A secure communications system (100, FIG. 1) with a compromised communications node can quickly recover from the compromised condition by sending re-keying messages using a key encryption key hierarchy (200, FIG. 2). Each communications node (330, FIG. 3) includes a memory (300, FIG. 3) with a list of tier-group specific key encryption keys, and whenever a message arrives that is encrypted with a key encryption key in the list, the communications node decrypts the message. When the message includes a new traffic encryption key, the communications node has been re-keyed. Key encryption keys are managed hierarchically such that many communications nodes can be re-keyed with very few broadcast messages, thereby saving communications resources.

 
Web www.patentalert.com

< Arranging authentication and ciphering in mobile communication system

< System and method for generation and use of asymmetric crypto-keys each having a public portion and multiple private portions

> Communication system, authentication communication device, control apparatus, and communication method

> Method and mechanism for vending digital content

~ 00271