Patents by Inventor Charles Robison
Charles Robison has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10148669Abstract: An encryption key management system includes an encryption IHS that is coupled to a network. The encryption key management system also includes a host processing system. An off-host processing system in the encryption key management system is coupled to the host processing system and is coupled to the encryption IHS through the network. The off-host processing system provides an encryption key request to the encryption IHS through the network, receives an encryption key from the encryption IHS through the network and stores the encryption key, provides the encryption key to the host processing system in response to authenticating a user, and revokes the encryption key in response to a revocation instruction received from the encryption IHS through the network. The providing the request, and the receiving, providing, and revoking the encryption key may be performed by the off-host processing system while the host-processing system is not in an operating mode.Type: GrantFiled: May 7, 2014Date of Patent: December 4, 2018Assignee: Dell Products, L.P.Inventors: Charles Robison, Daniel Hamlin
-
Patent number: 9667602Abstract: An off-host authentication system includes an authentication information handling system (IHS) that is coupled to a network. The off-host authentication system also includes a host processing system. An off-host processing system in the off-host authentication system is coupled to the host processing system and is coupled to the authentication IHS through the network. The off-host processing system provides an encrypted primary authentication item to the authentication IHS through the network. The off-host processing system then receives an encrypted secondary authentication token from the authentication IHS through the network. The off-host processing system then decrypts the encrypted secondary authentication token to produce a decrypted secondary authentication token and uses the decrypted secondary authentication token to retrieve a tertiary authentication token.Type: GrantFiled: January 12, 2016Date of Patent: May 30, 2017Assignee: Dell Products L.P.Inventors: Daniel Hamlin, Charles Robison
-
Patent number: 9577994Abstract: An off-host authentication system includes a network. An off-host processing system is coupled to the network and sends an encrypted authentication item through the network in response to validating a user. An authentication information handling system (IHS) is coupled to the network and receives the encrypted authentication item from the off-host processing system through the network, decrypts the encrypted authentication item to produce a decrypted authentication item, validates the decrypted authentication item, and sends an approval message through the network. A directory system is coupled to the network and receives the approval message through the network and, in response, sends a user approval through the network. A host processing system, which is located in a user IHS that includes the off-host processing system and which is coupled to the network, logs a user into the user IHS in response to receiving the user approval through the network.Type: GrantFiled: January 27, 2016Date of Patent: February 21, 2017Assignee: Dell Products L.P.Inventors: Charles Robison, Daniel Hamlin
-
Publication number: 20160142385Abstract: An off-host authentication system includes a network. An off-host processing system is coupled to the network and sends an encrypted authentication item through the network in response to validating a user. An authentication information handling system (IHS) is coupled to the network and receives the encrypted authentication item from the off-host processing system through the network, decrypts the encrypted authentication item to produce a decrypted authentication item, validates the decrypted authentication item, and sends an approval message through the network. A directory system is coupled to the network and receives the approval message through the network and, in response, sends a user approval through the network. A host processing system, which is located in a user IHS that includes the off-host processing system and which is coupled to the network, logs a user into the user IHS in response to receiving the user approval through the network.Type: ApplicationFiled: January 27, 2016Publication date: May 19, 2016Inventors: Charles Robison, Daniel Daniel
-
Publication number: 20160127332Abstract: An off-host authentication system includes an authentication information handling system (IHS) that is coupled to a network. The off-host authentication system also includes a host processing system. An off-host processing system in the off-host authentication system is coupled to the host processing system and is coupled to the authentication IHS through the network. The off-host processing system provides an encrypted primary authentication item to the authentication IHS through the network. The off-host processing system then receives an encrypted secondary authentication token from the authentication IHS through the network. The off-host processing system then decrypts the encrypted secondary authentication token to produce a decrypted secondary authentication token and uses the decrypted secondary authentication token to retrieve a tertiary authentication token.Type: ApplicationFiled: January 12, 2016Publication date: May 5, 2016Inventors: Daniel Hamlin, Charles Robison
-
Publication number: 20160119150Abstract: An encryption key management system includes an encryption IHS that is coupled to a network. The encryption key management system also includes a host processing system. An off-host processing system in the encryption key management system is coupled to the host processing system and is coupled to the encryption IHS through the network. The off-host processing system provides an encryption key request to the encryption IHS through the network, receives an encryption key from the encryption IHS through the network and stores the encryption key, provides the encryption key to the host processing system in response to authenticating a user, and revokes the encryption key in response to a revocation instruction received from the encryption IHS through the network. The providing the request, and the receiving, providing, and revoking the encryption key may be performed by the off-host processing system while the host-processing system is not in an operating mode.Type: ApplicationFiled: May 7, 2014Publication date: April 28, 2016Inventors: Charles Robison, Daniel Hamlin
-
