Abstract:
A system, method, and computer-readable medium are disclosed for performing a traffic routing operation. The traffic routing operation includes: establishing a Bluetooth connection, the Bluetooth connection comprising a plurality of Bluetooth packets; establishing a WiFi connection, the WiFi connection comprising a plurality of WiFi packets and an associated wait indicator; identifying a plurality of wake sessions using the associated wait indicator; configuring a Bluetooth channel configuration; and, configuring a WiFi channel configuration using the associated wake indicator and the plurality of wake sessions, the configuring taking into account the Bluetooth channel configuration, the configuring interleaving the plurality of WiFi packets and plurality of Bluetooth packets.
Abstract:
A system, method, and computer-readable medium for performing a traffic routing operation. The traffic routing operation includes: establishing a plurality of virtual private network (VPN) connections within an information handling system; obtaining a configuration policy for each of the plurality of VPN connections, the configuration policy for each of the plurality of VPN connections comprising an indication of at least one type of supported link of a plurality of links; configuring a plurality of queues for packets being communicated via the plurality of virtual private network connections, the plurality of queues being greater than the plurality of VPN connections; creating a tunnel indication for each of the plurality of VPN connections; mapping the tunnel indication for each of the plurality of VP connections to a respective queue of the plurality of queues; and, mapping each queue of the plurality of queues to a link of a particular VPN connection.
Abstract:
A distributed secure communication system includes a first System Control Processor (SCP) subsystem coupled to second and third SCP subsystems via a network. The first SCP subsystem identifies the second SCP subsystem, signs a first SCP authentication communication with a first private key to provide a first signed SCP authentication communication that it transmits to the second SCP subsystem. The first SCP subsystem receives a second signed SCP authentication communication from the second SCP subsystem, authenticates the second signed SCP authentication communication using a second public key associated with the second SCP subsystem and, in response, establishes a first secure communication channel with the second SCP subsystem. The first SCP subsystem then receives an attestation of an authentication of the third SCP subsystem from the second SCP subsystem and, in response, establishes a second secure communication channel with the third SCP subsystem without the transmission of signed SCP authentication communications.
Abstract:
A distributed key management system includes a first SCP subsystem coupled to second SCP subsystems via a network. The first SCP subsystem establishes secure communication channels with the second SCP subsystems, and a first key management subsystem in the first SCP subsystem retrieves enabling key(s) for communicating via the secure communication channels from a second key management subsystem in one of the second SCP subsystems, and stores the enabling key(s). The first key management subsystem then receives a first enabling key request from the first SCP subsystem and determines whether the first SCP subsystem is trusted. If the first SCP subsystem is trusted, the first key management subsystem provides the first SCP subsystem access to the at least one enabling key. If the first SCP subsystem is not trusted, the first key management subsystem prevents the first SCP subsystem from accessing the at least one enabling key stored.
Abstract:
A coordinated initialization system includes a computing system with first and second initialization subsystems coupled to a coordinated initialization subsystem. The coordinated initialization subsystem receives first and second initialization progress information associated with respective first and second initialization subsystem operations performed by the respective first and second initialization subsystems. Using a coordinated initialization database that identifies dependences between the first and second initialization operations, the coordinated initialization subsystem determines that the first initialization progress information identifies a first initialization operation that is going to be performed by the first initialization subsystem and that is dependent on a second initialization operation that is identified by the second initialization progress information and that has not yet been performed by the second initialization subsystem and, in response, causes the first initialization subsystem to pause the first initialization subsystem operations until the second initialization operation has been performed.
Abstract:
Embodiments of a foldable case for a multi-form factor IHS with a detachable keyboard are described. In some embodiments, a folio case may include: a first panel comprising a left-side magnet and a right-side magnet; a second panel comprising a left-side magnet and a right-side magnet, where a top edge of the second panel is coupled to a bottom edge of the first panel; and a third panel comprising a left-side magnet and a right-side magnet, where a top edge of the third panel is coupled to a bottom edge of the second panel.
Abstract:
Administration of IHSs (Information Handling Systems) within a data center results gradual drift of the configuration parameters of the individual IHSs such that the IHSs may no longer be in compliance with data center policies, such as policies in support of security and disaster recovery procedures. Embodiments provide techniques for distributed determination of drift within a network of managed IHSs, in which each managed IHS is provided with baselines for the configuration parameters utilized by each managed IHS. Using the provided baselines, each managed IHS identifies discrepancies between its current configuration and the applicable baselines. Based on discrepancies reported by the managed IHSs, a management console evaluates drift within the network of managed IHSs and determines when to trigger remediation procedures in order to correct the drift.
Abstract:
Systems and components are provided for charging an Information Handling System (IHS). Systems include an AC adapter configured to report attributes of the adapter. The adapter includes a DC cord that supports a data channel. The DC plug includes a circuit for operating an indicator light based on an control signal. The system includes a power port controller that receives the reported adapter attributes, determines a charging state of the IHS; generates the control signal based on the determined charging state; and transmits the control signal to the indictor light circuit via the data channel. The indicator control signal may be used to operate indicator lights on both ends of a reversible DC cord. The indicator control signal may specify a color or brightness of the indicator and may indicate a charging state of the IHS.
Abstract:
Embodiments of systems and methods for application management for a multi-form factor Information Handing System (IHS) are described. In an illustrative, non-limiting embodiment, an IHS may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution by the processor, cause the IHS to: produce a work area on a second display, wherein the second display is coupled to a first display via a hinge; detect that a keyboard is placed on the second display; and in response to the detection, reduce the work area into one or more areas unobstructed by the keyboard.
Abstract:
A method may include storing a first set of secrets associated with an information handling system in a credential vault of a management controller configured to be coupled to a processor of a host system of the information handling system in order to provide management of the information handling system via management traffic communicated between the management controller and an external management network such that the first set of secrets are accessible responsive to a verified boot of the management controller and storing a second set of secrets associated with the information handling system in a storage of a cryptoprocessor owned by the management controller such that access to the second set of secrets may be granted in response to an administrator's provision of authorization to the cryptoprocessor, and such that access to the second set of secrets is prevented during runtime of the host system in absence of authorization.