Security module and method within an information handling system
First Claim
1. A processing module comprising:
- a local processor device configurable to initiate access to resources of a host processing system; and
a security module configured to enable use of the resources of the host processing system using a security metric, wherein the security module is further configured to;
detect the security metric;
detect a global location of the host processing system and compare the global location to a list of valid global locations;
enable and disable access to a hardware resource of the host processing system not only in response to the security metric but also based on whether the host processing system is in a low-power operating state or a run operating state, wherein the enabling access to the hardware resource when the host processing system is in the low-powered operating state comprises leaving the host processing system in the low-powered operating state if the host processing system entered the low-powered operating state prior to a disabling of access to hardware resource initiated by a signal from the processing module.
14 Assignments
0 Petitions
Accused Products
Abstract
A security module and method within an information handling system are disclosed. In a particular form, a processing module can include a local processor configurable to initiate access to resources of a host processing system. The processing module can also include a security module configured to enable use of the resources of the host processing system using a security metric. According to an aspect, the security module can be further configured to detect the security metric, and enable access to a resource of the host processing system in response to the security metric. The security module can further be configured to disable access to another resource of the host processing system in response to the security metric.
71 Citations
20 Claims
-
1. A processing module comprising:
-
a local processor device configurable to initiate access to resources of a host processing system; and a security module configured to enable use of the resources of the host processing system using a security metric, wherein the security module is further configured to; detect the security metric; detect a global location of the host processing system and compare the global location to a list of valid global locations; enable and disable access to a hardware resource of the host processing system not only in response to the security metric but also based on whether the host processing system is in a low-power operating state or a run operating state, wherein the enabling access to the hardware resource when the host processing system is in the low-powered operating state comprises leaving the host processing system in the low-powered operating state if the host processing system entered the low-powered operating state prior to a disabling of access to hardware resource initiated by a signal from the processing module. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
detecting, by a processing module including a local processor device, an operating state of an information handling system to be one of a low-powered operating state and a run operating state; detecting a global location of the information handling system; comparing the global location to a list of valid global locations; and altering an operating state of a hardware resource of the information handling system not only in response to the comparison but also the operating state of the information handling system wherein, when the information handling system is in the low-powered operating state prior to a disabling of access to hardware resources by the processing module, the altering the operating state of the hardware resource comprises leaving the information handling system in the low-powered operating state. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. An information handling system comprising:
-
a host processing system including resources operable to be enabled and disabled by a processing module; and a host interface configured to; couple the processing module to the host processing system; and detect a global location of the host processing system and compare the global location to a list of valid global locations; receive a signal, by a local processor device, from the processing module to initiate enabling and disabling hardware resources of the host processing system not only in response to a security metric value detected by a security module of the processing module but also based on whether the information handling system is in low-powered operating state or a run operating state, wherein the enabling access to the hardware resource when the information handling system is in the low-powered operating state comprises leaving the information handling system in the low-powered operating state if the information handling system entered the low-powered operating state prior to a disabling of access to hardware resources initiated by a signal from the processing module. - View Dependent Claims (19, 20)
-
Specification