Patents by Inventor Jorge Daniel Cisneros
Jorge Daniel Cisneros has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Methods and systems for network address translation (NAT) traversal using a meet-in-the-middle proxy
Patent number: 11563721Abstract: Systems and methods for bypassing firewalls using a server management protocol is provided. In various embodiments, a proxy component serves as a “man-in-the-middle” between an edge client and a server client. The proxy component can receive a server connection request from the edge client to connect to a requested server client using a managed network name associated with the server client. The proxy component can establish a proxy connection with the requested server client, and routing data packets between the server client and the edge client. The edge client and the server client are connected without the public advertisement of the private addresses of the edge client and the server client.Type: GrantFiled: June 21, 2020Date of Patent: January 24, 2023Assignee: Hewlett Packard Enterprise Development LPInventors: Christopher Davenport, Kenneth Leach, Jorge Daniel Cisneros, Ivan Farkas -
Patent number: 11356383Abstract: A system to facilitate communication between a cloud system and an edge server is described. The system includes one or more processors to execute a translation service to receive a first request operation from a cloud service, wherein the first request operation comprises a first communication protocol supported by the cloud service, translate the first request operation to a second communication protocol supported by a first edge server, wherein the second communication protocol is different from the first communication protocol and transmit the translated first request operation to the first edge server.Type: GrantFiled: June 19, 2020Date of Patent: June 7, 2022Assignee: Hewlett Packard Enterprise Development LPInventors: Kenneth Leach, Jorge Daniel Cisneros
-
Patent number: 11329816Abstract: In some examples, a device receives a plurality of encryption keys from a secure storage of a management controller, where a first encryption key of the plurality of encryption keys is for site-wide access of information on removable storage media plugged into respective computers of a site, and a second encryption key of the plurality of encryption keys is to restrict access of information on removable storage media plugged into a subset of the computers. The device uses a given encryption key of the plurality of encryption keys to encrypt information written to or decrypt information read from a first removable storage medium plugged into a first computer of the computers, wherein the management controller is associated with and is separate from a processor of the first computer.Type: GrantFiled: June 1, 2020Date of Patent: May 10, 2022Assignee: Hewlett Packard Enterprise Development LPInventors: Lee A. Preimesberger, Jorge Daniel Cisneros, Vartan Yosef Kasheshian
-
METHODS AND SYSTEMS FOR NETWORK ADDRESS TRANSLATION (NAT) TRAVERSAL USING A MEET-IN-THE-MIDDLE PROXY
Publication number: 20210400022Abstract: Systems and methods for bypassing firewalls using a server management protocol is provided. In various embodiments, a proxy component serves as a “man-in-the-middle” between an edge client and a server client. The proxy component can receive a server connection request from the edge client to connect to a requested server client using a managed network name associated with the server client. The proxy component can establish a proxy connection with the requested server client, and routing data packets between the server client and the edge client. The edge client and the server client are connected without the public advertisement of the private addresses of the edge client and the server client.Type: ApplicationFiled: June 21, 2020Publication date: December 23, 2021Inventors: CHRISTOPHER DAVENPORT, KENNETH LEACH, JORGE DANIEL CISNEROS, IVAN FARKAS -
Publication number: 20210399994Abstract: A system to facilitate communication between a cloud system and an edge server is described. The system includes one or more processors to execute a translation service to receive a first request operation from a cloud service, wherein the first request operation comprises a first communication protocol supported by the cloud service, translate the first request operation to a second communication protocol supported by a first edge server, wherein the second communication protocol is different from the first communication protocol and transmit the translated first request operation to the first edge server.Type: ApplicationFiled: June 19, 2020Publication date: December 23, 2021Inventors: Kenneth Leach, Jorge Daniel Cisneros
-
Publication number: 20210377019Abstract: In some examples, a device receives a plurality of encryption keys from a secure storage of a management controller, where a first encryption key of the plurality of encryption keys is for site-wide access of information on removable storage media plugged into respective computers of a site, and a second encryption key of the plurality of encryption keys is to restrict access of information on removable storage media plugged into a subset of the computers. The device uses a given encryption key of the plurality of encryption keys to encrypt information written to or decrypt information read from a first removable storage medium plugged into a first computer of the computers, wherein the management controller is associated with and is separate from a processor of the first computer.Type: ApplicationFiled: June 1, 2020Publication date: December 2, 2021Inventors: Lee A. Preimesberger, Jorge Daniel Cisneros, Vartan Yosef Kasheshian
-
Patent number: 10747549Abstract: A method disclosed herein relates to a proxy application that connects to an input/output controller (IOCTL) interface driver. The IOCTL interface driver transfers IOCTL commands to a baseboard management controller (BMC). The proxy application receives, through the IOCTL interface driver, an application protocol request over an IOCTL command from the BMC. The application protocol request includes a computing devices configuration, a computing devices configuration option, and user interface data. The proxy application also receives an update to the computing devices current configuration based on the computing devices configuration option. The proxy application generates a new application protocol request over the IOCTL command based on the update to the computing devices current configuration. The proxy application transmits, through the IOCTL interface driver, the new application protocol request over the IOCTL command to the BMC.Type: GrantFiled: July 19, 2017Date of Patent: August 18, 2020Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Lee A. Preimesberger, Jorge Daniel Cisneros, Thomas A. Schwartz
-
