Cryptographic key management in a communication network

Cryptography – Key management – Key distribution

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S044000, C713S171000

Reexamination Certificate

active

07817802

ABSTRACT:
A communication network (22) includes a central node (30) loaded with a trusted key (26) and key material (56) corresponding to an asymmetric key agreement protocol (48). The network (22) further includes vulnerable nodes (32) loaded with key material (69) corresponding to the protocol (48). Successive secure connections (68, 70) are established between the central node (30) and the vulnerable nodes (32) using the key material (56, 69) to generate a distinct session key (52) for each of the secure connections (68, 70). The trusted key (26) and one of the session keys (52) are utilized to produce a mission key (39). The mission key (39) is transferred from the central node (30) to each of the vulnerable nodes (32) via each of the secure connections (68, 70) using the corresponding current session key (52). The mission key (39) functions for secure communication within the communication network (22).

REFERENCES:
patent: 6038322 (2000-03-01), Harkins
patent: 6363154 (2002-03-01), Peyravian et al.
patent: 7107051 (2006-09-01), Walker
patent: 2004/0187001 (2004-09-01), Bousis
patent: 2005/0084114 (2005-04-01), Jung et al.
patent: 2008/0240427 (2008-10-01), Naslund
Schneier, “Applied Cryptography: Protocols, Algorithms, and Source Code in C” Second Edition, Jon Wiley & Sons, 1996, pp. 180-184.
Harney et al. RFC2094: “Group Key Management Protocol” 1997.
Camtepe, Seyit A. et al. “Key Distribution Mechanisms for Wireless Sensor Networks: a Survey”, Mar. 2005.
Carman, David W. et al. “Constraints and Approaches for Distributed Sensor Network Security”, Sep. 2000.
Choi, Sung Jin et al. “An Efficient Key Pre-distribution Scheme for Secure Distributed Sensor Networks”, 2005.
Eschenauer, Laurent et al. “A Key-Management Scheme for Distributed Sensor Networks”, 2002.
Menezes, Alfred J. et al. Handbook of Applied Cryptography, 1997 CRC Press, LLC, pp. 489-572.
Perrig, Adrian et al. “ELK, a New Protocol for Efficient Large-Group Key Distribution”, 2001.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Cryptographic key management in a communication network does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Cryptographic key management in a communication network, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptographic key management in a communication network will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4240040

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.