Method for overcoming the single point of failure of the...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Having particular address related cryptography

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S162000, C713S150000, C713S168000, C713S171000, C380S277000, C380S264000, C380S283000

Reexamination Certificate

active

09408420

ABSTRACT:
An approach for managing addition or deletion of nodes in a multicast or broadcast group, which avoids introducing a single point of failure at a group controller, certificate authority, or key distribution center, is disclosed. A central group controller utilizes a binary tree structure to generate and distribute session keys for the establishment of a secure multicast group among multiple user nodes. The central group controller is replicated in a plurality of other group controllers, interconnected in a network having a secure communication channel and connected to a load balancer. The secure communication channel is established using a public key exchange protocol. The load balancer distributes incoming join/leave requests to a master group controller. The master group controller processes the join or leave, generates a new group session key, and distributes the new group session key to all other group controller replicas. Each group controller is successively designated as master group controller in real time when a former master group controller crashes or relinquishes its master authority.

REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4531020 (1985-07-01), Wechselberger et al.
patent: 4578531 (1986-03-01), Everhart et al.
patent: 4776011 (1988-10-01), Busby
patent: 4881263 (1989-11-01), Herbison et al.
patent: 5309516 (1994-05-01), Takaragi et al.
patent: 5351295 (1994-09-01), Perlman et al.
patent: 5361256 (1994-11-01), Doeringer et al.
patent: 5588060 (1996-12-01), Aziz
patent: 5588061 (1996-12-01), Ganesan et al.
patent: 5600642 (1997-02-01), Pauwels et al.
patent: 5630184 (1997-05-01), Roper et al.
patent: 5633933 (1997-05-01), Aziz
patent: 5663896 (1997-09-01), Aucsmith
patent: 5724425 (1998-03-01), Chang et al.
patent: 5748736 (1998-05-01), Mittra
patent: 5761305 (1998-06-01), Vanstone et al.
patent: 5805578 (1998-09-01), Stirpe et al.
patent: 5832229 (1998-11-01), Tomoda et al.
patent: 5841864 (1998-11-01), Klayman et al.
patent: 5850451 (1998-12-01), Sudia
patent: 5889865 (1999-03-01), Vanstone et al.
patent: 5920630 (1999-07-01), Wertheimer et al.
patent: 5987131 (1999-11-01), Clapp
patent: 6009274 (1999-12-01), Fletcher et al.
patent: 6049878 (2000-04-01), Caronni et al.
patent: 6055575 (2000-04-01), Paulsen et al.
patent: 6088336 (2000-07-01), Tosey
patent: 6119228 (2000-09-01), Angelo et al.
patent: 6151395 (2000-11-01), Harkins
patent: 6216231 (2001-04-01), Stubblebine
patent: 6226383 (2001-05-01), Jablon
patent: 6240188 (2001-05-01), Dondeti et al.
patent: 6240513 (2001-05-01), Friedman et al.
patent: 6247014 (2001-06-01), Ladwig et al.
patent: 6256733 (2001-07-01), Thakkar et al.
patent: 6263435 (2001-07-01), Dondeti et al.
patent: 6272135 (2001-08-01), Nakatsugawa
patent: 6279112 (2001-08-01), O'Toole et al.
patent: 6295361 (2001-09-01), Kadansky et al.
patent: 6330671 (2001-12-01), Aziz
patent: 6332163 (2001-12-01), Bowman-Amuah
patent: 6363154 (2002-03-01), Peyravian et al.
patent: 6434612 (2002-08-01), Hughes et al.
patent: 6483921 (2002-11-01), Harkins
patent: 6507562 (2003-01-01), Kadansky et al.
patent: 6570847 (2003-05-01), Hosein
patent: 6584566 (2003-06-01), Hardjono
patent: 6633579 (2003-10-01), Tedijanto et al.
patent: 6636968 (2003-10-01), Rosner et al.
patent: 6643773 (2003-11-01), Hardjono
patent: 6684331 (2004-01-01), Srivastava
patent: 6745243 (2004-06-01), Squire et al.
patent: 2005/0129236 (2005-06-01), Sharma
patent: 2006/0168446 (2006-07-01), Ahonen et al.
patent: 0 952 718 (1999-10-01), None
patent: 0 994 600 (2000-04-01), None
Alfred J. Menezes, “Handbook of Applied Cryptography,” 1997, CRC Press LLC., pp. 519-520.
Bruce Schneier, “Applied Cryptography,” 1996, John Wiley & Sons, Inc., pp. 33-35 and 47-65.
Robert Orfali et al., “The Essential Distributed Objects Survival Guide,” 1996, pp. 448-449.
David Chappell, “Understanding Microsoft Windows 2000 Distributed Services,” 2000, pp. 319-324.
Robert Orfali et al., “Client/Server Survival Guide Third Edition,” 1999, p. 488.
Koblitz, Neal, A Course in Number Theory and Cryptography, 1994, Springer Verlag New York Inc. 2nd Edition, 8 pages.
Harry Newton, Newton's Telecom Dictionary, 1998, Telecom Books, 14thEdition, p. 228.
IEEE Transactions On Information Theory, vol. IT-22, No. 6 (Nov. 1976) entitled “New Directions in Cryptography” by Whitfield Diffie and Martin E. Hellman.
Proceedings of the IEEE, vol. 76, No. 5 (May 1988) entitled “The First Ten Years of Public-Key Cryptography” by Whitfield Diffie.
MIT/LCS/TM-537, Laboratory for Computer Science (Aug. 1995) entitled “Guaranteed Partial Key-Escrow”, Handout #13, by Silvio Micali.
Proceedings of the Fourth Annual Conference on Computer and Communications Security, ACM, 1997 (Nov. 1996) entitled “Verifiable Partial Key Escrow” by Mihir Bellare and Shafi Goldwasser.
Federal Information Processing Standards Publication 185 (Feb. 9, 1994) entitled “U.S. Department of Commernce/National Institute of Standards and Technology”, Escrowed Encryption Standard, Category: Telecommunications Security.
Cylink Corporation Resources entitled “Alternatives to RSA: Using Diffie-Hellman with DSS”.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for overcoming the single point of failure of the... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for overcoming the single point of failure of the..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for overcoming the single point of failure of the... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3831123

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.