CA2438255A1 - Secure encryption key distribution - Google Patents

Secure encryption key distribution Download PDF

Info

Publication number
CA2438255A1
CA2438255A1 CA002438255A CA2438255A CA2438255A1 CA 2438255 A1 CA2438255 A1 CA 2438255A1 CA 002438255 A CA002438255 A CA 002438255A CA 2438255 A CA2438255 A CA 2438255A CA 2438255 A1 CA2438255 A1 CA 2438255A1
Authority
CA
Canada
Prior art keywords
group
key
traffic
encrypted
encrypting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002438255A
Other languages
French (fr)
Other versions
CA2438255C (en
Inventor
Thomas Andrew Hengeveld
Dennis Michael Martinez
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Pspc Canada Systems Inc
Original Assignee
MA Com Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by MA Com Inc filed Critical MA Com Inc
Publication of CA2438255A1 publication Critical patent/CA2438255A1/en
Application granted granted Critical
Publication of CA2438255C publication Critical patent/CA2438255C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics

Abstract

A method for distributing encryption keys for use in communication systems such as trunked radio communication systems. Group traffic keys are encrypted at a key administrat or and passed to a distribution facility for storage and distribution. The distribution facility passes the encrypted group traffic key to communication devices where the group traffic keys are decrypted and used to encrypt/decrypt traffic.

Description

PATENT Docket No. 17838 TITLE: SECURE ENCRYPTION KEY DISTRIBUTION
FIELD OF THE INVENTION
The present invention relates to encrypted communication systems and, more particularly, to the distribution of encryption keys.
BACKGROUND OF THE INVENTION
Communication systems often use data encryption techniques to transfer communication data (i.e., traffic) in a secure manner. Security is provided through the use of encryption keys that are used by communication devices (e.g., mobile radios) to encrypt and decrypt the traffic. A common encryption technique for use in communication systems, especially franked radio communication systems, is a symmetric encryption system (SES) in which the same traffic encryption key is used by a sender to encrypt traffic and by one or more receivers to decrypt the traffic. Typically, a cortunon traffic encryption kE;y is shared by a. group of authorized users (e.g., members of a police or fire department) and is updated periodically to increase security. In operation, updates to group traffic encryption keys (GTKs) are transferred to communication devices of all authorized group members so that they may encrypt/decrypt traffic to/from other group members. To preserve the integrity of an SES communication system, the communication system needs to prevent unauthorized individuals from accessing the GTKs.
FIG. 1 depicts a typical encryption key distribution system for distributing GTKs to enable secure communications between group member communication devices, e.g., the communication devices of a group of authorized users. The distribution system includes a key administrator 102 that generates the GTKs, a key distribution and storage facility 104 for storing and distributing the GTKs, and a plurality of group devices (represented by group member #1 communication device 100a and group member #2 communication device 100b) that use the GTKs to encrypt/decrypt traffic between group member communication devices 100a, b.
Typical encryption key distribution systems are described in US Patent No.
5,528,691 to Rosauer et al., US
Patent No. 5,619,572 to Sowa, and US Patent No. 5,768,380 to Rosauer et al., incorporated fully herein by reference.
In use, the key administrator 102 generates a GTK for use by the group member communication PATENT Docket No. 17838 devices 100a, b to encrypt/decrypt traffic. The key administrator 102 passes th.e current unencrypted GTK to a key distribution and storage facility 104 where it is stored unencrypted. The GTKs is then encrypted using a group encryption key (GEK) and transferred to the individual group member communication devices 100a, b by the key distribution and storage facility 104. The individual group member communication devices 100a, b, using a previously stored GEK identical to the GEK used by the key distribution and storage facility 104 to encrypt the GTK, decrypt the GTK for use in encrypting/decrypting traffic between group devices 100a, b.
The encryption key distribution system described in reference to FIG. 1 is commonly used in the communication systems employed by many private organizations and by public service organizations, such as police, fire, and ambulance squads. The key administrator 102 and the group member communication devices 100a, b are typically secure, i.e., are under the direct control of a particular organization and its associated personnel. Typically, however, multiple groups use a single key distribution and storage facility 104 that is under the control of a third party, e.g., a private corporation. For example, in a communication system fox use by a police department, the police department maintains control over a key administrator 102 that resides on its premises and police officers maintain control over the individual group member communication devices 100x, b. The key distribution and storage facility 104, however, is typically managed by an organization that is not under the direct control of the police department. Since the key distribution and storage facility 104 is under the control of a third party, it is potentially unsecure. Therefore, the potential exists for unauthorized users to gain access to the GTKs stored on the unsecure key distribution and storage facility 104, thereby compromising the integrity of the communication system.
Accordingly, there is a need for secure methods and systems for storing and distributing GTKs. The present invention fulfills this need among others.
SUMMARY OF THE INVENTION
The present invention provides for a method and system for securely distributing GTKs. The aforementioned problem is overcome by encrypting the GTKs at the key administrator and decrypting them only at authorized group member communication devices. The encrypted GTKs are passed from the key administrator to a key distribution and storage facility, stored at the key distribution and storage facility, and distributed from the key distribution and storage facility to authorized group member communication devices.

PATENT Docket No. 17838 The encrypted GTKs are then unencrypted by the authorized group member communication devices for use in encryptingldecrypting traffic between group member communication devices.
Therefore, in potentially unsecure locations, e.g., at a key distribution and storage facility under the control of a third party, the GTKs are encrypted, thereby preventing unauthorized users from gaining access to the GTKs and increasing the integrity of the communication system.
One aspect of the present invention is a method for distributing encryption keys. The distribution method includes encrypting a group traffic key at a key administrator, passing the encrypted gxoup traffic key to a distribution system for storage and distribution, distributing the encrypted group traffic key from the distribution system to at least one communication device, receiving the encrypted group traffic key at one of the at least one communication devices, and decrypting the encrypted group traffic key at the one of the at least one communication devices.
Another aspect of the invention is a system for distributing encryption keys.
The, system includes an encrypted group traffic key generator for encrypting a group traffic key, a distribution system for receiving the encrypted group traffic key from the encrypted group traffic key generatox, the distribution system storing the encrypted group traffic key, and at least one group device for receiving the encrypted group traffic key from the distribution system, the at least one group device capable of decrypting the encrypted group traffic key to obtain the group traffic key.
BRIEF DESCRIPTION OF THE DRAWINGS
Figure 1 is a block diagram of a prior art encryption key distribution system;
Figure 2 is a block diagram of an encryption key distribution system in accordance with the present invention;
Figure 2A is a detailed block diagram of an encryption key distribution system in accordance with an embodiment of the present invention; and Figure 3 is a block diagram of a system architecture for use with multiple groups in accordance with the present invention.
DETAILED DESCRIPTION OF THE Iiv'VENTION

