US 12,436,787 B2
Emulating physical security devices
David F. Heinrich, Houston, TX (US); Luis E. Luciani, Jr., Houston, TX (US); Theodore F. Emerson, Houston, TX (US); and Sze Hau Loh, Houston, TX (US)
Assigned to Hewlett Packard Enterprise Development LP, Spring, TX (US)
Filed by HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP, Houston, TX (US)
Filed on Apr. 29, 2020, as Appl. No. 16/861,780.
Prior Publication US 2021/0342169 A1, Nov. 4, 2021
Int. Cl. H04L 29/06 (2006.01); G06F 9/455 (2018.01); G06F 13/40 (2006.01); G06F 21/57 (2013.01); G06F 21/60 (2013.01); H04L 9/08 (2006.01)
CPC G06F 9/45508 (2013.01) [G06F 13/4027 (2013.01); G06F 21/572 (2013.01); G06F 21/602 (2013.01); H04L 9/08 (2013.01); G06F 2221/033 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising: a baseboard management controller receiving, from a requestor, a request for a security function to be performed, wherein the request is directed to a physical security device other than the baseboard management controller, wherein the security function comprises a function to provide a cryptographic identity, provide a platform cryptographic identity, construct at least part of a root of trust measurement chain, generate a cryptographic key, store the cryptographic key, validate a content of a memory, store a measurement hash, load a reference measurement or retrieve the cryptographic key; and the baseboard management controller responding to the request to emulate a response of the physical security device to the request.