KEY MANAGEMENT AND RECOVERY
    1.
    发明申请

    公开(公告)号:US20200244454A1

    公开(公告)日:2020-07-30

    申请号:US16262302

    申请日:2019-01-30

    Abstract: A system includes a management system, a managed system that is coupled to the management system through a network. The managed system comprises a managed device, a key identifier storage, a first managed device locking system coupled to the managed device and the key identifier storage, and a second managed device locking system coupled to the managed device, the key identifier storage, and the first managed device locking system. The first managed device locking system is configured to store a key identifier of the managed device in the key identifier storage and to provide access to a locking key of the managed device based upon the key identifier of the managed device, stored in a management system. The second managed device locking system is configured to monitor the managed device for an event that triggers unlocking the managed device, monitor operating status of the first managed device locking system. In some embodiments, where the first managed device locking system is unavailable, the second managed device locking system is configured to provide access to the locking key of the managed device based upon the key identifier of the managed device, stored in the management system.

    Software filtering of redundant sideband device management bus communications

    公开(公告)号:US10606784B1

    公开(公告)日:2020-03-31

    申请号:US16170413

    申请日:2018-10-25

    Abstract: Sideband device management bus messages are filtered using software operations in order to minimize dropped messages and to maintain the bus in an operable state. Redundant sideband device management buses are utilized in order to provide fail-over transmission of messages in scenarios where one of the buses becomes inoperable. Multi-packet messages are transmitted to managed devices via the sideband bus connections. If an inoperable state is detected in a sideband bus connection during transmission of a multi-packet message, the portion of the multi-packet message not received by the managed device is transmitted via a redundant sideband bus connection with the managed device. Software filtering of bus transactions utilizes a circular DMA buffer for storing all incoming transactions. Transactions of interest are copied to buffers associated with specific endpoints for processing.

    Systems and methods for revoking and replacing signing keys

    公开(公告)号:US10003463B2

    公开(公告)日:2018-06-19

    申请号:US14885082

    申请日:2015-10-16

    CPC classification number: H04L9/0891

    Abstract: In accordance with embodiments of the present disclosure, an information handling system may include a processor, an information handling resource communicatively coupled to the processor, and a management controller communicatively coupled to the processor and the information handling resource and configured to provide out-of-band management of the information handling system. The management controller may further configured to receive a message indicating that an existing private key associated with the information handling resource is compromised, the message including a replacement public key for replacing an existing public key associated with the information handling resource and associated with the existing private key and responsive to the message, cause the existing public key associated with the information handling resource to be replaced with the replacement public key.

    STORAGE CONTROLLER FAILOVER SYSTEM
    4.
    发明申请

    公开(公告)号:US20180107572A1

    公开(公告)日:2018-04-19

    申请号:US15841083

    申请日:2017-12-13

    Abstract: A storage controller failover system includes servers, storage controllers coupled to storage subsystems, and a switching system coupling the servers to the storage controllers. A storage controller configurations and storage controller caches for each of the storage controllers are stored in one or more database. A failure is detected of a first storage controller that has provided first storage communications along a first path between a first server and a first storage subsystem and, in response, a second storage controller that is configured to take over the first storage communications from the first storage controller is determined based on its second storage controller configuration. A first storage controller cache for the first storage controller is provided to the second storage controller, and the second storage controller is caused to provide the first storage communications along a second path between the first server and the first storage subsystem.

    Redundant device locking key management system

    公开(公告)号:US11252138B2

    公开(公告)日:2022-02-15

    申请号:US16256792

    申请日:2019-01-24

    Abstract: A redundant key management system includes a key management system coupled to a plurality of server devices through a network. A first server device includes a managed device coupled to a first remote access controller device that receive a device locking key from the key management system and uses it to lock the managed device. The first remote access controller device then encrypts the device locking key, broadcasts the encrypted device locking key through the network to a second remote access controller device in a second server device, and erases the device locking key. Subsequently, the first remote access controller device transmits a request to retrieve the encrypted device locking key. When the first remote access controller receives the encrypted device locking key from the second remote access controller device, it decrypts the encrypted device locking key and uses the resulting device locking key to unlock the managed device.

    SYSTEMS AND METHODS FOR USE OF A FIRMWARE UPDATE PROXY

    公开(公告)号:US20240095020A1

    公开(公告)日:2024-03-21

    申请号:US17933238

    申请日:2022-09-19

    CPC classification number: G06F8/65 G06F8/63 G06F9/544

    Abstract: Embodiments of systems and methods to provide a firmware update to devices configured in a redundant configuration in an Information Handling System (IHS) are disclosed. In an illustrative, non-limiting embodiment, an IHS may include computer-executable instructions to receive a target firmware update image associated with a first of the devices, establish a shared memory communication channel with the first device, store the target firmware update image in the shared memory communication channel, and using the shared memory communication channel, perform a firmware update on the first device using the stored target firmware update image.

Patent Agency Ranking