×

SYSTEM AND METHOD FOR AUTHENTICATING AND CONFIGURING COMPUTING DEVICES

  • US 20070226777A1
  • Filed: 07/29/2002
  • Published: 09/27/2007
  • Est. Priority Date: 07/29/2002
  • Status: Active Grant
First Claim
Patent Images

1. A method for authenticating a host on a network to enable the host to update an Internet protocol (IP) configuration of a storage controller coupled to the network, said host including an algorithm to decrypt a security key supplied by the storage controller, said method comprising the steps of:

  • said host broadcasting a discovery command, said discovery command including an IP address of said host and a service requested by said host, said discovery command conforming to a proprietary discovery command protocol, wherein said discovery command protocol is not publicly known and is configured to authenticate said host to said storage controller;

    said host receiving and understanding a response from said storage controller, said response conforming to said discovery command protocol, said storage controller able to provide the requested service, the response including a world wide name (WWN), IP configuration, and the security key of said storage controller;

    said host decrypting said key from the storage controller using said decryption algorithm such that said decryption algorithm is selected from a Triple Data Encryption Standard algorithm and a MARS algorithm and authenticates said host to said storage controller, and wherein the authentication of said host for the purpose of enabling the host to update an IP configuration of a storage controller is based on its broadcast of said discovery command with said discovery command protocol, its understanding of said response with said discovery command protocol and its use of said decryption algorithm; and

    said host determining if said storage controller'"'"'s IP configuration is valid, and sending to said storage controller a valid IP configuration, an internal configuration comprising a redundant array of independent disks (RAID) level configuration, and the security key to authenticate said host in response to said storage controller'"'"'s IP configuration being invalid.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×