摘要 |
The IP address for requesting data within a data set is changed during the transfer of the data set. This changing address may include the IP addresses of different ports on a server, or may indicate the IP addresses of different servers. The pattern of changes of the IP address is known to both the client and the server(s), and preferably secret from others. Without knowing the pattern of changes of IP addresses, it will be difficult for an eavesdropper to intercept the data set. To further enhance the security of this approach, the server system is configured to expect subsequent requests at the changed IP address. If the subsequent requests do not arrive within a threshold time period, the server system is configured to terminate further access to the data set by the requestor.
|