Dell products l.p. (20240340174). SYSTEMS AND METHODS FOR SECURE CLUSTER COMMUNICATION simplified abstract

From WikiPatents
Revision as of 00:35, 18 October 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

SYSTEMS AND METHODS FOR SECURE CLUSTER COMMUNICATION

Organization Name

dell products l.p.

Inventor(s)

Sridharan Kuppuswamy of Bangalore (IN)

SYSTEMS AND METHODS FOR SECURE CLUSTER COMMUNICATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240340174 titled 'SYSTEMS AND METHODS FOR SECURE CLUSTER COMMUNICATION

The abstract of the patent application describes a methodology involving the generation of keys for intra-cluster and inter-cluster communication within a network of nodes. The keys are stored in a table and used to create secure communication configuration files that are then loaded into a security process on each node.

  • The methodology includes generating keys for intra-cluster communication on a first node.
  • Updating a keys table with the generated keys.
  • Creating a secure communication configuration file on the first node with the generated keys.
  • Loading the secure communication configuration file to a security process on the first node.
  • Generating keys for inter-cluster communication with another node of a different cluster.
  • Updating the keys table with the generated keys.
  • Updating the secure communication configuration file on the first node to include the new keys.
  • Loading the updated secure communication configuration file to the security process on the first node.

Potential Applications: - Secure communication within a cluster network. - Enhanced data protection in inter-cluster communication. - Improved network security and encryption.

Problems Solved: - Ensuring secure communication within and between clusters. - Simplifying the management of keys for communication. - Enhancing overall network security.

Benefits: - Increased data security. - Efficient key management. - Reduced risk of unauthorized access.

Commercial Applications: Title: "Enhanced Secure Communication Methodology for Cluster Networks" This technology can be applied in industries such as: - Information technology - Data centers - Cloud computing services

Questions about the technology: 1. How does this methodology improve network security? - This methodology enhances network security by generating and managing keys for secure communication within and between clusters. 2. What are the potential risks associated with key management in cluster networks? - Potential risks include unauthorized access to sensitive data if keys are not properly managed and secured.


Original Abstract Submitted

an example methodology includes, by a first node of a cluster, generating a first key for intra-cluster communication, updating a keys table with the generated first key, generating a secure communication configuration file on the first node, wherein the secure communication configuration file includes the first key, and loading the secure communication configuration file including the first key to a security process on the first node. the method may also include, by the first node of the cluster, generating a second key for an inter-cluster communication with another node of another cluster, updating the keys table with the generated second key, updating the secure communication configuration file on the first node to include the second key, and loading the secure communication configuration file updated with the second key to the security process on the first node.