Method for assigning encryption keys

Cryptography – Key management – Key distribution

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S210000, C705S057000, C725S031000

Reexamination Certificate

active

06947563

ABSTRACT:
An encryption key matrix has rows grouped into segments, with a set of one segment per column establishing a slot. Slots are assigned to device manufacturers, with the keys of the slots then being assigned to decryption devices made by the respective manufacturer. In generating the slots, the number “q” of segments in a column is first defined such that a predetermined maximum number of devices can be revoked devices (in that all the keys held by the device are revoked) while ensuring that a good device remains a functional device with a probability of at least (1−Q), wherein Q is a predefined device confidence. Once the number “q” of segments has been defined, the slots themselves are defined in a provably non-discriminatory fashion using an error-correcting code such as a Reed-Solomon code. With this invention, overlap between slots can be minimized to minimize the possibility that the key set of an innocent device might be inadvertently revoked when the keys in the slots of a “bad” manufacturer are revoked.

REFERENCES:
patent: 4075435 (1978-02-01), Eppler, Jr.
patent: 4207440 (1980-06-01), Schiffman
patent: 4423287 (1983-12-01), Zeidler
patent: 4605820 (1986-08-01), Campbell, Jr.
patent: 4694491 (1987-09-01), Horne et al.
patent: 5345505 (1994-09-01), Pires
patent: 5538773 (1996-07-01), Kondo
patent: 5574785 (1996-11-01), Ueno et al.
patent: 5592552 (1997-01-01), Fiat
patent: 5881287 (1999-03-01), Mast
patent: 5917910 (1999-06-01), Ishiguro et al.
patent: 6373948 (2002-04-01), Wool
patent: 2002/0106087 (2002-08-01), Lotspiech et al.
patent: 2003/0223579 (2003-12-01), Kanter et al.
patent: WO 9716896 (1997-05-01), None
Menezes, Alfred, et al. Handbook of Applied Cryptography. CRC Press LLC, 1997, pp. 576-577.
PUBLICATION: “Time-Domain Algorithms for Harmonic Bandwidth Reduction and Time Scaling of Speech Signals”. David Malah. Submitted to IEEE. pp. 121-133. 1979.
PUBLICATION: “An Overlap-Add Technique Based on Waveform Similarity (WSOLA) For High Quality Time-Scale Modification Of Speech”. Proceedings of Eurospeech '93. Berlin, Sep. 21-23, 1993.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for assigning encryption keys does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for assigning encryption keys, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for assigning encryption keys will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3426410

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.