System and method for distributed management of shared computers
First Claim
1. A computer implemented method comprising:
- verifying identities of a landlord device and a tenant device, wherein each identity is verified by ascertaining how each device is coupled to a computer;
generating, in the computer implemented locally at a data center facility, a landlord key pair and a tenant key pair, each key pair including a private key and a public key, the landlord key pair being used to establish secure communication between the computer and a landlord device, and the tenant key pair being used to establish secure communication between the computer and a tenant device;
the landlord device manages hardware operations of a cluster and is implemented locally at the data center facility;
the tenant device manages software of the cluster and is implemented at a location remote from the data center facility;
keeping the landlord private key and the tenant private key secure in the computer without disclosing the keys to any other device;
forwarding the landlord public key and the tenant public key to the landlord device; and
forwarding the tenant public key to the tenant device.
3 Assignments
0 Petitions
Accused Products
Abstract
A multi-tiered server management architecture is employed including an application development tier, an application operations tier, and a cluster operations tier. In the application development tier, applications are developed for execution on one or more server computers. In the application operations tier, execution of the applications is managed and sub-boundaries within a cluster of servers can be established. In the cluster operations tier, operation of the server computers is managed without concern for what applications are executing on the one or more server computers and boundaries between clusters of servers can be established. The multi-tiered server management architecture can also be employed in co-location facilities where clusters of servers are leased to tenants, with the tenants implementing the application operations tier and the facility owner (or operator) implementing the cluster operations tier.
521 Citations
13 Claims
-
1. A computer implemented method comprising:
-
verifying identities of a landlord device and a tenant device, wherein each identity is verified by ascertaining how each device is coupled to a computer; generating, in the computer implemented locally at a data center facility, a landlord key pair and a tenant key pair, each key pair including a private key and a public key, the landlord key pair being used to establish secure communication between the computer and a landlord device, and the tenant key pair being used to establish secure communication between the computer and a tenant device; the landlord device manages hardware operations of a cluster and is implemented locally at the data center facility; the tenant device manages software of the cluster and is implemented at a location remote from the data center facility; keeping the landlord private key and the tenant private key secure in the computer without disclosing the keys to any other device; forwarding the landlord public key and the tenant public key to the landlord device; and forwarding the tenant public key to the tenant device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer implemented method comprising:
-
verifying identities of a cluster operation management console and an application console, wherein each identity is verified by ascertaining how each console is coupled to a computer; generating, in the computer implemented locally at a data center facility, a cluster operation key pair and an application key pair, each key pair including a private key and a public key, the cluster operation key pair being used to establish secure communication between the computer and the cluster operations management console, and the application key pair being used to establish secure communication between the computer and the application console, wherein; the cluster operations management console manages hardware operations of a cluster and is implemented locally at the data center facility; the application console manages software of the cluster and is implemented at a location remote from the data center facility; keeping the cluster operation private key and the application private key secure in the computer without disclosing the keys to any other device; forwarding the cluster operation public key and the application public key to the cluster operations management console; and forwarding the application public key to the application console. - View Dependent Claims (9, 10, 11, 12, 13)
-
Specification