Patents by Inventor Jorge Daniel Cisneros

Jorge Daniel Cisneros has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11563721
    Abstract: Systems and methods for bypassing firewalls using a server management protocol is provided. In various embodiments, a proxy component serves as a “man-in-the-middle” between an edge client and a server client. The proxy component can receive a server connection request from the edge client to connect to a requested server client using a managed network name associated with the server client. The proxy component can establish a proxy connection with the requested server client, and routing data packets between the server client and the edge client. The edge client and the server client are connected without the public advertisement of the private addresses of the edge client and the server client.
    Type: Grant
    Filed: June 21, 2020
    Date of Patent: January 24, 2023
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Christopher Davenport, Kenneth Leach, Jorge Daniel Cisneros, Ivan Farkas
  • Patent number: 11356383
    Abstract: A system to facilitate communication between a cloud system and an edge server is described. The system includes one or more processors to execute a translation service to receive a first request operation from a cloud service, wherein the first request operation comprises a first communication protocol supported by the cloud service, translate the first request operation to a second communication protocol supported by a first edge server, wherein the second communication protocol is different from the first communication protocol and transmit the translated first request operation to the first edge server.
    Type: Grant
    Filed: June 19, 2020
    Date of Patent: June 7, 2022
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Kenneth Leach, Jorge Daniel Cisneros
  • Patent number: 11329816
    Abstract: In some examples, a device receives a plurality of encryption keys from a secure storage of a management controller, where a first encryption key of the plurality of encryption keys is for site-wide access of information on removable storage media plugged into respective computers of a site, and a second encryption key of the plurality of encryption keys is to restrict access of information on removable storage media plugged into a subset of the computers. The device uses a given encryption key of the plurality of encryption keys to encrypt information written to or decrypt information read from a first removable storage medium plugged into a first computer of the computers, wherein the management controller is associated with and is separate from a processor of the first computer.
    Type: Grant
    Filed: June 1, 2020
    Date of Patent: May 10, 2022
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Lee A. Preimesberger, Jorge Daniel Cisneros, Vartan Yosef Kasheshian
  • Publication number: 20210400022
    Abstract: Systems and methods for bypassing firewalls using a server management protocol is provided. In various embodiments, a proxy component serves as a “man-in-the-middle” between an edge client and a server client. The proxy component can receive a server connection request from the edge client to connect to a requested server client using a managed network name associated with the server client. The proxy component can establish a proxy connection with the requested server client, and routing data packets between the server client and the edge client. The edge client and the server client are connected without the public advertisement of the private addresses of the edge client and the server client.
    Type: Application
    Filed: June 21, 2020
    Publication date: December 23, 2021
    Inventors: CHRISTOPHER DAVENPORT, KENNETH LEACH, JORGE DANIEL CISNEROS, IVAN FARKAS
  • Publication number: 20210399994
    Abstract: A system to facilitate communication between a cloud system and an edge server is described. The system includes one or more processors to execute a translation service to receive a first request operation from a cloud service, wherein the first request operation comprises a first communication protocol supported by the cloud service, translate the first request operation to a second communication protocol supported by a first edge server, wherein the second communication protocol is different from the first communication protocol and transmit the translated first request operation to the first edge server.
    Type: Application
    Filed: June 19, 2020
    Publication date: December 23, 2021
    Inventors: Kenneth Leach, Jorge Daniel Cisneros
  • Publication number: 20210377019
    Abstract: In some examples, a device receives a plurality of encryption keys from a secure storage of a management controller, where a first encryption key of the plurality of encryption keys is for site-wide access of information on removable storage media plugged into respective computers of a site, and a second encryption key of the plurality of encryption keys is to restrict access of information on removable storage media plugged into a subset of the computers. The device uses a given encryption key of the plurality of encryption keys to encrypt information written to or decrypt information read from a first removable storage medium plugged into a first computer of the computers, wherein the management controller is associated with and is separate from a processor of the first computer.
    Type: Application
    Filed: June 1, 2020
    Publication date: December 2, 2021
    Inventors: Lee A. Preimesberger, Jorge Daniel Cisneros, Vartan Yosef Kasheshian
  • Patent number: 10747549
    Abstract: A method disclosed herein relates to a proxy application that connects to an input/output controller (IOCTL) interface driver. The IOCTL interface driver transfers IOCTL commands to a baseboard management controller (BMC). The proxy application receives, through the IOCTL interface driver, an application protocol request over an IOCTL command from the BMC. The application protocol request includes a computing devices configuration, a computing devices configuration option, and user interface data. The proxy application also receives an update to the computing devices current configuration based on the computing devices configuration option. The proxy application generates a new application protocol request over the IOCTL command based on the update to the computing devices current configuration. The proxy application transmits, through the IOCTL interface driver, the new application protocol request over the IOCTL command to the BMC.
    Type: Grant
    Filed: July 19, 2017
    Date of Patent: August 18, 2020
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Lee A. Preimesberger, Jorge Daniel Cisneros, Thomas A. Schwartz
  • Patent number: 10341186
    Abstract: Examples provided relate to adding a network unit to a management group. An example method includes receiving a numeric code on a first network unit from a button on a front panel of the first network unit. The numeric code is received on a second network unit using a button on a front panel of the second network unit. The first network unit is added to the management group of the second network unit.
