Verifying authenticity in data storage management systems
First Claim
1. In a storage area network management application that operates using agents for management of resources, a method for use in verifying authenticity in installing an agent on a host computer system in the storage area network, the method comprising:
- identifying a file for use in installing the agent, wherein an agent installer identifies the agent for installation on the host computer system, wherein the agent collects and reports data within the storage area network, wherein the agent installer receives a list of installed agents and a list of agent versions from a master agent;
signing the file to produce a digital signature for the file;
providing, to a recipient, a certificate for use in verifying authenticity of information, wherein the recipient includes the master agent having the list of installed agents and the list of agent versions, wherein the master agent saves the certificate;
sending the file and digital signature to the recipient in a single secure transaction;
at the recipient, using the certificate and the digital signature to verify the file, wherein the master agent verifies the digital signature using the certificate; and
using the file, performing an agent installation operation to install the agent on the host computer system, wherein the host computer system connects to at least one data storage system to gain access to stored data on behalf of client computer systems requesting the stored data.
10 Assignments
0 Petitions
Accused Products
Abstract
A storage area network management application operates using agents for management of resources. Authenticity is verified in installing an agent on a host computer system in the storage area network. A file is identified for use in installing the agent. The file is signed to produce a digital signature for the file. A certificate is sent to a recipient for use in verifying authenticity of information. The file and digital signature are sent to the recipient. At the recipient, the certificate and the digital signature are used to verify the file. An agent installation operation is performed, using the file, to install the agent on the host computer system.
26 Citations
19 Claims
-
1. In a storage area network management application that operates using agents for management of resources, a method for use in verifying authenticity in installing an agent on a host computer system in the storage area network, the method comprising:
-
identifying a file for use in installing the agent, wherein an agent installer identifies the agent for installation on the host computer system, wherein the agent collects and reports data within the storage area network, wherein the agent installer receives a list of installed agents and a list of agent versions from a master agent; signing the file to produce a digital signature for the file; providing, to a recipient, a certificate for use in verifying authenticity of information, wherein the recipient includes the master agent having the list of installed agents and the list of agent versions, wherein the master agent saves the certificate; sending the file and digital signature to the recipient in a single secure transaction; at the recipient, using the certificate and the digital signature to verify the file, wherein the master agent verifies the digital signature using the certificate; and using the file, performing an agent installation operation to install the agent on the host computer system, wherein the host computer system connects to at least one data storage system to gain access to stored data on behalf of client computer systems requesting the stored data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. In a storage area network management application that operates using agents for management of resources, a method for use in verifying authenticity in installing an agent on a host computer system in the storage area network, the method comprising:
-
identifying a file for use in installing the agent, wherein an agent installer identifies the agent for installation on the host computer system, wherein the agent collects and reports data within the storage area network, wherein the agent installer receives a list of installed agents and a list of agent versions from a master agent; signing the file to produce a digital signature for the file; storing the digital signature together with the file in a limited access location; sending the file and digital signature to a recipient in a single secure transaction, wherein the recipient includes the master agent having the list of installed agents and the list of agent versions; at the recipient, using the digital signature to verify the file, wherein the master agent verifies the digital signature; and using the file, performing an agent installation operation to install the agent on the host computer system, wherein the host computer system connects to at least one data storage system to gain access to stored data on behalf of client computer systems requesting the stored data. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A computer system comprising:
-
a memory; a processor; a communications interface; an interconnection mechanism coupling the memory, the processor and the communications interface; wherein the memory is encoded with instructions that when executed on the processor help cause the computer system to verify authenticity in installing an agent by performing the operations of; identifying a file for use in installing the agent, wherein an agent installer identifies the agent for installation on the host computer system, wherein the agent collects and reports data within the storage area network, wherein the agent installer receives a list of installed agents and a list of agent versions from a master agent, wherein the storage area network comprises a host computer system connecting to at least one data storage system to gain access to stored data on behalf of client computer systems requesting the stored data; signing the file to produce a digital signature for the file; sending, to a recipient, a certificate for use in verifying authenticity of information, wherein the recipient includes the master agent having the list of installed agents and the list of agent versions, wherein the master agent saves the certificate; sending the file and digital signature to the recipient in a single secure transaction; and at the recipient, using the certificate and the digital signature to verify the file, wherein the master agent verifies the digital signature using the certificate. - View Dependent Claims (19)
-
Specification