SECURITY MODULE AND METHOD WITHIN AN INFORMATION HANDLING SYSTEM
First Claim
1. A processing module comprising:
- a local processor configurable to initiate access to resources of a host processing system; and
a security module configured to enable use of the resources of the host processing system using a security metric, wherein the security module is further configured to;
detect the security metric;
enable access to a resource of the host processing system in response to the security metric; and
disable access to another resource of the host processing system in response to the security metric.
14 Assignments
0 Petitions
Accused Products
Abstract
A security module and method within an information handling system are disclosed. In a particular form, a processing module can include a local processor configurable to initiate access to resources of a host processing system. The processing module can also include a security module configured to enable use of the resources of the host processing system using a security metric. According to an aspect, the security module can be further configured to detect the security metric, and enable access to a resource of the host processing system in response to the security metric. The security module can further be configured to disable access to another resource of the host processing system in response to the security metric.
131 Citations
20 Claims
-
1. A processing module comprising:
-
a local processor configurable to initiate access to resources of a host processing system; and a security module configured to enable use of the resources of the host processing system using a security metric, wherein the security module is further configured to; detect the security metric; enable access to a resource of the host processing system in response to the security metric; and disable access to another resource of the host processing system in response to the security metric. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
detecting an operating state of an information handling system; detecting a global location of the information handling system; comparing the global location to a list of valid global locations; and altering an operating state of a resource of the information handling system in response to the comparison, and a current operating state of the information handling system. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. An information handling system comprising:
-
a host processing system including resources operable to be enabled and disabled by a processing module; and a host interface configured to; couple the processing module to the host processing system; and receive a signal from the processing module to initiate enabling and disabling resources of the host processing system in response to a security metric value detected by a security module of the processing module. - View Dependent Claims (19, 20)
-
Specification