Implementing Secure Communication In A Distributed Computing System

    公开(公告)号:US20190215313A1

    公开(公告)日:2019-07-11

    申请号:US15868586

    申请日:2018-01-11

    IPC分类号: H04L29/06 H04L9/32 G06F11/20

    摘要: A new snapshot of a storage volume is created by instructing computing nodes to suppress write requests. Once pending write requests from the computing nodes are completed, storage nodes create a new snapshot for the storage volume by allocating a new segment to the new snapshot and finalizes and performs garbage collection with respect to segments allocated to the previous snapshot. Subsequent write requests to the storage volume are then performed on the segments allocated to the new snapshot. An orchestration layer implements a multi-role application that is provisioned with virtualized storage and computation resources. A snapshot of the application may be created and used to rollback or clone the application. Containers may be loaded with data structures for encrypted and/or authenticated communication. Failed storage volumes maybe detected and repaired. Repopulating repaired volumes may be managed by an application or a storage manager implementing a virtualized storage system.

    PROACTIVE TRANSPORT LAYER SECURITY IDENTITY VERIFICATION

    公开(公告)号:US20190166160A1

    公开(公告)日:2019-05-30

    申请号:US15824214

    申请日:2017-11-28

    申请人: Forcepoint LLC

    IPC分类号: H04L29/06

    摘要: A method, system, and computer-usable medium are disclosed for (a) responsive to communication of a client handshake from a client to a server for establishing encrypted communications between the client and the server: (i) holding open, by an intermediate verification system interfaced between the server and the client, the client handshake; and (ii) opening a connection between the intermediate verification system and the server via which the intermediate verification system issues a server verification handshake to the server; (b) responsive to issuance of the server verification handshake to the server, receiving a server certificate associated with the server by the intermediate verification system; (c) responsive to receipt of the server certificate, processing, by the intermediate verification system, the server certificate to determine an identity of the server; and (d) rendering, by the intermediate verification system, a security policy decision regarding traffic between the server and client based on the identity.