Method and system for changing security information in a computer network
First Claim
Patent Images
1. A method of changing encryption information in a computer network, the method including:
- providing at least first cryptographic information and second cryptographic information; and
defining a first validity period for the first cryptographic information and a second validity period for the second cryptographic information wherein the first and second validity periods overlap.
11 Assignments
0 Petitions
Accused Products
Abstract
A method of, and system for, changing encryption information in a computer network is provided. The method includes providing at least first cryptographic information and second cryptographic information. A first validity period is provided for the first cryptographic information and a second validity period is provided for the second cryptographic information wherein the first and second validity periods overlap.
196 Citations
48 Claims
-
1. A method of changing encryption information in a computer network, the method including:
-
providing at least first cryptographic information and second cryptographic information; and
defining a first validity period for the first cryptographic information and a second validity period for the second cryptographic information wherein the first and second validity periods overlap. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of processing encrypted data in a computer network, the method including:
-
receiving the encrypted data from a user device, the encrypted data being encrypted using one of first and second encryption information, the first encryption information being valid for a first validity period and the second encryption information being valid for a second validity period;
identifying which one of the first and the second encryption information has been used to encrypt the encrypted data thereby to identify associated decryption information; and
decrypting the encrypted data with the associated decryption information if the encryption information is within an associated validity period. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A method of changing security information in a computer network, the method including:
-
providing at least first security information and second security information; and
defining a first validity period for the first security information and a second validity period for the second security information wherein the first and second validity periods overlap. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
-
21. A method of processing data in a computer network, the method including:
-
receiving data from a user device, the data being secured using one of first and second security information;
identifying which one of the first and the second security information secures the data;
determining if the identified security information that secures the data is within a validity period associated with the security information; and
processing the data with the identified security information when it is within its associated validity period. - View Dependent Claims (22)
-
-
23. A machine-readable medium embodying a sequence of instructions that, when executed by the machine, cause the machine to:
-
provide at least first cryptographic information and second cryptographic information; and
define a first validity period for the first cryptographic information and a second validity period for the second cryptographic information wherein the first and second validity periods overlap. - View Dependent Claims (24, 25, 26, 27, 28)
-
-
29. A machine-readable medium embodying a sequence of instructions that, when executed by the machine cause the machine to:
-
receive encrypted data from a user device, the encrypted data being encrypted using one of first and second encryption information, the first encryption information being valid for a first validity period and the second encryption information being valid for a second validity period;
identify which one of the first and the second encryption information has been used to encrypt the encrypted data thereby to identify associated decryption information; and
decrypt the encrypted data with the associated decryption information if the encryption information is within an associated validity period. - View Dependent Claims (30, 31, 32, 33, 34)
-
-
35. A machine-readable medium embodying a sequence of instructions that, when executed by the machine cause the machine to:
-
provide at least first security information and second security information; and
define a first validity period for the first security information and a second validity period for the second security information wherein the first and second validity periods overlap. - View Dependent Claims (36, 37, 38, 39, 40, 41, 42)
-
-
43. A machine-readable medium embodying a sequence of instructions that, when executed by the machine cause the machine to:
-
receive data from a user device, the data being secured using one of first and second security information;
identify which one of the first and the second security information secures the data;
determine if the identified security information that secures the data is within a validity period associated with the security information; and
process the data with the identified security information when it is within its associated validity period. - View Dependent Claims (44)
-
-
45. A computer system which includes a server to:
-
provide at least first cryptographic information and second cryptographic information; and
define a first validity period for the first cryptographic information and a second validity period for the second cryptographic information wherein the first and second validity periods overlap. - View Dependent Claims (46)
-
-
47. A computer system which includes a server to:
-
receive encrypted data from a user device, the encrypted data being encrypted using one of first and second encryption information, the first encryption information being valid for a first validity period and the second information being valid for a second validity period;
identify which one of the first and the second encryption information has been used to encrypt the encrypted data thereby to identify associated decryption information; and
decrypt the encrypted data with the associated decryption information if the encryption information is within an associated validity period.
-
-
48. A computer system including:
-
means for receiving encrypted data from a user device, the encrypted data being encrypted using one of first and second encryption information, the first encryption information being valid for a first validity period and the second information being valid for a second validity period;
means for identifying which one of the first and the second encryption information has been used to encrypt the encrypted data thereby to identify associated decryption information; and
means for decrypting the encrypted data with the associated decryption information if the encryption information is within an associated validity period.
-
Specification