Cryptography – Key management
Reexamination Certificate
2004-03-30
2011-10-25
Flynn, Nathan (Department: 2431)
Cryptography
Key management
C380S028000, C380S030000, C380S044000, C380S259000, C380S260000, C380S278000, C380S279000, C380S268000, C380S281000, C380S282000, C726S004000, C726S006000, C726S013000, C726S021000, C713S153000, C713S155000, C713S156000, C713S162000, C713S163000, C713S170000, C713S176000
Reexamination Certificate
active
08045713
ABSTRACT:
A method and apparatus is provided for consolidating cryptographic key updates, the consolidated update information enabling, for example, a returning member of a secure group who has been offline, to recover the current group key, at least in most cases. The unconsolidated key updates each comprise an encrypted key, corresponding to a node of a key hierarchy, that has been encrypted using a key which is a descendant of that node. The key updates are used to maintain a key tree with nodes in this tree corresponding to nodes in the key hierarchy. Each node of the key tree is used to store, for each encrypting key used in respect of the encrypted key associated with the node, the most up-to-date version of the encrypted key with any earlier versions being discarded. The key tree, or a subset of the tree, is then provided to group members.
REFERENCES:
patent: 6049878 (2000-04-01), Caronni et al.
patent: 6363149 (2002-03-01), Candelore
patent: 6606706 (2003-08-01), Li
patent: 7043024 (2006-05-01), Dinsmore et al.
patent: 2002/0059286 (2002-05-01), Challener
patent: 2003/0126464 (2003-07-01), McDaniel et al.
patent: 2003/0198350 (2003-10-01), Foster et al.
patent: 2004/0114762 (2004-06-01), Medvinsky
patent: 01/76133 (2001-10-01), None
Canetti, R., et al., “Multicast-security: a taxonomy and some efficient constructions,”Infocom '99, vol. 2, pp. 708-716, (Mar. 21-25, 1999).
Chang, Isabella, et al., “Key Management for Secure Internet Multicast using Boolean Function Minimization Techniques,” IBM T.J. Watson Research Center, pp. 689-698 (1999).
Pinkas, Benny, Efficient State Updates for Key Management, Star Lab, Intertrust Technologies, NJ, USA, pp. 1-16, Nov. 1, 2001.
Wallner, D., et al., “RFC 2627—Key Management for Multicast: Issues and Architectures,” National Security Agency, pp. 1-17, (Jun. 1999).
Wong, Chung Kei, “Secure Group Communications Using Key Graphs,” IEEE/ACM Transactions on Networking, vol. 8, No. 1 pp. 16-30 (Feb. 2000).
Borisov Viacheslav
Lain Antonio
Flynn Nathan
Hewlett--Packard Development Company, L.P.
Wright Bryan
LandOfFree
Cryptographic key update management method and apparatus does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Cryptographic key update management method and apparatus, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptographic key update management method and apparatus will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4286319