Patent application number | Description | Published |
20080244302 | SYSTEM AND METHOD TO ENABLE AN EVENT TIMER IN A MULTIPLE EVENT TIMER OPERATING ENVIRONMENT - An information handling system including a local event timer operably associated with a management application interface is disclosed. The information handling system can also include a remote event timer accessible by a system management application. The remote event timer can be used relative to use of the local event timer. The information handling system can also include an event timer detection module operable to determine an availability of the local event timer relative to an operating system type. The event timer detection module can also initiate use of the local event timer, and disable use of the remote event timer in response to detecting a local event timer enabled operating system. A method and a chipset configured to be used by an information handling system are also disclosed. | 10-02-2008 |
20090006588 | Method for Heterogeneous System Configuration - A method for provisioning systems within a solution which includes mapping a physical identifier of a component within a system to a logical identifier of the component within a system and mapping the logical identifier of the component within a system to an implementation identifier of the component within the system. The mapping conforms to a predetermined user identifiable naming convention. | 01-01-2009 |
20090049270 | SYSTEM AND METHOD FOR USING A MEMORY MAPPING FUNCTION TO MAP MEMORY DEFECTS - A system and method are herein disclosed for managing memory defects in an information handling system. More particularly, a system and method are described for generating a usable memory map which excludes memory locations containing defect memory elements. In an information handling system, a memory defect map, which contains information about the location of defective memory elements, is coupled to the memory device. As a map of memory usable by the system is created, usable memory regions containing defective memory elements are excluded from the memory map. The memory map is passed to the operating system, which uses only those regions of memory designated as usable and non-defective. | 02-19-2009 |
20090049316 | SYSTEM AND METHOD OF MODIFYING POWER USE WITHIN AN INFORMATION HANDLING SYSTEM - A system and method of modifying power use within an information handling system is disclosed. In one form, a method of managing power within an information handling system is disclosed. The method can include establishing a threshold power level of a first information handling system, and detecting a first power demand of a first operating state in excess of the threshold power level. The method can also include detecting a request to invoke a first forced reduced power state of the first information handling system, and determining a first alternative power state different from the threshold power level and the first forced reduced power state. The method can further include initiating the first alternative power state. | 02-19-2009 |
20090049335 | System and Method for Managing Memory Errors in an Information Handling System - A method for handling memory defects during the POST phase and memory calibration in single processor and multiprocessor information handling systems is disclosed whereby information regarding the location of a known memory defect is utilized to optimize the performance of an information handling system. Memory defects within system memory are identified and replaced during operation with error free memory space. | 02-19-2009 |
20090070630 | SYSTEM AND METHOD OF IDENTIFYING AND STORING MEMORY ERROR LOCATIONS - A system and method of identifying and storing memory error locations is disclosed. In one form, a method of using a memory is disclosed. The method can include detecting a memory error during execution of a run time environment within an information handling system, and determining if the memory error is a correctable memory error. The method can also include identifying a first memory location within a first memory device causing the memory error, and storing a first reference to the first memory location within a persistent memory. The method can further include disabling use of the first memory location during use of the run time environment. | 03-12-2009 |
20090248949 | System and Method for Increased System Availability In Virtualized Environments - A method is provided for managing errors in a virtualized information handling system that includes an error detection system and a hypervisor allowing multiple virtual machines to run on the information handling system. The hypervisor may assign at least one memory region to each of multiple virtual machines. The error detection system may detect an error, determine a physical memory address associated with the error, and report that address to the hypervisor. Additionally, the hypervisor may determine whether the memory region assigned to each virtual machine includes the physical memory address associated with the error. The hypervisor may shut down each virtual machine for which a memory region assigned to that virtual machine includes the physical memory address associated with the error, and not shut down each virtual machine for which the memory regions assigned to that virtual machine do not include the physical memory address associated with the error. | 10-01-2009 |
20090307476 | SYSTEM AND METHOD OF DELAYING POWER-UP OF AN INFORMATION HANDLING SYSTEM - A system and method of delaying power-up of an information handling system is disclosed. According to an aspect, a method of powering an information handling system can include detecting a delay power-up setting within a basic input output system (BIOS) of a particular information handling system using a management controller. The management controller can be configured to delay power-up of the particular information handling system. The method can further include enabling a power-up of the particular information handling system in response to the delay power-up setting using the management controller. | 12-10-2009 |
