Patents by Inventor Charles Robison

Charles Robison has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10148669
    Abstract: An encryption key management system includes an encryption IHS that is coupled to a network. The encryption key management system also includes a host processing system. An off-host processing system in the encryption key management system is coupled to the host processing system and is coupled to the encryption IHS through the network. The off-host processing system provides an encryption key request to the encryption IHS through the network, receives an encryption key from the encryption IHS through the network and stores the encryption key, provides the encryption key to the host processing system in response to authenticating a user, and revokes the encryption key in response to a revocation instruction received from the encryption IHS through the network. The providing the request, and the receiving, providing, and revoking the encryption key may be performed by the off-host processing system while the host-processing system is not in an operating mode.
    Type: Grant
    Filed: May 7, 2014
    Date of Patent: December 4, 2018
    Assignee: Dell Products, L.P.
    Inventors: Charles Robison, Daniel Hamlin
  • Patent number: 9667602
    Abstract: An off-host authentication system includes an authentication information handling system (IHS) that is coupled to a network. The off-host authentication system also includes a host processing system. An off-host processing system in the off-host authentication system is coupled to the host processing system and is coupled to the authentication IHS through the network. The off-host processing system provides an encrypted primary authentication item to the authentication IHS through the network. The off-host processing system then receives an encrypted secondary authentication token from the authentication IHS through the network. The off-host processing system then decrypts the encrypted secondary authentication token to produce a decrypted secondary authentication token and uses the decrypted secondary authentication token to retrieve a tertiary authentication token.
    Type: Grant
    Filed: January 12, 2016
    Date of Patent: May 30, 2017
    Assignee: Dell Products L.P.
    Inventors: Daniel Hamlin, Charles Robison
  • Patent number: 9577994
    Abstract: An off-host authentication system includes a network. An off-host processing system is coupled to the network and sends an encrypted authentication item through the network in response to validating a user. An authentication information handling system (IHS) is coupled to the network and receives the encrypted authentication item from the off-host processing system through the network, decrypts the encrypted authentication item to produce a decrypted authentication item, validates the decrypted authentication item, and sends an approval message through the network. A directory system is coupled to the network and receives the approval message through the network and, in response, sends a user approval through the network. A host processing system, which is located in a user IHS that includes the off-host processing system and which is coupled to the network, logs a user into the user IHS in response to receiving the user approval through the network.
    Type: Grant
    Filed: January 27, 2016
    Date of Patent: February 21, 2017
    Assignee: Dell Products L.P.
    Inventors: Charles Robison, Daniel Hamlin
  • Publication number: 20160142385
    Abstract: An off-host authentication system includes a network. An off-host processing system is coupled to the network and sends an encrypted authentication item through the network in response to validating a user. An authentication information handling system (IHS) is coupled to the network and receives the encrypted authentication item from the off-host processing system through the network, decrypts the encrypted authentication item to produce a decrypted authentication item, validates the decrypted authentication item, and sends an approval message through the network. A directory system is coupled to the network and receives the approval message through the network and, in response, sends a user approval through the network. A host processing system, which is located in a user IHS that includes the off-host processing system and which is coupled to the network, logs a user into the user IHS in response to receiving the user approval through the network.
    Type: Application
    Filed: January 27, 2016
    Publication date: May 19, 2016
    Inventors: Charles Robison, Daniel Daniel
  • Publication number: 20160127332
    Abstract: An off-host authentication system includes an authentication information handling system (IHS) that is coupled to a network. The off-host authentication system also includes a host processing system. An off-host processing system in the off-host authentication system is coupled to the host processing system and is coupled to the authentication IHS through the network. The off-host processing system provides an encrypted primary authentication item to the authentication IHS through the network. The off-host processing system then receives an encrypted secondary authentication token from the authentication IHS through the network. The off-host processing system then decrypts the encrypted secondary authentication token to produce a decrypted secondary authentication token and uses the decrypted secondary authentication token to retrieve a tertiary authentication token.
    Type: Application
    Filed: January 12, 2016
    Publication date: May 5, 2016
    Inventors: Daniel Hamlin, Charles Robison
  • Publication number: 20160119150
    Abstract: An encryption key management system includes an encryption IHS that is coupled to a network. The encryption key management system also includes a host processing system. An off-host processing system in the encryption key management system is coupled to the host processing system and is coupled to the encryption IHS through the network. The off-host processing system provides an encryption key request to the encryption IHS through the network, receives an encryption key from the encryption IHS through the network and stores the encryption key, provides the encryption key to the host processing system in response to authenticating a user, and revokes the encryption key in response to a revocation instruction received from the encryption IHS through the network. The providing the request, and the receiving, providing, and revoking the encryption key may be performed by the off-host processing system while the host-processing system is not in an operating mode.
    Type: Application
    Filed: May 7, 2014
    Publication date: April 28, 2016
    Inventors: Charles Robison, Daniel Hamlin
  • Patent number: 9300664
    Abstract: An off-host authentication system includes a network. An off-host processing system is coupled to the network and sends an encrypted authentication item through the network in response to validating a user. An authentication information handling system (IHS) is coupled to the network and receives the encrypted authentication item from the off-host processing system through the network, decrypts the encrypted authentication item to produce a decrypted authentication item, validates the decrypted authentication item, and sends an approval message through the network. A directory system is coupled to the network and receives the approval message through the network and, in response, sends a user approval through the network. A host processing system, which is located in a user IHS that includes the off-host processing system and which is coupled to the network, logs a user into the user IHS in response to receiving the user approval through the network.
