previously transmitted data record; (3) in the second computer, receiving and decrypting the data records transmitted in step (2) without reference to a previously received data record; and (4) in the second computer, transmitting session information for encrypting and decrypting the data records to a third computer, wherein step (2) comprises the step of embedding an indicator in each of the data records indicating that the data records are encrypted according to an encryption scheme that encrypts records without regard to any previously transmitted data records, and wherein step (3) comprises the step of determining whether the indicator is present in each record and, in response to determining that the indicator is not present, processing each such record differently than if the indicator is set. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method of securely transmitting a plurality of data records between a client computer and a proxy server using an unreliable communication protocol, comprising the steps of:
-
(1) establishing a reliable connection between the client computer and the proxy server; (2) exchanging encryption credentials between the client computer and the proxy server over the reliable connection; (3) generating a nonce for each of a plurality of data records, wherein each nonce comprises an initialization vector necessary to decrypt a corresponding one of the plurality of data records; (4) using the nonce to encrypt each of the plurality of data records and appending the nonce to each of the plurality of data records; (5) transmitting the plurality of data records encrypted in step (4) from the client computer to the proxy server using an unreliable communication protocol; (6) in the proxy server, decrypting each of the plurality of encrypted data records using a corresponding nonce extracted from each data record and a previously shared encryption key; and (7) in the proxy server, transmitting session information including the previously shared encryption key for use in decrypting the plurality of data records to another server, wherein step (6) comprises the step of checking to determine whether each data record received from the client computer is formatted according to a secure unreliable transmission format and, if a particular record is not formatted according to a secure unreliable transmission format, bypassing decryption of the received data record using the corresponding nonce. - View Dependent Claims (20, 21, 22, 23, 24, 27, 28, 29, 30, 31, 32, 33)
-
-
25. A method of securely transmitting a plurality of data records between a client computer and a proxy server using an unreliable communication protocol, comprising the steps of:
-
(1) establishing a reliable connection between the client computer and the proxy server; (2) exchanging encryption credentials between the client computer and the proxy server over the reliable connection; (3) generating a nonce for each of a plurality of data records, wherein each nonce comprises an initialization vector necessary to decrypt a corresponding one of the plurality of data records; (4) using the nonce to encrypt each of the plurality of data records and appending the nonce to each of the plurality of data records; (5) transmitting the plurality of data records encrypted in step (4) from the client computer to the proxy server using an unreliable communication protocol; (6) in the proxy server, decrypting each of the plurality of encrypted data records using a corresponding nonce extracted from each data record and a previously shared encryption key; and (7) in the proxy server, transmitting session information including the previously shared encryption key for use in decrypting the plurality of data records to another server, wherein the another server is a second proxy server, and further including, in the second proxy server, decrypting encrypted data records from the client computer using a corresponding nonce extracted from each data record and the session information transmitted from the first proxy server.
-
-
26. A method of securely transmitting a plurality of data records between a client computer and a proxy server using an unreliable communication protocol, comprising the steps of:
-
(1) establishing a reliable connection between the client computer and the proxy server; (2) exchanging encryption credentials between the client computer and the proxy server over the reliable connection; (3) generating a nonce for each of a plurality of data records, wherein each nonce comprises an initialization vector necessary to decrypt a corresponding one of the plurality of data records; (4) using the nonce to encrypt each of the plurality of data records and appending the nonce to each of the plurality of data records; (5) transmitting the plurality of data records encrypted in step (4) from the client computer to the proxy server using an unreliable communication protocol; (6) in the proxy server, decrypting each of the plurality of encrypted data records using a corresponding nonce extracted from each data record and a previously shared encryption key; and (7) in the proxy server, transmitting session information including the previously shared encryption key for use in decrypting the plurality of data records to another server, wherein the another proxy server is a cache memory server, and further including, in a second proxy server, obtaining the session information from the cache memory server, and decrypting encrypted data records from the client computer using a corresponding nonce extracted from each data record and the session information.
-
-
34. A system for securely transmitting data using an unreliable protocol, comprising:
-
a first computer having a communication protocol client function operable in conjunction with an application program to transmit data records securely using an unreliable protocol; and a second computer coupled to the first computer and having a communication protocol server function operable in conjunction with the communication protocol client function to receive data records securely using the unreliable communication protocol, wherein the communication protocol client function encrypts each data record using a nonce and an encryption key and appends the respective nonce to each of the encrypted data records; and wherein the communication protocol server function decrypts each of the data records using the respectively appended nonce and the encryption key; and a third computer coupled to the second computer and having a cache memory for storing at least the encryption key, wherein the second computer comprises a record detector that determines whether an indicator has been set in each data record received from the first computer and, if the indicator has not been set for a data record, bypassing decryption of that data record by the communication protocol server function. - View Dependent Claims (35, 36, 37, 38, 39, 40)
-
-
41. A system for securely transmitting data using an unreliable protocol, comprising:
-
a first computer having a communication protocol client function operable in conjunction with an application program to transmit data records securely using an unreliable protocol; and a second computer coupled to the first computer and having a communication protocol server function operable in conjunction with the communication protocol client function to receive data records securely using the unreliable communication protocol, wherein the communication protocol client function encrypts each data record using a nonce and an encryption key and appends the respective nonce to each of the encrypted data records; and wherein the communication protocol server function decrypts each of the data records using the respectively appended nonce and the encryption key; and a third computer coupled to the second computer and having a cache memory for storing at least the encryption key, wherein the third computer is a memory cache server, and further including a fourth computer that can obtain the at least the encryption key stored in the cache memory of the third computer; receive encrypted records from the first computer; decrypt records the received records using at least the encryption key stored in the cache memory; and forward the decrypted records received from the first computer to a server computer.
-
Specification