System and method for speed dialing information handling system configuration changes
First Claim
1. A method for receiving speed dial configuration changes, comprising:
- receiving a packet sent to a group without a one-to-many management console and without prior configuration of the group, wherein the packet includes a header, encrypted data, and a signature;
determining whether the packet is associated with a valid command;
determining whether a username in the header of the packet is a valid user;
validating the signature of the packet using a public key based on the determination that the packet is associated with a valid command and that the username in the header of the packet is a valid user;
decrypting the encrypted data from the packet using a first factor symmetric key wherein the first factor symmetric key was derived using the username and a password; and
executing the valid command associated with the decrypted data.
11 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for receiving speed dial configuration changes may involve receiving a packet, determining whether the packet is associated with a valid command, determining whether a username in a header of the packet is a valid user, validating a signature using a public key, decrypting encrypted data using a first factor key, and executing the valid command associated with the decrypted data. The packet includes the header, encrypted data, and the signature, and is sent without a one-to-many management console and without prior group configuration. The validation of the signature may be based on the determination that the packet is associated with a valid command and that the username in the header of the packet is a valid user.
32 Citations
17 Claims
-
1. A method for receiving speed dial configuration changes, comprising:
-
receiving a packet sent to a group without a one-to-many management console and without prior configuration of the group, wherein the packet includes a header, encrypted data, and a signature; determining whether the packet is associated with a valid command; determining whether a username in the header of the packet is a valid user; validating the signature of the packet using a public key based on the determination that the packet is associated with a valid command and that the username in the header of the packet is a valid user; decrypting the encrypted data from the packet using a first factor symmetric key wherein the first factor symmetric key was derived using the username and a password; and executing the valid command associated with the decrypted data. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An information handling system, comprising:
-
a processor subsystem comprising a primary hardware processor having access to a first memory; a management controller comprising a secondary hardware processor having access to a second memory, the second memory including an embedded storage partition and the second memory storing instructions executable by the secondary hardware processor to; receive a packet sent to a group without a one-to-many management console and without prior configuration of the group, wherein the packet includes a header, encrypted data, and a signature; determine whether the packet is associated with a valid command;
determine whether a username in the header of the packet is a valid user;validate the signature of the packet using a public key based on the determination that the packet is associated with a valid command and that the username in the header of the packet is a valid user; decrypt the encrypted data from the packet using a first factor symmetric key wherein the first factor symmetric key was derived using the username and a password; and execute the valid command associated with the decrypted data. - View Dependent Claims (7, 8, 9, 10, 11)
-
-
12. A management controller for an information handling system having a primary hardware processor and a primary memory, the management controller comprising:
-
a secondary hardware processor having access to a second memory, the second memory including an embedded storage partition and the second memory storing instructions executable by the secondary hardware processor to; receive a packet sent to a group without a one-to-many management console and without prior configuration of the group, wherein the packet includes a header, encrypted data, and a signature; determine whether the packet is associated with a valid command;
determine whether a username in the header of the packet is a valid user;
validate the signature of the packet using a public key based on the determination that the packet is associated with a valid command and that the username in the header of the packet is a valid user;decrypt the encrypted data from the packet using a first factor symmetric key wherein the first factor symmetric key was derived using the username and a password; and execute the valid command associated with the decrypted data. - View Dependent Claims (13, 14, 15, 16, 17)
-
Specification