20100107241 | SECURE CACHING OF SERVER CREDENTIALS - A credential caching system includes receiving a set of authentication credentials, storing the set of authentication credentials in a credential cache memory, wherein the credential cache memory is coupled with a management controller, and supplying the set of authentication credentials for automatic authentication during a reset or reboot. In the event of a security breach, the credential caching system clears the set of authentication credentials from the credential cache memory so that the set of authentication credentials may no longer be used for a reset or reboot. | 04-29-2010 |
20100111309 | ENCRYPTION KEY MANAGEMENT SYSTEM AND METHODS THEREOF - During execution of BIOS at an information handling system, a processor communicates with the storage controller via a command line protocol (CLP) communications channel. Via the channel, the processor obtains identification information for storage devices associated with the storage controller. The processor communicates the identification information to a key management client, which obtains encryption keys based on the identification information from a key management server. The processor receives the encryption keys, and communicates them to the storage controller via the CLP communications channel. The CLP communications channel thus provides a convenient and flexible interface for communication of security information prior to execution of an operating system. | 05-06-2010 |
20100115330 | Redundant Memory Architecture Management Methods and Systems - A method for managing a redundant memory architecture for an information handling system (IHS) may include providing redundant memory for a portion of system memory wherein the redundant memory is configured to mirror data stored in the portion of system memory. The method may further include reporting a parameter associated with the portion of system memory to an operating system of the IHS and executing a program from the portion of system memory. | 05-06-2010 |
20100185799 | System and Method for Security Configuration - A system and method for accessing and identifying the security parameters of a device in an information handling system is disclosed. A device in a computer system may operate according to a defined security protocol, and multiple security protocols may exist across the devices of the system. In operation, a configuration capability is defined within the PCI Express communications protocol. This capability includes a capabilities data structure through which parameters concerning the security parameters of the device may be identified and passed to a processor. | 07-22-2010 |
20100191800 | SYSTEM AND METHOD FOR MANAGING FEATURE ENABLEMENT IN AN INFORMATION HANDLING SYSTEM - A system to manage a key license includes an information handling system having non-volatile memory accessible to a processor. The non-volatile memory stores feature enablement information related to a feature that the information handling system is adapted to provide. The non-volatile memory stores instructions that are accessible to the processor and executable by the processor to send the feature enablement information related to the feature to an external system after the information handling system is deployed, and to request the feature enablement information, or other feature enablement information related to the feature, from the external system in response to receiving a request for the information handling system to provide the feature. | 07-29-2010 |
20100191989 | System And Method For Power Management At An Information Handling System Management Subsystem - An information handling system management subsystem power manager adjusts power consumption of the management subsystem based on operational conditions at the information handling system. The power manager powers down the management subsystem when the information handling system is powered down so that the management subsystem performs substantially only those functions needed to reboot itself to an operational state. If a power up command is received, the management subsystem reboots to an operational condition so that it can then restart the information handling system. In one embodiment, the power manager adjusts the clock of a processor that executes the management subsystem to maintain utilization of the processor within a predetermined range. | 07-29-2010 |
20100202617 | System and Method for Recovery Key Management - A system and method for managing the recovery key of a computer system is disclosed. The computer system includes a security layer, and the recovery key is stored locally to a memory location on the computer system, including, as examples, flash memory on the motherboard of the computer system or a USB port on the computer system. In operation, when it becomes necessary for the computer system to authenticate the recovery key, the recovery key may be retrieved from the local memory. The retrieval and storage of the recovery key may be managed by a remote administrator. The recovery key may be stored in a hidden partition in the storage location, and the recovery key may be cryptographically wrapped to add an additional layer of security. | 08-12-2010 |
20100235648 | Methods and systems for binding a removable trusted platform module to an information handling system - Methods and systems for binding a removable trusted platform module (TPM) subsystem module to an information handling system to provide a core root of trust for the information handling system without requiring soldering down or other hard and permanent (non-removable) attachment of a TPM device to the information handling system planar (e.g., motherboard). The removable TPM subsystem module may be a plug-in module that may be removed from the information handling system planar (e.g., motherboard), while at the same time maintaining the transitive chain of trust, and being capable of remotely attesting its trusted state. An information handling system platform may be provided that has the capability and flexibility of supporting multiple TPMs on the same system planar. | 09-16-2010 |
