-
公开(公告)号:US20240126845A1
公开(公告)日:2024-04-18
申请号:US18046593
申请日:2022-10-14
申请人: Dell Products L.P.
CPC分类号: G06F21/31 , G06F21/602 , G06F2221/2141
摘要: Systems, devices, and method for managing data processing systems are disclosed. The data processing systems may be capable of operating in various manners. To manage the data processing systems, onboarding processes may be performed to conform the operation of the data processing systems to meet the expectations of owners of the data processing systems. To facilitate onboarding, onboarding payloads may be generated in a domain in which data necessary for onboarding is available. The onboarding payloads may be transferred to data processing systems in domains in which the necessary data is not available to onboard the data processing systems.
-
公开(公告)号:US20240020396A1
公开(公告)日:2024-01-18
申请号:US17864502
申请日:2022-07-14
申请人: Dell Products L.P.
发明人: BRADLEY K. GOODMAN , JOSEPH CAISSE
IPC分类号: G06F21/62
CPC分类号: G06F21/62 , G06F2221/2107
摘要: Methods and systems for managing the operation of data processing systems are disclosed. To manage the operation of data processing systems, diagnostic data may be collected. The diagnostic data may include information regarding the operation of the data processing systems usable to diagnose issues impacting the operation of the data processing systems. The diagnostic data may also include sensitive data that may be undesirable to disclose to third parties. To manage risk associated with distribution of the diagnostic data, the diagnostic data may be subjected to partial redaction and/or dual encryption to manage access to the sensitive data included therein. By redacting and/or dual encrypting portions of the sensitive data, access to the sensitive data after the diagnostic data is distributed may be prevented and/or limited to those parties to which an operator of a data processing system elects to provide decryption data.
-
公开(公告)号:US20240020382A1
公开(公告)日:2024-01-18
申请号:US17864490
申请日:2022-07-14
申请人: Dell Products L.P.
发明人: BRADLEY K. GOODMAN , JOSEPH CAISSE
CPC分类号: G06F21/554 , H04L9/14 , G06F2221/034
摘要: Methods and systems for managing the operation of data processing systems are disclosed. To manage the operation of data processing systems, a security framework may be enforced. The security framework may use diverse cryptographic operations and multiple portions of cryptographic data to reduce the impact of integrity failures of cryptographic operations. To facilitate use of diverse cryptographic operations, a cryptographic data package that includes multiple portions of cryptographic data usable with different diverse cryptographic operations may be provided. A user or entity assigned a cryptographic data package may not need to independently manage different portions of cryptographic data for use with the different diverse cryptographic operations.
-
公开(公告)号:US20240356927A1
公开(公告)日:2024-10-24
申请号:US18302266
申请日:2023-04-18
申请人: Dell Products L.P.
发明人: BRADLEY K. GOODMAN , JOSEPH CAISSE
IPC分类号: H04L9/40
CPC分类号: H04L63/105 , H04L63/104
摘要: Systems, devices, and methods for managing data processing systems are disclosed. The data processing systems may provide computer implemented services based on commands provided to the data processing systems. To manage the data processing systems, a security framework may be enforced to interpret and/or resolve commands as the commands are invoked. The security framework may be deployed to data processing systems to reduce the likelihood of undesired use and/or interaction with the data processing systems.
-
公开(公告)号:US20240346125A1
公开(公告)日:2024-10-17
申请号:US18299912
申请日:2023-04-13
申请人: Dell Products L.P.
CPC分类号: G06F21/33 , G06F21/602 , G06F21/64
摘要: Methods and systems for verifying component loadouts are disclosed. During onboarding and after onboarding, the hardware component loadouts of endpoint devices may be checked to identify whether component drift has occurred. The checks may be performed by comparing actual loadouts to expected loadouts. The expected loadouts may be identified using loadout established when an endpoint device is manufactured, as well as authorized changes in the loadouts that may be made by various owners. The initial loadout and authorized changes may be documented usings cryptographically verifiable data structures that form chains back to a root of trust.
-
公开(公告)号:US20240333531A1
公开(公告)日:2024-10-03
申请号:US18616551
申请日:2024-03-26
申请人: Dell Products L.P.
CPC分类号: H04L9/3268 , H04L9/3073 , H04L9/3265
摘要: Methods and systems for managing endpoint devices are disclosed. The endpoint devices may be managed by onboarding them. To onboarding the endpoint devices, ownership vouchers and proxy certificates may be used to cryptographically verify to which entities authority over the endpoint devices have been delegated. The proxy certificates may extend certificate and/or delegation chains in ownership vouchers to other devices. The extended chains may eliminate the need for proliferation of keys used to demonstrate authority over endpoint devices.
-
7.
公开(公告)号:US20240129134A1
公开(公告)日:2024-04-18
申请号:US18046595
申请日:2022-10-14
申请人: Dell Products L.P.
CPC分类号: H04L9/3265 , H04L9/0819
摘要: Systems, devices, and methods for managing operation of data processing systems are disclosed. To manage operation of the data processing systems, onboarding processes may be performed to conform the operation of the data processing systems to meet the expectations of owners of the data processing systems. During onboarding, keys usable to verify subsequently issued commands may be obtained by the data processing systems. The data processing systems may perform verifications processes for issued commands that rely on a root of trust established with the keys rather than identifies of entities that may issue the commands for command verification.
-
公开(公告)号:US20240126905A1
公开(公告)日:2024-04-18
申请号:US18046584
申请日:2022-10-14
申请人: Dell Products L.P.
CPC分类号: G06F21/6218 , H04L9/14
摘要: Systems, devices, and methods for managing data processing systems are disclosed. The data processing systems may be capable of operating in various manners. To manage the data processing systems, onboarding processes may be performed to conform the operation of the data processing systems to meet the expectations of owners of the data processing systems. To manage security policies of the data processing systems during onboarding, ownership vouchers may be generated to provide data necessary for onboarding that defines security policies, hardware policies, and ownership of the data processing systems. The ownership voucher may be deployed to data processing systems during onboarding to reduce the likelihood of undesired use and/or interactions with the data processing systems.
-
公开(公告)号:US20240020404A1
公开(公告)日:2024-01-18
申请号:US17864526
申请日:2022-07-14
申请人: Dell Products L.P.
发明人: BRADLEY K. GOODMAN , JOSEPH CAISSE
CPC分类号: G06F21/6218 , G06F11/3003 , G06F11/0709
摘要: Methods and systems for managing the operation of data processing systems are disclosed. To manage the operation of data processing systems, diagnostic data may be collected. The diagnostic data may include information regarding the operation of the data processing systems usable to diagnose issues impacting the operation of the data processing systems. The diagnostic data may also include sensitive data that may be undesirable to disclose to third parties. To manage risk associated with distribution of the diagnostic data, the diagnostic data may be subjected to partial redaction and/or dual encryption to manage access to the sensitive data included therein. By redacting and/or dual encrypting portions of the sensitive data, access to the sensitive data after the diagnostic data is distributed may be prevented and/or limited to those parties to which an operator of a data processing system elects to provide decryption data.
-
公开(公告)号:US20240020388A1
公开(公告)日:2024-01-18
申请号:US17864512
申请日:2022-07-14
申请人: Dell Products L.P.
发明人: BRADLEY K. GOODMAN , JOSEPH CAISSE
IPC分类号: G06F21/57
CPC分类号: G06F21/575 , G06F2221/034
摘要: Systems, apparatuses, methods, and computer program products are disclosed for managing operations of data processing systems to prevent implementation of malicious configurations. An example method includes constructing, by a data processing system, a validated change log and reconstructing known good configurations by replaying the validated configuration changes from the validated change log. The example method further includes making a determination, by the data processing system, regarding whether the source of a configuration change request has enough privilege to make the configuration request, and validating the request should the source have enough privilege.
-
-
-
-
-
-
-
-
-