Cryptography – Key management – Key distribution
Reexamination Certificate
2006-01-31
2006-01-31
Morse, Greg (Department: 2134)
Cryptography
Key management
Key distribution
C380S247000, C380S277000, C380S278000, C380S284000, C455S410000, C455S411000, C455S422100, C455S456100, C455S456500, C713S157000, C713S177000, C713S152000
Reexamination Certificate
active
06993138
ABSTRACT:
A system, method, and program code are given for secure communication. Multiple geographic cells are arranged in a hierarchical tree having a root node and internal nodes. The root node and each internal node in the tree have an associated node cryptographic key for secure communication with lower nodes in the tree. Each cell is associated with a leaf node of the tree and a cell cryptographic key for secure communications with devices located within the cell. A key management center is at the root node for determining an anticipated cell path of a mobile device from a current cell to a destination cell. The key management center distributes to the mobile device a set of cryptographic keys from the tree. This set contains a minimum number of cryptographic keys necessary to permit secure communications for the mobile device within each cell along the anticipated cell path, but no other cells.
REFERENCES:
patent: 5748736 (1998-05-01), Mittra
patent: 5884147 (1999-03-01), Reudink et al.
patent: 6049878 (2000-04-01), Caronni et al.
Katz, R., “Adaptation and Mobility in Wireless Information Systems,” IEEE Personal Communications (First Quarter 1994), p. 13.
Gong et al, “Multicast security and its extension to a mobile environment,” Wireless Networks I, 1995.
Ko et al, “Location-Based Multicast in Mobile Ad Hoc Networks,” Sep. 3, 1998, available at http://citeseer.ist.psu.edu/51969.html.
Omar et al, “Multicast Support for Mobile-IP with the Hierarchical Local Registration Approach,” Proceedings of WOWMOM'00, Aug. 2000.
Ramjee et al, “IP-Based Access Network Infrastructure for Next-Generation Wireless Data Networks,” IEEE Personal Communications, Aug. 2000.
Kruus, P., “A Survey of Multicast Security Issues and Architectures,” Naval Research Laboratory Report, 1998.
Campbell et al, “Design, Implementation, and Evaluation of Cellular IP,” IEEE Personal Communications, Aug. 2000.
Briscoe, Bob, “MARKS: Zero Side Effect Multicast Key Management using Arbitrarily Revealed Key Sequences”, inFirst International Workshop on Networked Group Communications(Nov. 1999).
Hardjono, T., et al, “A Framework for Group Key Management for Multicast Security”, <draft—ieff—ipsec—gkm framework—03.txt), Aug. 2000.
McGrew, David A., et al, “Key Establishment in Large Dynamic Groups Using One-Way Functions Trees”, TIS Report No. 0755, TIS Labs at Network Associates, Inc., Glenwood, Md (May 1998).
Rodeh, Ohad, et al, “Using AVL Trees for Fault Tolerant Group Key Management”, manuscript, Oct. 2000.
Wallner, D., et al, “Key Management for Multicast: Issues and Architectures”, RFC2627, Jul. 1997.
Wong, Chung Kei, et al, “Secure Group Communications Using Key Graphs”, WGL98, inProceedings of SIGCOMM'98, Sep. 1998.
Elmore John
Morse Greg
Nortel Networks Limited
Steubing McGuinness & Manaras LLP
LandOfFree
Spatial key trees for key management in wireless environments does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Spatial key trees for key management in wireless environments, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Spatial key trees for key management in wireless environments will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3571199