Patents by Inventor Dongli Wu
Dongli Wu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11836499Abstract: In one or more embodiments, one or more systems, one or more methods, and/or one or more methods may: execute a first information handling system (IHS) initialization executable via an environment associated with IHS firmware; register, by the first IHS initialization executable, a process configured to store multiple IHS initialization executable/OS executable pairs via a volatile memory medium of the IHS; for each IHS initialization executable/OS executable pair of the multiple IHS initialization executable/OS executable pairs: call, by an IHS initialization executable of the IHS initialization executable/OS executable pair, the process; and copy, by the process, an OS executable of the IHS initialization executable/OS executable pair from the first non-volatile memory medium to the volatile memory medium; retrieve a driver via a network; execute the driver; and copy, by the driver, each OS executable, which was copied to the volatile memory medium, to a non-volatile memory medium of the IHS.Type: GrantFiled: December 16, 2021Date of Patent: December 5, 2023Assignee: Dell Products L.P.Inventors: Dongli Wu, Brijesh Kumar Mishra, James Darrell Testerman, Sai Sivakumar Dhakshinamurthy, Kristopher Anthony Slocum
-
Patent number: 11734019Abstract: In one or more embodiments, one or more systems, one or more methods, and/or one or more methods may: register a subroutine configured to store multiple addresses of a volatile memory medium VMM of an information handling system (IHS); for each IHS initialization executable/OS executable pair of multiple IHS initialization executable/OS executable pairs: retrieve, from a first non-volatile memory medium (NVMM), an IHS initialization executable of the IHS initialization executable/OS executable pair; copy, by the IHS initialization executable, an OS executable of the IHS initialization executable/OS executable pair from the first NVMM to the VMM; call, by the IHS initialization executable, the subroutine; store, by the subroutine, an address associated with the OS executable via a data structure stored by the VMM; and copy, by a first OS executable, the OS executable from the VMM to a second NVMM based at least on the address associated with the OS executable.Type: GrantFiled: December 22, 2021Date of Patent: August 22, 2023Assignee: Dell Products L.P.Inventors: Donald Richard Tillery, Jr., Brijesh Kumar Mishra, Justin Walter Johnson, Dongli Wu
-
Publication number: 20230195472Abstract: In one or more embodiments, one or more systems, one or more methods, and/or one or more methods may: execute a first information handling system (IHS) initialization executable via an environment associated with IHS firmware; register, by the first IHS initialization executable, a process configured to store multiple IHS initialization executable/OS executable pairs via a volatile memory medium of the IHS; for each IHS initialization executable/OS executable pair of the multiple IHS initialization executable/OS executable pairs: call, by an IHS initialization executable of the IHS initialization executable/OS executable pair, the process; and copy, by the process, an OS executable of the IHS initialization executable/OS executable pair from the first non-volatile memory medium to the volatile memory medium; retrieve a driver via a network; execute the driver; and copy, by the driver, each OS executable, which was copied to the volatile memory medium, to a non-volatile memory medium of the IHS.Type: ApplicationFiled: December 16, 2021Publication date: June 22, 2023Inventors: Dongli Wu, Brijesh Kumar Mishra, James Darrell Testerman, Sai Sivakumar Dhakshinamurthy, Kristopher Anthony Slocum
-
Patent number: 11675619Abstract: In one or more embodiments, one or more systems, one or more methods, and/or one or more methods may: register a subroutine configured to store multiple network resource addresses via a volatile memory medium; for each information handling system (IHS) initialization executable of multiple IHS initialization executables: retrieve, from a non-volatile memory medium, the IHS initialization executable; execute the IHS initialization executable via an environment associated with IHS firmware; call, by the IHS initialization executable, the subroutine; and store, by the subroutine, a network resource address associated with an operating system (OS) executable via command line arguments, where the command line arguments are stored via a data structure in the volatile memory medium; and for each network resource address of the command line arguments: retrieve, based at least on the network resource address, an OS executable associated with the network resource address from another IHS via a network.Type: GrantFiled: April 11, 2022Date of Patent: June 13, 2023Assignee: Dell Products L.P.Inventors: Donald Richard Tillery, Jr., Brijesh Kumar Mishra, Sai Sivakumar Dhakshinamurthy, Dongli Wu
-
Patent number: 11675601Abstract: Embodiments of systems and computer implemented methods are disclosed to automatically restore operating system (OS) application software to an information handling systems (IHS) when the OS application software is removed from a computer readable storage device of the IHS. The disclosed embodiments control the version of the OS application software being deployed to an IHS when deploying the software from the boot firmware. For example, the disclosed embodiments utilize a version identifier to specify which version of the OS application software should be restored, a Content Deliver Network (CDN) server to store multiple versions of the OS application software, and a registration web server to map a device identifier corresponding to the IHS and the version identifier corresponding to the specified version of the OS application software to a universal resource locator (URL) link identifying where the specified version of the OS application software is stored within the CDN server.Type: GrantFiled: May 24, 2021Date of Patent: June 13, 2023Assignee: Dell Products L.P.Inventors: Dongli Wu, James D. Testerman, Kristopher Slocum
