Patents by Inventor Christine Nelson
Christine Nelson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11971519Abstract: A display article is described herein that includes: a substrate comprising a thickness and a primary surface; a textured surface region; and an antireflective coating disposed on the textured surface region. The textured surface region comprises structural features and an average texture height (Rtext) from 50 nm to 300 nm. The substrate exhibits a sparkle of less than 5%, as measured by PPD140, and a transmittance haze of less than 40%, at a 0° incident angle. The antireflective coating comprises alternating high refractive index and low refractive index layers. Each of the low index layers comprises a refractive index of less than or equal to 1.8, and each of the high index layers comprises a refractive index of greater than 1.8. The article also exhibits a first-surface average photopic specular reflectance (% R) of less than 0.3% at any incident angle from about 5° to 20° from normal at visible wavelengths.Type: GrantFiled: July 8, 2021Date of Patent: April 30, 2024Assignee: CORNING INCORPORATEDInventors: Shandon Dee Hart, Karl William Koch, III, Carlo Anthony Kosik Williams, Lin Lin, Cameron Robert Nelson, James Joseph Price, Jayantha Senawiratne, Florence Christine Monique Verrier, David Lee Weidman
-
Publication number: 20230401316Abstract: A virtual BIOS engine may be configured to, during runtime of an operating system, in response to an operating system event for updating firmware, load onto an isolated compute domain of the processor to emulate firmware update processes of a non-transitory computer-readable media with a virtual non-transitory computer-readable media and emulate the firmware update processes of the cryptoprocessor with a virtual cryptoprocessor, extract a firmware payload to the virtual non-transitory computer-readable media, and execute a virtual trust chain to measure the firmware payload in the virtual non-transitory computer-readable media.Type: ApplicationFiled: June 10, 2022Publication date: December 14, 2023Applicant: Dell Products L.P.Inventors: Shekar Babu SURYANARAYANA, Anand Prakash JOSHI, Amy Christine NELSON, Nicholas D. GROBELNY
-
Patent number: 11748502Abstract: In one or more embodiments, a first information handling system (IHS) may: encrypt a document utilizing a symmetric encryption key to produce an encrypted document; and encrypt a metadata file, which includes the symmetric encryption key, utilizing a session encryption key to produce a first encrypted metadata file. In one or more embodiments, a second IHS may: decrypt the first encrypted metadata file utilizing the session encryption key to produce the metadata file; and encrypt the metadata file utilizing a public encryption key associated with a second TPM associated with a third IHS to produce a second encrypted metadata file. In one or more embodiments, the third information handling system may: decrypt the second encrypted metadata file utilizing a private encryption key associated with the second TPM to produce the metadata file; and decrypt the encrypted document utilizing the symmetric encryption key, from the metadata file, to produce the document.Type: GrantFiled: June 10, 2021Date of Patent: September 5, 2023Assignee: Dell Products L.P.Inventors: Amy Christine Nelson, Chooi Peng Low
-
Publication number: 20220407714Abstract: In one or more embodiments, a first information handling system may: receive a chained cryptographic hash value determined by a trusted platform module (TPM) of a second information handling system; receive multiple patch identities associated with multiple updated firmware installed on multiple components of the second information handling system; receive an event log associated with output of the TPM as the TPM determined the chained cryptographic hash value; retrieve multiple layered endorsements respectively associated with the multiple patch identities; determine multiple hash values from multiple signatures stored in the multiple layered endorsements; compare the chained cryptographic hash value with the event log; compare multiple event information with the multiple hash values; and determine that the second information handling system has booted into a trusted state based at least on comparing the chained cryptographic hash value with the event log and comparing the multiple event information with theType: ApplicationFiled: June 18, 2021Publication date: December 22, 2022Inventors: Nicholas DiCiurcio Grobelny, Amy Christine Nelson
-
Publication number: 20220398332Abstract: In one or more embodiments, a first information handling system (IHS) may: encrypt a document utilizing a symmetric encryption key to produce an encrypted document; and encrypt a metadata file, which includes the symmetric encryption key, utilizing a session encryption key to produce a first encrypted metadata file. In one or more embodiments, a second IHS may: decrypt the first encrypted metadata file utilizing the session encryption key to produce the metadata file; and encrypt the metadata file utilizing a public encryption key associated with a second TPM associated with a third IHS to produce a second encrypted metadata file. In one or more embodiments, the third information handling system may: decrypt the second encrypted metadata file utilizing a private encryption key associated with the second TPM to produce the metadata file; and decrypt the encrypted document utilizing the symmetric encryption key, from the metadata file, to produce the document.Type: ApplicationFiled: June 10, 2021Publication date: December 15, 2022Inventors: Amy Christine Nelson, Chooi Peng Low
-
Publication number: 20220383333Abstract: In one or more embodiments, one or more systems, one or more methods, and/or one or more processes may: create a manifest that includes inventory information for components of a first information handling system (IHS); encrypt, with a first private encryption key, a hash value of the manifest to produce a signature of the manifest; provide, to a second IHS, a certificate signing request that includes the manifest, the signature of the manifest, and a first public encryption key; decrypt, utilizing the first public encryption key, the signature of the manifest to obtain the hash value of the manifest; determine name-value pairs from the manifest as attributes; encrypt, with a second private encryption key, a hash value of the attributes to produce a signature of the attributes; create an attribute certificate that includes the attributes and the signature of the attributes; and provide the attribute certificate to the first IHS.Type: ApplicationFiled: May 28, 2021Publication date: December 1, 2022Inventors: JASON MATTHEW YOUNG, CHARLES DELBERT ROBISON, AMY CHRISTINE NELSON
-
Patent number: 11012241Abstract: Validation of entitlements to software is provided with a Trusted Platform Module (TPM) platform hierarchy private key created at manufacture of an information handling system and an associated public key. At initiation of an entitlement request, such as to install a software application, a verification signature associated with the request is verified by the TPM to ensure that the information handling system is entitled to run the software.Type: GrantFiled: September 10, 2018Date of Patent: May 18, 2021Assignee: Dell Products L.P.Inventor: Amy Christine Nelson
-
Publication number: 20200084042Abstract: Validation of entitlements to software is provided with a Trusted Platform Module (TPM) platform hierarchy private key created at manufacture of an information handling system and an associated public key. At initiation of an entitlement request, such as to install a software application, a verification signature associated with the request is verified by the TPM to ensure that the information handling system is entitled to run the software.Type: ApplicationFiled: September 10, 2018Publication date: March 12, 2020Applicant: Dell Products L.P.Inventor: Amy Christine Nelson
-
Patent number: 9881183Abstract: Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An information handling system may include a processor, a memory communicatively coupled to the processor, and a computer-readable medium communicatively coupled to the processor.Type: GrantFiled: July 16, 2015Date of Patent: January 30, 2018Assignee: Dell Products L.P.Inventors: Amy Christine Nelson, Kenneth W. Stufflebeam, Jr.
-
Patent number: 9740867Abstract: Systems and methods for securely passing user authentication data between a Pre-Boot Authentication (PBA) environment and an Operating System (OS) are described. In some embodiments, an Information Handling System (IHS) may include a processor; and a Basic I/O System (BIOS) coupled to the processor, the BIOS having program instructions stored thereon that, upon execution by the processor, cause the computer system to: identify an encrypted Single-Sign-On (SSO) token and a Trusted Platform Module (TPM) key pair provisioned by an Operating System (OS) and stored in an OS registry; extract a TPM public key from the TPM key pair; encrypt a PBA private key generated by a PBA application with the TPM public key; and store the encrypted PBA private key, the TPM key pair, and the encrypted SSO token in a shadow partition of a self-encrypting hard drive coupled to the IHS.Type: GrantFiled: November 16, 2015Date of Patent: August 22, 2017Assignee: Dell Products, L.P.Inventors: Amy Christine Nelson, Christohper D. Burchett
-
Publication number: 20150324612Abstract: Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An information handling system may include a processor, a memory communicatively coupled to the processor, and a computer-readable medium communicatively coupled to the processor. The computer-readable medium may have instructions stored thereon, the instructions configured to, when executed by the processor: (i) periodically store, during an encryption or decryption operation performed on the computer-readable medium, one or more variables indicative of an encryption status of a volume of the computer-readable medium; (ii) determine, based on the one or more variables, whether the volume is in a partially encrypted or decrypted state; and (iii) in response to a determination that the volume is in a partially encrypted or decrypted state, boot from the volume and continue the encryption or decryption operation.Type: ApplicationFiled: July 16, 2015Publication date: November 12, 2015Inventors: Amy Christine Nelson, Kenneth W. Stufflebeam, JR.
-
Patent number: 9135471Abstract: Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. A method for encryption and decryption of data, may include encrypting or decrypting data associated with an input/output operation based on at least one of an encryption key and a cryptographic function, wherein at least one of the encryption key and the cryptographic function are selected based on one or more characteristics associated with the data to be encrypted or decrypted. Another method may include encrypting an item of data based on at least one of a first-layer encryption key and a first-layer cryptographic function to produce first-layer encrypted data and encrypting the first-layer encrypted data based on at least one of a second-layer encryption key and a second-layer cryptographic function to produce second-layer encrypted data.Type: GrantFiled: March 10, 2010Date of Patent: September 15, 2015Assignee: Dell Products L.P.Inventors: Kenneth W. Stufflebeam, Jr., Amy Christine Nelson
-
Patent number: 9098727Abstract: Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An information handling system may include a processor, a memory communicatively coupled to the processor, and a computer-readable medium communicatively coupled to the processor. The computer-readable medium may have instructions stored thereon, the instructions configured to, when executed by the processor: (i) periodically store, during an encryption or decryption operation performed on the computer-readable medium, one or more variables indicative of an encryption status of a volume of the computer-readable medium; (ii) determine, based on the one or more variables, whether the volume is in a partially encrypted or decrypted state; and (iii) in response to a determination that the volume is in a partially encrypted or decrypted state, boot from the volume and continue the encryption or decryption operation.Type: GrantFiled: October 30, 2012Date of Patent: August 4, 2015Assignee: Dell Products L.P.Inventors: Amy Christine Nelson, Kenneth W. Stufflebeam, Jr.
-
Patent number: 8856550Abstract: Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An information handling system may include a processor, a memory communicatively coupled to the processor, an encryption accelerator communicatively coupled to the processor, and a computer-readable medium communicatively coupled to the processor. The encryption accelerator may be configured to encrypt or decrypt data in response to a command from the processor to perform an encryption or decryption task upon data associated with an input/output operation.Type: GrantFiled: March 10, 2010Date of Patent: October 7, 2014Assignee: Dell Products L.P.Inventors: Amy Christine Nelson, Brian Decker, Kenneth W. Stufflebeam, Jr., Marc D. Alexander
-
Publication number: 20130067210Abstract: Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An information handling system may include a processor, a memory communicatively coupled to the processor, and a computer-readable medium communicatively coupled to the processor. The computer-readable medium may have instructions stored thereon, the instructions configured to, when executed by the processor: (i) periodically store, during an encryption or decryption operation performed on the computer-readable medium, one or more variables indicative of an encryption status of a volume of the computer-readable medium; (ii) determine, based on the one or more variables, whether the volume is in a partially encrypted or decrypted state; and (iii) in response to a determination that the volume is in a partially encrypted or decrypted state, boot from the volume and continue the encryption or decryption operation.Type: ApplicationFiled: October 30, 2012Publication date: March 14, 2013Inventors: Amy Christine Nelson, Kenneth W. Stufflebeam, JR.
-
Patent number: 8312296Abstract: Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An information handling system may include a processor, a memory communicatively coupled to the processor, and a computer-readable medium communicatively coupled to the processor. The computer-readable medium may have instructions stored thereon, the instructions configured to, when executed by the processor: (i) periodically store, during an encryption or decryption operation performed on the computer-readable medium, one or more variables indicative of an encryption status of a volume of the computer-readable medium; (ii) determine, based on the one or more variables, whether the volume is in a partially encrypted or decrypted state; and (iii) in response to a determination that the volume is in a partially encrypted or decrypted state, boot from the volume and continue the encryption or decryption operation.Type: GrantFiled: March 10, 2010Date of Patent: November 13, 2012Assignee: Dell Products L.P.Inventors: Amy Christine Nelson, Kenneth W. Stufflebeam, Jr.
-
Publication number: 20110225406Abstract: Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An information handling system may include a processor, a memory communicatively coupled to the processor, an encryption accelerator communicatively coupled to the processor, and a computer-readable medium communicatively coupled to the processor. The encryption accelerator may be configured to encrypt or decrypt data in response to a command from the processor to perform an encryption or decryption task upon data associated with an input/output operation.Type: ApplicationFiled: March 10, 2010Publication date: September 15, 2011Applicant: DELL PRODUCTS L.P.Inventors: Amy Christine Nelson, Brian Decker, Kenneth W. Stufflebeam, JR., Marc D. Alexander
-
Publication number: 20110225407Abstract: Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An information handling system may include a processor, a memory communicatively coupled to the processor, and a computer-readable medium communicatively coupled to the processor. The computer-readable medium may have instructions stored thereon, the instructions configured to, when executed by the processor: (i) periodically store, during an encryption or decryption operation performed on the computer-readable medium, one or more variables indicative of an encryption status of a volume of the computer-readable medium; (ii) determine, based on the one or more variables, whether the volume is in a partially encrypted or decrypted state; and (iii) in response to a determination that the volume is in a partially encrypted or decrypted state, boot from the volume and continue the encryption or decryption operation.Type: ApplicationFiled: March 10, 2010Publication date: September 15, 2011Applicant: DELL PRODUCTS L.P.Inventors: Amy Christine Nelson, Kenneth W. Stufflebeam, JR.
-
Publication number: 20110225428Abstract: Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. A method for encryption and decryption of data, may include encrypting or decrypting data associated with an input/output operation based on at least one of an encryption key and a cryptographic function, wherein at least one of the encryption key and the cryptographic function are selected based on one or more characteristics associated with the data to be encrypted or decrypted. Another method may include encrypting an item of data based on at least one of a first-layer encryption key and a first-layer cryptographic function to produce first-layer encrypted data and encrypting the first-layer encrypted data based on at least one of a second-layer encryption key and a second-layer cryptographic function to produce second-layer encrypted data.Type: ApplicationFiled: March 10, 2010Publication date: September 15, 2011Applicant: DELL PRODUCTS L.P.Inventors: Kenneth W. Stufflebeam, JR., Amy Christine Nelson
-
Patent number: 7007952Abstract: An educational game comprises a planar game board having printed thereon a plurality of images of postal stamps. The educational game further comprises a plurality of player placeholders. The educational game further comprises a plurality of question cards. A first portion of the question cards contain questions of reduced difficulty having associated therewith a first quantity of points. A second portion of the question cards contain questions of intermediate difficulty having associated therewith a second quantity of points. A third portion of the question cards contain questions of increased difficulty having associated therewith a third quantity of points. A portion of the question cards contain questions having subjective answers. A portion of the question cards contain an image of a postal stamp. When a player answers a question correctly, the player's score is incremented by the quantity of points associated with that question.Type: GrantFiled: February 14, 2003Date of Patent: March 7, 2006Inventor: Christine Nelson