Patent application number | Description | Published |
20090217057 | Download And Burn To Rent System - A system and method provide for content to be downloaded by an information handling system (IHS) and written to an optical storage medium. The content is protected by a content protection system. The content on the storage medium may be decrypted and displayed by a playback device. An invalid credential is written to the storage medium, for example, after display of the content. The invalid credential restricts decryption of the content. Examples of credentials that may be invalidated by writing an invalid credential to the storage medium include any keys, usage rules, or other items required for the decryption of content, for example, under content scrambling system (CSS) or advanced access content system (AACS) content protection systems. | 08-27-2009 |
20100031310 | SYSTEM AND METHOD FOR ROAMING PROTECTED CONTENT BACKUP AND DISTRIBUTION - A method includes receiving content and a license to the content at a storage system, receiving a request from a user system for the storage system to send the content and license to the user system, and sending the content and license from the storage system to the user system. Another method includes requesting content and a license to the content, receiving the content and license at a user system, requesting from the user system that the content and license be sent to a storage system, and requesting from the user system that the storage system send the content item to a second user system. In one embodiment, code could be used to perform a method that includes requesting content and a license to the content from a content provider, storing the content and license at a user system and a storage system, and requesting that the storage system send the content to another user system. | 02-04-2010 |
20100125914 | PROTECTED INFORMATION STREAM ALLOCATION USING A VIRTUALIZED PLATFORM - A protected stream manager includes one or more subsystems to receive a content stream in a virtual environment, obfuscate the content stream, and prioritize use of a processor to process the content stream. | 05-20-2010 |
20100146267 | Systems and methods for providing secure platform services - Systems and methods for providing secure platform services using an information handling system, and which may be implemented to sequester or otherwise isolate sensitive cryptographic processes, as well as the keys used during such decryption and encryption processes. The systems and methods may be implemented as a set of secure services that are available to an operating system or to a Hypervisor executing on an information handling system, and the processing environment may be provided as a closed environment, thus preventing malicious code from infiltrating the processing environment. Dedicated and secure memory space may be employed to prevent key detection through memory scans. | 06-10-2010 |
20100146582 | ENCRYPTION MANAGEMENT IN AN INFORMATION HANDLING SYSTEM - A method of enforcing an encryption policy in an information handling system for receiving a request for access to data, automatically identifying from a plurality of encryption policies a particular encryption policy associated with the requested data, selecting an available encryption implementation module capable of enforcing the identified encryption policy, and initiating an encryption or decryption of the requested data using the selected encryption implementation module. | 06-10-2010 |
20100249960 | Speaker Management Methods and Systems - A method is provided for providing speaker management. The method may include initializing an information handling system (IHS) and initializing an external speaker coupled to the IHS. The external speaker may have a device identifier (ID) associated with it. Therefore, the method may also include receiving the device ID and automatically loading an audio driver corresponding to the device ID. Using speaker compensation parameters associated with the audio driver, the method may include filtering audio data sent to the external speaker. | 09-30-2010 |
20110112666 | System and Method for Interfacing an Audio Connector and Jack at an Information Handling System - An analog connector disposed at an information handling system housing accepts both analog audio information and digital audio information at plural connection surfaces by accepting either an analog or digital jack. An audio subsystem of the information handling system manages audio information at the connector by selectively configuring to handle analog or digital signals based upon the type of jack insert into the connector. Selection of analog or digital management is performed manually through a user interface or automatically by detection of the type of jack inserted in the connector. In one embodiment, a four pole analog connector accepts a four pole digital jack that communicates serial data through a pole connection surface instead of analog signals. | 05-12-2011 |
20110191765 | System and Method for Self-Provisioning of Virtual Images - A system, method, and computer-readable medium are disclosed for automatically provisioning a virtual image on a target system. A service operating system comprising a virtual machine monitor and a personalization agent is installed on a target system. A set of digital assets entitlement data is provided along with an associated set of digital assets data contained in a virtual software image, which is then installed on the target system by the personalization agent. | 08-04-2011 |
20110202979 | SYSTEM AND METHOD FOR USING RESOURCES OF A COMPUTER SYSTEM IN CONJUNCTION WITH A THIN MEDIA CLIENT - A computer system including a processor and a memory for retrieving digital media content, storing the digital media content in the memory, and providing the digital media content to a thin media client is provided. | 08-18-2011 |
20110296157 | System and Method for Supporting Secure Subsystems in a Client Hosted Virtualization System - An client hosted virtualization system includes an authentication device, a processor and non-volatile memory with BIOS code and virtualization manager code. The virtualization manager initializes the client hosted virtualization system authenticates a virtual machine image, launches a portion of the virtual machine that initiates an authentication session with the authentication device, receives an authentication object from the authentication device, sends the authentication object to the portion of the virtual machine, and launches another portion of the virtual machine. The client hosted virtualization system is configurable to execute the BIOS or the virtualization manager. | 12-01-2011 |