-
Publication number: 20220374244Abstract: Embodiments of systems and computer implemented methods are disclosed to automatically restore operating system (OS) application software to an information handling systems (IHS) when the OS application software is removed from a computer readable storage device of the IHS. The disclosed embodiments control the version of the OS application software being deployed to an IHS when deploying the software from the boot firmware. For example, the disclosed embodiments utilize a version identifier to specify which version of the OS application software should be restored, a Content Deliver Network (CDN) server to store multiple versions of the OS application software, and a registration web server to map a device identifier corresponding to the IHS and the version identifier corresponding to the specified version of the OS application software to a universal resource locator (URL) link identifying where the specified version of the OS application software is stored within the CDN server.Type: ApplicationFiled: May 24, 2021Publication date: November 24, 2022Inventors: Dongli Wu, James D. Testerman, Kristopher Slocum
-
Publication number: 20220237023Abstract: In one or more embodiments, one or more systems, one or more methods, and/or one or more methods may: register a subroutine configured to store multiple network resource addresses via a volatile memory medium; for each information handling system (IHS) initialization executable of multiple IHS initialization executables: retrieve, from a non-volatile memory medium, the IHS initialization executable; execute the IHS initialization executable via an environment associated with IHS firmware; call, by the IHS initialization executable, the subroutine; and store, by the subroutine, a network resource address associated with an operating system (OS) executable via command line arguments, where the command line arguments are stored via a data structure in the volatile memory medium; and for each network resource address of the command line arguments: retrieve, based at least on the network resource address, an OS executable associated with the network resource address from another IHS via a network.Type: ApplicationFiled: April 11, 2022Publication date: July 28, 2022Inventors: DONALD RICHARD TILLERY, JR., BRIJESH KUMAR MISHRA, SAI SIVAKUMAR DHAKSHINAMURTHY, DONGLI WU
-
Patent number: 11340937Abstract: In one or more embodiments, one or more systems, one or more methods, and/or one or more methods may: register a subroutine configured to store multiple network resource addresses via a volatile memory medium; for each information handling system (IHS) initialization executable of multiple IHS initialization executables: retrieve, from a non-volatile memory medium, the IHS initialization executable; execute the IHS initialization executable via an environment associated with IHS firmware; call, by the IHS initialization executable, the subroutine; and store, by the subroutine, a network resource address associated with an operating system (OS) executable via command line arguments, where the command line arguments are stored via a data structure in the volatile memory medium; and for each network resource address of the command line arguments: retrieve, based at least on the network resource address, an OS executable associated with the network resource address from another IHS via a network.Type: GrantFiled: June 24, 2020Date of Patent: May 24, 2022Assignee: Dell Products L.P.Inventors: Donald Richard Tillery, Jr., Brijesh Kumar Mishra, Sai Sivakumar Dhakshinamurthy, Dongli Wu
-
Publication number: 20220113983Abstract: In one or more embodiments, one or more systems, one or more methods, and/or one or more methods may: register a subroutine configured to store multiple addresses of a volatile memory medium VMM of an information handling system (IHS); for each IHS initialization executable/OS executable pair of multiple IHS initialization executable/OS executable pairs: retrieve, from a first non-volatile memory medium (NVMM), an IHS initialization executable of the IHS initialization executable/OS executable pair; copy, by the IHS initialization executable, an OS executable of the IHS initialization executable/OS executable pair from the first NVMM to the VMM; call, by the IHS initialization executable, the subroutine; store, by the subroutine, an address associated with the OS executable via a data structure stored by the VMM; and copy, by a first OS executable, the OS executable from the VMM to a second NVMM based at least on the address associated with the OS executable.Type: ApplicationFiled: December 22, 2021Publication date: April 14, 2022Inventors: DONALD RICHARD TILLERY, JR., BRIJESH KUMAR MISHRA, JUSTIN WALTER JOHNSON, DONGLI WU
-
Patent number: 11237839Abstract: In one or more embodiments, one or more systems, one or more methods, and/or one or more methods may: register a subroutine configured to store multiple addresses of a volatile memory medium VMM of an information handling system (IHS); for each IHS initialization executable/OS executable pair of multiple IHS initialization executable/OS executable pairs: retrieve, from a first non-volatile memory medium (NVMM), an IHS initialization executable of the IHS initialization executable/OS executable pair; copy, by the IHS initialization executable, an OS executable of the IHS initialization executable/OS executable pair from the first NVMM to the VMM; call, by the IHS initialization executable, the subroutine; store, by the subroutine, an address associated with the OS executable via a data structure stored by the VMM; and copy, by a first OS executable, the OS executable from the VMM to a second NVMM based at least on the address associated with the OS executable.Type: GrantFiled: June 19, 2020Date of Patent: February 1, 2022Assignee: Dell Products L.P.Inventors: Donald Richard Tillery, Jr., Brijesh Kumar Mishra, Justin Walter Johnson, Dongli Wu
