US 11,687,629 B2
Method for data protection in a data processing cluster with authentication
Yueqiang Cheng, Sunnyvale, CA (US); and Hefei Zhu, Sunnyvale, CA (US)
Assigned to BAIDU USA LLC, Sunnyvale, CA (US); and KUNLUNXIN TECHNOLOGY (BEIJING) COMPANY LIMITED, Beijing (CN)
Filed by Baidu USA LLC, Sunnyvale, CA (US); and KUNLUNXIN TECHNOLOGY (BEIJING) COMPANY LIMITED, Beijing (CN)
Filed on Jun. 12, 2020, as Appl. No. 16/899,880.
Prior Publication US 2021/0390163 A1, Dec. 16, 2021
Int. Cl. H04L 9/40 (2022.01); G06F 21/30 (2013.01); G06F 9/50 (2006.01); H04L 9/08 (2006.01); G06F 9/46 (2006.01)
CPC G06F 21/30 (2013.01) [G06F 9/468 (2013.01); G06F 9/5061 (2013.01); H04L 9/0816 (2013.01)] 17 Claims
OG exemplary drawing
 
1. A computer-implemented method of configuring a cluster of data processing accelerators (DPAs) communicatively coupled to a host device, the method comprising:
receiving, by a first DPA in the cluster, from a second DPA in the cluster, a request for the second DPA to access a resource of the first DPA;
in response to determining that the resource requested by the second DPA is a sensitive resource of the first DPA, denying access to the resource requested by the second DPA; and
otherwise authenticating the second DPA, by the first DPA, and
in response to determining that the second DPA is authenticated, permitting access to the resource requested by the second DPA, and
in response to determining that the second DPA is not authenticated, breaking a communication link between the first DPA and the second DPA.