SECURE STORAGE IN FILE SYSTEM
First Claim
Patent Images
1. A computer-implemented method comprising:
- receiving a connection request to connect to a node;
accessing a key phrase;
accessing encrypted connection information for the node; and
using the key phrase to decrypt, using one or more processors, the encrypted connection information to provide decrypted connection information including a password for the node.
1 Assignment
0 Petitions
Accused Products
Abstract
A node may contain a secure store agent. A process executing on the node may request connection information from the secure store agent. An encryption key phrase may be accessed, responsive to the request for connection information, to decrypt the requested connection information. The requested connection information may be obtained from a secure storage file in a file system.
-
Citations
20 Claims
-
1. A computer-implemented method comprising:
-
receiving a connection request to connect to a node; accessing a key phrase; accessing encrypted connection information for the node; and using the key phrase to decrypt, using one or more processors, the encrypted connection information to provide decrypted connection information including a password for the node. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system comprising:
-
an application server to receive a connection request to connect to a node, access a key phrase, and access encrypted connection information for the node; and a shared directory of a distributed system to store the encrypted connection information and to provide the encrypted connection information to the application server, the application server using the key phrase to decrypt, using one or more processors, the encrypted connection information to provide decrypted connection information including a password for the node. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A machine-readable storage medium having embodied thereon instructions which, when executed by one or more processors, performs a method comprising:
-
receiving a connection request to connect to a node; accessing a key phrase; accessing encrypted connection information for the node; and using the key phrase to decrypt, using one or more processors, the encrypted connection information to provide decrypted connection information including a password for the node. - View Dependent Claims (18, 19, 20)
-
Specification