-
Publication number: 20210406063Abstract: In one or more embodiments, one or more systems, one or more methods, and/or one or more methods may: register a subroutine configured to store multiple network resource addresses via a volatile memory medium; for each information handling system (IHS) initialization executable of multiple IHS initialization executables: retrieve, from a non-volatile memory medium, the IHS initialization executable; execute the IHS initialization executable via an environment associated with IHS firmware; call, by the IHS initialization executable, the subroutine; and store, by the subroutine, a network resource address associated with an operating system (OS) executable via command line arguments, where the command line arguments are stored via a data structure in the volatile memory medium; and for each network resource address of the command line arguments: retrieve, based at least on the network resource address, an OS executable associated with the network resource address from another IHS via a network.Type: ApplicationFiled: June 24, 2020Publication date: December 30, 2021Inventors: DONALD RICHARD TILLERY, JR., BRIJESH KUMAR MISHRA, SAI SIVAKUMAR DHAKSHINAMURTHY, DONGLI WU
-
Publication number: 20210397458Abstract: In one or more embodiments, one or more systems, one or more methods, and/or one or more methods may: register a subroutine configured to store multiple addresses of a volatile memory medium VMM of an information handling system (IHS); for each IHS initialization executable/OS executable pair of multiple IHS initialization executable/OS executable pairs: retrieve, from a first non-volatile memory medium (NVMM), an IHS initialization executable of the IHS initialization executable/OS executable pair; copy, by the IHS initialization executable, an OS executable of the IHS initialization executable/OS executable pair from the first NVMM to the VMM; call, by the IHS initialization executable, the subroutine; store, by the subroutine, an address associated with the OS executable via a data structure stored by the VMM; and copy, by a first OS executable, the OS executable from the VMM to a second NVMM based at least on the address associated with the OS executable.Type: ApplicationFiled: June 19, 2020Publication date: December 23, 2021Inventors: DONALD RICHARD TILLERY, JR., BRIJESH KUMAR MISHRA, JUSTIN WALTER JOHNSON, DONGLI WU
-
Patent number: 11171959Abstract: A system that implements a software tool for data leak prevention whenever a protected document containing sensitive or encrypted content is opened by a document-management application having capability to directly access an Internet Protocol (IP) network, such as the Internet, without using the HyperText Transfer Protocol (HTTP). The application is selectively blocked from accessing the Internet whenever a protected document is opened by the application. The application may be, for example, the Microsoft® Word or the Adobe® Acrobat® Reader. The software tool restores the network access for the application once the protected document is no longer open in the application. Even though one application is blocked from accessing the IP network, the software tool allows another application to access the network so long as a non-protected document is opened by the other application. Thus, application-specific, selective blocking of network access is accomplished by the software tool based on document content.Type: GrantFiled: August 3, 2018Date of Patent: November 9, 2021Assignee: Dell Products L.P.Inventors: Dongli Wu, James Darrell Testerman, Venkata Satya Narasimha Murthy Prayaga, Ricardo Antonio Ruiz, Jonathan Nathan Yanez, Luis Antonio Valencia Reyes
-
Patent number: 10853506Abstract: Systems and methods for preventing leakage of protected data to unsecured applications and documents may include determining that a first document is a protected document in a managed application, detecting a request to copy protected data from the first document to a system clipboard accessible by unprotected documents, redirecting the protected data to a secure clipboard, determining that a second document is an unprotected document, detecting a request to paste the protected data into the second document, and refraining from pasting the protected data into the second document. The secure clipboard may be implemented by a data leakage prevention (DLP) client. It may be separate from the system clipboard and inaccessible by unprotected documents. Dynamic-link library injection and API hooking may allow the DLP client to intercept clipboard related function calls made by managed applications into the operating system and to transparently change the behavior of the managed application.Type: GrantFiled: July 2, 2018Date of Patent: December 1, 2020Assignee: Dell Products L.P.Inventors: Ricardo Antonio Ruiz, Jonathan Nathan Yanez, Luis Antonio Valencia Reyes, Venkata Satya Narasimha Murthy Prayaga, James Darrell Testerman, Dongli Wu
-
