$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Group key distribution 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/08
  • H04L-009/30
  • H04L-009/32
  • H04K-001/02
출원번호 US-0175240 (1998-10-20)
발명자 / 주소
  • Harkins Dan
출원인 / 주소
  • Cisco Technology, Inc.
대리인 / 주소
    Carr & Ferrell LLP
인용정보 피인용 횟수 : 119  인용 특허 : 3

초록

A method for distributing a secret key from a key holder H to intended group members M. The method assumes that during the distribution process each party, a group member M and the key holder H, can decrypt and encrypt exchanged information such that the encrypter knows that the decrypter will be th

대표청구항

[ What is claimed is:] [1.] A method for distributing a secret key K from a key holder to a group member, comprising the steps of:the group member encrypting a code R.sub.m to form an encrypted code R.sub.me ;the group member providing said encrypted code R.sub.me and an authentication-M to said key

이 특허에 인용된 특허 (3)

  1. Goss Kenneth C (Oceano CA), Cryptographic method and apparatus for public key exchange with authentication.
  2. Vanstone Scott A.,CAX ; Menezes Alfred John ; Qu Mingua,CAX, Key agreement and transport protocol with implicit signatures.
  3. Janson Philippe,CHX ; Tsudik Gene,CHX, Method and system for providing secure key distribution in a communication system.

이 특허를 인용한 특허 (119)

