AUTOMATIC CONFIGURATION OF SUB-DISPLAY POSITIONS IN MULTI-STREAM TRANSPORT MODE

    公开(公告)号:US20240364957A1

    公开(公告)日:2024-10-31

    申请号:US18307315

    申请日:2023-04-26

    IPC分类号: H04N21/431 G09G5/00 H04N21/41

    摘要: In response to detecting that a display device is in a multi-stream transport mode, an information handling system determines a display partition layout of the display device. The system transmits setup display patterns according to the display partition layout of the display device, wherein the setup display patterns include a first display pattern and a second display pattern, wherein the first display pattern is associated with a first display partition, and wherein the second display pattern is associated with a second display partition. In response to determining that the first display pattern should be associated with the second display partition and that the second display pattern should be associated with the first display partition, the system associates the first display pattern with the second display partition and associates the second display pattern with the first display partition.

    SYSTEM AND METHOD FOR SELECTIVE REFRESH OF SECURITY DATA RESPONSIVE TO COMPROMISE EVENT

    公开(公告)号:US20240364752A1

    公开(公告)日:2024-10-31

    申请号:US18308240

    申请日:2023-04-27

    IPC分类号: H04L9/40 H04L9/32 H04L67/1087

    摘要: Methods and systems for securing distributed systems are disclosed. The distributed systems may include data processing systems subject to compromise by malicious entities. If compromised, the data processing systems may impair the services provided by the distributed system. To secure the distributed systems, the data processing systems may implement a security framework. The security framework may utilize a hierarchy that defines authority for validating trusted entities. The hierarchy may vest authority across the distributed system, and may be based on a reputation (e.g., weighted reputation) of each of the data processing systems within the distributed system. If the reputation of a data processing system meets criteria, the data processing system may be treated as being compromised and a local refresh of security data may be performed. Consequently, the impact of compromise of the data processing system may be limited by the distributed authority.

    VALIDATION TRAPS TO DETECT ADVERSARY ATTEMPTS TO SECURE ACCESS

    公开(公告)号:US20240364740A1

    公开(公告)日:2024-10-31

    申请号:US18306423

    申请日:2023-04-25

    IPC分类号: H04L9/40 H04L9/08

    摘要: Reinstating access to a system of an admin whose certificate is invalid or expired and detecting an attack are disclosed. A requestor, who may be an admin whose certificate is expired or invalid, may send a request for reinstatement to validators. The system may provide honeypot validators in addition to legitimate validators. When the request is received by a honeypot validator or if the honeypot validator is requested to provide their share or a secret, the requestor is determined to be malicious and a protective operation or action is performed.

    SYSTEM AND METHOD FOR SECURITY MANAGEMENT IN DISTRIBUTED SYSTEMS

    公开(公告)号:US20240364734A1

    公开(公告)日:2024-10-31

    申请号:US18308225

    申请日:2023-04-27

    IPC分类号: H04L9/40 H04L9/32

    摘要: Methods and systems for securing distributed systems are disclosed. The distributed systems may include data processing systems subject to compromise by malicious entities. If compromised, the data processing systems may impair the services provided by the distributed system. To secure the distributed systems, the data processing systems may implement a security framework. The security framework may utilize a hierarchy that defines authority for validating trusted entities. The hierarchy may vest authority across the distributed system. Consequently, the impact of compromise of a data processing system may be limited by the distributed authority.

    SYSTEM AND METHOD FOR SECURING DATA PROCESSING SYSTEMS THROUGH RECOGNITION AND ANALYSIS OF COMMANDS

    公开(公告)号:US20240364534A1

    公开(公告)日:2024-10-31

    申请号:US18309266

    申请日:2023-04-28

    IPC分类号: H04L9/32 G06F8/65

    CPC分类号: H04L9/3247 G06F8/65

    摘要: Methods and systems for securing data processing systems are disclosed. The data processing systems may be secured through analysis of recognition and simulation of commands that may be run on data processing systems. An analysis of recognition of the command may be used to query if the command has already been simulated for its effects on the data processing system. If the command may have already simulated the command, then the data processing system may know whether to execute the command. Conversely, if the command may not have been simulated, the command may be simulated to understand the effects on the data processing system. In understanding the effects of the command, the data processing system may formulate whether to execute the command.

