Patents by Inventor Charles D. Robison
Charles D. Robison has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20150135021Abstract: Context captured with sensors of an information handling system is applied to selectively lock access to currently unlocked information, with conditions for locking access based upon the context. Nervous states enforce locking of selected information based upon the confidence of the security of the information under sensed external conditions. Increased sensitivity for locking access includes reduced timeouts to a lock command, increased response to sensed conditions, and more rapid response where unlocked access is to sensitive information.Type: ApplicationFiled: November 8, 2013Publication date: May 14, 2015Applicant: DELL PRODUCTS L.P.Inventors: Charles D. Robison, Liam B. Quinn, Rocco Ancona, Roman Joel Pacheco
-
Publication number: 20150135298Abstract: Context captured with sensors of an information handling system is applied to selectively lock access to currently unlocked information, with conditions for locking access based upon the context. Nervous states enforce locking of selected information based upon the confidence of the security of the information under sensed external conditions. Increased sensitivity for locking access includes reduced timeouts to a lock command, increased response to sensed conditions, and more rapid response where unlocked access is to sensitive information.Type: ApplicationFiled: November 8, 2013Publication date: May 14, 2015Applicant: Dell Products L.P.Inventors: Charles D. Robison, Liam B. Quinn, Rocco Ancona
-
Patent number: 8978101Abstract: A method may also include receiving from each of one or more of potential peer information handling systems a connection request comprising a peer minimum acceptable security level for the peer information handling system. The method may additionally include comparing the peer minimum acceptable security level to a security level of the information handling system. The method may further include completing a peer-to-peer connection between the information handling system and the peer information handling system if the minimum acceptable security level is not higher than that of the security level of the information handling system.Type: GrantFiled: January 22, 2013Date of Patent: March 10, 2015Assignee: Dell Products L.P.Inventors: Douglas M. Anson, Carlton A. Andrews, Charles D. Robison, David Konetski, Frank H. Molsberry, Yuan-Chang Lo
-
Publication number: 20150067793Abstract: A system, method, and computer-readable medium are disclosed for using an entryless One-Time Password (OTP) in an active tag environment. Authentication credentials associated with a user and an active tag device are submitted with an access request to an authentication server, where they are processed to generate an OTP credential, which is then stored in a directory service. Encryption operations are then performed on the OTP credential to generate an encrypted OTP credential, which is then provided to the active tag device, which in turn provides it to an active tag terminal. The active tag terminal then submits a request to the authentication server to verify the validity of the encrypted OTP credential. In response, the authentication server verifies its validity and then destroys the OTP credential stored in the directory service. The OTP credential is then decrypted by the active tag terminal and subsequently used to login the user.Type: ApplicationFiled: August 28, 2013Publication date: March 5, 2015Applicant: Dell Products L.P.Inventors: Charles D. Robison, JR., Daniel L. Hamlin
-
Publication number: 20150052065Abstract: Unauthorized copying of a transaction barcode is prevented by including a sensed condition or other publicly-accessible data with the transaction barcode for use as a comparison with the publicly accessible data determined at a barcode reader. If the sensed condition included in the transaction barcode indicates that the transaction barcode was generated for a different transaction, then the barcode reader invalidates the transaction. For instance, if the barcode was generated too distant in time, position, or sequential transactions, then the barcode reader invalidates the transaction barcode as an unauthorized copy of a transaction barcode generated for a different transaction.Type: ApplicationFiled: November 3, 2014Publication date: February 19, 2015Applicant: DELL PRODUCTS L.P.Inventors: Charles D. Robison, Richard W. Schuckle, Rocco Ancona
-
Patent number: 8893964Abstract: Unauthorized copying of a transaction barcode is prevented by including a sensed condition or other publicly-accessible data with the transaction barcode for use as a comparison with the publicly accessible data determined at a barcode reader. If the sensed condition included in the transaction barcode indicates that the transaction barcode was generated for a different transaction, then the barcode reader invalidates the transaction. For instance, if the barcode was generated too distant in time, position, or sequential transactions, then the barcode reader invalidates the transaction barcode as an unauthorized copy of a transaction barcode generated for a different transaction.Type: GrantFiled: March 15, 2013Date of Patent: November 25, 2014Assignee: Dell Products L.P.Inventors: Charles D. Robison, Richard W. Schuckle, Rocco Ancona
-
