Secure storage in file system
First Claim
Patent Images
1. A computer-implemented method comprising:
- receiving a connection request to connect to a node;
accessing a key phrase to be used to decrypt encrypted connection information;
combining a system identifier with the key phrase to generate an encryption key, the system identifier identifying a system requesting decrypted connection information;
accessing the encrypted connection information for the node from a secure storage file; and
using the encryption key to decrypt, using one or more processors, the encrypted connection information to provide the decrypted connection information including an address and password for connecting to the node.
1 Assignment
0 Petitions
Accused Products
Abstract
A node may contain a secure store agent. A process executing on the node may request connection information from the secure store agent. An encryption key phrase may be accessed, responsive to the request for connection information, to decrypt the requested connection information. The requested connection information may be obtained from a secure storage file in a file system.
13 Citations
15 Claims
-
1. A computer-implemented method comprising:
-
receiving a connection request to connect to a node; accessing a key phrase to be used to decrypt encrypted connection information; combining a system identifier with the key phrase to generate an encryption key, the system identifier identifying a system requesting decrypted connection information; accessing the encrypted connection information for the node from a secure storage file; and using the encryption key to decrypt, using one or more processors, the encrypted connection information to provide the decrypted connection information including an address and password for connecting to the node. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising:
-
an application server to receive a connection request to connect to a node, access a key phrase to be used to decrypt encrypted connection information, and access the encrypted connection information for the node from a secure storage file; a key generator to combine a system identifier with the key phrase to generate an encryption key, the system identifier to identify a system requesting decrypted connection information; and a shared directory of a distributed system to store the encrypted connection information within the secure storage file and to provide the encrypted connection information to the application server, the application server using the encryption key to decrypt, using one or more processors, the encrypted connection information to provide decrypted connection information including an address and password for connecting to the node. - View Dependent Claims (11, 12, 13)
-
-
14. A non-transitory machine-readable storage medium having embodied thereon instructions which, when executed by one or more processors, performs operations comprising:
-
receiving a connection request to connect to a node; accessing a key phrase to be used to decrypt encrypted connection information; combining a system identifier with the key phrase to generate an encryption key, the system identifier identifying a system requesting decrypted connection information; accessing the encrypted connection information for the node from a secure storage file; and using the encryption key to decrypt, the encrypted connection information to provide decrypted connection information including an address and password for connecting to the node. - View Dependent Claims (15)
-
Specification