Patents by Inventor Minhaj Ahmed
Minhaj Ahmed has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11347859Abstract: Systems and methods are provided that may be implemented during a pre-boot environment to authenticate a user in the basic input/output system (BIOS) of an information handling system, and to securely provision a resulting authentication token to post-boot operating system (OS) login components of the system. In addition, single sign-on user authentication may be performed during a pre-boot BIOS environment and then extended to the post-boot OS environment without requiring exchange of pins or other intermediary authentication factors between the OS and pre-boot authentication (PBA) for the user to gain access to the information handling system or other network resources.Type: GrantFiled: August 1, 2019Date of Patent: May 31, 2022Assignee: Dell Products L.P.Inventors: Minhaj Ahmed, Daniel L. Hamlin
-
Patent number: 11201744Abstract: A system for a time-based one-time password security system operating at a provisioning server may comprise transmitting one or more first locally generated random-string numbers for generation of a first time-based one-time password to a remotely connected internet of things sensor and a remotely connected internet of things sensor hub. The system may also comprise executing code instructions to associate the internet of things sensor with a first client key in a table stored in a memory operatively connected to the processor, associate the internet of things sensor hub with a second client key in the table, and associate the internet of things sensor and internet of things sensor hub with the one or more first locally generated random-string numbers in the table. Further the first remotely generated random-string numbers may identify a first preset function for generation of a first session key used in encrypting and decrypting sensor data records.Type: GrantFiled: November 18, 2019Date of Patent: December 14, 2021Assignee: Dell Products, LPInventors: Daniel L. Hamlin, Minhaj Ahmed, Amy C. Nelson
-
Patent number: 11163871Abstract: In scenarios where I/O ports of an IHS are not secured, malicious actors may exploit such I/O ports when a user of the IHS is unaware. Embodiments provide techniques for securing access to I/O ports of an IHS based on the context of the IHS, which includes the user context and the system context of the IHS. Upon initialization of the IHS, access to the I/O ports is configured based on a boot context policy. The operating system is booted and use of the IHS proceeds. Modifications to an IHS context are detected. Based on a policy applicable to the modified IHS context, modified access to the I/O ports is configured. In embodiments where the IHS is a convertible laptop, a system context may include the posture in which the system is physically configured. A user context may include whether a user is detected in proximity to the IHS.Type: GrantFiled: May 2, 2019Date of Patent: November 2, 2021Assignee: Dell Products, L.P.Inventors: Vivek Viswanathan Iyer, Daniel L. Hamlin, Minhaj Ahmed
-
Patent number: 11068614Abstract: Data is frequently protected by securing the data within containers that are only accessible using a specific security application. Once such data is transferred, all protections provided by the security application are lost. Methods and systems provide secured access to data by intercepting requests for access to a data files accessed via an IHS (Information Handling System) by applications operating within the operating system of the IHS. Based on condition settings stored in the data files, access privileges are determined for applications. The conditions settings include environmental conditions required for providing access to the data. If the IHS satisfies the environmental conditions specified by a data file, access to the data file may be granted. The data requests may be intercepted by a kernel process of the operating system of the IHS. The environmental conditions may specify requirements on the networks, display devices and/or software utilized by the IHS.Type: GrantFiled: August 30, 2018Date of Patent: July 20, 2021Assignee: Dell Products, L.P.Inventors: Daniel L. Hamlin, Minhaj Ahmed
-
Patent number: 11003786Abstract: An information handling system for securely storing a file includes a storage device and a processor that instantiates an operating system, a file system filter driver, and a storage device driver. The file system filter driver receives the file and access information from the operating system, combines the file and the access information to provide a secure file, and stores the secure file via the storage device driver on the storage device. The file system filter driver further receives a request for the secure file from the operating system, directs the storage device driver to retrieve the access information from the secure file on the storage device, and determines if the request is authorized based upon the access information. In response to the request being authorized, the file system filter driver directs the storage device driver to retrieve the secure file from the storage device, and provides the secure file to the operating system.Type: GrantFiled: May 30, 2018Date of Patent: May 11, 2021Assignee: Dell Products L.P.Inventors: Minhaj Ahmed, Daniel L. Hamlin
