US 12,326,964 B2
Management of configuration of data processing systems
Mahesh Babu Ramaiah, Bangalore (IN); Joseph Caisse, Burlington, MA (US); and Ashutosh Kumar, Bangalore (IN)
Assigned to Dell Products L.P., Round Rock, TX (US)
Filed by Dell Products L.P., Round Rock, TX (US)
Filed on Oct. 31, 2023, as Appl. No. 18/498,234.
Prior Publication US 2025/0139295 A1, May 1, 2025
Int. Cl. H04L 29/06 (2006.01); G06F 21/31 (2013.01); G06F 21/57 (2013.01); G06F 21/64 (2013.01)
CPC G06F 21/64 (2013.01) [G06F 21/31 (2013.01); G06F 21/57 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method of managing data processing systems, the method comprising:
obtaining, by hardware resources of a data processing system of the data processing systems, a security request for access to a management controller of the data processing system to configure the management controller;
deploying, by the hardware resources, a security package to the management controller to place the management controller in a configurable state of operation to enable remote secure configuration of the management controller;
obtaining, by the hardware resources and from the management controller, a configuration for validation;
attempting, by the hardware resources and responsive to the obtaining of the configuration, to verify that the configuration is a trusted configuration;
reverting, by the hardware resources and responsive to the obtaining of the configuration, the management controller to a secure state of operation; and
in an instance of the attempting where the configuration is verified as a trusted configuration:
configuring, by the hardware resources, the management controller to obtain an updated secure state of operation of the management controller.