Cryptography – Key management – Key distribution
Reexamination Certificate
2008-03-18
2008-03-18
Revak, Christopher (Department: 2131)
Cryptography
Key management
Key distribution
C713S177000, C705S051000
Reexamination Certificate
active
07346170
ABSTRACT:
An information processing system and method are disclosed in which information processing is performed using an enabling key block (EKB) in association with a tree structure including category subtrees. A key tree is produced, which include subtrees that are grouped in accordance with categories and are managed by category entities. The EKB includes data produced by selecting a path in the key tree and encrypting a higher-level key in the selected path using a lower-level key in the selected path. The EKB is then provided to a device. A requester, which requests production of the EKB, may produce a root key or may request a key distribution center (KDC) to produce a root key. If the (KDC) produces the EKB, it may also request a category entity to produce a sub-EKB.
REFERENCES:
patent: 5748736 (1998-05-01), Mittra
patent: 6049878 (2000-04-01), Caronni et al.
patent: 6240188 (2001-05-01), Dondeti et al.
patent: 6880081 (2005-04-01), Itkis
patent: 6911974 (2005-06-01), Asano et al.
patent: 7043024 (2006-05-01), Dinsmore et al.
patent: 7167564 (2007-01-01), Asano et al.
patent: 7269257 (2007-09-01), Kitaya et al.
patent: 2002/0147906 (2002-10-01), Lotspiech et al.
patent: 2002/0150250 (2002-10-01), Kitaya et al.
patent: 2003/0044017 (2003-03-01), Briscoe
patent: 2003/0161474 (2003-08-01), Matsuzaki et al.
patent: 2003/0185396 (2003-10-01), Asano et al.
patent: 2005/0060334 (2005-03-01), Kawamoto et al.
patent: 2005/0210014 (2005-09-01), Asano
patent: 2005/0234949 (2005-10-01), Asano
patent: 11-187013 (1999-07-01), None
patent: WO-01/03364 (2001-01-01), None
patent: WO-01/03365 (2001-01-01), None
Wong, C. k. ,et al., “Secure Group Communications Using Key Graphs”, In: Proceedings of ACM SIGCOMM'98, (1998), pp. 68 to 79.
Canetti, R. et al. “Multicast Security: A Taxonomy and Some Efficient Constructions”, IEEE (1999), pp. 708-716.
Poovendran, R. et al. “An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes”, Lecture Notes in Computer Science (1999), vol. 1666, pp. 624-638. □□.
Dondeti, L. R., et al., “A Duel Encryption Protocol For Scalable Secure Multicasting”, In: Proceedings of IEEE international Symposium On Computers And Communications, (1999), pp. 2 to 8, Anatomy of the dual encryption protocol.
Moyer, et al., “A Survey Of Security Issues In Multicast Communications”, IEEE Network, Nov./Dec. 1999, vol. 13, No. 6, pp. 12 to 23.
Waldvogel, M., et al., “The VersaKey Framework: Versatile Group Key Management”, IEEE Journal on Selected Areas In Communications, Sep. 1999, vol. 17, No. 9, pp. 1614 to 1631.
Wong, C. k.,et al., “Secure Group Communications Using Key Graphs”, In: Proceedings of ACM SIGCOMM'98, (1998), pp. 68 to 79, (http://www.acm.org/sigcom/sigcom98/tp/technical.html).
Wallner et al., “Key Management for Multicast: Issues and Architectures”, Network Working Group, Jul. 1, 1997.
Asano Tomoyuki
Ishiguro Ryuji
Oishi Tateo
Osawa Yoshitomo
Taki Ryuta
Lerner David Littenberg Krumholz & Mentlik LLP
Revak Christopher
Sony Corporation
LandOfFree
Information processing system and method does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Information processing system and method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Information processing system and method will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2796166