US 12,235,998 B2
Systems and methods for secure access to a computing system
Cheng-Han Chen, Taoyuan (TW); and Jyun-Jei Huang, Taoyuan (TW)
Assigned to QUANTA COMPUTER INC., Taoyuan (TW)
Filed by Quanta Computer Inc., Taoyuan (TW)
Filed on Jul. 28, 2022, as Appl. No. 17/875,967.
Prior Publication US 2024/0037283 A1, Feb. 1, 2024
Int. Cl. G06F 21/64 (2013.01); G06F 21/31 (2013.01); G06F 21/57 (2013.01)
CPC G06F 21/64 (2013.01) [G06F 21/31 (2013.01); G06F 21/572 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A computing system comprising:
a basic input output system (BIOS);
a baseboard management controller (BMC) coupled to the BIOS, the BMC being configured to receive commands from one or more users of the computing system, and transition between a locked state and an unlocked state; and
one or more hardware components coupled to the BIOS and the BMC,
wherein the BMC is further configured to, while the computing system is operating in a standard runtime environment after a boot process:
receive an unlock command from a respective user of the one or more users, the unlock command including an unlock signature;
determine whether the unlock signature is authentic;
in response to being in the locked state and determining that the unlock signature is authentic, transition to the unlocked state to allow the respective user to access the one or more hardware components
in response to transitioning to the unlocked state, remain in the unlocked state for a period; and
in response to the period ending, transition from the unlocked state to the locked state,
wherein the predetermined period includes an amount of time, a number of commands received from the respective user, or both.