Cryptography – Key management – Key distribution
Reexamination Certificate
2005-09-20
2005-09-20
Caldwell, Andrew (Department: 2137)
Cryptography
Key management
Key distribution
C380S210000, C705S057000, C725S031000
Reexamination Certificate
active
06947563
ABSTRACT:
An encryption key matrix has rows grouped into segments, with a set of one segment per column establishing a slot. Slots are assigned to device manufacturers, with the keys of the slots then being assigned to decryption devices made by the respective manufacturer. In generating the slots, the number “q” of segments in a column is first defined such that a predetermined maximum number of devices can be revoked devices (in that all the keys held by the device are revoked) while ensuring that a good device remains a functional device with a probability of at least (1−Q), wherein Q is a predefined device confidence. Once the number “q” of segments has been defined, the slots themselves are defined in a provably non-discriminatory fashion using an error-correcting code such as a Reed-Solomon code. With this invention, overlap between slots can be minimized to minimize the possibility that the key set of an innocent device might be inadvertently revoked when the keys in the slots of a “bad” manufacturer are revoked.
REFERENCES:
patent: 4075435 (1978-02-01), Eppler, Jr.
patent: 4207440 (1980-06-01), Schiffman
patent: 4423287 (1983-12-01), Zeidler
patent: 4605820 (1986-08-01), Campbell, Jr.
patent: 4694491 (1987-09-01), Horne et al.
patent: 5345505 (1994-09-01), Pires
patent: 5538773 (1996-07-01), Kondo
patent: 5574785 (1996-11-01), Ueno et al.
patent: 5592552 (1997-01-01), Fiat
patent: 5881287 (1999-03-01), Mast
patent: 5917910 (1999-06-01), Ishiguro et al.
patent: 6373948 (2002-04-01), Wool
patent: 2002/0106087 (2002-08-01), Lotspiech et al.
patent: 2003/0223579 (2003-12-01), Kanter et al.
patent: WO 9716896 (1997-05-01), None
Menezes, Alfred, et al. Handbook of Applied Cryptography. CRC Press LLC, 1997, pp. 576-577.
PUBLICATION: “Time-Domain Algorithms for Harmonic Bandwidth Reduction and Time Scaling of Speech Signals”. David Malah. Submitted to IEEE. pp. 121-133. 1979.
PUBLICATION: “An Overlap-Add Technique Based on Waveform Similarity (WSOLA) For High Quality Time-Scale Modification Of Speech”. Proceedings of Eurospeech '93. Berlin, Sep. 21-23, 1993.
Fagin Ronald
Lotspiech Jeffrey Bruce
Megiddo Nimrod
Naor Dalit
Naor Simeon
Caldwell Andrew
Davis Zachary A.
International Business Machines - Corporation
Rogitz John L.
LandOfFree
Method for assigning encryption keys does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for assigning encryption keys, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for assigning encryption keys will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3426410