Patents by Inventor Allen Wynn
Allen Wynn has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11416607Abstract: A method may include determining a configuration of one or more basic input/output system (BIOS) settings identified as influencing security at an information handling system. The method may further include determining a security risk score based on the configuration, and generating a security gauge image that provides a visual indication of the security risk score. The security gauge image may be displayed during BIOS initialization at the information handling system.Type: GrantFiled: November 4, 2019Date of Patent: August 16, 2022Assignee: Dell Products L.P.Inventors: Greg Havenga, Ruhull Bhuiyan, Carl McAdams, Ibrahim Sayyed, Allen Wynn, Joshua Alperin
-
Patent number: 10146551Abstract: Systems and methods for initializing and reconfiguring replacement motherboards are described. In some embodiments, an Information Handling System (IHS) may include: a motherboard, a processor mounted on the motherboard, and a Basic Input/Output System (BIOS) mounted on the motherboard and coupled to the processor, the BIOS having program instructions stored thereon that, upon execution by the processor, cause the IHS to: determine, while operating in a service mode, whether prefill data is available in a memory device distinct from any component mounted on the motherboard, where the prefill data is usable by the BIOS to automatically fill out at least a portion of a service menu provided by the BIOS; validate the prefill data; and in response to the validated, prefill data having changed since a previous booting of the IHS, store updated prefill data in the memory device.Type: GrantFiled: August 26, 2016Date of Patent: December 4, 2018Assignee: Dell Products, L.P.Inventors: Xiaomei Miller, Allen Wynn
-
Publication number: 20180060079Abstract: Systems and methods for initializing and reconfiguring replacement motherboards are described. In some embodiments, an Information Handling System (IHS) may include: a motherboard, a processor mounted on the motherboard, and a Basic Input/Output System (BIOS) mounted on the motherboard and coupled to the processor, the BIOS having program instructions stored thereon that, upon execution by the processor, cause the IHS to: determine, while operating in a service mode, whether prefill data is available in a memory device distinct from any component mounted on the motherboard, where the prefill data is usable by the BIOS to automatically fill out at least a portion of a service menu provided by the BIOS; validate the prefill data; and in response to the validated, prefill data having changed since a previous booting of the IHS, store updated prefill data in the memory device.Type: ApplicationFiled: August 26, 2016Publication date: March 1, 2018Applicant: Dell Products, L.P.Inventors: Xiaomei Miller, Allen Wynn
-
Patent number: 9697354Abstract: In accordance with the present disclosure, a system and method are herein disclosed for providing secure SMI memory services, including the protection of SMM memory from surreptitious attacks by, for example, rootkits. Information handling systems are susceptible to attacks, especially attacks on SMM memory. In one example, an SMI handler corresponding to the SMI Driver associated with an SMI interrupt performs validation of a password. An SSMS driver allocates memory for the SMI handler to use with the validation process and also performs a secure erase of allocated memory blocks upon completion of all secure SMI Memory Services. By controlling the validation and secure erase process through the use of the SMI handler and SSMS driver, information leakage can be prevented resulting in system data integrity.Type: GrantFiled: April 24, 2015Date of Patent: July 4, 2017Assignee: Dell Products L.P.Inventor: Allen Wynn
-
Publication number: 20150235022Abstract: In accordance with the present disclosure, a system and method are herein disclosed for providing secure SMI memory services, including the protection of SMM memory from surreptitious attacks by, for example, rootkits. Information handling systems are susceptible to attacks, especially attacks on SMM memory. In one example, an SMI handler corresponding to the SMI Driver associated with an SMI interrupt performs validation of a password. An SSMS driver allocates memory for the SMI handler to use with the validation process and also performs a secure erase of allocated memory blocks upon completion of all secure SMI Memory Services. By controlling the validation and secure erase process through the use of the SMI handler and SSMS driver, information leakage can be prevented resulting in system data integrity.Type: ApplicationFiled: April 24, 2015Publication date: August 20, 2015Inventor: Allen Wynn
-
Patent number: 9047263Abstract: In accordance with the present disclosure, a system and method are herein disclosed for providing secure SMI memory services, including the protection of SMM memory from surreptitious attacks by, for example, rootkits. Information handling systems are susceptible to attacks, especially attacks on SMM memory. In one example, an SMI handler corresponding to the SMI Driver associated with an SMI interrupt performs validation of a password. An SSMS driver allocates memory for the SMI handler to use with the validation process and also performs a secure erase of allocated memory blocks upon completion of all secure SMI Memory Services. By controlling the validation and secure erase process through the use of the SMI handler and SSMS driver, information leakage can be prevented resulting in system data integrity.Type: GrantFiled: January 24, 2013Date of Patent: June 2, 2015Assignee: Dell Products L.P.Inventor: Allen Wynn
-