PATENT Docket No. 17838 FIG. 2 is a block diagram of an encryption key distribution system for use in a communication system in accordance with the present invention. Generally, a key administrator 200 generates a group traffic key (GTK) for encrypting/decrypting traffic betv~-een group member communication devices ("group devices") 202a, b and encrypts the GTK using a group encryption key (GEK) that is known or can be derived by the individual group devices 202x, b. The key administrator 200 transfers the encrypted GTK (EGTK) to an encrypted key distribution and storage facility ('°distribution facility") 204 for storage. The distribution facility 204 then transfers the EGTK to the individual group devices 202a, b. The individual group devices 202x, b use the known or derived GEK to decrypt the EGTK to obtain the GTK. The individual group devices 202a, b then use the GTK to encrypt traffic for transmission to and decrypt traffic received from other group devices 202a, b.
The present invention is particularly well suited, although clot exclusively so, for use in public and private radio communication systems such as franked digital radio communication systems. For example, the present invention may be implemented using the existing architecture available in the OpenSky'~ franked radio system available from MIA COM, Inc. of Lowell, MA, USA. An embodiment of the present invention will now be described in detail with reference to FIG. 2A, which depicts the blocks of FIG. 2 in greater detail, with like elements having identical numbers. Two group devices 202a, b are illustrated for descriptive purposes, however, it will be readily apparent to those skilled in the art that essentially any number of group devices may be employed.
Referring to FIG. 2A, the key administrator 200 generates the GTK in a known manner and encrypts the GTK using a group encryption key (GEK) to obtain the EGTK .for storage and distribution by the encrypted key distribution and storage facility 204. In the illustrated embodiment, the GEK is generated by a group encryption key generator 210 based on a group .ID and group password (or pass phrase) combination, which is known by the key administrator and each of the individual group devices 202x, b. Using the GEK, the GTK is encrypted at the key encryption and assembly generator 212 in a known manner to create the EGTK. The GTK
will remain encrypted at all points within the distribution system until it is decrypted at a group device 202a, b for use in encrypting/decrypting traffic between group devices 202a, b.
In a preferred embodiment, the group encryption key generator 220 generates the GEK by combining the group ID and group password and applying a known secure hash, e.g., SHA-l, to the combination.
Preferably, the group ID and the group password axe combined by appending the group password to the group ,f PATENT Docket No. 17838 ID. In the preferred embodiment, the key encryption and assembly generator 212 performs the additional task of appending the group ID to the EGTK to facilitate storage and retrieval of the EGTK at the distribution facility 204.
The EGTK is stored and distributed by the distribution facility 204. In the illustrated embodiment, the S distribution facility 204 includes an encrypted key database 214 and a network controller 216. The encrypted key database 2I4 stores the EGTK and the network controller 216 distributes the EGTK to the individual group devices 202a, b. Preferably, storage and distribution of the EGTK are facilitated through the use of a group ID
appended to the EGTK by the key administrator 200. The distribution of the EGTK by the network controller 216 to the individual group devices 202a, b is described in greater detail below. In addition to distributing the EGTK, it will be readily apparent to those skilled in the art that the network controller 2I6 may perform other functions associated with conventional communication systems such as keeping track of group members, individual group member login IDs and passwords, and group member and individual group member privileges.
In addition, the network controller 216 may manage traffic between group devices 202a, b. In a preferred embodiment, the encrypted key database 214 is a conventional database known to those in the art and the network controller 216 is a conventional controller such as the software implemented Voice Network Interface Controller (VNIC) housed on a SunTM workstation in an OpenSky'~ communication system.
