Patents by Inventor Anand Joshi
Anand Joshi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20150278525Abstract: In accordance embodiments of the present disclosure, a method may include, during execution of an operating system on an information handling system and responsive to a user input indicating a desire to invoke a basic input/output system (BIOS) setup program for configuring a BIOS, prompting for and receiving user-provided credentials via a user interface communicatively coupled to the processor. The method may also include, during execution of the operating system, passing BIOS credentials to the BIOS based on the user-provided credentials. The method may additionally include, during execution of the operating system determining, by the BIOS, if the BIOS credentials are valid. The method may further include, responsive to determining that the BIOS credentials are valid, setting a flag to a value indicating that the BIOS setup program is to be invoked on a subsequent boot of the information handling system.Type: ApplicationFiled: June 11, 2015Publication date: October 1, 2015Inventors: Douglas M. Anson, Charles D. Robison, David Konetski, Frank H. Molsberry, Anand Joshi
-
Patent number: 9137244Abstract: In accordance with embodiments of the present disclosure, a method may include generating a random number to be associated with an information handling resource. The method may also include generating a challenge string based at least on the random number. The method may additionally include encrypting the challenge string using a first shared secret. The method may further include receiving a one-time password generated by a vendor associated with the information handling resource, the one-time password generated by decrypting the challenge string using the first shared secret, parsing the random number from the decrypted challenge string, and digitally signing the decrypted challenge string with a digital signature using a second shared secret. The method may also include granting user access to the information handling resource in response to verifying, using the second shared secret, that the digital signature matches the random number.Type: GrantFiled: January 27, 2015Date of Patent: September 15, 2015Assignee: Dell Products L.P.Inventors: Anand Joshi, Ricardo L. Martinez
-
Publication number: 20150220088Abstract: In accordance with embodiments of the present disclosure, an information handling system may include a processor, a controller, a driver, and a basic/input output system. The controller may be associated with an air mover and configured to generate an interrupt responsive to an event associated with the air mover. The driver may be embodied in an operating system configured for execution on the processor, the driver configured to, during a runtime execution of the operating system in which the event occurred, receive at least one of the interrupt from the controller or an indication of the interrupt from a basic input/output system. The basic input/output system may comprise a program of instructions executable by the processor and configured to cause the processor to, responsive to the event, receive air mover data from the air mover, and communicate the air mover data to the driver.Type: ApplicationFiled: February 3, 2014Publication date: August 6, 2015Applicant: Dell Products L.P.Inventors: Anand Joshi, Balasingh Samuel
-
Patent number: 9081965Abstract: In accordance embodiments of the present disclosure, a method may include, during execution of an operating system on an information handling system and responsive to a user input indicating a desire to invoke a basic input/output system (BIOS) setup program for configuring a BIOS, prompting for and receiving user-provided credentials via a user interface communicatively coupled to the processor. The method may also include, during execution of the operating system, passing BIOS credentials to the BIOS based on the user-provided credentials. The method may additionally include, during execution of the operating system determining, by the BIOS, if the BIOS credentials are valid. The method may further include, responsive to determining that the BIOS credentials are valid, setting a flag to a value indicating that the BIOS setup program is to be invoked on a subsequent boot of the information handling system.Type: GrantFiled: January 22, 2013Date of Patent: July 14, 2015Assignee: Dell Products L.P.Inventors: Douglas M. Anson, Charles D. Robison, David Konetski, Frank H. Molsberry, Anand Joshi
-
Publication number: 20150172281Abstract: In accordance with embodiments of the present disclosure, a method may include generating a random number to be associated with an information handling resource. The method may also include generating a challenge string based at least on the random number. The method may additionally include encrypting the challenge string using a first shared secret. The method may further include receiving a one-time password generated by a vendor associated with the information handling resource, the one-time password generated by decrypting the challenge string using the first shared secret, parsing the random number from the decrypted challenge string, and digitally signing the decrypted challenge string with a digital signature using a second shared secret. The method may also include granting user access to the information handling resource in response to verifying, using the second shared secret, that the digital signature matches the random number.Type: ApplicationFiled: January 27, 2015Publication date: June 18, 2015Inventors: Anand Joshi, Ricardo L. Martinez
-
Patent number: 9053305Abstract: In accordance with embodiments of the present disclosure, a method may include generating a random number to be associated with an information handling resource. The method may also include generating a challenge string based at least on the random number. The method may additionally include encrypting the challenge string using a first shared secret. The method may further include receiving a one-time password generated by a vendor associated with the information handling resource, the one-time password generated by decrypting the challenge string using the first shared secret, parsing the random number from the decrypted challenge string, and digitally signing the decrypted challenge string with a digital signature using a second shared secret. The method may also include granting user access to the information handling resource in response to verifying, using the second shared secret, that the digital signature matches the random number.Type: GrantFiled: December 10, 2012Date of Patent: June 9, 2015Assignee: Dell Products L.P.Inventors: Anand Joshi, Ricardo L. Martinez
