Techniques for managing keys using a key server in a network...

Cryptography – Key management

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C705S071000, C713S171000, C726S001000, C726S002000, C726S022000

Reexamination Certificate

active

08050408

ABSTRACT:
The election of a key server is provided. The key server is a single device that broadcasts an encryption key to other devices in a network segment. Also, automatic reelection of a new key server is provided when a current key server becomes unavailable. Key receivers may separately detect that a new key server is needed and separately determine from state information which key receiver should be elected the new key server. The state information may have been received in previously sent messages. Thus, further messaging is not needed to elect a new key server.

REFERENCES:
patent: 6804703 (2004-10-01), Allen et al.
patent: 2005/0050004 (2005-03-01), Sheu et al.
patent: 2006/0088167 (2006-04-01), Bade et al.
patent: 2006/0129691 (2006-06-01), Coffee et al.
patent: 2007/0016663 (2007-01-01), Weis
U.S. Appl. No. 10/625,445, filed Sep. 2, 2008 Huang et al.
Barker, E., et. al., “Recommendation for Key Management—Part 1:General”, NIST Special Publication 800-57 Part 1, Aug. 2005.
Barker, E., et. al., “Recommendation for Key Management—Part 2:Best Practices for Key Management Organization”, NIST Special Publication 800-57 Part 2, Aug. 2005.
Douceur, J.R.; 2002. The Sybil Attack. In Revised Papers From the First international Workshop on Peer-To-Peer Systems (Mar. 7-8, 2002). P. Druschel, M. F. Kaashoek, and A. I. Rowstron, Eds. Lecture Notes in Computer Science, vol. 2429. Springer-Verlag, London, 251-260. Available at http://www.cs.rice.edu/Conferences/IPTPS02/101. pdf.
Dworkin, M.; “Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication”, NIST Special Publication 800-38B, May 2005; http://csrc.nist.gov/publications
istpubs/800-38C/SP800-38C.pdf.
IEEE, “IEEE P802.1AE/D4.0 Draft Standard for Local and Metropolitan Area Networks: Media Access Control (MAC) Security”, Aug. 25, 2005.
McGrew, D.A. and Viega, J. “The Galois/Counter Mode of Operation (GCM)”, May 31, 2005. Available at http://csrc.nist.gov/CryptoToolkit/modes/proposedmodes/gcm/gcm-revised-spec.pdf.
NIST, “Advanced Encryption Standards”, FIPS 197, Nov. 2001. Available at http://csrc.nist.gov/publications/fips/ index.html.
NIST, “Annex C: Approved Random Number Generators for FIPS PUB 140-2, Security Requirements for Cryptographic Modules”, Draft, Jan. 31, 2005.
NIST, “Security requirements for Cryptographic Modules”, FIPS 140-2, May 2001. Available at http://csrc.nist.gov/publications/fips/index.html.
NIST, Draft NIST AES Key Wrap Specification, Nov. 16, 2001. Available at http://csrc.nist.gov/CryptoToolkit/kms/key-wrap.pdf.
NIST Computer Security Division's CSRC Home page, See http://csrc.nist.gov/.
Perrig, A., et. al., “Efficient Authentication and Signing of Multicast Streams over Lossy Channels”, IEEE Symposium on Security and Privacy (May 2000), pp. 56-73.
Perrig, A., et. al., SPINS: Security Protocols for Sensor Networks, Wireless Networks (Sep. 2002), vol. 8, No. 5, pp. 521-534. Available at http://sparrow.ece.cmu.edu/˜adrian/projects/mc2001/spins-wine-journal.pdf.
Seaman, Mick; “A distributed fault-tolerant group key selection protocol for MACsec”, Revision 0.4, Dec. 2004; http://www.ieee802.org/1/files/public/docs2004/af-KeySelectionProtocol-seaman-v03.pdf.
Seaman, Mick; “A distributed fault-tolerant group key selection protocol for MACsec”, Rev.0.3, Jul. 6, 2004, 8 pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Techniques for managing keys using a key server in a network... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Techniques for managing keys using a key server in a network..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Techniques for managing keys using a key server in a network... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4286394

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.