Patents by Inventor James D. Testerman
James D. Testerman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11675601Abstract: Embodiments of systems and computer implemented methods are disclosed to automatically restore operating system (OS) application software to an information handling systems (IHS) when the OS application software is removed from a computer readable storage device of the IHS. The disclosed embodiments control the version of the OS application software being deployed to an IHS when deploying the software from the boot firmware. For example, the disclosed embodiments utilize a version identifier to specify which version of the OS application software should be restored, a Content Deliver Network (CDN) server to store multiple versions of the OS application software, and a registration web server to map a device identifier corresponding to the IHS and the version identifier corresponding to the specified version of the OS application software to a universal resource locator (URL) link identifying where the specified version of the OS application software is stored within the CDN server.Type: GrantFiled: May 24, 2021Date of Patent: June 13, 2023Assignee: Dell Products L.P.Inventors: Dongli Wu, James D. Testerman, Kristopher Slocum
-
Publication number: 20220374244Abstract: Embodiments of systems and computer implemented methods are disclosed to automatically restore operating system (OS) application software to an information handling systems (IHS) when the OS application software is removed from a computer readable storage device of the IHS. The disclosed embodiments control the version of the OS application software being deployed to an IHS when deploying the software from the boot firmware. For example, the disclosed embodiments utilize a version identifier to specify which version of the OS application software should be restored, a Content Deliver Network (CDN) server to store multiple versions of the OS application software, and a registration web server to map a device identifier corresponding to the IHS and the version identifier corresponding to the specified version of the OS application software to a universal resource locator (URL) link identifying where the specified version of the OS application software is stored within the CDN server.Type: ApplicationFiled: May 24, 2021Publication date: November 24, 2022Inventors: Dongli Wu, James D. Testerman, Kristopher Slocum
-
Patent number: 10915655Abstract: Some websites accessed via browser allow for file uploading via drag and drop functionality. In a drag and drop operation, a user selects a file on the information handling system and drags the file to a browser window for uploading via the browser. File encryption systems, such as virtual file systems, may implement an encryption algorithm and enforce encryption standards, set by a user or organization, when uploading files via a browser, including uploading of files performed via file drag and drop functionality.Type: GrantFiled: April 27, 2017Date of Patent: February 9, 2021Assignee: Dell Products L.P.Inventors: James D. Testerman, James M. Burke
-
Patent number: 10917390Abstract: Some websites accessed via browser allow for file uploading via drag and drop functionality. In a drag and drop operation, a user selects a file on the information handling system and drags the file to a browser window for uploading via the browser. File encryption systems, such as virtual file systems, may implement an encryption algorithm and enforce encryption standards, set by a user or organization, when uploading files via a browser, including uploading of files performed via file drag and drop functionality.Type: GrantFiled: April 28, 2017Date of Patent: February 9, 2021Assignee: Dell Products L.P.Inventors: James D. Testerman, James M. Burke
-
Patent number: 10628581Abstract: An information handling system operating a forced data leakage prevention system may comprise a processor executing code instructions of the forced data leakage prevention system to identify a third party application and an associated first dynamic link library address, identify a control policy associated with the third party application and the identified user, wherein the control policy includes a subset of code instructions associated with a secure data set, identify a call to execute code instructions stored at the first dynamic link library address, move the code instructions stored at the first dynamic link library into a second library prior to execution, inject the subset of code instructions into the code instructions stored in the second library according to the control policy, and move the code instructions stored in the second library including the injected subset of code instructions into the first dynamic link library for execution by the processor.Type: GrantFiled: April 24, 2018Date of Patent: April 21, 2020Assignee: Dell Products, LPInventors: Venkata S N M Prayaga, James D. Testerman, Ricardo A. Ruiz, Jonathan N. Yanez, Luis A. Valencia Reyes, David Wu
-
Patent number: 10606985Abstract: Encrypted content may be stored in a file wrapper with unencrypted content that provides information regarding the encrypted content. The file wrapper may be stored around the encrypted content or may be stored in front or behind the encrypted content. The unencrypted content may indicate, for example, that additional content in the file is encrypted. A TIFF-formatted file may be used to store the two portions of content. A TIFF file structure may have content stored in a plurality of images. The unencrypted content may be stored in a first image of a TIFF file. The encrypted content may be stored in a second image, third image, and/or additional images of the TIFF file.Type: GrantFiled: April 27, 2017Date of Patent: March 31, 2020Assignee: Dell Products L.P.Inventor: James D. Testerman
-