-
Publication number: 20140207902Abstract: Instructions embodied in a basic input/output system may cause a processor to, when read and executed by the processor communicate a query via a network interface to an intermediate information handling system to determine if digital assets intended for the information handling system were previously communicated from a management server to the intermediate information handling system and in response to a determination that digital assets intended for the information handling system were previously communicated from a management server to the intermediate information handling system, receive the digital assets at the information handling system from the intermediate information handling system.Type: ApplicationFiled: January 23, 2013Publication date: July 24, 2014Applicant: DELL PRODUCTS L.P.Inventors: Anand Joshi, Carlton Andrews, Christopher Ramirez
-
Publication number: 20140208090Abstract: In accordance embodiments of the present disclosure, a method may include, during execution of an operating system on an information handling system and responsive to a user input indicating a desire to invoke a basic input/output system (BIOS) setup program for configuring a BIOS, prompting for and receiving user-provided credentials via a user interface communicatively coupled to the processor. The method may also include, during execution of the operating system, passing BIOS credentials to the BIOS based on the user-provided credentials. The method may additionally include, during execution of the operating system determining, by the BIOS, if the BIOS credentials are valid. The method may further include, responsive to determining that the BIOS credentials are valid, setting a flag to a value indicating that the BIOS setup program is to be invoked on a subsequent boot of the information handling system.Type: ApplicationFiled: January 22, 2013Publication date: July 24, 2014Applicant: DELL PRODUCTS L.P.Inventors: Douglas M. Anson, Charles D. Robison, David Konetski, Frank H. Molsberry, Anand Joshi
-
Publication number: 20140164781Abstract: In accordance with embodiments of the present disclosure, a method may include generating a random number to be associated with an information handling resource. The method may also include generating a challenge string based at least on the random number. The method may additionally include encrypting the challenge string using a first shared secret. The method may further include receiving a one-time password generated by a vendor associated with the information handling resource, the one-time password generated by decrypting the challenge string using the first shared secret, parsing the random number from the decrypted challenge string, and digitally signing the decrypted challenge string with a digital signature using a second shared secret. The method may also include granting user access to the information handling resource in response to verifying, using the second shared secret, that the digital signature matches the random number.Type: ApplicationFiled: December 10, 2012Publication date: June 12, 2014Applicant: DELL PRODUCTS L.P.Inventors: Anand Joshi, Ricardo L. Martinez
-
Publication number: 20140149730Abstract: A method may include designating a key exchange key as an active key exchange key for a boot session of the information handling system. The method may further include during the boot session, in response to a call for updating a value of an authorized database of keys associated with executable code permitted to execute on the information handling system or an authorized database of keys associated with executable code forbidden to execute on the information handling system: determining whether the value is digitally signed with the active key exchange key, determining whether the update is to a database or database entry associated with the active key exchange key, and processing the update in response to determinations that the value is digitally signed with the active key exchange key and that the update is to a database or database entry associated with the active key exchange key.Type: ApplicationFiled: November 26, 2012Publication date: May 29, 2014Applicant: Dell Products L.P.Inventors: Anand Joshi, Douglas M. Anson, Ricardo L. Martinez
-
Patent number: 8549271Abstract: A method and system are provided for updating an utilizing the contents of a non-essential region in a memory device in a computer system. A computer program is utilized to build an image file. The image file may include program code and data for operating a computer system. The image file includes an essential region for storing program code required to boot the computer system and a non-essential region for storing program code and data which is not required to boot the computer system. The non-essential program code may include graphics data, a language module, or diagnostic tools for the computer system. After building the image file, the image file is then copied to a memory device in the computer system. Finally, only the non-essential region in the memory device is updated. A method may also be utilized to execute program code contained in the non-essential region prior to executing program code contained in the essential region.Type: GrantFiled: March 27, 2009Date of Patent: October 1, 2013Assignee: American Megatrends, Inc.Inventors: Anand Joshi, Juan F. Diaz
-
Publication number: 20120173454Abstract: A method associates a financial portfolio with a social network. The method calculates a normalized change in equity value for the financial portfolio. Also, the method displays a message on the social network based on the calculated change.Type: ApplicationFiled: December 29, 2010Publication date: July 5, 2012Applicant: Yahoo! Inc.Inventors: Charles SHAH, Sahib Bal, Anand Joshi
-
Patent number: 8078795Abstract: A method for writing bytes to flash memory is disclosed herein whereby the method comprising includes counting bytes from a data source, the bytes associated with a first value and a second value and comparing a number of bytes associated with the first value with a number of bytes associated with the second value. The method may further include inverting the bytes in the case where the number of bytes associated with the first value is greater than the number of bytes associated with the second value and transferring the bytes not associated with the second value to the flash memory.Type: GrantFiled: January 31, 2008Date of Patent: December 13, 2011Assignee: Dell Products L.P.Inventors: Juan Francisco Diaz, Anand Joshi, Samer El-Haj-Mahmoud