20100251044 | SYSTEM AND METHOD FOR USING A MEMORY MAPPING FUNCTION TO MAP MEMORY DEFECTS - A system and method are herein disclosed for managing memory defects in an information handling system. More particularly, a system and method are described for generating a usable memory map which excludes memory locations containing defect memory elements. In an information handling system, a memory defect map, which contains information about the location of defective memory elements, is coupled to the memory device. As a map of memory usable by the system is created, usable memory regions containing defective memory elements are excluded from the memory map. The memory map is passed to the operating system, which uses only those regions of memory designated as usable and non-defective. | 09-30-2010 |
20110138082 | Host-Based Messaging Framework for PCIe Device Management - A method of routing data in an information handling system can include receiving a notification from a management controller at a basic input/output system (BIOS) that includes a system management interrupt (SMI) handler. The a notification can indicate that the management controller has a data packet bound for a peripheral component interconnect express input/output (PCIe I/O) device coupled to a secondary processor. The method can include generating a system management interrupt at the information handling system via the BIOS SMI handler in response to the notification. The method can also include retrieving the data packet from the management controller via the BIOS SMI handler and sending a payload associated with the data packet from the BIOS SMI handler to the PCIe I/O device. | 06-09-2011 |
20110185356 | System and Method to Enable Power Related Decisions in a Virtualization Environment - A virtualization system includes an information handling system with a power detector that detects a power level of the information handling system and another power detector that detects another power level of the information handling system, a power status module, and a virtual machine manager that starts workloads on the information handling system. The power status module receives the power levels and sends the power levels to the virtual machine manager. The virtual machine manager apportions a first portion of the first power level to the first workload, apportions a second portion of the first power level to the second workload, apportions a first portion of the second power level to the first workload, and apportions a second portion of the second power level to the second workload. | 07-28-2011 |
20110258410 | Selective Management Controller Authenticated Access Control to Host Mapped Resources - An information handling system includes a host mapped general purpose input output (GPIO), a shared memory, a board management controller, and a cryptography engine. The host mapped GPIO includes a plurality of registers. The board management controller is in communication with the host mapped GPIO and with the shared memory, and is configured to control accessibility to the plurality of registers in the GPIO, and to control write accessibility of the shared memory based on a private key received from a basic input output system requesting accessibility to the plurality of registers and write accessibility of the shared memory. The cryptography engine is in communication with the board memory controller, and is configured to authenticate the private key received from the board management controller. | 10-20-2011 |
20120005539 | Peripheral Component Interconnect Express Root Port Mirroring - An information handling system includes a peripheral component interconnect express root complex, a basic input output system, and a root complex mirroring block. The peripheral component interconnect express root complex includes a plurality of peripheral component interconnect express ports. The basic input output system is in communication with the peripheral component interconnect express root complex, and is configured to detect a peripheral component interconnect express adaptor configuration, and to set a peripheral component interconnect express mirroring setting based on the peripheral component interconnect express adaptor configuration. The root complex mirroring block is in communication with the basic input output system, and is configured to mirror data between a first peripheral component interconnect express adaptor and a second peripheral component interconnect express adaptor based on the peripheral component interconnect express mirroring setting. | 01-05-2012 |
20120173862 | System and Method of Delaying Power-Up of an Information Handling System - A system and method of delaying power-up of an information handling system is disclosed. According to an aspect, a method of powering an information handling system can include detecting a delay power-up setting within a basic input output system (BIOS) of a particular information handling system using a management controller. The management controller can be configured to delay power-up of the particular information handling system. The method can further include enabling a power-up of the particular information handling system in response to the delay power-up setting using the management controller. | 07-05-2012 |
20120174201 | System and Method for Managing Feature Enablement in an Information Handling System - A system to manage a key license includes an information handling system having non-volatile memory accessible to a processor. The non-volatile memory stores feature enablement information related to a feature that the information handling system is adapted to provide. The non-volatile memory stores instructions that are accessible to the processor and executable by the processor to send the feature enablement information to an external system after the information handling system is deployed, and to request the feature enablement information, or other feature enablement information, from the external system in response to receiving a request for the information handling system to provide the feature. | 07-05-2012 |
