Patents by Inventor Kevin T. Marks
Kevin T. Marks has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11341063Abstract: An information handling system may include a host system processor and a storage resource communicatively coupled to the host system processor. The storage resource may be configured to, responsive to receiving a command from the host system processor relating an address range of the storage resource, create an entry in a drive status table stored in a persistent storage area of the storage resource, the entry setting forth information indicative of the address and a completion status of the command and update a status of the address range in the drive status table as steps of the command are completed by the storage resource, such that, if a drive event occurs preventing full completion of the command, the host system processor may access the drive status table to determine a status of the command, and take a remedial action based on the status of the command.Type: GrantFiled: January 31, 2019Date of Patent: May 24, 2022Assignee: Dell Products L.P.Inventors: Jaleel A. Kazi, Michael Garvey, Kevin T. Marks, Dale R. Elliott
-
Patent number: 11017071Abstract: An information handling system includes a processor, a peripheral component interconnect express (PCIe) endpoint, and a PCIe downstream port. The PCIe downstream port blocks PCIe vendor-defined messages (VDMs) from the PCIe endpoint as a default mode, changes to a second mode in response to the PCIe endpoint being verified, and allows PCIe VDMs from the PCIe endpoint while in the second mode.Type: GrantFiled: August 2, 2018Date of Patent: May 25, 2021Assignee: Dell Products L.P.Inventors: Austin P. Bolen, Mukund Pushottam Khatri, Kevin T. Marks, Manjunath Am
-
Patent number: 10936294Abstract: A blockchain-based software compliance system includes a computing system with a first computing device associated with first software. A monitoring system detects an update of the first computing device to replace the first software with second software, and generates a blockchain transaction that is directed to a blockchain address and that identifies the replacement of the first software with the second software. The monitoring system broadcasts the blockchain transaction, which is received by a blockchain device that executes a smart contract associated with the blockchain address. The blockchain device then determines that the execution of the smart contract has provided an indication that the updating of the first computing device with the second software does not comply with a computing system software matrix and, in response, causes an update to the first computing device that replaces the second software with third software that complies with the computing system software matrix.Type: GrantFiled: November 1, 2018Date of Patent: March 2, 2021Assignee: Dell Products L.P.Inventors: Kevin T. Marks, Viswanath Ponnuru, Ravikanth Chaganti, Raveendra Babu Madala
-
Patent number: 10891244Abstract: An information handling system includes a host configured to write a non-volatile memory express (NVMe) command on a memory submission queue slot. The NVMe command includes a pre-fetch command and a non-completion command. A controller uses the pre-fetch command to monitor read operations, and to place on hold an execution of the monitored read operations and an issuance of an interrupt in response to the non-completion command.Type: GrantFiled: October 25, 2018Date of Patent: January 12, 2021Assignee: Dell Products, L.P.Inventors: Kevin T. Marks, Chandrashekar Nelogal
-
Publication number: 20200319819Abstract: An information handling system includes a host to write a non-volatile memory express (NVMe) command, and a plurality of NVMe devices configured as a RAID array. Each of the NVMe devices is configured to use internal hardware resources to perform offload operations of the NVMe command.Type: ApplicationFiled: April 2, 2019Publication date: October 8, 2020Inventors: Chandrashekar Nelogal, Kevin T. Marks, James P. Giannoules
-
Publication number: 20200250107Abstract: An information handling system may include a host system processor and a storage resource communicatively coupled to the host system processor. The storage resource may be configured to, responsive to receiving a command from the host system processor relating an address range of the storage resource, create an entry in a drive status table stored in a persistent storage area of the storage resource, the entry setting forth information indicative of the address and a completion status of the command and update a status of the address range in the drive status table as steps of the command are completed by the storage resource, such that, if a drive event occurs preventing full completion of the command, the host system processor may access the drive status table to determine a status of the command, and take a remedial action based on the status of the command.Type: ApplicationFiled: January 31, 2019Publication date: August 6, 2020Applicant: Dell Products L.P.Inventors: Jaleel A. KAZI, Michael GARVEY, Kevin T. MARKS, Dale R. ELLIOTT
-
Patent number: 10671372Abstract: A blockchain-based secure customized catalog system includes a catalog customization system that receives a request to customize a first software catalog, and modifies the first software catalog to create a second software catalog that is customized for computing devices in a computing system. The catalog customization system then generates and broadcasts a first blockchain transaction that includes a smart contract having a second software catalog hash created from the second software catalog. A blockchain device receives the first blockchain transaction and, in response, provides the smart contract on a blockchain. When the blockchain device receives a second blockchain transaction broadcast by the computing system and including a hash value, it executes the smart contract. If the blockchain device determines that the execution of the smart contract indicates that the hash value matches the second software catalog hash, it transmits a second software catalog verification to the computing system.Type: GrantFiled: November 1, 2018Date of Patent: June 2, 2020Assignee: Dell Products L.P.Inventors: Kevin T. Marks, Viswanath Ponnuru, Raveendra Babu Madala
