Dell products l.p. (20240111583). SYSTEMS AND METHODS FOR MEASURING HARDWARE UTILIZATION simplified abstract

From WikiPatents
Jump to navigation Jump to search

SYSTEMS AND METHODS FOR MEASURING HARDWARE UTILIZATION

Organization Name

dell products l.p.

Inventor(s)

Elie Antoun Jreij of Pflugerville TX (US)

Austin Patrick Bolen of Austin TX (US)

SYSTEMS AND METHODS FOR MEASURING HARDWARE UTILIZATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240111583 titled 'SYSTEMS AND METHODS FOR MEASURING HARDWARE UTILIZATION

Simplified Explanation

The abstract of this patent application describes a node with a processor running an operating system, a peripheral port connected to a peripheral device, and a system control processor running a second operating system. The system control processor meters the usage of the peripheral device by the first operating system by obtaining utilization data and sending it to a remote authentication server, preventing the first operating system from accessing the system control processor.

  • Explanation of the patent:

- Node with two processors running different operating systems - System control processor meters usage of peripheral device by first operating system - Utilization data obtained and sent to remote authentication server - First operating system cannot access system control processor

  • Potential applications of this technology:

- Secure usage monitoring in shared computing environments - Preventing unauthorized access to peripheral devices - Remote authentication and monitoring of device usage

  • Problems solved by this technology:

- Ensuring secure and controlled access to peripheral devices - Preventing unauthorized usage and potential security breaches - Enabling remote monitoring and management of device utilization

  • Benefits of this technology:

- Enhanced security and control over peripheral device usage - Remote monitoring and management capabilities - Improved authentication and authorization processes

  • Potential commercial applications of this technology:

- Data centers - Shared workspaces - Remote computing environments

  • Possible prior art:

- Similar systems for monitoring and controlling device usage in shared environments - Remote authentication and monitoring solutions for computing devices

Questions: 1. How does the system control processor obtain utilization data from the peripheral device? 2. What specific security measures are in place to prevent unauthorized access to the system control processor?


Original Abstract Submitted

a node comprising, a processor executing a first operating system, a peripheral port connected to a peripheral device, a system control processor executing a second operating system, where the system control processor is configured to perform a method for metering usage of the peripheral device by the first operating system, the method that includes obtaining utilization data from a peripheral device, and sending the utilization data to a remote authentication server, where the first operating system cannot access the system control processor.