-
1.
公开(公告)号:US20200304543A1
公开(公告)日:2020-09-24
申请号:US16356671
申请日:2019-03-18
申请人: Dell Products L. P.
发明人: Daniel L. Hamlin , Manuel Novoa
IPC分类号: H04L29/06
摘要: In some examples, a dock may determine that computing device is connected to the dock. The dock may authenticate the computing device, a user of the computing device, or both. The dock may select a policy based on the type (e.g., provided by a corporation or by the user) of the computing device, the type of user (e.g., employee, contractor, or visitor), or both. The dock may configure the dock to enforce the policy. For example, for one or more of the ports of the dock, the dock may enable a port, disable the port, monitor data sent and received using the port, restrict an upload and/or download speed of the port, prevent the port from accessing one or more locations (e.g., addresses or paths), or any combination thereof.
-
2.
公开(公告)号:US11470120B2
公开(公告)日:2022-10-11
申请号:US16356671
申请日:2019-03-18
申请人: Dell Products L. P.
发明人: Daniel L. Hamlin , Manuel Novoa
IPC分类号: H04L9/40
摘要: In some examples, a dock may determine that computing device is connected to the dock. The dock may authenticate the computing device, a user of the computing device, or both. The dock may select a policy based on the type (e.g., provided by a corporation or by the user) of the computing device, the type of user (e.g., employee, contractor, or visitor), or both. The dock may configure the dock to enforce the policy. For example, for one or more of the ports of the dock, the dock may enable a port, disable the port, monitor data sent and received using the port, restrict an upload and/or download speed of the port, prevent the port from accessing one or more locations (e.g., addresses or paths), or any combination thereof.
-
公开(公告)号:US20230100899A1
公开(公告)日:2023-03-30
申请号:US17449319
申请日:2021-09-29
申请人: Dell Products L,P
IPC分类号: G06F9/4401 , G06F9/54 , G06F11/30
摘要: A basic input output system (BIOS) of an information handling system may access a first list indicating one or more activation statuses of one or more BIOS firmware modules. The BIOS may determine a BIOS firmware module of the one or more BIOS firmware modules to load based, at least in part, on the first list. The BIOS may load the determined BIOS firmware module during booting of the information handling system.
-
公开(公告)号:US11258781B2
公开(公告)日:2022-02-22
申请号:US16804436
申请日:2020-02-28
申请人: Dell Products L. P.
摘要: In some examples, a target device determines that each device of a plurality of devices (i) includes a certificate that is provided to each device during provisioning, (ii) is within a predetermined distance from the target device, (iii) includes a beacon secret that is broadcast to each device at a predetermined time interval, and (iv) that either: (a) a privilege level associated with at least one device of the plurality of devices satisfies a particular privilege level specified by an access policy or (b) a number of the plurality devices with the determined distance from the target device satisfies a predetermined number specified by the access policy. The target device grants at least one device of the plurality of devices access to the target device, and receives a message from the at least one device. The target device initiates an action based at least in part on the message.
-
公开(公告)号:US10482253B2
公开(公告)日:2019-11-19
申请号:US15941728
申请日:2018-03-30
申请人: Dell Products L. P.
摘要: In some examples, a computing device may receive (i) settings associated with one or more features of a basic input output system (BIOS) of the computing device and (ii) a device identifier that uniquely identifies the computing device. The computing device may determine a policy identifier that identifies a policy being implemented by the settings associated with the one or more features of the BIOS. The computing device may retrieve a public key associated with an organization that acquired the computing device and sending a request to a service to validate the policy. The request may include the policy identifier and the public key. After the computing device receives a response from the service indicating that the policy is valid, the computing device may initiate a reboot and modify, during the reboot, the one or more features of the BIOS of the computing device based on the settings.
-
公开(公告)号:US20190303578A1
公开(公告)日:2019-10-03
申请号:US15941728
申请日:2018-03-30
申请人: Dell Products L. P.
