G06F21/82

Multi-mode interfaces having secure alternate modes

Multi-mode interfaces having secure alternate modes are disclosed. An example method includes exposing to a device, during a first alternate mode negotiation session, an availability of a first secure alternate mode on a host, authenticating the device to the host using the first secure alternate mode, and responsive to the device being authenticated, exposing to the device a second secure alternate mode.

Multi-mode interfaces having secure alternate modes

Multi-mode interfaces having secure alternate modes are disclosed. An example method includes exposing to a device, during a first alternate mode negotiation session, an availability of a first secure alternate mode on a host, authenticating the device to the host using the first secure alternate mode, and responsive to the device being authenticated, exposing to the device a second secure alternate mode.

Method for secure storage, in a network, of a container image in a container registry
11489820 · 2022-11-01 · ·

Disclosed is a method for the secure storage, in a network, of a container image in a container registry, including sending a container image, this container image corresponding to an initial state of a client machine environment which can subsequently be used to execute this container, from a client machine of the network to a container registry of a server machine of the network remote from the client machine. The method also includes encrypting this container image, carried out in the random access memory of the client machine before sending to the server machine, so that the container image is already encrypted when received by the container registry for storage therein, and in that the encryption key of this container image is usable in the random access memory of the client machine, inaccessible in the mass storage of the client machine, and inaccessible on the server machine.

Blade open-close device and electronic device

A thin blade open-close device is incorporated in a limited space. A blade open-close device includes a base located on a module board including a lens unit, a partition located opposite to the module board from the base, and a cover plate located opposite to the base from the partition. The partition and the cover plate each have an opening aligned with an optical axis of the lens unit. The blade open-close device includes a blade movable in X-direction in a blade chamber defined between the cover plate and the partition, an actuator that moves the blade between a closing position to cover the openings and an opening position to uncover the openings, and a terminal plate extending in Z-direction. The terminal plate electrically connected to the actuator includes connectors at its end adjacent to the module board to be electrically connected to contacts on the module board.

Portable communication peripheral, system for protecting a portable terminal, and communication method
11604886 · 2023-03-14 ·

The portable peripheral (1001) of communication with a data storage peripheral and a data network utilizing the internet protocol, comprises: a connector to mechanically connect and establish a removable wired connection between the peripheral and a portable terminal, a first means of wired bidirectional communication with the portable terminal, a second means of bidirectional communication with a data storage peripheral or a data network and a security unit protecting the communication between the portable terminal and the data storage peripheral or the data network, this communication being established between the first and the second means of communication.

Portable communication peripheral, system for protecting a portable terminal, and communication method
11604886 · 2023-03-14 ·

The portable peripheral (1001) of communication with a data storage peripheral and a data network utilizing the internet protocol, comprises: a connector to mechanically connect and establish a removable wired connection between the peripheral and a portable terminal, a first means of wired bidirectional communication with the portable terminal, a second means of bidirectional communication with a data storage peripheral or a data network and a security unit protecting the communication between the portable terminal and the data storage peripheral or the data network, this communication being established between the first and the second means of communication.

Adaptive Mobile Communication Device
20230132316 · 2023-04-27 ·

A method of providing a user interface on a mobile communication device to control smart devices in an environment. The method comprises discovering a plurality of smart devices in an environment by a client application executing on a mobile communication device by initiating wireless communication between the mobile communication device and the plurality of smart devices, wherein the client application learns an electronic model identity of each of the discovered smart devices, communicating with a data store by the client application to look-up control interfaces of the discovered smart devices based on the electronic model identities of the smart devices, looking-up predefined environmental preferences associated with the mobile communication device in the data store by the client application, transmitting control commands by the client application to the plurality of smart devices based in part on the looked-up predefined environmental preferences.

MANAGEMENT OF WORKSPACES ACROSS MULTIPLE CLIENTS

Systems and methods for managing workspaces across multiple clients are described. In some embodiments, a Workspace Managing Device (WMD) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the WMD to: receive a request from a client Information Handling System (IHS) to access a peripheral device coupled to the WMD; identify a workspace management policy applicable to at least one of: the request, the peripheral device, the client IHS, or a user of the client IHS; and manage access to the peripheral device by the client IHS based upon the workspace management policy.

GATHERING UNIVERSAL SERIAL BUS THREAT INTELLIGENCE
20230128474 · 2023-04-27 ·

A method includes: detecting, by a computing device, connection of a universal serial bus device to a computer; determining, by the computing device, that the computer is in a locked mode; detecting, by the computer device, input to the computer within a predetermined time of detecting the connection; determining, by the computing device as a result of the computer being locked and detecting the input, that the input is a threat to the computer; creating, by the computing device, a temporary virtual environment; receiving, by the computing device, the input into the temporary virtual environment; processing, by the computing device, the input in the temporary virtual environment; and recording, by the computing device, information related to the input.

GATHERING UNIVERSAL SERIAL BUS THREAT INTELLIGENCE
20230128474 · 2023-04-27 ·

A method includes: detecting, by a computing device, connection of a universal serial bus device to a computer; determining, by the computing device, that the computer is in a locked mode; detecting, by the computer device, input to the computer within a predetermined time of detecting the connection; determining, by the computing device as a result of the computer being locked and detecting the input, that the input is a threat to the computer; creating, by the computing device, a temporary virtual environment; receiving, by the computing device, the input into the temporary virtual environment; processing, by the computing device, the input in the temporary virtual environment; and recording, by the computing device, information related to the input.