Claims
- 1. A method of transferring content from a content source to a content sink, comprising:
a) exchanging random challenges between the content source and the content sink; b) encrypting the exchanged random challenges with a secret key, then hashing the encrypted random challenges; c) exchanging the encrypted, hashed random challenges; d) comparing exchanged encrypted, hashed random challenges to expected values; e) establishing, if the exchanged encrypted, hashed random challenges match the expected values, a preliminary control channel; f) establishing a preliminary content channel; and g) transferring content over the preliminary content channel.
- 2. The method of claim 1, further comprising:
establishing a full control channel and a full content channel.
- 3. The method of claim 2, further comprising:
transferring content over the full content channel.
- 4. The method of claim 1, further comprising:
determining whether at least one of a content sink, and a content source is computationally constrained.
- 5. A method of transferring information, the method comprising:
a) transmitting a first challenge from a first device to a second device, and transmitting a second challenge from the second device to the first device; b) in the first device, encrypting, then hashing the second challenge, and in the second device, encrypting, then hashing the first challenge; c) transmitting the hashed, encrypted, second challenge to the second device, and transmitting the hashed, encrypted, first challenge to the first device; d) in the first device, comparing the hashed, encrypted first challenge to a first expected value, and in the second device comparing the hashed, encrypted second challenge to a second expected value; e) if both comparisons in step (d) result in a match, then establishing a preliminary content channel; and f) transferring information over the preliminary content channel.
- 6. The method of claim 5, further comprising terminating information transfer over the preliminary content channel.
- 7. The method of claim 5, further comprising establishing a full control channel and a full content channel.
- 8. The method of claim 5, wherein the challenges are random challenges.
- 9. The method of claim 5, wherein establishing a preliminary control channel includes generating a preliminary control channel key.
- 10. The method of claim 9, wherein generating a preliminary control channel key comprises encrypting the first challenge, encrypting the second challenge and performing and exclusive OR operation on the encrypted first challenge and the encrypted second challenge.
- 11. The method of claim 10, further comprising determining if the result of the exclusive OR operation is a zero, and if it is, then setting the preliminary control channel key equal to the encrypted first challenge.
- 12. The method of claim 10, wherein encrypting the first challenge comprises performing a baseline cipher operation with a secret key.
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] This is a continuation-in-part of application Ser. No. 08/791,245, filed Jan. 30, 1997.
Continuation in Parts (1)
|
Number |
Date |
Country |
Parent |
08791245 |
Jan 1997 |
US |
Child |
08909338 |
Aug 1997 |
US |