UEFI and operating system driver methods for updating MAC address in LAN-based NIC
    2.
    发明授权
    UEFI and operating system driver methods for updating MAC address in LAN-based NIC 有权
    UEFI和用于更新基于LAN的NIC中的MAC地址的操作系统驱动程序方法

    公开(公告)号:US09537822B2

    公开(公告)日:2017-01-03

    申请号:US14446442

    申请日:2014-07-30

    CPC classification number: H04L61/6022 H04L61/2038

    Abstract: An information handling system (IHS) unambiguously addresses networked devices connected by a local area network (LAN) based network interface controller (NIC) by detecting a device descriptor of LAN-based NIC, determining that the device descriptor indicates a capability for assigning a reserve media access control (MAC) address to the networked device, writing the reserve MAC address in the LAN-based NIC of the networked device, and associating the reserve MAC address with the networked device in an inventory data structure for the IHS.

    Abstract translation: 信息处理系统(IHS)通过检测基于LAN的NIC的设备描述符来明确地寻址通过基于局域网(LAN)的网络接口控制器(NIC)连接的网络设备,确定设备描述符指示用于分配预留的能力 媒体访问控制(MAC)地址到联网设备,将保留MAC地址写入网络设备的基于LAN的NIC中,并将保留MAC地址与联网设备相关联在IHS的库存数据结构中。

    SENSOR AWARE SECURITY POLICIES WITH EMBEDDED CONTROLLER HARDENED ENFORCEMENT
    3.
    发明申请
    SENSOR AWARE SECURITY POLICIES WITH EMBEDDED CONTROLLER HARDENED ENFORCEMENT 有权
    具有嵌入式控制器硬化执行的传感器安全性政策

    公开(公告)号:US20150222669A1

    公开(公告)日:2015-08-06

    申请号:US14685043

    申请日:2015-04-13

    Abstract: An information handling system (IHS) performs security policy enforcement using security policy data maintained in an embedded controller, which operates within a privileged environment. The security policy data identifies security policies established for the IHS. The EC is directly connected to a number of sensors from which the EC receives sensor data and to at least one integrated functional device. The EC determines whether the received sensor data fulfills any trigger condition of a security policy. If the received sensor data does not fulfill any trigger condition of a security policy described by the security policy data, the EC continues to monitor sensors for updated sensor data. However, if the received sensor data fulfills any trigger condition of the security policy, the EC performs a security measure that involves enabling, disabling, or resetting one or more of the at least one integrated functional devices that can be disabled.

    Abstract translation: 信息处理系统(IHS)使用在特权环境中运行的嵌入式控制器中维护的安全策略数据执行安全策略实施。 安全策略数据标识为IHS建立的安全策略。 EC直接连接到许多传感器,EC从该传感器接收传感器数据和至少一个集成的功能设备。 EC确定接收到的传感器数据是否满足安全策略的任何触发条件。 如果接收到的传感器数据不能满足安全策略数据描述的安全策略的任何触发条件,则EC将继续监视传感器以获取更新的传感器数据。 然而,如果接收到的传感器数据满足安全策略的任何触发条件,则EC执行涉及启用,禁用或重置可被禁用的至少一个集成功能设备中的一个或多个的安全措施。

    PRE-BOOT DIAGNOSTIC DISPLAY
    5.
    发明申请
    PRE-BOOT DIAGNOSTIC DISPLAY 有权
    预引导诊断显示

    公开(公告)号:US20160117176A1

    公开(公告)日:2016-04-28

    申请号:US14523644

    申请日:2014-10-24

    Inventor: James T. Gillon

    CPC classification number: G06F9/4403 G06F9/4406

    Abstract: A pre-boot diagnostic display may be controlled by an embedded controller of an information handling system. The embedded controller may generate pre-boot diagnostic content during power on self-test (POST) of the information handling system. The pre-boot diagnostic content may be displayed to a user on a primary display of the information handling system during POST and before the information handling system is booted to an operating system.

    Abstract translation: 预启动诊断显示可以由信息处理系统的嵌入式控制器控制。 嵌入式控制器可以在信息处理系统的上电自检(POST)期间生成预引导诊断内容。 预引导诊断内容可以在POST期间以及信息处理系统被引导到操作系统之前在信息处理系统的主显示器上显示给用户。

    Sensor aware security policies with embedded controller hardened enforcement
    6.
    发明授权
    Sensor aware security policies with embedded controller hardened enforcement 有权
    传感器感知安全策略与嵌入式控制器硬化执行

    公开(公告)号:US09038130B2

    公开(公告)日:2015-05-19

    申请号:US13893685

    申请日:2013-05-14

    Abstract: An information handling system (IHS) performs security policy enforcement using security policy data maintained in an embedded controller, which operates within a privileged environment. The security policy data identifies security policies established for the IHS. The EC is directly connected to a number of sensors from which the EC receives sensor data and to at least one integrated functional device. The EC determines whether the received sensor data fulfills any trigger condition of a security policy. If the received sensor data does not fulfill any trigger condition of a security policy described by the security policy data, the EC continues to monitor sensors for updated sensor data. However, if the received sensor data fulfills any trigger condition of the security policy, the EC performs a security measure that involves enabling, disabling, or resetting one or more of the at least one integrated functional devices that can be disabled.

