Patents by Inventor Kevin T. Marks

Kevin T. Marks has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11341063
    Abstract: An information handling system may include a host system processor and a storage resource communicatively coupled to the host system processor. The storage resource may be configured to, responsive to receiving a command from the host system processor relating an address range of the storage resource, create an entry in a drive status table stored in a persistent storage area of the storage resource, the entry setting forth information indicative of the address and a completion status of the command and update a status of the address range in the drive status table as steps of the command are completed by the storage resource, such that, if a drive event occurs preventing full completion of the command, the host system processor may access the drive status table to determine a status of the command, and take a remedial action based on the status of the command.
    Type: Grant
    Filed: January 31, 2019
    Date of Patent: May 24, 2022
    Assignee: Dell Products L.P.
    Inventors: Jaleel A. Kazi, Michael Garvey, Kevin T. Marks, Dale R. Elliott
  • Patent number: 11017071
    Abstract: An information handling system includes a processor, a peripheral component interconnect express (PCIe) endpoint, and a PCIe downstream port. The PCIe downstream port blocks PCIe vendor-defined messages (VDMs) from the PCIe endpoint as a default mode, changes to a second mode in response to the PCIe endpoint being verified, and allows PCIe VDMs from the PCIe endpoint while in the second mode.
    Type: Grant
    Filed: August 2, 2018
    Date of Patent: May 25, 2021
    Assignee: Dell Products L.P.
    Inventors: Austin P. Bolen, Mukund Pushottam Khatri, Kevin T. Marks, Manjunath Am
  • Patent number: 10936294
    Abstract: A blockchain-based software compliance system includes a computing system with a first computing device associated with first software. A monitoring system detects an update of the first computing device to replace the first software with second software, and generates a blockchain transaction that is directed to a blockchain address and that identifies the replacement of the first software with the second software. The monitoring system broadcasts the blockchain transaction, which is received by a blockchain device that executes a smart contract associated with the blockchain address. The blockchain device then determines that the execution of the smart contract has provided an indication that the updating of the first computing device with the second software does not comply with a computing system software matrix and, in response, causes an update to the first computing device that replaces the second software with third software that complies with the computing system software matrix.
    Type: Grant
    Filed: November 1, 2018
    Date of Patent: March 2, 2021
    Assignee: Dell Products L.P.
    Inventors: Kevin T. Marks, Viswanath Ponnuru, Ravikanth Chaganti, Raveendra Babu Madala
  • Patent number: 10891244
    Abstract: An information handling system includes a host configured to write a non-volatile memory express (NVMe) command on a memory submission queue slot. The NVMe command includes a pre-fetch command and a non-completion command. A controller uses the pre-fetch command to monitor read operations, and to place on hold an execution of the monitored read operations and an issuance of an interrupt in response to the non-completion command.
    Type: Grant
    Filed: October 25, 2018
    Date of Patent: January 12, 2021
    Assignee: Dell Products, L.P.
    Inventors: Kevin T. Marks, Chandrashekar Nelogal
  • Publication number: 20200319819
    Abstract: An information handling system includes a host to write a non-volatile memory express (NVMe) command, and a plurality of NVMe devices configured as a RAID array. Each of the NVMe devices is configured to use internal hardware resources to perform offload operations of the NVMe command.
    Type: Application
    Filed: April 2, 2019
    Publication date: October 8, 2020
    Inventors: Chandrashekar Nelogal, Kevin T. Marks, James P. Giannoules
  • Publication number: 20200250107
    Abstract: An information handling system may include a host system processor and a storage resource communicatively coupled to the host system processor. The storage resource may be configured to, responsive to receiving a command from the host system processor relating an address range of the storage resource, create an entry in a drive status table stored in a persistent storage area of the storage resource, the entry setting forth information indicative of the address and a completion status of the command and update a status of the address range in the drive status table as steps of the command are completed by the storage resource, such that, if a drive event occurs preventing full completion of the command, the host system processor may access the drive status table to determine a status of the command, and take a remedial action based on the status of the command.
    Type: Application
    Filed: January 31, 2019
    Publication date: August 6, 2020
    Applicant: Dell Products L.P.
    Inventors: Jaleel A. KAZI, Michael GARVEY, Kevin T. MARKS, Dale R. ELLIOTT
  • Patent number: 10671372
    Abstract: A blockchain-based secure customized catalog system includes a catalog customization system that receives a request to customize a first software catalog, and modifies the first software catalog to create a second software catalog that is customized for computing devices in a computing system. The catalog customization system then generates and broadcasts a first blockchain transaction that includes a smart contract having a second software catalog hash created from the second software catalog. A blockchain device receives the first blockchain transaction and, in response, provides the smart contract on a blockchain. When the blockchain device receives a second blockchain transaction broadcast by the computing system and including a hash value, it executes the smart contract. If the blockchain device determines that the execution of the smart contract indicates that the hash value matches the second software catalog hash, it transmits a second software catalog verification to the computing system.