    HIGHLY REPAIRABLE, NON-SOLDERED USB CONNECTOR

    公开(公告)号:US20240364030A1

    公开(公告)日:2024-10-31

    申请号:US18308745

    申请日:2023-04-28

    IPC分类号: H01R12/75 H01R13/24 H01R43/20

    摘要: Embodiments of a highly-repairable, non-soldered Universal Serial Bus (USB) connector are described. In some non-limiting embodiments, a USB connector assembly comprises: a mounting bracket configured to removably attach to a printed circuit board (PCB); and a plurality of spring contacts disposed at least in part within the mounting bracket, wherein the spring contacts are configured to electrically connect to corresponding ones of a plurality of electrical contact pads of the PCB, and wherein an individual spring contact of the plurality of spring contacts applies a contact force to a corresponding one of the electrical contact pads of the PCB upon assembly of the mounting bracket onto the PCB.

    PREPROCESSING TO REDUCE ANNEALING PROCESSOR SEARCH SPACE

    公开(公告)号:US20240362295A1

    公开(公告)日:2024-10-31

    申请号:US18307963

    申请日:2023-04-27

    IPC分类号: G06F17/11

    CPC分类号: G06F17/11

    摘要: One example method includes accessing a parameter space including a set of binary inputs for an unconstrained objective function. The set of binary inputs are solved at a CPU or GPU using an algorithm that is different from the unconstrained objective function to generate a target solution. A subset of the binary inputs is selected. The unconstrained objective function is solved using the selected subset of binary inputs to generate a solution for each of the selected subset of binary inputs. A maximum possible change for each of the selected subset of binary inputs is determined. The maximum possible change defines a subspace including related binary inputs that are located around each of the selected subset of binary inputs. Those binary inputs and their corresponding related binary inputs whose solutions are greater than the target solution are removed from the parameter space to thereby generate a reduced parameter space.

    SYSTEMS AND METHODS FOR FAULT-TOLERANT WITNESS SLEDS

    公开(公告)号:US20240362132A1

    公开(公告)日:2024-10-31

    申请号:US18307893

    申请日:2023-04-27

    IPC分类号: G06F11/20

    CPC分类号: G06F11/2094 G06F2201/85

    摘要: Systems and methods provide witness sled hardware installed in a chassis and supported during network failures using management resources of the chassis. A chassis may include data storage devices and Information Handling Systems (IHSs), each configured to store data redundantly to the data storage devices, such as part of a vSAN (Virtual Storage Area Network). The witness sled is configured to provide witness functions, such as to arbitrate discrepancies in the redundantly stored data. The chassis also includes a chassis management controller (CMC) configured to initiate a connection with the witness sled via a management signaling pathway in response to a notification indicating a network fault in a high-speed connection used by the IHSs in communicating with the witness sled. The CMC receives witness transactions from theses IHSs and utilizes the connection initiated via the management signaling pathway to submit the transactions for processing by the witness sled.

    COMMUNICATING AND TAKING ACTION BASED ON CONTEXTS FOR MESSAGES BETWEEN USERS IN COPY MANAGEMENT SYSTEMS

    公开(公告)号:US20240362125A1

    公开(公告)日:2024-10-31

    申请号:US18495098

    申请日:2023-10-26

    IPC分类号: G06F11/14

    摘要: System determines first context of messages between copy management system users and creates snapshot of copy management content part, which is displayed by user interface, and selected by system user as context for subsequent message. System creates hyperlink in message to snapshot that depicts copy management content part and stores user entries for tag that identifies at least one intended recipient of message, time when message is available for intended recipient(s), and text for message. System sends message at time to intended recipient(s) via internal communication channel of system. In response to recipient of message selecting message's hyperlink to snapshot, system outputs context for message to recipient's user interface, which enables recipient to respond to message. If second context of messages between copy management system users matches first context of messages, then information requested in message after first context of messages is conveyed to at least one user interface.