Patent number: 8880884Abstract: An information handling system includes a memory and a processor to execute instructions stored in the memory, which causes the processor to at least: send identification information to a second information handling system in response to an identification request broadcast from the second information handling system via a short-range communication; receive first authentication information for a local application and a remote service from the second information handling system; receive a copy of the local application; authenticate a user for the copy of the local application and for the remote service prior to the user logging on to the information handling system; receive second authentication information from the user to access the information handling system; authenticate the user to the information handling system; and automatically initiate a secure session between the copy of the local application and the remote service when the user is authenticated to the information handling system.Type: GrantFiled: July 15, 2013Date of Patent: November 4, 2014Assignee: Dell Products, LPInventors: Philip M. Seibert, Abu Sanaullah, Charles D. Robison, Jr., Claude L. Cox, Jason A. Shepherd
-
Publication number: 20140263623Abstract: Unauthorized copying of a transaction barcode is prevented by including a sensed condition or other publicly-accessible data with the transaction barcode for use as a comparison with the publicly accessible data determined at a barcode reader. If the sensed condition included in the transaction barcode indicates that the transaction barcode was generated for a different transaction, then the barcode reader invalidates the transaction. For instance, if the barcode was generated too distant in time, position, or sequential transactions, then the barcode reader invalidates the transaction barcode as an unauthorized copy of a transaction barcode generated for a different transaction.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Inventors: Charles D. Robison, Richard W. Schuckle, Rocco Ancona
-
Publication number: 20140237228Abstract: A method includes storing creating a smart card with an expiration date and renewing the smart card after the expiration date. The smart card may be created with data stored upon the smart card for use in the renewal process. The data may comprise a certificate. The smart card may be issued at the information technology department of an organization and may be renewed at a user workstation of the organization. The renewal process may include a renewal environment for authenticating the holder of the smart card. The card holder may be required to provide a personal identification number in order to enter into the renewal environment. The rights conferred by the renewed smart card may be more limited than the rights conferred by the original smart card, both in duration and access to data within the organization.Type: ApplicationFiled: February 21, 2013Publication date: August 21, 2014Applicant: DELL PRODUCTS, LPInventors: Charles D. Robison, Daniel L. Hamlin
-
Patent number: 8812857Abstract: A method includes storing creating a smart card with an expiration date and renewing the smart card after the expiration date. The smart card may be created with data stored upon the smart card for use in the renewal process. The data may comprise a certificate. The smart card may be issued at the information technology department of an organization and may be renewed at a user workstation of the organization. The renewal process may include a renewal environment for authenticating the holder of the smart card. The card holder may be required to provide a personal identification number in order to enter into the renewal environment. The rights conferred by the renewed smart card may be more limited than the rights conferred by the original smart card, both in duration and access to data within the organization.Type: GrantFiled: February 21, 2013Date of Patent: August 19, 2014Assignee: Dell Products, LPInventors: Charles D. Robison, Daniel L. Hamlin
-
Publication number: 20140208417Abstract: In accordance with embodiments of the present disclosure, an information handling system may include a user interface and a processor communicatively coupled to the user interface. The user interface may comprise a touch sensor configured to detect biometric fingerprint data of a human interacting within a user-interactive area of the user interface. The processor may be configured to receive biometric fingerprint data from the user interface inputted via the user interface during the human's natural interaction with the user interface. The processor may be further configured to determine if the biometric fingerprint data is that of an authorized user of the information handling system. The processor may also be configured to restrict access to the information handling system in response to determining that the biometric fingerprint data is not that of an authorized user of the information handling system.Type: ApplicationFiled: January 23, 2013Publication date: July 24, 2014Applicant: DELL PRODUCTS L.P.Inventor: Charles D. Robison
-
Publication number: 20140208383Abstract: A method may also include receiving from each of one or more of potential peer information handling systems a connection request comprising a peer minimum acceptable security level for the peer information handling system. The method may additionally include comparing the peer minimum acceptable security level to a security level of the information handling system. The method may further include completing a peer-to-peer connection between the information handling system and the peer information handling system if the minimum acceptable security level is not higher than that of the security level of the information handling system.Type: ApplicationFiled: January 22, 2013Publication date: July 24, 2014Applicant: DELL PRODUCTS L.P.Inventors: Douglas M. Anson, Carlton A. Andrews, Charles D. Robison, David Konetski, Frank H. Molsberry, Yuan-Chang Lo
-
