BLOCKIERUNGSFREIES ROUTING IN FAT-TREE-NETZWERKEN

    公开(公告)号:DE102013111341A1

    公开(公告)日:2014-06-18

    申请号:DE102013111341

    申请日:2013-10-15

    Applicant: IBM

    Abstract: Es werden Verfahren und eine Vorrichtung zum Routing von Datenpaketen zwischen Source- und Destination-Switches 1 in einem Fat-Tree-Netzwerk 10 bereitgestellt. Es wird für jedes Paket eine Route mit drei oder weniger Routing-Phasen ausgewählt, derart, dass die Route dem kürzesten Pfad über das Netzwerk 10 zwischen dem Source- und dem Destination-Switch folgt. Das Datenpaket wird von dem Source-Switch an den Destination-Switch über die besagte Route auf einem von einem ersten und einem zweiten virtuellen Kanal gesendet, bis die Route eine vorgegebene einer Abwärts-Aufwärts-Umkehrung oder einer Aufwärts-Abwärts-Umkehrung aufweist. Wenn die Route die vorgegebene einer Abwärts-Aufwärts-Umkehrung oder einer Aufwärts-Abwärts-Umkehrung aufweist, wird das Datenpaket über die Route auf dem ersten virtuellen Kanal bis zu Switch 1 gesendet, an dem die Umkehrung auftritt, und ab diesem Switch auf dem zweiten virtuellen Kanal gesendet. Dadurch wird volle Konnektivität in Fat-Tree-Netzwerken mit einer blockierungsfreien Funktion bereitgestellt. Direkte Fat-Tree-Netzwerke, in denen Endknoten mit Switches in einer Vielzahl von Ebenen der Fat-Tree-Topologie verbunden sind, werden ebenfalls bereitgestellt.

    Postponing entropy depletion in key management systems with hardware security modules

    公开(公告)号:GB2581308A

    公开(公告)日:2020-08-12

    申请号:GB202007960

    申请日:2018-10-19

    Applicant: IBM

    Abstract: Embodiments of the invention provide a computer-implemented method for managing cryptographic objects in a key management system. This system comprises a set of one or more hardware security modules (HSMs), as well as clients interacting with the HSMs on behalf of users who interact with the clients. The method comprises monitoring, for each HSM of the set, an entropy pool and/or a load at each HSM. The entropy pool of a HSM is the entropy that is available at this HSM for generating cryptographic objects. The load induced at a HSM is the load due to the users interacting with the clients to obtain cryptographic objects. Cryptographic objects are generated, at each HSM, according to the monitored entropy pool and/or load. The extent to which such objects are generated depends on the monitored entropy pool and/or load.

    Secure, multi-level access to obfuscated data for analytics

    公开(公告)号:GB2595167A

    公开(公告)日:2021-11-17

    申请号:GB202111724

    申请日:2020-02-11

    Applicant: IBM

    Abstract: In a computer-implemented method for providing obfuscated data to users, first, a user request to access data is received; then, an authorization level associated with the request received is identified. Next, obfuscated data is accessed in a protected enclave, which data corresponds to the request received. The data accessed has been obfuscated with an obfuscation algorithm that yields a level of obfuscation compatible with the authorization level identified. Finally, the obfuscated data accessed is provided to the user, from the protected enclave. Related systems and computer program products are also disclosed.

    Postponing entropy depletion in key management systems with hardware security modules

    公开(公告)号:GB2581308B

    公开(公告)日:2021-02-17

    申请号:GB202007960

    申请日:2018-10-19

    Applicant: IBM

    Abstract: Embodiments of the invention provide a computer-implemented method for managing cryptographic objects in a key management system. This system comprises a set of one or more hardware security modules (HSMs), as well as clients interacting with the HSMs on behalf of users who interact with the clients. The method comprises monitoring, for each HSM of the set, an entropy pool and/or a load at each HSM. The entropy pool of a HSM is the entropy that is available at this HSM for generating cryptographic objects. The load induced at a HSM is the load due to the users interacting with the clients to obtain cryptographic objects. Cryptographic objects are generated, at each HSM, according to the monitored entropy pool and/or load. The extent to which such objects are generated depends on the monitored entropy pool and/or load.

Patent Agency Ranking