    Abstract translation: 信息处理系统(IHS)使用在特权环境中运行的嵌入式控制器中维护的安全策略数据执行安全策略实施。 安全策略数据标识为IHS建立的安全策略。 EC直接连接到许多传感器,EC从该传感器接收传感器数据和至少一个集成的功能设备。 EC确定接收到的传感器数据是否满足安全策略的任何触发条件。 如果接收到的传感器数据不能满足安全策略数据描述的安全策略的任何触发条件,则EC将继续监视传感器以获取更新的传感器数据。 然而,如果接收到的传感器数据满足安全策略的任何触发条件,则EC执行涉及启用,禁用或重置可被禁用的至少一个集成功能设备中的一个或多个的安全措施。

    Information Handling System with Sensor Activated Battery Charge Level Indicator

    公开(公告)号:US20210099001A1

    公开(公告)日:2021-04-01

    申请号:US17122467

    申请日:2020-12-15

    Abstract: An information handling system includes an motion sensor, an embedded controller, and a battery charge indicator. The motion sensor detects a battery charge request, and provides a trigger signal in response to the battery charge request being detected. The embedded controller receives the trigger signal from the motion sensor, and requests a relative state of charge of a battery in response to the trigger signal. The embedded controller then receives the relative state of charge of the battery, and provides a relative state of charge indication signal. The battery charge indicator receives the relative state of charge indication signal, and outputs an indication of the relative state of charge of the battery based on relative state of charge indication signal.

    System and Method of Monitoring Device States

    公开(公告)号:US20190258309A1

    公开(公告)日:2019-08-22

    申请号:US15901434

    申请日:2018-02-21

    Abstract: In one or more embodiments, one or more systems, methods, and/or processes may provide low power state entry signals to multiple devices of an information handling system. After providing the low power state entry signals to the multiple devices, the one or more systems, methods, and/or processes may receive a first status signal from a first device of the multiple devices within an amount of time; may determine that the first status signal from the first device was received within the amount of time; may determine that a second status signal from a second device of the multiple devices was not received within the amount of time; may log that the first status signal from the first device was received within the amount of time; and may log that the second status signal from the second device was not received within the amount of time.

    Apparatus and method for enabling fingerprint-based secure access to a user-authenticated operational state of an information handling system
    9.
    发明授权
    Apparatus and method for enabling fingerprint-based secure access to a user-authenticated operational state of an information handling system 有权
    用于使能基于指纹的安全访问信息处理系统的用户认证操作状态的装置和方法

    公开(公告)号:US09589121B2

    公开(公告)日:2017-03-07

    申请号:US14954938

    申请日:2015-11-30

    Abstract: A computer-implemented method provides power to a fingerprint reader while the remaining components of the information handling system are held in a low power, non-operating state. Placement of a finger across the fingerprint reader is detected with the information handling system in the non-operating state. A fingerprint is read and a corresponding fingerprint image is generated. The fingerprint image is buffered and an embedded controller is triggered to start an authentication device having a secure storage. The fingerprint image is compared to a fingerprint template contained in the secure storage. In response to the fingerprint image matching the fingerprint template, the authentication device signals the embedded controller to activate a user authenticated wake-up cycle to provide power to the other components of the information handling system such that the information handling system activates an operating system and enters a fully powered and user authenticated, operational state.

    Abstract translation: 计算机实现的方法为指纹读取器提供电力,而信息处理系统的其余组件保持在低功率,非操作状态。 在处于非操作状态的信息处理系统中检测到手指在指纹读取器上的放置。 读取指纹并产生相应的指纹图像。 指纹图像被缓冲,并且触发嵌入式控制器来启动具有安全存储的认证设备。 将指纹图像与包含在安全存储器中的指纹模板进行比较。 响应于与指纹模板匹配的指纹图像,认证设备发信号给嵌入式控制器以激活用户认证的唤醒周期,以向信息处理系统的其他组件提供电力,使得信息处理系统激活操作系统和 进入完全供电和用户认证的运行状态。

    Apparatus and method for enabling fingerprint-based secure access to a user-authenticated operational state of an information handling system
    10.
    发明授权
    Apparatus and method for enabling fingerprint-based secure access to a user-authenticated operational state of an information handling system 有权
    用于使能基于指纹的安全访问信息处理系统的用户认证操作状态的装置和方法

    公开(公告)号:US09230082B2

    公开(公告)日:2016-01-05

    申请号:US13893657

    申请日:2013-05-14

    Abstract: A computer-implemented method provides power to a fingerprint reader while the remaining components of the information handling system are held in a low power, non-operating state. Placement of a finger across the fingerprint reader is detected with the information handling system in the non-operating state. A fingerprint is read and a corresponding fingerprint image is generated. The fingerprint image is buffered and an embedded controller is triggered to start an authentication device having a secure storage. The fingerprint image is compared to a fingerprint template contained in the secure storage. In response to the fingerprint image matching the fingerprint template, the authentication device signals the embedded controller to activate a user authenticated wake-up cycle to provide power to the other components of the information handling system such that the information handling system activates an operating system and enters a fully powered and user authenticated, operational state.

    Abstract translation: 计算机实现的方法为指纹读取器提供电力,而信息处理系统的其余组件被保持在低功率,非操作状态。 在处于非操作状态的信息处理系统中检测到手指在指纹读取器上的放置。 读取指纹并产生相应的指纹图像。 指纹图像被缓冲,并且触发嵌入式控制器来启动具有安全存储的认证设备。 将指纹图像与包含在安全存储器中的指纹模板进行比较。 响应于与指纹模板匹配的指纹图像,认证设备发信号给嵌入式控制器以激活用户认证的唤醒周期,以向信息处理系统的其他组件提供电力,使得信息处理系统激活操作系统和 进入完全供电和用户认证的运行状态。

Patent Agency Ranking