-
Publication number: 20200142681Abstract: A blockchain-based software compliance system includes a computing system with a first computing device associated with first software. A monitoring system detects an update of the first computing device to replace the first software with second software, and generates a blockchain transaction that is directed to a blockchain address and that identifies the replacement of the first software with the second software. The monitoring system broadcasts the blockchain transaction, which is received by a blockchain device that executes a smart contract associated with the blockchain address. The blockchain device then determines that the execution of the smart contract has provided an indication that the updating of the first computing device with the second software does not comply with a computing system software matrix and, in response, causes an update to the first computing device that replaces the second software with third software that complies with the computing system software matrix.Type: ApplicationFiled: November 1, 2018Publication date: May 7, 2020Inventors: Kevin T. Marks, Viswanath Ponnuru, Ravikanth Chaganti, Raveendra Babu Madala
-
Publication number: 20200142682Abstract: A blockchain-based secure customized catalog system includes a catalog customization system that receives a request to customize a first software catalog, and modifies the first software catalog to create a second software catalog that is customized for computing devices in a computing system. The catalog customization system then generates and broadcasts a first blockchain transaction that includes a smart contract having a second software catalog hash created from the second software catalog. A blockchain device receives the first blockchain transaction and, in response, provides the smart contract on a blockchain. When the blockchain device receives a second blockchain transaction broadcast by the computing system and including a hash value, it executes the smart contract. If the blockchain device determines that the execution of the smart contract indicates that the hash value matches the second software catalog hash, it transmits a second software catalog verification to the computing system.Type: ApplicationFiled: November 1, 2018Publication date: May 7, 2020Inventors: Kevin T. Marks, Viswanath Ponnuru, Raveendra Babu Madala
-
Publication number: 20200133896Abstract: An information handling system includes a host configured to write a non-volatile memory express (NVMe) command on a memory submission queue slot. The NVMe command includes a pre-fetch command and a non-completion command. A controller uses the pre-fetch command to monitor read operations, and to place on hold an execution of the monitored read operations and an issuance of an interrupt in response to the non-completion command.Type: ApplicationFiled: October 25, 2018Publication date: April 30, 2020Inventors: Kevin T. Marks, Chandrasekhar Nelogal
-
Publication number: 20200042692Abstract: An information handling system includes a processor, a peripheral component interconnect express (PCIe) endpoint, and a PCIe downstream port. The PCIe downstream port blocks PCIe vendor-defined messages (VDMs) from the PCIe endpoint as a default mode, changes to a second mode in response to the PCIe endpoint being verified, and allows PCIe VDMs from the PCIe endpoint while in the second mode.Type: ApplicationFiled: August 2, 2018Publication date: February 6, 2020Inventors: Austin P. Bolen, Mukund Pushottam Khatri, Kevin T. Marks, Manjunath AM
-
Patent number: 10261698Abstract: In accordance with embodiments of the present disclosure, a method of transmitting data in an information handling system may include receiving, at a hardware logic device from a plurality of memory storage devices communicatively coupled to the hardware logic device, a plurality of command fetch requests; analyzing metadata associated with each of the plurality of command fetch requests in order to serialize the plurality of command fetch requests in a chronological order; and communicating the coalesced command fetch requests in the chronological order to a memory having stored thereon commands responsive to the coalesced command fetch requests.Type: GrantFiled: May 16, 2017Date of Patent: April 16, 2019Assignee: Dell ProductsInventors: Srikrishna Ramaswamy, Shyam T. Iyer, Kevin T. Marks
-
Patent number: 10148429Abstract: A system and method for managing the recovery key of a computer system is disclosed. The computer system includes a security layer, and the recovery key is stored locally to a memory location on the computer system, including, as examples, flash memory on the motherboard of the computer system or a USB port on the computer system. In operation, when it becomes necessary for the computer system to authenticate the recovery key, the recovery key may be retrieved from the local memory. The retrieval and storage of the recovery key may be managed by a remote administrator. The recovery key may be stored in a hidden partition in the storage location, and the recovery key may be cryptographically wrapped to add an additional layer of security.Type: GrantFiled: November 3, 2016Date of Patent: December 4, 2018Assignee: Dell Products L.P.Inventors: Viswanathan Balakrishnan, Santosh Bhadri, Mukund P. Khatri, Kevin T. Marks, Narayanan Subramaniam, Venkatesan Balakrishnan
-
