SECURITY SUBJECTION OF A COMPUTING DEVICE

Examples disclosed herein relate to security certification of a computing device. A management controller of a computing device may access a physical owner token related to a physical owner of the computing device. The management controller may access a security proposal owner token related to a sec...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: LUCIANI JR LESTER E
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Examples disclosed herein relate to security certification of a computing device. A management controller of a computing device may access a physical owner token related to a physical owner of the computing device. The management controller may access a security proposal owner token related to a security proposal owner of the computing device. The security proposal owner token tracks the responsibility of the security function of the computing device. A security assertion owner associated with the security assertion owner token is initially set as a first entity. 本文公开的示例涉及计算设备的安全支配权。计算设备的管理控制器可以访问与计算设备的物理所有者有关的物理所有者令牌。管理控制器可以访问与计算设备的安全支配权所有者有关的安全支配权所有者令牌。安全支配权所有者令牌跟踪计算设备的安全功能的责任性。与安全支配权所有者令牌相关联的安全支配权所有者最初被设置为第一实体。