US 12,267,441 B2
System and method for securing operation of data processing systems during and after onboarding
Bradley K. Goodman, Nashua, NH (US); Kirk Alan Hutchinson, Londonderry, NH (US); and Joseph Caisse, Burlington, MA (US)
Assigned to Dell Products L.P., Round Rock, TX (US)
Filed by Dell Products L.P., Round Rock, TX (US)
Filed on Oct. 14, 2022, as Appl. No. 18/046,595.
Prior Publication US 2024/0129134 A1, Apr. 18, 2024
Int. Cl. H04L 9/32 (2006.01); H04L 9/08 (2006.01)
CPC H04L 9/3265 (2013.01) [H04L 9/0819 (2013.01); H04L 9/3247 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for managing operation of a data processing system, the method comprising:
obtaining, by the data processing system, a key with authority over the data processing system, the key being obtained from an ownership voucher received by the data processing system during a secure onboarding of the data processing system;
obtaining, by the data processing system and after completion of the secure onboarding, a command, the command specifying a change in operation of the data processing system, the command being allegedly signed by an entity with the authority over the data processing system;
making, by the data processing system, a determination regarding whether the command is verifiable using the key and a chain of certificates from the ownership voucher, the chain of certificates defining a chain of trust to a root of trust for the data processing system; and
in a first instance of the determination where the command is verifiable, executing, by the data processing system, the command to conform the operation of the data processing system to the change specified by the command.