-
Publication number: 20210034748Abstract: Systems and methods are provided that may be implemented during a pre-boot environment to authenticate a user in the basic input/output system (BIOS) of an information handling system, and to securely provision a resulting authentication token to post-boot operating system (OS) login components of the system. In addition, single sign-on user authentication may be performed during a pre-boot BIOS environment and then extended to the post-boot OS environment without requiring exchange of pins or other intermediary authentication factors between the OS and pre-boot authentication (PBA) for the user to gain access to the information handling system or other network resources.Type: ApplicationFiled: August 1, 2019Publication date: February 4, 2021Inventors: Minhaj Ahmed, Daniel L. Hamlin
-
Publication number: 20200349251Abstract: In scenarios where I/O ports of an IHS are not secured, malicious actors may exploit such I/O ports when a user of the IHS is unaware. Embodiments provide techniques for securing access to I/O ports of an IHS based on the context of the IHS, which includes the user context and the system context of the IHS. Upon initialization of the IHS, access to the I/O ports is configured based on a boot context policy. The operating system is booted and use of the IHS proceeds. Modifications to an IHS context are detected. Based on a policy applicable to the modified IHS context, modified access to the I/O ports is configured. In embodiments where the IHS is a convertible laptop, a system context may include the posture in which the system is physically configured. A user context may include whether a user is detected in proximity to the IHS.Type: ApplicationFiled: May 2, 2019Publication date: November 5, 2020Applicant: Dell Products, L.P.Inventors: Vivek Viswanathan Iyer, Daniel L. Hamlin, Minhaj Ahmed
-
Publication number: 20200084038Abstract: A system for a time-based one-time password security system operating at a provisioning server may comprise transmitting one or more first locally generated random-string numbers for generation of a first time-based one-time password to a remotely connected internet of things sensor and a remotely connected internet of things sensor hub. The system may also comprise executing code instructions to associate the internet of things sensor with a first client key in a table stored in a memory operatively connected to the processor, associate the internet of things sensor hub with a second client key in the table, and associate the internet of things sensor and internet of things sensor hub with the one or more first locally generated random-string numbers in the table. Further the first remotely generated random-string numbers may identify a first preset function for generation of a first session key used in encrypting and decrypting sensor data records.Type: ApplicationFiled: November 18, 2019Publication date: March 12, 2020Applicant: Dell Products, LPInventors: Daniel L. Hamlin, Minhaj Ahmed, Amy C. Nelson
-
Publication number: 20200074097Abstract: Data is frequently protected by securing the data within containers that are only accessible using a specific security application. Once such data is transferred, all protections provided by the security application are lost. Methods and systems provide secured access to data by intercepting requests for access to a data files accessed via an IHS (Information Handling System) by applications operating within the operating system of the IHS. Based on condition settings stored in the data files, access privileges are determined for applications. The conditions settings include environmental conditions required for providing access to the data. If the IHS satisfies the environmental conditions specified by a data file, access to the data file may be granted. The data requests may be intercepted by a kernel process of the operating system of the IHS. The environmental conditions may specify requirements on the networks, display devices and/or software utilized by the IHS.Type: ApplicationFiled: August 30, 2018Publication date: March 5, 2020Applicant: Dell Products, L.P.Inventors: Daniel L. Hamlin, Minhaj Ahmed
-
Patent number: 10541994Abstract: In an example of a system and method for time-based local authentication, an Information Handling System (IHS) may include a processor and a memory coupled to the processor. The memory may have program instructions stored thereon that, upon execution, cause the IHS to generate a first time token and to transmit the first time token to a secondary IHS via a local network, where the secondary IHS is configured to generate a second time token and to transmit the second time token to the IHS via the local network. The IHS may receive the second time token from the secondary IHS and it may determine whether the first time token matches the second time token. In response to the first time token matching the second time token, the IHS may receive access to a protected resource.Type: GrantFiled: April 22, 2016Date of Patent: January 21, 2020Assignee: Dell Products, L.P.Inventors: Daniel L. Hamlin, Minhaj Ahmed, Charles D. Robison
