Methods, systems and computer program products for authenticating computer processing devices and transferring both encrypted and unencrypted data therebetween
First Claim
1. A method of transferring a set of data from a remote monitoring device to a central monitoring unit that is remote from the remote monitoring device, the method comprising:
- establishing a communication link over a communication network between the remote monitoring device and the central monitoring unit;
performing an authentication process to authenticate the remote monitoring device to the central monitoring unit;
dividing the set of data into a first data subset and a second data subset at the remote monitoring device, wherein the first data subset comprises control data that describes the second data subset;
wherein the first data subset further comprises first raw data collected by the remote monitoring device and wherein the second data subset comprises second raw data collected by the remote monitoring device;
after said authentication process, encrypting the first data subset at the remote monitoring device using an encryption key provided by the central monitoring unit as part of the authentication process to provide an encrypted data set;
transmitting the encrypted data set from the remote monitoring device to the central monitoring unit over the communication link;
receiving a message over the communication link from the central monitoring unit indicating that the control data has been validated by the central monitoring unit; and
in response to the message from the central monitoring unit indicating that the control data has been validated, transferring the second data subset from the remote monitoring device to the central monitoring unit over the communication link without encrypting the second data subset.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods for transferring a set of data from a first processing device to a second processing device are provided. Pursuant to these methods a secure shell (“SSH”) authentication is performed to authenticate a first user that is logged onto the first processing device to a second user that is logged onto the second processing device. The set of data is divided into a first data subset and a second data subset. The first data subset is encrypted to provide an encrypted data set. The encrypted data set is transferred from the first processing device to the second processing device. The second data subset is also transferred from the first processing device to the second processing device, but without encrypting the second data subset. Related data transfer systems and computer program products are also provided.
229 Citations
17 Claims
-
1. A method of transferring a set of data from a remote monitoring device to a central monitoring unit that is remote from the remote monitoring device, the method comprising:
-
establishing a communication link over a communication network between the remote monitoring device and the central monitoring unit; performing an authentication process to authenticate the remote monitoring device to the central monitoring unit; dividing the set of data into a first data subset and a second data subset at the remote monitoring device, wherein the first data subset comprises control data that describes the second data subset;
wherein the first data subset further comprises first raw data collected by the remote monitoring device and wherein the second data subset comprises second raw data collected by the remote monitoring device;after said authentication process, encrypting the first data subset at the remote monitoring device using an encryption key provided by the central monitoring unit as part of the authentication process to provide an encrypted data set; transmitting the encrypted data set from the remote monitoring device to the central monitoring unit over the communication link; receiving a message over the communication link from the central monitoring unit indicating that the control data has been validated by the central monitoring unit; and in response to the message from the central monitoring unit indicating that the control data has been validated, transferring the second data subset from the remote monitoring device to the central monitoring unit over the communication link without encrypting the second data subset. - View Dependent Claims (2, 3, 4, 5, 15)
-
-
6. A data processing device, comprising:
-
a data collection unit to receive raw data from an external monitoring system, wherein the raw data comprises first raw data and second raw data; a data transfer unit to generate control information that facilitates transfer of the raw data to a central monitoring unit; an input/output port to establish a communication link with the central monitoring unit over a communication network; an authentication unit to authenticate the data processing device to the central monitoring unit using an authentication protocol; an encryption unit to encrypt the control information and the first raw data received by the data collection unit using an encryption key provided by the central monitoring unit using the authentication protocol after authentication of the data processing device to provide encrypted control information and encrypted first raw data; and a transmitter to transmit the encrypted control information and the encrypted first raw data to the central monitoring unit over the communication link; and wherein the data transfer unit is further to receive a message from the central monitoring unit over the communication link indicating that the control information has been validated by the central monitoring unit; and wherein the transmitter is further to transmit the second raw data received by the data collection unit from the data processing device to the central monitoring unit over the communication link without encrypting the second raw data in response to the message from the central monitoring unit indicating that the control data has been validated. - View Dependent Claims (7, 8, 9, 16)
-
-
10. A computer program product for transferring a set of data from a remote monitoring device to a central monitoring unit, the computer program product comprising a tangible, non-transitory computer readable medium having computer readable program code embodied in the computer readable medium, the computer readable program code when executed by a processor causes the processor to perform a method comprising:
-
establishing a communication link over a communication network between the remote monitoring device and the central monitoring unit; performing an authentication process to authenticate the remote monitoring device to the central monitoring unit; dividing the set of data into a first data subset and a second data subset at the remote monitoring device, wherein the first data subset comprises control data that describes the second data subset;
wherein the first data subset further comprises first raw data collected by the remote monitoring device and wherein the second data subset comprises second raw data collected by the remote monitoring device;after said authentication process, encrypting the first data subset at the remote monitoring device using an encryption key provided by the central monitoring unit as part of the authentication process to provide an encrypted data set; transferring the encrypted data set from the remote monitoring device to the central monitoring unit over the communication link; receiving a message from the central monitoring unit over the communication link indicating that the control data has been validated by the central monitoring unit; and transferring the second data subset from the remote monitoring device to the central monitoring unit over the communication link without encrypting the second data subset in response to the message from the central monitoring unit indicating that the control data has been validated. - View Dependent Claims (11, 12, 13, 14, 17)
-
Specification