Cryptographic key update management method and apparatus

Cryptography – Key management

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S028000, C380S030000, C380S044000, C380S259000, C380S260000, C380S278000, C380S279000, C380S268000, C380S281000, C380S282000, C726S004000, C726S006000, C726S013000, C726S021000, C713S153000, C713S155000, C713S156000, C713S162000, C713S163000, C713S170000, C713S176000

Reexamination Certificate

active

08045713

ABSTRACT:
A method and apparatus is provided for consolidating cryptographic key updates, the consolidated update information enabling, for example, a returning member of a secure group who has been offline, to recover the current group key, at least in most cases. The unconsolidated key updates each comprise an encrypted key, corresponding to a node of a key hierarchy, that has been encrypted using a key which is a descendant of that node. The key updates are used to maintain a key tree with nodes in this tree corresponding to nodes in the key hierarchy. Each node of the key tree is used to store, for each encrypting key used in respect of the encrypted key associated with the node, the most up-to-date version of the encrypted key with any earlier versions being discarded. The key tree, or a subset of the tree, is then provided to group members.

REFERENCES:
patent: 6049878 (2000-04-01), Caronni et al.
patent: 6363149 (2002-03-01), Candelore
patent: 6606706 (2003-08-01), Li
patent: 7043024 (2006-05-01), Dinsmore et al.
patent: 2002/0059286 (2002-05-01), Challener
patent: 2003/0126464 (2003-07-01), McDaniel et al.
patent: 2003/0198350 (2003-10-01), Foster et al.
patent: 2004/0114762 (2004-06-01), Medvinsky
patent: 01/76133 (2001-10-01), None
Canetti, R., et al., “Multicast-security: a taxonomy and some efficient constructions,”Infocom '99, vol. 2, pp. 708-716, (Mar. 21-25, 1999).
Chang, Isabella, et al., “Key Management for Secure Internet Multicast using Boolean Function Minimization Techniques,” IBM T.J. Watson Research Center, pp. 689-698 (1999).
Pinkas, Benny, Efficient State Updates for Key Management, Star Lab, Intertrust Technologies, NJ, USA, pp. 1-16, Nov. 1, 2001.
Wallner, D., et al., “RFC 2627—Key Management for Multicast: Issues and Architectures,” National Security Agency, pp. 1-17, (Jun. 1999).
Wong, Chung Kei, “Secure Group Communications Using Key Graphs,” IEEE/ACM Transactions on Networking, vol. 8, No. 1 pp. 16-30 (Feb. 2000).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Cryptographic key update management method and apparatus does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Cryptographic key update management method and apparatus, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptographic key update management method and apparatus will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4286319

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.