Imparting cryptographic information in network communications
DCFirst Claim
1. A method comprising:
- receiving cryptographic information inserted into a pre-defined portion of a network communication in a client-server environment, wherein the pre-defined portion of the network communication is reserved for random data to support bandwidth detection;
identifying a location of the cryptographic information in the pre-defined portion of the network communication;
processing the cryptographic information; and
modifying interactions in the client-server environment based at least in part on a result of the processing of the cryptographic information;
wherein the random data is different from the cryptographic information.
2 Assignments
Litigations
0 Petitions
Accused Products
Abstract
This specification describes technologies relating to imparting cryptographic information in network communications. In general, aspects of the subject matter described in this specification can be embodied in methods that include identifying a location in a pre-defined portion of a network communication to be sent in a client-server environment, wherein the pre-defined portion is reserved for random data, inserting cryptographic information into the pre-defined portion of the network communication at the location, and sending the network communication in the client-server environment to facilitate modifying interactions in the client-server environment based at least in part on a result of processing of the cryptographic information; and on a receiving side, receiving cryptographic information inserted into the pre-defined portion of the network communication in the client-server environment, identifying the location, processing the cryptographic information, and modifying interactions in the client-server environment based at least in part on a result of the processing.
133 Citations
23 Claims
-
1. A method comprising:
-
receiving cryptographic information inserted into a pre-defined portion of a network communication in a client-server environment, wherein the pre-defined portion of the network communication is reserved for random data to support bandwidth detection; identifying a location of the cryptographic information in the pre-defined portion of the network communication; processing the cryptographic information; and modifying interactions in the client-server environment based at least in part on a result of the processing of the cryptographic information; wherein the random data is different from the cryptographic information. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer-readable medium having a computer program product encoded therein, the computer program product operable to cause data processing apparatus to perform operations comprising:
-
receiving cryptographic information inserted into a pre-defined portion of a network communication in a client-server environment, wherein the pre-defined portion of the network communication is reserved for random data to support bandwidth detection; identifying a location of the cryptographic information in the pre-defined portion of the network communication; processing the cryptographic information; and modifying interactions in the client-server environment based at least in part on a result of the processing of the cryptographic information; wherein the random data is different from the cryptographic information. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A system comprising:
-
a server computer programmed to establish both non-encrypted sessions and encrypted sessions over a network, with client computers, using a session startup handshake including a network communication including a pre-defined portion reserved for random data to support bandwidth detection; a first of the client computers programmed to establish non-encrypted sessions with the server computer using the session startup handshake; and a second of the client computers programmed to establish encrypted sessions with the server computer using the session startup handshake including cryptographic information inserted into the pre-defined portion of the network communication; wherein the server computer and the second client computer are programmed to perform operations comprising;
identifying a location of the cryptographic information in the pre-defined portion of the network communication, processing the cryptographic information, and modifying interactions between the server computer and the second client computer based at least in part on a result of the processing of the cryptographic information;wherein the random data is different from the cryptographic information. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A method comprising:
-
identifying a location in a pre-defined portion of a network communication to be sent in a client-server environment, wherein the pre-defined portion of the network communication is reserved for random data to support bandwidth detection; inserting cryptographic information into the pre-defined portion of the network communication at the location; and sending the network communication in the client-server environment to facilitate modifying interactions in the client-server environment based at least in part on a result of processing of the cryptographic information; wherein the random data is different from the cryptographic information. - View Dependent Claims (21)
-
-
22. A non-transitory computer-readable medium having a computer program product encoded therein, the computer program product operable to cause data processing apparatus to perform operations comprising:
-
identifying a location in a pre-defined portion of a network communication to be sent in a client-server environment, wherein the pre-defined portion of the network communication is reserved for random data to support bandwidth detection; inserting cryptographic information into the pre-defined portion of the network communication at the location; and sending the network communication in the client-server environment to facilitate modifying interactions in the client-server environment based at least in part on a result of processing of the cryptographic information; wherein the random data is different from the cryptographic information. - View Dependent Claims (23)
-
Specification