Patent number: 10341186Abstract: Examples provided relate to adding a network unit to a management group. An example method includes receiving a numeric code on a first network unit from a button on a front panel of the first network unit. The numeric code is received on a second network unit using a button on a front panel of the second network unit. The first network unit is added to the management group of the second network unit.Type: GrantFiled: April 17, 2015Date of Patent: July 2, 2019Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Lee A. Preimesberger, Jorge Daniel Cisneros, Wei-Chao Chen
-
Patent number: 10282549Abstract: In an example, a device comprises a baseboard management controller (BMC). The BMC comprises non-volatile storage storing a service operating system (OS). The BMC also comprises a processor. The processor may: receive, by a baseboard management controller (BMC), a request to modify the non-volatile storage, wherein the request comprises a signature, determine, by the BMC, based on a received signature, and a key for modifying the non-volatile storage, whether the request to modify the non-volatile storage is properly signed, and responsive to determining the request to modify the non-volatile storage is properly signed: allow modification of the non-volatile storage.Type: GrantFiled: March 7, 2017Date of Patent: May 7, 2019Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Jorge Daniel Cisneros, Lee A. Preimesberger, Sean Pope
-
Publication number: 20190095593Abstract: Examples disclosed herein relate to using a baseboard management controller (BMC) of a computing device with a private and public key that is used for license provisioning. A public key is obtained from the BMC. The public key is sent to a license device external to the computing device. Encrypted license information is received from the license device. Decrypted license information is obtained from the BMC based on the encrypted license information.Type: ApplicationFiled: September 25, 2017Publication date: March 28, 2019Inventors: Jorge Daniel CISNEROS, Jeffrey A. NORDIN, Lee A. PREIMESBERGER
-
Publication number: 20190026125Abstract: A method disclosed herein relates to a proxy application that connects to an input/output controller (IOCTL) interface driver. The IOCTL interface driver transfers IOCTL commands to a baseboard management controller (BMC). The proxy application receives, through the IOCTL interface driver, an application protocol request over an IOCTL command from the BMC. The application protocol request includes a computing devices configuration, a computing devices configuration option, and user interface data. The proxy application also receives an update to the computing devices current configuration based on the computing devices configuration option. The proxy application generates a new application protocol request over the IOCTL command based on the update to the computing devices current configuration. The proxy application transmits, through the IOCTL interface driver, the new application protocol request over the IOCTL command to the BMC.Type: ApplicationFiled: July 19, 2017Publication date: January 24, 2019Inventors: Lee A. Preimesberger, Jorge Daniel Cisneros, Thomas A. Schwartz
-
Publication number: 20180260568Abstract: In an example, a device comprises a baseboard management controller (BMC). The BMC comprises non-volatile storage storing a service operating system (OS). The BMC also comprises a processor. The processor may: receive, by a baseboard management controller (BMC), a request to modify the non-volatile storage, wherein the request comprises a signature, determine, by the BMC, based on a received signature, and a key for modifying the non-volatile storage, whether the request to modify the non-volatile storage is properly signed, and responsive to determining the request to modify the non-volatile storage is properly signed: allow modification of the non-volatile storage.Type: ApplicationFiled: March 7, 2017Publication date: September 13, 2018Inventors: Jorge Daniel Cisneros, Lee A. Preimesberger, Sean Pope
-
Publication number: 20170207973Abstract: Examples provided relate to adding a network unit to a management group. An example method includes receiving a numeric code on a first network unit from a button on a front panel of the first network unit. The numeric code is received on a second network unit using a button on a front panel of the second network unit. The first network unit is added to the management group of the second network unit.Type: ApplicationFiled: April 17, 2015Publication date: July 20, 2017Inventors: Lee A. Preimesberger, Jorge Daniel Cisneros, Wei-Chao Chen
-
Publication number: 20160203017Abstract: A server system may include a baseboard management controller and a host system. The baseboard management controller may obtain an identification of a peer system over a management network connection. The baseboard management controller may provide the identification of the peer system to the host system. The host system may use the identification of the peer system to obtain a virtual machine image.Type: ApplicationFiled: September 25, 2013Publication date: July 14, 2016Inventors: Chris Davenport, Lee A Preimesberger, Eric A Ramirez, Tess Muir, Sangita Prajapati, Jorge Daniel Cisneros, James Ayvaz, Thomas A Schwartz
-
Publication number: 20160080359Abstract: A method includes upon receiving a request from a user to perform an operation on a device that is running under an operating system, authenticating the user on the basis of credential data that is retrieved from a data storage unit that is associated with a lights-out management (LOM) capability of the device. If authentication of the user is successful, the user is enabled to perform the operation.Type: ApplicationFiled: November 19, 2015Publication date: March 17, 2016Inventors: Cecil J. Ayvaz, Jorge Daniel Cisneros, Lee A. Preimesberger
-
Patent number: 9218462Abstract: A method includes upon receiving a request from a user to perform an operation on a device that is running under an operating system, authenticating the user on the basis of credential data that is retrieved from a data storage unit that is associated with a lights-out management (LOM) capability of the device. If authentication of the user is successful, the user is enabled to perform the operation.Type: GrantFiled: April 25, 2012Date of Patent: December 22, 2015Assignee: Hewlett Packard Enterprise Development LPInventors: Cemil J Ayvaz, Jorge Daniel Cisneros, Lee A Preimesberger
-
Publication number: 20130291064Abstract: A method includes upon receiving a request from a user to perform an operation on a device that is running under an operating system, authenticating the user on the basis of credential data that is retrieved from a data storage unit that is associated with a lights-out management (LOM) capability of the device. If authentication of the user is successful, the user is enabled to perform the operation.Type: ApplicationFiled: April 25, 2012Publication date: October 31, 2013Inventors: Cemil J. Ayvaz, Jorge Daniel Cisneros, Lee A. Preimesberger