Cryptography – Key management – Key distribution
Reexamination Certificate
2011-06-07
2011-06-07
Zand, Kambiz (Department: 2434)
Cryptography
Key management
Key distribution
C380S045000, C380S278000, C713S163000
Reexamination Certificate
active
07957537
ABSTRACT:
An information processing system and method using an encryption key block sets sub-trees classified based on data processing ability of the devices (capability) in a key tree in which respective keys are corresponded to a root, nodes and leaves of a tree in which a plurality of devices are constituted as the leaves, generates a sub-enabling key block which is effective for an entity in a managing subject of each sub-tree (entity), and generates an enabling key block decodable only by the entities having common capability. Also, an information processing system and method using an encryption key block manages a partial tree of a key tree (sub-tree), generates a sub-enabling key block based only on a key set corresponding to nodes or leaves included in the sub-tree, and generates an enabling key block decodable only by selected entities by using the sub-enabling key block. Thus, it is possible to generate and distribute an enabling key block corresponding to data processing ability of a device and to manage devices by dividing a hierarchical key tree structure.
REFERENCES:
patent: 5748736 (1998-05-01), Mittra
patent: 6049878 (2000-04-01), Caronni et al.
patent: 6223286 (2001-04-01), Hashimoto
patent: 6240188 (2001-05-01), Dondeti et al.
patent: 6272535 (2001-08-01), Iwamura
patent: 6449643 (2002-09-01), Hyndman et al.
patent: 6609116 (2003-08-01), Lotspiech
patent: 6727927 (2004-04-01), Dempski et al.
patent: 6760721 (2004-07-01), Chasen et al.
patent: 6813611 (2004-11-01), Herzberg et al.
patent: 6880081 (2005-04-01), Itkis
JP 11-187013 Machine-Assisted Translation (MAT), Jul. 9, 1999, English Translation, Thomson Feb. 3, 2006.
Copending U.S. Appl. No. 10/204,775.
Waldvogel, M., et al., The VersaKey Framework: Versatile Group Key Management:, IEEE Journal on Selected Areas in Communications, Sep. 1999, vol. 17, No. 9, pp. 1614 to 1631, especially pp. 1616 to 1621 .
Wong, C. k. ,et al., “Secure Group Communications Using Key Graphs”, In: Proceedings of ACM SIGCOMM'98, (1998), pp. 68 to 79, especially 3.4, Leaving a tree key graph (http://www.acm.org/sigcom/sigcom98/tp/technical.html).
Wallner et al., “Key Management for Multicast: Issues and Architectures”, Network Working Group.
Dondeti, L. R., et al., “A Duel Encryption Protocol for Scalable Secure Multicasting”, In: Proceedings of IEEE international Symposium on Computers and Communications, (1999), pp. 2 to 8, Anatomy of the dual encryption protocol.
Moyer, et al., “A Survey of Security Issues in Multicast Communications”, IEEE Network, Nov./Dec. 1999, vol. 13, No. 6, pp. 12 to 23 especially, Tree-Based key Management.
Asano Tomoyuki
Ishiguro Ryuji
Kitaya Yoshimichi
Osawa Yoshitomo
Lerner David Littenberg Krumholz & Mentlik LLP
Sony Corporation
Tran Tongoc
Zand Kambiz
LandOfFree
Information processing system and method using encryption... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Information processing system and method using encryption..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Information processing system and method using encryption... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2707408