SYSTEMS AND METHODS FOR DEPLOYMENT OF WORKSPACE ENDORSEMENTS

    公开(公告)号:US20240250947A1

    公开(公告)日:2024-07-25

    申请号:US18157094

    申请日:2023-01-20

    CPC classification number: H04L63/102 H04L63/08 H04L63/107

    Abstract: Systems and methods provide endorsement of workspaces operating on Information Handling Systems (IHSs). A primary workspace definition is received by an IHS from a remote orchestrator. A primary workspace is instantiated on the IHS based upon the primary workspace definition, where the primary workspace provides access to a protected resource. The primary workspace definition received from the remote orchestrator identifies applications for operation within the primary workspace and also includes one or more endorsements for each of the applications. Instructions for operation of a applications are validated against an endorsement from the workspace definition. Applications are initiated for use within the workspace upon successful validation of the instructions.

    Multilayer encryption for user privacy compliance and corporate confidentiality

    公开(公告)号:US12003623B2

    公开(公告)日:2024-06-04

    申请号:US17126070

    申请日:2020-12-18

    CPC classification number: H04L9/0852 G06F9/45558 H04L9/14 G06F2009/45587

    Abstract: Systems and methods for multilayer encryption for user privacy compliance and corporate confidentiality are described. In some embodiments, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the IHS to: transmit, from a workspace instantiated by a local management agent to a portal managed by an enterprise: (i) a request to store a once-encrypted document, and (ii) an indication that the once-encrypted document is encrypted with a controlvault key; receive, from the portal at the workspace, a request to encrypt the once-encrypted document with an enterprise-issued cryptographic key to produce a twice-encrypted document; and transmit, from the workspace to the portal, a copy of the twice-encrypted document.

    Runtime device firmware verification using trust chaining

    公开(公告)号:US11704402B2

    公开(公告)日:2023-07-18

    申请号:US16526467

    申请日:2019-07-30

    CPC classification number: G06F21/44 G06F9/4411 G06F21/575

    Abstract: Systems and methods are disclosed herein that may implement an information handling system including a gateway and a peripheral device monitor. The gateway may interface peripheral devices and control access of host resources of the information handling system by any of the peripheral devices. The peripheral device monitor may detect connection of an unverified peripheral device to the gateway, perform a trust verification process with the unverified peripheral device, control the gateway to enable access of the host resources by the unverified peripheral device when the unverified peripheral device becomes verified, and control the gateway to prevent access to the host resources by the unverified peripheral device when the unverified peripheral device fails the trust verification process. The trust verification process may include validating a device certificate and verifying a digest of boot code of the peripheral device. The peripheral device monitor may perform a verification failure procedure when the unverified peripheral device fails the trust verification process.

Patent Agency Ranking