System and method for providing a system management command
First Claim
Patent Images
1. A method of providing a system management command, the method comprising:
- receiving, at a trusted server from a first electronic device, information identifying a second electronic device and a request to issue a system management command to the second electronic device;
authenticating, at the trusted server, an identity of a user of the first electronic device; and
in response to the request, providing, from the trusted server to the second electronic device, a system management command, information identifying the trusted server as a trusted source, information identifying the first electronic device, and the information identifying the second electronic device.
1 Assignment
0 Petitions
Accused Products
Abstract
Exemplary embodiments of the present invention disclosed herein relate to a method of providing a system management command. The method comprises receiving from an authorized requestor information identifying the electronic device and a request to issue a system management command to the electronic device. The method additionally comprises providing, in response to the request, a system management command, information identifying a source of the command as a trusted source and the information identifying the electronic device. Also disclosed are an electronic device and a computer system according to the invention.
19 Citations
18 Claims
-
1. A method of providing a system management command, the method comprising:
-
receiving, at a trusted server from a first electronic device, information identifying a second electronic device and a request to issue a system management command to the second electronic device; authenticating, at the trusted server, an identity of a user of the first electronic device; and in response to the request, providing, from the trusted server to the second electronic device, a system management command, information identifying the trusted server as a trusted source, information identifying the first electronic device, and the information identifying the second electronic device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An electronic device, comprising:
a component that is adapted to accept a security credential; and a system management command processor that is adapted to perform a system management command on the component that would otherwise require the security credential upon receipt, from a trusted server, of; the system management command, information identifying the trusted server as a trusted source, information identifying a second electronic device, and information identifying the electronic device, the system management command being provided by the trusted server in response to a request from the second electronic device and authentication of an identity of a user of the second electronic device. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
16. A computer system, comprising:
a security component that is adapted to accept a security credential; and a system basic input-output system (BIOS) that is adapted to perform a system management command that would otherwise require providing the security credential on the security component upon receipt, from a trusted server, of; a system management command, information identifying the trusted server as a trusted source, information identifying a second electronic device, and information identifying the computer system, the system management command being provided by the trusted server in response to a request from the second electronic device and authentication of an identity of a user of the second electronic device. - View Dependent Claims (17, 18)
Specification