Cryptography – Key management – Key distribution
Reexamination Certificate
2007-01-23
2010-10-19
Simitoski, Michael J (Department: 2439)
Cryptography
Key management
Key distribution
C380S044000, C713S171000
Reexamination Certificate
active
07817802
ABSTRACT:
A communication network (22) includes a central node (30) loaded with a trusted key (26) and key material (56) corresponding to an asymmetric key agreement protocol (48). The network (22) further includes vulnerable nodes (32) loaded with key material (69) corresponding to the protocol (48). Successive secure connections (68, 70) are established between the central node (30) and the vulnerable nodes (32) using the key material (56, 69) to generate a distinct session key (52) for each of the secure connections (68, 70). The trusted key (26) and one of the session keys (52) are utilized to produce a mission key (39). The mission key (39) is transferred from the central node (30) to each of the vulnerable nodes (32) via each of the secure connections (68, 70) using the corresponding current session key (52). The mission key (39) functions for secure communication within the communication network (22).
REFERENCES:
patent: 6038322 (2000-03-01), Harkins
patent: 6363154 (2002-03-01), Peyravian et al.
patent: 7107051 (2006-09-01), Walker
patent: 2004/0187001 (2004-09-01), Bousis
patent: 2005/0084114 (2005-04-01), Jung et al.
patent: 2008/0240427 (2008-10-01), Naslund
Schneier, “Applied Cryptography: Protocols, Algorithms, and Source Code in C” Second Edition, Jon Wiley & Sons, 1996, pp. 180-184.
Harney et al. RFC2094: “Group Key Management Protocol” 1997.
Camtepe, Seyit A. et al. “Key Distribution Mechanisms for Wireless Sensor Networks: a Survey”, Mar. 2005.
Carman, David W. et al. “Constraints and Approaches for Distributed Sensor Network Security”, Sep. 2000.
Choi, Sung Jin et al. “An Efficient Key Pre-distribution Scheme for Secure Distributed Sensor Networks”, 2005.
Eschenauer, Laurent et al. “A Key-Management Scheme for Distributed Sensor Networks”, 2002.
Menezes, Alfred J. et al. Handbook of Applied Cryptography, 1997 CRC Press, LLC, pp. 489-572.
Perrig, Adrian et al. “ELK, a New Protocol for Efficient Large-Group Key Distribution”, 2001.
Hardy Douglas Allan
Kitaj Paul Thomas
Trengove Mary Eleanor
General Dynamics C4 Systems, Inc.
Meschkow & Gresham P.L.C.
Simitoski Michael J
LandOfFree
Cryptographic key management in a communication network does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Cryptographic key management in a communication network, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptographic key management in a communication network will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4240040