Information processing system and method

Cryptography – Key management – Key distribution

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S177000, C705S051000

Reexamination Certificate

active

07346170

ABSTRACT:
An information processing system and method are disclosed in which information processing is performed using an enabling key block (EKB) in association with a tree structure including category subtrees. A key tree is produced, which include subtrees that are grouped in accordance with categories and are managed by category entities. The EKB includes data produced by selecting a path in the key tree and encrypting a higher-level key in the selected path using a lower-level key in the selected path. The EKB is then provided to a device. A requester, which requests production of the EKB, may produce a root key or may request a key distribution center (KDC) to produce a root key. If the (KDC) produces the EKB, it may also request a category entity to produce a sub-EKB.

REFERENCES:
patent: 5748736 (1998-05-01), Mittra
patent: 6049878 (2000-04-01), Caronni et al.
patent: 6240188 (2001-05-01), Dondeti et al.
patent: 6880081 (2005-04-01), Itkis
patent: 6911974 (2005-06-01), Asano et al.
patent: 7043024 (2006-05-01), Dinsmore et al.
patent: 7167564 (2007-01-01), Asano et al.
patent: 7269257 (2007-09-01), Kitaya et al.
patent: 2002/0147906 (2002-10-01), Lotspiech et al.
patent: 2002/0150250 (2002-10-01), Kitaya et al.
patent: 2003/0044017 (2003-03-01), Briscoe
patent: 2003/0161474 (2003-08-01), Matsuzaki et al.
patent: 2003/0185396 (2003-10-01), Asano et al.
patent: 2005/0060334 (2005-03-01), Kawamoto et al.
patent: 2005/0210014 (2005-09-01), Asano
patent: 2005/0234949 (2005-10-01), Asano
patent: 11-187013 (1999-07-01), None
patent: WO-01/03364 (2001-01-01), None
patent: WO-01/03365 (2001-01-01), None
Wong, C. k. ,et al., “Secure Group Communications Using Key Graphs”, In: Proceedings of ACM SIGCOMM'98, (1998), pp. 68 to 79.
Canetti, R. et al. “Multicast Security: A Taxonomy and Some Efficient Constructions”, IEEE (1999), pp. 708-716.
Poovendran, R. et al. “An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes”, Lecture Notes in Computer Science (1999), vol. 1666, pp. 624-638. □□.
Dondeti, L. R., et al., “A Duel Encryption Protocol For Scalable Secure Multicasting”, In: Proceedings of IEEE international Symposium On Computers And Communications, (1999), pp. 2 to 8, Anatomy of the dual encryption protocol.
Moyer, et al., “A Survey Of Security Issues In Multicast Communications”, IEEE Network, Nov./Dec. 1999, vol. 13, No. 6, pp. 12 to 23.
Waldvogel, M., et al., “The VersaKey Framework: Versatile Group Key Management”, IEEE Journal on Selected Areas In Communications, Sep. 1999, vol. 17, No. 9, pp. 1614 to 1631.
Wong, C. k.,et al., “Secure Group Communications Using Key Graphs”, In: Proceedings of ACM SIGCOMM'98, (1998), pp. 68 to 79, (http://www.acm.org/sigcom/sigcom98/tp/technical.html).
Wallner et al., “Key Management for Multicast: Issues and Architectures”, Network Working Group, Jul. 1, 1997.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Information processing system and method does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Information processing system and method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Information processing system and method will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2796166

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.