17875067. Systems And Methods For Creating Trustworthy Orchestration Instructions Within A Containerized Computing Environment For Validation Within An Alternate Computing Environment simplified abstract (Dell Products L.P.)

From WikiPatents
Jump to navigation Jump to search

Systems And Methods For Creating Trustworthy Orchestration Instructions Within A Containerized Computing Environment For Validation Within An Alternate Computing Environment

Organization Name

Dell Products L.P.

Inventor(s)

Nicholas D. Grobelny of Evergreen CO (US)

Sumanth Vidyadhara of Bangalore (IN)

Richard M. Tonry of Georgetown TX (US)

Amy C. Nelson of Round Rock TX (US)

Systems And Methods For Creating Trustworthy Orchestration Instructions Within A Containerized Computing Environment For Validation Within An Alternate Computing Environment - A simplified explanation of the abstract

This abstract first appeared for US patent application 17875067 titled 'Systems And Methods For Creating Trustworthy Orchestration Instructions Within A Containerized Computing Environment For Validation Within An Alternate Computing Environment

Simplified Explanation

Systems and methods are provided to enhance the functionality of a basic input/output system (BIOS) in an information handling system. The BIOS is equipped with the capability to authenticate and execute unique instructions that have been previously stored in the public memory of the system. These instructions are left behind by a containerized computing environment session that is no longer active on the system.

  • The disclosed systems and methods enable the BIOS to share privileged instructions with the targeted information handling system, allowing it to identify authorized executables for execution.
  • The privileged instructions can be created and stored together with executable code in the system's public memory.
  • The instructions provide guidance on how to execute the executable code.

Potential applications of this technology:

  • Enhancing the security of information handling systems by allowing the BIOS to authenticate and execute only authorized executables.
  • Facilitating the execution of unique instructions left behind by containerized computing environment sessions, enabling seamless continuation of tasks.
  • Streamlining the process of executing executable code by providing pre-stored instructions in the system's public memory.

Problems solved by this technology:

  • Unauthorized execution of executables on information handling systems can be prevented, enhancing system security.
  • The need for manual intervention to authenticate and execute specific instructions left behind by containerized computing environment sessions is eliminated, improving efficiency.
  • Ensuring the proper execution of executable code by providing instructions on how to execute it.

Benefits of this technology:

  • Enhanced security by allowing only authorized executables to be executed.
  • Improved efficiency by automating the authentication and execution of unique instructions.
  • Streamlined execution of executable code by providing pre-stored instructions.


Original Abstract Submitted

Systems and methods are provided that may be implemented to provide a basic input/output system (BIOS) with the ability to authenticate and then execute one-time unique instructions that are previously left behind (i.e., stored) in public memory of an information handling system by a containerized computing environment session that is no longer executing on the information handling system. The disclosed systems and methods may be so implemented to share with the system BIOS privileged instructions to identify which executables are authorized for execution on a targeted information handling system. The privileged instructions may be previously created and optionally stored together with an executable code in system public memory, and these instructions may provide instructions on how to execute the executable code.