Security control in a communication system
First Claim
Patent Images
1. Method of controlling security in a communication system comprising at least one node (1,1′
- ,A-D) capable of routing traffic according to a plurality of security algorithms (9,9′
) with respective security levels, the method comprising the following steps;
estimating at least one safety degree relating to said node;
selecting at least one security algorithm of said plurality, depending on said estimated safety degree; and
activating said at least one security algorithm.
7 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to a method of controlling security in a communication system comprising at least one node (1,1′,A-D) capable of routing traffic according to a plurality of security algorithms (9,9′) with respective security levels. The method comprises an estimation of at least one safety degree relating to said node, a selection of at least one security algorithm of said plurality, depending on said estimated safety degree, and an activation of said at least one security algorithm.
-
Citations
30 Claims
-
1. Method of controlling security in a communication system comprising at least one node (1,1′
- ,A-D) capable of routing traffic according to a plurality of security algorithms (9,9′
) with respective security levels, the method comprising the following steps;
estimating at least one safety degree relating to said node;
selecting at least one security algorithm of said plurality, depending on said estimated safety degree; and
activating said at least one security algorithm. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 30)
- ,A-D) capable of routing traffic according to a plurality of security algorithms (9,9′
-
15. Node (1,1′
- ,A-D) capable of routing traffic in a communication system according to a plurality of security algorithms (9,9′
) with respective security levels, the node comprising;
an estimation module (6,6′
) for estimating at least one safety degree relating to said node;
a selection module (7,7′
) for selecting at least one security algorithm of said plurality, depending on said safety degree estimated by the estimation module; and
an activation module (8,8′
) for activating said at least one security algorithm selected by the selection module. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
- ,A-D) capable of routing traffic in a communication system according to a plurality of security algorithms (9,9′
Specification