Method, element and system for securing communication between two parties
First Claim
Patent Images
1. A method of securing communication between a first party and a second party in a telecommunications network comprising the steps of:
- defining a criteria for selecting one of a plurality of different security methods, the plurality of security methods each comprising a plurality of messages selected from a set of message types, at least two different security methods having at least one message in common;
selecting one of the said plurality of different security methods in accordance with said defined criteria; and
performing said security method.
3 Assignments
0 Petitions
Accused Products
Abstract
A method of securing communication between a first party and a second party includes defining a criteria for selecting one of a plurality of different security methods. One of the plurality of different security methods is selected in accordance with the defined criteria.
-
Citations
36 Claims
-
1. A method of securing communication between a first party and a second party in a telecommunications network comprising the steps of:
-
defining a criteria for selecting one of a plurality of different security methods, the plurality of security methods each comprising a plurality of messages selected from a set of message types, at least two different security methods having at least one message in common; selecting one of the said plurality of different security methods in accordance with said defined criteria; and performing said security method. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A telecommunications network element for securing communication between a first party and a second party comprising:
-
means for defining a criteria for selecting one of a plurality of different security methods, the plurality of security methods each comprising a plurality of messages selected from a set of message types, at least two different security methods having at least one message in common; selection means for selecting one of said plurality of different security methods in accordance with said defined criteria; and means for ensuring that the communication between said first and second parties is in accordance with said selected security method.
-
-
32. A terminal for securing communications between a first party and a second party comprising:
-
means for defining a criteria for selecting one of a plurality of different security methods, the plurality of security methods each comprising a plurality of messages selected from a set of message types, at least two different security methods having at least one message in common; selection means for selecting one of said plurality of different security methods in accordance with said defined criteria; and means for ensuring that the communication between said first and second party is in accordance with said selected security method.
-
-
33. A system for securing communications between a first party and a second party comprising:
-
means for defining a criteria for selecting one of a plurality of different security methods, the plurality of security methods each comprising a plurality of messages selected from a set of message types, at least two different security methods having at least one message in common; selection means for selecting one of said plurality of different security methods in accordance with said defined criteria; and means for ensuring that the communication between said first and second party is in accordance with said selected security method.
-
-
34. A computer program product comprising computer-readable code, the computer-readable code causes a computer to perform a procedure for securing communications between a first party and a second party comprising:
-
means for defining a criteria for selecting one of a plurality of different security methods, the plurality of security methods each comprising a plurality of messages selected from a set of message types, at least two different security methods having at least one message in common; selection means for selecting one of said plurality of different security methods in accordance with said defined criteria; and means for ensuring that the communication between said first and second party is in accordance with said selected security method.
-
-
35. A method of securing communication between a first party and a second party in a telecommunications network comprising the steps of:
-
defining a criteria for selecting one of a plurality of different security methods each having a different set of steps for performing the respective security methods, the plurality of security method each comprising a plurality of messages selected from a set of message types, at least two different security methods having at least one message in common; selecting one of the said plurality of different security methods in accordance with said defined criteria; and performing said security method.
-
-
36. A method of securing communication between a first party and a second party in a telecommunications network comprising the steps of:
-
defining a criteria for selecting one of a plurality of different security methods, the plurality of security method each comprising a plurality of messages selected from a set of message types, at least some of the different security methods having different message types and at least two different security methods having at least one message in common; selecting one of the said plurality of different security methods in accordance with said defined criteria; and performing said security method.
-
Specification