  1. Naik, Chickayya G.; Eckert, Toerless; Krishnamurthy, Senthilkumar, Admission control mechanism for multicast receivers.
  2. Graunke, Gary L., Apparatus and method for distributing private keys to an entity with minimal secret, unique information.
  3. Graunke, Gary L., Apparatus and method for distributing private keys to an entity with minimal secret, unique information.
  4. Brickell, Ernest F., Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information.
  5. Wainner, W. Scott; Guichard, James N., Conditional BGP advertising for dynamic group VPN (DGVPN) clients.
  6. Kitaj, Paul Thomas; Trengove, Mary Eleanor; Hardy, Douglas Allan, Cryptographic key management in a communication network.
  7. Mohammad Peyravian ; Stephen Michael Matyas, Jr. ; Nevenko Zunic, Decentralized systems methods and computer program products for sending secure messages among a group of nodes.
  8. Herbach, Jonathan D.; Donahue, James; Shapiro, William M., Distributed document version control.
  9. Herbach, Jonathan D.; Gilchrist, Gary, Distributed document version control.
  10. Khalid, Mohamed; Popoviciu, Ciprian Pompiliu; Kamarthy, Kavitha; Akhter, Aamer Saeed; Asati, Rajiv, Distribution of group cryptography material in a mobile IP environment.
  11. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  12. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  13. Ouye, Michael Michio; Crocker, Steven Toye, Dynamic evaluation of access rights.
  14. Nix, John A., Embedded universal integrated circuit card supporting two-factor authentication.
  15. Nix, John A., Embedded universal integrated circuit card supporting two-factor authentication.
  16. Shapiro, William M., Family of encryption keys.
  17. Schneider, James Paul, Generating session keys.
  18. Harkins Dan, Group key distribution.
  19. Supramaniam,Senthilvasan; Huang,Weiqing; Vainstein,Klimenty, Guaranteed delivery of changes to security policies in a distributed system.
  20. Rossmann, Alain, Hybrid systems for securing digital assets.
  21. Felsher, David Paul, Information record infrastructure, system and method.
  22. Rayes, Mark Ammar; Cheung, Michael; Droms, Ralph; Dini, Petre, Isolation approach for network users associated with elevated risk.
  23. Nix, John A., Key derivation for a module using an embedded universal integrated circuit card.
  24. Nix, John A., Key derivation for a module using an embedded universal integrated circuit card.
  25. Nix, John A., Key derivation for a module using an embedded universal integrated circuit card.
  26. Acar, Tolga; Benaloh, Josh; Ferguson, Niels Thomas; Ellison, Carl M.; Belenkiy, Mira; Nguyen, Duy Lan, Managing group keys.
  27. Alain, Rossmann; Zuili, Patrick; Ouye, Michael Michio; Humpich, Serge; Lee, Chang-Ping; Vainstein, Klimenty; Hilderbrand, Hal; Garcia, Denis Jacques Paul; Supramaniam, Senthilvasan; Huang, Weiqing; Ryan, Nicholas Michael, Managing secured files in designated locations.
  28. Brickell, Ernest; Graunke, Gary; Stevens, William A.; Vembu, Balaji, Method and apparatus for authenticated, recoverable key distribution with no database secrets.
  29. Hardjono, Thomas; Cain, Brad, Method and apparatus for distributing public key certificates.
  30. Garcia, Denis Jacques Paul, Method and apparatus for securing digital assets.
  31. Lee, Chang-Ping; Garcia, Denis Jacques Paul, Method and apparatus for securing electronic data.
  32. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  33. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  34. Fluhrer, Scott; Wainner, Warren Scott; Rowles, Sheela; Kamarthy, Kavitha; Khalid, Mohamed; Naizi, Haseeb; Sethi, Pratima, Method and system for dynamic secured group communication.
  35. Fluhrer, Scott; Wainner, Warren Scott; Rowles, Sheela; Kamarthy, Kavitha; Khalid, Mohamed; Niazi, Haseeb; Sethi, Pratima, Method and system for dynamic secured group communication.
  36. Kenrich, Michael Frederick; Hildebrand, Hal S.; Supramaniam, Senthilvasan, Method and system for fault-tolerant transfer of files across a network.
  37. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  38. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  39. Vainstein, Klimenty, Method and system for managing security tiers.
  40. Kinghorn, Gary Mark; Garcia, Denis Jacques Paul, Method and system for protecting electronic data in enterprise environment.
  41. Ryan,Nicholas M., Method and system for protecting encrypted files transmitted over a network.
  42. Nath, Satyajit, Method and system for providing document retention using cryptography.
  43. Nath, Satyajit, Method and system for providing document retention using cryptography.
  44. Schwarz, Henry Samuel; Cordeiro, Daryll Paul, Method and system for secure remote transfer of master key for automated teller banking machine.
  45. Balissat, Joel; Galand, Claude; Le Pennec, Jean Francois; Sommerlatt, Jean Marie, Method and system for securely scanning network traffic.
  46. Balissat, Joel; Galand, Claude; Le Pennec, Jean-Francois; Sommerlatt, Jean-Marie, Method and system for securely scanning network traffic.
  47. Balissat,Joel; Galand,Claude; Le Pennec,Jean Francois; Sommerlatt,Jean Marie, Method and system for securely scanning network traffic.
  48. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  49. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  50. Ryan, Nicholas M., Method and system for using remote headers to secure electronic files.
  51. Li, Yunzhou, Method for key distribution in a hierarchical multicast traffic security system for an internetwork.
  52. Challener, David Carroll; Ovies, Hernando, Method for migrating a base chip key from one computer system to another.
  53. Sutton, II, James A.; Brickell, Ernie F.; Hall, Clifford D.; Grawrock, David W., Method of delivering Direct Proof private keys to devices using an on-line service.
  54. Sutton, II, James A.; Brickell, Ernie F.; Hall, Clifford D.; Grawrock, David W., Method of delivering direct proof private keys to devices using an on-line service.
  55. Hersent,Olivier, Method of transporting packets between an access interface of a subscriber installation and a shared network, and access interface implementing such method.
  56. Benayoun,Alain; LePennec,Jean Francois; Michel,Patrick, Method of updating encryption keys in a data communication system.
