TRANSFER OF FIRMWARE UPDATES USING AN IN-BAND INTERFACE

    公开(公告)号:US20210286608A1

    公开(公告)日:2021-09-16

    申请号:US16813888

    申请日:2020-03-10

    Abstract: Systems and methods for transferring firmware updates using an in-band interface are described. In an embodiment, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the IHS to: receive a firmware update package having a payload; create a namespace in a persistent memory; copy the payload to a segment of the persistent memory associated with the namespace; and write, to an Extensible Firmware Interface (EFI) variable, an Emulator Device Path (EDP) pointing to the payload.

    System for Projecting Warranty Cost for Electronic Information System Based on Customer-Specific Usage Data

    公开(公告)号:US20200320539A1

    公开(公告)日:2020-10-08

    申请号:US16376577

    申请日:2019-04-05

    Abstract: A method, system and computer-usable medium are disclosed for determining a projected warranty cost for use of an electronic product comprising: generating a warranty cost projection model based on historical usage data associated with the electronic product; acquiring customer specific usage data for the electronic product of an existing customer, wherein the customer specific usage data includes usage data acquired from the electronic product during operation of the electronic product by the existing customer; and determining a warranty cost projection for use of the electronic product by the existing customer, wherein the warranty cost projection is determined by applying the customer specific usage data to the warranty cost projection model.

    SYSTEMS AND METHODS FOR VALIDATED VULNERABILITY PROOFING

    公开(公告)号:US20240232374A9

    公开(公告)日:2024-07-11

    申请号:US18048103

    申请日:2022-10-20

    CPC classification number: G06F21/577 G06F8/65

    Abstract: Systems and methods provided for vulnerability proofing updates to an IHS (Information Handling System). Upon receipt of an update to hardware component configurations of the IHS, vulnerability proofing requirements for modifications to the hardware component configurations are retrieved, including requirements for modifications that are validated for operation of a computational workload by the IHS. Based on the vulnerability proofing requirements, catalogs specifying known vulnerabilities of hardware components are consulted to determine whether the modifications are identified as vulnerable in the catalogs and whether remediations to the identified vulnerabilities are validated for operation of the workload. If the modifications are not identified as vulnerable in the catalogs, the update is transmitted to the IHS. If the modifications are identified as vulnerable in the catalogs and remediations to the identified vulnerabilities are not validated for operation of the workload, the update is terminated.

    FIRMWARE ACTIVATION IN A RAID STORAGE ENVIRONMENT

    公开(公告)号:US20210303217A1

    公开(公告)日:2021-09-30

    申请号:US16832462

    申请日:2020-03-27

    Abstract: Methods, systems, and computer programs encoded on computer storage medium, for performing firmware activation, including obtaining input/output (I/O) metrics of the disks; determining an index value for the disk based on a disk weighted index (DWI); determining a DWI value for the array of disks based on the index value for each disk of the array of disks; comparing the DWI value for the array of disks to a DWI threshold; determining that the DWI value for a first array of disks is greater than the DWI threshold, and in response: aggregating the I/O metrics for each disk of the first array of disks; comparing the aggregated I/O metrics for the first array of disks to an activation threshold; determining that the aggregated I/O metrics for the first array of disks is less than the activation threshold, and in response triggering firmware activation for the first array of disks.

    Systems and methods for validated vulnerability proofing

    公开(公告)号:US12135794B2

    公开(公告)日:2024-11-05

    申请号:US18048103

    申请日:2022-10-20

    Abstract: Systems and methods provided for vulnerability proofing updates to an IHS (Information Handling System). Upon receipt of an update to hardware component configurations of the IHS, vulnerability proofing requirements for modifications to the hardware component configurations are retrieved, including requirements for modifications that are validated for operation of a computational workload by the IHS. Based on the vulnerability proofing requirements, catalogs specifying known vulnerabilities of hardware components are consulted to determine whether the modifications are identified as vulnerable in the catalogs and whether remediations to the identified vulnerabilities are validated for operation of the workload. If the modifications are not identified as vulnerable in the catalogs, the update is transmitted to the IHS. If the modifications are identified as vulnerable in the catalogs and remediations to the identified vulnerabilities are not validated for operation of the workload, the update is terminated.

    Firmware activation in a RAID storage environment

    公开(公告)号:US11314463B2

    公开(公告)日:2022-04-26

    申请号:US16832462

    申请日:2020-03-27

    Abstract: Methods, systems, and computer programs encoded on computer storage medium, for performing firmware activation, including obtaining input/output (I/O) metrics of the disks; determining an index value for the disk based on a disk weighted index (DWI); determining a DWI value for the array of disks based on the index value for each disk of the array of disks; comparing the DWI value for the array of disks to a DWI threshold; determining that the DWI value for a first array of disks is greater than the DWI threshold, and in response: aggregating the I/O metrics for each disk of the first array of disks; comparing the aggregated I/O metrics for the first array of disks to an activation threshold; determining that the aggregated I/O metrics for the first array of disks is less than the activation threshold, and in response triggering firmware activation for the first array of disks.

    SYSTEMS AND METHODS FOR VALIDATED VULNERABILITY PROOFING

    公开(公告)号:US20240134997A1

    公开(公告)日:2024-04-25

    申请号:US18048103

    申请日:2022-10-19

    CPC classification number: G06F21/577 G06F8/65

    Abstract: Systems and methods provided for vulnerability proofing updates to an IHS (Information Handling System). Upon receipt of an update to hardware component configurations of the IHS, vulnerability proofing requirements for modifications to the hardware component configurations are retrieved, including requirements for modifications that are validated for operation of a computational workload by the IHS. Based on the vulnerability proofing requirements, catalogs specifying known vulnerabilities of hardware components are consulted to determine whether the modifications are identified as vulnerable in the catalogs and whether remediations to the identified vulnerabilities are validated for operation of the workload. If the modifications are not identified as vulnerable in the catalogs, the update is transmitted to the IHS. If the modifications are identified as vulnerable in the catalogs and remediations to the identified vulnerabilities are not validated for operation of the workload, the update is terminated.

Patent Agency Ranking