-
Publication number: 20190370480Abstract: An information handling system for securely storing a file includes a storage device and a processor that instantiates an operating system, a file system filter driver, and a storage device driver. The file system filter driver receives the file and access information from the operating system, combines the file and the access information to provide a secure file, and stores the secure file via the storage device driver on the storage device. The file system filter driver further receives a request for the secure file from the operating system, directs the storage device driver to retrieve the access information from the secure file on the storage device, and determines if the request is authorized based upon the access information. In response to the request being authorized, the file system filter driver directs the storage device driver to retrieve the secure file from the storage device, and provides the secure file to the operating system.Type: ApplicationFiled: May 30, 2018Publication date: December 5, 2019Inventors: Minhaj Ahmed, Daniel L. Hamlin
-
Patent number: 10484177Abstract: A system for a time-based one-time password security system operating at a provisioning server may comprise transmitting one or more first locally generated random-string numbers for generation of a first time-based one-time password to a remotely connected internet of things sensor and a remotely connected internet of things sensor hub. The system may also comprise executing code instructions to associate the internet of things sensor with a first client key in a table stored in a memory operatively connected to the processor, associate the internet of things sensor hub with a second client key in the table, and associate the internet of things sensor and internet of things sensor hub with the one or more first locally generated random-string numbers in the table. Further the first remotely generated random-string numbers may identify a first preset function for generation of a first session key used in encrypting and decrypting sensor data records.Type: GrantFiled: July 10, 2017Date of Patent: November 19, 2019Assignee: Dell Products, LPInventors: Daniel L. Hamlin, Minhaj Ahmed, Amy C. Nelson
-
Publication number: 20190013945Abstract: A system for a time-based one-time password security system operating at a provisioning server may comprise transmitting one or more first locally generated random-string numbers for generation of a first time-based one-time password to a remotely connected internet of things sensor and a remotely connected internet of things sensor hub. The system may also comprise executing code instructions to associate the internet of things sensor with a first client key in a table stored in a memory operatively connected to the processor, associate the internet of things sensor hub with a second client key in the table, and associate the internet of things sensor and internet of things sensor hub with the one or more first locally generated random-string numbers in the table. Further the first remotely generated random-string numbers may identify a first preset function for generation of a first session key used in encrypting and decrypting sensor data records.Type: ApplicationFiled: July 10, 2017Publication date: January 10, 2019Applicant: Dell Products, LPInventors: Daniel L. Hamlin, Minhaj Ahmed, Amy C. Nelson
-
Patent number: 10037418Abstract: A pre-boot authentication (PBA) credential sharing system includes a secure subsystem including an off-host processing system and a secure storage. A credential management application is coupled to the off-host processing system. A data protection engine is coupled to the off-host processing system and a PBA database. The data protection engine receives a notification from the off-host processor of the enrollment of an authentication credential in the secure storage by the credential management application, and provides PBA object information for association with the authentication credential to create a PBA object that is stored in the secure storage. Subsequently, while in a pre-boot environment, the data protection engine requests the PBA object from the secure storage, retrieves storage authentication information from the PBA database using the PBA object, and performs a pre-boot authentication process using the storage authentication information.Type: GrantFiled: November 25, 2015Date of Patent: July 31, 2018Assignee: Dell Products L.P.Inventors: Daniel Hamlin, Brijesh Kumar Mishra, Minhaj Ahmed
-
Publication number: 20170310662Abstract: Systems and methods for time-based local authentication are described. In some embodiments, an Information Handling System (IHS) may include a processor; and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the IHS to: generate a first time token; transmit the first time token to a secondary IHS via a local network, where the secondary IHS is configured to generate a second time token and to transmit the second time token to the IHS via the local network; receive the second time token from the secondary IHS; determine whether the first time token matches the second time token; and in response to the first time token matching the second time token, provide the IHS with access to a protected resource.Type: ApplicationFiled: April 22, 2016Publication date: October 26, 2017Applicant: Dell Products, L.P.Inventors: Daniel L. Hamlin, Minhaj Ahmed, Charles D. Robison
