Security apparatus and method for a data processing system
First Claim
Patent Images
1. A data processing system, comprising:
- a submitting node having an identifier;
a processing node coupled to the submitting node, the processing node having a memory operable to store a proxy associated with the submitting node, the proxy specifying a location in the memory of the processing node accessible by the submitting node, the processing node operable to receive the identifier of the submitting node and to provide the submitting node access to the processing node in accordance with the proxy; and
a remote node coupled to the submitting node and the processing node, the remote node operable to receive the identifier of the submitting node and to communicate the identifier to the processing node.
10 Assignments
0 Petitions
Accused Products
Abstract
A data processing system (10) includes processing nodes (12, 18) and submitting nodes (14, 16, 20, 22). Each processing node (12, 18) includes a list of remote proxies (36, 50) and a list of local proxies (38, 52). The remote proxies (36, 50) and local proxies (38, 52) specify access to the storage or processing capabilities of the processing nodes (12, 18) by the submitting nodes (14, 16, 20, 22).
-
Citations
19 Claims
-
1. A data processing system, comprising:
-
a submitting node having an identifier; a processing node coupled to the submitting node, the processing node having a memory operable to store a proxy associated with the submitting node, the proxy specifying a location in the memory of the processing node accessible by the submitting node, the processing node operable to receive the identifier of the submitting node and to provide the submitting node access to the processing node in accordance with the proxy; and a remote node coupled to the submitting node and the processing node, the remote node operable to receive the identifier of the submitting node and to communicate the identifier to the processing node. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for providing access to a processing node, comprising the steps of:
-
communicating an identifier from a submitting node to a remote node; communicating the identifier from the remote node to the processing node; retrieving a proxy stored at the processing node using the identifier, the proxy specifying a location in a memory of the processing node accessible by the submitting node; and providing the submitting node access to the processing node in accordance with the proxy. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method for generating access parameters for a submitting node accessing a processing node, the method comprising the steps of:
-
retrieving a remote proxy associated with the submitting node, the remote proxy having a plurality of first access parameters and a local identifier for the submitting node; retrieving a local proxy associated with the local identifier, the local proxy having a plurality of second access parameters; and generating access parameters for the submitting node using the first access parameters from the remote proxy and the second access parameters from the local proxy. - View Dependent Claims (16, 17, 18, 19)
-
Specification