Patents by Inventor Abeye Teshome

Abeye Teshome has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220303779
    Abstract: A method of securing functionalities of an integrated subscriber identification module (iSIM) on an information handling system may include with an embedded controller (EC), detecting a powering-up process at the information handling system and determine a chain of trust access keys during bootup; with the execution of the EC, detecting and activating a wireless wide area network (WWAN) module; with the execution of the EC, detecting and accessing an integrated subscriber identity module (iSIM); with the execution of the EC, authenticating access to iSIM content including authorization information and carrier profile information with the chain of trust access keys generated from encryption keys based on digital signatures; and sending the authorization information and carrier profile information form the iSIM to the WWAN module for authentication, wirelessly, with a switched multimegabit data service (SM-DS) server associated with the carrier profile.
    Type: Application
    Filed: March 22, 2021
    Publication date: September 22, 2022
    Applicant: Dell Products, LP
    Inventors: Anantha K. Boyapalle, Abeye Teshome, Venkata S. Prayaga
  • Patent number: 11438347
    Abstract: Plural Internet of Things (IoT) gateways detect, secure against and remediate malicious code with an autonomous communication of tokens between the IoT gateways on a time schedule. Detection of an invalid token or a token communication outside of a scheduled time indicates that malicious code may have interfered with token generation or communication. Verification of a token communication to an IoT gateway that failed in turn to pass the token to another IoT gateway indicates that the IoT gateway is a threat that may include malicious code.
    Type: Grant
    Filed: March 12, 2020
    Date of Patent: September 6, 2022
    Assignee: Dell Products L.P.
    Inventors: Abeye Teshome, Srinivas Kamepalli
  • Publication number: 20220217525
    Abstract: A method of provisioning an embedded subscriber identification module (eSIM) profile on an information handling system may include, with an embedded controller (EC), detecting a powering up process at the information handling system; with the execution of the EC, establishing an out-of-band (OOB) connection with a subscription manager-discovery server (SM-DS) to communicate an electronic identification confirming that the information handling system has an authentic subscription to services provided by a wireless wide area network (WWAN) carrier, the OOB connection being established at a level below an operating system (OS) of the information handling system; receiving a WWAN carrier eSIM profile over the OOB connection including an international mobile equipment identity (IMEI); installing the eSIM carrier profile with an embedded universal integrated circuit card (eUICC); and initiating a subscription confirmation with a WWAN carrier.
    Type: Application
    Filed: January 4, 2021
    Publication date: July 7, 2022
    Applicant: Dell Products, LP
    Inventors: Venkata S. Prayaga, Abeye Teshome, Liam B. Quinn
  • Patent number: 11347846
    Abstract: Embodiments of systems and methods for real-time monitoring and policy enforcement of active applications and services are described. In some embodiments, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution by the processor, cause the IHS to: provide a hardware-rooted, Operating System (OS)-agnostic resource monitoring agent; receive, at the resource monitoring agent from a remote resource monitoring service via an out-of-band channel, a resource enforcement policy; determine, by the resource monitoring agent, that an application is using or attempting to use a resource in a manner that conflicts with the resource enforcement policy; and stop or prevent the application from using the resource in response to the determination.
    Type: Grant
    Filed: August 3, 2020
    Date of Patent: May 31, 2022
    Assignee: Dell Products, L.P.
    Inventors: Anantha K. Boyapalle, Abeye Teshome, Vaibhav Soni
  • Patent number: 11336658
    Abstract: Plural Internet of Things (IoT) gateways detect, secure against and remediate malicious code with an autonomous communication of tokens between the IoT gateways on a time schedule. Detection of an invalid token or a token communication outside of a scheduled time indicates that malicious code may have interfered with token generation or communication. Once malicious code is verified on an IoT gateway, the failed gateway is quarantined from the passing of the token and functions of the failed IoT gateway are assigned to other IoT gateways.
