Cryptography – Key management – Key distribution
Reexamination Certificate
2007-01-30
2007-01-30
Smithers, Matthew (Department: 2137)
Cryptography
Key management
Key distribution
C713S163000
Reexamination Certificate
active
11257239
ABSTRACT:
Different levels of security are provided in a security system so that users can decide the security level of their own communications. Users can choose a low level of security and maintain the security overhead as low as possible. Alternatively, they can choose higher levels of security with attendant increases in security overhead. The different levels of security are created by the use of one or more of two keys: an encryption key is used to encrypt plaintext data in a delta and a message authentication key is used to authenticate and insure integrity of the data. Two keys are used to avoid re-encrypting the encrypted data for each member of the telespace. In one embodiment, the security level is determined when a telespace is created and remains fixed through out the life of the telespace. For a telespace, the security level may range from no security at all to security between the members of the telespace and outsiders to security between pairs of members of the telespace. In another embodiment, subgroups called “tribes” can be formed within a telespace and each tribe adopts the security level of the telespace in which it resides.
REFERENCES:
patent: 5787175 (1998-07-01), Carter
patent: 6049878 (2000-04-01), Caronni et al.
patent: 6052787 (2000-04-01), Euchner et al.
patent: 6295361 (2001-09-01), Kadansky et al.
patent: 6453327 (2002-09-01), Nielsen
patent: 6584566 (2003-06-01), Hardjono
patent: 6606706 (2003-08-01), Li
patent: 0 889 617 (1999-01-01), None
patent: 0 952 718 (1999-10-01), None
Cannetti, R., et al.,Milticast Security: A Taxonomy and Some Efficient Construction, Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies Proceedings, Mar. 1999, pp. 708-716, New York, NY and Piscataway, NJ.
Press, J,Object Oriented Cryptographic Facility Design: Export Considerations, International Journal Devoted to the Study of Technical and Financial Aspects of Computer Security, Elsevier Science Publishers, vol. 15, No. 6, pp. 507-514, Amsterdam, The Netherlands.
Bruce Schneier,Applied Cryptography, 1996, Wiley & Sons, Second Edition, pp. 33.
Rowley, Andrew,A security Architecture for Distributed Groupware, Department of Computer Science of Queen Mary and Westfield College, University of London, pp. 1-142, Sep. 1998.
Gong Li,New Protocols for Third-Party-Based Authentication and Secure Broadcast, 1994 ACM, pp. 176-183.
Gong Li,Enclaves: Enabling Secure Collaboration Over the Internet, 1006 Usenix, pp. 1-11.
Ellison, Carl M.,The Nature of a Useable PKI, Computer Networks, pp. 823-830, vol. 31, Elsevier Scine B.V.
Abadi, et al., “Prudent Engineering Practice for Cryptographic Protocols,” IEEE Transactions on Software Engineering, vol. 22, No. 1 Jan. 1996, pp. 6-15.
Press, J., “A New Approach to Cryptographic Facility Design”, ICL Technical Journal, May 1993, pp. 492-504.
Extended European Search Report issued in EP06013559.7, Oct. 25, 2006, 5 pages.
Asthagiri Nimisha
Tuvell Walter
Microsoft Corporation
Smithers Matthew
Wolf Greenfield & Sacks P.C.
LandOfFree
Method and apparatus for managing secure collaborative... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for managing secure collaborative..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for managing secure collaborative... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3777273