18046595. SYSTEM AND METHOD FOR SECURING OPERATION OF DATA PROCESSING SYSTEMS DURING AND AFTER ONBOARDING simplified abstract (Dell Products L.P.)

From WikiPatents
Jump to navigation Jump to search

SYSTEM AND METHOD FOR SECURING OPERATION OF DATA PROCESSING SYSTEMS DURING AND AFTER ONBOARDING

Organization Name

Dell Products L.P.

Inventor(s)

BRADLEY K. Goodman of Nashua NH (US)

KIRK ALAN Hutchinson of Londonderry NH (US)

JOSEPH Caisse of Burlington MA (US)

SYSTEM AND METHOD FOR SECURING OPERATION OF DATA PROCESSING SYSTEMS DURING AND AFTER ONBOARDING - A simplified explanation of the abstract

This abstract first appeared for US patent application 18046595 titled 'SYSTEM AND METHOD FOR SECURING OPERATION OF DATA PROCESSING SYSTEMS DURING AND AFTER ONBOARDING

Simplified Explanation

The patent application describes systems, devices, and methods for managing the operation of data processing systems through onboarding processes to meet the expectations of system owners. During onboarding, keys are obtained for verifying subsequently issued commands, establishing a root of trust for command verification.

  • Onboarding processes to manage data processing systems
  • Obtaining keys for verifying commands during onboarding
  • Verifying commands using a root of trust established with keys

Potential Applications

The technology described in the patent application could be applied in various industries such as cybersecurity, cloud computing, and data management systems.

Problems Solved

1. Ensuring the operation of data processing systems meets the expectations of system owners. 2. Providing a secure method for verifying commands issued to data processing systems.

Benefits

1. Improved security for data processing systems. 2. Enhanced trust in the commands issued to data processing systems. 3. Streamlined management of data processing systems.

Potential Commercial Applications

Optimizing Data Processing Systems through Onboarding Processes

Possible Prior Art

Prior art related to secure command verification systems in data processing environments may exist, but specific examples are not provided in the patent application.

Unanswered Questions

How does this technology impact the scalability of data processing systems?

The patent application does not delve into how the described technology may affect the scalability of data processing systems. It would be interesting to explore whether this method hinders or enhances scalability.

What are the potential limitations of relying on a root of trust for command verification?

The patent application does not address any potential limitations of using a root of trust for command verification. It would be valuable to understand any drawbacks or challenges associated with this approach.


Original Abstract Submitted

Systems, devices, and methods for managing operation of data processing systems are disclosed. To manage operation of the data processing systems, onboarding processes may be performed to conform the operation of the data processing systems to meet the expectations of owners of the data processing systems. During onboarding, keys usable to verify subsequently issued commands may be obtained by the data processing systems. The data processing systems may perform verifications processes for issued commands that rely on a root of trust established with the keys rather than identifies of entities that may issue the commands for command verification.