Method for securing an interaction between nodes and related nodes
First Claim
1. A method for securing an interaction between a first node and a second node, wherein a security algorithm belonging to both a first set of security algorithms held by the first node and a second set of security algorithms held by a third node is selected to secure the interaction between the first and second nodes, the selection of said security algorithm taking account of capacities of both the first and third nodes.
3 Assignments
0 Petitions
Accused Products
Abstract
The invention proposes a method for securing an interaction between a first node and a second node, wherein a security algorithm belonging to both a first set of security algorithms held by the first node and a second set of security algorithms held by a third node is selected to secure the interaction between the first and second nodes, the selection of said security algorithm taking account of capacities of both the first and third nodes.
-
Citations
20 Claims
- 1. A method for securing an interaction between a first node and a second node, wherein a security algorithm belonging to both a first set of security algorithms held by the first node and a second set of security algorithms held by a third node is selected to secure the interaction between the first and second nodes, the selection of said security algorithm taking account of capacities of both the first and third nodes.
-
17. A system comprising:
-
a first node holding a first set of security algorithms, a second node and a third node holding a second set of security algorithms; and means for selecting a security algorithm belonging to both the first and second sets of security algorithms to secure the interaction between the first and second nodes, said means taking account of capacities of both the first and third nodes.
-
-
18. A node arranged for interacting with a first other node in a secured manner, said node comprising:
-
memory means for holding a set of security algorithms; means for receiving an indication of capacities of a second other node; means for selecting at least one security algorithm belonging to said set of security algorithms to secure an interaction between said node and the first other node, said means taking account of said indication of capacities of the second other node as well as of capacities of said node.
-
-
19. A node arranged for interacting with another node in a secured manner, said node comprising:
-
memory means for holding a set of security algorithms; means for transmitting an indication of capacities of said node to the other node; means for receiving an indication of security algorithms from the other node means for selecting one of the security algorithms indicated to the reception means to secure an interaction between said node and the other node, so that said one of the security algorithms belongs to said set of security algorithms.
-
-
20. A computer program product comprising code instructions for, when loaded and run on a node, implementing a method for securing an interaction between a first node and a second node, wherein a security algorithm belonging to both a first set of security algorithms held by the first node and a second set of security algorithms held by a third node is selected to secure the interaction between the first and second nodes, the selection of said security algorithm taking account of capacities of both the first and third nodes.
Specification