System and method for authenticating streamed data
First Claim
1. A device for authenticating data, the device comprising a processor and a memory, the memory storing a plurality of instructions that, when executed by the processor, configure the processor to:
- receive data in a plurality of indexed packets transmitted by a data server, the data of the indexed packets being at least a portion of a larger data stream that is processed as the data is received at the device;
wherein authentication data for the data stream is absent from the plurality of indexed packets;
submit a request for a server-computed authentication value, to a data authentication server, over a network, wherein if the data stream is interrupted, the request submitted by the device identifies a point in the data stream where the data stream is interrupted, and wherein the data authentication server has access to the data that was transmitted from the data server to the device and computes the server-computed authentication value based on a subset of the data transmitted by the data server up to the point where the data stream is interrupted;
receive, from the data authentication server, the server-computed authentication value; and
compare a device-computed authentication value, based on a subset of the received data corresponding to the subset of the data transmitted by the data server, with the server-computed authentication value in order to determine whether the subset of the data received at the device is authentic.
4 Assignments
0 Petitions
Accused Products
Abstract
One embodiment of a method of authenticating data comprises: receiving, at a device, data in a plurality of indexed packets transmitted by a data server, the data of the indexed packets being at least a portion of a larger data stream; receiving, at the device, from a data authentication server connected to the device by a network, a server-computed authentication value based on a subset of the data transmitted by the data server, the data authentication server having access to the data that was transmitted from the data server to the device; and comparing a device-computed authentication value based on a subset of the received data, corresponding to the subset of the data transmitted by the data server, with the server-computed authentication value in order to determine whether the subset of the data received at the device is authentic.
-
Citations
27 Claims
-
1. A device for authenticating data, the device comprising a processor and a memory, the memory storing a plurality of instructions that, when executed by the processor, configure the processor to:
-
receive data in a plurality of indexed packets transmitted by a data server, the data of the indexed packets being at least a portion of a larger data stream that is processed as the data is received at the device;
wherein authentication data for the data stream is absent from the plurality of indexed packets;submit a request for a server-computed authentication value, to a data authentication server, over a network, wherein if the data stream is interrupted, the request submitted by the device identifies a point in the data stream where the data stream is interrupted, and wherein the data authentication server has access to the data that was transmitted from the data server to the device and computes the server-computed authentication value based on a subset of the data transmitted by the data server up to the point where the data stream is interrupted; receive, from the data authentication server, the server-computed authentication value; and compare a device-computed authentication value, based on a subset of the received data corresponding to the subset of the data transmitted by the data server, with the server-computed authentication value in order to determine whether the subset of the data received at the device is authentic. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method of authenticating data, the method comprising:
-
receiving, at a device, data in a plurality of indexed packets transmitted by a data server, the data of the indexed packets being at least a portion of a larger data stream that is processed as the data is received at the device;
wherein authentication data for the data stream is absent from the plurality of indexed packets;submitting a request for a server-computed authentication value, to a data authentication server, over a network, wherein if the data stream is interrupted, the request submitted by the device identifies a point in the data stream where the data stream was interrupted, and wherein the data authentication server has access to the data that was transmitted from the data server to the device and computes the server-computed authentication value based on a subset of the data transmitted by the data server up to the point where the data stream is interrupted; receiving, at the device, from the data authentication server, the server-computed authentication value; and comparing a device-computed authentication value, based on a subset of the received data corresponding to the subset of the data transmitted by the data server, with the server-computed authentication value in order to determine whether the subset of the data received at the device is authentic. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A non-transitory computer-readable storage medium upon which a plurality of instructions executable by a processor is stored, the instructions for performing a method of authenticating data, the method comprising:
-
receiving, at a device, data in a plurality of indexed packets transmitted by a data server, the data of the indexed packets being at least a portion of a larger data stream that is processed as the data is received at the device; wherein authentication data for the data stream is absent from the plurality of indexed packets; submitting a request for a server-computed authentication value, to a data authentication server, over a network, wherein if the data stream is interrupted, the request submitted by the device identifies a point in the data stream where the data stream is interrupted, and wherein the data authentication server has access to the data that was transmitted from the data server to the device and computes the server-computed authentication value based on a subset of the data transmitted by the data server up to the point where the data stream is interrupted; receiving, at the device, from the data authentication server, the server-computed authentication value; and comparing a device-computed authentication value based on a subset of the received data corresponding to the subset of the data transmitted by the data server, with the server-computed authentication value in order to determine whether the subset of the data received at the device is authentic.
-
Specification