WO2008068018A3 - Method for the hierarchical management of access rights - Google Patents
Method for the hierarchical management of access rights Download PDFInfo
- Publication number
- WO2008068018A3 WO2008068018A3 PCT/EP2007/010602 EP2007010602W WO2008068018A3 WO 2008068018 A3 WO2008068018 A3 WO 2008068018A3 EP 2007010602 W EP2007010602 W EP 2007010602W WO 2008068018 A3 WO2008068018 A3 WO 2008068018A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- access rights
- node
- hierarchical management
- key
- level
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
- H04L9/0836—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
Disclosed is a method for hierarchically managing access rights. In said method, a key (12) is assigned to a node (3) of a tree-type hierarchical structure (1), said key (12) granting a user (8, 9) of a node (3) access to a level of the structure (1) that adjoins the node (3). In order to simplify management when a key (12) is compromised, the level is higher-ranking than the node (3) within the structure (1).
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE200610057587 DE102006057587A1 (en) | 2006-12-06 | 2006-12-06 | Method for encrypting data and a suitable system for this |
DE102006057587.3 | 2006-12-06 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2008068018A2 WO2008068018A2 (en) | 2008-06-12 |
WO2008068018A3 true WO2008068018A3 (en) | 2008-07-24 |
Family
ID=39363087
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2007/010602 WO2008068018A2 (en) | 2006-12-06 | 2007-12-06 | Method for the hierarchical management of access rights |
Country Status (2)
Country | Link |
---|---|
DE (1) | DE102006057587A1 (en) |
WO (1) | WO2008068018A2 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110233723B (en) * | 2019-04-28 | 2023-02-14 | 新大陆(福建)公共服务有限公司 | Secondary key management method and security chip |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4969188A (en) * | 1987-02-17 | 1990-11-06 | Gretag Aktiengesellschaft | Process and apparatus for the protection of secret elements in a network of encrypting devices with open key management |
JP4432350B2 (en) * | 2003-04-18 | 2010-03-17 | ソニー株式会社 | Data processing method, program thereof, device thereof and receiving device |
JP4239747B2 (en) * | 2003-08-07 | 2009-03-18 | ソニー株式会社 | Information processing apparatus, content information management method, and computer program |
JP4606885B2 (en) * | 2005-01-18 | 2011-01-05 | Kddi株式会社 | Key distribution system, key management server, and key distribution method |
-
2006
- 2006-12-06 DE DE200610057587 patent/DE102006057587A1/en not_active Withdrawn
-
2007
- 2007-12-06 WO PCT/EP2007/010602 patent/WO2008068018A2/en active Application Filing
Non-Patent Citations (3)
Title |
---|
CHUNG KEI WONG ET AL: "SECURE GROUP COMMUNICATIONS USING KEY GRAPHS", PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON COMMUNITYNETWORKING, no. TR-97-23, 1 November 1998 (1998-11-01), pages 1A,01 - 27, XP002931669 * |
RAFAELI S; HUTCHISON D: "A survey of key management for secure group communication", ACM COMPUTING SURVEYS, vol. 35, no. 3, September 2003 (2003-09-01), Lancaster University, UK, pages 309 - 329, XP002481548, ISSN: 0360-0300 * |
WALLNER ET AL: "Key Management for Multicast: Issues and Architectures", NETWORK WORKING GROUP REQUEST FOR COMMENTS, no. rfc 2627, 1 June 1999 (1999-06-01), XP002340432 * |
Also Published As
Publication number | Publication date |
---|---|
WO2008068018A2 (en) | 2008-06-12 |
DE102006057587A1 (en) | 2008-06-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2007105098A3 (en) | System and method for providing hiearchical role-based access control | |
WO2007149850A3 (en) | Hierarchical deterministic pairwise key predistribution scheme | |
WO2009155473A3 (en) | Information rights management | |
WO2007035714A3 (en) | Method and system for preventing unsecure memory accesses | |
GB2413045B (en) | Key-configured topology with connection management | |
WO2008078307A3 (en) | Highly available cryptographic key storage (hacks) | |
BRPI0506011A (en) | data access and layout | |
WO2006102630A3 (en) | Systems and methods of network operation and information processing, including engaging users of a public-access network | |
AU2003273824A1 (en) | Methods and systems for data moving using locks | |
WO2005109212A3 (en) | Hierarchical systems providing unified of storage information | |
WO2007018919A3 (en) | Dynamically balancing user experiences in a multi-user computing system | |
SE0003746D0 (en) | A computer system | |
TW200951715A (en) | Memory system | |
TW200627274A (en) | Management and use of data in a computer-generated document | |
EP1942429A3 (en) | Digital rights management method for terminal | |
WO2003081467A3 (en) | Synchronizing users on shared data with locks | |
WO2004097630A3 (en) | Managing access to objects of a computing environment | |
WO2006054988A3 (en) | Method, system, and device for license-centric content consumption | |
WO2009008003A3 (en) | Method and system for restricting access of one or more users to a service | |
WO2009067499A3 (en) | Statistical counting for memory hierarchy optimization | |
EP1847066A4 (en) | Key management method using hierarchical node topology, and method of registering and deregistering user using the same | |
TW200700991A (en) | Control structure for versatile content control and method using structure | |
JP2002344486A5 (en) | ||
MX2008001860A (en) | Unified storage security model. | |
WO2008068018A3 (en) | Method for the hierarchical management of access rights |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07856407 Country of ref document: EP Kind code of ref document: A2 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 07856407 Country of ref document: EP Kind code of ref document: A2 |