20120198263 | SYSTEM AND METHOD FOR CREATING AND DYNAMICALLY MAINTAINING SYSTEM POWER INVENTORIES - In accordance with the present disclosure, a system and method for creating and dynamically maintaining power inventories of an information handling system is presented. A system for creating and dynamically maintaining power inventories of an information handling system may include a memory and a processor. The processor may be operable to generate power inventories for the information handling system and save the power inventories in the memory. Each of the power inventories may correspond to one of the power states of the information handling system. The processor may also be operable to dynamically update each of the saved power inventories in response to changes in the information handling system. | 08-02-2012 |
20120233508 | System and Method for Increased System Availability in Virtualized Environments - A method is provided for managing errors in a virtualized information handling system that includes an error detection system and a hypervisor allowing multiple virtual machines to run on the information handling system. The hypervisor may assign at least one memory region to each of multiple virtual machines. The error detection system may detect an error, determine a physical memory address associated with the error, and report that address to the hypervisor. Additionally, the hypervisor may determine whether the memory region assigned to each virtual machine includes the physical memory address associated with the error. The hypervisor may shut down each virtual machine for which a memory region assigned to that virtual machine includes the physical memory address associated with the error, and not shut down each virtual machine for which the memory regions assigned to that virtual machine do not include the physical memory address associated with the error. | 09-13-2012 |
20120254506 | SYSTEM AND METHOD FOR PERFORMING SYSTEM MEMORY SAVE IN TIERED/CACHED STORAGE - In accordance with the present disclosure, a system and method for performing a system memory save in tiered or cached storage during transition to a decreased power state is disclosed. As disclosed herein, the system incorporating aspects of the present invention may include a flash or other nonvolatile memory such as a solid-state drive, volatile memory, and at least one alternate storage media. Upon transition to a decreased power state, at least some of the data in the solid-state drive, for example, may be transferred to the at least one alternate storage media. After the SSD data is transferred, data stored in volatile system memory, such as a system context, may be transferred to the SSD memory. With the system context saved in SSD memory, power to the volatile system memory may be turned off. | 10-04-2012 |
20130097681 | SECURE CACHING OF SERVER CREDENTIALS - A credential caching system includes receiving a set of authentication credentials, storing the set of authentication credentials in a credential cache memory, wherein the credential cache memory is coupled with a management controller, and supplying the set of authentication credentials for automatic authentication during a reset or reboot. In the event of a security breach, the credential caching system clears the set of authentication credentials from the credential cache memory so that the set of authentication credentials may no longer be used for a reset or reboot. | 04-18-2013 |
20130124768 | Host-Based Messaging Framework for PCIE Device Management - A method of routing data in an information handling system can include receiving a notification from a management controller at a basic input/output system (BIOS) that includes a system management interrupt (SMI) handler. The a notification can indicate that the management controller has a data packet bound for a peripheral component interconnect express input/output (PCIe I/O) device coupled to a secondary processor. The method can include generating a system management interrupt at the information handling system via the BIOS SMI handler in response to the notification. The method can also include retrieving the data packet from the management controller via the BIOS SMI handler and sending a payload associated with the data packet from the BIOS SMI handler to the PCIe I/O device. | 05-16-2013 |
20130125123 | System and Method to Enable Power Related Decisions in a Virtualization Environment - An information handling system includes a first power detector that detects a first power level of the information handling system, a second power detector that detects a second power level of the information handling system, and a virtual machine manager. The virtual machine manager is operable to receive the first power level and the second power level, apportion a first portion of the first power level to a first workload instantiated on the information handling system, apportion a second portion of the first power level to a second workload instantiated on the information handling system, apportion a first portion of the second power level to the first workload, and apportion a second portion of the second power level to the second workload. | 05-16-2013 |
20130173957 | Peripheral Component Interconnect Express Root Port Mirroring - An information handling system includes a peripheral component interconnect express root complex, a basic input output system, and a root complex mirroring block. The peripheral component interconnect express root complex includes a plurality of peripheral component interconnect express ports. The basic input output system is in communication with the peripheral component interconnect express root complex, and is configured to detect a peripheral component interconnect express adaptor configuration, and to set a peripheral component interconnect express mirroring setting based on the peripheral component interconnect express adaptor configuration. The root complex mirroring block is in communication with the basic input output system, and is configured to mirror data between a first peripheral component interconnect express adaptor and a second peripheral component interconnect express adaptor based on the peripheral component interconnect express mirroring setting. | 07-04-2013 |