-
Patent number: 8001303Abstract: In an information handling system, a universal serial bus (USB) key emulation system includes a USB hub operable to communicate with a USB host, a USB bus communicatively coupled with the USB hub, a USB controller communicatively coupled with the USB bus via a set of endpoints, and a USB virtual media module communicatively coupled with the USB controller and operable to communicate data between the USB controller and a plurality of data storage devices as if the plurality of data storage devices are a single USB key.Type: GrantFiled: December 4, 2007Date of Patent: August 16, 2011Assignee: Dell Products L.P.Inventors: Michael Brundridge, Charles T. Perusse, Jr., Stephen D. Cochran, Anand Joshi, Abhay Arjun Salunke
-
Patent number: 7971050Abstract: A method of using BIOS information can include exporting first BIOS information from a first information handling system. The method can further include initiating a boot sequence for the second information handling system and importing second BIOS information into a second information handling system after initiating the boot sequence and before initiating an operating system, wherein the second BIOS information is associated with the first BIOS information. The method can further include initiating an operating system of the second information handling system after importing the second BIOS information. The first and second BIOS information may be the same, or the second BIOS information may be derived from the first BIOS information. The first and second information handling systems may be the same or different. In one embodiment, the first BIOS information can be translated into a text file for editing before using the second BIOS information during a boot sequence.Type: GrantFiled: December 13, 2007Date of Patent: June 28, 2011Assignee: Dell Products, LPInventors: Anand Joshi, Elie Jreij, Charles Perusse, Jr., Juan Diaz
-
Patent number: 7822697Abstract: There is described herein a method for detecting anomalies in an infrastructure, the method comprising: providing a computationally-intelligent analysis model to model a behaviour of at least one detection instrument in said infrastructure; inputting control instrument data into said analysis model, said control instrument data being provided by control instruments in said infrastructure; outputting an estimated behaviour for said at least one detection instrument from said analysis model; comparing actual data from said at least one detection instrument to said estimated behaviour and generating a set of residuals representing a difference between said actual data and said estimated behaviour; and identifying anomalies when said residuals exceed a predetermined threshold.Type: GrantFiled: August 8, 2007Date of Patent: October 26, 2010Assignee: Globvision Inc.Inventors: Ehsan Sobhani Tehrani, Armenih Garabedian, Khashayar Khorasani, Ashutosh Bagchi, Anand Joshi
-
Patent number: 7600112Abstract: A card having a first device and a second device is plugged into a root port having a predefined root port width. The first device is trained and the device lane width is determined. If the root port width is greater than the device lane width then the root port is dynamically configured via hardware strapping to include a predefined number of adjacent ports with each port having a lane width equal to the device lane width. The root port is reset to force training of the first device and the second device.Type: GrantFiled: August 6, 2008Date of Patent: October 6, 2009Assignee: Dell Products L.P.Inventors: Mukund Purshottam Khatri, Anand Joshi, Wei Liu
-
Patent number: 7590836Abstract: Methods and systems are provided for recovering configuration data in a computer system. According to one method, a device is selected as a current device. A first map location is retrieved from a layout of present configuration data stored in a computer system. Next, a second map location is retrieved from a layout of updated configuration data stored in the computer system for the current device. A determination is then made as to whether the first map location matches the second map location for the current device. If it is determined that the first map location matches the second map location for the current device, then the next hardware device in the set of devices is selected as the current device.Type: GrantFiled: August 15, 2006Date of Patent: September 15, 2009Assignee: American Megatrends, Inc.Inventors: Richard Holmberg, Juan Diaz, Anand Joshi
-
Publication number: 20090198870Abstract: A method for writing bytes to flash memory is disclosed herein whereby the method comprising includes counting bytes from a data source, the bytes associated with a first value and a second value and comparing a number of bytes associated with the first value with a number of bytes associated with the second value. The method may further include inverting the bytes in the case where the number of bytes associated with the first value is greater than the number of bytes associated with the second value and transferring the bytes not associated with the second value to the flash memory.Type: ApplicationFiled: January 31, 2008Publication date: August 6, 2009Applicant: DELL PRODUCTS L.P.Inventors: Juan Francisco Diaz, Anand Joshi, Samer El-Haj Mahmoud
-
Publication number: 20090158021Abstract: A method of using BIOS information can include exporting first BIOS information from a first information handling system. The method can further include initiating a boot sequence for the second information handling system and importing second BIOS information into a second information handling system after initiating the boot sequence and before initiating an operating system, wherein the second BIOS information is associated with the first BIOS information. The method can further include initiating an operating system of the second information handling system after importing the second BIOS information. The first and second BIOS information may be the same, or the second BIOS information may be derived from the first BIOS information. The first and second information handling systems may be the same or different. In one embodiment, the first BIOS information can be translated into a text file for editing before using the second BIOS information during a boot sequence.Type: ApplicationFiled: December 13, 2007Publication date: June 18, 2009Applicant: DELL PRODUCTS, LPInventors: Anand Joshi, Elie Jreij, Charles Perusse, JR., Juan Diaz