G06F21/629

COMMAND AUTHORITY EXTENSION SYSTEM AND METHOD FOR SECURITY PROTOCOL AND DATA MODEL (SPDM) SECURE COMMUNICATION CHANNELS

An Information Handling System (IHS) includes at least one hardware device in communication with a Baseboard Management Controller (BMC). The hardware device includes executable instructions for establishing a secure communication channel with the BMC, and subsequently receiving a list of allowed commands from the BMC. When a command is received by the hardware device, it determines whether the command is included in the list such that when the command is in the list and the command is received within the secure communication channel, the hardware device performs the command. However, when the command is in the list and the command is received outside of the secure communication channel, the hardware device ignores the command.

Portable policy execution using embedded machines

Some embodiments provide a method for evaluating authorization policies that restrict access to API (Application Programming Interfaces) calls to an application executing on a host system. At the application, the method receives an API call to execute. The method directs a process virtual machine (VM) executing inside the application to make an authorization decision for the API call. The method executes the API call after receiving an authorization decision to allow the API call from the process VM executing inside the application.

Signing and verifying mutable structured documents
11593495 · 2023-02-28 · ·

A structured document is verified for changes that are made during and after deployment of an application. The structured document includes first fields that are designated as mutable, and second fields that are designated as immutable. An attempted change is detected to the structured document during or after deployment of the application. Upon detecting the attempted change, a digital signature is generated of the second fields of the structured document. A determination is made whether the generated digital signature of the second fields matches a reference digital signature of the second fields. Upon determining that the generated digital signature matches the reference digital signature, the change to the structured document is permitted. Upon determining that the generated digital signature does not match the reference digital signature, the change is blocked to the structured document.

Registered applications for electronic devices

The subject technology provides a portion of the functionality of an application on an electronic device on which the application is not installed. The portion of the functionality of the application is provided by a clip of the application that can be obtained, installed, and launched on the user device, at the time the functionality is desired by a user, and without authenticating information for the user. The clip of the application can provide the user with access to a purchase function, an ordering function, or any other sub-function of the application. When the application itself is installed on the device, the clip of the application can be deleted while preserving access, by the application, to data generated on the device by the clip.

Protection of and access to data on computing devices

Techniques for changing the presentation of information on a user interface based on presence are described. In an example, a computer system determines, based on an image sensor associated with the system, a first presence of a first user relative to a computing device. The computer system also determines an identifier of the first user. The identifier is associated with operating the computing device. The operating comprises a presentation of the user interface by the computing device. The computer system also determines, based on the image sensor, a second presence of a second person relative to the computing device. The computer system causes an update to the user interface based on the second presence.

ELECTRONIC DEVICE AND REMOTE CONTROL SYSTEM
20180004423 · 2018-01-04 ·

A computer includes an SMS module that communicates with a management server apparatus via a network, a display that displays predetermined information, and a CPU that controls an operation of the display. When the SMS module receives a control command from the management server apparatus via the network, the CPU executes processing corresponding to the control command. Furthermore, the CPU transmits a notification signal including information, which indicates a state of execution of the control program, to the management server apparatus via the network.

Furthermore, the CPU displays, on the display, a state indicator including information which indicates a state of execution of the control program when the notification signal cannot be transmitted to the management server apparatus via the network.

System, method, and computer program product for improved embedded application data management

Embodiments of the present disclosure provide for improved interoperable data management between a user-accessed software application and an embedded software application. In some contexts, a user-accessed application provides both its own functionality as well as enabling access to functionality of an embedded application. The embedded application is accessed via a data-driven connection that provides several technical advantages and addresses various data interoperability and persistence problems. In some embodiments, a user-accessed application may be configured to provide functionality of multiple embedded applications consistent with the innovations herein described.

REMOTE FEATURE ACTIVATION IN POWER MACHINES

Implementations of the present disclosure are generally directed to activating features in power machines. More particularly, implementations of the present disclosure are directed to remote activation of features in power machines. Implementations include, methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for transmitting a request for an initialization indicator for a software package from an initialization system of a power machine comprising hardware physically capable of executing at least one function, the request being transmitted, by a communication link of the initialization system, from a machine controller of the initialization system to a remote system, communicating, by the communication link, the initialization indicator from the remote system to the machine controller, and in response to receiving the initialization indicator: storing, by the machine controller, the initialization indicator, and executing, by the machine controller, the software package to control the at least one function.

CRYPTOGRAPHIC FEATURE LICENSING
20230006821 · 2023-01-05 ·

Techniques to facilitate feature licensing of an industrial controller employed in an industrial automation environment are disclosed. In one implementation, a first private key unique to an industrial controller and a security certificate is stored in a hardware root of trust within the controller. The security certificate is signed by a certificate authority for authenticating the controller. After being authenticated, the industrial controller receives a device information package provided by the certificate authority. The device information package is encrypted with a first public key paired with the first private key and signed using a second private key assigned to the certificate authority. The controller validates the device information package using a second public key paired with the second private key and decrypts the package using the first private key. One or more functions of the industrial controller are enabled based on a license included in the device information package.

APPARATUS, METHOD, AND COMPUTER READABLE MEDIUM
20230239305 · 2023-07-27 ·

Provided is an apparatus including: a storage unit configured to store an account having a use authority for each of a plurality of learning algorithms; a use control unit configured to restrict use of each learning algorithm to a user of an account having a use authority for the learning algorithm; and a learning processing unit configured to perform learning processing of a learning model by one learning algorithm of the plurality of learning algorithms by using learning data supplied from a user of an account having a use authority for the one learning algorithm.