-
1.
公开(公告)号:US20170331903A1
公开(公告)日:2017-11-16
申请号:US15152219
申请日:2016-05-11
Applicant: NetApp, Inc.
Inventor: Craig Everhart , Flora Wong , Ankit Jain , Vijay Singh , Robert Wyckoff Hyer, JR. , Balajee Nagasubramaniam
CPC classification number: H04L67/141 , H04L63/0281 , H04L63/0428 , H04L63/166 , H04L67/1097 , H04L67/28
Abstract: A method, non-transitory computer readable medium and local storage node computing device that establishes a first connection between a first endpoint in a kernel of an operating system and a second endpoint. A proxy application in a user space is invoked and a second connection is established from the operating system kernel to the proxy application. The proxy application is linked to a secure protocol implementation. Handshake messages are proxied between the second endpoint and the proxy application using the first and second connections. Security parameters for the first connection and determined from the handshake messages are sent from the proxy application to the operating system kernel via the second connection. Data is exchanged between the first endpoint in the operating system kernel and the second endpoint using the first connection and the security parameters.
-
2.
公开(公告)号:US11025728B2
公开(公告)日:2021-06-01
申请号:US15152219
申请日:2016-05-11
Applicant: NetApp, Inc.
Inventor: Craig Everhart , Flora Wong , Ankit Jain , Vijay Singh , Robert Wyckoff Hyer, Jr. , Balajee Nagasubramaniam
Abstract: A method, non-transitory computer readable medium and local storage node computing device that establishes a first connection between a first endpoint in a kernel of an operating system and a second endpoint. A proxy application in a user space is invoked and a second connection is established from the operating system kernel to the proxy application. The proxy application is linked to a secure protocol implementation. Handshake messages are proxied between the second endpoint and the proxy application using the first and second connections. Security parameters for the first connection and determined from the handshake messages are sent from the proxy application to the operating system kernel via the second connection. Data is exchanged between the first endpoint in the operating system kernel and the second endpoint using the first connection and the security parameters.
-