Retiring target machines by a provisioning server
First Claim
Patent Images
1. A method, comprising:
- identifying, by a processor, a target machine to be removed from a network or to be retasked in the network;
instructing, by the processor, the target machine over the network using a first network protocol to power cycle to initiate a network transfer of an eraser agent, wherein the power cycle comprises powering down and powering up the target machine;
causing a transfer, by the processor after the power cycle, of the eraser agent over the network to a helper client executing on the target machine, using a second network protocol in response to said identifying, wherein the eraser agent is not previously stored on the target machine, wherein the eraser agent is to boot the target machine and to securely erase information stored on a computer readable storage media device associated with the target machine and not erase information associated with the helper client and the eraser agent; and
instructing, by the processor, the target machine over the network using the first network protocol to power cycle to initiate execution of the eraser agent to securely erase the information, wherein the eraser agent utilizes a secure process to securely erase the information.
1 Assignment
0 Petitions
Accused Products
Abstract
A provisioning server can provide and interact with an eraser agent on target machines. The eraser agent can execute on one or more target machines to erase all the contents of storage on the target machines. In particular, the eraser agent can utilize secure algorithms to alter and obscure the information stored the storage devices of the target machines. The provisioning server can instruct the target machines to alter their power state (e.g. power cycle), if necessary, to provide and to initiate the eraser agent.
171 Citations
21 Claims
-
1. A method, comprising:
-
identifying, by a processor, a target machine to be removed from a network or to be retasked in the network; instructing, by the processor, the target machine over the network using a first network protocol to power cycle to initiate a network transfer of an eraser agent, wherein the power cycle comprises powering down and powering up the target machine; causing a transfer, by the processor after the power cycle, of the eraser agent over the network to a helper client executing on the target machine, using a second network protocol in response to said identifying, wherein the eraser agent is not previously stored on the target machine, wherein the eraser agent is to boot the target machine and to securely erase information stored on a computer readable storage media device associated with the target machine and not erase information associated with the helper client and the eraser agent; and instructing, by the processor, the target machine over the network using the first network protocol to power cycle to initiate execution of the eraser agent to securely erase the information, wherein the eraser agent utilizes a secure process to securely erase the information. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer readable storage medium including instructions that, when executed by a processor, cause the processor to:
-
identify a target machine to be removed from a network or to be retasked in the network; instruct the target machine over the network using a first network protocol to power cycle to initiate a network transfer of an eraser agent, wherein the power cycle comprises powering down and powering up the target machine; cause a transfer, after the power cycle, of the eraser agent over the network to a helper client executing on one of the identified target machine, using a second network protocol in response to said identifying, wherein the eraser agent is not previously stored on the target machine, wherein the eraser agent is to boot the target machine and to securely erase information stored on a computer readable storage media device associated with the target machine and not erase information associated with the helper client and the eraser agent; and instruct the target machine over the network using the first network protocol to power cycle to initiate execution of the eraser agent to securely erase the information, wherein the eraser agent utilizes a secure process to securely erase the information. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computing system comprising:
-
a memory to store instructions for a provisioning application; and a processor, coupled to the memory, to execute the instructions, the processor to; identify a target machine to be removed from a network or to be retasked in the network; instruct the target machine over the network using a first network protocol to power cycle to initiate a network transfer of an eraser agent, wherein the power cycle comprises powering down and powering up the target machine; cause a transfer after the power cycle, of the eraser agent over the network to a helper client executing on the target machine, using a second network protocol in response to said identifying, wherein the eraser agent is not previously stored on the target machine, wherein the eraser agent is to boot the target machine and to securely erase information stored on a computer readable storage media device associated with the target machine and not erase information associated with the helper client and the eraser agent; and instruct the target machine over the network using the first network protocol to power cycle to initiate execution of the eraser agent to securely erase the information, wherein the eraser agent utilizes a secure process to securely erase the information. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification