System and method for processing information using...

Cryptography – Key management – Having particular key generator

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S277000, C380S278000, C380S279000

Reexamination Certificate

active

10048658

ABSTRACT:
An information processing system and method using an encryption key block sets sub-trees classified based on data processing ability of the devices (capability) in a key tree in which respective keys are corresponded to a root, nodes and leaves of a tree in which a plurality of devices are constituted as the leaves, generates a sub-enabling key block which is effective for an entity in a managing subject of each sub-tree (entity), and generates an enabling key block decodable only by the entities having common capability. Also, an information processing system and method using an encryption key block manages a partial tree of a key tree (sub-tree), generates a sub-enabling key block based only on a key set corresponding to nodes or leaves included in the sub-tree, and generates an enabling key block decodable only by selected entities by using the sub-enabling key block. Thus, it is possible to generate and distribute an enabling key block corresponding to data processing ability of a device and to manage devices by dividing a hierarchical key tree structure.

REFERENCES:
patent: 6049878 (2000-04-01), Caronni et al.
patent: 6240188 (2001-05-01), Dondeti et al.
patent: 6609116 (2003-08-01), Lotspiech
patent: 11-187013 (1999-07-01), None
JP 11-187013 Machine-Assisted Translation (MAT), Jul. 9, 1999, English Translation, Thomson Feb. 3, 2006.
Copending U.S. Appl. No. 10/204,775.
Dondeti, L. R., et al., “A Duel Encryption Protocol For Scalable Secure Multicasting”, In: Proceedings of IEEE international Symposium On Computers And Communications, (1999), pp. 2 to 8, Anatomy of the dual encryption protocol.
Moyer, et al., “A Survey Of Security Issues In Multicast Communications”, IEEE Network, Nov./Dec. 1999, vol. 13, No. 6, pp. 12 to 23 especially, Tree-Based key Management.
Waldvogel, M., et al., The VersaKey Framework: Versatile Group Key Management:, IEEE Journal on Selected Areas In Communications, Sep. 1999, vol. 17, No. 9, pp. 1614 to 1631, especially pp. 1616 to 1621.
Wong, C. k. ,et al., “Secure Group Communications Using Key Graphs”, In: Proceedings of ACM SIGCOMM'98, (1998), pp. 68 to 79, especially 3.4, Leaving a tree key graph (http://www.acm.org/sigcom/sigcom98/tp/technical.html).
Waldvogel, M., et al., The VersaKey Framework: Versatile Group Key Management:, IEEE Journal on Selected Areas In Communications, Sep. 1999, vol. 17, No. 9, pp. 1614 to 1631, especially pp. 1616 to 1621.
Wong, C. k., et al., “Secure Group Communications Using Key Graphs”, In: Proceedings of ACM SIGCOMM'98, (1998), pp. 68 to 79, especially 3.4, Leaving a tree key graph (http://www.acm.org/sigcom/sigcom98/tp/technical.html).
Wallner et al., “Key Management for Multicast: Issues and Architectures”, Network Working Group.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for processing information using... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for processing information using..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for processing information using... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3733600

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.