20110296196 | System and Method for Supporting Task Oriented Devices in a Client Hosted Virtualization System - A client hosted virtualization system includes a task oriented device, a processor, and non-volatile memory with BIOS code and virtualization manager code. The virtualization manager initializes the client hosted virtualization system, authenticates a virtual machine image, launches the virtual machine based on the image, receives a transaction targeted to the task oriented device, prioritizes the transaction, sends the transaction to the task oriented device, receives a response from the task oriented device, and sends the response to the virtual machine. The client hosted virtualization system is configurable to execute the BIOS or the virtualization manager. | 12-01-2011 |
20110296197 | System and Method for Supporting Full Volume Encryption Devices in a Client Hosted Virtualization System - A client hosted virtualization system includes a full volume encryption (FVE) storage device, a processor, and non-volatile memory with BIOS code and virtualization manager code. The virtualization manager initializes the client hosted virtualization system, authenticates a virtual machine image, launches the virtual machine based on the image, receives a transaction from the virtual machine targeted to the FVE storage device, sends the transaction to the FVE storage device, receives a response from the FVE storage device, and sends the first response to the first virtual machine. The client hosted virtualization system is configurable to execute the BIOS or the virtualization manager. | 12-01-2011 |
20110305207 | System and Method for Information Handling System Wireless Audio Driven Antenna - Audio information coexists with best efforts data on a wireless network, such as a wireless local area network, by defining a backoff dedicated to communicate of audio information and using undedicated resources to communicate best efforts data. The backoff has a periodic interval that corresponds to the sample rate of the audio information so that a set of audio frame slots communicated at the start of a backoff interval has a length of time to complete communication. The set of audio frame slots has, for instance, an audio frame slot for each audio endpoint interfaced with the network. Periodic backoffs ensures synchronized audio playback by dedicating an antenna to communication of audio frames at the sample rate of the audio information, while supporting best efforts network communication when audio information is not being communicated. | 12-15-2011 |
20120311699 | System and Method for Providing Access to an Information Handling System - An information handling system includes a memory and a detector circuit. The memory is configured to store a first electrocardiogram measurement. The detector circuit is configured to receive a second electrocardiogram measurement in response to a specific combination of keys of a keyboard being pressed for a specific period of time, wherein each key in the specific key combination includes an electrocardiogram sensor on a top surface of the key, to authorize a user and log the user onto the information handling system when the second electrocardiogram measurement matches the first electrocardiogram measurement, and otherwise: to deny access to the information handling system; to increase a counter; to determine whether the counter has exceeded a threshold; and to request that an input window is displayed when the counter has exceeded the threshold. | 12-06-2012 |
20130243202 | SYSTEM AND METHOD FOR INFORMATION HANDLING SYSTEM WIRELESS AUDIO DRIVEN ANTENNA - Audio information coexists with best efforts data on a wireless network, such as a wireless local area network, by defining a backoff dedicated to communicate of audio information and using undedicated resources to communicate best efforts data. The backoff has a periodic interval that corresponds to the sample rate of the audio information so that a set of audio frame slots communicated at the start of a backoff interval has a length of time to complete communication. The set of audio frame slots has, for instance, an audio frame slot for each audio endpoint interfaced with the network. Periodic backoffs ensures synchronized audio playback by dedicating an antenna to communication of audio frames at the sample rate of the audio information, while supporting best efforts network communication when audio information is not being communicated. | 09-19-2013 |
20130254523 | System and Method for Supporting Full Volume Encryption Devices in a Client Hosted Virtualization System - A client hosted virtualization system includes a full volume encryption (FVE) storage device, a processor, and non-volatile memory with BIOS code and virtualization manager code. The virtualization manager initializes the client hosted virtualization system, authenticates a virtual machine image, launches the virtual machine based on the image, receives a transaction from the virtual machine targeted to the FVE storage device, sends the transaction to the FVE storage device, receives a response from the FVE storage device, and sends the first response to the first virtual machine. The client hosted virtualization system is configurable to execute the BIOS or the virtualization manager. | 09-26-2013 |
20130254861 | System and Method for Providing Access to an Information Handling System - An information handling system includes a memory and a detector circuit. The memory is configured to store a first electrocardiogram measurement. The detector circuit is configured to receive a second electrocardiogram measurement in response to a specific combination of keys of a keyboard being pressed for a specific period of time, wherein each key in the specific key combination includes an electrocardiogram sensor on a top surface of the key, to authorize a user and log the user onto the information handling system when the second electrocardiogram measurement matches the first electrocardiogram measurement, and otherwise: to deny access to the information handling system; to increase a counter; to determine whether the counter has exceeded a threshold; and to request that an input window is displayed when the counter has exceeded the threshold. | 09-26-2013 |
