IN2014CN04390A - - Google Patents

Info

Publication number
IN2014CN04390A
IN2014CN04390A IN4390CHN2014A IN2014CN04390A IN 2014CN04390 A IN2014CN04390 A IN 2014CN04390A IN 4390CHN2014 A IN4390CHN2014 A IN 4390CHN2014A IN 2014CN04390 A IN2014CN04390 A IN 2014CN04390A
Authority
IN
India
Application number
Other languages
English (en)
Inventor
Johannes Arnoldus Cornelis Bernsen
Original Assignee
Koninkl Philips Nv
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninkl Philips Nv filed Critical Koninkl Philips Nv
Publication of IN2014CN04390A publication Critical patent/IN2014CN04390A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/601Broadcast encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/606Traitor tracing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
IN4390CHN2014 2011-12-01 2014-06-13 IN2014CN04390A (enExample)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201161565530P 2011-12-01 2011-12-01
US201261622120P 2012-04-10 2012-04-10
PCT/IB2012/056854 WO2013080168A1 (en) 2011-12-01 2012-11-30 Simplified management of group secrets by group members

Publications (1)

Publication Number Publication Date
IN2014CN04390A true IN2014CN04390A (enExample) 2015-09-04

Family

ID=47428785

Family Applications (1)

Application Number Title Priority Date Filing Date
IN4390CHN2014 IN2014CN04390A (enExample) 2011-12-01 2014-06-13

Country Status (8)

Country Link
US (1) US9379889B2 (enExample)
EP (1) EP2786524A1 (enExample)
JP (1) JP6125523B2 (enExample)
CN (1) CN103959705A (enExample)
BR (1) BR112014012831A2 (enExample)
IN (1) IN2014CN04390A (enExample)
RU (1) RU2014126582A (enExample)
WO (1) WO2013080168A1 (enExample)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2601298Y2 (ja) 1993-11-05 1999-11-15 株式会社ウロコ製作所 ベニヤレース用チャック
US9325671B2 (en) * 2014-02-19 2016-04-26 Raytheon Bbn Technologies Corp. System and method for merging encryption data using circular encryption key switching
US9338144B2 (en) 2014-02-19 2016-05-10 Raytheon Bbn Technologies Corp. System and method for operating on streaming encrypted data
US9313181B2 (en) * 2014-02-28 2016-04-12 Raytheon Bbn Technologies Corp. System and method to merge encrypted signals in distributed communication system
US9461974B2 (en) * 2014-02-28 2016-10-04 Raytheon Bbn Technologies Corp. System and method to merge encrypted signals in distributed communication system
US9628450B2 (en) 2014-04-16 2017-04-18 Raytheon Bbn Technologies Corp. System and method for merging encryption data without sharing a private key
US10007242B2 (en) * 2015-06-11 2018-06-26 International Business Machines Corporation Mechanism for controlling subset of devices
US10833870B2 (en) 2017-01-06 2020-11-10 Microsoft Technology Licensing, Llc Cryptographic operations in an isolated collection
US10341100B2 (en) * 2017-01-06 2019-07-02 Microsoft Technology Licensing, Llc Partially encrypted conversations via keys on member change
US11025596B1 (en) * 2017-03-02 2021-06-01 Apple Inc. Cloud messaging system
CN106953727B (zh) * 2017-03-13 2019-09-10 南京邮电大学 D2d通信中基于无证书的组安全认证方法
US10922653B2 (en) * 2017-03-29 2021-02-16 Microsoft Technology Licensing, Llc Automatic group creation based on organization hierarchy
US10839060B1 (en) * 2019-08-27 2020-11-17 Capital One Services, Llc Techniques for multi-voice speech recognition commands
CN116547943A (zh) 2020-12-04 2023-08-04 三星电子株式会社 用于管理安全密钥的方法和设备

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
IL106796A (en) * 1993-08-25 1997-11-20 Algorithmic Res Ltd Broadcast encryption
JP2002300149A (ja) * 2001-04-02 2002-10-11 Matsushita Electric Ind Co Ltd 同報配信用鍵管理システム
JP2003273857A (ja) * 2002-03-14 2003-09-26 Matsushita Electric Ind Co Ltd 共通鍵配布装置及び共通鍵配布方法並びに共通鍵配布システム
US7751569B2 (en) * 2002-11-19 2010-07-06 Oracle America, Inc. Group admission control apparatus and methods
US20050111668A1 (en) * 2003-11-25 2005-05-26 Amit Raikar Dynamic source authentication and encryption cryptographic scheme for a group-based secure communication environment
CN101164071A (zh) * 2005-04-08 2008-04-16 韩国电子通信研究院 域管理方法及基于用户和设备的域系统的域上下文
RU2596597C2 (ru) * 2011-09-20 2016-09-10 Конинклейке Филипс Н.В. Управление секретами группы членами группы

Also Published As

Publication number Publication date
JP6125523B2 (ja) 2017-05-10
US20140334624A1 (en) 2014-11-13
RU2014126582A (ru) 2016-02-10
US9379889B2 (en) 2016-06-28
BR112014012831A2 (pt) 2017-06-13
JP2015500585A (ja) 2015-01-05
WO2013080168A1 (en) 2013-06-06
CN103959705A (zh) 2014-07-30
EP2786524A1 (en) 2014-10-08

Similar Documents

Publication Publication Date Title
BR112013031251A2 (enExample)
BR112013027245A2 (enExample)
BR112013024383A2 (enExample)
BR112013023185A2 (enExample)
BR112013026905A2 (enExample)
BR112013027830A2 (enExample)
BR112013026744A2 (enExample)
BR112013023927A2 (enExample)
BR112013027452A2 (enExample)
BR112013024365A2 (enExample)
BR112013028733A2 (enExample)
BR112013027121A2 (enExample)
BR112013024588A2 (enExample)
BR112013031556A2 (enExample)
BR112013026790A2 (enExample)
BR112013032366A2 (enExample)
BR112013032380A2 (enExample)
BR112013032377A2 (enExample)
BR112013027836A2 (enExample)
BR112013018949A2 (enExample)
BR112013026895A2 (enExample)
BR112013027761A2 (enExample)
BR112013021637A2 (enExample)
BR112013023266A2 (enExample)
BR112013032392A2 (enExample)