Claims
- 1. A method of changing encryption information in a computer network, the method including:
providing at least first cryptographic information and second cryptographic information; and defining a first validity period for the first cryptographic information and a second validity period for the second cryptographic information wherein the first and second validity periods overlap.
- 2. The method of claim 1, which includes providing the first validity period with an expiry date that precedes an expiry date of the second validity period so that the first and second validity periods overlap in time.
- 3. The method of claim 1, which includes providing the first cryptographic information with a first identifier and second cryptographic information with a second identifier thereby to identify the first and second cryptographic information respectively.
- 4. The method of claim 1, which includes providing the first cryptographic information in the form of a first private/public key pair and the second cryptographic information in the form of a second private/public key pair.
- 5. The method of claim 1, which includes providing the first cryptographic information in the form of a first cryptographic algorithm and the second cryptographic information in the form of a second cryptographic algorithm.
- 6. The method of claim 1, wherein the first and the second cryptographic information includes first encryption information provided on a user device, the method including updating the first encryption information on the user device via the computer network with second encryption information when the user device accesses the computer network using the first encryption information.
- 7. A method of processing encrypted data in a computer network, the method including:
receiving the encrypted data from a user device, the encrypted data being encrypted using one of first and second encryption information, the first encryption information being valid for a first validity period and the second encryption information being valid for a second validity period; identifying which one of the first and the second encryption information has been used to encrypt the encrypted data thereby to identify associated decryption information; and decrypting the encrypted data with the associated decryption information if the encryption information is within an associated validity period.
- 8. The method of claim 7, wherein the first and second validity periods overlap and the first validity period is prior in time relative to the second validity period.
- 9. The method of claim 7, which includes identifying the first encryption information from a first identifier and the second encryption information from a second identifier.
- 10. The method of claim 9, wherein the first identifier is associated with a first private/public key pair and the second identifier is associated with a second private/public key pair.
- 11. The method of claim 9, wherein the first identifier is associated with a first encryption algorithm and the second identifier is associated with a second encryption algorithm.
- 12. The method of claim 7, wherein the encrypted data is user authentication data for authenticating use of the computer network by the user device, the first and the second encryption information being provided on the user device, the method including:
identifying when the first encryption information has been used to encrypt the authentication data; decrypting the encrypted data with decryption information associated with the first encryption information; and updating the first encryption information on the user device via the computer network with the second encryption information.
- 13. A method of changing security information in a computer network, the method including:
providing at least first security information and second security information; and defining a first validity period for the first security information and a second validity period for the second security information wherein the first and second validity periods overlap.
- 14. The method of claim 13, which includes providing the first validity period with an expiry date that precedes an expiry date of the second validity period so that the first and second validity periods overlap in time.
- 15. The method of claim 13, which includes providing the first and second security information in the form of first and second cryptographic information, the first cryptographic information being provided with a first identifier and the second cryptographic information being provided with a second identifier thereby to identify the first and second cryptographic information respectively.
- 16. The method of claim 15, which includes providing the first cryptographic information in the form of a first private/public key pair and the second cryptographic information in the form of a second private/public key pair.
- 17. The method of claim 15, which includes providing the first cryptographic information in the form of a first cryptographic algorithm and the second security information in the form of a second cryptographic algorithm.
- 18. The method of claim 13, which includes providing the first and the second security information in the form of first and second user passwords.
- 19. The method of claim 18, which includes providing a plurality of passwords with validity periods that overlap.
- 20. The method of claim 19, which includes providing each validity period with a different expiry date so that the validity periods overlap in time.
- 21. A method of processing data in a computer network, the method including:
receiving data from a user device, the data being secured using one of first and second security information; identifying which one of the first and the second security information secures the data; determining if the identified security information that secures the data is within a validity period associated with the security information; and processing the data with the identified security information when it is within its associated validity period.
- 22. The method of claim 21, wherein the security information is one of a password, an encryption algorithm, and an encryption key.
- 23. A machine-readable medium embodying a sequence of instructions that, when executed by the machine, cause the machine to:
provide at least first cryptographic information and second cryptographic information; and define a first validity period for the first cryptographic information and a second validity period for the second cryptographic information wherein the first and second validity periods overlap.
- 24. The machine-readable medium of claim 23, wherein the first validity period is provided with an expiry date that precedes an expiry date of the second validity period so that the first and second validity periods overlap in time.
- 25. The machine-readable medium of claim 23, wherein the first cryptographic information is provided with a first identifier and the second cryptographic information is provided with a second identifier thereby to identify the first and second cryptographic information respectively.
- 26. The machine-readable medium of claim 23, wherein the first cryptographic information is in the form of a first private/public key pair and the second cryptographic information is in the form of a second private/public key pair.
- 27. The machine-readable medium of claim 23, wherein the first cryptographic information is in the form of a first cryptographic algorithm and the second cryptographic information is in the form of a second cryptographic algorithm.