The individual group devices 202a, b receive the EGTK from the distribution facility 204, decrypt the EGTK to obtain the GTK, and use the GTK to encrypt traffic for distribution to and decrypt traffic received from other group devices 202a, b. In the illustrated embodiment, each group device 202a, b includes a communication device 218 having a group encryption key generator 220, a key decryptor/validator 222, and a traffic encryptor/decryptor 224. In a preferred embodiment, the communication devices are mobile radios such as the Mercury Series Mobile Radio (M-801), which is a software-based mobile radio that supports the OpenSky communication protocol in the 800 MHz frequency band.
In the illustrated embodiment, the group encryption key generator 220 generates the GEK based on the group ID and group password known to the communication device 218. Preferably, the group ID and password are supplied to the communication device 218 by an authorized user of the communication device ZIB, e.g., a group member 224. As described above in reference to the group encryption key generator 210 in the key administrator 200, the group encryption key generator 220 may generate the GEK
by combining the group ID
d PATENT Docket No. 17838 and group password and applying a known secure hash to the combination to generate the GEK. Preferably, the group ID and the group password are combined by appending the group password to the group ID.
Using the GEK, the key decryptor/validator 222 decrypts and validates the EGTK
in a known manner to obtain the GTK generated by the key administrator 200. The GTK is then used by a conventional traffic eneryptor/decryptor 226 to encrypt/deerypt traffic between group devices 202a, b.
In a preferred embodiment, the communication device 218 contains a memory (not shown) for storing the EGTK. Thus, the EGTK need only be passed to the communication device 218 when the GTK is updated, thereby increasing key distribution efficiency. Preferably, the EGTK is stored in the memory and only retrieved and decrypted when needed to encrypt/decrypt traffic. Since the encrypted GTK, i.e., the EGTK, is stored, the GTK will remain secure even if the communication device 218 is in the possession of an unauthorized user (assuming that the group password and group ID are unknown and that a group member 224 has not logged into the communication device 218 without logging out subsequently), thereby increasing the integrity of the system.
In a preferred use, an individual group member 224a logs into a communication system by entering into a communication device 218x, e.g., via a keypad, an individual ID and password combination, which is associated with and unique to the individual group member 224a. The communication device 218a passes the individual ID and password to the network controller 216. The network controller 216 verifies the identity of the group member 224a, checks to see if the communication device 218a has the current EGTK for the group member's group, and, if the EGTK is not current, transfers the current EGTKs to the communication device 218a where it is stored locally. Once logged into the communication system, the netwoxk controller 216 monitors the encrypted key database 214 for EGTK entries by the key administrator 200 and transfers to the communication device 218a the current EGTK whenever it is updated by the key administrator 200.
Preferably, when the encrypted key database 214 is updated. with a new EGTK
for a group, the network controller 216 will transfer the EGTK to all communication devices 218 that are logged into the communication system as members of that group. In addition, the network controller 216 tracks when the individual communication devices 218 are logged into the communication system. If the network controller 216 determines that a communication device 218 was not logged into the communication system when the current EGTK for a group was stored in the encrypted key database 214, the network controller 216 will pass the EGTK
to the communication device 218 the next time the communication device 218 logs into the communication j:

