SECURE COMMUNICATIONS IN COMPUTER CLUSTER SYSTEMS
First Claim
1. A system to improve communication security for cluster machine processing, the system comprising:
- a plurality of interconnected computers that can jointly process data;
a shared secret key used by each of said plurality of interconnected computers to at least one of encrypt, decrypt, and authenticate data being sent or received from one of said plurality of interconnected computers to another of said plurality of interconnected computers; and
a new shared secret key used by each of said plurality of interconnected computers to at least one of encrypt, decrypt, and authenticate data being sent or received from one of said plurality of interconnected computers to another of said plurality of interconnected computers, and said new shared secret key coexists with said shared secret key without adversely affecting the joint processing of data performed by said plurality of interconnected computers.
1 Assignment
0 Petitions
Accused Products
Abstract
A system to improve communication security in cluster machine processing may include interconnected computers that can jointly process data. The system may also include a shared secret key used by each of the interconnected computers to encrypt, decrypt, and/or authenticate data being sent, or received, from one of the interconnected computers to another of the interconnected computers. The system may further include a new shared secret key used by each of the interconnected computers to encrypt, decrypt, and/or authenticate data being sent, or received, from one of the interconnected computers to another of the interconnected computers. In addition, the new shared secret key may coexist with the shared secret key without adversely affecting the joint processing of data performed by the plurality of interconnected computers.
-
Citations
20 Claims
-
1. A system to improve communication security for cluster machine processing, the system comprising:
-
a plurality of interconnected computers that can jointly process data; a shared secret key used by each of said plurality of interconnected computers to at least one of encrypt, decrypt, and authenticate data being sent or received from one of said plurality of interconnected computers to another of said plurality of interconnected computers; and a new shared secret key used by each of said plurality of interconnected computers to at least one of encrypt, decrypt, and authenticate data being sent or received from one of said plurality of interconnected computers to another of said plurality of interconnected computers, and said new shared secret key coexists with said shared secret key without adversely affecting the joint processing of data performed by said plurality of interconnected computers. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method to improve communication security for cluster machine processing, the method comprising:
-
using a shared secret key amongst a plurality of interconnected computers to at least one of encrypt, decrypt, and authenticate data being sent, or received, from one of the plurality of interconnected computers to another of the plurality of interconnected computers; and using a new shared secret key by each of the interconnected computers to at least one of encrypt, decrypt, and authenticate data being sent, or received, from one of the interconnected computers to another of the interconnected computers without adversely affecting the joint processing of data performed by the plurality of interconnected computers. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A computer program product embodied in a tangible medium comprising:
-
computer readable program codes coupled to the tangible medium to improve communication security for cluster machine processing, the computer readable program codes configured to cause the program to; use a shared secret key amongst a plurality of interconnected computers to at least one of encrypt, decrypt, and authenticate data being sent, or received, from one of the plurality of interconnected computers to another of the plurality of interconnected computers; and use a new shared secret key by each of the interconnected computers to at least one of encrypt, decrypt, and authenticate data being sent, or received, from one of the interconnected computers to another of the interconnected computers without adversely affecting the joint processing of data performed by the plurality of interconnected computers. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification