Patents by Inventor Christine Nelson

Christine Nelson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11971519
    Abstract: A display article is described herein that includes: a substrate comprising a thickness and a primary surface; a textured surface region; and an antireflective coating disposed on the textured surface region. The textured surface region comprises structural features and an average texture height (Rtext) from 50 nm to 300 nm. The substrate exhibits a sparkle of less than 5%, as measured by PPD140, and a transmittance haze of less than 40%, at a 0° incident angle. The antireflective coating comprises alternating high refractive index and low refractive index layers. Each of the low index layers comprises a refractive index of less than or equal to 1.8, and each of the high index layers comprises a refractive index of greater than 1.8. The article also exhibits a first-surface average photopic specular reflectance (% R) of less than 0.3% at any incident angle from about 5° to 20° from normal at visible wavelengths.
    Type: Grant
    Filed: July 8, 2021
    Date of Patent: April 30, 2024
    Assignee: CORNING INCORPORATED
    Inventors: Shandon Dee Hart, Karl William Koch, III, Carlo Anthony Kosik Williams, Lin Lin, Cameron Robert Nelson, James Joseph Price, Jayantha Senawiratne, Florence Christine Monique Verrier, David Lee Weidman
  • Publication number: 20230401316
    Abstract: A virtual BIOS engine may be configured to, during runtime of an operating system, in response to an operating system event for updating firmware, load onto an isolated compute domain of the processor to emulate firmware update processes of a non-transitory computer-readable media with a virtual non-transitory computer-readable media and emulate the firmware update processes of the cryptoprocessor with a virtual cryptoprocessor, extract a firmware payload to the virtual non-transitory computer-readable media, and execute a virtual trust chain to measure the firmware payload in the virtual non-transitory computer-readable media.
    Type: Application
    Filed: June 10, 2022
    Publication date: December 14, 2023
    Applicant: Dell Products L.P.
    Inventors: Shekar Babu SURYANARAYANA, Anand Prakash JOSHI, Amy Christine NELSON, Nicholas D. GROBELNY
  • Patent number: 11748502
    Abstract: In one or more embodiments, a first information handling system (IHS) may: encrypt a document utilizing a symmetric encryption key to produce an encrypted document; and encrypt a metadata file, which includes the symmetric encryption key, utilizing a session encryption key to produce a first encrypted metadata file. In one or more embodiments, a second IHS may: decrypt the first encrypted metadata file utilizing the session encryption key to produce the metadata file; and encrypt the metadata file utilizing a public encryption key associated with a second TPM associated with a third IHS to produce a second encrypted metadata file. In one or more embodiments, the third information handling system may: decrypt the second encrypted metadata file utilizing a private encryption key associated with the second TPM to produce the metadata file; and decrypt the encrypted document utilizing the symmetric encryption key, from the metadata file, to produce the document.
    Type: Grant
    Filed: June 10, 2021
    Date of Patent: September 5, 2023
    Assignee: Dell Products L.P.
    Inventors: Amy Christine Nelson, Chooi Peng Low
  • Publication number: 20220407714
    Abstract: In one or more embodiments, a first information handling system may: receive a chained cryptographic hash value determined by a trusted platform module (TPM) of a second information handling system; receive multiple patch identities associated with multiple updated firmware installed on multiple components of the second information handling system; receive an event log associated with output of the TPM as the TPM determined the chained cryptographic hash value; retrieve multiple layered endorsements respectively associated with the multiple patch identities; determine multiple hash values from multiple signatures stored in the multiple layered endorsements; compare the chained cryptographic hash value with the event log; compare multiple event information with the multiple hash values; and determine that the second information handling system has booted into a trusted state based at least on comparing the chained cryptographic hash value with the event log and comparing the multiple event information with the
    Type: Application
    Filed: June 18, 2021
    Publication date: December 22, 2022
    Inventors: Nicholas DiCiurcio Grobelny, Amy Christine Nelson
  • Publication number: 20220398332
    Abstract: In one or more embodiments, a first information handling system (IHS) may: encrypt a document utilizing a symmetric encryption key to produce an encrypted document; and encrypt a metadata file, which includes the symmetric encryption key, utilizing a session encryption key to produce a first encrypted metadata file. In one or more embodiments, a second IHS may: decrypt the first encrypted metadata file utilizing the session encryption key to produce the metadata file; and encrypt the metadata file utilizing a public encryption key associated with a second TPM associated with a third IHS to produce a second encrypted metadata file. In one or more embodiments, the third information handling system may: decrypt the second encrypted metadata file utilizing a private encryption key associated with the second TPM to produce the metadata file; and decrypt the encrypted document utilizing the symmetric encryption key, from the metadata file, to produce the document.
    Type: Application
    Filed: June 10, 2021
    Publication date: December 15, 2022
    Inventors: Amy Christine Nelson, Chooi Peng Low
  • Publication number: 20220383333
    Abstract: In one or more embodiments, one or more systems, one or more methods, and/or one or more processes may: create a manifest that includes inventory information for components of a first information handling system (IHS); encrypt, with a first private encryption key, a hash value of the manifest to produce a signature of the manifest; provide, to a second IHS, a certificate signing request that includes the manifest, the signature of the manifest, and a first public encryption key; decrypt, utilizing the first public encryption key, the signature of the manifest to obtain the hash value of the manifest; determine name-value pairs from the manifest as attributes; encrypt, with a second private encryption key, a hash value of the attributes to produce a signature of the attributes; create an attribute certificate that includes the attributes and the signature of the attributes; and provide the attribute certificate to the first IHS.
    Type: Application
    Filed: May 28, 2021
    Publication date: December 1, 2022
    Inventors: JASON MATTHEW YOUNG, CHARLES DELBERT ROBISON, AMY CHRISTINE NELSON
  • Patent number: 11012241
    Abstract: Validation of entitlements to software is provided with a Trusted Platform Module (TPM) platform hierarchy private key created at manufacture of an information handling system and an associated public key. At initiation of an entitlement request, such as to install a software application, a verification signature associated with the request is verified by the TPM to ensure that the information handling system is entitled to run the software.
    Type: Grant
    Filed: September 10, 2018
    Date of Patent: May 18, 2021
    Assignee: Dell Products L.P.
    Inventor: Amy Christine Nelson
  • Publication number: 20200084042
    Abstract: Validation of entitlements to software is provided with a Trusted Platform Module (TPM) platform hierarchy private key created at manufacture of an information handling system and an associated public key. At initiation of an entitlement request, such as to install a software application, a verification signature associated with the request is verified by the TPM to ensure that the information handling system is entitled to run the software.
    Type: Application
    Filed: September 10, 2018
    Publication date: March 12, 2020
    Applicant: Dell Products L.P.
    Inventor: Amy Christine Nelson
  • Patent number: 9881183
    Abstract: Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An information handling system may include a processor, a memory communicatively coupled to the processor, and a computer-readable medium communicatively coupled to the processor.
    Type: Grant
    Filed: July 16, 2015
    Date of Patent: January 30, 2018
    Assignee: Dell Products L.P.
    Inventors: Amy Christine Nelson, Kenneth W. Stufflebeam, Jr.
  • Patent number: 9740867
    Abstract: Systems and methods for securely passing user authentication data between a Pre-Boot Authentication (PBA) environment and an Operating System (OS) are described. In some embodiments, an Information Handling System (IHS) may include a processor; and a Basic I/O System (BIOS) coupled to the processor, the BIOS having program instructions stored thereon that, upon execution by the processor, cause the computer system to: identify an encrypted Single-Sign-On (SSO) token and a Trusted Platform Module (TPM) key pair provisioned by an Operating System (OS) and stored in an OS registry; extract a TPM public key from the TPM key pair; encrypt a PBA private key generated by a PBA application with the TPM public key; and store the encrypted PBA private key, the TPM key pair, and the encrypted SSO token in a shadow partition of a self-encrypting hard drive coupled to the IHS.
    Type: Grant
    Filed: November 16, 2015
    Date of Patent: August 22, 2017
    Assignee: Dell Products, L.P.
    Inventors: Amy Christine Nelson, Christohper D. Burchett
  • Publication number: 20150324612
    Abstract: Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An information handling system may include a processor, a memory communicatively coupled to the processor, and a computer-readable medium communicatively coupled to the processor. The computer-readable medium may have instructions stored thereon, the instructions configured to, when executed by the processor: (i) periodically store, during an encryption or decryption operation performed on the computer-readable medium, one or more variables indicative of an encryption status of a volume of the computer-readable medium; (ii) determine, based on the one or more variables, whether the volume is in a partially encrypted or decrypted state; and (iii) in response to a determination that the volume is in a partially encrypted or decrypted state, boot from the volume and continue the encryption or decryption operation.
    Type: Application
    Filed: July 16, 2015
    Publication date: November 12, 2015
    Inventors: Amy Christine Nelson, Kenneth W. Stufflebeam, JR.
  • Patent number: 9135471
    Abstract: Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. A method for encryption and decryption of data, may include encrypting or decrypting data associated with an input/output operation based on at least one of an encryption key and a cryptographic function, wherein at least one of the encryption key and the cryptographic function are selected based on one or more characteristics associated with the data to be encrypted or decrypted. Another method may include encrypting an item of data based on at least one of a first-layer encryption key and a first-layer cryptographic function to produce first-layer encrypted data and encrypting the first-layer encrypted data based on at least one of a second-layer encryption key and a second-layer cryptographic function to produce second-layer encrypted data.
    Type: Grant
    Filed: March 10, 2010
    Date of Patent: September 15, 2015
    Assignee: Dell Products L.P.
    Inventors: Kenneth W. Stufflebeam, Jr., Amy Christine Nelson
  • Patent number: 9098727
    Abstract: Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An information handling system may include a processor, a memory communicatively coupled to the processor, and a computer-readable medium communicatively coupled to the processor. The computer-readable medium may have instructions stored thereon, the instructions configured to, when executed by the processor: (i) periodically store, during an encryption or decryption operation performed on the computer-readable medium, one or more variables indicative of an encryption status of a volume of the computer-readable medium; (ii) determine, based on the one or more variables, whether the volume is in a partially encrypted or decrypted state; and (iii) in response to a determination that the volume is in a partially encrypted or decrypted state, boot from the volume and continue the encryption or decryption operation.
    Type: Grant
    Filed: October 30, 2012
    Date of Patent: August 4, 2015
    Assignee: Dell Products L.P.
    Inventors: Amy Christine Nelson, Kenneth W. Stufflebeam, Jr.
  • Patent number: 8856550
    Abstract: Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An information handling system may include a processor, a memory communicatively coupled to the processor, an encryption accelerator communicatively coupled to the processor, and a computer-readable medium communicatively coupled to the processor. The encryption accelerator may be configured to encrypt or decrypt data in response to a command from the processor to perform an encryption or decryption task upon data associated with an input/output operation.
    Type: Grant
    Filed: March 10, 2010
    Date of Patent: October 7, 2014
    Assignee: Dell Products L.P.
    Inventors: Amy Christine Nelson, Brian Decker, Kenneth W. Stufflebeam, Jr., Marc D. Alexander
  • Publication number: 20130067210
    Abstract: Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An information handling system may include a processor, a memory communicatively coupled to the processor, and a computer-readable medium communicatively coupled to the processor. The computer-readable medium may have instructions stored thereon, the instructions configured to, when executed by the processor: (i) periodically store, during an encryption or decryption operation performed on the computer-readable medium, one or more variables indicative of an encryption status of a volume of the computer-readable medium; (ii) determine, based on the one or more variables, whether the volume is in a partially encrypted or decrypted state; and (iii) in response to a determination that the volume is in a partially encrypted or decrypted state, boot from the volume and continue the encryption or decryption operation.
    Type: Application
    Filed: October 30, 2012
    Publication date: March 14, 2013
    Inventors: Amy Christine Nelson, Kenneth W. Stufflebeam, JR.