    Type: Grant
    Filed: November 1, 2018
    Date of Patent: June 2, 2020
    Assignee: Dell Products L.P.
    Inventors: Kevin T. Marks, Viswanath Ponnuru, Raveendra Babu Madala
  • Publication number: 20200142681
    Abstract: A blockchain-based software compliance system includes a computing system with a first computing device associated with first software. A monitoring system detects an update of the first computing device to replace the first software with second software, and generates a blockchain transaction that is directed to a blockchain address and that identifies the replacement of the first software with the second software. The monitoring system broadcasts the blockchain transaction, which is received by a blockchain device that executes a smart contract associated with the blockchain address. The blockchain device then determines that the execution of the smart contract has provided an indication that the updating of the first computing device with the second software does not comply with a computing system software matrix and, in response, causes an update to the first computing device that replaces the second software with third software that complies with the computing system software matrix.
    Type: Application
    Filed: November 1, 2018
    Publication date: May 7, 2020
    Inventors: Kevin T. Marks, Viswanath Ponnuru, Ravikanth Chaganti, Raveendra Babu Madala
  • Publication number: 20200142682
    Abstract: A blockchain-based secure customized catalog system includes a catalog customization system that receives a request to customize a first software catalog, and modifies the first software catalog to create a second software catalog that is customized for computing devices in a computing system. The catalog customization system then generates and broadcasts a first blockchain transaction that includes a smart contract having a second software catalog hash created from the second software catalog. A blockchain device receives the first blockchain transaction and, in response, provides the smart contract on a blockchain. When the blockchain device receives a second blockchain transaction broadcast by the computing system and including a hash value, it executes the smart contract. If the blockchain device determines that the execution of the smart contract indicates that the hash value matches the second software catalog hash, it transmits a second software catalog verification to the computing system.
    Type: Application
    Filed: November 1, 2018
    Publication date: May 7, 2020
    Inventors: Kevin T. Marks, Viswanath Ponnuru, Raveendra Babu Madala
  • Publication number: 20200133896
    Abstract: An information handling system includes a host configured to write a non-volatile memory express (NVMe) command on a memory submission queue slot. The NVMe command includes a pre-fetch command and a non-completion command. A controller uses the pre-fetch command to monitor read operations, and to place on hold an execution of the monitored read operations and an issuance of an interrupt in response to the non-completion command.
    Type: Application
    Filed: October 25, 2018
    Publication date: April 30, 2020
    Inventors: Kevin T. Marks, Chandrasekhar Nelogal
  • Publication number: 20200042692
    Abstract: An information handling system includes a processor, a peripheral component interconnect express (PCIe) endpoint, and a PCIe downstream port. The PCIe downstream port blocks PCIe vendor-defined messages (VDMs) from the PCIe endpoint as a default mode, changes to a second mode in response to the PCIe endpoint being verified, and allows PCIe VDMs from the PCIe endpoint while in the second mode.
    Type: Application
    Filed: August 2, 2018
    Publication date: February 6, 2020
    Inventors: Austin P. Bolen, Mukund Pushottam Khatri, Kevin T. Marks, Manjunath AM
  • Patent number: 10261698
    Abstract: In accordance with embodiments of the present disclosure, a method of transmitting data in an information handling system may include receiving, at a hardware logic device from a plurality of memory storage devices communicatively coupled to the hardware logic device, a plurality of command fetch requests; analyzing metadata associated with each of the plurality of command fetch requests in order to serialize the plurality of command fetch requests in a chronological order; and communicating the coalesced command fetch requests in the chronological order to a memory having stored thereon commands responsive to the coalesced command fetch requests.
    Type: Grant
    Filed: May 16, 2017
    Date of Patent: April 16, 2019
    Assignee: Dell Products
    Inventors: Srikrishna Ramaswamy, Shyam T. Iyer, Kevin T. Marks
  • Patent number: 10148429
    Abstract: A system and method for managing the recovery key of a computer system is disclosed. The computer system includes a security layer, and the recovery key is stored locally to a memory location on the computer system, including, as examples, flash memory on the motherboard of the computer system or a USB port on the computer system. In operation, when it becomes necessary for the computer system to authenticate the recovery key, the recovery key may be retrieved from the local memory. The retrieval and storage of the recovery key may be managed by a remote administrator. The recovery key may be stored in a hidden partition in the storage location, and the recovery key may be cryptographically wrapped to add an additional layer of security.
    Type: Grant
    Filed: November 3, 2016
    Date of Patent: December 4, 2018
    Assignee: Dell Products L.P.
    Inventors: Viswanathan Balakrishnan, Santosh Bhadri, Mukund P. Khatri, Kevin T. Marks, Narayanan Subramaniam, Venkatesan Balakrishnan
  • Publication number: 20180335953
    Abstract: In accordance with embodiments of the present disclosure, a method of transmitting data in an information handling system may include receiving, at a hardware logic device from a plurality of memory storage devices communicatively coupled to the hardware logic device, a plurality of command fetch requests; analyzing metadata associated with each of the plurality of command fetch requests in order to serialize the plurality of command fetch requests in a chronological order; and communicating the coalesced command fetch requests in the chronological order to a memory having stored thereon commands responsive to the coalesced command fetch requests.
