Dell products l.p. (20240129134). SYSTEM AND METHOD FOR SECURING OPERATION OF DATA PROCESSING SYSTEMS DURING AND AFTER ONBOARDING simplified abstract

From WikiPatents
Revision as of 02:32, 26 April 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

SYSTEM AND METHOD FOR SECURING OPERATION OF DATA PROCESSING SYSTEMS DURING AND AFTER ONBOARDING

Organization Name

dell products l.p.

Inventor(s)

BRADLEY K. Goodman of Nashua NH (US)

KIRK ALAN Hutchinson of Londonderry NH (US)

JOSEPH Caisse of Burlington MA (US)

SYSTEM AND METHOD FOR SECURING OPERATION OF DATA PROCESSING SYSTEMS DURING AND AFTER ONBOARDING - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240129134 titled 'SYSTEM AND METHOD FOR SECURING OPERATION OF DATA PROCESSING SYSTEMS DURING AND AFTER ONBOARDING

Simplified Explanation

The patent application describes systems, devices, and methods for managing the operation of data processing systems through onboarding processes to meet the expectations of system owners. During onboarding, keys are obtained to verify subsequently issued commands, and verification processes rely on a root of trust established with these keys.

  • The innovation involves onboarding processes to manage the operation of data processing systems.
  • Keys are obtained during onboarding to verify commands issued to the systems.
  • Verification processes rely on a root of trust established with the keys for command verification.

Potential Applications

The technology described in the patent application could be applied in various industries such as cybersecurity, cloud computing, and data management systems.

Problems Solved

1. Ensuring that issued commands to data processing systems are verified securely. 2. Conforming the operation of data processing systems to meet the expectations of system owners.

Benefits

1. Enhanced security in verifying commands issued to data processing systems. 2. Improved management of data processing systems through onboarding processes.

Potential Commercial Applications

"Secure Command Verification Technology for Data Processing Systems"

Possible Prior Art

There may be prior art related to secure command verification processes in data processing systems, but specific examples are not provided in the patent application.

=== What are the potential cybersecurity implications of implementing this technology? Implementing this technology could enhance cybersecurity measures by ensuring that only verified commands are executed on data processing systems, reducing the risk of unauthorized access or malicious activities.

=== How does this technology compare to existing command verification methods in data processing systems? This technology appears to focus on establishing a root of trust with keys obtained during onboarding processes for command verification, which may offer a more secure and reliable method compared to traditional identification-based verification processes.


Original Abstract Submitted

systems, devices, and methods for managing operation of data processing systems are disclosed. to manage operation of the data processing systems, onboarding processes may be performed to conform the operation of the data processing systems to meet the expectations of owners of the data processing systems. during onboarding, keys usable to verify subsequently issued commands may be obtained by the data processing systems. the data processing systems may perform verifications processes for issued commands that rely on a root of trust established with the keys rather than identifies of entities that may issue the commands for command verification.