-
公开(公告)号:US20210382979A1
公开(公告)日:2021-12-09
申请号:US17054197
申请日:2019-02-28
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Richard Alden Bramley, Jr. , Dallas M. Barlow , Patrick Lee Gibbons , Adrian John Baldwin , Tevin Jaupaul Richards , Robert Stephen Craig , Valiuddin Ali , Jeffrey Kevin Jeansonne
Abstract: An example computing device includes a memory accessible at startup of the computing device, a buffer, and a set of instructions. The memory stores a configuration setting that is configurable by the application of a change request. The memory also stores a first public key and a second public key. The buffer stores change requests submitted by a remote entity, including a first change request to make a first setting change and a second change request to make a second setting change. The first change request is signed by a first private key corresponding to the first public key, and the second change request is signed by a second private key corresponding to the second public key. The set of instructions retrieves a change request from the buffer, determines whether the change request is authenticated by a public key, and if authenticated, applies the change request.
-
公开(公告)号:US20200320198A1
公开(公告)日:2020-10-08
申请号:US16481087
申请日:2017-12-19
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Christopher H Stewart , Jeffrey P Kenline , Brandon Huber , Robert Stephen Craig , Virupakshi Channagiri , Jon G Lloyd , Rosilet Braduke , Lan Wang , Hsin-Ming Yang
Abstract: An example device comprises a plurality of components and a BIOS includes a non-volatile memory having instructions stored thereon that are executable by a processor of the device to cause the BIOS to determine a component identification (ID) of a component of the plurality of components, and fetch a plurality of recall component IDs. The instructions also are to cause the BIOS to compare the determined component ID with the plurality of recall component IDs. In response to a correspondence between the determined component ID and one recall component ID of the plurality of component IDs, the BIOS is to transmit signals representing a prompt to place the component of the plurality of components in a safety mode. The instructions also cause the BIOS to receive signals in response to the prompt and, responsive to the received signals, disable the component of the plurality of components.
-
公开(公告)号:US11907411B2
公开(公告)日:2024-02-20
申请号:US17777843
申请日:2019-12-09
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Mason Andrew Gunyuzlu , Robert Stephen Craig , Tevin Richards
Abstract: Example computing devices that are enabled to enter secure operating modes are provided. An example computing device includes a main processor to run an operating system enabled to establish communication from an external device to the main processor via a hardware interrupt handler when the external device is connected to the computing device. The computing device further includes a keyboard controller to detect a lock keystroke sequence at a keyboard, and, in response to detecting the lock keystroke sequence, cause the main processor to halt the operating system and to enter a secure operating mode in which communication from the external device to the main processor via the hardware interrupt handler is blocked.
-
公开(公告)号:US11657138B2
公开(公告)日:2023-05-23
申请号:US17054197
申请日:2019-02-28
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Richard Alden Bramley, Jr. , Dallas M. Barlow , Patrick Lee Gibbons , Adrian John Baldwin , Tevin Jaupaul Richards , Robert Stephen Craig , Valiuddin Ali , Jeffrey Kevin Jeansonne
CPC classification number: G06F21/44 , G06F9/44505 , H04L9/14
Abstract: An example computing device includes a memory accessible at startup of the computing device, a buffer, and a set of instructions. The memory stores a configuration setting that is configurable by the application of a change request. The memory also stores a first public key and a second public key. The buffer stores change requests submitted by a remote entity, including a first change request to make a first setting change and a second change request to make a second setting change. The first change request is signed by a first private key corresponding to the first public key, and the second change request is signed by a second private key corresponding to the second public key. The set of instructions retrieves a change request from the buffer, determines whether the change request is authenticated by a public key, and if authenticated, applies the change request.
-
-
-