SYSTEMS AND METHODS FOR ENDPOINT CONTEXT-DRIVEN, DYNAMIC WORKSPACES

    公开(公告)号:US20210133329A1

    公开(公告)日:2021-05-06

    申请号:US16670796

    申请日:2019-10-31

    Abstract: Systems and methods for endpoint context-driven, dynamic workspaces are described. In some embodiments, an Information Handling System (IHS) of a workspace orchestration service, the IHS comprising a processor and a memory coupled to the processor, the memory having program instructions stored thereon that cause the IHS to: receive initial context information from a local management agent; produce a first workspace definition based upon the initial context information, where the local management agent is configured to instantiate a first workspace based upon the first workspace definition; receive updated context information from the local management agent; and in response to the updated context information being noncompliant with attributes of the first workspace definition, select a second workspace definition, where the updated context information complies with the attributes of the second workspace definition, and the local management agent is configured to instantiate a second workspace based upon the second workspace definition.

    Tamper-proof secure storage with recovery

    公开(公告)号:US10742427B2

    公开(公告)日:2020-08-11

    申请号:US15814476

    申请日:2017-11-16

    Abstract: Systems and methods for tamper-proof detection triggering of automatic lockdown using a recoverable encryption mechanism issued from a secure escrow service. In an illustrative, non-limiting embodiment, an Information Handling System (IHS) may include: a processor; a secure storage device coupled to the processor, wherein the secure storage device comprises a container encrypted with a derived container key; and a memory coupled to the processor, the memory including program instructions stored thereon that, upon execution, cause the IHS to: receive a digital certificate from a remote server, wherein the digital certificate includes a public key and, in response to a detection of a tampering event, encrypt the derived container key using the public key.

    Systems and methods for software integrity validation using blockchain

    公开(公告)号:US10656936B2

    公开(公告)日:2020-05-19

    申请号:US16117890

    申请日:2018-08-30

    Abstract: Systems and methods are provided that that may be implemented to track software developer code contributions and their respective revisions. In one exemplary implementation, a distributed ledger may be utilized to track software developer code contributions and their respective revisions. Each code contribution digest, code digest ID, developer public key and previous blockchain block may be compiled for a new block in the blockchain, and the compilation may first be hashed and signed by the private key of the developer. Each developer may have his/her own blockchain that resides within a code repository site and which may also be cached locally on the end user device and used to verify the integrity of the code contribution (e.g., application/service/executable) at the time it is installed on the end user device.

    Time based local authentication in an information handling system utilizing asymmetric cryptography

    公开(公告)号:US10541994B2

    公开(公告)日:2020-01-21

    申请号:US15135789

    申请日:2016-04-22

    Abstract: In an example of a system and method for time-based local authentication, an Information Handling System (IHS) may include a processor and a memory coupled to the processor. The memory may have program instructions stored thereon that, upon execution, cause the IHS to generate a first time token and to transmit the first time token to a secondary IHS via a local network, where the secondary IHS is configured to generate a second time token and to transmit the second time token to the IHS via the local network. The IHS may receive the second time token from the secondary IHS and it may determine whether the first time token matches the second time token. In response to the first time token matching the second time token, the IHS may receive access to a protected resource.

    VALIDATION OF DATA INTEGRITY THROUGH WATERMARKING

    公开(公告)号:US20190332811A1

    公开(公告)日:2019-10-31

    申请号:US15962641

    申请日:2018-04-25

    Abstract: Systems and methods are provided for recording and validating modifications to a secured container. Modifications to the secured container by trusted parties are logged. The log may be maintained in a secured memory of an IHS (Information Handling System) and may be periodically validated. Each logged modification specifies a timestamp of the modification and the digital watermark assigned to the trusted party making the modification. Upon completing modifications, the secured container is sealed by imprinting the first digital watermark and the first timestamp at locations in the secured container specified by a watermarking algorithm assigned to the trusted party making the modification. Additional modifications may be serially watermarked on the secured container according the watermarking algorithm of the trusted party making each modification. The secured container is unsealed by re-applying each of the watermarking algorithms in reverse order. The integrity of the secured container, and each modification, is thus validated.

    Fingerprint Revocation
    127.
    发明申请

    公开(公告)号:US20170366345A1

    公开(公告)日:2017-12-21

    申请号:US15185232

    申请日:2016-06-17

    CPC classification number: H04L9/0891 H04L9/0866 H04L63/068 H04L63/0861

    Abstract: Systems and methods for fingerprint revocation are described. In some embodiments, an Information Handling System (IHS) may include: a processor; and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the IHS to: identify an endpoint device; and transmit a key management command to the endpoint device over a network, where the endpoint device includes a host processing system and an off-host processing system segregated from the host processing system, where the off-host processing system includes an off-host processor and an off-host memory coupled to the off-host processor, where the off-host memory includes Personal Identifiable Information (PII) encrypted with a master key, and where the off-host processor is configured to change a status of the master key in response to having received the key management command.

    OBJECT MANAGEMENT FOR EXTERNAL OFF-HOST AUTHENTICATION PROCESSING SYSTEMS

    公开(公告)号:US20170272427A1

    公开(公告)日:2017-09-21

    申请号:US15071628

    申请日:2016-03-16

    CPC classification number: H04L63/0853 G06F21/31 H04L63/0861

    Abstract: Systems and methods for providing object management for external off-host authentication processing systems are described. In some embodiments, a method may include: identifying, by an Information Handling System (IHS), raw data to be stored within an object in an off-host memory of an external off-host authentication processing system coupled to the IHS, wherein the external off-host authentication processing system provides a hardware environment segregated from the IHS; collecting authentication data from a user by prompting the user; generating a system identification (ID) that uniquely characterizes the IHS without prompting the user; and storing the authentication data, the system ID, and the raw data as part of the object in the off-host memory.

    SYSTEMS AND METHODS FOR SECURITY TIERING IN PEER-TO-PEER NETWORKING
    130.
    发明申请
    SYSTEMS AND METHODS FOR SECURITY TIERING IN PEER-TO-PEER NETWORKING 有权
    用于安全对等的对等网络的系统和方法

    公开(公告)号:US20150143465A1

    公开(公告)日:2015-05-21

    申请号:US14607369

    申请日:2015-01-28

    CPC classification number: H04L63/105 H04L63/126 H04L63/20 H04L67/104

    Abstract: A method may also include receiving from each of one or more of potential peer information handling systems a connection request comprising a peer minimum acceptable security level for the peer information handling system. The method may additionally include comparing the peer minimum acceptable security level to a security level of the information handling system. The method may further include completing a peer-to-peer connection between the information handling system and the peer information handling system if the minimum acceptable security level is not higher than that of the security level of the information handling system.

    Abstract translation: 一种方法还可以包括从潜在对等信息处理系统中的一个或多个潜在对等信息处理系统中的每一个接收包括用于对等信息处理系统的对等最小可接受安全级别的连接请求。 该方法还可以包括将对等最小可接受安全级别与信息处理系统的安全级别进行比较。 如果最小可接受安全级别不高于信息处理系统的安全级别,则该方法还可以包括完成信息处理系统与对等信息处理系统之间的对等连接。

Patent Agency Ranking