    Type: Grant
    Filed: April 27, 2018
    Date of Patent: May 17, 2022
    Assignee: Dell Products L.P.
    Inventors: Abeye Teshome, Srinivas Kamepalli
  • Publication number: 20220035909
    Abstract: Embodiments of systems and methods for real-time monitoring and policy enforcement of active applications and services are described. In some embodiments, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution by the processor, cause the IHS to: provide a hardware-rooted, Operating System (OS)-agnostic resource monitoring agent; receive, at the resource monitoring agent from a remote resource monitoring service via an out-of-band channel, a resource enforcement policy; determine, by the resource monitoring agent, that an application is using or attempting to use a resource in a manner that conflicts with the resource enforcement policy; and stop or prevent the application from using the resource in response to the determination.
    Type: Application
    Filed: August 3, 2020
    Publication date: February 3, 2022
    Applicant: Dell Products, L.P.
    Inventors: Anantha K. Boyapalle, Abeye Teshome, Vaibhav Soni
  • Publication number: 20210235290
    Abstract: An endpoint computing device multi-network slice remediation/productivity system includes a core network system coupled to a RAN system and configured to allocate network slices and make them available for use in wireless communications via the RAN system. While operating in a pre-boot environment, an endpoint computing device determines that it is unable to transition to operating in a runtime environment and, in response, establishes a remediation network connection with a first network slice, and establishes a productivity network connection with a second network slice.
    Type: Application
    Filed: January 29, 2020
    Publication date: July 29, 2021
    Inventors: Anantha Boyapalle, Michael S. Gatson, Abeye Teshome
  • Patent number: 11048551
    Abstract: A secured container provides access to enterprise data while isolated from the operating system of an Information Handling System (IHS). The secured container remains secured during its delivery and deployment. A secured container is configured to provide a user of the IHS with access to enterprise data. The secured container is encrypted using a symmetrical key that is transmitted to a secured storage that is isolated from the operating system of the IHS via out-of-band communications. The encrypted secured container is digitally signed using an asymmetric key pair. The digital signature and the encrypted secured container are transmitted to the IHS via in-band communications. At the IHS, the public key of the asymmetric key pair is used to validate the digital signature and the private symmetric key is retrieved from secured storage to decrypt the secured container. Additional embodiments provide a technique for securely migrating a secured container between IHSs.
    Type: Grant
    Filed: April 25, 2018
    Date of Patent: June 29, 2021
    Assignee: Dell Products, L.P.
    Inventors: Joseph Kozlowski, Ricardo L. Martinez, Abeye Teshome, Charles D. Robison, Girish S. Dhoble
  • Patent number: 11012858
    Abstract: An endpoint computing device network slice certificate provisioning and management system includes a core network system that is coupled to a Radio Access Network (RAN) system and configured to allocate a plurality of a network slices and make each of the network slices available for use in wireless communications via the RAN system. An endpoint computing device is configured to establish a first network connection with a first network slice included in the plurality of network slices and perform, via certificate provisioning wireless communications over the first network connection with the first network slice, certificate provisioning operations to provision a certificate for the endpoint computing device. The endpoint computing device may then use the certificate to verify at least one server device to provide at least one verified server device, and perform secure network communications with the at least one verified server device.
    Type: Grant
    Filed: January 29, 2020
    Date of Patent: May 18, 2021
    Assignee: Dell Products L.P.
    Inventors: Joseph Kozlowski, Anantha Boyapalle, Carlton Andrews, Abeye Teshome
  • Patent number: 10990706
    Abstract: Systems and methods are provided for recording and validating modifications to a secured container. Modifications to the secured container by trusted parties are logged. The log may be maintained in a secured memory of an IHS (Information Handling System) and may be periodically validated. Each logged modification specifies a timestamp of the modification and the digital watermark assigned to the trusted party making the modification. Upon completing modifications, the secured container is sealed by imprinting the first digital watermark and the first timestamp at locations in the secured container specified by a watermarking algorithm assigned to the trusted party making the modification. Additional modifications may be serially watermarked on the secured container according the watermarking algorithm of the trusted party making each modification. The secured container is unsealed by re-applying each of the watermarking algorithms in reverse order.
