SECURITY SUBJECTION OF A COMPUTING DEVICE
Examples disclosed herein relate to security certification of a computing device. A management controller of a computing device may access a physical owner token related to a physical owner of the computing device. The management controller may access a security proposal owner token related to a sec...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Examples disclosed herein relate to security certification of a computing device. A management controller of a computing device may access a physical owner token related to a physical owner of the computing device. The management controller may access a security proposal owner token related to a security proposal owner of the computing device. The security proposal owner token tracks the responsibility of the security function of the computing device. A security assertion owner associated with the security assertion owner token is initially set as a first entity.
本文公开的示例涉及计算设备的安全支配权。计算设备的管理控制器可以访问与计算设备的物理所有者有关的物理所有者令牌。管理控制器可以访问与计算设备的安全支配权所有者有关的安全支配权所有者令牌。安全支配权所有者令牌跟踪计算设备的安全功能的责任性。与安全支配权所有者令牌相关联的安全支配权所有者最初被设置为第一实体。 |
---|