17873352. SYSTEM AND METHOD FOR EFFICIENT SECURED STARTUP OF DATA PROCESSING SYSTEMS simplified abstract (Dell Products L.P.)

From WikiPatents
Jump to navigation Jump to search

SYSTEM AND METHOD FOR EFFICIENT SECURED STARTUP OF DATA PROCESSING SYSTEMS

Organization Name

Dell Products L.P.

Inventor(s)

Wei G. Liu of Austin TX (US)

Sanjeev Singh of Cedar Park TX (US)

Paul W. Vancil of Austin TX (US)

SYSTEM AND METHOD FOR EFFICIENT SECURED STARTUP OF DATA PROCESSING SYSTEMS - A simplified explanation of the abstract

This abstract first appeared for US patent application 17873352 titled 'SYSTEM AND METHOD FOR EFFICIENT SECURED STARTUP OF DATA PROCESSING SYSTEMS

Simplified Explanation

Methods and systems for managing the operation of data processing systems are disclosed in this patent application. The invention focuses on a data processing system that may enter different operating states through various types of startups. These startups may involve the use of code bases that the computing device may not inherently be able to validate.

To reduce the risk associated with using these code bases, the computing device performs processes to validate them before utilizing them. The validation processes involve obtaining security information for a portion of the code base from a trusted source. This security information is then used to validate specific portions of the code base before they are used to complete startups.

Potential applications of this technology:

  • Software development: This technology can be used in the development of software systems to ensure the validation of code bases before their use in different operating states.
  • Cybersecurity: By validating code bases, this technology can help prevent the use of potentially malicious or vulnerable code, enhancing the security of data processing systems.

Problems solved by this technology:

  • Risk reduction: The technology addresses the risk associated with using code bases that cannot be inherently validated by providing a process to validate them before use.
  • Code integrity: By validating code bases, this technology ensures that only trusted and secure code is used in the operation of data processing systems.

Benefits of this technology:

  • Enhanced security: By validating code bases, the technology helps prevent the use of potentially malicious or vulnerable code, thereby enhancing the security of data processing systems.
  • Improved reliability: The validation processes ensure that only validated code is used, reducing the likelihood of errors or system failures caused by untrusted or faulty code.


Original Abstract Submitted

Methods and systems for managing the operation of data processing systems are disclosed. A data processing system may include a computing device that may enter various operating states by performing various types of startups. The startups may include use of code bases for which the computing device may not inherently be able to validate. To reduce risk of using the code bases, the computing device may perform processes to validate the code bases prior to using the code bases. The processes may include obtaining security information for a portion of the code base from a trusted source, and using the security information to validate portions of the code base ahead of use of the portions to complete startups.