Patent number: 10805502Abstract: In one or more embodiments, one or more systems, methods, and/or processes may redirect a request to open a document to a background process that controls access to the document; may determine policy information associated with the document and a user of an application; may provide the document to the application; may determine an area of a user interface of the application that displays information of the document; may determine watermark information based at least on the policy information; may generate one or more watermarks based at least on the watermark information; and may display the one or more watermarks, based at least on the watermark information, on the area of the user interface of the application that displays the information of the document.Type: GrantFiled: June 25, 2018Date of Patent: October 13, 2020Assignee: Dell Products L.P.Inventors: Luis Antonio Valencia Reyes, Ricardo Antonio Ruiz, James Darrell Testerman, Dongli Wu, Venkata Satya Narasimha Murthy Prayaga, Jonathan Nathan Yanez
-
Publication number: 20200045047Abstract: A system that implements a software tool for data leak prevention whenever a protected document containing sensitive or encrypted content is opened by a document-management application having capability to directly access an Internet Protocol (IP) network, such as the Internet, without using the HyperText Transfer Protocol (HTTP). The application is selectively blocked from accessing the Internet whenever a protected document is opened by the application. The application may be, for example, the Microsoft® Word or the Adobe® Acrobat® Reader. The software tool restores the network access for the application once the protected document is no longer open in the application. Even though one application is blocked from accessing the IP network, the software tool allows another application to access the network so long as a non-protected document is opened by the other application. Thus, application-specific, selective blocking of network access is accomplished by the software tool based on document content.Type: ApplicationFiled: August 3, 2018Publication date: February 6, 2020Inventors: Dongli Wu, James Darrell Testerman, Venkata Satya Narasimha Murthy Prayaga, Ricardo Antonio Ruiz, Jonathan Nathan Yanez, Luis Antonio Valencia Reyes
-
Publication number: 20200004974Abstract: Systems and methods for preventing leakage of protected data to unsecured applications and documents may include determining that a first document is a protected document in a managed application, detecting a request to copy protected data from the first document to a system clipboard accessible by unprotected documents, redirecting the protected data to a secure clipboard, determining that a second document is an unprotected document, detecting a request to paste the protected data into the second document, and refraining from pasting the protected data into the second document. The secure clipboard may be implemented by a data leakage prevention (DLP) client. It may be separate from the system clipboard and inaccessible by unprotected documents. Dynamic-link library injection and API hooking may allow the DLP client to intercept clipboard related function calls made by managed applications into the operating system and to transparently change the behavior of the managed application.Type: ApplicationFiled: July 2, 2018Publication date: January 2, 2020Inventors: Ricardo Antonio Ruiz, Jonathan Nathan Yanez, Luis Antonio Valencia Reyes, Venkata Satya Narasimha Murthy Prayaga, James Darrell Testerman, Dongli Wu
-
Publication number: 20190394353Abstract: In one or more embodiments, one or more systems, methods, and/or processes may redirect a request to open a document to a background process that controls access to the document; may determine policy information associated with the document and a user of an application; may provide the document to the application; may determine an area of a user interface of the application that displays information of the document; may determine watermark information based at least on the policy information; may generate one or more watermarks based at least on the watermark information; and may display the one or more watermarks, based at least on the watermark information, on the area of the user interface of the application that displays the information of the document.Type: ApplicationFiled: June 25, 2018Publication date: December 26, 2019Inventors: Luis Antonio Valencia Reyes, Ricardo Antonio Ruiz, James Darrell Testerman, Dongli Wu, Venkata Satya Narasimha Murthy Prayaga, Jonathan Nathan Yanez
-
Publication number: 20170046813Abstract: An apparatus comprising: at least one processor; and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following: based on an offset, in an eye image, from an eye shape of an eye having a gaze directly at a viewer, provide a modification to a contour of an eyelid featured in the eye image for use in image manipulation to adjust the eye shape to appear as having a gaze directly at a viewer.Type: ApplicationFiled: January 8, 2014Publication date: February 16, 2017Inventors: Dongli WU, Liang ZHANG
-
Patent number: 9477489Abstract: A method that can stably and reliably resume SED from operating system power saving mode is disclosed. The solution comprises a storage lower filter driver and an extra external SCSI I/O queue. The storage lower filter driver is coupled to the storage class driver and configured to provide a SED power saving transaction in response to an operation system power function. An extra external SCSI queue and correspondingly a unique SCSI I/O queue state machine trigger mechanism are included in order to avoid overwhelming the capability of any particular host adapter. A dummy SCSI package is inserted into internal SCSI queue in last phase of operating system power down transaction so that internal SCSI queue can be activated during operation system power resuming.Type: GrantFiled: July 9, 2015Date of Patent: October 25, 2016Assignee: DELL PRODUCTS L.P.Inventor: Dongli Wu