VALIDATING MACHINE-READABLE INSTRUCTIONS USING AN ITERATIVE VALIDATION PROCESS

    公开(公告)号:US20220027157A1

    公开(公告)日:2022-01-27

    申请号:US16937048

    申请日:2020-07-23

    Inventor: Justin York

    Abstract: In some examples, a system includes a first processor, a second processor, and a storage medium to store first information comprising machine-readable instructions executable by the second processor. The first processor is to validate the machine-readable instructions using an iterative validation process involving a plurality of iterations at different times, where each respective iteration of the plurality of iterations includes issuing a respective indication to the second processor to compute a value based on a respective subset of the first information, wherein the respective indication includes respective subset information identifying the respective subset, wherein the respective subset information differs from different subset information included in another indication issued in another iteration of the plurality of iterations, the different subset information identifies a different subset of the first information. Each iteration further includes determining a validity of the machine-readable instructions based on the value returned to the first processor by the second processor.

    Composable serial console and KVM with remote accessibility

    公开(公告)号:US10649921B2

    公开(公告)日:2020-05-12

    申请号:US16048539

    申请日:2018-07-30

    Abstract: A slot-based component provides remote serial console and KVM capability to all slots in a sled by allocating dedicated memory space in a serial console component for serial console and KVM data. The dedicated memory space is in communication with a memory semantic fabric switch that is in communication all slots on the fabric. Other components on the fabric have corresponding allocated memory in communication with onboard CPU's. When remote access is conducted the CPU receives and pushes data to the allocated memory and the data is pulled through the fabric switch to the serial console component to be provided to a remote client session.

    Managing security of enclosure based on a task status and geographical location of the enclosure

    公开(公告)号:US11899831B2

    公开(公告)日:2024-02-13

    申请号:US17475748

    申请日:2021-09-15

    CPC classification number: G06F21/86 G06F16/23

    Abstract: Examples described herein relate to a method for managing hardware changes at an enclosure and a server. The enclosure includes a server and multiple hardware devices connected to the enclosure. A chassis manager in the enclosure is communicatively coupled to a manageability controller of the server and the multiple hardware devices. On enabling tamper detection, the manageability controller and the chassis manager monitor the hardware devices for determining changes in the hardware devices. A change in a hardware device is compared with a permissible hardware change to determine whether the change in the hardware device is unauthorized. The permissible hardware changes include changes in hardware devices that are permitted by a customer. Security actions are performed at the server and the enclosure if unauthorized changes in the hardware device are detected by the manageability controller and chassis manager.

    Pre-runtime fan control
    4.
    发明授权

    公开(公告)号:US10935960B2

    公开(公告)日:2021-03-02

    申请号:US16447537

    申请日:2019-06-20

    Abstract: Examples disclosed herein relate to initializing a fan speed of a computing device using a high-water value when a pre-runtime event occurs. A management controller (MC) receives sensor data from sensors of the computing device. A fan speed of a fan is controlled using a fan control value based on the sensor data. The fan control value is monitored to determine a high-water value of the fan control value. The high-water value is stored in a location that is accessible by a pre-runtime fan control engine of the computing device. In response to a pre-runtime event, the fan speed is initialized to a speed using the high-water value.

    Managing security of enclosure based on a task status and geographical location of the enclosure

    公开(公告)号:US12235634B2

    公开(公告)日:2025-02-25

    申请号:US17475706

    申请日:2021-09-15

    Abstract: Examples described herein relate to a system and method for managing the security of an edge enclosure. The edge enclosure is deployed in a mobile environment and travels between a base location and a task location to perform a task. The task is defined and configured at a chassis manager by a management device. A server in the edge enclosure processes data associated with the task. The chassis manager detects a loss of communication between the chassis manager and the management device. The chassis manager performs a security action based on task status. The task status is either ongoing or completed. The security action performed at the edge enclosure protects the data present in the server from tampering. The management device transmits alerts to the customers of the edge enclosure after the task is completed.

    Applying trusted backup configuration to a node

    公开(公告)号:US12056262B2

    公开(公告)日:2024-08-06

    申请号:US17822480

    申请日:2022-08-26

    CPC classification number: G06F21/73 G06F21/568 G06F21/72

    Abstract: Examples to restore a trusted backup configuration for a node. Example techniques include failover to an alternate firmware of the node, in response to an unverifiable condition of an existing firmware of the node. The node may validate a first configuration file stored in the node. The first configuration file includes a first backup configuration. The node may validate a second configuration file stored in the node based on the validation of the first configuration file. The second configuration file includes a second backup configuration. In response to the validation of at least one of the first configuration file and the second configuration file, the node may select one of the first backup configuration and the second backup configuration, and apply the selected backup configuration to the node.

    Power management in a blade enclosure

    公开(公告)号:US11347288B2

    公开(公告)日:2022-05-31

    申请号:US17069123

    申请日:2020-10-13

    Abstract: Examples disclosed herein relate to power management in a blade enclosure. An intrusion detection mode is initiated by a baseboard management controller. Responsive to determining a power shortage in the blade enclosure, a stop clock pin is operated to control power consumption of a server in the blade enclosure. After a predefined time of determining the power shortage, a model specific register (MSR) associated with power settings of a Central processing unit (CPU) of the server is reconfigured. Reconfiguring the MSR comprises, identifying a power profile based on available power in the blade enclosure and modifying register states in the MSR based on the power profile via a baseboard management manager (BMC) of the server. Subsequently, operation of the stop clock pin is stopped.

    Validating machine-readable instructions using an iterative validation process

    公开(公告)号:US11269637B2

    公开(公告)日:2022-03-08

    申请号:US16937048

    申请日:2020-07-23

    Inventor: Justin York

    Abstract: In some examples, a system includes a first processor, a second processor, and a storage medium to store first information comprising machine-readable instructions executable by the second processor. The first processor is to validate the machine-readable instructions using an iterative validation process involving a plurality of iterations at different times, where each respective iteration of the plurality of iterations includes issuing a respective indication to the second processor to compute a value based on a respective subset of the first information, wherein the respective indication includes respective subset information identifying the respective subset, wherein the respective subset information differs from different subset information included in another indication issued in another iteration of the plurality of iterations, the different subset information identifies a different subset of the first information. Each iteration further includes determining a validity of the machine-readable instructions based on the value returned to the first processor by the second processor.

    Systems and methods for controlling hardware device lighting in multi-chassis environment

    公开(公告)号:US10860452B1

    公开(公告)日:2020-12-08

    申请号:US16450834

    申请日:2019-06-24

    Abstract: Systems and methods for controlling one or more visual indicators, such as unit identification devices (UIDs), are provided. Control of such visual indicators allows lighting sequences to be displayed vis-à-vis the visual indicators in a data center or similar environment including multiple hardware devices or units, such as server blades in multiple chassis enclosures in a data center. In this way, users such as data center administrators, information technology (IT) personnel, etc. can be alerted to hardware events that impact hardware devices or units, such as hardware faults. The visual indicators can be controlled in such a way that animated lighting sequences can be used to guide users to the hardware devices or units experiencing the hardware event(s).

Patent Agency Ranking