Separating Control and Data Operations to Support Secured Data Transfers
摘要
For a data transfer, security is negotiated via a control channel operating in accordance with a first protocol. The data is transmitted responsive to the security negotiation on a data channel operating in accordance with a second protocol.