Patents by Inventor James T. Gillon

James T. Gillon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9369495
    Abstract: An information handling system (IHS) performs security policy enforcement using security policy data maintained in an embedded controller, which operates within a privileged environment. The security policy data identifies security policies established for the IHS. The EC is directly connected to a number of sensors from which the EC receives sensor data and to at least one integrated functional device. The EC determines whether the received sensor data fulfills any trigger condition of a security policy. If the received sensor data does not fulfill any trigger condition of a security policy described by the security policy data, the EC continues to monitor sensors for updated sensor data. However, if the received sensor data fulfills any trigger condition of the security policy, the EC performs a security measure that involves enabling, disabling, or resetting one or more of the at least one integrated functional devices that can be disabled.
    Type: Grant
    Filed: April 13, 2015
    Date of Patent: June 14, 2016
    Assignee: DELL PRODUCTS, L.P.
    Inventors: James T. Gillon, Ricardo L. Martinez, Flaviu Cristian Chis
  • Publication number: 20160117176
    Abstract: A pre-boot diagnostic display may be controlled by an embedded controller of an information handling system. The embedded controller may generate pre-boot diagnostic content during power on self-test (POST) of the information handling system. The pre-boot diagnostic content may be displayed to a user on a primary display of the information handling system during POST and before the information handling system is booted to an operating system.
    Type: Application
    Filed: October 24, 2014
    Publication date: April 28, 2016
    Inventor: James T. Gillon
  • Publication number: 20160085951
    Abstract: A computer-implemented method provides power to a fingerprint reader while the remaining components of the information handling system are held in a low power, non-operating state. Placement of a finger across the fingerprint reader is detected with the information handling system in the non-operating state. A fingerprint is read and a corresponding fingerprint image is generated. The fingerprint image is buffered and an embedded controller is triggered to start an authentication device having a secure storage. The fingerprint image is compared to a fingerprint template contained in the secure storage. In response to the fingerprint image matching the fingerprint template, the authentication device signals the embedded controller to activate a user authenticated wake-up cycle to provide power to the other components of the information handling system such that the information handling system activates an operating system and enters a fully powered and user authenticated, operational state.
    Type: Application
    Filed: November 30, 2015
    Publication date: March 24, 2016
    Inventors: Daniel L. Hamlin, James T. Gillon, Christian L. Critz
  • Publication number: 20160036767
    Abstract: An information handling system (IHS) unambiguously addresses networked devices connected by a local area network (LAN) based network interface controller (NIC) by detecting a device descriptor of LAN-based NIC, determining that the device descriptor indicates a capability for assigning a reserve media access control (MAC) address to the networked device, writing the reserve MAC address in the LAN-based NIC of the networked device, and associating the reserve MAC address with the networked device in an inventory data structure for the IHS.
    Type: Application
    Filed: July 30, 2014
    Publication date: February 4, 2016
    Applicant: DELL PRODUCTS, L.P.
    Inventors: JAMES T. GILLON, THOMAS VOOR, NICHOLAS D. GROBELNY, NATHAN F. MARTELL
  • Patent number: 9230082
    Abstract: A computer-implemented method provides power to a fingerprint reader while the remaining components of the information handling system are held in a low power, non-operating state. Placement of a finger across the fingerprint reader is detected with the information handling system in the non-operating state. A fingerprint is read and a corresponding fingerprint image is generated. The fingerprint image is buffered and an embedded controller is triggered to start an authentication device having a secure storage. The fingerprint image is compared to a fingerprint template contained in the secure storage. In response to the fingerprint image matching the fingerprint template, the authentication device signals the embedded controller to activate a user authenticated wake-up cycle to provide power to the other components of the information handling system such that the information handling system activates an operating system and enters a fully powered and user authenticated, operational state.
    Type: Grant
    Filed: May 14, 2013
    Date of Patent: January 5, 2016
    Assignee: Dell Products, L.P.
    Inventors: Daniel L. Hamlin, James T. Gillon, Christian L. Critz
  • Publication number: 20150222669
    Abstract: An information handling system (IHS) performs security policy enforcement using security policy data maintained in an embedded controller, which operates within a privileged environment. The security policy data identifies security policies established for the IHS. The EC is directly connected to a number of sensors from which the EC receives sensor data and to at least one integrated functional device. The EC determines whether the received sensor data fulfills any trigger condition of a security policy. If the received sensor data does not fulfill any trigger condition of a security policy described by the security policy data, the EC continues to monitor sensors for updated sensor data. However, if the received sensor data fulfills any trigger condition of the security policy, the EC performs a security measure that involves enabling, disabling, or resetting one or more of the at least one integrated functional devices that can be disabled.
    Type: Application
    Filed: April 13, 2015
    Publication date: August 6, 2015
    Inventors: James T. Gillon, Ricardo L. Martinez, Flaviu Cristian Chis
  • Patent number: 9038130
    Abstract: An information handling system (IHS) performs security policy enforcement using security policy data maintained in an embedded controller, which operates within a privileged environment. The security policy data identifies security policies established for the IHS. The EC is directly connected to a number of sensors from which the EC receives sensor data and to at least one integrated functional device. The EC determines whether the received sensor data fulfills any trigger condition of a security policy. If the received sensor data does not fulfill any trigger condition of a security policy described by the security policy data, the EC continues to monitor sensors for updated sensor data. However, if the received sensor data fulfills any trigger condition of the security policy, the EC performs a security measure that involves enabling, disabling, or resetting one or more of the at least one integrated functional devices that can be disabled.
    Type: Grant
    Filed: May 14, 2013
    Date of Patent: May 19, 2015
    Assignee: Dell Products, L.P.
    Inventors: James T. Gillon, Ricardo L. Martinez, Flaviu Cristian Chis
  • Publication number: 20140344921
    Abstract: A computer-implemented method provides power to a fingerprint reader while the remaining components of the information handling system are held in a low power, non-operating state. Placement of a finger across the fingerprint reader is detected with the information handling system in the non-operating state. A fingerprint is read and a corresponding fingerprint image is generated. The fingerprint image is buffered and an embedded controller is triggered to start an authentication device having a secure storage. The fingerprint image is compared to a fingerprint template contained in the secure storage. In response to the fingerprint image matching the fingerprint template, the authentication device signals the embedded controller to activate a user authenticated wake-up cycle to provide power to the other components of the information handling system such that the information handling system activates an operating system and enters a fully powered and user authenticated, operational state.
    Type: Application
    Filed: May 14, 2013
    Publication date: November 20, 2014
    Applicant: DELL PRODUCTS L.P.
    Inventors: Daniel L. Hamlin, James T. Gillon, Christian L. Critz
  • Publication number: 20140344886
    Abstract: An information handling system (IHS) performs security policy enforcement using security policy data maintained in an embedded controller, which operates within a privileged environment. The security policy data identifies security policies established for the IHS. The EC is directly connected to a number of sensors from which the EC receives sensor data and to at least one integrated functional device. The EC determines whether the received sensor data fulfills any trigger condition of a security policy. If the received sensor data does not fulfill any trigger condition of a security policy described by the security policy data, the EC continues to monitor sensors for updated sensor data. However, if the received sensor data fulfills any trigger condition of the security policy, the EC performs a security measure that involves enabling, disabling, or resetting one or more of the at least one integrated functional devices that can be disabled.
    Type: Application
    Filed: May 14, 2013
    Publication date: November 20, 2014
    Applicant: Dell Products L.P.
    Inventors: James T. Gillon, Ricardo L. Martinez, Flaviu Cristian Chis