System and method for key management in computing clusters
Abstract:
Cryptographic affinities are generated to improve security in server environments. One or more cryptographic affinities protect electronic data stored within a blade server. The cryptographic affinities are generated based on hashing a unique blade identifier and a unique identifier assigned to a network interface. The cryptographic affinities thus govern read, write, and other access operations. If any cryptographic affinity fails to match historical observance, then access to the blade server may be denied.
Public/Granted literature
Information query
Patent Agency Ranking
0/0