PATENT Docket No. 17838 system as members of that group.
In addition to the individual ID and password, the group member 224a enters into the communication device 218a the group ID and group password for the groups) to which the group member 224a belongs, in order to decrypt the corresponding EGTK for that group. When traffic is generated by a first communication device 218a, e.g, communication device #1, for transmission to one or more second communication devices 218b, e.g., communication device #2, the traffic is encrypted by the first coannaunication device 218a. The first communication device 218a encrypts the traffic by decrypting the locally stored EGTK using a GEK generated from the group ID and group password and encrypting the traffic using the resultant GTK. When encrypted traffic is received by the one or more second communication devices 218b, the communication devices 218b decrypt the traffic by decrypting the locally stored EGTK using a GEK
generated from 'the group ID and group password and decrypting the traffic using the resultant GTK
It will be recognized by those skilled in the art that a group member 224 may be a member of a plurality of groups and may enter a plurality of group ID/password combination for each of the plurality of groups. Preferably, when a group member 224 supplies an individual ID and individual password to the communication device 218 to log into the communication system, the network controller 2I6 identifies the groups associated with the group member 224 and updates the corresponding EGTKs as described above. The group member 224 then enters into the communication device 218 a group ID and group password for each group with which the group member 224 wants to communicate to decrypt the EGTK
to enable traffic encryption/decryption using the resultant GTK for communication with those groups as described above.
FIG. 3 depicts an embodiment of a system architecture for distributing GTKs in a multiple group system using a common distribution facility 300 in accordance with the present invention. In the illustrated embodiment, there are two groups, e.g., a police department communisation group and a fire department communication group. Although there are two groups illustrated, it wall be readily apparent that essentially any number of groups may be accommodated.
In the illustrated embodiment, a group A key administrator 302 generates a GEK, e.g., GEK-A, for encrypting/decrypting traffic at a group A communication device 304. The group A communication device 304 is a communication device that supplies the distribution facility 300 with an individual ID and password combination that is identified by the distribution facility 300 as a member of group A. Likewise, a group B key l3 PATENT Docket No. 17838 administrator 306 generates a GEK, e.g., GEK-B, for encrypting/decrypting traffic at a group B communication device 308. The group B communication device 308 is a comanunication device that supplies the distribution facility 300 with an individual ID and password combination that is identified by the distribution facility 300 as a member of group B.
The distribution facility 300 distributes the EGTK-A and EGTK-B to the group A
and group B
communication devices 304, 308, respectively, when they are logged into the communication system as described above. In addition, the distribution facility 300 distributes both the EGTK-A and the EGTK-B to a multiple group communication device, e.g., group A/B communication device 310.
The group A/B
communication device 310 is a communication device that supplies the distribution facility 300 with an individual ID and password combination that is identified by the distribution facility 300 as a member of both group A and group B.
To enable traffic encryption/decryption for communication with other group A
communication devices, the group A communication device 304 is supplied with a group A ID
and password known to group A
members. Likewise, to enable traffic encryption/decryption for communication with other group B
communication devices, the group B communication device 308 is supplied with a group I3 ID arid password known to group B members. Since the group A/B communication device 310 is supplied with the IDs and passwords for both group A and group B, the group A/B communication device is able to encrypt/decrypt traffic for communication with both group A and group B communication devices 304, 308.
Thus, a method and system for securely distributing GTKs is disclosed. The GTKs are encrypted at the key administrator prior to storage at a distribution facility. The GTKs are then distributed to the individual group devices where they are decrypted for use in encrypting/decrypting traffic for that group. By encrypting the GTKs at the key administrator and only encrypting the GTKs at the group devices, the integrity of the communication system is strengthened.
Having thus described a few particular embodiments of the invention, various alterations, modifications, and improvements will readily occur to those skilled in the art. Such alterations, modifications and improvements as are made obvious by this disclosure are intended to be part of this description though not expressly stated herein, and are intended to be within the spirit and scope of the invention. Accordingly, the foregoing description is by way of example only, and not limiting. The invention is limited only as defined in ,, PATENT Docket h,To. 17838 the following claims and equivalents thereto.

