Claims
- 1. A method for providing secure transmissions across a network comprising a transmitting device and a receiving device, the method comprising:
at the transmitting device, generating a stream of watermark bits; generating a plurality of watermarks, each of the plurality of watermarks comprising an index number and a portion of the stream of watermark bits; inserting at least one of the plurality of watermarks into each header of a plurality of outgoing packets; receiving, at the receiving device, the plurality of outgoing packets; and determining if a received packet is valid based on the watermark in the header of the received packet.
- 2. The method of claim 1, wherein generating the stream of watermark bits includes generating a stream of watermark bits from an authorization and sychronization packet previously exchanged between the transmitting device and the receiving device.
- 3. The method of claim 1, further comprising activating a session by exchanging an authorization and synchronization packet between the transmitting device and the receiving device.
- 4. The method of claim 1, further comprising:
discarding the packet, if the watermark is not valid.
- 5. The method of claim 1, wherein determining if a received packet is valid comprises:
comparing the watermark of the received packet to a first and a second window, each of the windows comprising a set of expected watermarks; and accepting the watermark as valid if the received watermark matches one of the expected watermarks in the first or second windows.
- 6. The method of claim 5, wherein the set of expected watermarks are generated from an authorization and sychronization packet previously exchanged between the transmitting device and the receiving device.
- 7. The method of claim 5, comprising:
discarding the packet, if the watermark does not match one in the first or second windows.
- 8. The method of claim 5, wherein comparing the watermark further comprises:
maintaining at the server a record of a pivotal index number representing the index number of the highest-numbered valid watermark received from the transmitting device; comparing the watermark of the received packet to a first and a second window, each of the windows comprising a set of expected watermarks and wherein the first window represents expected watermarks whose index numbers precede the pivotal index number and the second window represents expected watermarks whose index numbers immediately supercede the pivotal index number.
- 9. The method of claim 8, comprising:
increasing the pivotal index number if a match is found in the second window and deleting the matching expected watermark from the second window.
- 10. The method of claim 1, wherein the stream of watermark bits is generated by a stream cipher.
- 11. The method of claim 1, wherein inserting at least one of the plurality of watermarks includes determining whether a valid session exists and inserting the at least one of the plurality of watermarks only if the valid session exists.
- 12. A system for providing secure transmissions across a network, the comprising:
a transmitting device for
generating a stream of watermark bits; generating a plurality of watermarks, each of the plurality of watermarks comprising an index number and a portion of the stream of watermark bits; inserting at least one of the plurality of watermarks into each header of a plurality of outgoing packets; and transmitting the outgoing packets to a receiving device; and a receiving device for
receiving the plurality of outgoing packets; and determining if a received packet is valid based on the watermark in the header of the received packet.
- 13. The system of claim 12, wherein the stream of watermark bits are generated from an authorization and synchronization packet previously exchanged between the transmitting device and the receiving device.
- 14. The system of claim 12, wherein inserting at least one of the plurality of watermarks includes determining whether a valid session exists and inserting the at least one of the plurality of watermarks only if the valid session exists.
- 15. The system of claim 12, wherein the receiving device further discards the packet, if the watermark is not valid.
- 16. The system of claim 12, wherein the receiving device further determines if a received packet is valid by the watermark of the received packet to a first and a second window, each of the windows comprising a set of expected watermarks; and
accepting the received watermark as valid if the received watermark matches one of the expected watermarks in the first or second windows.
- 17. The system of claim 16, wherein the receiving device further discards the packet, if the received watermark does not match any expected watermarks in the first or second windows.
- 18. The system of claim 16, wherein comparing the watermark further comprises:
maintaining at the server a record of a pivotal index number representing the index number of the highest-numbered valid watermark received from the transmitting device; comparing the watermark of the received packet to a first and a second window, each of the windows comprising a set of expected watermarks and wherein the first window represents expected watermarks whose index numbers precede the pivotal index number and the second window represents expected watermarks whose index numbers immediately supercede the pivotal index number.
- 19. The system of claim 17, wherein the receiving device increases the pivotal index number if a match is found in the second window and deletes the matching expected watermark from the second window.
- 20. The method of claim 12, wherein the stream of watermark bits is generated by a stream cipher.
- 21. A system for providing secure transmissions across a network, the system comprising:
means for generating a stream of watermark bits; means for generating a plurality of watermarks, each of the plurality of watermarks comprising an index number and a portion of the stream of watermark bits; means for inserting at least one of the plurality of watermarks into each header of a plurality of outgoing packets; and means for transmitting the outgoing packets to a receiving device capable of determining if a received packet is valid based on the watermark in the header of the received packet.
RELATED APPLICATION
[0001] This application claims priority to U.S. Provisional Application No. 60/398,564, entitled “SYSTEMS AND METHODS FOR TRANSPARENT CONFIGURATION AUTHENTICATION OF NETWORKED DEVICES,” filed Jul. 26, 2002, which is expressly incorporated herein by reference.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60398564 |
Jul 2002 |
US |