摘要: In some examples, a computing device may receive (i) settings associated with one or more features of a basic input output system (BIOS) of the computing device and (ii) a device identifier that uniquely identifies the computing device. The computing device may determine a policy identifier that identifies a policy being implemented by the settings associated with the one or more features of the BIOS. The computing device may retrieve a public key associated with an organization that acquired the computing device and sending a request to a service to validate the policy. The request may include the policy identifier and the public key. After the computing device receives a response from the service indicating that the policy is valid, the computing device may initiate a reboot and modify, during the reboot, the one or more features of the BIOS of the computing device based on the settings.
-
公开(公告)号:US11544414B2
公开(公告)日:2023-01-03
申请号:US16266538
申请日:2019-02-04
申请人: Dell Products L. P.
IPC分类号: G06F21/81 , G06F1/3215 , G06F1/3296 , G06F21/34 , G06F9/4401 , G06F21/31 , G06F21/57
摘要: In some examples, an embedded controller of a computing device may detect, when the computing device is in a low-power state, that a smartcard has been connected to a port of the computing device or that data has been received from an input device (e.g., keyboard or biometric input device) connected to the computing device. For the smartcard, the embedded controller may use a card driver to read data stored on the smartcard. The embedded controller may compute a hash value based on the data read from the smartcard or received from the input device. If the hash value matches a previously stored hash value, then the embedded controller may initiate a boot-up process of the computing device. If the hash value does not match the previously stored hash value, then the embedded controller may cause the computing device to remain in the low-power state.
-
公开(公告)号:US11190519B2
公开(公告)日:2021-11-30
申请号:US16205817
申请日:2018-11-30
申请人: Dell Products L. P.
摘要: In some examples, a software agent may request a token from a server. The request may include dock identifiers associated with one or more docks, credentials, and actions to be performed by the one or more docks. The server may determine, using an access control list, whether the credentials authorize the software agent to instruct the one or more docks to perform the actions. If the server determines that the software agent is authorized, then the server may send a token to the software agent. The software agent may send an action request to the one or more docks. The action request may include the token and the actions. Each dock that receives the request may attempt to validate the token. If the dock successfully validates the token, the dock may perform the actions and send a message to the software agent indicating a result of performing the actions.
-
公开(公告)号:US20200250348A1
公开(公告)日:2020-08-06
申请号:US16266538
申请日:2019-02-04
申请人: Dell Products L. P.
IPC分类号: G06F21/81 , G06F21/34 , G06F1/3296 , G06F1/3215
摘要: In some examples, an embedded controller of a computing device may detect, when the computing device is in a low-power state, that a smartcard has been connected to a port of the computing device or that data has been received from an input device (e.g., keyboard or biometric input device) connected to the computing device. For the smartcard, the embedded controller may use a card driver to read data stored on the smartcard. The embedded controller may compute a hash value based on the data read from the smartcard or received from the input device. If the hash value matches a previously stored hash value, then the embedded controller may initiate a boot-up process of the computing device. If the hash value does not match the previously stored hash value, then the embedded controller may cause the computing device to remain in the low-power state.
-
公开(公告)号:US20200177596A1
公开(公告)日:2020-06-04
申请号:US16205817
申请日:2018-11-30
申请人: Dell Products L. P.
摘要: In some examples, a software agent may request a token from a server. The request may include dock identifiers associated with one or more docks, credentials, and actions to be performed by the one or more docks. The server may determine, using an access control list, whether the credentials authorize the software agent to instruct the one or more docks to perform the actions. If the server determines that the software agent is authorized, then the server may send a token to the software agent. The software agent may send an action request to the one or more docks. The action request may include the token and the actions. Each dock that receives the request may attempt to validate the token. If the dock successfully validates the token, the dock may perform the actions and send a message to the software agent indicating a result of performing the actions.
-
-
-
-
-
-
-
-
-