Cryptography – Key management – Having particular key generator
Reexamination Certificate
2007-09-11
2007-09-11
Zand, Kambiz (Department: 2134)
Cryptography
Key management
Having particular key generator
C380S277000, C380S278000, C380S279000
Reexamination Certificate
active
10048658
ABSTRACT:
An information processing system and method using an encryption key block sets sub-trees classified based on data processing ability of the devices (capability) in a key tree in which respective keys are corresponded to a root, nodes and leaves of a tree in which a plurality of devices are constituted as the leaves, generates a sub-enabling key block which is effective for an entity in a managing subject of each sub-tree (entity), and generates an enabling key block decodable only by the entities having common capability. Also, an information processing system and method using an encryption key block manages a partial tree of a key tree (sub-tree), generates a sub-enabling key block based only on a key set corresponding to nodes or leaves included in the sub-tree, and generates an enabling key block decodable only by selected entities by using the sub-enabling key block. Thus, it is possible to generate and distribute an enabling key block corresponding to data processing ability of a device and to manage devices by dividing a hierarchical key tree structure.
REFERENCES:
patent: 6049878 (2000-04-01), Caronni et al.
patent: 6240188 (2001-05-01), Dondeti et al.
patent: 6609116 (2003-08-01), Lotspiech
patent: 11-187013 (1999-07-01), None
JP 11-187013 Machine-Assisted Translation (MAT), Jul. 9, 1999, English Translation, Thomson Feb. 3, 2006.
Copending U.S. Appl. No. 10/204,775.
Dondeti, L. R., et al., “A Duel Encryption Protocol For Scalable Secure Multicasting”, In: Proceedings of IEEE international Symposium On Computers And Communications, (1999), pp. 2 to 8, Anatomy of the dual encryption protocol.
Moyer, et al., “A Survey Of Security Issues In Multicast Communications”, IEEE Network, Nov./Dec. 1999, vol. 13, No. 6, pp. 12 to 23 especially, Tree-Based key Management.
Waldvogel, M., et al., The VersaKey Framework: Versatile Group Key Management:, IEEE Journal on Selected Areas In Communications, Sep. 1999, vol. 17, No. 9, pp. 1614 to 1631, especially pp. 1616 to 1621.
Wong, C. k. ,et al., “Secure Group Communications Using Key Graphs”, In: Proceedings of ACM SIGCOMM'98, (1998), pp. 68 to 79, especially 3.4, Leaving a tree key graph (http://www.acm.org/sigcom/sigcom98/tp/technical.html).
Waldvogel, M., et al., The VersaKey Framework: Versatile Group Key Management:, IEEE Journal on Selected Areas In Communications, Sep. 1999, vol. 17, No. 9, pp. 1614 to 1631, especially pp. 1616 to 1621.
Wong, C. k., et al., “Secure Group Communications Using Key Graphs”, In: Proceedings of ACM SIGCOMM'98, (1998), pp. 68 to 79, especially 3.4, Leaving a tree key graph (http://www.acm.org/sigcom/sigcom98/tp/technical.html).
Wallner et al., “Key Management for Multicast: Issues and Architectures”, Network Working Group.
Asano Tomoyuki
Ishiguro Ryuji
Kitaya Yoshimichi
Osawa Yoshitomo
Lerner David Littenberg Krumholz & Mentlik LLP
Sony Corporation
Tran Tongoc
Zand Kambiz
LandOfFree
System and method for processing information using... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for processing information using..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for processing information using... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3733600