摘要:
A policy distribution server provides, on a subscription basis, policy updates to effect desired behaviors of network intermediary devices. The policy updates may specify caching policies, and may in some instances, include instructions for data collection by the network intermediary devices. Data collected in accordance with such instructions may be used to inform future policy updates distributed to the network intermediary devices.
摘要:
A policy distribution server provides, on a subscription basis, policy updates to effect desired behaviors of network intermediary devices. The policy updates may specify caching policies, and may in some instances, include instructions for data collection by the network intermediary devices. Data collected in accordance with such instructions may be used to inform future policy updates distributed to the network intermediary devices.
摘要:
A first computer-based device is authenticated at a second computer-based device communicatively coupled thereto through use of a unique identifier and an encrypted token, each received from the first device. Following the authentication, configuration information for the first device is sent from the second device to the first device and the first device authorized to join a network that includes the second device. Further, permissions related to the network may be granted to the first device.
摘要:
A resource utilization enforcement system enforces resource quotas in a distributed system. A bank on a central server maintains an account for each principal; the account is equivalent to a resource quota for the principal. Quotas are tracked through the use of digital coins that represent resource consumption. The bank is allowed coin generation privileges. At initiation of a computing session, a purse manager on the client accesses the account of the principal and requests coins to exchange for consumed resources. The purse manager manages the coins withdrawn in a “purse” for the principal. The purse manager submits coins to a cashier on the storage device to “purchase” storage for the principal. Refunds are provided if the storage consumption event frees storage.
摘要:
A host computer system is categorized according to uniform resource locator (URL) information extracted from a digital certificate purportedly associated with said host. Thereafter, a secure communication session (e.g., an SSL session) with said host may be granted or denied according to results of the categorizing. If granted, messages associated with the secure session may be tunneled through a proxy without decryption, or, in some cases, even though the secure communication session was authorized messages may be decrypted at the proxy
摘要:
A method and system for election of a cluster leader in a storage area network is provided Each node in a grouping of storage area network nodes communicates with each of the nodes on a periodic basis to determine if any of the nodes have failed (42). In the event of a cluster fault, each node may request a position of cluster leader. A pruning protocol (60) is invoked to ensure efficient convergence of a single cluster leader candidate to favor a majority grouping leader candidate to become the new cluster leader. In the event the leader candidate from the majority grouping has failed to become the new cluster leader, a minority grouping leader candidate can become the cluster leader. Following the pruning protocol, a voting protocol (100) is invoked followed by lock of the quorum disk (138) by the elected cluster leader candidate.
摘要:
A cache logically disposed in a communication path between a client and a server receives a request for a content item and, in response thereto, requests from the server header information concerning the content item and an initial portion of data that makes up the content item. The cache then computes a first hashing value from the header information and a second hashing value from the initial portion of data. A content identifier is created by combining the first hashing value and the second hashing value. Using the content identifier, the cache determines whether a copy of the content item is stored by the cache; and, if so provides same to the client. Otherwise, the cache requests the content item from the server and, upon receipt thereof, provides it to the client.
摘要:
A host computer system is categorized according to uniform resource locator (URL) information extracted from a digital certificate purportedly associated with said host. Thereafter, a secure communication session (e.g., an SSL session) with said host may be granted or denied according to results of the categorizing. If granted, messages associated with the secure session may be tunneled through a proxy without decryption, or, in some cases, even though the secure communication session was authorized messages may be decrypted at the proxy.
摘要:
A cache logically disposed in a communication path between a client and a server receives a request for a content item and, in response thereto, requests from the server header information concerning the content item and an initial portion of data that makes up the content item. The cache then computes a first hashing value from the header information and a second hashing value from the initial portion of data. A content identifier is created by combining the first hashing value and the second hashing value. Using the content identifier, the cache determines whether a copy of the content item is stored by the cache; and, if so provides same to the client. Otherwise, the requests the content item from the server and, upon receipt thereof, provides it to the client.
摘要:
A network storage device is disclosed for use in a secure array of such devices to support a distributed file system. Each device is an independent repository of remotely encrypted data objects to be accessed by authorized network clients. All encryption is done by the clients, rather than by the devices. In order for the system to revoke access to an object on the device, the object must be re-encrypted. Each storage device has a device owner for controlling access to the device's data. All data requests from the clients and responses to them are authenticated using keys derived from the owner key and hashed message authentication codes.