Cryptography – Key management – Key distribution
Reexamination Certificate
2011-02-01
2011-02-01
Pyzocha, Michael (Department: 2437)
Cryptography
Key management
Key distribution
C380S283000, C713S163000, C726S003000
Reexamination Certificate
active
07881477
ABSTRACT:
Multicast networks are partitioned into hierarchical security domains. Each security domain may comprise one or more lower security domains. Each security domain includes a security broker that distributes a group key and translates multicast data destined to the security domain, if necessary. A primary security broker at the second level of the hierarchical multicast system distributes the top security key to all peer members, including all peer security domain brokers to establish trust relationships. For each security domain boundary with security domain border routers, a multicast virtual link in configured that connects the security domain border routers and the security broker for the security domain to reduce the latency in forwarding multicast data. It can also make the backbone of the security domain contiguous so that multicast data can travel unchanged across the backbone. The multicast data is forwarded to the security domain through the security broker with security translation. A group key is distributed at each hierarchy level by exchange of Group request and Group reply messages. The rekey process is accomplished by multicasting Rekey Announcement messages, either regionally by a security broker, or globally by the group controller through the primary top regional security broker.
REFERENCES:
patent: 4227253 (1980-10-01), Ehrsaam et al.
patent: 5638512 (1997-06-01), Osman et al.
patent: 5668877 (1997-09-01), Aziz
patent: 5748736 (1998-05-01), Mittra
patent: 5831975 (1998-11-01), Chen et al.
patent: 6038322 (2000-03-01), Harkins
patent: 6154463 (2000-11-01), Aggarwal et al.
patent: 6195751 (2001-02-01), Caronni et al.
patent: 6345299 (2002-02-01), Segal
patent: 2001/0034796 (2001-10-01), Madruga et al.
Mitra, Suvo, “Iolus: A Framework for Scalable Secure Multicasting,” SIGCOMM '97 Cannes, France, pp. 277-288.
Canetti, R. and Pinkas, B., “A Taxonomy of Multicast Security Issues,” Internet Draft, May 1998, 11 pages.
Ballardie, A., “Scalable Multicast Key Distribution,” Request for Comments 1949, May 1996, 15 pages.
Harney, H. and Muckenhirn, C., “Group Key Management Protocol (GKMP) Specification”, Request for Comments 2093, Jul. 1997 19 pages.
Harney, H. and Muckenhirn, C., “Group Key Management Protocol (GKMP) Specification”, Request for Comments 2094, Jul. 1997 18 pages.
Kent, S. and Atkinson, R., “Security Architecture for the Internet Protocol”, Obsoletes RFC 1825, Jul. 1998, 52 pages.
Kent, S. and Atkinson, R., “IP Authentication Header”, Internet Draft, Jul. 1998, 19 pages.
Kent, S. and Atkinson, R. “IP Encapsulating Security Payload (ESP)”, Internet Draft, Jul. 1998, 18 pages.
Maughan, et al., “Internet Security Association and key Management Protocol (ISAKMP)”, Internet Draft, Jul. 3, 1998, 71 pages.
Avaya Inc.
Callahan Paul
Chapin IP Law LLC
Pyzocha Michael
Rouille, Esq. David W.
LandOfFree
Method for key distribution in a hierarchical multicast... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for key distribution in a hierarchical multicast..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for key distribution in a hierarchical multicast... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2641254