PSEUDO-SLEEP MODE FOR NETWORKING DEVICES

    公开(公告)号:US20250036185A1

    公开(公告)日:2025-01-30

    申请号:US18361183

    申请日:2023-07-28

    Abstract: A networking device includes communication interfaces, a System-on-Chip (SoC), and pseudo-sleep mode logic. The SoC includes a processor, a memory, an internal PHY module, and other internal SoC modules. The pseudo-sleep mode logic is configured to detect receipt of a sleep command and, in response, cause the networking device to enter a pseudo-sleep mode in which the internal SoC modules are powered off, except for the internal PHY module, the processor, and the memory, which remain powered on. The logic is also configured to detect receipt of a wake command while the networking device is in the pseudo-sleep mode and, in response, cause the networking device to exit the pseudo-sleep mode.

    Deferred authentication in a secure boot system

    公开(公告)号:US12056244B2

    公开(公告)日:2024-08-06

    申请号:US17223493

    申请日:2021-04-06

    CPC classification number: G06F21/575 G06F2221/034

    Abstract: Examples described herein relate to deferred authentication in secure boot systems. An untrusted component is identified in a boot sequence in a trusted execution environment. A secure boot authentication of the untrusted component is deferred for a predetermined period and access to hardware resources is restricted. An image digest and privilege rights including access to hardware resources associated with the untrusted component is obtained in an untrusted execution environment. A request including the image digest and the privilege rights is sent to a central node over a secure connection. A response including a signature based on image digest and approved privileges is received from the central node. The untrusted component is authenticated in the trusted execution environment using the signature before expiry of the predetermined period. Access to the hardware resources is provided to the untrusted component in the trusted execution environment based on the approved privileges.

    DEFERRED AUTHENTICATION IN A SECURE BOOT SYSTEM

    公开(公告)号:US20220318391A1

    公开(公告)日:2022-10-06

    申请号:US17223493

    申请日:2021-04-06

    Abstract: Examples described herein relate to deferred authentication in secure boot systems. An untrusted component is identified in a boot sequence in a trusted execution environment. A secure boot authentication of the untrusted component is deferred for a predetermined period and access to hardware resources is restricted. An image digest and privilege rights including access to hardware resources associated with the untrusted component is obtained in an untrusted execution environment. A request including the image digest and the privilege rights is sent to a central node over a secure connection. A response including a signature based on image digest and approved privileges is received from the central node. The untrusted component is authenticated in the trusted execution environment using the signature before expiry of the predetermined period. Access to the hardware resources is provided to the untrusted component in the trusted execution environment based on the approved privileges.

    Thermally protecting an access point device

    公开(公告)号:US10509450B1

    公开(公告)日:2019-12-17

    申请号:US16424995

    申请日:2019-05-29

    Abstract: A method for thermally protecting an access point (AP) device may include receiving an actual AP power consumption value, the actual AP power consumption value being one of a plurality of potential AP power consumption values, receiving a sensed internal AP temperature value, the sensed internal AP temperature value being one of a plurality of potential internal AP temperature values, accessing an ambient temperature look up table defining relationships between the plurality of potential AP power consumption values, the plurality of potential internal AP temperature values and a plurality of ambient temperature values, and retrieving one of the plurality of ambient temperature values associated with the actual AP power consumption value and the sensed internal AP temperature value from the ambient temperature look up table, the retrieved ambient temperature value being an estimated ambient temperature value of the AP device.

Patent Agency Ranking