US-12627519-B2 - Securely adding devices to a conference room
Abstract
Systems and methods for securely adding devices to a conference room are described. In an illustrative, non-limiting embodiment, a video bar may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution by the processor, cause the video bar to: prevent a client Information Handling System (IHS) from using a feature available in a conference room, and allow the client IHS to use the feature in response to a determination that at least one of: (i) the client IHS, or (ii) a user of the client IHS, is expected to be in the conference room.
Inventors
- Abu Shaher Sanaullah
- Gokul Thiruchengode Vajravel
Assignees
- DELL PRODUCTS, L.P.
Dates
- Publication Date
- 20260512
- Application Date
- 20230926
Claims (13)
- 1 . A video bar, comprising: a processor; and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution by the processor, cause the video bar to: prevent a client Information Handling System (IHS) from using a feature available in a conference room; and allow the client IHS to use the feature in response to a determination that at least one of: (i) the client IHS, or (ii) a user of the client IHS, is expected to be in the conference room; wherein the feature comprises a feature of a peripheral device disposed in the conference room.
- 2 . The video bar of claim 1 , wherein the program instructions, upon execution, cause the video bar to prevent the client IHS from using the feature in response to having received a message, from the client IHS, comprising an identification of at least one of: (i) the client IHS, or (ii) the user of the client IHS.
- 3 . The video bar of claim 2 , wherein the identification comprises at least one of: a serial number, or a service tag.
- 4 . The video bar of claim 2 , wherein to determine that the client IHS or the user is expected to be in the conference room, the program instructions, upon execution by the processor, cause the video bar to: compare the identification against a list of attendees of an ongoing or upcoming remote conferencing session, or receive results of the comparison from a cloud service.
- 5 . The video bar of claim 1 , wherein to prevent the client IHS from using the feature, the program instructions, upon execution by the processor, further cause the video bar to execute an upper-level filter driver.
- 6 . The video bar of claim 1 , wherein the peripheral device comprises at least one of: a shared display, a shared microphone, a shared speaker, or a shared camera, and wherein the video bar comprises at least a camera controller or video controller.
- 7 . The video bar of claim 1 , wherein to allow the client IHS to use the feature, the program instructions, upon execution, cause the video bar to allow the client IHS to use the feature for a selected amount of time.
- 8 . The video bar of claim 7 , wherein the program instructions, upon execution by the processor, cause the video bar to select the amount of time based, at least in part, upon an identification of the client IHS.
- 9 . The video bar of claim 1 , wherein the program instructions, upon execution by the processor, cause the video bar to select the feature based, at least in part, upon an identification of at least one of: (i) the client IHS, or (ii) the user.
- 10 . A hardware memory device having program instructions stored thereon that, upon execution by a processor, cause a video bar to: prevent a client Information Handling System (IHS) from using a feature available in a conference room; and allow the client IHS to use the feature in response to a determination that at least one of: (i) the client IHS, or (ii) a user of the client IHS, is expected to be in the conference room; wherein the feature comprises a feature of a peripheral device disposed in the conference room.
- 11 . The hardware memory device of claim 10 , wherein to prevent the client IHS from using the feature, the video bar is configured to execute an upper-level filter driver.
- 12 . A method, comprising: preventing, via a video bar, a client Information Handling System (IHS) from using a feature available in a conference room; and allowing, via the video bar, the client IHS to use the feature in response to a determination that at least one of: (i) the client IHS, or (ii) a user of the client IHS, is expected to be in the conference room; wherein the feature comprises a feature of a peripheral device disposed in the conference room.
- 13 . The method of claim 12 further comprising selecting, via the video bar, the feature based, at least in part, upon an identification of at least one of: (i) the client IHS, or (ii) the user.
Description
FIELD This disclosure relates generally to Information Handling Systems (IHSs), and more specifically, to systems and methods for securely adding devices to a conference room. BACKGROUND As the value and use of information continue to increase, individuals and businesses seek additional ways to process and store it. One option available to users is an Information Handling System (IHS). An IHS generally processes, compiles, stores, and/or communicates information or data for business, personal, or other purposes thereby allowing users to take advantage of the value of the information. Because technology and information handling needs and requirements vary between different users or applications, IHSs may also vary regarding what information is handled, how the information is handled, how much information is processed, stored, or communicated, and how quickly and efficiently the information may be processed, stored, or communicated. Variations in IHSs allow for IHSs to be general or configured for a specific user or specific use, such as financial transaction processing, airline reservations, enterprise data storage, or global communications. In addition, IHSs may include a variety of hardware and software components that may be configured to process, store, and communicate information and may include one or more computer systems, data storage systems, and networking systems. SUMMARY Systems and methods for securely adding devices to a conference room are described. In an illustrative, non-limiting embodiment, a video bar may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution by the processor, cause the video bar to: prevent a client Information Handling System (IHS) from using a feature available in a conference room, and allow the client IHS to use the feature in response to a determination that at least one of: (i) the client IHS, or (ii) a user of the client IHS, is expected to be in the conference room. The program instructions, upon execution, may cause the video bar to prevent the client IHS from using the feature in response to having received a message, from the client IHS, comprising an identification of at least one of: (i) the client IHS, or (ii) the user of the client IHS. For example, the identification may include at least one of: a serial number, or a service tag. To determine that the client IHS or the user is expected to be in the conference room, the program instructions, upon execution by the processor, may cause the video bar to: compare the identification against a list of attendees of an ongoing or upcoming remote conferencing session, or receive results of the comparison from a cloud service. Moreover, to prevent the client IHS from using the feature, the program instructions, upon execution by the processor, may further cause the video bar to execute an upper-level filter driver. The feature may include a feature of a peripheral device disposed in the conference room. The peripheral device may include at least one of: a shared display, a shared microphone, a shared speaker, or a shared camera. Additionally, or alternatively, the feature may include a remote conferencing application feature. For example, the remote conferencing application feature may enable the client IHS to join a remote conferencing session. Additionally, or alternatively, the remote conferencing application feature may enable the client IHS to participate in one or more aspects of a remote conference session. For example, the one or more aspects may include: receiv(ing) video, transmit(ting) video, receiv(ing) audio, transmit(ting) audio, or shar(ing) an electronic file. Additionally, or alternatively, the remote conferencing application feature may enable recording of one or more aspects of the remote conferencing meeting. To allow the client IHS to use the feature, the program instructions, upon execution, may cause the video bar to allow the client IHS to use the feature for a selected amount of time. The program instructions, upon execution by the processor, may cause the video bar to select the amount of time based, at least in part, upon an identification of at least one of: (i) the client IHS, or (ii) the user. Additionally, or alternatively, the program instructions, upon execution by the processor, may cause the video bar to select the feature based, at least in part, upon an identification of at least one of: (i) the client IHS, or (ii) the user. Additionally, or alternatively, the program instructions, upon execution by the processor, may cause the video bar to select the feature based, at least in part, upon a policy received from an Information Technology Decision Maker (ITDM). In another illustrative, non-limiting embodiment, a hardware memory device may have program instructions stored thereon that, upon execution by a processor of a client IHS, cause the client IHS to: transmit an identification of at least one of: (i