-
Publication number: 20170147801Abstract: A pre-boot authentication (PBA) credential sharing system includes a secure subsystem including an off-host processing system and a secure storage. A credential management application is coupled to the off-host processing system. A data protection engine is coupled to the off-host processing system and a PBA database. The data protection engine receives a notification from the off-host processor of the enrollment of an authentication credential in the secure storage by the credential management application, and provides PBA object information for association with the authentication credential to create a PBA object that is stored in the secure storage. Subsequently, while in a pre-boot environment, the data protection engine requests the PBA object from the secure storage, retrieves storage authentication information from the PBA database using the PBA object, and performs a pre-boot authentication process using the storage authentication information.Type: ApplicationFiled: November 25, 2015Publication date: May 25, 2017Inventors: Daniel Hamlin, Brijesh Kumar Mishra, Minhaj Ahmed
-
Patent number: 9298279Abstract: A cursor control device having a light source and an image sensor for optically tracking motion. The device includes an upwardly facing dome or window that provides a visual and tactile interface for user interaction. The user's hand or finger, bare or gloved, or other object controlled by the user, can be moved in close proximity or touching the dome, and means are provided to discriminate against the motion of objects that are not close to the dome in order to prevent unwanted cursor motion. Said means can include optics having a limited depth of focus, adaptive illumination processing for controlling the intensity of light emitted from the light source to optimize sensor operation, and/or processing for projecting cursor motion in accordance with a detected level of confidence in the sensor data.Type: GrantFiled: September 17, 2010Date of Patent: March 29, 2016Assignee: Itac Systems, Inc.Inventors: Donald P. Bynum, Gregory A. Magel, Robert Leo Dawes, Larry V. Moore, Minhaj Ahmed
-
Publication number: 20110128220Abstract: A cursor control device having a light source and an image sensor for optically tracking motion. The device includes an upwardly facing dome or window that provides a visual and tactile interface for user interaction. The user's hand or finger, bare or gloved, or other object controlled by the user, can be moved in close proximity or touching the dome, and means are provided to discriminate against the motion of objects that are not close to the dome in order to prevent unwanted cursor motion. Said means can include optics having a limited depth of focus, adaptive illumination processing for controlling the intensity of light emitted from the light source to optimize sensor operation, and/or processing for projecting cursor motion in accordance with a detected level of confidence in the sensor data.Type: ApplicationFiled: September 17, 2010Publication date: June 2, 2011Inventors: Donald P. Bynum, Gregory A. Magel, Robert Leo Dawes, Larry V. Moore, Minhaj Ahmed
-
Patent number: 7825895Abstract: A method of moving the cursor is used in a computer system having a processor operatively coupled to a cursor control device having a light source and an image sensor for optically tracking motion of the cursor control device. The method is executed to move the cursor according to an enhanced tracking value generated based on a measured tracking value, a projected tracking value, and a tracking confidence value based on an illumination value representative of an intensity of light sensed by the sensor.Type: GrantFiled: December 22, 2003Date of Patent: November 2, 2010Assignee: Itac Systems, Inc.Inventors: Donald P. Bynum, Gregory A. Magel, Robert Leo Dawes, Larry V. Moore, Minhaj Ahmed
-
Publication number: 20060028442Abstract: A cursor control device (700) having a light source (70) and an image sensor (80) for optically tracking motion. The device (700) includes an upwardly facing dome (710) or window (32) that provides a visual and tactile interface for user interaction. The user's hand or finger, bare or gloved, or other object controlled by the user, can be moved in close proximity or touching the dome (710), and means are provided to discriminate against the motion of objects that are not close to the dome in order to prevent unwanted cursor motion. Said means can include optics (40) having a limited depth of focus, adaptive illumination processing for controlling the intensity of light emitted from the light source (70) to optimize sensor operation, and/or processing for projecting cursor motion in accordance with a detected level of confidence in the sensor data.Type: ApplicationFiled: December 22, 2003Publication date: February 9, 2006Applicant: Itac Systems, Inc.Inventors: Donald Bynum, Gregory Magel, Robert Dawes, Larry Moore, Minhaj Ahmed