    Type: Grant
    Filed: April 17, 2015
    Date of Patent: July 2, 2019
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Lee A. Preimesberger, Jorge Daniel Cisneros, Wei-Chao Chen
  • Patent number: 10282549
    Abstract: In an example, a device comprises a baseboard management controller (BMC). The BMC comprises non-volatile storage storing a service operating system (OS). The BMC also comprises a processor. The processor may: receive, by a baseboard management controller (BMC), a request to modify the non-volatile storage, wherein the request comprises a signature, determine, by the BMC, based on a received signature, and a key for modifying the non-volatile storage, whether the request to modify the non-volatile storage is properly signed, and responsive to determining the request to modify the non-volatile storage is properly signed: allow modification of the non-volatile storage.
    Type: Grant
    Filed: March 7, 2017
    Date of Patent: May 7, 2019
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Jorge Daniel Cisneros, Lee A. Preimesberger, Sean Pope
  • Publication number: 20190095593
    Abstract: Examples disclosed herein relate to using a baseboard management controller (BMC) of a computing device with a private and public key that is used for license provisioning. A public key is obtained from the BMC. The public key is sent to a license device external to the computing device. Encrypted license information is received from the license device. Decrypted license information is obtained from the BMC based on the encrypted license information.
    Type: Application
    Filed: September 25, 2017
    Publication date: March 28, 2019
    Inventors: Jorge Daniel CISNEROS, Jeffrey A. NORDIN, Lee A. PREIMESBERGER
  • Publication number: 20190026125
    Abstract: A method disclosed herein relates to a proxy application that connects to an input/output controller (IOCTL) interface driver. The IOCTL interface driver transfers IOCTL commands to a baseboard management controller (BMC). The proxy application receives, through the IOCTL interface driver, an application protocol request over an IOCTL command from the BMC. The application protocol request includes a computing devices configuration, a computing devices configuration option, and user interface data. The proxy application also receives an update to the computing devices current configuration based on the computing devices configuration option. The proxy application generates a new application protocol request over the IOCTL command based on the update to the computing devices current configuration. The proxy application transmits, through the IOCTL interface driver, the new application protocol request over the IOCTL command to the BMC.
    Type: Application
    Filed: July 19, 2017
    Publication date: January 24, 2019
    Inventors: Lee A. Preimesberger, Jorge Daniel Cisneros, Thomas A. Schwartz
  • Publication number: 20180260568
    Abstract: In an example, a device comprises a baseboard management controller (BMC). The BMC comprises non-volatile storage storing a service operating system (OS). The BMC also comprises a processor. The processor may: receive, by a baseboard management controller (BMC), a request to modify the non-volatile storage, wherein the request comprises a signature, determine, by the BMC, based on a received signature, and a key for modifying the non-volatile storage, whether the request to modify the non-volatile storage is properly signed, and responsive to determining the request to modify the non-volatile storage is properly signed: allow modification of the non-volatile storage.
    Type: Application
    Filed: March 7, 2017
    Publication date: September 13, 2018
    Inventors: Jorge Daniel Cisneros, Lee A. Preimesberger, Sean Pope
  • Publication number: 20170207973
    Abstract: Examples provided relate to adding a network unit to a management group. An example method includes receiving a numeric code on a first network unit from a button on a front panel of the first network unit. The numeric code is received on a second network unit using a button on a front panel of the second network unit. The first network unit is added to the management group of the second network unit.
    Type: Application
    Filed: April 17, 2015
    Publication date: July 20, 2017
    Inventors: Lee A. Preimesberger, Jorge Daniel Cisneros, Wei-Chao Chen
  • Publication number: 20160203017
    Abstract: A server system may include a baseboard management controller and a host system. The baseboard management controller may obtain an identification of a peer system over a management network connection. The baseboard management controller may provide the identification of the peer system to the host system. The host system may use the identification of the peer system to obtain a virtual machine image.
    Type: Application
    Filed: September 25, 2013
    Publication date: July 14, 2016
    Inventors: Chris Davenport, Lee A Preimesberger, Eric A Ramirez, Tess Muir, Sangita Prajapati, Jorge Daniel Cisneros, James Ayvaz, Thomas A Schwartz
  • Publication number: 20160080359
    Abstract: A method includes upon receiving a request from a user to perform an operation on a device that is running under an operating system, authenticating the user on the basis of credential data that is retrieved from a data storage unit that is associated with a lights-out management (LOM) capability of the device. If authentication of the user is successful, the user is enabled to perform the operation.
    Type: Application
    Filed: November 19, 2015
    Publication date: March 17, 2016
    Inventors: Cecil J. Ayvaz, Jorge Daniel Cisneros, Lee A. Preimesberger
  • Patent number: 9218462
    Abstract: A method includes upon receiving a request from a user to perform an operation on a device that is running under an operating system, authenticating the user on the basis of credential data that is retrieved from a data storage unit that is associated with a lights-out management (LOM) capability of the device. If authentication of the user is successful, the user is enabled to perform the operation.
    Type: Grant
    Filed: April 25, 2012
    Date of Patent: December 22, 2015
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Cemil J Ayvaz, Jorge Daniel Cisneros, Lee A Preimesberger
  • Publication number: 20130291064
    Abstract: A method includes upon receiving a request from a user to perform an operation on a device that is running under an operating system, authenticating the user on the basis of credential data that is retrieved from a data storage unit that is associated with a lights-out management (LOM) capability of the device. If authentication of the user is successful, the user is enabled to perform the operation.
    Type: Application
    Filed: April 25, 2012
    Publication date: October 31, 2013
    Inventors: Cemil J. Ayvaz, Jorge Daniel Cisneros, Lee A. Preimesberger