Publication number: 20070214333Abstract: An information handling system includes a first node and a second node. Each node includes a processor and a local system memory. An interconnect between the first node and the second node enables a processor on the first node to access system memory on the second node. The system includes affinity information that is indicative of a proximity relationship between portions of system memory and the system nodes. A BIOS module migrates a block from one node to another, reloads BIOS-visible affinity tables, and reprograms memory address decoders before calling an operating system affinity module. The affinity module modifies the operating system visible affinity information. The operating system then has accurate affinity information with which to allocate processing threads so that a thread is allocated to a node where memory accesses issued by thread are local accesses.Type: ApplicationFiled: March 10, 2006Publication date: September 13, 2007Applicant: DELL PRODUCTS L.P.Inventors: Vijay Nijhawan, Madhusudhan Rangarajan, Allen Wynn
-
Publication number: 20070180203Abstract: A method for optimizing performance of memory in an information handling system which includes determining whether memory within the information handing system is being accessed in a flexible interleaving memory mode of operation, when the memory is being accessed in the flexible interleaving memory mode of operation, identifying which of the memory is configured as interleaved memory and which of the memory is configured as non-interleaved memory, and configuring the memory such that the interleaved memory is accessed prior to the non-interleaved memory being accessed is disclosed.Type: ApplicationFiled: February 1, 2006Publication date: August 2, 2007Inventors: Madhusudhan Ramgarajan, Allen Wynn
-
Publication number: 20070168585Abstract: A remote access module associated with a BIOS of an information handling system having a UHCI-based USB controller allows selection of legacy USB control with a local keyboard or access by a remote keyboard through a remote access bus master adapter. Input from an inactive local or remote keyboard results in automated enabling of the inactive keyboard and disabling of the active keyboard. In one embodiment, remote access to a keyboard port during legacy USB control saves the data associated with the remote access to a memory location accessible to the BIOS and invokes the BIOS to obtain the data. In another embodiment, a legacy USB control option is offered by a display to a user associated with a local keyboard and legacy USB control disabled if the user fails to select local access in a predetermined time period.Type: ApplicationFiled: October 11, 2006Publication date: July 19, 2007Inventors: Austin Bolen, Mukund Khatri, Allen Wynn
-
Publication number: 20070143646Abstract: In an information handling system, when a memory location is accessed and there is a bit error detected in that memory location then the memory location is logged into an error-log. The memory locations of the logged bit errors stored in the error-log are evaluated to determine whether there is one or more bit errors in a particular memory range, e.g., a contiguous range of memory locations. If there is one or more bit errors in a memory range, then that memory range may be hot ejected, e.g., disabled from use by the operating system. The bit error may be single bit error and/or multiple bit errors of a memory location.Type: ApplicationFiled: December 15, 2005Publication date: June 21, 2007Inventors: Madhusudhan Rangarajan, Frank Wu, Allen Wynn
-
Publication number: 20060206875Abstract: A system and method for inserting stack signature marking segments into application program modules at the entry and exit points of the application program segments prior to compilations. Unique module identifier values are assigned to each application program module. During execution of the modified application software modules, upon entry into a new module or instance of a module, the unique module identifier is pushed onto the stack along with an instance number and an entry indicator. Upon termination of the module or instance of a module, the unique module identifier is pushed onto the stack with the instance number and an exit indicator, thereby placing an entry signature and an exit signature onto the stack bracketing the stack frame assigned to that module or module instance. During debug of exceptions, these signatures may be used to locate and identify stack frames and their associated software modules.Type: ApplicationFiled: May 12, 2006Publication date: September 14, 2006Inventors: Lorin Ullmann, Allen Wynn
-
Publication number: 20060085690Abstract: A method and system for recording hardware and software events of a computer system. An event logger, typically part of system management software, records both primary event records and secondary event records. Secondary event records are used when the data space in a primary event record is insufficient to adequately describe the primary event. The data fields of a secondary event record designate the record as a secondary event and contain the additional data about the event.Type: ApplicationFiled: October 15, 2004Publication date: April 20, 2006Applicant: Dell Products L.P.Inventors: Austin Bolen, Anand Joshi, Mukund Khatri, Allen Wynn
-
Publication number: 20050273587Abstract: In accordance with the teachings of the present disclosure, a system and method for reducing the amount of time for a boot operation is provided that substantially reduces disadvantages and problems associated with previously developed memory testing systems and methods. The system includes using a shutdown memory test module to perform the bulk of memory testing during system shutdown, rather than at system start up.Type: ApplicationFiled: June 7, 2004Publication date: December 8, 2005Inventors: Allen Wynn, Austin Bolen