US 12,328,388 B2
Systems and methods for secure secret provisioning of remote access controllers
Sreeram Veluthakkal, Pflugerville, TX (US); Sanjeev S. Dambal, Austin, TX (US); Marshal F. Savage, Austin, TX (US); and Jason Matthew Young, Round Rock, TX (US)
Assigned to Dell Products, L.P., Round Rock, TX (US)
Filed by Dell Products, L.P., Round Rock, TX (US)
Filed on Oct. 24, 2022, as Appl. No. 18/048,920.
Prior Publication US 2024/0137209 A1, Apr. 25, 2024
Prior Publication US 2024/0235818 A9, Jul. 11, 2024
Int. Cl. H04L 9/08 (2006.01)
CPC H04L 9/0825 (2013.01) [H04L 9/0866 (2013.01); H04L 9/0877 (2013.01)] 17 Claims
OG exemplary drawing
 
1. An Information Handling System (IHS) comprising:
at least one processor; and
a memory coupled to the at least one processor, the memory having program instructions stored thereon that, upon execution by the at least one processor, cause the IHS to:
receive, from a Remote Access Controller (RAC), a request for a secret known by the IHS, the request signed using a private key of an asymmetric key pair generated by the RAC;
attest authenticity of the request received from the RAC by verifying that a public key of the asymmetric key pair exists in a manifest that is configured to store identifying information about a plurality of devices configured in the IHS;
use the public key of the asymmetric key pair that exists in the manifest to encrypt the requested secret; and
send the encrypted secret to the RAC, wherein the RAC is configured to use the private key of the asymmetric key pair to decrypt the encrypted secret.