Measures for enhancing security in communication systems
First Claim
1. A method for providing security of operations on a connection between a first peer entity and a second peer entity in a communication system, the peer entities each having an identity and a transport address, wherein the first peer entity requests an operation from the second peer entity using an identity and the second peer entity checks a permission of the first peer entity to be granted the requested operation using said identity by means of a pre-configured permissions list, said method comprising a step of:
- validating the identity used by the first peer entity at the second peer entity, wherein the step of validating is performed prior to checking of the permission.
3 Assignments
0 Petitions
Accused Products
Abstract
A method, communication device, intermediary device, system, and computer program product for providing security of operations on a connection between a first peer entity and a second peer entity in a communication system, the peer entities each having an identity and a transport address, wherein the first peer entity requests an operation from the second peer entity using an identity and the second peer entity checks the permission of the first peer entity to be granted the requested operation using said identity by means of a pre-configured permissions list, said method comprising a step of validating the identity used by the first peer entity at the second peer entity, wherein the step of validating is performed prior to checking of the permission.
40 Citations
55 Claims
-
1. A method for providing security of operations on a connection between a first peer entity and a second peer entity in a communication system, the peer entities each having an identity and a transport address, wherein the first peer entity requests an operation from the second peer entity using an identity and the second peer entity checks a permission of the first peer entity to be granted the requested operation using said identity by means of a pre-configured permissions list, said method comprising a step of:
-
validating the identity used by the first peer entity at the second peer entity, wherein the step of validating is performed prior to checking of the permission. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A communication device configured for use in a method of providing security of operations on a connection between a first peer entity and the communication device as a second peer entity in a communication system, the peer entities each having an identity and a transport address, wherein the first peer entity requests an operation from the second peer entity using an identity, said communication device comprising:
-
receiver devices configured to receive a request from the first peer entity;
checker devices configured to check a permission of the first peer entity to be granted the requested operation using said identity by means of a pre-configured permissions list;
first memory devices configured to store the pre-configured permissions list; and
validator devices configured to validate the identity used by the first peer entity, wherein the validator devices are further configured to perform validating prior to the checker devices performing checking of the permission. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39)
-
-
40. An intermediary device configured for use in a method of providing security of operations on a connection between a first peer entity and a second peer entity in a communication system, wherein the intermediary device is located on the connection in-between the first peer entity and the second peer entity, the peer entities each having an identity and a transport address, wherein the first peer entity requests an operation from the second peer entity using an identity, said intermediary device comprising:
-
receiver devices configured to receive a request from the first peer entity and a response from the second peer entity; and
validator devices configured to validate the identity used by the first peer entity. - View Dependent Claims (41, 42, 43, 44, 45, 46, 47, 48, 49)
-
-
50. A system for providing security of operations on a connection between a first peer entity and a second peer entities in a communication system, the peer entities each having an identity and a transport address, wherein the first peer entity requests an operation from the second peer entity using an identity and the second peer entity checks a permission of the first peer entity to be granted the requested operation using said identity by means of a pre-configured permissions list, said system comprising:
-
at least one first peer entity comprising transmitter devices configured to transmit a request for an operation to at least one second peer entity; and
the at least one second peer entity comprising receiver devices configured to receive a request from the at least one first peer entity;
checker devices configured to check the permission of the at least one first peer entity to be granted the requested operation using said identity by means of a pre-configured permissions list;
first memory devices configured to store the pre-configured permissions list; and
validator devices configured to validate the identity used by the at least one first peer entity, wherein the validator devices are further configured to perform validating prior to the checker devices performing checking of the permission. - View Dependent Claims (51, 52, 53, 54)
-
-
55. A computer program, embodied on a computer readable medium, the computer program controlling a digital-processing device to perform the step of:
-
validating an identity used by a first peer entity to request an operation from a second peer entity at the second peer entity, wherein the step of validating is performed prior to a checking of a permission of the first peer entity to be granted the requested operation by means of a pre-configured permissions list by the second peer entity.
-
Specification