18745138. SECURE VSAN CLUSTER USING DEVICE AUTHENTICATION AND INTEGRITY MEASUREMENTS simplified abstract (Dell Products L.P.)
Contents
SECURE VSAN CLUSTER USING DEVICE AUTHENTICATION AND INTEGRITY MEASUREMENTS
Organization Name
Inventor(s)
Viswanath Ponnuru of Bangalore (IN)
Krishnaprasad K of Bengaluru (IN)
Chandrashekar Nelogal of Round Rock TX (US)
SECURE VSAN CLUSTER USING DEVICE AUTHENTICATION AND INTEGRITY MEASUREMENTS - A simplified explanation of the abstract
This abstract first appeared for US patent application 18745138 titled 'SECURE VSAN CLUSTER USING DEVICE AUTHENTICATION AND INTEGRITY MEASUREMENTS
The abstract of this patent application describes a node for a Virtual Storage Area Network (VSAN) that includes a Baseboard Management Controller (BMC), a processor, and multiple VSAN objects. The processor sets up a Cluster Membership, Monitoring, and Directory Service (CMMDS) as well as a BMC Service Module (SM). The CMMDS implements a Security Policy and Data Model (SPDM) architecture to manage the VSAN objects, their inventory list, and authentication states. The BMC SM communicates this information to the BMC, which can then take action based on the authentication state of the VSAN objects.
- The node for a VSAN includes a BMC, a processor, and multiple VSAN objects.
- The processor sets up a CMMDS and a BMC SM to manage the VSAN objects.
- The CMMDS implements a SPDM architecture for security and data management.
- The BMC can take action based on the authentication state of the VSAN objects.
- The technology aims to enhance security and management of VSAN objects within a network.
Potential Applications: - Data centers - Cloud computing environments - Network storage systems
Problems Solved: - Improved security for VSAN objects - Efficient management of VSAN inventory - Enhanced authentication processes
Benefits: - Enhanced security measures - Streamlined management of VSAN objects - Improved network performance
Commercial Applications: Title: "Enhanced Security and Management for Virtual Storage Networks" This technology could be utilized in data centers, cloud computing environments, and network storage systems to enhance security and management of VSAN objects, leading to improved network performance and efficiency.
Questions about the technology: 1. How does the CMMDS determine the authentication state of VSAN objects? 2. What specific actions can the BMC take based on the authentication state of the VSAN objects?
Frequently Updated Research: Stay updated on advancements in VSAN security protocols and data management technologies to ensure the continued relevance and effectiveness of this innovation.
Original Abstract Submitted
A node for a VSAN includes a BMC, a processor, and a plurality of VSAN objects. The processor instantiates a Cluster Membership, Monitoring, and Directory Service (CMMDS) and a BMC Service Module (SM). The CMMDS implements a Security Policy and Data Model (SPDM) architecture. The CMMDS determines an inventory list of the VSAN objects and a SPDM authentication state for each of the objects, and provides the inventory list and the SPDM authentication states to the BMC SM. The BMC SM provides the inventory list and the SPDM authentication state to the BMC. The BMC determines that a first VSAN object is not authenticated based upon the SPDM authentication state of the first VSAN object, and directs the CMMDS to halt input/output (I/O) operations on the VSAN to the first VSAN object.