Method for key distribution in a hierarchical multicast...

Cryptography – Key management – Key distribution

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S283000, C713S163000, C726S003000

Reexamination Certificate

active

07881477

ABSTRACT:
Multicast networks are partitioned into hierarchical security domains. Each security domain may comprise one or more lower security domains. Each security domain includes a security broker that distributes a group key and translates multicast data destined to the security domain, if necessary. A primary security broker at the second level of the hierarchical multicast system distributes the top security key to all peer members, including all peer security domain brokers to establish trust relationships. For each security domain boundary with security domain border routers, a multicast virtual link in configured that connects the security domain border routers and the security broker for the security domain to reduce the latency in forwarding multicast data. It can also make the backbone of the security domain contiguous so that multicast data can travel unchanged across the backbone. The multicast data is forwarded to the security domain through the security broker with security translation. A group key is distributed at each hierarchy level by exchange of Group request and Group reply messages. The rekey process is accomplished by multicasting Rekey Announcement messages, either regionally by a security broker, or globally by the group controller through the primary top regional security broker.

REFERENCES:
patent: 4227253 (1980-10-01), Ehrsaam et al.
patent: 5638512 (1997-06-01), Osman et al.
patent: 5668877 (1997-09-01), Aziz
patent: 5748736 (1998-05-01), Mittra
patent: 5831975 (1998-11-01), Chen et al.
patent: 6038322 (2000-03-01), Harkins
patent: 6154463 (2000-11-01), Aggarwal et al.
patent: 6195751 (2001-02-01), Caronni et al.
patent: 6345299 (2002-02-01), Segal
patent: 2001/0034796 (2001-10-01), Madruga et al.
Mitra, Suvo, “Iolus: A Framework for Scalable Secure Multicasting,” SIGCOMM '97 Cannes, France, pp. 277-288.
Canetti, R. and Pinkas, B., “A Taxonomy of Multicast Security Issues,” Internet Draft, May 1998, 11 pages.
Ballardie, A., “Scalable Multicast Key Distribution,” Request for Comments 1949, May 1996, 15 pages.
Harney, H. and Muckenhirn, C., “Group Key Management Protocol (GKMP) Specification”, Request for Comments 2093, Jul. 1997 19 pages.
Harney, H. and Muckenhirn, C., “Group Key Management Protocol (GKMP) Specification”, Request for Comments 2094, Jul. 1997 18 pages.
Kent, S. and Atkinson, R., “Security Architecture for the Internet Protocol”, Obsoletes RFC 1825, Jul. 1998, 52 pages.
Kent, S. and Atkinson, R., “IP Authentication Header”, Internet Draft, Jul. 1998, 19 pages.
Kent, S. and Atkinson, R. “IP Encapsulating Security Payload (ESP)”, Internet Draft, Jul. 1998, 18 pages.
Maughan, et al., “Internet Security Association and key Management Protocol (ISAKMP)”, Internet Draft, Jul. 3, 1998, 71 pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for key distribution in a hierarchical multicast... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for key distribution in a hierarchical multicast..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for key distribution in a hierarchical multicast... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2641254

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.