发明名称 Authentication using lights-out management credentials
摘要 A method includes upon receiving a request from a user to perform an operation on a device that is running under an operating system, authenticating the user on the basis of credential data that is retrieved from a data storage unit that is associated with a lights-out management (LOM) capability of the device. If authentication of the user is successful, the user is enabled to perform the operation.
申请公布号 US9218462(B2) 申请公布日期 2015.12.22
申请号 US201213455467 申请日期 2012.04.25
申请人 Hewlett Packard Enterprise Development LP 发明人 Ayvaz Cemil J;Cisneros Jorge Daniel;Preimesberger Lee A
分类号 H04L29/06;G06F21/00 主分类号 H04L29/06
代理机构 Pearl Cohen Zedek Latzer LLP 代理人 Pearl Cohen Zedek Latzer LLP
主权项 1. A method comprising: receiving a first request by a user, the first request being received over a network by a light-out management (LOM) enabling unit, the first request being received while a host server hosting the LOM enabling unit is in a powered-down state; in response to receiving the first request, retrieving, by the LOM enabling unit, a LOM credential from a LOM data storage unit of the LOM enabling unit, wherein LOM credentials indicate which permissions are granted to each user from a group of users, and wherein users are added, removed, or both, from the group of users; authenticating, by the LOM enabling unit, the user based on the LOM credential from the LOM data storage unit, wherein the LOM data storage unit includes a current table of users, and wherein the current table of users is modified upon booting a host server operating system; upon authentication of the user in response to the first request, the LOM enabling unit fulfilling or enabling the user to fulfill the first request; powering up the host server hosting the LOM enabling unit after fulfilling the first request; receiving, by an application executing on the host server using a processor that is separate from the LOM enabling unit, a second request from the user to perform an operation, wherein the second request is different from the first request; in response to receiving the second request, retrieving, by the application, the LOM credential from the LOM data storage unit; authenticating, by the application, the user based on the LOM credential that is retrieved from the LOM data storage unit; and upon authentication of the user in response to the second request, the application fulfilling or enabling the user to fulfill the second request.
地址 Houston TX US