Method and apparatus for security in a data processing system

Cryptography – Key management – Key distribution

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

09973301

ABSTRACT:
Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key. The short-time key is available with each broadcast message, wherein sufficient information to calculate the short-time key is provided in an Internet protocol header preceding the broadcast content. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key.

REFERENCES:
patent: 4881263 (1989-11-01), Herbison et al.
patent: 4924513 (1990-05-01), Herbison et al.
patent: 5101501 (1992-03-01), Gilhousen et al.
patent: 5253294 (1993-10-01), Maurer
patent: 5421006 (1995-05-01), Jablon et al.
patent: 5467398 (1995-11-01), Pierce et al.
patent: 5850445 (1998-12-01), Chan et al.
patent: 5909491 (1999-06-01), Luo
patent: 5940507 (1999-08-01), Cane et al.
patent: 6026165 (2000-02-01), Marino et al.
patent: 6055236 (2000-04-01), Nessett et al.
patent: 6108424 (2000-08-01), Pitiot
patent: 6128389 (2000-10-01), Chan et al.
patent: 6199161 (2001-03-01), Ahvenainen
patent: 6233234 (2001-05-01), Curry et al.
patent: 6253326 (2001-06-01), Lincke et al.
patent: 6266420 (2001-07-01), Langford et al.
patent: 6463155 (2002-10-01), Akiyama et al.
patent: 6538996 (2003-03-01), West et al.
patent: 6760752 (2004-07-01), Liu et al.
patent: 7266687 (2007-09-01), Sowa et al.
patent: 2002/0154781 (2002-10-01), Sowa et al.
Menezes et al., Handbook of Applied Cryptography, 1996, CRC Press, chapter 13, pp. 543-590.
William Stallings, “Cryptography and network security” 1995, Prentice-Hall, Inc., XP002248261, pp. 402-406, 413-417, 421-424.
Menezes, Vanstone, Oorschot, “Handbook of Applied Cryptography” 1997, CRC Press LIC, USA XP002248262 pp. 497-500, 551-552.
Bruce Schneier, “Applied Cryptography Second Edition” 1996, John Wiley & Sons, Inc. XP002248263, p. 523, 524.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for security in a data processing system does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for security in a data processing system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for security in a data processing system will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3932203

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.