Patent application number | Description | Published |
20090178037 | ACCESSING A NETWORK - An information handling system (IHS) includes a hypervisor and a plurality of virtual machines (VMs). The hypervisor includes hypervisor network information. Each of the VMs includes a virtual processor and a virtual memory that is coupled to the virtual processor. The virtual memory includes VM network information and computer readable instructions to synchronize the VM network information with the hypervisor network information. | 07-09-2009 |
20090210456 | Methods, Systems and Media for TPM Recovery Key Backup and Restoration - A method of trusted platform module (TPM) activation and recovery in an information handling system (IHS). The method includes providing a first virtual recording medium associated with a first recording medium, wherein the first recording medium is coupled to a management console. Further, a TPM recovery key is stored on the first virtual recording medium. | 08-20-2009 |
20090316574 | PATH MAXIMUM TRANSMISSION UNIT DETERMINATION - Disclosed are techniques for determining a path maximum transmission unit (MTU) of a communication path connecting two or more nodes of a network. A node initiates a connection with a remote node by repeatedly transmitting increasingly-larger path MTU discovery messages until the size of a path MTU discovery message exceeds the link MTU of a link within the communication path. This results in the generation and transmission of an MTU error message back to the initiating node. The edge router linked to the initiating node generates a MTU change message in response to receiving the MTU error message and multicasts the MTU change message to all local nodes to which it is linked. The MTU change message directs the receiving nodes to update their destination caches to reflect the path MTU discovered through the use of the increasing-size path MTU discovery messages and the resulting MTU error message. | 12-24-2009 |
20100091684 | System and Method for Discovery of Dynamically Assigned Information Handling System IP Addresses - A network manager tracks network nodes in an IPv6 network by identifying server nodes that dynamically-assign network addresses, such as DHCP server nodes, retrieving prefix information from the DHCP server nodes, and querying a range of network addresses determined from application of the prefix information to identify client nodes of each DHCP server node. In one embodiment, the prefix information comprises a start prefix value that identifies the starting address of the range and a prefix length value that determines the number of addresses in the range. For example, the network manager sends echo messages to each address in the range by starting at an address determined from the start prefix value and incrementing the network address for a number of increments equal to at least the prefix length value. | 04-15-2010 |
20100202617 | System and Method for Recovery Key Management - A system and method for managing the recovery key of a computer system is disclosed. The computer system includes a security layer, and the recovery key is stored locally to a memory location on the computer system, including, as examples, flash memory on the motherboard of the computer system or a USB port on the computer system. In operation, when it becomes necessary for the computer system to authenticate the recovery key, the recovery key may be retrieved from the local memory. The retrieval and storage of the recovery key may be managed by a remote administrator. The recovery key may be stored in a hidden partition in the storage location, and the recovery key may be cryptographically wrapped to add an additional layer of security. | 08-12-2010 |
20110202685 | System and Method for Communication Between an Information Handling System and Management Controller Through a Shared LOM - Communications between a host information handling system and its management controller sent through a shared LOM are re-directed at the LOM from communication through a network to instead communicate directly between the host information handling system and management controller. A management module compares destination addresses of packets sent from the host information handling system and the management controller with host information handling system and management controller network addresses stored on the LOM. Packets having destination address that match a host information handling system or management controller network address are redirected from communication across the network to communicate directly between the host information handling system and management controller. | 08-18-2011 |
20130173810 | System and Method of Enabling a Multi-Chassis Virtual Switch for Virtual Server Network Provisioning - A multi-chassis server system has several chassis, each including a chassis management controller (CMC) and a blade server with a blade management controller (BMC) and a virtual switch (VS). The first CMC establishes management sessions with the second CMC and the first BMC. The second CMC establishes a management session with the second BMC. A switch path on a virtual switch is provided via a management session to the first CMC and another switch path on another virtual switch is provided via a management session to the second chassis management controller and by another management session to the first CMC. The switch paths are aggregated into a chassis management controller virtual switch on the first chassis management controller. | 07-04-2013 |
20150058640 | SYSTEM AND METHOD FOR RECOVERY KEY MANAGEMENT - A system and method for managing the recovery key of a computer system is disclosed. The computer system includes a security layer, and the recovery key is stored locally to a memory location on the computer system, including, as examples, flash memory on the motherboard of the computer system or a USB port on the computer system. In operation, when it becomes necessary for the computer system to authenticate the recovery key, the recovery key may be retrieved from the local memory. The retrieval and storage of the recovery key may be managed by a remote administrator. The recovery key may be stored in a hidden partition in the storage location, and the recovery key may be cryptographically wrapped to add an additional layer of security. | 02-26-2015 |