Publication number: 20140208090Abstract: In accordance embodiments of the present disclosure, a method may include, during execution of an operating system on an information handling system and responsive to a user input indicating a desire to invoke a basic input/output system (BIOS) setup program for configuring a BIOS, prompting for and receiving user-provided credentials via a user interface communicatively coupled to the processor. The method may also include, during execution of the operating system, passing BIOS credentials to the BIOS based on the user-provided credentials. The method may additionally include, during execution of the operating system determining, by the BIOS, if the BIOS credentials are valid. The method may further include, responsive to determining that the BIOS credentials are valid, setting a flag to a value indicating that the BIOS setup program is to be invoked on a subsequent boot of the information handling system.Type: ApplicationFiled: January 22, 2013Publication date: July 24, 2014Applicant: DELL PRODUCTS L.P.Inventors: Douglas M. Anson, Charles D. Robison, David Konetski, Frank H. Molsberry, Anand Joshi
-
Publication number: 20140171048Abstract: A method for establishing a connection to a sequence-accessible call includes gathering connection data for establishing the connection to the sequence-accessible call including a phone number dialed to access the sequence-accessible call. The method may also include storing the connection data in a database, determining a presence of a proximity link, and transmitting the connection data to an information handling system.Type: ApplicationFiled: December 19, 2012Publication date: June 19, 2014Applicant: DELL PRODUCTS, LPInventors: Abu Shaher Sanaullah, Claude Lano Cox, Charles D. Robison, Philip M. Seibert, Jason A. Shepherd
-
Publication number: 20130305350Abstract: An information handling system includes a memory and a processor to execute instructions stored in the memory, which causes the processor to at least: send identification information to a second information handling system in response to an identification request broadcast from the second information handling system via a short-range communication; receive first authentication information for a local application and a remote service from the second information handling system; receive a copy of the local application; authenticate a user for the copy of the local application and for the remote service prior to the user logging on to the information handling system; receive second authentication information from the user to access the information handling system; authenticate the user to the information handling system; and automatically initiate a secure session between the copy of the local application and the remote service when the user is authenticated to the information handling system.Type: ApplicationFiled: July 15, 2013Publication date: November 14, 2013Inventors: Philip M. Seibert, Abu Sanaullah, Charles D. Robison, JR., Claude L. Cox, Jason A. Shepherd
-
Patent number: 8527763Abstract: An information handling system includes a memory and a processor to execute instructions stored in the memory, which causes the processor to at least: send identification information to a second information handling system in response to an identification request broadcast from the second information handling system via a short-range communication; receive first authentication information for a local application and a remote service from the second information handling system; receive a copy of the local application; authenticate a user for the copy of the local application and for the remote service prior to the user logging on to the information handling system; receive second authentication information from the user to access the information handling system; authenticate the user to the information handling system; and automatically initiate a secure session between the copy of the local application and the remote service when the user is authenticated to the information handling system.Type: GrantFiled: January 16, 2012Date of Patent: September 3, 2013Assignee: Dell Products, LPInventors: Philip M. Seibert, Abu Sanaullah, Charles D. Robison, Jr., Claude L. Cox, Jason A. Shepherd
-
Publication number: 20130185558Abstract: An information handling system includes a memory and a processor to execute instructions stored in the memory, which causes the processor to at least: send identification information to a second information handling system in response to an identification request broadcast from the second information handling system via a short-range communication; receive first authentication information for a local application and a remote service from the second information handling system; receive a copy of the local application; authenticate a user for the copy of the local application and for the remote service prior to the user logging on to the information handling system; receive second authentication information from the user to access the information handling system; authenticate the user to the information handling system; and automatically initiate a secure session between the copy of the local application and the remote service when the user is authenticated to the information handling system.Type: ApplicationFiled: January 16, 2012Publication date: July 18, 2013Applicant: DELL PRODUCTS, LPInventors: Philip M. Seibert, Abu Sanaullah, Charles D. Robison, JR., Claude L. Cox, Jason A. Shepherd
-
Patent number: 4033455Abstract: A container for storage and transportation on end of several rolls of plastic sheet or film, said container having three sides, and at least one end with a plurality of openings therein adapted for an end of each roll to be anchored in each one.Type: GrantFiled: September 27, 1976Date of Patent: July 5, 1977Inventor: Charles D. Robison