摘要:
Installable device drivers may be stored on a partition, e.g., Utility Partition (UP) or other OEM partition, of an original equipment manufacturer (OEM) storage device, e.g., hard disk drive, by associating an INT13h Basic Input-Output System (BIOS) interrupt call, e.g., reading from floppy disk drive a: or drive b: a desired storage device driver during the normal course of installing an operating system (OS), e.g., Microsoft Windows, Linux, BSD, Unix, etc., on the information handling system, e.g., personal computer, server, blade server, storage array, workstation, etc. The run-time loading of a raw floppy image having OS installable drivers residing in the Utility Partition or other hidden partition on the hard disk may be presented as a virtual floppy disk drive to the OS installer, e.g., person (manual) or scripted (automated) process.
摘要:
Systems and methods for reducing problems and disadvantages associated with provisioning of information handling systems, including without limitation those associated with bare metal provisioning of information handling systems, are disclosed. A system may include a processor, and a memory and an access controller each communicatively coupled to the processor. The access controller may store an enterprise public key associated with an enterprise private key and a platform private key associated with the system. The access controller may be configured to: (i) authenticate communications received from a provisioning server communicatively coupled to the access controller based at least on an enterprise public certificate associated with the provisioning server and (ii) establish an asymmetrically cryptographic communications channel between the access controller and the provisioning server based at least on a platform public key associated with the platform private key, the platform private key, the enterprise public key, and the enterprise private key.
摘要:
A computer-implemented method comprises a service processor: establishing a kill switch encryption key (KSEK) to provide data security for data within storage devices of configurable components within a system; automatically encrypting, with the KSEK, data that is written to one of the storage devices; configuring the configurable components to prevent access to the stored data unless a valid copy of the KSEK is received from the service processor along with the request for the data; automatically decrypting, with the KSEK, the KSEK-encrypted data that is read from storage device; and in response to receiving a verified request to decommission the system, performing the decommissioning by deleting/erasing the KSEK from a secure storage at which the only instance of the KSEK is maintained. Deletion of the KSEK results in a permanent loss of access to the stored encrypted data within the system because the stored encrypted data cannot be decrypted without the KSEK.
摘要:
Installable device drivers may be stored on a partition, e.g., Utility Partition (UP) or other OEM partition, of an original equipment manufacturer (OEM) storage device, e.g., hard disk drive, by associating an INT13h Basic Input-Output System (BIOS) interrupt call, e.g., reading from floppy disk drive a: or drive b: a desired storage device driver during the normal course of installing an operating system (OS), e.g., Microsoft Windows, Linux, BSD, Unix, etc., on the information handling system, e.g., personal computer, server, blade server, storage array, workstation, etc. The run-time loading of a raw floppy image having OS installable drivers residing in the Utility Partition or other hidden partition on the hard disk may be presented as a virtual floppy disk drive to the OS installer, e.g., person (manual) or scripted (automated) process.
摘要:
Systems and methods for reducing problems and disadvantages associated with provisioning of information handling systems, including without limitation those associated with bare metal provisioning of information handling systems, are disclosed. A system may include a processor, and a memory and an access controller each communicatively coupled to the processor. The access controller may store an enterprise public key associated with an enterprise private key and a platform private key associated with the system. The access controller may be configured to: (i) authenticate communications received from a provisioning server communicatively coupled to the access controller based at least on an enterprise public certificate associated with the provisioning server and (ii) establish an asymmetrically cryptographic communications channel between the access controller and the provisioning server based at least on a platform public key associated with the platform private key, the platform private key, the enterprise public key, and the enterprise private key.
摘要:
Systems and methods for reducing problems and disadvantages associated with provisioning of information handling systems, including without limitation those associated with bare metal provisioning of information handling systems, are disclosed. A system may include a processor, and a memory and an access controller each communicatively coupled to the processor. The access controller may store an enterprise public key associated with an enterprise private key and a platform private key associated with the system. The access controller may be configured to: (i) authenticate communications received from a provisioning server communicatively coupled to the access controller based at least on an enterprise public certificate associated with the provisioning server and (ii) establish an asymmetrically cryptographic communications channel between the access controller and the provisioning server based at least on a platform public key associated with the platform private key, the platform private key, the enterprise public key, and the enterprise private key.
摘要:
A computer-implemented method comprises a service processor: establishing a kill switch encryption key (KSEK) to provide data security for data within storage devices of configurable components within a system; automatically encrypting, with the KSEK, data that is written to one of the storage devices; configuring the configurable components to prevent access to the stored data unless a valid copy of the KSEK is received from the service processor along with the request for the data; automatically decrypting, with the KSEK, the KSEK-encrypted data that is read from storage device; and in response to receiving a verified request to decommission the system, performing the decommissioning by deleting/erasing the KSEK from a secure storage at which the only instance of the KSEK is maintained. Deletion of the KSEK results in a permanent loss of access to the stored encrypted data within the system because the stored encrypted data cannot be decrypted without the KSEK.