20130318338 | Selective Management Controller Authenticated Access Control to Host Mapped Resources - An information handling system includes a host mapped general purpose input output (GPIO), a shared memory, a board management controller, and a cryptography engine. The host mapped GPIO includes a plurality of registers. The board management controller is in communication with the host mapped GPIO and with the shared memory, and is configured to control accessibility to the plurality of registers in the GPIO, and to control write accessibility of the shared memory based on a private key received from a basic input output system requesting accessibility to the plurality of registers and write accessibility of the shared memory. The cryptography engine is in communication with the board memory controller, and is configured to authenticate the private key received from the board management controller. | 11-28-2013 |
20130318386 | System and Method of Modifying Power Use within an Information Handling System - A system and method of modifying power use within an information handling system is disclosed. In one form, a method of managing power within an information handling system is disclosed. The method can include establishing a threshold power level of a first information handling system, and detecting a first power demand of a first operating state in excess of the threshold power level. The method can also include detecting a request to invoke a first forced reduced power state of the first information handling system, and determining a first alternative power state different from the threshold power level and the first forced reduced power state. The method can further include initiating the first alternative power state. | 11-28-2013 |
20140100706 | POWER SYSTEM UTILIZING PROCESSOR CORE PERFORMANCE STATE CONTROL - An information handling system includes a power supply coupled to a processor that includes a plurality of cores. A power system controller is coupled to the power supply and the processor. The power system controller may set each of the plurality of cores to a performance state that is below a highest performance state. The power system controller may then determine whether the power supplied from the power supply to the processor during operation is sufficient to operate each of the plurality of cores at the highest performance state. In response to the power being insufficient to operate each of the plurality of cores at the highest performance state, the power system controller may control the plurality of cores such that a subset operate at the highest performance state and the remainder operate at a performance state that is lower than the highest performance state. | 04-10-2014 |
20140108778 | Method for Reducing Execution Jitter in Multi-Core Processors Within an Information Handling System - A method of reducing execution jitter includes a processor having several cores and control logic that receives core configuration parameters. Control logic determines if a first set of cores are selected to be disabled. If none of the cores is selected to be disabled, the control logic determines if a second set of cores is selected to be jitter controlled. If the second set of cores is selected to be jitter controlled, the second set of cores is set to a first operating state. If the first set of cores is selected to be disabled, the control logic determines a second operating state for a third set of enabled cores. The control logic determines if the third set of enabled cores is jitter controlled, and if the third set of enabled cores is jitter controlled, the control logic sets the third set of enabled cores to the second operating state. | 04-17-2014 |
20140298327 | System and Method for Automating Virtual Network Provisioning - A method includes receiving a deployment template at a host system, partitioning a networking device of the host system with a virtual network partition based upon the deployment template, receiving attribute data that includes a first attribute associated with the first virtual network partition, loading the networking device with the attribute data, launching a virtual machine manager on the host system, reading the attribute from the networking device, and assigning a virtual network interface of a virtual switch associated with the virtual machine manager to the virtual network partition in response to reading the attribute. | 10-02-2014 |
20140373151 | System and Method for Operating Malicious Marker Detection Software on Management Controller of Protected System - An information handling system includes a processor and a management controller separate from the processor. The management controller is operable to store an anti-virus program and a malicious marker detection program in a memory of the management controller, and to execute the malicious marker detection program. The malicious marker detection program operates to detect a state of a device of the information handling system, determine that the information handling system is under attack from a malicious program in response to detecting the state of the device, and send an alert to a management system coupled to the information handling system, the alert indicating that the information handling system is under attack from the malicious program. | 12-18-2014 |
20150058640 | SYSTEM AND METHOD FOR RECOVERY KEY MANAGEMENT - A system and method for managing the recovery key of a computer system is disclosed. The computer system includes a security layer, and the recovery key is stored locally to a memory location on the computer system, including, as examples, flash memory on the motherboard of the computer system or a USB port on the computer system. In operation, when it becomes necessary for the computer system to authenticate the recovery key, the recovery key may be retrieved from the local memory. The retrieval and storage of the recovery key may be managed by a remote administrator. The recovery key may be stored in a hidden partition in the storage location, and the recovery key may be cryptographically wrapped to add an additional layer of security. | 02-26-2015 |