Patents by Inventor Chris Edward Pepper

Chris Edward Pepper has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240118966
    Abstract: A data processing system comprising a processor having a working memory and processing logic, a boot system configured to load one or more algorithms for initializing a basic input output system (BIOS) of the processor into the working memory and an error correction system configured to start a watchdog timer and to monitor initialization of the processor, the error correction system further configured to implement a corrective process if the watchdog timer times out prior to initialization of the BIOS of the processor.
    Type: Application
    Filed: October 5, 2022
    Publication date: April 11, 2024
    Applicant: DELL PRODUCTS L.P.
    Inventors: Ibrahim Sayyed, Chris Edward Pepper, Christopher Channing Griffin, Elmira M. Bonab, Purushothama R. Malluru
  • Patent number: 11921859
    Abstract: Methods, systems, and devices for transitioning an information handling system (IHS) to a predetermined operating state is disclosed. During the transition, the IHS may obtain data from a variety of sources which may subject it to compromise. To reduce the likelihood that the IHS is compromised, the IHS may evaluate its environment and its own operation to determine its security state. Depending on its security state, the IHS may perform various actions to reduce the likelihood of it being compromised through its transition process.
    Type: Grant
    Filed: November 4, 2021
    Date of Patent: March 5, 2024
    Assignee: Dell Products L.P.
    Inventors: Ibrahim Sayyed, Christopher Channing Griffin, Purushothama Rao Malluru, Chris Edward Pepper
  • Patent number: 11757648
    Abstract: Methods and systems for managing the operation of data processing systems are disclosed. A data processing system may include a computing device that may enter various operating states by performing various types of startups. Performance of some startups may be restricted by use of passwords or other security information. The data processing systems may host management controllers that may bypass the restrictions on the startups. Prior to doing so, the management controllers may verify that the requests to perform the startups are from trusted entities, or should be performed for other reasons.
    Type: Grant
    Filed: February 9, 2022
    Date of Patent: September 12, 2023
    Assignee: Dell Products L.P.
    Inventors: Christopher Channing Griffin, Adolfo Sandor Montero, Chris Edward Pepper, Purushothama Rao Malluru, Ibrahim Sayyed
  • Publication number: 20230254151
    Abstract: Methods and systems for managing the operation of data processing systems are disclosed. A data processing system may include a computing device that may enter various operating states by performing various types of startups. Performance of some startups may be restricted by use of passwords or other security information. The data processing systems may host management controllers that may bypass the restrictions on the startups. Prior to doing so, the management controllers may verify that the requests to perform the startups are from trusted entities, or should be performed for other reasons.
    Type: Application
    Filed: February 9, 2022
    Publication date: August 10, 2023
    Inventors: Christopher Channing GRIFFIN, Adolfo Sandor MONTERO, Chris Edward PEPPER, Purushothama Rao MALLURU, Ibrahim Sayyed
  • Publication number: 20230139943
    Abstract: Methods, systems, and devices for transitioning an information handling system (IHS) to a predetermined operating state is disclosed. During the transition, the IHS may obtain data from a variety of sources which may subject it to compromise. To reduce the likelihood that the IHS is compromised, the IHS may evaluate its environment and its own operation to determine its security state. Depending on its security state, the IHS may perform various actions to reduce the likelihood of it being compromised through its transition process.
    Type: Application
    Filed: November 4, 2021
    Publication date: May 4, 2023
    Inventors: IBRAHIM SAYYED, CHRISTOPHER CHANNING GRIFFIN, PURUSHOTHAMA Rao Malluru, CHRIS EDWARD PEPPER
  • Patent number: 11086612
    Abstract: An information handling system may include at least one processor, an information handling resource including a firmware, and a memory having an initial identifier stored therein. The information handling system may receive a first firmware update package specifying the initial identifier, wherein the first firmware update package includes therein an intermediate identifier different from the initial identifier; based on the first firmware update package specifying the initial identifier, update the firmware with contents of the first firmware update package, and update the initial identifier in the memory with the intermediate identifier; receive a second firmware update package specifying the intermediate identifier; and based on the second firmware update package specifying the intermediate identifier, update the firmware with contents of the second firmware update package.
    Type: Grant
    Filed: August 14, 2019
    Date of Patent: August 10, 2021
    Assignee: Dell Products L.P.
    Inventors: Balasingh Ponraj Samuel, Anand Prakash Joshi, Zhao Hui Yu, Chris Edward Pepper
  • Publication number: 20210048997
    Abstract: An information handling system may include at least one processor, an information handling resource including a firmware, and a memory having an initial identifier stored therein. The information handling system may receive a first firmware update package specifying the initial identifier, wherein the first firmware update package includes therein an intermediate identifier different from the initial identifier; based on the first firmware update package specifying the initial identifier, update the firmware with contents of the first firmware update package, and update the initial identifier in the memory with the intermediate identifier; receive a second firmware update package specifying the intermediate identifier; and based on the second firmware update package specifying the intermediate identifier, update the firmware with contents of the second firmware update package.
    Type: Application
    Filed: August 14, 2019
    Publication date: February 18, 2021
    Applicant: Dell Products L.P.
    Inventors: Balasingh Ponraj SAMUEL, Anand Prakash JOSHI, Zhao Hui YU, Chris Edward PEPPER
  • Patent number: 10693664
    Abstract: Systems and methods to build a trusted HTTPS session on a limited pre-boot BIOS environment in an information handling system. The information handling system may include a BIOS that may be stored in a secure read-only region of a flash storage. The BIOS may download signed certification authority (CA) information from a server based on a target location that may be stored at the secure read-only region. The BIOS may authenticate the signed CA information based on a public key that may be stored at the secure read-only region. The BIOS may, when the signed CA information is authenticated, download a root CA chain from the server and authenticate the root CA chain. The BIOS may, when the root CA chain is authenticated, establish a secure encrypted transport layer security (TLS) session with the server based the root CA chain.
    Type: Grant
    Filed: July 20, 2018
    Date of Patent: June 23, 2020
    Assignee: Dell Products L.P.
    Inventors: Purushothama R. Malluru, Christopher Channing Griffin, Chris Edward Pepper, Ibrahim Sayyed, Alok Pant
  • Publication number: 20200028696
    Abstract: Systems and methods to build a trusted HTTPS session on a limited pre-boot BIOS environment in an information handling system. The information handling system may include a BIOS that may be stored in a secure read-only region of a flash storage. The BIOS may download signed certification authority (CA) information from a server based on a target location that may be stored at the secure read-only region. The BIOS may authenticate the signed CA information based on a public key that may be stored at the secure read-only region. The BIOS may, when the signed CA information is authenticated, download a root CA chain from the server and authenticate the root CA chain. The BIOS may, when the root CA chain is authenticated, establish a secure encrypted transport layer security (TLS) session with the server based the root CA chain.
    Type: Application
    Filed: July 20, 2018
    Publication date: January 23, 2020
    Inventors: Purushothama R. Malluru, Christopher Channing Griffin, Chris Edward Pepper, Ibrahim Sayyed, Alok Pant