Publication number: 20180335953Abstract: In accordance with embodiments of the present disclosure, a method of transmitting data in an information handling system may include receiving, at a hardware logic device from a plurality of memory storage devices communicatively coupled to the hardware logic device, a plurality of command fetch requests; analyzing metadata associated with each of the plurality of command fetch requests in order to serialize the plurality of command fetch requests in a chronological order; and communicating the coalesced command fetch requests in the chronological order to a memory having stored thereon commands responsive to the coalesced command fetch requests.Type: ApplicationFiled: May 16, 2017Publication date: November 22, 2018Applicant: Dell Products L.P.Inventors: Srikrishna RAMASWAMY, Shyam T. IYER, Kevin T. MARKS
-
Patent number: 9710418Abstract: A system and method for accessing and identifying the security parameters of a device in an information handling system is disclosed. A device in a computer system may operate according to a defined security protocol, and multiple security protocols may exist across the devices of the system. In operation, a configuration capability is defined within the PCI Express communications protocol. This capability includes a capabilities data structure through which parameters concerning the security parameters of the device may be identified and passed to a processor.Type: GrantFiled: January 16, 2009Date of Patent: July 18, 2017Assignee: DELL PRODUCTS L.P.Inventors: Mukund P. Khatri, Kevin T. Marks
-
Publication number: 20170060421Abstract: A storage system includes a processor, a controller, and first and second plurality of data storage devices. The controller communicates with the processor, and receives read and write requests for a redundant array of independent disks (RAID) array from the processor. The first plurality of data storage devices communicates with the controller. The first data storage devices are allocated as data drives in the RAID array, and are first type data storage devices. The second plurality of data storage devices communicates with the controller. The second plurality of data storage devices are allocated as parity drives in the RAID array, and are second type data storage devices.Type: ApplicationFiled: August 31, 2015Publication date: March 2, 2017Inventors: William P. Dawkins, Kevin T. Marks
-
Publication number: 20170063539Abstract: A system and method for managing the recovery key of a computer system is disclosed. The computer system includes a security layer, and the recovery key is stored locally to a memory location on the computer system, including, as examples, flash memory on the motherboard of the computer system or a USB port on the computer system. In operation, when it becomes necessary for the computer system to authenticate the recovery key, the recovery key may be retrieved from the local memory. The retrieval and storage of the recovery key may be managed by a remote administrator. The recovery key may be stored in a hidden partition in the storage location, and the recovery key may be cryptographically wrapped to add an additional layer of security.Type: ApplicationFiled: November 3, 2016Publication date: March 2, 2017Inventors: Viswanathan Balakrishnan, Santosh Bhadri, Mukund P. Khatri, Kevin T. Marks, Narayanan Subramaniam, Venkatesan Balakrishnan
-
Patent number: 9520998Abstract: A system and method for managing the recovery key of a computer system is disclosed. The computer system includes a security layer, and the recovery key is stored locally to a memory location on the computer system, including, as examples, flash memory on the motherboard of the computer system or a USB port on the computer system. In operation, when it becomes necessary for the computer system to authenticate the recovery key, the recovery key may be retrieved from the local memory. The retrieval and storage of the recovery key may be managed by a remote administrator. The recovery key may be stored in a hidden partition in the storage location, and the recovery key may be cryptographically wrapped to add an additional layer of security.Type: GrantFiled: October 30, 2014Date of Patent: December 13, 2016Assignee: Dell Products L.P.Inventors: Viswanathan Balakrishnan, Santosh Bhadri, Mukund P. Khatri, Kevin T. Marks, Narayanan Subramaniam, Venkatesan Balakrishnan
-
Patent number: 9251353Abstract: A credential caching system includes receiving a set of authentication credentials, storing the set of authentication credentials in a credential cache memory, wherein the credential cache memory is coupled with a management controller, and supplying the set of authentication credentials for automatic authentication during a reset or reboot. In the event of a security breach, the credential caching system clears the set of authentication credentials from the credential cache memory so that the set of authentication credentials may no longer be used for a reset or reboot.Type: GrantFiled: December 6, 2012Date of Patent: February 2, 2016Assignee: Dell Products L.P.Inventors: Muhammed K. Jaber, Mukund P. Khatri, Kevin T. Marks, Don Charles McCall
-
Publication number: 20150058640Abstract: A system and method for managing the recovery key of a computer system is disclosed. The computer system includes a security layer, and the recovery key is stored locally to a memory location on the computer system, including, as examples, flash memory on the motherboard of the computer system or a USB port on the computer system. In operation, when it becomes necessary for the computer system to authenticate the recovery key, the recovery key may be retrieved from the local memory. The retrieval and storage of the recovery key may be managed by a remote administrator. The recovery key may be stored in a hidden partition in the storage location, and the recovery key may be cryptographically wrapped to add an additional layer of security.Type: ApplicationFiled: October 30, 2014Publication date: February 26, 2015Inventors: Viswanathan Balakrishnan, Santosh Bhadri, Mukund P. Khatri, Kevin T. Marks, Narayanan Subramaniam, Venkatesan Balakrishnan