System and method for distributed management of shared computers
First Claim
1. A method comprising:
- generating, at a computer, a landlord key pair and a tenant key pair, each key pair including a private key and a public key, the landlord key pair being used to establish secure communication between the computer and a landlord device, and the tenant key pair being used to establish secure communication between the computer and a tenant device;
keeping the landlord private key and the tenant private key secure at the computer without disclosing the keys to any other device;
forwarding the landlord public key and the tenant public key to the landlord device; and
forwarding the tenant public key to the tenant device;
3 Assignments
0 Petitions
Accused Products
Abstract
A multi-tiered server management architecture is employed including an application development tier, an application operations tier, and a cluster operations tier. In the application development tier, applications are developed for execution on one or more server computers. In the application operations tier, execution of the applications is managed and sub-boundaries within a cluster of servers can be established. In the cluster operations tier, operation of the server computers is managed without concern for what applications are executing on the one or more server computers and boundaries between clusters of servers can be established. The multi-tiered server management architecture can also be employed in co-location facilities where clusters of servers are leased to tenants, with the tenants implementing the application operations tier and the facility owner (or operator) implementing the cluster operations tier.
142 Citations
10 Claims
-
1. A method comprising:
-
generating, at a computer, a landlord key pair and a tenant key pair, each key pair including a private key and a public key, the landlord key pair being used to establish secure communication between the computer and a landlord device, and the tenant key pair being used to establish secure communication between the computer and a tenant device;
keeping the landlord private key and the tenant private key secure at the computer without disclosing the keys to any other device;
forwarding the landlord public key and the tenant public key to the landlord device; and
forwarding the tenant public key to the tenant device;
- View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
maintaining, at a computer, a storage key to encrypt data to be stored on a mass storage device;
using, as the storage key, only a landlord key if no tenant key has been generated at the computer; and
if a tenant key has been generated at the computer, then combining the landlord key and the tenant key to generate the storage key. - View Dependent Claims (9, 10)
-
Specification