Information processing system and method using encryption...

Cryptography – Key management – Key distribution

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S045000, C380S278000, C713S163000

Reexamination Certificate

active

07957537

ABSTRACT:
An information processing system and method using an encryption key block sets sub-trees classified based on data processing ability of the devices (capability) in a key tree in which respective keys are corresponded to a root, nodes and leaves of a tree in which a plurality of devices are constituted as the leaves, generates a sub-enabling key block which is effective for an entity in a managing subject of each sub-tree (entity), and generates an enabling key block decodable only by the entities having common capability. Also, an information processing system and method using an encryption key block manages a partial tree of a key tree (sub-tree), generates a sub-enabling key block based only on a key set corresponding to nodes or leaves included in the sub-tree, and generates an enabling key block decodable only by selected entities by using the sub-enabling key block. Thus, it is possible to generate and distribute an enabling key block corresponding to data processing ability of a device and to manage devices by dividing a hierarchical key tree structure.

REFERENCES:
patent: 5748736 (1998-05-01), Mittra
patent: 6049878 (2000-04-01), Caronni et al.
patent: 6223286 (2001-04-01), Hashimoto
patent: 6240188 (2001-05-01), Dondeti et al.
patent: 6272535 (2001-08-01), Iwamura
patent: 6449643 (2002-09-01), Hyndman et al.
patent: 6609116 (2003-08-01), Lotspiech
patent: 6727927 (2004-04-01), Dempski et al.
patent: 6760721 (2004-07-01), Chasen et al.
patent: 6813611 (2004-11-01), Herzberg et al.
patent: 6880081 (2005-04-01), Itkis
JP 11-187013 Machine-Assisted Translation (MAT), Jul. 9, 1999, English Translation, Thomson Feb. 3, 2006.
Copending U.S. Appl. No. 10/204,775.
Waldvogel, M., et al., The VersaKey Framework: Versatile Group Key Management:, IEEE Journal on Selected Areas in Communications, Sep. 1999, vol. 17, No. 9, pp. 1614 to 1631, especially pp. 1616 to 1621 .
Wong, C. k. ,et al., “Secure Group Communications Using Key Graphs”, In: Proceedings of ACM SIGCOMM'98, (1998), pp. 68 to 79, especially 3.4, Leaving a tree key graph (http://www.acm.org/sigcom/sigcom98/tp/technical.html).
Wallner et al., “Key Management for Multicast: Issues and Architectures”, Network Working Group.
Dondeti, L. R., et al., “A Duel Encryption Protocol for Scalable Secure Multicasting”, In: Proceedings of IEEE international Symposium on Computers and Communications, (1999), pp. 2 to 8, Anatomy of the dual encryption protocol.
Moyer, et al., “A Survey of Security Issues in Multicast Communications”, IEEE Network, Nov./Dec. 1999, vol. 13, No. 6, pp. 12 to 23 especially, Tree-Based key Management.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Information processing system and method using encryption... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Information processing system and method using encryption..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Information processing system and method using encryption... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2707408

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.