HASHING VALUES USING SALTS AND PEPPERS

    公开(公告)号:US20210344497A1

    公开(公告)日:2021-11-04

    申请号:US16861285

    申请日:2020-04-29

    Abstract: In some examples, a management controller includes a communication interface to communicate with a computing device, where the management controller is separate from a processor of the computing device. The management controller includes a management processor to receive, from the computing device, a first hash value that is based on a first hash function applied on an input value and a salt, generate a second hash value based on applying a second hash function on the first hash value and a pepper, and send the second hash value to the computing device.

    Hashing values using salts and peppers

    公开(公告)号:US11641281B2

    公开(公告)日:2023-05-02

    申请号:US16861285

    申请日:2020-04-29

    Abstract: In some examples, a management controller includes a communication interface to communicate with a computing device, where the management controller is separate from a processor of the computing device. The management controller includes a management processor to receive, from the computing device, a first hash value that is based on a first hash function applied on an input value and a salt, generate a second hash value based on applying a second hash function on the first hash value and a pepper, and send the second hash value to the computing device.

    UNLOCKING ACCESS OF INFORMATION RESPONSIVE TO VALIDATION OF PROGRAM CODES OF VIRTUAL ENTITIES

    公开(公告)号:US20210334399A1

    公开(公告)日:2021-10-28

    申请号:US16859321

    申请日:2020-04-27

    Abstract: In some examples, a management controller includes a communication interface to communicate with a computing device, where the management controller is separate from a processor of the computing device. The management controller includes a management processor to perform a validation of program codes of virtual entities of the computing device, and in response to the validation of the program codes, unlock access of information in an information store to allow access of the information by the computing device, wherein the information is for use by the virtual entities of the computing device, and wherein the management processor is to block access of the information in the information store prior to the validation.

    PROCESS HEALTH INFORMATION TO DETERMINE WHETHER AN ANOMALY OCCURRED

    公开(公告)号:US20210320936A1

    公开(公告)日:2021-10-14

    申请号:US16848373

    申请日:2020-04-14

    Abstract: Examples disclosed herein relate to processing health information of a computing device according to a deep learning model to determine whether an anomaly has occurred. Multiple computing devices can be part of a system. One of the computing devices includes a host processing element, a management controller separate from the host processing element, and a deep learning model that includes parameters that are trained to identify anomalistic behavior for the computing device. The management controller can receive health information from multiple components of the computing device and process the health information according to the deep learning model to determine whether an anomaly occurred.

    BASEBOARD MANAGEMENT CONTROLLER TO CONVEY DATA

    公开(公告)号:US20200342109A1

    公开(公告)日:2020-10-29

    申请号:US16397538

    申请日:2019-04-29

    Abstract: Examples disclosed herein relate to using a baseboard management controller (BMC) to convey data between two networks. The BMC has a network interface. Before the BMC connects to a first network, it performs a security assessment including a check on a storage. Then the BMC receives and stores, on the storage, data from the first network. The network interface is then disconnected from the first network and connected to a second network. The data is conveyed to another device using the second network.

    ERASE VERIFICATION FOR A NONVOLATILE MEMORY

    公开(公告)号:US20250077109A1

    公开(公告)日:2025-03-06

    申请号:US18460041

    申请日:2023-09-01

    Abstract: In some examples, a system includes a nonvolatile memory to store information, and a controller subsystem to perform various tasks. The controller subsystem receives, from an entity, an input to trigger an erase verification operation after an erase of a memory region of the nonvolatile memory containing the information. The controller subsystem generates a pseudorandom pattern in response to the input, and writes the pseudorandom pattern to the memory region as part of the erase verification operation. After the writing, the controller subsystem provides, from the nonvolatile memory to the entity, the pseudorandom pattern retrieved from the memory region for verification that the erasing of the information of the memory region has occurred.

Patent Agency Ranking