Claims (25)

1. A method for distributing encryption keys, said method comprising the steps of:
encrypting a group traffic key at a key administrator;
passing said encrypted group traffic key to a distribution system for storage and distribution; and distributing said encrypted group traffic key from said distribution system to at least one communication device.
2. The method of claim 1, said encrypting step comprising at least the step of:
encrypting said group traffic key based on a group ID and a group password.
3. The method of claim 1, said encrypting step comprising at least the steps of:
generating a group encryption key based on a group ID and a group password;
and encrypting said group traffic key using said group encryption key.
4. The method of claim 3, said encryption step further comprising at least the step of:
appending said group ID to said encrypted group traffic key to facilitate storage and retrieval of said encrypted group traffic key in said distribution step.
5. The method of claim 1, further comprising the steps of:
receiving said encrypted group traffic key at one of said at least one communication devices; and decrypting said encrypted group traffic key at said one of said at least one communication devices.
6. The method of claim 5, said encrypting step comprising at least the step of:
encrypting said group traffic key with a group encryption key.
7. The method of claim 6, said decrypting step comprising at least the step of:
decrypting said group traffic key with said group encryption key.
8. The method of claim 5, said encrypting step comprising at least the steps of:

generating a group encryption key based on a group ID and a group password;
and encrypting said group traffic key using said group encryption key.
9. The method of claim 8, said decrypting step comprising at least the steps of:
generating said group encryption key using said group ID and said password;
and decrypting said group traffic key using said group encryption key.
10. The method of claim 5, further comprising the step of:
encrypting traffic from said one of said at least one communication devices for transmission to another of said at least one communication devices at said one of said at least one communication devices with said group traffic key.
11. The method of claim 5, further comprising the step of:
decrypting traffic received at said one of said at least one communication devices from another of said at least one communication devices with said group traffic key.
12. The method of claim 1, wherein said distribution system is unsecure.
13. The method of claim 1, wherein said key administrator is under the control of a first organization and said distribution system is under the control of a second organization.
14. A method for distributing encryption keys, said method comprising the steps of:
encrypting a group traffic key at a key administrator;
passing said encrypted group traffic key to a distribution system for storage and distribution;
distributing said encrypted group traffic key from said distribution system to at least one communication device;
receiving said encrypted group traffic key at one of said at least one communication devices; and decrypting said encrypted group traffic key at said one of said at least one communication devices.
15. The method of claim 14, said encrypting step comprising at least the step of:
encrypting said group traffic key with a group encryption key.
16. The method of claim 15, said decrypting step comprising at least the step of:
decrypting said group traffic key with said group encryption key.
17. The method of claim 14, said encrypting step comprising at least the steps of:
generating a group encryption key based on a group ID and a group password;
and encrypting said group traffic key using said group encryption key.
18. The method of claim 17, said decrypting step comprising at least the steps of:
generating said group encryption key using said group ID and said password;
and decrypting said group traffic key using said group encryption key.
19. The method of claim 14, further comprising the step of:
encrypting traffic from said one of said at least one communication devices for transmission to another of said at least one communication devices at said one of said at least one communication devices with said group traffic key.
20. The method of claim 14, further comprising the step of:
decrypting traffic received at said one of said at least one communication devices from another of said at least one communication devices with said group traffic key.
21. The method of claim 14, wherein said key administrator is under the control of a first organization and said distribution system is under the control of a second organization.
22. A method for distributing encryption keys, said method comprising the steps of:
receiving an encrypted group traffic key at a distribution system for storage and distribution; and distributing said encrypted group traffic key from said distribution system to at least one communication device.
23. A encryption key distribution system comprising:
an encrypted group traffic key generator for encrypting a group traffic key;
a distribution system for receiving said encrypted group tragic key from said encrypted group traffic key generator, said distribution system storing said encrypted group traffic key; and at least one group device for receiving said encrypted group traffic key from said distribution system, said at least one group device capable of decrypting said encrypted group traffic key to obtain said group traffic key.
24. The system of claim 23, said encrypted group traffic key generator comprising at least:
a first group encryption key generator for generating a group encryption key;
and a key encryption and assembly generator coupled to said first group encryption key generator for encrypting said group traffic key using said group encryption key.
25. The system of claim 24, said at least one group device comprising at least:
a second group encryption key generator for generating said group encryption key; and a key decryptor coupled to said second group encryption key generator for decrypting said encrypted group traffic key using said group encryption key; and a traffic encryptor/decryptor for encrypting/decrypting traffic using said decrypted group traffic key.
CA2438255A 2002-08-27 2003-08-26 Secure encryption key distribution Expired - Lifetime CA2438255C (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/228,747 US7599496B2 (en) 2002-08-27 2002-08-27 Secure encryption key distribution
US10/228,747 2002-08-27

