-
公开(公告)号:US11106788B2
公开(公告)日:2021-08-31
申请号:US16183793
申请日:2018-11-08
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: William J. Walker , Michael T. Gill
Abstract: Securing data exchanged between components such as hardware sub-systems of a computing device (e.g., internal communications) during a request-response cycle is desirable. In some implementations, methods and systems as disclosed to secure computing devices against attackers attempting to take physical control of a computer system (or portion thereof) to compromise the system or steal data managed by the computer system. In one example, data transmission request from sender to a receiver may be identified and associated with a unique identifier to individually identify the data transmission request (e.g., a request internal to the computer system). The request may then be provided to the receiver and a later response may be identified and validated prior to returning the response data to the requestor. The validation may include ensuring an associated tag (e.g., unique identifier) is provided with the response to tie it to the request for which the response is being sent.
-
公开(公告)号:US10775859B2
公开(公告)日:2020-09-15
申请号:US15273860
申请日:2016-09-23
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Vincent Nguyen , Michael T. Gill
IPC: G06F1/20 , G06F9/445 , G06F1/3203 , G06F1/3206 , G06F9/52 , G06F9/46 , G06F9/48
Abstract: A method may include assigning a core identifier of an active core to an idle core. After synchronizing the active core and idle core, the active core is inactivated.
-
公开(公告)号:US20200151324A1
公开(公告)日:2020-05-14
申请号:US16183793
申请日:2018-11-08
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: William J. Walker , Michael T. Gill
Abstract: Securing data exchanged between components such as hardware sub-systems of a computing device (e.g., internal communications) during a request-response cycle is desirable. In some implementations, methods and systems as disclosed to secure computing devices against attackers attempting to take physical control of a computer system (or portion thereof) to compromise the system or steal data managed by the computer system. In one example, data transmission request from sender to a receiver may be identified and associated with a unique identifier to individually identify the data transmission request (e.g., a request internal to the computer system). The request may then be provided to the receiver and a later response may be identified and validated prior to returning the response data to the requestor. The validation may include ensuring an associated tag (e.g., unique identifier) is provided with the response to tie it to the request for which the response is being sent.
-
公开(公告)号:US20180088638A1
公开(公告)日:2018-03-29
申请号:US15273860
申请日:2016-09-23
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Vincent Nguyen , Michael T. Gill
Abstract: A method may include assigning a core identifier of an active core to an idle core. After synchronizing the active core and idle core, the active core is inactivated.
-
-
-