    Type: Grant
    Filed: April 25, 2018
    Date of Patent: April 27, 2021
    Assignee: Dell Products, L.P.
    Inventors: Charles D. Robison, Andrew T. Fausak, Abeye Teshome, Ricardo L. Martinez, Girish S. Dhoble, Carlton A. Andrews, David Konetski
  • Patent number: 10956564
    Abstract: Systems and methods that may be implemented to use encryption to isolate SMI functions, libraries and data from each other, such as during operation of systems management mode (SMM). Isolation of SMI function, library and data (and limitation of SMI function/library privileges) may be achieved in SMI at runtime by decrypting only that code and data needed for performing the required action/s in response to a SMI received from a calling process by a host processor (e.g., CPU).
    Type: Grant
    Filed: November 6, 2018
    Date of Patent: March 23, 2021
    Assignee: Dell Products L.P.
    Inventors: Girish S. Dhoble, Ricardo L. Martinez, Nicholas D. Grobelny, Abeye Teshome
  • Patent number: 10846408
    Abstract: A secured virtual environment provides access to enterprise data and may be configured remotely while isolated from the operating system of an Information Handling System (IHS). In secured booting of the IHS, references signatures are received via an out-of-band connection to the IHS. The reference signatures specify reference states for components of the IHS. Prior to launching a secured virtual environment, a trusted resource of the IHS, such as embedded controller isolated from the operating system, is queried for updated signatures specifying operating states of the component. The integrity of the IHS is validated based on comparisons of the respective reference signatures and updated signatures. If the integrity of the IHS is validated, a secured virtual environment is configured such that particular user may access the enterprise data according to applicable policies that may be periodically revalidated. The secured virtual environment may then be launched on the IHS.
    Type: Grant
    Filed: April 25, 2018
    Date of Patent: November 24, 2020
    Assignee: Dell Products, L.P.
    Inventors: David Konetski, Carlton A. Andrews, Ricardo L. Martinez, Abeye Teshome, Joseph Kozlowski, Charles D. Robison, Girish S. Dhoble, Andrew T. Fausak
  • Patent number: 10747603
    Abstract: Systems and methods for agentless remediation and recovery. In an illustrative, non-limiting embodiment, an Information Handling System (IHS) may include a Central Processing Unit (CPU); a Basic Input/Output System (BIOS) coupled to the CPU; a logic controller coupled to the CPU; and a memory coupled to the logic controller, the memory having program instructions stored thereon that, upon execution by the logic controller, cause the IHS to: during a first stage, check an operational state of a plurality of hardware components within the IHS in the absence of any involvement by the CPU or the BIOS; and during a second stage following the first stage, identify a failed hardware component amongst the plurality of hardware components in the absence of any involvement by the CPU or the BIOS.
    Type: Grant
    Filed: October 23, 2018
    Date of Patent: August 18, 2020
    Assignee: Dell Products, L.P.
    Inventors: Abeye Teshome, Joseph Kozlowski
  • Publication number: 20200220883
    Abstract: Plural Internet of Things (IoT) gateways detect, secure against and remediate malicious code with an autonomous communication of tokens between the IoT gateways on a time schedule. Detection of an invalid token or a token communication outside of a scheduled time indicates that malicious code may have interfered with token generation or communication. Verification of a token communication to an IoT gateway that failed in turn to pass the token to another IoT gateway indicates that the IoT gateway is a threat that may include malicious code.
    Type: Application
    Filed: March 12, 2020
    Publication date: July 9, 2020
    Applicant: Dell Products L.P.
