-
公开(公告)号:US12105856B2
公开(公告)日:2024-10-01
申请号:US17508726
申请日:2021-10-22
申请人: Dell Products, L.P.
发明人: Jason Matthew Young , A Anis Ahmed , Harmeet Singh
IPC分类号: G06F9/00 , G06F11/22 , G06F15/177 , G06F21/57 , G06F21/73 , G06Q30/012
CPC分类号: G06F21/73 , G06F11/2247 , G06F21/57 , G06Q30/012
摘要: Methods and systems are provided for validating and registering an IHS (Information Handling System) and components of the IHS for technical support. Upon delivery and initialization of an IHS, an inventory certificate that was uploaded to the IHS during factory provisioning of the IHS is retrieved. The inventory certificate includes an inventory that identifies factory-installed hardware components in the IHS. The inventory also specifies whether a registration requirement has been specified for the IHS, such as to initiate technical support. While still operating a pre-boot validation process, an inventory is collected of the detected hardware components of the IHS. Based on the inventory certificate, the validation process confirms whether a detected hardware component is a factory-installed hardware component and determines whether registration is required. If required, registration of the IHS is initiated by the validation process and initialization of the IHS continues.
-
公开(公告)号:US20240323008A1
公开(公告)日:2024-09-26
申请号:US18732712
申请日:2024-06-04
申请人: Vicken Jabourian , Shant Jabourian
发明人: Vicken Jabourian , Shant Jabourian
IPC分类号: H04L9/08 , B42D25/305 , G06F21/73 , G06K7/14 , G06K19/06 , G06Q30/018 , H04L9/00 , H04L9/32
CPC分类号: H04L9/0866 , B42D25/305 , G06F21/73 , G06K7/1404 , G06K19/06009 , G06Q30/018 , G06Q30/0185 , H04L9/3226 , H04L9/3236 , H04L9/50 , H04L2209/56
摘要: A method for associated at least one tamper-proof seal with an anti-counterfeiting system, allowing that system to verify the provenance of an associated item, and said system itself is provided for. By generating a series of serial numbers, hashes, verification codes, fixing said serial number and verification code to a tamper proof seal, and providing a means for a user to check those codes against a corresponding computerize database, a system and method for allowing an end-user to check the provenance of a real-world good is disclosed.
-
公开(公告)号:US12099970B2
公开(公告)日:2024-09-24
申请号:US18479274
申请日:2023-10-02
申请人: Dell Products, L.P.
IPC分类号: G06Q10/087 , G06F21/73 , G06Q10/0833
CPC分类号: G06Q10/087 , G06F21/73 , G06Q10/0833
摘要: Various embodiments provide methods for validating hardware modifications of an IHS (Information Handling System) by confirming that a hardware modification corresponds to a hardware component supplied for installation in the IHS by a trusted entity. During factory provisioning of an IHS, an inventory certificate that specifies the factory installed IHS hardware is uploaded to the IHS and is also stored for ongoing support of the IHS. Upon a hardware component being supplied for installation in the IHS by a trusted entity, the inventory of the stored inventory certificate is updated to identify the supplied component and the updated certificate is transmitted to the IHS. An inventory of detected hardware components of the IHS is compared against the inventory from the updated inventory certificate in order to validate the detected hardware of the IHS includes the component, supplied by the trusted entity, that is identified in the updated inventory certificate.
-
公开(公告)号:US12086292B2
公开(公告)日:2024-09-10
申请号:US18377689
申请日:2023-10-06
发明人: Stavros Volos , Kapil Vaswani
IPC分类号: G06F21/00 , G06F9/4401 , G06F21/73 , G06F21/80
CPC分类号: G06F21/73 , G06F9/4413 , G06F21/805
摘要: A peripheral device package for use in a host computing device has a plurality of compute elements and a plurality of resources shared by the plurality of compute elements. A datastructure is stored in a hidden memory of the peripheral device package. The data structure holds metadata about ownership of resources of the peripheral device package by a plurality of user runtime processes of the host computing device which use the compute elements. At least one of the user runtime processes is a secure user runtime process. The peripheral device package has a command processor configured to use the datastructure to enforce isolation of the resources used by the secure user runtime process.
-
公开(公告)号:US12058131B2
公开(公告)日:2024-08-06
申请号:US18142962
申请日:2023-05-03
IPC分类号: H04L9/40 , G06F21/31 , G06F21/53 , G06F21/73 , H04W12/069 , H04W12/086
CPC分类号: H04L63/0876 , G06F21/53 , G06F21/73 , H04W12/069 , H04W12/086 , G06F21/31 , G06F2221/2129 , G06F2221/2149
摘要: Systems and methods are provided for persistent cross-application mobile device identification. A mobile device may have a plurality of sandboxes in memory containing applications. The mobile device may have a shared storage which may accessible by applications from different sandboxes. A storage location identifier may be used to access information in shared storage. A universal device identifier may be stored in the shared storage to identify the mobile device and may be accessible by multiple applications and updates to applications. The universal device identifier may be used to track the mobile device for advertising, fraud detection, reputation tracking, or other purposes.
