×

Method and system for changing security information in a computer network

  • US 7,961,884 B2
  • Filed: 08/13/2002
  • Issued: 06/14/2011
  • Est. Priority Date: 08/13/2002
  • Status: Active Grant
First Claim
Patent Images

1. A method of changing encryption information in a computer network, the method comprising:

  • generating at least first cryptographic key information and second cryptographic key information configured for being utilized for network access, the first cryptographic key information including a first encryption key and a first identifier and the second cryptographic key information including a second encryption key and a second identifier, wherein the first and second identifiers identify the first and second cryptographic keys respectively;

    determining a first validity period for the first cryptographic key information, a second validity period for the second cryptographic key information, an expiry date for the first validity period, and an expiry date for the second validity period, wherein the expiry date of the first validity period precedes the expiry date of the second validity period so that the first and second validity periods overlap in time;

    receiving, from a user device, encrypted data and one of the first and second identifiers;

    identifying which one of the first and the second encryption keys has been used to encrypt the data, wherein the identifying is based on which of the first and second identifiers was received along with the encrypted; and

    updating the first encryption key on the user device via the computer network with the second encryption key after the user device accesses the computer network using the first encryption key during an overlap period of the first and the second validity periods.

View all claims
  • 11 Assignments
Timeline View
Assignment View
    ×
    ×