×

Authenticating a requestor without providing a key

  • US 8,015,243 B2
  • Filed: 07/07/2008
  • Issued: 09/06/2011
  • Est. Priority Date: 11/12/2004
  • Status: Expired due to Fees
First Claim
Patent Images

1. A tangible, non-transitory computer readable storage medium having computer readable instructions stored thereon that, when executed by a computer, implement a method for authenticating a requesting entity in a subnet communications environment, the method further comprising:

  • determining a client identification of a client node associated with the requesting entity by receiving a source identifier from the requesting entity and associating the source identifier with one or more permanent identifiers of the client node, wherein the source identifier is a source logical identifier (SLID), and the one or more permanent identifiers are one or more globally unique identifiers (GUID) of the client node;

    determining whether the requesting entity associated with the client node is acting in a supervisor capacity by defining a supervisor only privileged key for each client node in the communications environment, and by determining whether a connection request received from the requested entity includes the supervisor only privileged key corresponding to the client node of the requesting entity; and

    returning, from a resource provider node, a key to the requesting entity upon determining that the client identification of the client node indicates that the client node is permitted to access one or more resources of the provider node, and that the client node is acting in a supervisor capacity;

    wherein the associating the SLID with one or more globally unique identifiers (GUID) of the client node further comprises;

    forwarding the SLID to a subnet administrator; and

    receiving, from the subnet administrator, the one or more GUIDs corresponding to the SLID.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×