Access and storage of secure group communication...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S155000, C713S156000, C713S175000, C380S279000, C380S281000, C380S282000

Reexamination Certificate

active

06260142

ABSTRACT:

TECHNICAL FIELD OF THE INVENTION
This invention relates generally to secure communications and more particularly to securing group communications.
BACKGROUND OF THE INVENTION
Securing data, such as digitized voice, digitized video, computer data (e.g., e-mail, files, programs), etc., for transmission may be done in a variety of ways. For example, the data may be encrypted using an encrypted algorithm, such as Data Encryption Standard (DES), and/or a symmetric key. Once the data is encrypted, it is provided to a receiving party, or parties, where each receiving party uses its own copy of the symmetric key to decrypt the encrypted message. The sending and receiving parties may discard the symmetric key after one transmission or use it for a plurality of transmissions. Data secured and transmitted in this manner provides reliable security as long as the symmetric key is known only by the sending and receiving parties. As such, a critical issue with symmetric key encryption is providing the symmetric key to all parties without compromising its security. Note that the security of a symmetric key is compromised when an unauthorized party has obtained it.
Another encryption process utilizes a public/private key pair that includes, for each party, a private decryption key and a public encryption key. For signing, a private signature key and a public signature verification key may be used. The public encryption key and the public signature verification key are publicly available, such that a sending party may obtain the public encryption key for each targeted recipient. Once the public encryption keys are obtained, the sending party individually encrypts a message utilizing the public encryption keys of each recipient. When the recipient receives the encrypted message, it utilizes its private decryption key to the decrypt the message. To further enhance the security of the transmission, the sending party may sign the message using its private signature key. As such, when each recipient receives the encrypted message, it retrieves the public signature verification key of the sending party to authenticate the signature.
To facilitate the transmission of a secure message to a plurality of recipients, the sending party may access a recipient list, which includes the identity of each member of a particular group. For example, in a company, a recipient list may include members of an accounting department, another list for finance, another list for engineering, etc. As such, when a sending party wishes to transmit a secure message to members within its group, it accesses the appropriate recipient list to identity each of the targeted recipients. As known in the art, client software (i.e., the encryption software incorporated into the computer operated by the user), interprets the recipient list, obtains the encryption keys for each of the recipients (typically from a directory) and individually encrypts the message for each.
If the recipient list is relatively small (e.g., approximately 10 or less), the overhead processing of individually encrypting messages for the members identified in the recipient list does not overburden the system. As the number of recipients increases, however, the processing by the client software as well as the amount of data generated increases proportionately. For example, a typical encrypted message is approximately 15 kilobytes in size, while the overhead portion, (i.e., the portion that includes the wrapped session keys for each recipient and the identity of each recipient), may exceed the data size by two-fold, three-fold, ten-fold, etc.
Systems such as those described in above-cited co-pending application entitled “Method and Apparatus for Secure Group Communications” and incorporated herein by reference, provide numerous advantages in facilitating secure group communications. With such systems, a group security credential, such as a cryptographic key, group private decryption key, for example, may be stored with a member's individual security credentials. For example, in a public key infrastructure system, the group communication system may have group security credentials stored in a same file as a member's other private decryption keys and private signing keys. However, as more group keys are generated, the member credential file can become too large. Moreover, if the file is lost or otherwise compromised, the new security credential along with the other member security credentials can be difficult to re-obtain and/or be required to be completely regenerated. In addition, members of a group may be deleted, requiring a suitable update of the security credentials of the group in an efficient manner. This would be useful for large numbers of members.
Consequently, there exists a need for a method for securing group communications that facilitates an on-demand group credential generation as well as suitable group security credential updating techniques to provide an efficient system.


REFERENCES:
patent: 5402490 (1995-03-01), Mihm, Jr.
patent: 5663896 (1997-09-01), Aucsmith
patent: 6105134 (2000-08-01), Pinder et al.
Schneier, “Applied Cryptography, Second Edition: Protocols, Algorithms, and Source Code in C,” Oct. 18, 1995, pp. 84-85.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Access and storage of secure group communication... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Access and storage of secure group communication..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Access and storage of secure group communication... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2554901

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.