    Type: Application
    Filed: May 16, 2017
    Publication date: November 22, 2018
    Applicant: Dell Products L.P.
    Inventors: Srikrishna RAMASWAMY, Shyam T. IYER, Kevin T. MARKS
  • Patent number: 9710418
    Abstract: A system and method for accessing and identifying the security parameters of a device in an information handling system is disclosed. A device in a computer system may operate according to a defined security protocol, and multiple security protocols may exist across the devices of the system. In operation, a configuration capability is defined within the PCI Express communications protocol. This capability includes a capabilities data structure through which parameters concerning the security parameters of the device may be identified and passed to a processor.
    Type: Grant
    Filed: January 16, 2009
    Date of Patent: July 18, 2017
    Assignee: DELL PRODUCTS L.P.
    Inventors: Mukund P. Khatri, Kevin T. Marks
  • Publication number: 20170060421
    Abstract: A storage system includes a processor, a controller, and first and second plurality of data storage devices. The controller communicates with the processor, and receives read and write requests for a redundant array of independent disks (RAID) array from the processor. The first plurality of data storage devices communicates with the controller. The first data storage devices are allocated as data drives in the RAID array, and are first type data storage devices. The second plurality of data storage devices communicates with the controller. The second plurality of data storage devices are allocated as parity drives in the RAID array, and are second type data storage devices.
    Type: Application
    Filed: August 31, 2015
    Publication date: March 2, 2017
    Inventors: William P. Dawkins, Kevin T. Marks
  • Publication number: 20170063539
    Abstract: A system and method for managing the recovery key of a computer system is disclosed. The computer system includes a security layer, and the recovery key is stored locally to a memory location on the computer system, including, as examples, flash memory on the motherboard of the computer system or a USB port on the computer system. In operation, when it becomes necessary for the computer system to authenticate the recovery key, the recovery key may be retrieved from the local memory. The retrieval and storage of the recovery key may be managed by a remote administrator. The recovery key may be stored in a hidden partition in the storage location, and the recovery key may be cryptographically wrapped to add an additional layer of security.
    Type: Application
    Filed: November 3, 2016
    Publication date: March 2, 2017
    Inventors: Viswanathan Balakrishnan, Santosh Bhadri, Mukund P. Khatri, Kevin T. Marks, Narayanan Subramaniam, Venkatesan Balakrishnan
  • Patent number: 9520998
    Abstract: A system and method for managing the recovery key of a computer system is disclosed. The computer system includes a security layer, and the recovery key is stored locally to a memory location on the computer system, including, as examples, flash memory on the motherboard of the computer system or a USB port on the computer system. In operation, when it becomes necessary for the computer system to authenticate the recovery key, the recovery key may be retrieved from the local memory. The retrieval and storage of the recovery key may be managed by a remote administrator. The recovery key may be stored in a hidden partition in the storage location, and the recovery key may be cryptographically wrapped to add an additional layer of security.
    Type: Grant
    Filed: October 30, 2014
    Date of Patent: December 13, 2016
    Assignee: Dell Products L.P.
    Inventors: Viswanathan Balakrishnan, Santosh Bhadri, Mukund P. Khatri, Kevin T. Marks, Narayanan Subramaniam, Venkatesan Balakrishnan
  • Patent number: 9251353
    Abstract: A credential caching system includes receiving a set of authentication credentials, storing the set of authentication credentials in a credential cache memory, wherein the credential cache memory is coupled with a management controller, and supplying the set of authentication credentials for automatic authentication during a reset or reboot. In the event of a security breach, the credential caching system clears the set of authentication credentials from the credential cache memory so that the set of authentication credentials may no longer be used for a reset or reboot.
    Type: Grant
    Filed: December 6, 2012
    Date of Patent: February 2, 2016
    Assignee: Dell Products L.P.
    Inventors: Muhammed K. Jaber, Mukund P. Khatri, Kevin T. Marks, Don Charles McCall
  • Publication number: 20150058640
    Abstract: A system and method for managing the recovery key of a computer system is disclosed. The computer system includes a security layer, and the recovery key is stored locally to a memory location on the computer system, including, as examples, flash memory on the motherboard of the computer system or a USB port on the computer system. In operation, when it becomes necessary for the computer system to authenticate the recovery key, the recovery key may be retrieved from the local memory. The retrieval and storage of the recovery key may be managed by a remote administrator. The recovery key may be stored in a hidden partition in the storage location, and the recovery key may be cryptographically wrapped to add an additional layer of security.
    Type: Application
    Filed: October 30, 2014
    Publication date: February 26, 2015
    Inventors: Viswanathan Balakrishnan, Santosh Bhadri, Mukund P. Khatri, Kevin T. Marks, Narayanan Subramaniam, Venkatesan Balakrishnan