Publications (2)

Publication Number Publication Date
CA2438255A1 true CA2438255A1 (en) 2004-02-27
CA2438255C CA2438255C (en) 2013-05-28

Family

ID=31990360

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2438255A Expired - Lifetime CA2438255C (en) 2002-08-27 2003-08-26 Secure encryption key distribution

Country Status (3)

Country Link
US (1) US7599496B2 (en)
CA (1) CA2438255C (en)
MX (1) MXPA03007737A (en)

Families Citing this family (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7486795B2 (en) * 2002-09-20 2009-02-03 University Of Maryland Method and apparatus for key management in distributed sensor networks
US20060059344A1 (en) * 2004-09-10 2006-03-16 Nokia Corporation Service authentication
GB2418320B (en) * 2004-09-15 2007-09-19 Motorola Inc A communication system and method of call group management therefor
KR100704678B1 (en) 2005-06-10 2007-04-06 한국전자통신연구원 Method for managing group traffic encryption key in wireless portable internet system
US7885412B2 (en) * 2005-09-29 2011-02-08 International Business Machines Corporation Pre-generation of generic session keys for use in communicating within communications environments
GB2431250A (en) * 2005-10-11 2007-04-18 Hewlett Packard Development Co Data transfer system
JP4823717B2 (en) * 2006-02-28 2011-11-24 株式会社日立製作所 Encryption communication system, terminal state management server, encryption communication method, and terminal state management method
US7958368B2 (en) * 2006-07-14 2011-06-07 Microsoft Corporation Password-authenticated groups
US20080049941A1 (en) * 2006-08-24 2008-02-28 Samsung Electronics Co. Ltd. Method for providing personalized broadcasting service in communication system
US8719954B2 (en) 2006-10-11 2014-05-06 Bassilic Technologies Llc Method and system for secure distribution of selected content to be protected on an appliance-specific basis with definable permitted associated usage rights for the selected content
US20080092239A1 (en) 2006-10-11 2008-04-17 David H. Sitrick Method and system for secure distribution of selected content to be protected
US8619982B2 (en) * 2006-10-11 2013-12-31 Bassilic Technologies Llc Method and system for secure distribution of selected content to be protected on an appliance specific basis
JP2009010470A (en) * 2007-06-26 2009-01-15 Toshiba Corp Terminal device, group management server, network communication system, and method for generating encryption key
US8462953B2 (en) * 2007-12-24 2013-06-11 Institute For Information Industry Communication system and method thereof
US8886714B2 (en) 2011-08-08 2014-11-11 Ctera Networks Ltd. Remote access service for cloud-enabled network devices
US9473419B2 (en) 2008-12-22 2016-10-18 Ctera Networks, Ltd. Multi-tenant cloud storage system
US9614924B2 (en) 2008-12-22 2017-04-04 Ctera Networks Ltd. Storage device and method thereof for integrating network attached storage with cloud storage services
US10783121B2 (en) 2008-12-22 2020-09-22 Ctera Networks, Ltd. Techniques for optimizing data flows in hybrid cloud storage systems
US8724812B2 (en) * 2010-12-31 2014-05-13 Motorola Solutions, Inc. Methods for establishing a secure point-to-point call on a trunked network
US8447983B1 (en) 2011-02-01 2013-05-21 Target Brands, Inc. Token exchange
JP5647938B2 (en) * 2011-04-20 2015-01-07 パナソニック株式会社 Transmitting terminal, receiving terminal, and ID numbering device
WO2013113368A1 (en) * 2012-01-31 2013-08-08 Nokia Siemens Networks Oy Encrypting device-to-device messages for a public safety network mobile communication system
WO2014010087A1 (en) * 2012-07-13 2014-01-16 株式会社東芝 Communication control apparatus, communication apparatus and program
US8625805B1 (en) 2012-07-16 2014-01-07 Wickr Inc. Digital security bubble
US10129260B1 (en) 2013-06-25 2018-11-13 Wickr Inc. Mutual privacy management
US9830089B1 (en) 2013-06-25 2017-11-28 Wickr Inc. Digital data sanitization
US10567349B2 (en) 2013-06-25 2020-02-18 Wickr Inc. Secure time-to-live
US9866591B1 (en) 2013-06-25 2018-01-09 Wickr Inc. Enterprise messaging platform
US20150003607A1 (en) * 2013-06-26 2015-01-01 Samsung Electronics Co., Ltd. Secure connection method and apparatus of electronic device
US9698976B1 (en) 2014-02-24 2017-07-04 Wickr Inc. Key management and dynamic perfect forward secrecy
US9584530B1 (en) 2014-06-27 2017-02-28 Wickr Inc. In-band identity verification and man-in-the-middle defense
US9489542B2 (en) 2014-11-12 2016-11-08 Seagate Technology Llc Split-key arrangement in a multi-device storage enclosure
US9654288B1 (en) 2014-12-11 2017-05-16 Wickr Inc. Securing group communications
US10735200B2 (en) * 2015-03-27 2020-08-04 Comcast Cable Communications, Llc Methods and systems for key generation
US9584493B1 (en) 2015-12-18 2017-02-28 Wickr Inc. Decentralized authoritative messaging
US10291607B1 (en) 2016-02-02 2019-05-14 Wickr Inc. Providing real-time events to applications
US9596079B1 (en) 2016-04-14 2017-03-14 Wickr Inc. Secure telecommunications
US9590958B1 (en) 2016-04-14 2017-03-07 Wickr Inc. Secure file transfer
US11010485B1 (en) * 2017-03-02 2021-05-18 Apple Inc. Cloud messaging system
US10778432B2 (en) 2017-11-08 2020-09-15 Wickr Inc. End-to-end encryption during a secure communication session
US10541814B2 (en) 2017-11-08 2020-01-21 Wickr Inc. End-to-end encryption during a secure communication session
US10855440B1 (en) 2017-11-08 2020-12-01 Wickr Inc. Generating new encryption keys during a secure communication session
US11101999B2 (en) 2017-11-08 2021-08-24 Amazon Technologies, Inc. Two-way handshake for key establishment for secure communications
US11093627B2 (en) * 2018-10-31 2021-08-17 L3 Technologies, Inc. Key provisioning
CN109873801B (en) * 2018-12-12 2020-07-24 阿里巴巴集团控股有限公司 Method, device, storage medium and computing equipment for establishing trusted channel between user and trusted computing cluster
CN109861980B (en) 2018-12-29 2020-08-04 阿里巴巴集团控股有限公司 Method, device, storage medium and computing equipment for establishing trusted computing cluster