20130276128 | SECURE OPTION ROM FIRMWARE UPDATES - Option ROM updates are performed in a secure manner with centralized control through system initialization firmware, such as the system BIOS. An option ROM updater manages copying an option ROM update to an auxiliary subsystem if an update bit is set, such as by a secure system management interface with the BIOS. Upon detection of an update bit, the option ROM updater unlocks a write protect at the auxiliary subsystem firmware and copies an option ROM update to the auxiliary subsystem to update the option ROM. After completing the option ROM update, the option ROM updater locks write protection of the option ROM to maintain system security. | 10-17-2013 |
20140137212 | SYSTEM AND METHOD FOR USING RESOURCES OF A COMPUTER SYSTEM IN CONJUNCTION WITH A THIN MEDIA CLIENT - A computer system including a processor and a memory for retrieving digital media content, storing the digital media content in the memory, and providing the digital media content to a thin media client is provided. | 05-15-2014 |
20140143430 | System and Method for Peer-to-Peer Management Through Policy and Context Replication - A method of context replication including receiving a first context item at a first system in a network, determining that the first system is a context management master system, establishing a first peer-to-peer session with a second system in the network in response to determining that the first system is the context management master system, and providing, from the first system, the first context item to the second system. | 05-22-2014 |
20140208090 | SYSTEMS AND METHODS FOR COMMAND-BASED ENTRY INTO BASIC INPUT/OUTPUT SYSTEM SETUP FROM OPERATING SYSTEM - In accordance embodiments of the present disclosure, a method may include, during execution of an operating system on an information handling system and responsive to a user input indicating a desire to invoke a basic input/output system (BIOS) setup program for configuring a BIOS, prompting for and receiving user-provided credentials via a user interface communicatively coupled to the processor. The method may also include, during execution of the operating system, passing BIOS credentials to the BIOS based on the user-provided credentials. The method may additionally include, during execution of the operating system determining, by the BIOS, if the BIOS credentials are valid. The method may further include, responsive to determining that the BIOS credentials are valid, setting a flag to a value indicating that the BIOS setup program is to be invoked on a subsequent boot of the information handling system. | 07-24-2014 |
20140208383 | SYSTEMS AND METHODS FOR SECURITY TIERING IN PEER-TO-PEER NETWORKING - A method may also include receiving from each of one or more of potential peer information handling systems a connection request comprising a peer minimum acceptable security level for the peer information handling system. The method may additionally include comparing the peer minimum acceptable security level to a security level of the information handling system. The method may further include completing a peer-to-peer connection between the information handling system and the peer information handling system if the minimum acceptable security level is not higher than that of the security level of the information handling system. | 07-24-2014 |
20150143465 | SYSTEMS AND METHODS FOR SECURITY TIERING IN PEER-TO-PEER NETWORKING - A method may also include receiving from each of one or more of potential peer information handling systems a connection request comprising a peer minimum acceptable security level for the peer information handling system. The method may additionally include comparing the peer minimum acceptable security level to a security level of the information handling system. The method may further include completing a peer-to-peer connection between the information handling system and the peer information handling system if the minimum acceptable security level is not higher than that of the security level of the information handling system. | 05-21-2015 |
20150278293 | ASYNCHRONOUS IMAGE REPOSITORY FUNCTIONALITY - Embodiments of methods for asynchronous image repository functionality are presented. In an embodiment, a method includes storing user data in a data storage device that is local to a user interface device, storing a copy of the user data to a storage location that is remote from the user interface device, performing a service for a user of the user interface device using the copy of the user data stored to the storage location, and communicating information associated with the service back to the user interface device. Additionally, the data image may be directly scanned for malicious software. In a further embodiment, the method may include providing a software inventory associated with the user data, such as software, stored in the image. | 10-01-2015 |
20150278525 | SYSTEMS AND METHODS FOR COMMAND-BASED ENTRY INTO BASIC INPUT/OUTPUT SYSTEM SETUP FROM OPERATING SYSTEM - In accordance embodiments of the present disclosure, a method may include, during execution of an operating system on an information handling system and responsive to a user input indicating a desire to invoke a basic input/output system (BIOS) setup program for configuring a BIOS, prompting for and receiving user-provided credentials via a user interface communicatively coupled to the processor. The method may also include, during execution of the operating system, passing BIOS credentials to the BIOS based on the user-provided credentials. The method may additionally include, during execution of the operating system determining, by the BIOS, if the BIOS credentials are valid. The method may further include, responsive to determining that the BIOS credentials are valid, setting a flag to a value indicating that the BIOS setup program is to be invoked on a subsequent boot of the information handling system. | 10-01-2015 |
20150341363 | SYSTEM AND METHOD FOR USING RESOURCES OF A COMPUTER SYSTEM IN CONJUNCTION WITH A THIN MEDIA CLIENT - A computer system including a processor and a memory for retrieving digital media content, storing the digital media content in the memory, and providing the digital media content to a thin media client is provided. | 11-26-2015 |