Cryptography – Key management – Key distribution
Reexamination Certificate
2008-04-01
2008-04-01
Moazzami, Nasser (Department: 2136)
Cryptography
Key management
Key distribution
Reexamination Certificate
active
07352868
ABSTRACT:
Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key. The short-time key is available with each broadcast message, wherein sufficient information to calculate the short-time key is provided in an Internet protocol header preceding the broadcast content. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key.
REFERENCES:
patent: 4881263 (1989-11-01), Herbison et al.
patent: 4924513 (1990-05-01), Herbison et al.
patent: 5101501 (1992-03-01), Gilhousen et al.
patent: 5253294 (1993-10-01), Maurer
patent: 5421006 (1995-05-01), Jablon et al.
patent: 5467398 (1995-11-01), Pierce et al.
patent: 5850445 (1998-12-01), Chan et al.
patent: 5909491 (1999-06-01), Luo
patent: 5940507 (1999-08-01), Cane et al.
patent: 6026165 (2000-02-01), Marino et al.
patent: 6055236 (2000-04-01), Nessett et al.
patent: 6108424 (2000-08-01), Pitiot
patent: 6128389 (2000-10-01), Chan et al.
patent: 6199161 (2001-03-01), Ahvenainen
patent: 6233234 (2001-05-01), Curry et al.
patent: 6253326 (2001-06-01), Lincke et al.
patent: 6266420 (2001-07-01), Langford et al.
patent: 6463155 (2002-10-01), Akiyama et al.
patent: 6538996 (2003-03-01), West et al.
patent: 6760752 (2004-07-01), Liu et al.
patent: 7266687 (2007-09-01), Sowa et al.
patent: 2002/0154781 (2002-10-01), Sowa et al.
Menezes et al., Handbook of Applied Cryptography, 1996, CRC Press, chapter 13, pp. 543-590.
William Stallings, “Cryptography and network security” 1995, Prentice-Hall, Inc., XP002248261, pp. 402-406, 413-417, 421-424.
Menezes, Vanstone, Oorschot, “Handbook of Applied Cryptography” 1997, CRC Press LIC, USA XP002248262 pp. 497-500, 551-552.
Bruce Schneier, “Applied Cryptography Second Edition” 1996, John Wiley & Sons, Inc. XP002248263, p. 523, 524.
Hawkes Philip
Leung Nikolai K. N.
Rose Gregory G.
Cervetti David García
Godsey Sandra L.
Kim Won Tae C.
Moazzami Nasser
Rouse Thomas R.
LandOfFree
Method and apparatus for security in a data processing system does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for security in a data processing system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for security in a data processing system will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2772295