Patents by Inventor Douglas M. Anson
Douglas M. Anson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10862877Abstract: A method of tunneling management traffic includes receiving at a managed system a control feature from a proxy-managed system that is connected to the managed system, determining that the proxy-managed system is not visible to a management system, providing the control feature to the management system in response to determining that the proxy-managed system is not visible, receiving a modification to the control feature from the management system, and providing, from the managed system, the modification to the control feature to the proxy-managed system in response to receiving the modification to the control feature from the management system.Type: GrantFiled: September 7, 2017Date of Patent: December 8, 2020Assignee: Dell Products, L.P.Inventors: Carlton A. Andrews, Sandeep V. Karandikar, Douglas M Anson
-
Publication number: 20180013744Abstract: A method of tunneling management traffic includes receiving at a managed system a control feature from a proxy-managed system that is connected to the managed system, determining that the proxy-managed system is not visible to a management system, providing the control feature to the management system in response to determining that the proxy-managed system is not visible, receiving a modification to the control feature from the management system, and providing, from the managed system, the modification to the control feature to the proxy-managed system in response to receiving the modification to the control feature from the management system.Type: ApplicationFiled: September 7, 2017Publication date: January 11, 2018Inventors: Carlton A. Andrews, Sandeep V. Karandikar, Douglas M. Anson
-
Publication number: 20170286246Abstract: A customer support system includes at least one subsystem to communicate with a customer about a problem with a customer information handling system (IHS), wherein the customer IHS includes a plurality of first customer IHS data. The plurality of first customer IHS data is received from the customer and used to create a virtual IHS having substantially the same characteristics as the customer IHS. A problem with the customer IHS is then diagnosed using the virtual IHS.Type: ApplicationFiled: June 20, 2017Publication date: October 5, 2017Inventor: Douglas M. Anson
-
Patent number: 9762561Abstract: A method of tunneling management traffic includes receiving at a managed system a control feature from a proxy-managed system that is connected to the managed system, determining that the proxy-managed system is not visible to a management system, providing the control feature to the management system in response to determining that the proxy-managed system is not visible, receiving a modification to the control feature from the management system, and providing, from the managed system, the modification to the control feature to the proxy-managed system in response to receiving the modification to the control feature from the management system.Type: GrantFiled: October 31, 2012Date of Patent: September 12, 2017Assignee: DELL PRODUCTS, LPInventors: Carlton A. Andrews, Sandeep V. Karandikar, Douglas M. Anson
-
Patent number: 9723012Abstract: A method may also include receiving from each of one or more of potential peer information handling systems a connection request comprising a peer minimum acceptable security level for the peer information handling system. The method may additionally include comparing the peer minimum acceptable security level to a security level of the information handling system. The method may further include completing a peer-to-peer connection between the information handling system and the peer information handling system if the minimum acceptable security level is not higher than that of the security level of the information handling system.Type: GrantFiled: January 28, 2015Date of Patent: August 1, 2017Assignee: Dell Products L.P.Inventors: Douglas M. Anson, Carlton A. Andrews, Charles D. Robison, David Konetski, Frank H. Molsberry, Yuan-Chang Lo
-
Patent number: 9703659Abstract: A customer support system includes at least one subsystem to communicate with a customer about a problem with a customer information handling system (IHS), wherein the customer IHS includes a plurality of first customer IHS data. The plurality of first customer IHS data is received from the customer and used to create a virtual IHS having substantially the same characteristics as the customer IHS. A problem with the customer IHS is then diagnosed using the virtual IHS.Type: GrantFiled: December 10, 2007Date of Patent: July 11, 2017Assignee: Dell Products L.P.Inventor: Douglas M. Anson
-
Patent number: 9516106Abstract: A method of context replication including receiving a first context item at a first system in a network, determining that the first system is a context management master system, establishing a first peer-to-peer session with a second system in the network in response to determining that the first system is the context management master system, and providing, from the first system, the first context item to the second system.Type: GrantFiled: February 9, 2016Date of Patent: December 6, 2016Assignee: DELL PRODUCTS, LPInventors: Carlton A. Andrews, Douglas M. Anson, Sandeep V. Karandikar, David Konetski, Frank H. Molsberry
-