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4905302A (en) 1987-06-03 1990-02-27 General Electric Company Trunked radio repeater system
US5418854A (en) * 1992-04-28 1995-05-23 Digital Equipment Corporation Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system
US5426700A (en) 1993-08-23 1995-06-20 Pitney Bowes Inc. Method and apparatus for verification of classes of documents
US5619572A (en) 1994-06-16 1997-04-08 Motorola, Inc. Method and apparatus for providing secure communications for a requested call
US5528691A (en) 1994-10-04 1996-06-18 Motorola, Inc. Method for automatically assigning enctyption information to a group of radios
US6002770A (en) 1995-07-28 1999-12-14 Mytec Technologies Inc. Method for secure data transmission between remote stations
US5768380A (en) 1995-09-27 1998-06-16 Motorola, Inc. Method for sending a communication unit parameter to a plurality of communication units
US6085323A (en) * 1996-04-15 2000-07-04 Kabushiki Kaisha Toshiba Information processing system having function of securely protecting confidential information
US6816966B1 (en) 1997-06-30 2004-11-09 Sun Microsystems, Inc. Techniques for securing data flow in internet multicasting
US6226618B1 (en) * 1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system
US6266420B1 (en) * 1998-10-08 2001-07-24 Entrust Technologies Limited Method and apparatus for secure group communications
US6862684B1 (en) 2000-07-28 2005-03-01 Sun Microsystems, Inc. Method and apparatus for securely providing billable multicast data
CA2315933C (en) 2000-08-14 2004-11-30 Ibm Canada Limited-Ibm Canada Limitee Method and system for granting access to information for electronic commerce
DE10138718A1 (en) * 2001-08-07 2003-02-20 Siemens Ag Method for transmitting encryption information to participants in a multicast group
JP2003069547A (en) * 2001-08-29 2003-03-07 Fujitsu Ltd Multicast communication system
US20030149874A1 (en) * 2002-02-06 2003-08-07 Xerox Corporation Systems and methods for authenticating communications in a network medium

Also Published As

Publication number Publication date
US20040054891A1 (en) 2004-03-18
US7599496B2 (en) 2009-10-06
CA2438255C (en) 2013-05-28
MXPA03007737A (en) 2004-11-29

Similar Documents

Publication Publication Date Title
CA2438255C (en) Secure encryption key distribution
US10803194B2 (en) System and a method for management of confidential data
US10715316B2 (en) System and method for delivering information in a communication network using location identity
US7143289B2 (en) System and method for delivering encrypted information in a communication network using location identity and key tables
US8472627B2 (en) System and method for delivering encrypted information in a communication network using location indentity and key tables
US6658114B1 (en) Key management method
US7738660B2 (en) Cryptographic key split binding process and apparatus
US6266420B1 (en) Method and apparatus for secure group communications
US7711120B2 (en) Cryptographic key management
US8755520B2 (en) Apparatus and method for generating a key for broadcast encryption
KR100424786B1 (en) Method and apparatus for generating encrypted signature using hash key
CA2187923C (en) A method for providing blind access to an encryption key
US20020114453A1 (en) System and method for secure cryptographic data transport and storage
US20130073854A1 (en) Data storage incorporating crytpographically enhanced data protection
US7917748B2 (en) Secure group secret distribution
US20050033963A1 (en) Method and system for authentication, data communication, storage and retrieval in a distributed key cryptography system
US11646872B2 (en) Management of access authorization using an immutable ledger
US7315950B1 (en) Method of securely sharing information over public networks using untrusted service providers and tightly controlling client accessibility
US8161565B1 (en) Key release systems, components and methods
KR20210058313A (en) Data access control method and system using attribute-based password for secure and efficient data sharing in cloud environment
JPH09294120A (en) Access control method and system for ciphered shared data
Agarwal et al. A hybrid cryptographic system for dynamic cloud groups with secure sharing of data and proficient revocation of users
Celiktas et al. A Higher Level Security Protocol for Cloud Computing
CN112153072B (en) Computer network information safety control device
GB2531317A (en) Security system

Legal Events

Date Code Title Description
EEER Examination request
MKEX Expiry

Effective date: 20230828