-
公开(公告)号:GB2510429A
公开(公告)日:2014-08-06
申请号:GB201302027
申请日:2013-02-05
Applicant: IBM
Inventor: BERMAN THOMAS JAMES CHRISTOPHER , BENT GRAHAM ANTHONY , VYVYAN DAVID ROBNETT , DANTRESSANGLE PATRICK
IPC: H04L45/74
Abstract: Method and system are provided for assessing response routes in a network of connected nodes wherein a querying node propagates a query through multiple routes of intermediate nodes to a data source node and the data source node returns data to the querying node. The method at a data source node includes: receiving a query instance including metadata with route information of the route of intermediate nodes in the network that the query instance has travelled through from a querying node to the data source node; comparing the route information to a route policy, e.g. whether the intermediate nodes are trusted; and responding to a query instance which meets the route policy by returning the query response via the route of intermediate nodes of the query instance.
-
公开(公告)号:IN2291CHN2014A
公开(公告)日:2015-06-19
申请号:IN2291CHN2014
申请日:2014-03-26
Applicant: IBM
Inventor: STONE PAUL DAVID , DANTRESSANGLE PATRICK , BENT GRAHAM ANTHONY
Abstract: A method of operating a hypercube network of processing devices comprises determining that a plurality of the processing devices are storing data to be processed at a single processing device obtaining the addresses of the plurality of processing devices storing the data to be processed determining the most common number for each digit of the addresses of the plurality of processing devices storing the data to be processed generating a new address comprising the determined most common number for each digit and transferring the data to be processed to the processing device with the generated new address.
-
公开(公告)号:GB2512062A
公开(公告)日:2014-09-24
申请号:GB201304916
申请日:2013-03-18
Applicant: IBM
Inventor: HARRIES DOMINIC PETER , BENT GRAHAM ANTHONY
Abstract: The application aims to solve the problem of the prior art Kerberos authentication protocol when a service to fulfill a clients request is not known in advance. Disclosed is a method, apparatus and computer program for secure user authentication in a network having a dynamic set of services Di..Dn. The method comprises a client C authenticating with an edge service S; and a client C generating a query key KQ. It further comprises the edge service S issuing a request to the dynamic set of services Di ..Dn the request comprising (i) an identifier associated with the client C, the identifier being encrypted with a query key KQ, (ii) a private portion Rpriv of the request being encrypted with a query key KQ and (iii) a public portion Rpub, of the request. One or more of said dynamic set of services Di..Dn, having ascertained from said public portion Rpub, of the request that it is able to respond to the request, responds to the edge service S with (i) an identifier Dx, associated with the one or more of said dynamic set of services Di..Dn and (ii) the identifier associated with the client C, this identifier being encrypted with the query key KQ. The edge service S authenticates with the one or more of said dynamic set of services Di..D„, that is able to respond to the request, including generating a session key KS,Dx and the edge service S sends the query key KQ to said one or more of said dynamic set of services Di..Dn encrypted using a session key KS,Dx.
-
公开(公告)号:GB2508631A
公开(公告)日:2014-06-11
申请号:GB201221940
申请日:2012-12-06
Applicant: IBM
Inventor: BENT GRAHAM ANTHONY , BERMAN THOMAS JAMES CHRISTOPHER , DANTRESSANGLE PATRICK , VYVYAN DAVID ROBNETT
Abstract: A query is propagated from a querying node to a destination node in a network of connected nodes. At least one of the nodes is designated as a delay node. The query is transmitted 4.1 from the querying node to one or more connected nodes. Each node which receives the query retransmits the query 4.4 to a connected node the first time that the query is received. The receiving and retransmitting of the query is repeated for each node receiving the query until the query is received at the destination node 4.5. At each node which is designated as a delay node a delay is applied 4.3 prior to retransmitting. The network may be a federated database made up of a number of interconnected databases and the delay nodes may be non-trusted nodes.
-
-
-