Patent number: 9436828Abstract: In accordance embodiments of the present disclosure, a method may include, during execution of an operating system on an information handling system and responsive to a user input indicating a desire to invoke a basic input/output system (BIOS) setup program for configuring a BIOS, prompting for and receiving user-provided credentials via a user interface communicatively coupled to the processor. The method may also include, during execution of the operating system, passing BIOS credentials to the BIOS based on the user-provided credentials. The method may additionally include, during execution of the operating system determining, by the BIOS, if the BIOS credentials are valid. The method may further include, responsive to determining that the BIOS credentials are valid, setting a flag to a value indicating that the BIOS setup program is to be invoked on a subsequent boot of the information handling system.Type: GrantFiled: June 11, 2015Date of Patent: September 6, 2016Assignee: Dell Products L.P.Inventors: Douglas M. Anson, Charles D. Robison, David Konetski, Frank H. Molsberry, Anand Joshi
-
Publication number: 20160156706Abstract: A method of context replication including receiving a first context item at a first system in a network, determining that the first system is a context management master system, establishing a first peer-to-peer session with a second system in the network in response to determining that the first system is the context management master system, and providing, from the first system, the first context item to the second system.Type: ApplicationFiled: February 9, 2016Publication date: June 2, 2016Inventors: Carlton A. Andrews, Douglas M. Anson, Sandeep V. Karandikar, David Konetski, Frank H. Molsberry
-
Patent number: 9307376Abstract: Voice over Internet Protocol (VoIP) telephone calls at an information handling system are managed based upon data transfer allocations associated with an information handling system wireless wide area network (WWAN) account to reduce data transfer overages at the WWAN account. If data transfer associated with a WWAN account approaches an allocation threshold, VoIP telephone calls associated with the information handling system that would use WWAN data transfer are instead configured to proceed through a WWAN telephone call with a WWAN telephone number that does not use data transfer.Type: GrantFiled: January 9, 2015Date of Patent: April 5, 2016Assignee: DELL PRODUCTS L.P.Inventors: Douglas M. Anson, Arthur R. Toy, Wendy E. Dilliard
-
Patent number: 9282165Abstract: A method of context replication including receiving a first context item at a first system in a network, determining that the first system is a context management master system, establishing a first peer-to-peer session with a second system in the network in response to determining that the first system is the context management master system, and providing, from the first system, the first context item to the second system.Type: GrantFiled: November 19, 2012Date of Patent: March 8, 2016Assignee: Dell Products, LPInventors: Carlton A. Andrews, Douglas M. Anson, Sandeep V. Karandikar, David Konetski, Frank H. Molsberry
-
Publication number: 20150278525Abstract: In accordance embodiments of the present disclosure, a method may include, during execution of an operating system on an information handling system and responsive to a user input indicating a desire to invoke a basic input/output system (BIOS) setup program for configuring a BIOS, prompting for and receiving user-provided credentials via a user interface communicatively coupled to the processor. The method may also include, during execution of the operating system, passing BIOS credentials to the BIOS based on the user-provided credentials. The method may additionally include, during execution of the operating system determining, by the BIOS, if the BIOS credentials are valid. The method may further include, responsive to determining that the BIOS credentials are valid, setting a flag to a value indicating that the BIOS setup program is to be invoked on a subsequent boot of the information handling system.Type: ApplicationFiled: June 11, 2015Publication date: October 1, 2015Inventors: Douglas M. Anson, Charles D. Robison, David Konetski, Frank H. Molsberry, Anand Joshi
-
Patent number: 9081965Abstract: In accordance embodiments of the present disclosure, a method may include, during execution of an operating system on an information handling system and responsive to a user input indicating a desire to invoke a basic input/output system (BIOS) setup program for configuring a BIOS, prompting for and receiving user-provided credentials via a user interface communicatively coupled to the processor. The method may also include, during execution of the operating system, passing BIOS credentials to the BIOS based on the user-provided credentials. The method may additionally include, during execution of the operating system determining, by the BIOS, if the BIOS credentials are valid. The method may further include, responsive to determining that the BIOS credentials are valid, setting a flag to a value indicating that the BIOS setup program is to be invoked on a subsequent boot of the information handling system.Type: GrantFiled: January 22, 2013Date of Patent: July 14, 2015Assignee: Dell Products L.P.Inventors: Douglas M. Anson, Charles D. Robison, David Konetski, Frank H. Molsberry, Anand Joshi
-
Publication number: 20150143465Abstract: A method may also include receiving from each of one or more of potential peer information handling systems a connection request comprising a peer minimum acceptable security level for the peer information handling system. The method may additionally include comparing the peer minimum acceptable security level to a security level of the information handling system. The method may further include completing a peer-to-peer connection between the information handling system and the peer information handling system if the minimum acceptable security level is not higher than that of the security level of the information handling system.Type: ApplicationFiled: January 28, 2015Publication date: May 21, 2015Inventors: Douglas M. Anson, Carlton A. Andrews, Charles D. Robison, David Konetski, Frank H. Molsberry, Yuan-Chang Lo
