Determining whether short or long message format is used to communicate zone information in network

    公开(公告)号:GB2537570A

    公开(公告)日:2016-10-19

    申请号:GB201613990

    申请日:2015-02-03

    Applicant: IBM

    Abstract: Provided are computer program product, system, and method for determining whether a short or long message format is used to communicate zone information in a network. One large zone is implemented for end devices coupled to ports of data forwarders. A first formatted zoning distribution message is generated for the data forwarders identifying the data forwarder and ports on the data forwarders in the one large zone in response to determining that the data forwarder supports the short message format. A second formatted zoning distribution message is generated identifying the data forwarder, the ports on the data forwarders, and additional fields of information on the ports not included in the first formatted zoning distribution message in response to determining that the data forwarder does not support the short message format; and sending the generated first formatted or second formatted zoning distribution message to the data forwarder.

    Establishing a security association and authentication to secure communication between an initiator and a responder

    公开(公告)号:GB2603666A

    公开(公告)日:2022-08-10

    申请号:GB202204407

    申请日:2020-09-08

    Applicant: IBM

    Abstract: Provided are a computer program product, system and method embodiments for secure communication between an initiator and a responder over a network. The initiator sends a security association initialization message to the responder to establish a security association including key material used to generate a key for the security association. In response to receiving a security association initialization response to accept the security association, the initiator sends an authentication message to the responder to establish authentication between the responder and the initiator. In response to receiving an authentication message response to the authentication message, the initiator is programmed with the security association. An authentication done message is received from the responder after receiving the authentication message response. The initiator activates the security association to use the key to secure communication between the responder and initiator in response to receiving the authentication done message.

Patent Agency Ranking