Patents by Inventor Bridget Cate

Bridget Cate has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250013929
    Abstract: A policy driven intelligent telemetry controller may collect network utilization for one or more applications, processes and/or subnetworks, at predetermined time intervals; may implement a policy configuration for telemetry transfer control, to define business critical, and/or time sensitive, application data and entity data; may use a support vector machine (SVM) classification model applied to historical network bandwidth utilization data for application data and entity data and a policy configuration of data criticality, to classify and create a cluster for each critical data set of the application data and entity data; may use linear regression to predict future network bandwidth demand variations for each cluster, across a plurality of time frames; and may use a resulting predicted network bandwidth to transfer critical data sets during a specific time window.
    Type: Application
    Filed: July 6, 2023
    Publication date: January 9, 2025
    Applicant: Dell Products, L.P.
    Inventors: Sisir Samanta, Bridget Cate, Elie Antoun Jreij, Shibi Panikkar
  • Publication number: 20240427895
    Abstract: Systems and methods for location-based IHS disablement in an Information Handling System (IHS) are described. In an embodiment, an IHS may include: a host processor; a security processor coupled to the host processor; and a memory coupled to the security processor, the memory having program instructions stored thereon that, upon execution, cause the security processor to: detect a location where the IHS is currently disposed; determine one or more restrictions associated with the detected location, each of the restrictions specifying a limitation to be imparted on a resource of the IHS; and communicate with the IHS to apply the determined restrictions.
    Type: Application
    Filed: June 26, 2023
    Publication date: December 26, 2024
    Applicant: Dell Products, L.P.
    Inventors: Jason Davidson, Dominique Prunier, Andrew Nepogodin, Bridget Cate, Elie Antoun Jreij, Yun Zhang, Sisir Samanta, Ching-Yun Chao, Shibi Panikkar
  • Publication number: 20240427864
    Abstract: Systems and methods for establishing biometric hardwired Information Handling System (IHS) ownership are described. In an illustrative, non-limiting embodiment, an IHS may include: a processor; a biometric module including a one-time write biometric profile; and a memory coupled to the processor, where the memory includes program instructions store thereon that, upon execution by the processor, cause the IHS to: obtain biometric data from a user of the IHS; and allow access to the IHS based, at least in part, on a validation of the biometric data with the biometric profile. In another embodiment, a method includes obtaining biometric data from a user of an IHS; and allowing access to the IHS based, at least in part, on a validation of the biometric data with a biometric profile stored in a one-time write memory of the IHS.
    Type: Application
    Filed: June 26, 2023
    Publication date: December 26, 2024
    Applicant: Dell Products, L.P.
    Inventors: Andrew Nepogodin, Ching-Yun Chao, Yun Zhang, Jason Davidson, Dominique Prunier, Elie Antoun Jreij, Sisir Samanta, Bridget Cate
  • Publication number: 20240427894
    Abstract: Systems and methods for location-based IHS functionality limiting in an Information Handling System (IHS) are described. In an embodiment, an IHS may include: a host processor; a security processor coupled to the host processor; and a memory coupled to the security processor, the memory having program instructions stored thereon that, upon execution, cause the security processor to: detect a location where the IHS is currently disposed; determine one or more restrictions associated with the detected location, each of the restrictions specifying a limitation to be imparted on a resource of the IHS; and communicate with the IHS to apply the determined restrictions.
    Type: Application
    Filed: June 26, 2023
    Publication date: December 26, 2024
    Applicant: Dell Products, L.P.
    Inventors: Jason Davidson, Dominique Prunier, Andrew Nepogodin, Bridget Cate, Elie Antoun Jreij, Yun Zhang, Sisir Samanta, Ching-Yun Chao, Shibi Panikkar, Maleravalappil Abdulla Mohammad Sadiq
  • Publication number: 20240430082
    Abstract: According to embodiments of the present disclosure, systems and methods for validating the authenticity of devices used in information handling systems (IHSs) are provided. According to one embodiment, an IHS includes a replacement/repaired device to be configured in a computing system, and computer-executable instructions to receive a to-be-replaced public key of a to-be-replaced/repaired device configured in the computing system, sign, using a replacement/repaired device private key of the replacement/repaired device, attestation data of the replacement/repaired device, and sign, using a vendor private key of a vendor of the replacement/repaired device, the signed attestation data and a replacement/repaired device public key of the replacement/repaired device.
    Type: Application
    Filed: June 26, 2023
    Publication date: December 26, 2024
    Applicant: Dell Products, L.P.
    Inventors: Ching-Yun Chao, Andrew Nepogodin, Sisir Samanta, Jason Davidson, Dominique Prunier, Bridget Cate, Elie Antoun Jreij, Yun Zhang, Shibi Panikkar, Maleravalappil Abdulla Mohammad Sadiq, Vaijayanti Joshi
  • Publication number: 20240427883
    Abstract: An IHS detects unauthorized access to the IHS, identifies one or more types of the unauthorized access to the IHS, determines a severity level of the unauthorized access to the IHS, based, at least in part, on an identified one or more types of the unauthorized access to the IHS, determines a type of self-destruction of the IHS, and destructs availability of the IHS, by the IHS in accordance with a determined type of self-destruction of the IHS. The IHS may send a notification that the IHS will self-destruct, and/or may collect evidence of the unauthorized access to the IHS prior to destructing availability of the IHS, by the IHS.
    Type: Application
    Filed: June 26, 2023
    Publication date: December 26, 2024
    Applicant: Dell Products, L.P.
    Inventors: Yun Zhang, Elie Antoun Jreij, Andrew Nepogodin, Ching-Yun Chao, Sisir Samanta, Bridget Cate, Jason Davidson, Susan E. Young, Dominique Prunier, Maleravalappil Abdulla Mohammad Sadiq
  • Publication number: 20240235852
    Abstract: Blockchain security for distributed multi-cloud orchestration and configuration management is described herein. A method as described herein can include receiving, by a system comprising a processor from a first computing device, an admission request for entry of the first computing device into a blockchain system, the admission request comprising hardware verification data relating to a hardware configuration of the first computing device, wherein the admission request is signed by a private key associated with the first computing device; facilitating, by the system, validation of the hardware verification data by respective second computing devices in the blockchain system, the validation being based on a public key stored in a public key certificate associated with the first computing device; and granting, by the system, admission of the first computing device into the blockchain system in response to a supermajority of the second computing devices successfully validating the hardware verification data.
    Type: Application
    Filed: January 5, 2023
    Publication date: July 11, 2024
    Inventors: Bridget Cate, Ching-Yun Chao, Elie Antoun Jreij