-
公开(公告)号:US12056262B2
公开(公告)日:2024-08-06
申请号:US17822480
申请日:2022-08-26
发明人: Justin York , Brian Collum
CPC分类号: G06F21/73 , G06F21/568 , G06F21/72
摘要: Examples to restore a trusted backup configuration for a node. Example techniques include failover to an alternate firmware of the node, in response to an unverifiable condition of an existing firmware of the node. The node may validate a first configuration file stored in the node. The first configuration file includes a first backup configuration. The node may validate a second configuration file stored in the node based on the validation of the first configuration file. The second configuration file includes a second backup configuration. In response to the validation of at least one of the first configuration file and the second configuration file, the node may select one of the first backup configuration and the second backup configuration, and apply the selected backup configuration to the node.
-
公开(公告)号:US20240211639A1
公开(公告)日:2024-06-27
申请号:US18446625
申请日:2023-08-09
申请人: CALLSIGN, INC.
CPC分类号: G06F21/73 , G06F21/602
摘要: Disclosed are systems and methods for uniquely identifying a hardware device. In one aspect, a method may comprise (a) obtaining a first partial key and encrypted parameters from a database and a second partial key from a remote server; (b) decrypting the encrypted parameters using the first partial key and the second partial key, to thereby generate decrypted parameters; (c) obtaining attributes of a hardware device, wherein the attributes comprise a state of a CPU or GPU of the hardware device; (d) processing, on the hardware device, the attributes with a first ML algorithm to generate a digital fingerprint of the hardware device, wherein the first ML algorithm comprises the decrypted parameters; and (e) processing, on the remote server, at least the digital fingerprint of the hardware device and the attributes with a second ML algorithm configured to determine whether the hardware device has been previously identified.
-
公开(公告)号:US20240202305A1
公开(公告)日:2024-06-20
申请号:US18065923
申请日:2022-12-14
发明人: Kangguo Cheng , Julien Frougier , Ruilong Xie , Chanro Park , Min Gyu Sung
IPC分类号: G06F21/44 , G06F21/73 , G11C7/24 , H01L23/525 , H01L29/06
CPC分类号: G06F21/44 , G06F21/73 , G11C7/24 , H01L23/5252 , H01L29/0626
摘要: Methods and structure are provided for programming an array of bit cells to create a unique identification code for a semiconductor structure. Random failure of a gate dielectric at a transistor is utilized to generate a binary identification code. A portion of the gate is located above a source and a portion is located above a drain, a first logic state can be applied where the gate dielectric fails source-side and a second logic state can be applied where the gate dielectric fails drain-side. The gate dielectric preferentially fails as a function of its thinness versus the thickness of a second gate dielectric of a second transistor which acts as a control for failure of the gate dielectric. Failure is initiated based upon a voltage applied to both the thin gate dielectric and the thick dielectric. A bit cell can include two or three transistors, e.g., field effect transistors.
-
公开(公告)号:US12008148B2
公开(公告)日:2024-06-11
申请号:US17593216
申请日:2020-02-27
申请人: OMRON Corporation
摘要: This application describes a method operable by a safety unit that comprises a safety sensor, the sensor configured to perform a safety feature based on one or more sensor parameters. The method may involve accessing a memory card, the card having stored thereon a password, a parameter set, and a flag indicative of whether the parameter set is unique to the sensor. The method may involve determining, based on the flag, that the parameter set is not unique to the sensor. The method may involve determining whether the password stored on the card matches a sensor password of the sensor. The method may involve, in response to the password stored on the card matching the sensor password, writing a sensor serial number of the sensor onto the card.
-
公开(公告)号:US20240169101A1
公开(公告)日:2024-05-23
申请号:US18370988
申请日:2023-09-21
申请人: Dell Products L.P.
CPC分类号: G06F21/85 , G06F21/73 , H04L9/0825
摘要: A transceiver device security system includes a computing device and a transceiver device that is locked for use with computing device(s) in transceiver device use group(s). The transceiver device generates challenge information in response to connecting to the computing device, and causes an interrupt to be transmitted to the computing device to cause it to retrieve the challenge information. Subsequently, the transceiver device receives an encrypted response communication from the computing device that is encrypted with a transceiver device use group private key associated with one of the transceiver device use group(s), and decrypts it with a transceiver device use group public key associated with the one of the transceiver device use group(s) to generate a decrypted response communication. If the transceiver device determines that response information in the decrypted response communication matches the challenge information, it unlocks the transceiver device for use with the computing device.
-
-
-
-
-
-
-
-
-