-
公开(公告)号:US10862900B2
公开(公告)日:2020-12-08
申请号:US16170494
申请日:2018-10-25
申请人: Dell Products, L.P.
发明人: Elie Antoun Jreij , Choudary Maddukuri , Ajeesh Kumar , Kala Sampathkumar , Pablo R. Arias , Rama Rao Bisa
摘要: Embodiments provide methods and systems for detecting rogue endpoints on a device management bus. A communications controller configured as a bus owner initiates discovery of managed devices coupled to the bus and generate a unique identifier for each managed device. The communications controller transmits a bus configuration message to the managed devices, including the respective unique identifiers. The managed devices are configured as bus endpoints based on the bus configuration message. The managed devices also capture the bus address of the communications controller from the received bus configuration message. Messages received by a managed device are authenticated as originating from the communications controller if the messages include the unique identifier provided to that managed device. The messages may be further authenticated by comparing the bus address of the message sender against the captured bus address of the communications controller.
-
公开(公告)号:US10853211B2
公开(公告)日:2020-12-01
申请号:US16170290
申请日:2018-10-25
申请人: Dell Products, L.P.
发明人: Chandrashekar Nelogal , Rama Rao Bisa , Manjunath Vishwanath , Pavan Kumar Gavvala , Prakash Balasaheb Pawar
摘要: Multiple IHSs (Information Handling Systems) may be installed as components of a chassis that has access to a plurality of storage devices via a chassis management controller. An IHS requests configuration of a virtual storage profile, such as a RAID configuration. A remote access controller of the IHS determines physical storage requirements for implementing the requested virtual storage profile. Based on the physical storage requirements, the chassis management controller selects storage devices from idle storage devices mapped to one of the storage controllers installed in one of the IHSs supported by a chassis management controller. The selected storage devices are mapped to the storage controller and used to implement the virtual storage profile. The chassis management controller manages a global pool of spares from the idle storage device for virtual storage profiles supported by the supported storage controllers.
-
公开(公告)号:US10853204B2
公开(公告)日:2020-12-01
申请号:US16171528
申请日:2018-10-26
申请人: Dell Products, L.P.
发明人: Rama Rao Bisa , Chitrak Gupta , Mohan Murali Gurram , Komal Dhote , Suresh Vijaykumar , Prasanna Kumar Sahoo
摘要: Embodiments are described for detecting and recovering from an inoperable device management bus. A remote management controller is configured to offload device management bus transactions that use a messaging protocol. The messing protocol transactions are offloaded to a bus protocol controller that is responsible for managing bus operations using the messaging protocol. The bus protocol controller updates a set of bus status counters stored in a shared memory based on the processing of the offloaded messaging protocol transactions. The remote management controller processes device management bus transactions that use a bus protocol and updates the bus status counters based on the status of the bus protocol transactions. The remote management controller determines the status of the device management bus based on the bus status counters in shared memory, if the device management bus is inoperable, resets the remote management controller.
-
公开(公告)号:US20200244632A1
公开(公告)日:2020-07-30
申请号:US16256792
申请日:2019-01-24
申请人: Dell Products L.P.
发明人: Chitrak Gupta , Shinose Abdul Rahiman , Sushma Basavarajaiah , Mukund P. Khatri , Elie Antoun Jreij , Rama Rao Bisa , Kala Sampathkumar
摘要: A redundant key management system includes a key management system coupled to a plurality of server devices through a network. A first server device includes a managed device coupled to a first remote access controller device that receive a device locking key from the key management system and uses it to lock the managed device. The first remote access controller device then encrypts the device locking key, broadcasts the encrypted device locking key through the network to a second remote access controller device in a second server device, and erases the device locking key. Subsequently, the first remote access controller device transmits a request to retrieve the encrypted device locking key. When the first remote access controller receives the encrypted device locking key from the second remote access controller device, it decrypts the encrypted device locking key and uses the resulting device locking key to unlock the managed device.
-
公开(公告)号:US20200242052A1
公开(公告)日:2020-07-30
申请号:US16258403
申请日:2019-01-25
申请人: Dell Products L.P.
摘要: A locking key secondary access system includes a key management system coupled to a secondary locking key access device and a server device via a network. The server device includes a managed device. The server device receives a request to unlock the managed device, and determines that a first access path via a first communication subsystem and through the network to the key management system is unavailable. In response, the server device provides locking key request information via a second communication subsystem to the secondary locking key access device. The secondary locking key access device may use the locking key information to retrieve a locking key for the managed device from the key management system. The secondary locking key access device sends the locking key to the server device via the second communication subsystem, and the server device uses the locking key to unlock the managed device.
-
公开(公告)号:US20200133805A1
公开(公告)日:2020-04-30
申请号:US16171528
申请日:2018-10-26
申请人: Dell Products, L.P.
发明人: Rama Rao Bisa , Chitrak Gupta , Mohan Murali Gurram , Komal Dhote , Suresh Vijaykumar , Prasanna Kumar Sahoo
摘要: Embodiments are described for detecting and recovering from an inoperable device management bus. A remote management controller is configured to offload device management bus transactions that use a messaging protocol. The messing protocol transactions are offloaded to a bus protocol controller that is responsible for managing bus operations using the messaging protocol. The bus protocol controller updates a set of bus status counters stored in a shared memory based on the processing of the offloaded messaging protocol transactions. The remote management controller processes device management bus transactions that use a bus protocol and updates the bus status counters based on the status of the bus protocol transactions. The remote management controller determines the status of the device management bus based on the bus status counters in shared memory, if the device management bus is inoperable, resets the remote management controller.
-
公开(公告)号:US20200133355A1
公开(公告)日:2020-04-30
申请号:US16170357
申请日:2018-10-25
申请人: Dell Products, L.P.
发明人: Robert G. Bassman , Manjunath Vishwanath , Andre James Dumouchelle , Pavan Kumar Gavvala , Rama Rao Bisa , Johan Rahardjo
IPC分类号: G06F1/20 , G06F13/40 , G06F13/16 , G06F9/4401
摘要: Periods of interoperability of sideband buses prevent effective management of managed devices by a remote access controller. Embodiments avoid periods of inoperability of sideband buses and recover the sideband bus without resetting the managed devices or the IHS (Information Handling System). The remote access controller configures timer and transmits the timer to a managed device. The managed device monitors the sideband for messages for the remote access controller. If no messages are received before expiration of the timer, the managed device resets its sideband bus endpoint, without resetting the managed device.
-
公开(公告)号:US10255201B2
公开(公告)日:2019-04-09
申请号:US15157916
申请日:2016-05-18
申请人: DELL PRODUCTS, L.P.
发明人: Dinesh Kunnathur Ragupathi , Rama Rao Bisa , Pavan Kumar , Syama Sundar Poluri , Sanjeev S. Dambal , Satyajit Dipakbhai Desai , Kevin Warren Mundt
摘要: A method and system provide local key management for storage enclosures. The method includes retrieving first security content from a security vault of a service processor, then dynamically detecting a hardware interface communicatively coupled to the service processor. A data storage device, communicatively coupled to the hardware interface is dynamically detected. A dynamic determination is made as to whether the data storage device is a self-encrypting capable data storage device. In response to the data storage device being a self-encrypting capable data storage device, a second security content is retrieved from the data storage device, and a validation regarding an association between the first security content and the second security content is made. Finally, in response to a positive validation of the association between the first security content and the second security content, security keys are transmitted to the data storage device, and access to the data storage device is enabled.
-
-
-
-
-
-
-