Patent number: 10489600Abstract: Many users of information handling systems use applications to create, manage, and/or save files containing information. Encryption of the files secures the data against access by unintended recipients. Information handling systems may be designed to perform encryption in the background with minimal user input. For example, applications, application plug-ins, or operating system (OS) level system services may facilitate encryption and decryption of application files with minimal user input. Such applications, plugins, and services may allow applications to interact with encryption systems, such as virtual file systems, and may direct file save and access operations through the encryption systems, automatically encrypting and decrypting files selected by the user without exposing the user to cumbersome or confusing encryption options.Type: GrantFiled: April 28, 2017Date of Patent: November 26, 2019Assignee: Dell Products L.P.Inventors: James D. Testerman, David J. Fitzgerald, Oliver C. Ryan, Vadamalar Varadarajan, Adam W. Meek, Venkata S N M Prayaga, Nitin D. Dixit
-
Publication number: 20190325131Abstract: An information handling system operating a forced data leakage prevention system may comprise a processor executing code instructions of the forced data leakage prevention system to identify a third party application and an associated first dynamic link library address, identify a control policy associated with the third party application and the identified user, wherein the control policy includes a subset of code instructions associated with a secure data set, identify a call to execute code instructions stored at the first dynamic link library address, move the code instructions stored at the first dynamic link library into a second library prior to execution, inject the subset of code instructions into the code instructions stored in the second library according to the control policy, and move the code instructions stored in the second library including the injected subset of code instructions into the first dynamic link library for execution by the processor.Type: ApplicationFiled: April 24, 2018Publication date: October 24, 2019Applicant: Dell Products, LPInventors: Venkata SNM Prayaga, James D. Testerman, Ricardo A. Ruiz, Jonathan N. Yanez, Luis A. Valencia Reyes, David Wu
-
Publication number: 20180314844Abstract: Some websites accessed via browser allow for file uploading via drag and drop functionality. In a drag and drop operation, a user selects a file on the information handling system and drags the file to a browser window for uploading via the browser. File encryption systems, such as virtual file systems, may implement an encryption algorithm and enforce encryption standards, set by a user or organization, when uploading files via a browser, including uploading of files performed via file drag and drop functionality.Type: ApplicationFiled: April 27, 2017Publication date: November 1, 2018Applicant: Dell Products L.P.Inventors: James D. Testerman, James M. Burke
-
Publication number: 20180314838Abstract: Many users of information handling systems use applications to create, manage, and/or save files containing information. Encryption of the files secures the data against access by unintended recipients. Information handling systems may be designed to perform encryption in the background with minimal user input. For example, applications, application plug-ins, or operating system (OS) level system services may facilitate encryption and decryption of application files with minimal user input. Such applications, plugins, and services may allow applications to interact with encryption systems, such as virtual file systems, and may direct file save and access operations through the encryption systems, automatically encrypting and decrypting files selected by the user without exposing the user to cumbersome or confusing encryption options.Type: ApplicationFiled: April 28, 2017Publication date: November 1, 2018Applicant: Dell Products L.P.Inventors: James D. Testerman, David J. Fitzgerald, Oliver C. Ryan, Vadamalar Varadarajan, Adam W. Meek, Venkata SNM Prayaga, Nitin D. Dixit
-
Publication number: 20180316649Abstract: Some websites accessed via browser allow for file uploading via drag and drop functionality. In a drag and drop operation, a user selects a file on the information handling system and drags the file to a browser window for uploading via the browser. File encryption systems, such as virtual file systems, may implement an encryption algorithm and enforce encryption standards, set by a user or organization, when uploading files via a browser, including uploading of files performed via file drag and drop functionality.Type: ApplicationFiled: April 28, 2017Publication date: November 1, 2018Applicant: Dell Products L.P.Inventors: James D. Testerman, James M. Burke
-
Publication number: 20180314836Abstract: Encrypted content may be stored in a file wrapper with unencrypted content that provides information regarding the encrypted content. The file wrapper may be stored around the encrypted content or may be stored in front or behind the encrypted content. The unencrypted content may indicate, for example, that additional content in the file is encrypted. A TIFF-formatted file may be used to store the two portions of content. A TIFF file structure may have content stored in a plurality of images. The unencrypted content may be stored in a first image of a TIFF file. The encrypted content may be stored in a second image, third image, and/or additional images of the TIFF file.Type: ApplicationFiled: April 27, 2017Publication date: November 1, 2018Applicant: Dell Products L.P.Inventor: James D. Testerman
-
Publication number: 20180314837Abstract: Encrypted content may be stored in a file wrapper with unencrypted content that provides information regarding the encrypted content. The file wrapper may be stored around the encrypted content or may be stored in front or behind the encrypted content. The unencrypted content may indicate, for example, that additional content in the file is encrypted. A TIFF-formatted file may be used to store the two portions of content. A TIFF file structure may have content stored in a plurality of images. The unencrypted content may be stored in a first image of a TIFF file. The encrypted content may be stored in a second image, third image, and/or additional images of the TIFF file.Type: ApplicationFiled: April 28, 2017Publication date: November 1, 2018Applicant: Dell Products L.P.Inventor: James D. Testerman