Patents by Inventor Chad Skipper

Chad Skipper has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10157286
    Abstract: Aspects of the present invention provide the ability to enforce access methods on data based upon a policy or policies identified within the metadata of a file. The data is self-protected by including or being wrapped with one or more policy/rule identifiers that act as a form of body armor to the data when in transit or in different situations. In embodiments, access is only granted upon successful authentication and compliance with the identified policy or policies. In embodiments, depending upon the conditions and policies, varying level access may be granted. In embodiments, depending upon the conditions and policies, the system may take one or more mitigations or remedial access levels, such as containerizing, sandboxing, granting limited access, or erasing the data.
    Type: Grant
    Filed: December 18, 2015
    Date of Patent: December 18, 2018
    Assignee: DELL PRODUCTS LP
    Inventors: Chad Skipper, Elliot D. Lewis, David Konetski, Christopher Burchett, Richard William Schuckle, James Michael Burke, Warren Wade Robbins, Carrie Elaine Gates
  • Patent number: 10102073
    Abstract: Systems and methods for providing automatic system stop and boot-to-service OS for forensic analysis. In some embodiments, an Information Handling System (IHS) includes a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution by the processor, cause the IHS to: detect an Indicator of Compromise (IoC); send, to a server, a message including the IoC; receive, from the server, a recovery instruction; and boot into a service OS identified in the recovery instruction, wherein the service OS is distinct from a main OS included in the IHS.
    Type: Grant
    Filed: May 20, 2015
    Date of Patent: October 16, 2018
    Assignee: Dell Products, L.P.
    Inventors: Todd Erick Swierk, Carlton A. Andrews, Yuan-Chang Lo, Phillip M. Seibert, Chad Skipper
  • Patent number: 10089482
    Abstract: Aspects of the present invention provide the ability to enforce access methods on data based upon a policy or policies identified within the metadata of a file. The data is self-protected by including or being wrapped with one or more policy/rule identifiers that act as a form of body armor to the data when in transit or in different situations. In embodiments, access is only granted upon successful authentication and compliance with the identified policy or policies. In embodiments, depending upon the conditions and policies, varying level access may be granted. In embodiments, depending upon the conditions and policies, the system may take one or more mitigations or remedial access levels, such as containerizing, sandboxing, granting limited access, or erasing the data.
    Type: Grant
    Filed: December 18, 2015
    Date of Patent: October 2, 2018
    Assignee: DELL PRODUCTS LP
    Inventors: Chad Skipper, Elliot D. Lewis, David Konetski, Christopher Burchett, Richard William Schuckle, James Michael Burke, Warren Wade Robbins, Carrie Elaine Gates
  • Publication number: 20170039379
    Abstract: Aspects of the present invention provide the ability to enforce access methods on data based upon a policy or policies identified within the metadata of a file. The data is self-protected by including or being wrapped with one or more policy/rule identifiers that act as a form of body armor to the data when in transit or in different situations. In embodiments, access is only granted upon successful authentication and compliance with the identified policy or policies. In embodiments, depending upon the conditions and policies, varying level access may be granted. In embodiments, depending upon the conditions and policies, the system may take one or more mitigations or remedial access levels, such as containerizing, sandboxing, granting limited access, or erasing the data.
    Type: Application
    Filed: December 18, 2015
    Publication date: February 9, 2017
    Applicant: DELL PRODUCTS L.P.
    Inventors: Chad Skipper, Elliot D. Lewis, David Konetski, Christopher Burchett, Richard William Schuckle, James Michael Burke, Warren Wade Robbins, Carrie Elaine Gates
  • Publication number: 20170039376
    Abstract: Aspects of the present invention provide the ability to enforce access methods on data based upon a policy or policies identified within the metadata of a file. The data is self-protected by including or being wrapped with policies/rules that act as a form of body armor to the data when in transit or in different situations. In embodiments, access is only granted upon successful authentication and compliance with the identified policy or policies. In embodiments, depending upon the conditions and policies, varying level access may be granted. In embodiments, depending upon the conditions and policies, the system may take one or more mitigations or remedial access levels, such as containerizing, sandboxing, granting limited access, or erasing the data.
    Type: Application
    Filed: August 5, 2015
    Publication date: February 9, 2017
    Applicant: DELL PRODUCTS L.P.
    Inventors: Chad Skipper, Elliot D. Lewis, David Konetski, Christopher Burchett, Richard William Schuckle, James Michael Burke, Warren Wade Robbins, Carrie Elaine Gates
  • Publication number: 20170039378
    Abstract: Aspects of the present invention provide the ability to enforce access methods on data based upon a policy or policies identified within the metadata of a file. The data is self-protected by including or being wrapped with one or more policy/rule identifiers that act as a form of body armor to the data when in transit or in different situations. In embodiments, access is only granted upon successful authentication and compliance with the identified policy or policies. In embodiments, depending upon the conditions and policies, varying level access may be granted. In embodiments, depending upon the conditions and policies, the system may take one or more mitigations or remedial access levels, such as containerizing, sandboxing, granting limited access, or erasing the data.
    Type: Application
    Filed: December 18, 2015
    Publication date: February 9, 2017
    Applicant: DELL PRODUCTS L.P.
    Inventors: Chad Skipper, Elliot D. Lewis, David Konetski, Christopher Burchett, Richard William Schuckle, James Michael Burke, Warren Wade Robbins, Carrie Elaine Gates
  • Publication number: 20160342477
    Abstract: Systems and methods for providing automatic system stop and boot-to-service OS for forensic analysis. In some embodiments, an Information Handling System (IHS) includes a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution by the processor, cause the IHS to: detect an Indicator of Compromise (IoC); send, to a server, a message including the IoC; receive, from the server, a recovery instruction; and boot into a service OS identified in the recovery instruction, wherein the service OS is distinct from a main OS included in the IHS.
    Type: Application
    Filed: May 20, 2015
    Publication date: November 24, 2016
    Applicant: Dell Products, L.P.
    Inventors: Todd Erick Swierk, Carlton A. Andrews, Yuan-Chang Lo, Phillip M. Seibert, Chad Skipper