18046584. METHODS FOR DYNAMIC PLATFORM SECURITY CONFIGURATION simplified abstract (Dell Products L.P.)

From WikiPatents
Jump to navigation Jump to search

METHODS FOR DYNAMIC PLATFORM SECURITY CONFIGURATION

Organization Name

Dell Products L.P.

Inventor(s)

BRADLEY K. Goodman of Nashua NH (US)

KIRK ALAN Hutchinson of Londonderry NH (US)

JOSEPH Caisse of Burlington MA (US)

METHODS FOR DYNAMIC PLATFORM SECURITY CONFIGURATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 18046584 titled 'METHODS FOR DYNAMIC PLATFORM SECURITY CONFIGURATION

Simplified Explanation

The patent application abstract describes systems, devices, and methods for managing data processing systems through onboarding processes and ownership vouchers to ensure security and proper operation.

  • Data processing systems can operate in various ways.
  • Onboarding processes are used to align the operation of data processing systems with the expectations of their owners.
  • Ownership vouchers are generated to define security policies, hardware policies, and ownership of the data processing systems.
  • Ownership vouchers are deployed during onboarding to prevent undesired use and interactions with the systems.

Potential Applications

The technology described in this patent application could be applied in various industries where data processing systems need to be securely managed and operated according to specific requirements.

Problems Solved

This technology solves the problem of unauthorized use or interactions with data processing systems by implementing ownership vouchers during the onboarding process, ensuring security and proper operation.

Benefits

The benefits of this technology include enhanced security, alignment of data processing systems with owner expectations, and reduced likelihood of undesired use or interactions.

Potential Commercial Applications

A potential commercial application of this technology could be in the field of cloud computing, where secure management of data processing systems is crucial for maintaining the integrity and confidentiality of data.

Possible Prior Art

One possible prior art for this technology could be the use of access control lists (ACLs) in computer systems to manage permissions and security policies. However, the concept of ownership vouchers specifically tailored for data processing systems during onboarding appears to be a novel approach.

Unanswered Questions

How does this technology compare to existing methods of securing data processing systems?

This article does not provide a direct comparison to existing methods of securing data processing systems. It would be beneficial to understand the specific advantages and disadvantages of using ownership vouchers compared to other security measures.

What are the potential limitations or challenges in implementing ownership vouchers in data processing systems?

The article does not address any potential limitations or challenges in implementing ownership vouchers. It would be important to explore factors such as scalability, compatibility with different systems, and potential vulnerabilities that could arise from the use of ownership vouchers.


Original Abstract Submitted

Systems, devices, and methods for managing data processing systems are disclosed. The data processing systems may be capable of operating in various manners. To manage the data processing systems, onboarding processes may be performed to conform the operation of the data processing systems to meet the expectations of owners of the data processing systems. To manage security policies of the data processing systems during onboarding, ownership vouchers may be generated to provide data necessary for onboarding that defines security policies, hardware policies, and ownership of the data processing systems. The ownership voucher may be deployed to data processing systems during onboarding to reduce the likelihood of undesired use and/or interactions with the data processing systems.