A first application layer at a first message processor identifies a first
portion of context information. A second message processor receives the
first portion of context information. A second application layer at the
second message processor identifiers a second portion of context
information. The second message processor sends the second portion of
context information along with a first digital signature created from
both the first and second portions of context information. The first
message processor receives the second portion of context information and
first digital signature. The first message processor sends a second
digital signature created from the first and second portions of context
information to the second message processor. If both the first and second
digital signatures are authenticated, a secure context can be established
between the first and second application layers.