Method for securing an interaction between nodes and related nodes
First Claim
1. A method for securing an interaction between a first node and a second node, wherein a security algorithm belonging to both a first set of security algorithms held by the first node and a second set of security algorithms held by a third node is selected by a selector comprised in at least one of the nodes to secure the interaction between the first and second nodes, the selection of said security algorithm taking account of capacities of both the first and third nodes, wherein the selection of said security algorithm takes account of memory storage capacities of both the first and third nodes, wherein the selection of said security algorithm is such that said security algorithm requires less storage from the one of the first and third nodes which has the lowest memory storage capacities than from the other.
3 Assignments
0 Petitions
Accused Products
Abstract
The invention proposes a method for securing an interaction between a first node and a second node, wherein a security algorithm belonging to both a first set of security algorithms held by the first node and a second set of security algorithms held by a third node is selected to secure the interaction between the first and second nodes, the selection of said security algorithm taking account of capacities of both the first and third nodes.
15 Citations
17 Claims
- 1. A method for securing an interaction between a first node and a second node, wherein a security algorithm belonging to both a first set of security algorithms held by the first node and a second set of security algorithms held by a third node is selected by a selector comprised in at least one of the nodes to secure the interaction between the first and second nodes, the selection of said security algorithm taking account of capacities of both the first and third nodes, wherein the selection of said security algorithm takes account of memory storage capacities of both the first and third nodes, wherein the selection of said security algorithm is such that said security algorithm requires less storage from the one of the first and third nodes which has the lowest memory storage capacities than from the other.
-
15. A method for securing an interaction between a first node and a second node, comprising:
selecting a security algorithm belonging to both a first set of security algorithms held by the first node and a second set of security algorithms held by a third node by at least one of the nodes to secure the interaction between the first and second nodes, the selection of said security algorithm taking account of capacities of both the first and third nodes, wherein the selection of said security algorithm takes account of memory storage capacities of both the first and third nodes, wherein the selection of said security algorithm is such that said security algorithm requires less storage from the one of the first and third nodes which has the lowest memory storage capacities than from the other.
-
16. A non-transitory, computer accessible memory medium storing program instructions for securing an interaction between a first node and a second node, wherein the program instructions are executable by a processor to:
select a security algorithm belonging to both a first set of security algorithms held by the first node and a second set of security algorithms held by a third node to secure the interaction between the first and second nodes, the selection of said security algorithm taking account of capacities of both the first and third nodes, wherein the selection of said security algorithm takes account of memory storage capacities of both the first and third nodes, wherein the selection of said security algorithm is such that said security algorithm requires less storage from the one of the first and third nodes which has the lowest memory storage capacities than from the other.
-
17. A first node, configured to secure an interaction between a second node and a third node, comprising:
-
a memory medium storing a first set of security algorithms; a transceiver for performing communication with one or more other nodes; and processing hardware coupled to the transceiver and the memory medium, wherein the processing hardware is configured to select a security algorithm belonging to both the first set of security algorithms held by the first node and a second set of security algorithms held by the second node to secure the interaction between the second and third nodes, the selection of said security algorithm taking account of capacities of both the first and second nodes, wherein the selection of said security algorithm takes account of memory storage capacities of both the first and second nodes, wherein the selection of said security algorithm is such that said security algorithm requires less storage from the one of the first and second nodes which has the lowest memory storage capacities than from the other.
-
Specification