[go: up one dir, main page]

AU2002323169A1 - Method and system for changing security information in a computer network - Google Patents

Method and system for changing security information in a computer network

Info

Publication number
AU2002323169A1
AU2002323169A1 AU2002323169A AU2002323169A AU2002323169A1 AU 2002323169 A1 AU2002323169 A1 AU 2002323169A1 AU 2002323169 A AU2002323169 A AU 2002323169A AU 2002323169 A AU2002323169 A AU 2002323169A AU 2002323169 A1 AU2002323169 A1 AU 2002323169A1
Authority
AU
Australia
Prior art keywords
computer network
security information
changing security
changing
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2002323169A
Inventor
Jeff Steven Edgett
Singam Sunder
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
iPass Inc
Original Assignee
iPass Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US10/118,380 external-priority patent/US7469341B2/en
Priority claimed from US10/218,961 external-priority patent/US7961884B2/en
Application filed by iPass Inc filed Critical iPass Inc
Publication of AU2002323169A1 publication Critical patent/AU2002323169A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/14Payment architectures specially adapted for billing systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2115Third party
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Development Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • Computer And Data Communications (AREA)
AU2002323169A 2002-04-05 2002-08-14 Method and system for changing security information in a computer network Abandoned AU2002323169A1 (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US10/118,380 US7469341B2 (en) 2001-04-18 2002-04-05 Method and system for associating a plurality of transaction data records generated in a service access system
US10/118,380 2002-04-05
US10/218,961 2002-08-13
US10/218,961 US7961884B2 (en) 2002-08-13 2002-08-13 Method and system for changing security information in a computer network
PCT/US2002/025996 WO2003088558A1 (en) 2002-04-05 2002-08-14 Method and system for changing security information in a computer network

Publications (1)

Publication Number Publication Date
AU2002323169A1 true AU2002323169A1 (en) 2003-10-27

Family

ID=29253944

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2002323169A Abandoned AU2002323169A1 (en) 2002-04-05 2002-08-14 Method and system for changing security information in a computer network

Country Status (4)

Country Link
EP (1) EP1493241A4 (en)
JP (1) JP2005522937A (en)
AU (1) AU2002323169A1 (en)
WO (1) WO2003088558A1 (en)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1886928B (en) 2003-12-26 2010-04-28 三菱电机株式会社 Authenticated device, authentication device, and authentication method
KR100704675B1 (en) * 2005-03-09 2007-04-06 한국전자통신연구원 Authentication Method and Related Key Generation Method for Wireless Mobile Internet System
US20060236098A1 (en) 2005-03-31 2006-10-19 Alexander Gantman Multisigning - a protocol for robust multiple party digital signatures
KR100966412B1 (en) * 2005-03-31 2010-06-28 콸콤 인코포레이티드 Multi-Signature-Protocol for robust multi-party digital signatures
WO2006107201A1 (en) * 2005-04-08 2006-10-12 Delence B.V. Method and system for generating passwords
NL1028721C2 (en) * 2005-04-08 2006-10-10 Delence B V Code generating method for computer password, involves adjusting encoding algorithm and operation and functioning of generator, obtaining and coding password based on another password for obtaining code using generator
KR100704627B1 (en) * 2005-04-25 2007-04-09 삼성전자주식회사 Security service provision device and method
FR2892584A1 (en) * 2005-10-26 2007-04-27 France Telecom METHOD FOR RENEWING CRYPTOGRAPHIC KEYS, METHOD FOR OBTAINING A PUBLIC KEY, AND KEY MANAGEMENT DEVICE
JP4629602B2 (en) * 2006-03-24 2011-02-09 日本電信電話株式会社 Public key encryption communication system, public key encryption communication method, client terminal, and client program
US7818264B2 (en) * 2006-06-19 2010-10-19 Visa U.S.A. Inc. Track data encryption
JP5153284B2 (en) 2007-10-05 2013-02-27 キヤノン株式会社 Information processing apparatus, authentication method, and computer program
US8767964B2 (en) * 2008-03-26 2014-07-01 International Business Machines Corporation Secure communications in computer cluster systems
JP5272637B2 (en) * 2008-10-14 2013-08-28 ソニー株式会社 Information processing apparatus, encryption switching method, and program
TWI451742B (en) * 2011-04-14 2014-09-01 Chunghwa Telecom Co Ltd Secure login method
JP5460832B2 (en) * 2012-11-29 2014-04-02 キヤノン株式会社 Information processing apparatus, authentication method, and computer program
JP6340273B2 (en) * 2014-07-07 2018-06-06 株式会社総合車両製作所 Authentication system
JP7400868B2 (en) * 2022-05-12 2023-12-19 大日本印刷株式会社 Electronic information storage medium, online transaction approval request method, and program

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6367013B1 (en) * 1995-01-17 2002-04-02 Eoriginal Inc. System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents
JPH11340966A (en) * 1998-05-27 1999-12-10 Matsushita Electric Ind Co Ltd Communication system and method using key
EP1121780A4 (en) * 1998-10-23 2003-08-13 L 3 Comm Corp Apparatus and methods for managing key material in heterogeneous cryptographic assets
FR2787264B1 (en) * 1998-12-15 2001-11-02 Bull Sa METHOD FOR CREATING AND MANAGING AT LEAST ONE CRYPTOGRAPHIC KEY AND SYSTEM FOR IMPLEMENTING IT
GB2357407A (en) * 1999-12-17 2001-06-20 Int Computers Ltd Cryptographic key replacement using key lifetimes

Also Published As

Publication number Publication date
JP2005522937A (en) 2005-07-28
EP1493241A4 (en) 2009-08-19
EP1493241A1 (en) 2005-01-05
WO2003088558A1 (en) 2003-10-23

Similar Documents

Publication Publication Date Title
AU2003234456A1 (en) System and method for monitoring state information in a network
AU2003220114A1 (en) System and method for delivering data in a network
AU2003202356A1 (en) Method and system for managing resources in a data center
AU2003274672A1 (en) A method and system for managing confidential information
AU2002357142A1 (en) Method and system for sharing information with users in a network
AU2003263908A1 (en) System and method for data management
AU2003239555A1 (en) System and method for providing data communication in a device network
WO2005052829A8 (en) A transaction management system and method
AU2003221785A1 (en) Method and system for securely communicating data in a communications network
AU2003299671A1 (en) System, method and computer program product for sharing information in a distributed framework
AU2003282749A1 (en) Method and system for facilitating data access and management on a secure token
AU2003252145A1 (en) System and method for providing information in a particular format
AU2003276547A1 (en) Method and system for handling connection information in a communication network
AU2003208940A1 (en) Framework for maintaining information security in computer networks
AU2003259194A1 (en) System and method for validating security access across a network layer and a local file layer
AU2003248367A1 (en) A method and distributed rating system for determining rating data in a charging system
AU2003299941A1 (en) Method and apparatus for communicating information in a global distributed network
AU2003226073A1 (en) Data exchange method and system
AU2003259313A1 (en) Method and system for delivering behavior modification information over a network
AU2003280256A1 (en) Intelligent data management system and method
AU2002323169A1 (en) Method and system for changing security information in a computer network
AU2002359879A1 (en) Method and apparatus for improved security in a data processor
AU2003224653A1 (en) Method and system for information management and distribution
AU2002310053A1 (en) System and method for maintaining object data in a distributed object system
AU2003265675A1 (en) System and method for medium access control in a wireless network

Legal Events

Date Code Title Description
MK6 Application lapsed section 142(2)(f)/reg. 8.3(3) - pct applic. not entering national phase