Patent number: 9300664Abstract: An off-host authentication system includes a network. An off-host processing system is coupled to the network and sends an encrypted authentication item through the network in response to validating a user. An authentication information handling system (IHS) is coupled to the network and receives the encrypted authentication item from the off-host processing system through the network, decrypts the encrypted authentication item to produce a decrypted authentication item, validates the decrypted authentication item, and sends an approval message through the network. A directory system is coupled to the network and receives the approval message through the network and, in response, sends a user approval through the network. A host processing system, which is located in a user IHS that includes the off-host processing system and which is coupled to the network, logs a user into the user IHS in response to receiving the user approval through the network.Type: GrantFiled: May 2, 2014Date of Patent: March 29, 2016Assignee: Dell Products L.P.Inventors: Charles Robison, Daniel Hamlin
-
Patent number: 9240887Abstract: An off-host authentication system includes an authentication information handling system (IHS) that is coupled to a network. The off-host authentication system also includes a host processing system. An off-host processing system in the off-host authentication system is coupled to the host processing system and is coupled to the authentication IHS through the network. The off-host processing system provides an encrypted primary authentication item to the authentication IHS through the network. The off-host processing system then receives an encrypted secondary authentication token from the authentication IHS through the network. The off-host processing system then decrypts the encrypted secondary authentication token to produce a decrypted secondary authentication token and uses the decrypted secondary authentication token to retrieve a tertiary authentication token.Type: GrantFiled: May 2, 2014Date of Patent: January 19, 2016Assignee: Dell Products L.P.Inventors: Daniel Hamlin, Charles Robison
-
Publication number: 20150319171Abstract: An off-host authentication system includes a network. An off-host processing system is coupled to the network and sends an encrypted authentication item through the network in response to validating a user. An authentication information handling system (IHS) is coupled to the network and receives the encrypted authentication item from the off-host processing system through the network, decrypts the encrypted authentication item to produce a decrypted authentication item, validates the decrypted authentication item, and sends an approval message through the network. A directory system is coupled to the network and receives the approval message through the network and, in response, sends a user approval through the network. A host processing system, which is located in a user IHS that includes the off-host processing system and which is coupled to the network, logs a user into the user IHS in response to receiving the user approval through the network.Type: ApplicationFiled: May 2, 2014Publication date: November 5, 2015Applicant: Dell Products L.P.Inventors: Charles Robison, Daniel Hamlin
-
Publication number: 20150318993Abstract: An off-host authentication system includes an authentication information handling system (IHS) that is coupled to a network. The off-host authentication system also includes a host processing system. An off-host processing system in the off-host authentication system is coupled to the host processing system and is coupled to the authentication IHS through the network. The off-host processing system provides an encrypted primary authentication item to the authentication IHS through the network. The off-host processing system then receives an encrypted secondary authentication token from the authentication IHS through the network. The off-host processing system then decrypts the encrypted secondary authentication token to produce a decrypted secondary authentication token and uses the decrypted secondary authentication token to retrieve a tertiary authentication token.Type: ApplicationFiled: May 2, 2014Publication date: November 5, 2015Inventors: Daniel Hamlin, Charles Robison
-
Patent number: 8922993Abstract: A power adapter security system includes a power adapter base. An object securing element is located on the power adapter base. The object securing element is operable to secure the power adapter base to an object. A power cable extends from the power adapter base. A power connector is located on the power cable and operable to transmit power from the power adapter base. A security connector is located on the power cable and is operable to lock the power cable to an IHS chassis. The object securing element may be used to secure the power adapter to an object and each of the power connector and security connector may be coupled to an IHS chassis to provide power to the IHS chassis and secure the IHS chassis to the object.Type: GrantFiled: April 15, 2011Date of Patent: December 30, 2014Assignee: Dell Products L.P.Inventors: Philip Seibert, Charles Robison
-
Publication number: 20120262860Abstract: A power adapter security system includes a power adapter base. An object securing element is located on the power adapter base. The object securing element is operable to secure the power adapter base to an object. A power cable extends from the power adapter base. A power connector is located on the power cable and operable to transmit power from the power adapter base. A security connector is located on the power cable and is operable to lock the power cable to an IHS chassis. The object securing element may be used to secure the power adapter to an object and each of the power connector and security connector may be coupled to an IHS chassis to provide power to the IHS chassis and secure the IHS chassis to the object.Type: ApplicationFiled: April 15, 2011Publication date: October 18, 2012Applicant: DELL PRODUCTS L.P.Inventors: Philip Seibert, Charles Robison
-
Publication number: 20090251406Abstract: An information handling system has a chassis and a lid, the lid rotating between a closed position and a tablet position. An indicator coupled to the lid, such as a magnet, aligns with a first detector coupled to a chassis of the information handling system, such as a Hall effect detector, in the tablet position so that the detector signals to a position detector module to disable a keyboard of the information handling system. The indicator aligns with a second detector coupled to the chassis in a closed configuration so that the second detector signals to the position detector module to enter a power down state.Type: ApplicationFiled: April 2, 2008Publication date: October 8, 2009Inventors: Philip Seibert, Marie Chagny, Kyle David Spiess, Charles Robison, Angela Stern, Yin-Cheung Ma, John Lerma