US Patent Application 17724880. CONTROL-PLANE PROTOCOL FOR ISOLATED OR DISCONNECTED ENVIRONMENTS OF AN INFORMATION HANDLING SYSTEM simplified abstract

From WikiPatents
Jump to navigation Jump to search

CONTROL-PLANE PROTOCOL FOR ISOLATED OR DISCONNECTED ENVIRONMENTS OF AN INFORMATION HANDLING SYSTEM

Organization Name

Dell Products L.P.


Inventor(s)

Bradley Goodman of Nashua NH (US)


Kirk Hutchinson of Londonderry NH (US)


Anurag Sharma of Cedar Park TX (US)


CONTROL-PLANE PROTOCOL FOR ISOLATED OR DISCONNECTED ENVIRONMENTS OF AN INFORMATION HANDLING SYSTEM - A simplified explanation of the abstract

  • This abstract for appeared for US patent application number 17724880 Titled 'CONTROL-PLANE PROTOCOL FOR ISOLATED OR DISCONNECTED ENVIRONMENTS OF AN INFORMATION HANDLING SYSTEM'

Simplified Explanation

This abstract describes an information handling system in a network of multiple nodes. The system has a memory and a processor. The memory stores variables that represent the state of the system. The processor receives a message that has been cryptographically signed. The source of this message is considered untrusted within the network. The processor verifies the message to ensure its authenticity. If the message is verified as authoritative, the processor checks if the state described in the message matches the state stored in the memory. If there is a match, the processor executes a request associated with the message.


Original Abstract Submitted

An information handling system of a multiple node environment includes a memory and a processor. The memory stores one or more variables associated with a state of the information handling system. The processor receives a cryptographically signed message. A source of the cryptographically signed message is considered as an untrusted source within the multiple node environment. The processor verifies the cryptographically signed message as an authoritative message. In response to the cryptographically signed message being verified as an authoritative message, the processor determines the state described in the cryptographically signed message matches the state of the information handling system stored in the memory. In response to the state described within the cryptographically signed message matches a current system state, the processor executes a request associated with the cryptographically signed message.