Patent application number | Description | Published |
20080247420 | System and Method for Monitoring Information Handling System Interfaces Through Cables Having Plural Links - A port width module operating in association with SAS controllers determines the operational state of communication across an SAS cable by comparing the number of links at opposing controllers that are capable of supporting communication with the number of links in DWord synchronization. For example, an information handling system capable of communication of four links at an SAS connector communicates in a normal state across two links where the opposing device is a switch that supports only two links at an SAS connector. An LED at the information handling system indicates normal operations with two links in DWord synchronization by receiving the port width of the opposing device, retrieving its own port width, and comparing the port widths with the number of links in DWord synchronization. | 10-09-2008 |
20100107241 | SECURE CACHING OF SERVER CREDENTIALS - A credential caching system includes receiving a set of authentication credentials, storing the set of authentication credentials in a credential cache memory, wherein the credential cache memory is coupled with a management controller, and supplying the set of authentication credentials for automatic authentication during a reset or reboot. In the event of a security breach, the credential caching system clears the set of authentication credentials from the credential cache memory so that the set of authentication credentials may no longer be used for a reset or reboot. | 04-29-2010 |
20100111309 | ENCRYPTION KEY MANAGEMENT SYSTEM AND METHODS THEREOF - During execution of BIOS at an information handling system, a processor communicates with the storage controller via a command line protocol (CLP) communications channel. Via the channel, the processor obtains identification information for storage devices associated with the storage controller. The processor communicates the identification information to a key management client, which obtains encryption keys based on the identification information from a key management server. The processor receives the encryption keys, and communicates them to the storage controller via the CLP communications channel. The CLP communications channel thus provides a convenient and flexible interface for communication of security information prior to execution of an operating system. | 05-06-2010 |
20100185799 | System and Method for Security Configuration - A system and method for accessing and identifying the security parameters of a device in an information handling system is disclosed. A device in a computer system may operate according to a defined security protocol, and multiple security protocols may exist across the devices of the system. In operation, a configuration capability is defined within the PCI Express communications protocol. This capability includes a capabilities data structure through which parameters concerning the security parameters of the device may be identified and passed to a processor. | 07-22-2010 |
20100202617 | System and Method for Recovery Key Management - A system and method for managing the recovery key of a computer system is disclosed. The computer system includes a security layer, and the recovery key is stored locally to a memory location on the computer system, including, as examples, flash memory on the motherboard of the computer system or a USB port on the computer system. In operation, when it becomes necessary for the computer system to authenticate the recovery key, the recovery key may be retrieved from the local memory. The retrieval and storage of the recovery key may be managed by a remote administrator. The recovery key may be stored in a hidden partition in the storage location, and the recovery key may be cryptographically wrapped to add an additional layer of security. | 08-12-2010 |
20120079136 | System and Method for Dynamically Configuring a Target Device - In accordance with the present disclosure, a method for dynamically configuring a target device comprises receiving by one or more ports of a target device one or more initiator identifiers from one or more initiators. The method further comprises determining whether a plurality of ports received initiator identifiers from a common initiator. The method further comprises configuring the plurality of the ports to operate as a single, logical port if the plurality of ports received initiator identifiers from a common initiator. | 03-29-2012 |
20130097681 | SECURE CACHING OF SERVER CREDENTIALS - A credential caching system includes receiving a set of authentication credentials, storing the set of authentication credentials in a credential cache memory, wherein the credential cache memory is coupled with a management controller, and supplying the set of authentication credentials for automatic authentication during a reset or reboot. In the event of a security breach, the credential caching system clears the set of authentication credentials from the credential cache memory so that the set of authentication credentials may no longer be used for a reset or reboot. | 04-18-2013 |
20150058640 | SYSTEM AND METHOD FOR RECOVERY KEY MANAGEMENT - A system and method for managing the recovery key of a computer system is disclosed. The computer system includes a security layer, and the recovery key is stored locally to a memory location on the computer system, including, as examples, flash memory on the motherboard of the computer system or a USB port on the computer system. In operation, when it becomes necessary for the computer system to authenticate the recovery key, the recovery key may be retrieved from the local memory. The retrieval and storage of the recovery key may be managed by a remote administrator. The recovery key may be stored in a hidden partition in the storage location, and the recovery key may be cryptographically wrapped to add an additional layer of security. | 02-26-2015 |