Patents by Inventor Christopher Channing Griffin

Christopher Channing Griffin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240118966
    Abstract: A data processing system comprising a processor having a working memory and processing logic, a boot system configured to load one or more algorithms for initializing a basic input output system (BIOS) of the processor into the working memory and an error correction system configured to start a watchdog timer and to monitor initialization of the processor, the error correction system further configured to implement a corrective process if the watchdog timer times out prior to initialization of the BIOS of the processor.
    Type: Application
    Filed: October 5, 2022
    Publication date: April 11, 2024
    Applicant: DELL PRODUCTS L.P.
    Inventors: Ibrahim Sayyed, Chris Edward Pepper, Christopher Channing Griffin, Elmira M. Bonab, Purushothama R. Malluru
  • Patent number: 11921859
    Abstract: Methods, systems, and devices for transitioning an information handling system (IHS) to a predetermined operating state is disclosed. During the transition, the IHS may obtain data from a variety of sources which may subject it to compromise. To reduce the likelihood that the IHS is compromised, the IHS may evaluate its environment and its own operation to determine its security state. Depending on its security state, the IHS may perform various actions to reduce the likelihood of it being compromised through its transition process.
    Type: Grant
    Filed: November 4, 2021
    Date of Patent: March 5, 2024
    Assignee: Dell Products L.P.
    Inventors: Ibrahim Sayyed, Christopher Channing Griffin, Purushothama Rao Malluru, Chris Edward Pepper
  • Patent number: 11757648
    Abstract: Methods and systems for managing the operation of data processing systems are disclosed. A data processing system may include a computing device that may enter various operating states by performing various types of startups. Performance of some startups may be restricted by use of passwords or other security information. The data processing systems may host management controllers that may bypass the restrictions on the startups. Prior to doing so, the management controllers may verify that the requests to perform the startups are from trusted entities, or should be performed for other reasons.
    Type: Grant
    Filed: February 9, 2022
    Date of Patent: September 12, 2023
    Assignee: Dell Products L.P.
    Inventors: Christopher Channing Griffin, Adolfo Sandor Montero, Chris Edward Pepper, Purushothama Rao Malluru, Ibrahim Sayyed
  • Publication number: 20230254151
    Abstract: Methods and systems for managing the operation of data processing systems are disclosed. A data processing system may include a computing device that may enter various operating states by performing various types of startups. Performance of some startups may be restricted by use of passwords or other security information. The data processing systems may host management controllers that may bypass the restrictions on the startups. Prior to doing so, the management controllers may verify that the requests to perform the startups are from trusted entities, or should be performed for other reasons.
    Type: Application
    Filed: February 9, 2022
    Publication date: August 10, 2023
    Inventors: Christopher Channing GRIFFIN, Adolfo Sandor MONTERO, Chris Edward PEPPER, Purushothama Rao MALLURU, Ibrahim Sayyed
  • Publication number: 20230139943
    Abstract: Methods, systems, and devices for transitioning an information handling system (IHS) to a predetermined operating state is disclosed. During the transition, the IHS may obtain data from a variety of sources which may subject it to compromise. To reduce the likelihood that the IHS is compromised, the IHS may evaluate its environment and its own operation to determine its security state. Depending on its security state, the IHS may perform various actions to reduce the likelihood of it being compromised through its transition process.
    Type: Application
    Filed: November 4, 2021
    Publication date: May 4, 2023
    Inventors: IBRAHIM SAYYED, CHRISTOPHER CHANNING GRIFFIN, PURUSHOTHAMA Rao Malluru, CHRIS EDWARD PEPPER
  • Patent number: 10693664
    Abstract: Systems and methods to build a trusted HTTPS session on a limited pre-boot BIOS environment in an information handling system. The information handling system may include a BIOS that may be stored in a secure read-only region of a flash storage. The BIOS may download signed certification authority (CA) information from a server based on a target location that may be stored at the secure read-only region. The BIOS may authenticate the signed CA information based on a public key that may be stored at the secure read-only region. The BIOS may, when the signed CA information is authenticated, download a root CA chain from the server and authenticate the root CA chain. The BIOS may, when the root CA chain is authenticated, establish a secure encrypted transport layer security (TLS) session with the server based the root CA chain.
    Type: Grant
    Filed: July 20, 2018
    Date of Patent: June 23, 2020
    Assignee: Dell Products L.P.
    Inventors: Purushothama R. Malluru, Christopher Channing Griffin, Chris Edward Pepper, Ibrahim Sayyed, Alok Pant
  • Publication number: 20200028696
    Abstract: Systems and methods to build a trusted HTTPS session on a limited pre-boot BIOS environment in an information handling system. The information handling system may include a BIOS that may be stored in a secure read-only region of a flash storage. The BIOS may download signed certification authority (CA) information from a server based on a target location that may be stored at the secure read-only region. The BIOS may authenticate the signed CA information based on a public key that may be stored at the secure read-only region. The BIOS may, when the signed CA information is authenticated, download a root CA chain from the server and authenticate the root CA chain. The BIOS may, when the root CA chain is authenticated, establish a secure encrypted transport layer security (TLS) session with the server based the root CA chain.
    Type: Application
    Filed: July 20, 2018
    Publication date: January 23, 2020
    Inventors: Purushothama R. Malluru, Christopher Channing Griffin, Chris Edward Pepper, Ibrahim Sayyed, Alok Pant