Method and Apparatus for Authentication Service Application Processes During Service Reallocation in High Availability Clusters
First Claim
1. A method for providing secure communications in a High Availability (HA) cluster, the method comprising the steps of:
- detecting an unavailability of a first service application process;
switching a second service application process from a first state to a second state, the second service application being selected for taking over service currently provided from the first service application process, the first state and the second state each being associated to a set of rights in the cluster;
generating a private key for the second service application process based on the second state of the second service application process; and
wherein the set of rights associated to the second state of the second service application process allows the second service application process to replace the first service application process for providing secure communications between the second service application and other service application processes in the HA cluster as provided prior the detection of the unavailability of the first service application process.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and communication node for providing secure communications and services in a High Availability (HA) cluster. The communication node comprises an Operating System (OS) that detects an unavailability of a first service application process and switches a second service application process from the first state to the second state, the second service application being selected for taking over service currently provided from the first service application process, the first state and the second state each being associated to a set of rights in the cluster. The OS generates a private key for the second service application process based on its second state. The set of rights associated to the second state allows the OS to replace the first service application process with the second service application process for providing secure communications between the second service application and other service application processes in the HA cluster.
-
Citations
20 Claims
-
1. A method for providing secure communications in a High Availability (HA) cluster, the method comprising the steps of:
-
detecting an unavailability of a first service application process; switching a second service application process from a first state to a second state, the second service application being selected for taking over service currently provided from the first service application process, the first state and the second state each being associated to a set of rights in the cluster; generating a private key for the second service application process based on the second state of the second service application process; and wherein the set of rights associated to the second state of the second service application process allows the second service application process to replace the first service application process for providing secure communications between the second service application and other service application processes in the HA cluster as provided prior the detection of the unavailability of the first service application process. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A communication node for providing services in a High Availability (HA) cluster of interconnected communication nodes, the communication node comprising:
-
an Operating System (OS) for detecting an unavailability of a first service application process and switching a second service application process from a first state to a second state, the second service application being selected for taking over service currently provided from the first service application process, the first state and the second state each being associated to a set of rights in the cluster; a private key generator located in the OS for generating a private key for the second service application process based on the second state of the second service application process; and wherein the set of rights associated to the second state of the second service application process allows the OS to replace the first service application process with the second service application process for providing secure communications between the second service application and other service application processes in the HA cluster as provided prior the detection of the unavailability of the first service application process. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification