Virtualizing secure storage of a baseboard management controller to a host computing device

    公开(公告)号:US12118115B2

    公开(公告)日:2024-10-15

    申请号:US18468075

    申请日:2023-09-15

    CPC classification number: G06F21/6218 G06F16/152

    Abstract: Example implementations relate a system and method for storing configuration files of a host computing device in a secure storage of a Baseboard Management Controller (BMC). The secure storage includes configuration files associated with the host computing device. The BMC is communicatively connected to the host computing device using a communication link. The secure storage is emulated as a storage device to the host computing device. The BMC monitors the secure storage to detect changes in the configuration files. When there is a change in a configuration file, the BMC performs a security action in the host computing device.

    Security dominion of computing device

    公开(公告)号:US12019752B2

    公开(公告)日:2024-06-25

    申请号:US17495562

    申请日:2021-10-06

    CPC classification number: G06F21/572 G06F8/65 G06F21/34

    Abstract: Examples disclosed herein relate to security dominion of a computing device. A management controller of the computing device can access a physical owner token pertaining to a physical owner of the computing device. The management controller can access a security dominion owner token pertaining to a security dominion owner of the computing device. The security dominion owner token tracks accountability for a security feature of the computing device. A security dominion owner associated with the security dominion owner token is initially set to a first entity.

    Secure provisiong of baseboard management controller identity of a platform

    公开(公告)号:US11522723B2

    公开(公告)日:2022-12-06

    申请号:US17188047

    申请日:2021-03-01

    Abstract: Example implementations relate to a method and system for provisioning an identity certificate for a BMC of a platform. Based on the certificate signing request (CSR) received from the BMC, a certificate authority (CA) associated with the platform manufacturer may verify the identity of the security processor and private key of BMC. A cryptographic audit session log between a provisioning service of the platform and the security coprocessor of the platform is received along with the CSR at the CA implemented in a cloud system. The CA verifies the signature on the received cryptographic audit session log. After verification, validation tools at the cloud system determine a first time and second time associated with the security coprocessor. When the difference between the first time and the second time is below an expected time of cryptographic communication, the CSR is considered as a valid request and an identity certificate for the BMC is generated and transmitted to the platform.

    ERASE VERIFICATION FOR A NONVOLATILE MEMORY

    公开(公告)号:US20250077109A1

    公开(公告)日:2025-03-06

    申请号:US18460041

    申请日:2023-09-01

    Abstract: In some examples, a system includes a nonvolatile memory to store information, and a controller subsystem to perform various tasks. The controller subsystem receives, from an entity, an input to trigger an erase verification operation after an erase of a memory region of the nonvolatile memory containing the information. The controller subsystem generates a pseudorandom pattern in response to the input, and writes the pseudorandom pattern to the memory region as part of the erase verification operation. After the writing, the controller subsystem provides, from the nonvolatile memory to the entity, the pseudorandom pattern retrieved from the memory region for verification that the erasing of the information of the memory region has occurred.

    Managing use of management controller secrets based on firmware ownership history

    公开(公告)号:US12069169B2

    公开(公告)日:2024-08-20

    申请号:US17588620

    申请日:2022-01-31

    Abstract: A management controller of a computer platform, determines whether an ownership history of management firmware for the management controller represents multiple owners. The management controller includes a set of one-time programmable elements that represent a first secret. The management controller manages use of the first secret based on the ownership history. The management includes, responsive to determining, by the management controller, that the ownership history represents multiple owners, generating, by the management controller, a second secret to replace the first secret. The management further includes, responsive to determining, by the management controller, that the ownership history represents multiple owners, storing, by the management controller, the second secret in a non-volatile memory and generating, by the management controller, cryptographic keys based on the second secret.

    Authorized device or component determinations

    公开(公告)号:US11409858B2

    公开(公告)日:2022-08-09

    申请号:US16409929

    申请日:2019-05-13

    Abstract: In some examples, a scanner that is to verify a device includes a scanner input/output (I/O) interface to physically and communicatively connect to a device I/O interface of the device. The scanner includes a processor to send an input through the scanner I/O interface to the device, receive, at the scanner I/O interface, an output responsive to the input from the device, the output comprising a cryptographic value based on a cryptographic operation applied on data of the input, and determine whether the device is an authorized device based on the received output.

Patent Agency Ranking