SYSTEM AND METHOD FOR SPEED DIALING INFORMATION HANDLING SYSTEM CONFIGURATION CHANGES
First Claim
1. A method for receiving speed dial configuration changes, comprising:
- receiving a packet sent without a one-to-many management console and without prior group configuration, wherein the packet includes a header, encrypted data, and a signature;
determining whether the packet is associated with a valid command;
determining whether a username in the header of the packet is a valid user;
validating the signature of the packet using a public key based on the determination that the packet is associated with a valid command and that the username in the header of the packet is a valid user;
decrypting the encrypted data from the packet using a first factor key; and
executing the valid command associated with the decrypted data.
11 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for receiving speed dial configuration changes may involve receiving a packet, determining whether the packet is associated with a valid command, determining whether a username in a header of the packet is a valid user, validating a signature using a public key, decrypting encrypted data using a first factor key, and executing the valid command associated with the decrypted data. The packet includes the header, encrypted data, and the signature, and is sent without a one-to-many management console and without prior group configuration. The validation of the signature may be based on the determination that the packet is associated with a valid command and that the username in the header of the packet is a valid user.
-
Citations
20 Claims
-
1. A method for receiving speed dial configuration changes, comprising:
-
receiving a packet sent without a one-to-many management console and without prior group configuration, wherein the packet includes a header, encrypted data, and a signature; determining whether the packet is associated with a valid command; determining whether a username in the header of the packet is a valid user; validating the signature of the packet using a public key based on the determination that the packet is associated with a valid command and that the username in the header of the packet is a valid user; decrypting the encrypted data from the packet using a first factor key; and executing the valid command associated with the decrypted data. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An information handling system, comprising:
-
a processor subsystem having access to a first memory; a management controller comprising a secondary processor having access to a second memory, the second memory including an embedded storage partition and the second memory storing instructions executable by the secondary processor to; receive a packet sent without a one-to-many management console and without prior group configuration, wherein the packet includes a header, encrypted data, and a signature; determine whether the packet is associated with a valid command; determine whether a username in the header of the packet is a valid user; validate the signature of the packet using a public key based on the determination that the packet is associated with a valid command and that the username in the header of the packet is a valid user; decrypt the encrypted data from the packet using a first factor key; and execute the valid command associated with the decrypted data. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A management controller for an information handling system having a primary processor and a primary memory, the management controller comprising:
a secondary processor having access to a second memory, the second memory including an embedded storage partition and the second memory storing instructions executable by the secondary processor to; receive a packet sent without a one-to-many management console and without prior group configuration, wherein the packet includes a header, encrypted data, and a signature; determine whether the packet is associated with a valid command; determine whether a username in the header of the packet is a valid user; validate the signature of the packet using a public key based on the determination that the packet is associated with a valid command and that the username in the header of the packet is a valid user; decrypt the encrypted data from the packet using a first factor key; and execute the valid command associated with the decrypted data. - View Dependent Claims (15, 16, 17, 18, 19, 20)
Specification