    Type: Grant
    Filed: May 2, 2014
    Date of Patent: March 29, 2016
    Assignee: Dell Products L.P.
    Inventors: Charles Robison, Daniel Hamlin
  • Patent number: 9240887
    Abstract: An off-host authentication system includes an authentication information handling system (IHS) that is coupled to a network. The off-host authentication system also includes a host processing system. An off-host processing system in the off-host authentication system is coupled to the host processing system and is coupled to the authentication IHS through the network. The off-host processing system provides an encrypted primary authentication item to the authentication IHS through the network. The off-host processing system then receives an encrypted secondary authentication token from the authentication IHS through the network. The off-host processing system then decrypts the encrypted secondary authentication token to produce a decrypted secondary authentication token and uses the decrypted secondary authentication token to retrieve a tertiary authentication token.
    Type: Grant
    Filed: May 2, 2014
    Date of Patent: January 19, 2016
    Assignee: Dell Products L.P.
    Inventors: Daniel Hamlin, Charles Robison
  • Publication number: 20150319171
    Abstract: An off-host authentication system includes a network. An off-host processing system is coupled to the network and sends an encrypted authentication item through the network in response to validating a user. An authentication information handling system (IHS) is coupled to the network and receives the encrypted authentication item from the off-host processing system through the network, decrypts the encrypted authentication item to produce a decrypted authentication item, validates the decrypted authentication item, and sends an approval message through the network. A directory system is coupled to the network and receives the approval message through the network and, in response, sends a user approval through the network. A host processing system, which is located in a user IHS that includes the off-host processing system and which is coupled to the network, logs a user into the user IHS in response to receiving the user approval through the network.
    Type: Application
    Filed: May 2, 2014
    Publication date: November 5, 2015
    Applicant: Dell Products L.P.
    Inventors: Charles Robison, Daniel Hamlin
  • Publication number: 20150318993
    Abstract: An off-host authentication system includes an authentication information handling system (IHS) that is coupled to a network. The off-host authentication system also includes a host processing system. An off-host processing system in the off-host authentication system is coupled to the host processing system and is coupled to the authentication IHS through the network. The off-host processing system provides an encrypted primary authentication item to the authentication IHS through the network. The off-host processing system then receives an encrypted secondary authentication token from the authentication IHS through the network. The off-host processing system then decrypts the encrypted secondary authentication token to produce a decrypted secondary authentication token and uses the decrypted secondary authentication token to retrieve a tertiary authentication token.
    Type: Application
    Filed: May 2, 2014
    Publication date: November 5, 2015
    Inventors: Daniel Hamlin, Charles Robison
  • Patent number: 8922993
    Abstract: A power adapter security system includes a power adapter base. An object securing element is located on the power adapter base. The object securing element is operable to secure the power adapter base to an object. A power cable extends from the power adapter base. A power connector is located on the power cable and operable to transmit power from the power adapter base. A security connector is located on the power cable and is operable to lock the power cable to an IHS chassis. The object securing element may be used to secure the power adapter to an object and each of the power connector and security connector may be coupled to an IHS chassis to provide power to the IHS chassis and secure the IHS chassis to the object.
    Type: Grant
    Filed: April 15, 2011
    Date of Patent: December 30, 2014
    Assignee: Dell Products L.P.
    Inventors: Philip Seibert, Charles Robison
  • Publication number: 20120262860
    Abstract: A power adapter security system includes a power adapter base. An object securing element is located on the power adapter base. The object securing element is operable to secure the power adapter base to an object. A power cable extends from the power adapter base. A power connector is located on the power cable and operable to transmit power from the power adapter base. A security connector is located on the power cable and is operable to lock the power cable to an IHS chassis. The object securing element may be used to secure the power adapter to an object and each of the power connector and security connector may be coupled to an IHS chassis to provide power to the IHS chassis and secure the IHS chassis to the object.
    Type: Application
    Filed: April 15, 2011
    Publication date: October 18, 2012
    Applicant: DELL PRODUCTS L.P.
    Inventors: Philip Seibert, Charles Robison
  • Publication number: 20090251406
    Abstract: An information handling system has a chassis and a lid, the lid rotating between a closed position and a tablet position. An indicator coupled to the lid, such as a magnet, aligns with a first detector coupled to a chassis of the information handling system, such as a Hall effect detector, in the tablet position so that the detector signals to a position detector module to disable a keyboard of the information handling system. The indicator aligns with a second detector coupled to the chassis in a closed configuration so that the second detector signals to the position detector module to enter a power down state.
    Type: Application
    Filed: April 2, 2008
    Publication date: October 8, 2009
    Inventors: Philip Seibert, Marie Chagny, Kyle David Spiess, Charles Robison, Angela Stern, Yin-Cheung Ma, John Lerma