Hardware management interface
First Claim
Patent Images
1. At least one non-transitory machine accessible storage medium having instructions stored thereon, the instructions when executed on a machine, cause the machine to:
- identify a first management controller of a first computing device on a network, wherein the first management controller is to be implemented in hardware of the first computing device and is outside control of a central processing unit (CPU) of the first computing device;
query the first management controller for attributes of the first computing device;
receive, from the first management controller, data identifying one or more attributes of the first computing device; and
implement a security policy of the network on the first computing device based on the one or more attributes.
11 Assignments
0 Petitions
Accused Products
Abstract
A management controller of a computing device is identified on a network and queried for attributes of the computing device. The management controller is securely implemented in hardware of the computing device and is independent of a central processing unit (CPU) of the computing device. Data is received from the management controller that identifies one or more attributes of the computing device. A security policy of the network is implemented for the computing device based on the one or more attributes.
23 Citations
27 Claims
-
1. At least one non-transitory machine accessible storage medium having instructions stored thereon, the instructions when executed on a machine, cause the machine to:
-
identify a first management controller of a first computing device on a network, wherein the first management controller is to be implemented in hardware of the first computing device and is outside control of a central processing unit (CPU) of the first computing device; query the first management controller for attributes of the first computing device; receive, from the first management controller, data identifying one or more attributes of the first computing device; and implement a security policy of the network on the first computing device based on the one or more attributes. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method comprising:
-
identifying a first management controller of a first computing device on a network, wherein the first management controller is implemented in hardware of the first computing device and is outside control of a CPU of the first computing device; querying the first management controller for attributes of the first computing device; receiving, from the first management controller, data identifying one or more attributes of the first computing device; and implementing a security policy of the network on the first computing device based on the one or more attributes. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A system comprising:
-
at least one processor device; at least one memory element; and a management system adapted when executed by the at least one processor device to; identify a first management controller of a first computing device on a network, wherein the first management controller is to be implemented in hardware of the first computing device and is outside control of a CPU of the first computing device; query the first management controller for attributes of the first computing device; receive, from the first management controller, data identifying one or more attributes of the first computing device; and implement a security policy of the network on the first computing device based on the one or more attributes.
-
Specification