Signing files based on file security credentials

    公开(公告)号:US12039088B2

    公开(公告)日:2024-07-16

    申请号:US17362595

    申请日:2021-06-29

    CPC classification number: G06F21/64 G06F21/6209

    Abstract: Examples described herein relate to signing of files based on file security credentials. A signing request for a file is received from a file author device. The signing request may include a file identifier associated with the file and a first key identifier associated with a first key stored in a hardware security module (HSM). File security credentials associated with the file may be obtained from one or more file security databases using the file identifier. A file security value for the file may be determined based on the file security credentials. On determining that the file security value satisfies a predetermined first key criteria, the file may be signed using the first key.

    Controlling access to peripheral ports of a host computing system

    公开(公告)号:US11373014B2

    公开(公告)日:2022-06-28

    申请号:US16947173

    申请日:2020-07-21

    Abstract: Example implementations relate to system and method of controlling access to ports of a host computing system having a port management integrated-circuit chip (IC), a manageability controller, and a plurality of peripheral device hubs having ports. The IC is to receive a first data from the plurality of peripheral device hubs and communicate the first data to the manageability controller. The first data includes device identifiers of a first peripheral device and a port identifier of the port. Further, the IC is to receive a security action from the manageability controller and implement the security action on the port. The security action is determined based on comparison of the first data and the second data including access control rules, where the security action is linked to each access control rule, and where each access control rule has the port identifier mapped to predetermined device identifiers of a second peripheral device.

    File system storage
    6.
    发明授权

    公开(公告)号:US10572451B2

    公开(公告)日:2020-02-25

    申请号:US15114384

    申请日:2014-01-31

    Abstract: A system for storing a file system can include writing a file system to a memory device, the file system including a plurality of files, a subset engine to determine a subset of the plurality of files, a marking engine to mark each file of the plurality of files that is not included in the subset as a not-for-use sector, a crosslinking engine to crosslink duplicate files of the subset, a compression engine to compress a directory structure and a file allocation table (FAT) associated with the subset; and a storing engine to store the compressed directory structure and FAT in the file system.

    FILE SYSTEM STORAGE
    7.
    发明申请
    FILE SYSTEM STORAGE 审中-公开
    文件系统存储

    公开(公告)号:US20160342617A1

    公开(公告)日:2016-11-24

    申请号:US15114384

    申请日:2014-01-31

    CPC classification number: G06F16/1744 G06F16/13

    Abstract: A system for storing a file system can include writing a file system to a memory device, the file system including a plurality of files, a subset engine to determine a subset of the plurality of files, a marking engine to mark each file of the plurality of files that is not included in the subset as a not-for-use sector, a crosslinking engine to crosslink duplicate files of the subset, a compression engine to compress a directory structure and a file allocation table (FAT) associated with the subset; and a storing engine to store the compressed directory structure and FAT in the file system.

    Abstract translation: 用于存储文件系统的系统可以包括将文件系统写入存储器设备,文件系统包括多个文件,子集引擎以确定多个文件的子集;标记引擎,用于标记多个文件中的每个文件 未包含在子集中的不可用扇区的文件,用于交叉子集的重复文件的交联引擎,用于压缩目录结构的压缩引擎和与该子集相关联的文件分配表(FAT); 以及存储引擎,用于将压缩的目录结构和FAT存储在文件系统中。

    CONTROLLING ACCESS TO PERIPHERAL PORTS OF A HOST COMPUTING SYSTEM

    公开(公告)号:US20220027522A1

    公开(公告)日:2022-01-27

    申请号:US16947173

    申请日:2020-07-21

    Abstract: Example implementations relate to system and method of controlling access to ports of a host computing system having a port management integrated-circuit chip (IC), a manageability controller, and a plurality of peripheral device hubs having ports. The IC is to receive a first data from the plurality of peripheral device hubs and communicate the first data to the manageability controller. The first data includes device identifiers of a first peripheral device and a port identifier of the port. Further, the IC is to receive a security action from the manageability controller and implement the security action on the port. The security action is determined based on comparison of the first data and the second data including access control rules, where the security action is linked to each access control rule, and where each access control rule has the port identifier mapped to predetermined device identifiers of a second peripheral device.

    Proxy application to transfer application protocol requests over IOCTL commands

    公开(公告)号:US10747549B2

    公开(公告)日:2020-08-18

    申请号:US15654235

    申请日:2017-07-19

    Abstract: A method disclosed herein relates to a proxy application that connects to an input/output controller (IOCTL) interface driver. The IOCTL interface driver transfers IOCTL commands to a baseboard management controller (BMC). The proxy application receives, through the IOCTL interface driver, an application protocol request over an IOCTL command from the BMC. The application protocol request includes a computing devices configuration, a computing devices configuration option, and user interface data. The proxy application also receives an update to the computing devices current configuration based on the computing devices configuration option. The proxy application generates a new application protocol request over the IOCTL command based on the update to the computing devices current configuration. The proxy application transmits, through the IOCTL interface driver, the new application protocol request over the IOCTL command to the BMC.

Patent Agency Ranking