PROVIDING DIFFERENT LEVELS OF RESOURCE ACCESS TO A COMPUTING DEVICE THAT IS CONNECTED TO A DOCK

    公开(公告)号:US20200304543A1

    公开(公告)日:2020-09-24

    申请号:US16356671

    申请日:2019-03-18

    IPC分类号: H04L29/06

    摘要: In some examples, a dock may determine that computing device is connected to the dock. The dock may authenticate the computing device, a user of the computing device, or both. The dock may select a policy based on the type (e.g., provided by a corporation or by the user) of the computing device, the type of user (e.g., employee, contractor, or visitor), or both. The dock may configure the dock to enforce the policy. For example, for one or more of the ports of the dock, the dock may enable a port, disable the port, monitor data sent and received using the port, restrict an upload and/or download speed of the port, prevent the port from accessing one or more locations (e.g., addresses or paths), or any combination thereof.

    Providing different levels of resource access to a computing device that is connected to a dock

    公开(公告)号:US11470120B2

    公开(公告)日:2022-10-11

    申请号:US16356671

    申请日:2019-03-18

    IPC分类号: H04L9/40

    摘要: In some examples, a dock may determine that computing device is connected to the dock. The dock may authenticate the computing device, a user of the computing device, or both. The dock may select a policy based on the type (e.g., provided by a corporation or by the user) of the computing device, the type of user (e.g., employee, contractor, or visitor), or both. The dock may configure the dock to enforce the policy. For example, for one or more of the ports of the dock, the dock may enable a port, disable the port, monitor data sent and received using the port, restrict an upload and/or download speed of the port, prevent the port from accessing one or more locations (e.g., addresses or paths), or any combination thereof.

    Context and device state driven authorization for devices

    公开(公告)号:US11258781B2

    公开(公告)日:2022-02-22

    申请号:US16804436

    申请日:2020-02-28

    摘要: In some examples, a target device determines that each device of a plurality of devices (i) includes a certificate that is provided to each device during provisioning, (ii) is within a predetermined distance from the target device, (iii) includes a beacon secret that is broadcast to each device at a predetermined time interval, and (iv) that either: (a) a privilege level associated with at least one device of the plurality of devices satisfies a particular privilege level specified by an access policy or (b) a number of the plurality devices with the determined distance from the target device satisfies a predetermined number specified by the access policy. The target device grants at least one device of the plurality of devices access to the target device, and receives a message from the at least one device. The target device initiates an action based at least in part on the message.

    Configuring basic input output system (BIOS) features based on a policy

    公开(公告)号:US10482253B2

    公开(公告)日:2019-11-19

    申请号:US15941728

    申请日:2018-03-30

    摘要: In some examples, a computing device may receive (i) settings associated with one or more features of a basic input output system (BIOS) of the computing device and (ii) a device identifier that uniquely identifies the computing device. The computing device may determine a policy identifier that identifies a policy being implemented by the settings associated with the one or more features of the BIOS. The computing device may retrieve a public key associated with an organization that acquired the computing device and sending a request to a service to validate the policy. The request may include the policy identifier and the public key. After the computing device receives a response from the service indicating that the policy is valid, the computing device may initiate a reboot and modify, during the reboot, the one or more features of the BIOS of the computing device based on the settings.

    CONFIGURING BASIC INPUT OUTPUT SYSTEM (BIOS) FEATURES BASED ON A POLICY

    公开(公告)号:US20190303578A1

    公开(公告)日:2019-10-03

    申请号:US15941728

    申请日:2018-03-30

    摘要: In some examples, a computing device may receive (i) settings associated with one or more features of a basic input output system (BIOS) of the computing device and (ii) a device identifier that uniquely identifies the computing device. The computing device may determine a policy identifier that identifies a policy being implemented by the settings associated with the one or more features of the BIOS. The computing device may retrieve a public key associated with an organization that acquired the computing device and sending a request to a service to validate the policy. The request may include the policy identifier and the public key. After the computing device receives a response from the service indicating that the policy is valid, the computing device may initiate a reboot and modify, during the reboot, the one or more features of the BIOS of the computing device based on the settings.

    Secure wake-on of a computing device

    公开(公告)号:US11544414B2

    公开(公告)日:2023-01-03

    申请号:US16266538

    申请日:2019-02-04

    摘要: In some examples, an embedded controller of a computing device may detect, when the computing device is in a low-power state, that a smartcard has been connected to a port of the computing device or that data has been received from an input device (e.g., keyboard or biometric input device) connected to the computing device. For the smartcard, the embedded controller may use a card driver to read data stored on the smartcard. The embedded controller may compute a hash value based on the data read from the smartcard or received from the input device. If the hash value matches a previously stored hash value, then the embedded controller may initiate a boot-up process of the computing device. If the hash value does not match the previously stored hash value, then the embedded controller may cause the computing device to remain in the low-power state.

    Dock administration using a token

    公开(公告)号:US11190519B2

    公开(公告)日:2021-11-30

    申请号:US16205817

    申请日:2018-11-30

    IPC分类号: H04L29/06 H04L12/24 G06F8/65

    摘要: In some examples, a software agent may request a token from a server. The request may include dock identifiers associated with one or more docks, credentials, and actions to be performed by the one or more docks. The server may determine, using an access control list, whether the credentials authorize the software agent to instruct the one or more docks to perform the actions. If the server determines that the software agent is authorized, then the server may send a token to the software agent. The software agent may send an action request to the one or more docks. The action request may include the token and the actions. Each dock that receives the request may attempt to validate the token. If the dock successfully validates the token, the dock may perform the actions and send a message to the software agent indicating a result of performing the actions.

    SECURE WAKE-ON OF A COMPUTING DEVICE
    9.
    发明申请

    公开(公告)号:US20200250348A1

    公开(公告)日:2020-08-06

    申请号:US16266538

    申请日:2019-02-04

    摘要: In some examples, an embedded controller of a computing device may detect, when the computing device is in a low-power state, that a smartcard has been connected to a port of the computing device or that data has been received from an input device (e.g., keyboard or biometric input device) connected to the computing device. For the smartcard, the embedded controller may use a card driver to read data stored on the smartcard. The embedded controller may compute a hash value based on the data read from the smartcard or received from the input device. If the hash value matches a previously stored hash value, then the embedded controller may initiate a boot-up process of the computing device. If the hash value does not match the previously stored hash value, then the embedded controller may cause the computing device to remain in the low-power state.

    DOCK ADMINISTRATION USING A TOKEN
    10.
    发明申请

    公开(公告)号:US20200177596A1

    公开(公告)日:2020-06-04

    申请号:US16205817

    申请日:2018-11-30

    IPC分类号: H04L29/06 H04L12/24

    摘要: In some examples, a software agent may request a token from a server. The request may include dock identifiers associated with one or more docks, credentials, and actions to be performed by the one or more docks. The server may determine, using an access control list, whether the credentials authorize the software agent to instruct the one or more docks to perform the actions. If the server determines that the software agent is authorized, then the server may send a token to the software agent. The software agent may send an action request to the one or more docks. The action request may include the token and the actions. Each dock that receives the request may attempt to validate the token. If the dock successfully validates the token, the dock may perform the actions and send a message to the software agent indicating a result of performing the actions.