- 28. The machine-readable medium of claim 23, wherein the first and the second cryptographic information includes first encryption information provided on a user device, and the machine-readable medium updates the first encryption information on the user device via the computer network with second encryption information when the user device access the computer network using the first encryption information.
- 29. A machine-readable medium embodying a sequence of instructions that, when executed by the machine cause the machine to:
receive encrypted data from a user device, the encrypted data being encrypted using one of first and second encryption information, the first encryption information being valid for a first validity period and the second encryption information being valid for a second validity period; identify which one of the first and the second encryption information has been used to encrypt the encrypted data thereby to identify associated decryption information; and decrypt the encrypted data with the associated decryption information if the encryption information is within an associated validity period.
- 30. The machine-readable medium of claim 29, wherein the first and second validity periods overlap and the first validity period is prior in time relative to the second validity period.
- 31. The machine-readable medium of claim 29, wherein the first encryption information is identified from a first identifier and the second encryption information is identified from a second identifier.
- 32. The machine-readable medium of claim 31, wherein the first identifier is associated with a first private/public key pair and the second identifier is associated with a second private/public key pair.
- 33. The machine-readable medium of claim 31, wherein the first identifier is associated with a first encryption algorithm and the second identifier is associated with a second encryption algorithm.
- 34. The machine-readable medium of claim 29, wherein the encrypted data is user authentication data for authenticating use of the computer network by the user device, the first and the second encryption information being provided on the user device, and the machine-readable medium:
identifies when the first encryption information has been used to encrypt the authentication data; decrypts the encrypted data with decryption information associated with the first encryption information; and updated the first encryption information on the user device via the computer network with the second encryption information.
- 35. A machine-readable medium embodying a sequence of instructions that, when executed by the machine cause the machine to:
provide at least first security information and second security information; and define a first validity period for the first security information and a second validity period for the second security information wherein the first and second validity periods overlap.
- 36. The machine-readable medium of claim 35, wherein the first validity period is provided with an expiry date that precedes an expiry date of the second validity period so that the first and second validity periods overlap in time.
- 37. The machine-readable medium of claim 35, wherein the first and second security information is provided in the form of first and second cryptographic information, the first cryptographic information being provided with a first identifier and the second cryptographic information being provided with a second identifier thereby to identify the first and second cryptographic information respectively.
- 38. The machine-readable medium of claim 37, wherein the first cryptographic information is in the form of a first private/public key pair and the second cryptographic information is in the form of a second private/public key pair.
- 39. The machine-readable medium of claim 37, wherein the first cryptographic information is in the form of a first cryptographic algorithm and the second security information is in the form of a second cryptographic algorithm.
- 40. The machine-readable medium of claim 37, wherein the first and second security information is in the form of first and second user passwords.
- 41. The machine-readable medium of claim 40, wherein a plurality of passwords is provided with validity periods that overlap.
- 42. The machine-readable medium of claim 41, wherein each validity period is provided with a different expiry date so that the validity periods overlap in time.
- 43. A machine-readable medium embodying a sequence of instructions that, when executed by the machine cause the machine to:
receive data from a user device, the data being secured using one of first and second security information; identify which one of the first and the second security information secures the data; determine if the identified security information that secures the data is within a validity period associated with the security information; and process the data with the identified security information when it is within its associated validity period.
- 44. The machine-readable medium of claim 43, wherein the security information is one of a password, an encryption algorithm, and an encryption key.
- 45. A computer system which includes a server to:
provide at least first cryptographic information and second cryptographic information; and define a first validity period for the first cryptographic information and a second validity period for the second cryptographic information wherein the first and second validity periods overlap.
- 46. The system of claim 45, wherein the first validity period is provided with an expiry date that precedes an expiry date of the second validity period so that the first and second validity periods overlap in time.
- 47. A computer system which includes a server to:
receive encrypted data from a user device, the encrypted data being encrypted using one of first and second encryption information, the first encryption information being valid for a first validity period and the second information being valid for a second validity period; identify which one of the first and the second encryption information has been used to encrypt the encrypted data thereby to identify associated decryption information; and decrypt the encrypted data with the associated decryption information if the encryption information is within an associated validity period.
- 48. A computer system including:
means for receiving encrypted data from a user device, the encrypted data being encrypted using one of first and second encryption information, the first encryption information being valid for a first validity period and the second information being valid for a second validity period; means for identifying which one of the first and the second encryption information has been used to encrypt the encrypted data thereby to identify associated decryption information; and means for decrypting the encrypted data with the associated decryption information if the encryption information is within an associated validity period.
Parent Case Info
[0001] The present application claims the benefit of the filing date of U.S. patent application Ser. No. 10/118,380 entitled “METHOD AND SYSTEM FOR ASSOCIATING A PLURALITY OF TRANSACTION DATA RECORDS GENERATED IN A SERVICE ACCESS SYSTEM” filed Apr. 5, 2002.