    Inventors: Abeye Teshome, Srinivas Kamepalli
  • Publication number: 20200143042
    Abstract: Systems and methods that may be implemented to use encryption to isolate SMI functions, libraries and data from each other, such as during operation of systems management mode (SMM). Isolation of SMI function, library and data (and limitation of SMI function/library privileges) may be achieved in SMI at runtime by decrypting only that code and data needed for performing the required action/s in response to a SMI received from a calling process by a host processor (e.g., CPU).
    Type: Application
    Filed: November 6, 2018
    Publication date: May 7, 2020
    Inventors: Girish S. Dhoble, Ricardo L. Martinez, Nicholas D. Grobelny, Abeye Teshome
  • Publication number: 20200142738
    Abstract: Systems and methods are provided that may be implemented to control flow integrity during systems management mode (SMM). The systems and methods may be implemented to restrict access by a given SMI function to specific regions of dynamic system memory by blocking unauthorized access to data or code regions of the system memory that are not needed by the SMI function so as to protect the rest of the system memory and system.
    Type: Application
    Filed: November 6, 2018
    Publication date: May 7, 2020
    Inventors: Nicholas D. Grobelny, Ricardo L. Martinez, Girish S. Dhoble, Abeye Teshome
  • Publication number: 20200134394
    Abstract: An information handling system operating a sensor fusion prediction based automatic adjustment system may comprise sensors measuring influencing attributes comprising information handling system operational values, wherein a subset of the influencing attributes influence one of a plurality of system characteristics, and a memory storing definitions of a user behavior characteristic, a performance mapping characteristic, a power status characteristic, a security profile characteristic, and a policy configuration characteristic.
    Type: Application
    Filed: October 26, 2018
    Publication date: April 30, 2020
    Applicant: Dell Products, LP
    Inventors: Abeye Teshome, Sinem Gulbay
  • Patent number: 10637876
    Abstract: Plural Internet of Things (IoT) gateways detect, secure against and remediate malicious code with an autonomous communication of tokens between the IoT gateways on a time schedule. Detection of an invalid token or a token communication outside of a scheduled time indicates that malicious code may have interfered with token generation or communication. Verification of a token communication to an IoT gateway that failed in turn to pass the token to another IoT gateway indicates that the IoT gateway is a threat that may include malicious code.
    Type: Grant
    Filed: April 27, 2018
    Date of Patent: April 28, 2020
    Assignee: Dell Products L.P.
    Inventors: Abeye Teshome, Srinivas Kamepalli
  • Patent number: 10616974
    Abstract: Information handling systems interacting through a network, such as gaming between distal locations, remotely control ambience lighting of rooms in which the games are presented to enhance the interactive experience. An Internet of Things environmental lighting control system accessed by a remote information handling system adjusts illumination responsive to settings communicated from the remote information handling system.
    Type: Grant
    Filed: April 27, 2018
    Date of Patent: April 7, 2020
    Assignee: Dell Products L.P.
    Inventors: Abeye Teshome, Srinivas Kamepalli, Mohammed Hijazi
  • Patent number: 10574509
    Abstract: In one or more embodiments, one or more systems, method, and/or processes may receive an event from an operating system and provide the event to a management controller configured to perform out-of-band tasks. The management controller may provide information based on the event to at least one subscriber. In one example, the information may include a status of an information handling system (e.g., an impairment, a hardware failure, a progress of an update, etc.). In another example, the management controller may provide information utilizing a protocol that provides a measure of reliability. For instance, the protocol may include a transmission control protocol. In one or more embodiments, the protocol may include one or more of a hypertext transfer protocol (HTTP) and a HTTP secure (HTTPS).
    Type: Grant
    Filed: May 5, 2017
    Date of Patent: February 25, 2020
    Assignee: Dell Products L.P.
    Inventors: Srikanth Kondapi, Nathan F. Martell, Joseph Kozlowski, Jr., Abeye Teshome