  57. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  58. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  59. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  60. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  61. Nix, John A., Module for “machine-to-machine” communications using public key infrastructure.
  62. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  63. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  64. Hoffberg, Steven M., Multifactorial optimization system and method.
  65. Balissat, Joel; Galand, Claude; Le Pennec, Jean Francois; Sommerlatt, Jean Marie, Multipoint server for providing secure, scaleable connections between a plurality of network devices.
  66. Janes,Sherman M., Network communications security agent.
  67. Janes,Sherman M., Network communications security agent.
  68. Baugher,Mark J.; Farnham,Stu; Hemminger,Stephen C.; Marshall,Robert A.; Tait,Mark, Network content management.
  69. Nix, John A., Network supporting two-factor authentication for modules with embedded universal integrated circuit cards.
  70. Shapiro, William M.; Donahue, James; Herbach, Jonathan D., Offline access in a document control system.
  71. Rekhter, Yakov; Rosen, Eric C., Peer-model support for virtual private networks having potentially overlapping addresses.
  72. Rekhter,Yakov; Rosen,Eric C., Peer-model support for virtual private networks having potentially overlapping addresses.
  73. Rayes,Ammar; Cheung,Michael, Policy-based network security management.
  74. Nix, John A., Power management and security for wireless modules in “machine-to-machine” communications.
  75. Nix, John A., Power management and security for wireless modules in “machine-to-machine” communications.
  76. Nix, John A., Power management and security for wireless modules in “machine-to-machine” communications.
  77. Nix, John A., Power management and security for wireless modules in “machine-to-machine” communications.
  78. Drews, Paul C., Protected platform identity for digital signing.
  79. Ryan, Nicholas M., Protecting encrypted files transmitted over a network.
  80. Teranishi, Isamu, Pseudo-random function calculating device and method and number-limited anonymous authentication system and method.
  81. Yokota,Kaoru; Tatebayashi,Makoto, Reception terminal, key management apparatus, and key updating method for public key cryptosystem.
  82. Andrews Richard F ; Williams Peter ; Lin Judy, Risk management for public key management infrastructure using digital certificates.
  83. Rekhter,Yakov; Rosen,Eric C., Router for virtual private network employing tag switching.
  84. Nix, John A., Secure PKI communications for “machine-to-machine” modules, including key derivation by modules and authenticating public keys.
  85. Nix, John A., Secure PKI communications for “machine-to-machine” modules, including key derivation by modules and authenticating public keys.
  86. Nix, John A., Secure PKI communications for “machine-to-machine” modules, including key derivation by modules and authenticating public keys.
  87. Tang, Weiming, Secure communications and control in a fueling environment.
  88. Garcia,Denis Jacques Paul, Secured data format for access control.
  89. Hildebrand, Hal S.; Garcia, Denis Jacques Paul, Security system for generating keys from access rules in a decentralized manner and methods therefor.
  90. Gutnik, Yevgeniy, Security system that uses indirect password-based encryption.
  91. Vainstein, Klimenty; Ouye, Michael Michio, Security system with staging capabilities.
  92. Nix, John A., Set of servers for “machine-to-machine” communications using public key infrastructure.
  93. Nix, John A., Set of servers for “machine-to-machine” communications using public key infrastructure.
  94. Rosen,Eric C.; Rekhter,Yakov, Shared communications network employing virtual-private-network identifiers.
  95. Winick, Steven J., Supervision of high value assets.
  96. Filipi Martin,Adrian; King,Jeff, System and method for computerized global messaging encryption.
  97. Hoffberg, Steven M., System and method for determining contingent relevance.
  98. Wainner,W. Scott; Guichard,James N.; Weis,Brian E.; McGrew,David A., System and method for dynamic secured group communication.
  99. Simms,Timothy J., System and method for establishing secure communication.
  100. Ryan, Nicholas, System and method for imposing security on copies of secured items.
  101. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  102. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  103. Hildebrand, Hal S., System and method for providing different levels of key security for controlling access to secured items.
  104. Hildebrand, Hal S.; Vainstein, Klimenty, System and method for providing distributed access control to secured documents.
  105. Zuili, Patrick; Vainstein, Klimenty, System and method for providing manageability to security information for secured items.
  106. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  107. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  108. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  109. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  110. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  111. Nix, John A., Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI).
  112. Nix, John A., Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI).
  113. Nix, John A., Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI).
  114. Weis, Brian E.; Sastry, Shashi; Rowles, Sheela Dixit, Techniques for distributing a new communication key within a virtual private network.
  115. Peden, George H.; Marshall, Robert A., Ticketing and keying for orchestrating distribution of network content.
  116. Xiao, Sihai; Yuan, Zheng; Knight, David, Token-based control of permitted sub-sessions for online collaborative computing sessions.
  117. Herbach, Jonathan D.; Donahue, James; Shapiro, William M., Transparent authentication process integration.
  118. Herbach, Jonathan D.; Donahue, James; Shapiro, William M., Transparent authentication process integration.
  119. Daude, Olivier; Fieschi, Jacques; Galand, Claude; Hericourt, Olivier; Le Pennec, Jean Francois, Virtual private network crossovers based on certificates.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로