A method for authenticating communication traffic includes receiving a first message, sent over a network from a source address, requesting information from a server in accordance with a higher-level protocol. A challenge is sent to the source address in reply to the first message, in accordance with the higher-level protocol. A second message is received from the source address following the challenge, and the legitimacy of the source address is assessed by determining whether the second message contains a correct response to the challenge.

 
Web www.patentalert.com

< Anti-computer viral agent suitable for innoculation of computing devices

> System and method for activity or event based dynamic energy conserving server reconfiguration

> Method for the acceleration of the transmission of logging data in a multi-computer environment and system using this method

~ 00520