-
公开(公告)号:US20250036185A1
公开(公告)日:2025-01-30
申请号:US18361183
申请日:2023-07-28
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Xingzhao Zhang , Yinzhi Dong , Jia Li
IPC: G06F1/3228
Abstract: A networking device includes communication interfaces, a System-on-Chip (SoC), and pseudo-sleep mode logic. The SoC includes a processor, a memory, an internal PHY module, and other internal SoC modules. The pseudo-sleep mode logic is configured to detect receipt of a sleep command and, in response, cause the networking device to enter a pseudo-sleep mode in which the internal SoC modules are powered off, except for the internal PHY module, the processor, and the memory, which remain powered on. The logic is also configured to detect receipt of a wake command while the networking device is in the pseudo-sleep mode and, in response, cause the networking device to exit the pseudo-sleep mode.
-
公开(公告)号:US12056244B2
公开(公告)日:2024-08-06
申请号:US17223493
申请日:2021-04-06
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Jianpo Han , Yinzhi Dong
IPC: G06F21/57
CPC classification number: G06F21/575 , G06F2221/034
Abstract: Examples described herein relate to deferred authentication in secure boot systems. An untrusted component is identified in a boot sequence in a trusted execution environment. A secure boot authentication of the untrusted component is deferred for a predetermined period and access to hardware resources is restricted. An image digest and privilege rights including access to hardware resources associated with the untrusted component is obtained in an untrusted execution environment. A request including the image digest and the privilege rights is sent to a central node over a secure connection. A response including a signature based on image digest and approved privileges is received from the central node. The untrusted component is authenticated in the trusted execution environment using the signature before expiry of the predetermined period. Access to the hardware resources is provided to the untrusted component in the trusted execution environment based on the approved privileges.
-
公开(公告)号:US20220318391A1
公开(公告)日:2022-10-06
申请号:US17223493
申请日:2021-04-06
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Jianpo Han , Yinzhi Dong
IPC: G06F21/57
Abstract: Examples described herein relate to deferred authentication in secure boot systems. An untrusted component is identified in a boot sequence in a trusted execution environment. A secure boot authentication of the untrusted component is deferred for a predetermined period and access to hardware resources is restricted. An image digest and privilege rights including access to hardware resources associated with the untrusted component is obtained in an untrusted execution environment. A request including the image digest and the privilege rights is sent to a central node over a secure connection. A response including a signature based on image digest and approved privileges is received from the central node. The untrusted component is authenticated in the trusted execution environment using the signature before expiry of the predetermined period. Access to the hardware resources is provided to the untrusted component in the trusted execution environment based on the approved privileges.
-
公开(公告)号:US10509450B1
公开(公告)日:2019-12-17
申请号:US16424995
申请日:2019-05-29
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Yue Sun , Yinzhi Dong , Lin Li
Abstract: A method for thermally protecting an access point (AP) device may include receiving an actual AP power consumption value, the actual AP power consumption value being one of a plurality of potential AP power consumption values, receiving a sensed internal AP temperature value, the sensed internal AP temperature value being one of a plurality of potential internal AP temperature values, accessing an ambient temperature look up table defining relationships between the plurality of potential AP power consumption values, the plurality of potential internal AP temperature values and a plurality of ambient temperature values, and retrieving one of the plurality of ambient temperature values associated with the actual AP power consumption value and the sensed internal AP temperature value from the ambient temperature look up table, the retrieved ambient temperature value being an estimated ambient temperature value of the AP device.
-
-
-