US 11,657,138 B2
Signed change requests to remotely configure settings
Richard Alden Bramley, Jr., Mansfield, MA (US); Dallas M. Barlow, Spring, TX (US); Patrick Lee Gibbons, Spring, TX (US); Adrian John Baldwin, Bristol (GB); Tevin Jaupaul Richards, Spring, TX (US); Robert Stephen Craig, Spring, TX (US); Valiuddin Ali, Spring, TX (US); and Jeffrey Kevin Jeansonne, Spring, TX (US)
Assigned to HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., Spring, TX (US)
Appl. No. 17/54,197
Filed by Hewlett-Packard Development Company, L.P., Spring, TX (US)
PCT Filed Feb. 28, 2019, PCT No. PCT/US2019/019963
§ 371(c)(1), (2) Date Nov. 10, 2020,
PCT Pub. No. WO2020/176093, PCT Pub. Date Sep. 3, 2020.
Prior Publication US 2021/0382979 A1, Dec. 9, 2021
Int. Cl. G06F 21/00 (2013.01); H04L 29/06 (2006.01); G06F 21/44 (2013.01); G06F 9/445 (2018.01); H04L 9/14 (2006.01)
CPC G06F 21/44 (2013.01) [G06F 9/44505 (2013.01); H04L 9/14 (2013.01)] 12 Claims
OG exemplary drawing
 
1. A computing device comprising:
a memory accessible at startup of the computing device, the memory to store (i) a configuration setting for the computing device, the configuration setting configurable by application of a change request, (ii) a first public key selected from a first plurality of public keys, and (iii) a second public key selected from a second plurality of public keys;
a buffer in communication with the memory, the buffer to store a plurality of change requests submitted to the computing device by a remote entity, wherein each change request of the plurality of change requests includes a setting change for the configuration setting and a secure signature; and
a processor in communication with the buffer and the memory, the processor to execute instructions to:
retrieve, from the buffer, a first change request of the plurality of change requests,
when the setting change of the first change request is in a first set of settings changeable by a change request including a secure signature generated with a private key from a first plurality of private keys,
determine, with the first public key stored in memory, the secure signature included in the first change request was generated with a first private key that is from the first plurality of private keys and that corresponds to the first public key, and
in response to determining secure signature included in the first change request was generated with the first private key, apply the setting change of the first change request to the configuration setting for the computing device, and
when the setting change of the first change request is in a second set of settings changeable by a change request including a secure signature generated with a private key from a second plurality of private keys,
determine, with the second public key stored in memory, that the secure signature included in the first change request was generated with a second private key that is from the second plurality of private keys and that corresponds to the first public key, and
in response to determining that the secure signature included in the first change request was generated with the second private key, apply the setting change of the first change request to the configuration setting for the computing device.