  • Patent number: 8312296
    Abstract: Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An information handling system may include a processor, a memory communicatively coupled to the processor, and a computer-readable medium communicatively coupled to the processor. The computer-readable medium may have instructions stored thereon, the instructions configured to, when executed by the processor: (i) periodically store, during an encryption or decryption operation performed on the computer-readable medium, one or more variables indicative of an encryption status of a volume of the computer-readable medium; (ii) determine, based on the one or more variables, whether the volume is in a partially encrypted or decrypted state; and (iii) in response to a determination that the volume is in a partially encrypted or decrypted state, boot from the volume and continue the encryption or decryption operation.
    Type: Grant
    Filed: March 10, 2010
    Date of Patent: November 13, 2012
    Assignee: Dell Products L.P.
    Inventors: Amy Christine Nelson, Kenneth W. Stufflebeam, Jr.
  • Publication number: 20110225406
    Abstract: Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An information handling system may include a processor, a memory communicatively coupled to the processor, an encryption accelerator communicatively coupled to the processor, and a computer-readable medium communicatively coupled to the processor. The encryption accelerator may be configured to encrypt or decrypt data in response to a command from the processor to perform an encryption or decryption task upon data associated with an input/output operation.
    Type: Application
    Filed: March 10, 2010
    Publication date: September 15, 2011
    Applicant: DELL PRODUCTS L.P.
    Inventors: Amy Christine Nelson, Brian Decker, Kenneth W. Stufflebeam, JR., Marc D. Alexander
  • Publication number: 20110225407
    Abstract: Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An information handling system may include a processor, a memory communicatively coupled to the processor, and a computer-readable medium communicatively coupled to the processor. The computer-readable medium may have instructions stored thereon, the instructions configured to, when executed by the processor: (i) periodically store, during an encryption or decryption operation performed on the computer-readable medium, one or more variables indicative of an encryption status of a volume of the computer-readable medium; (ii) determine, based on the one or more variables, whether the volume is in a partially encrypted or decrypted state; and (iii) in response to a determination that the volume is in a partially encrypted or decrypted state, boot from the volume and continue the encryption or decryption operation.
    Type: Application
    Filed: March 10, 2010
    Publication date: September 15, 2011
    Applicant: DELL PRODUCTS L.P.
    Inventors: Amy Christine Nelson, Kenneth W. Stufflebeam, JR.
  • Publication number: 20110225428
    Abstract: Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. A method for encryption and decryption of data, may include encrypting or decrypting data associated with an input/output operation based on at least one of an encryption key and a cryptographic function, wherein at least one of the encryption key and the cryptographic function are selected based on one or more characteristics associated with the data to be encrypted or decrypted. Another method may include encrypting an item of data based on at least one of a first-layer encryption key and a first-layer cryptographic function to produce first-layer encrypted data and encrypting the first-layer encrypted data based on at least one of a second-layer encryption key and a second-layer cryptographic function to produce second-layer encrypted data.
    Type: Application
    Filed: March 10, 2010
    Publication date: September 15, 2011
    Applicant: DELL PRODUCTS L.P.
    Inventors: Kenneth W. Stufflebeam, JR., Amy Christine Nelson
  • Patent number: 7007952
    Abstract: An educational game comprises a planar game board having printed thereon a plurality of images of postal stamps. The educational game further comprises a plurality of player placeholders. The educational game further comprises a plurality of question cards. A first portion of the question cards contain questions of reduced difficulty having associated therewith a first quantity of points. A second portion of the question cards contain questions of intermediate difficulty having associated therewith a second quantity of points. A third portion of the question cards contain questions of increased difficulty having associated therewith a third quantity of points. A portion of the question cards contain questions having subjective answers. A portion of the question cards contain an image of a postal stamp. When a player answers a question correctly, the player's score is incremented by the quantity of points associated with that question.
    Type: Grant
    Filed: February 14, 2003
    Date of Patent: March 7, 2006
    Inventor: Christine Nelson