-
Publication number: 20150124658Abstract: Voice over Internet Protocol (VoIP) telephone calls at an information handling system are managed based upon data transfer allocations associated with an information handling system wireless wide area network (WWAN) account to reduce data transfer overages at the WWAN account. If data transfer associated with a WWAN account approaches an allocation threshold, VoIP telephone calls associated with the information handling system that would use WWAN data transfer are instead configured to proceed through a WWAN telephone call with a WWAN telephone number that does not use data transfer.Type: ApplicationFiled: January 9, 2015Publication date: May 7, 2015Applicant: DELL PRODUCTS L.P.Inventors: Douglas M. Anson, Arthur R. Toy, Wendy E. Dilliard
-
Patent number: 8978101Abstract: A method may also include receiving from each of one or more of potential peer information handling systems a connection request comprising a peer minimum acceptable security level for the peer information handling system. The method may additionally include comparing the peer minimum acceptable security level to a security level of the information handling system. The method may further include completing a peer-to-peer connection between the information handling system and the peer information handling system if the minimum acceptable security level is not higher than that of the security level of the information handling system.Type: GrantFiled: January 22, 2013Date of Patent: March 10, 2015Assignee: Dell Products L.P.Inventors: Douglas M. Anson, Carlton A. Andrews, Charles D. Robison, David Konetski, Frank H. Molsberry, Yuan-Chang Lo
-
Patent number: 8971315Abstract: Voice over Internet Protocol (VoIP) telephone calls at an information handling system are managed based upon data transfer allocations associated with an information handling system wireless wide area network (WWAN) account to reduce data transfer overages at the WWAN account. If data transfer associated with a WWAN account approaches an allocation threshold, VoIP telephone calls associated with the information handling system that would use WWAN data transfer are instead configured to proceed through a WWAN telephone call with a WWAN telephone number that does not use data transfer.Type: GrantFiled: January 30, 2013Date of Patent: March 3, 2015Assignee: Dell Products L.P.Inventors: Douglas M. Anson, Arthur R. Toy, Wendy E. Dilliard
-
Publication number: 20140211700Abstract: Voice over Internet Protocol (VoIP) telephone calls at an information handling system are managed based upon data transfer allocations associated with an information handling system wireless wide area network (WWAN) account to reduce data transfer overages at the WWAN account. If data transfer associated with a WWAN account approaches an allocation threshold, VoIP telephone calls associated with the information handling system that would use WWAN data transfer are instead configured to proceed through a WWAN telephone call with a WWAN telephone number that does not use data transfer.Type: ApplicationFiled: January 30, 2013Publication date: July 31, 2014Applicant: DELL PRODUCTS L.P.Inventors: Douglas M. Anson, Arthur R. Toy, Wendy E. Dilliard
-
Publication number: 20140208090Abstract: In accordance embodiments of the present disclosure, a method may include, during execution of an operating system on an information handling system and responsive to a user input indicating a desire to invoke a basic input/output system (BIOS) setup program for configuring a BIOS, prompting for and receiving user-provided credentials via a user interface communicatively coupled to the processor. The method may also include, during execution of the operating system, passing BIOS credentials to the BIOS based on the user-provided credentials. The method may additionally include, during execution of the operating system determining, by the BIOS, if the BIOS credentials are valid. The method may further include, responsive to determining that the BIOS credentials are valid, setting a flag to a value indicating that the BIOS setup program is to be invoked on a subsequent boot of the information handling system.Type: ApplicationFiled: January 22, 2013Publication date: July 24, 2014Applicant: DELL PRODUCTS L.P.Inventors: Douglas M. Anson, Charles D. Robison, David Konetski, Frank H. Molsberry, Anand Joshi
-
Publication number: 20140208383Abstract: A method may also include receiving from each of one or more of potential peer information handling systems a connection request comprising a peer minimum acceptable security level for the peer information handling system. The method may additionally include comparing the peer minimum acceptable security level to a security level of the information handling system. The method may further include completing a peer-to-peer connection between the information handling system and the peer information handling system if the minimum acceptable security level is not higher than that of the security level of the information handling system.Type: ApplicationFiled: January 22, 2013Publication date: July 24, 2014Applicant: DELL PRODUCTS L.P.Inventors: Douglas M. Anson, Carlton A. Andrews, Charles D. Robison, David Konetski, Frank H. Molsberry, Yuan-Chang Lo