Patents by Inventor Judith A. Furlong
Judith A. Furlong has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12287714Abstract: Techniques for management of virtual representations (e.g., digital twins) of infrastructure are disclosed. For example, a method comprises obtaining at least one virtual representation of an infrastructure, wherein the virtual representation represents the infrastructure in a first state. The method further comprises applying at least one dataset to the virtual representation to artificially advance the virtual representation to represent the infrastructure in a second state. The method further comprises obtaining results representing the infrastructure in the second state, responsive to applying the at least one dataset to the virtual representation, wherein at least a portion of the results are indicative of an issue with the infrastructure, and then initiating one or more debugging actions with respect to the infrastructure to address the issue.Type: GrantFiled: March 30, 2023Date of Patent: April 29, 2025Assignee: Dell Products L.P.Inventors: Judith A. Furlong, Said Tabet, Aidan O Mahony
-
Publication number: 20250062917Abstract: Systems and methods for cryptographic algorithm identity certificate selection in an Information Handling System (IHS) are described. In one embodiment, an IHS includes a processor, and a memory coupled to the processor. The memory stores program instructions that, upon execution, cause the processor to receive a Certificate Signing Request (CSR) from a server, sign the CSR with a first Cryptographic Algorithm Identity (CAI) key stored in the memory, and send the signed CSR to the server. The server is configured to identify a geographical region that is associated with the first CAI key, identify an approved cryptographic algorithm that is approved for use in the identified region, and send a second CAI key associated with the identified approved cryptographic algorithm. When the IHS receives the second CAI key from the server, it may perform a cryptographic operation using a cryptographic algorithm associated with the second CAI key.Type: ApplicationFiled: August 15, 2023Publication date: February 20, 2025Applicant: Dell Products, L.P.Inventors: Eugene David Cho, Mukund P. Khatri, Milton Olavo Decarvalho Taveira, Judith A. Furlong
-
Patent number: 12231468Abstract: A Logically Composed System (LCS) resource policy enforcement system includes resource devices coupled to an LCS provisioning administrator device, a client system, and an orchestrator device coupled to the resource devices and the client system. The orchestrator device uses a first subset of the resource devices to provide an LCS to the client system based on a workload intent provided by the client system, associates the LCS with a client identifier for the client system, and tags each of the first subset of the resource devices being used to provide the LCS with the client identifier. The orchestrator device then identifies a LCS policy for the LCS and applies the LCS policy to each of the first subset of the resource devices tagged with the client identifier to cause the LCS policy to be enforced on the client system and the LCS provisioning administrator device.Type: GrantFiled: July 15, 2022Date of Patent: February 18, 2025Assignee: Dell Products L.P.Inventors: Douglas Lang Farley, Ethan A. Kaley, Judith Furlong, Geoffrey A. Reid, John Harwood, Gaurav Chawla
-
Publication number: 20250045415Abstract: Systems and methods control access to resources in a zero-trust computing environment. Requests for access to resources are tracked, including tracking determinations to grant or deny requested access. Based on the tracked requests, an identity tenant trust score is calculated based on users that request access to a resource and based on a number of such requests that are granted and denied. A hardware tenant trust score is calculated based on hardware that requests access to the resource and based on a number of such requests that are granted and denied. A software tenant trust score is calculated based on software applications that request access to the first resource and further and based on a number of such requests that are granted and denied. The identity tenant trust score, hardware tenant trust score and software tenant trust score are aggregated to generate a trust score for the resource.Type: ApplicationFiled: August 1, 2023Publication date: February 6, 2025Applicant: Dell Products, L.P.Inventors: Deepak Gaikwad, Judith A. Furlong, Raj Suryavanshi, Biraj Silwal, Berke Belge, Chenhao Huang, Sarthak Madrecha
-
Publication number: 20250045414Abstract: Methods and systems are included for evaluating trust in resources of a zero-trust computing environment. A request is received from a user for access to a resource of the zero-trust environment. A trust score is calculated for the resource based on: users requesting access to the resource, hardware components used to request access to the resource, software applications used to request access to the resource, networks used to request access to the resource and data exposed by providing the requested access to the resource. The request from the user is evaluated based on policies of the zero-trust environment that govern access to the resource, where policies grant or deny access to the resource based in part on the calculated trust score of the resource.Type: ApplicationFiled: August 1, 2023Publication date: February 6, 2025Applicant: Dell Products, L.P.Inventors: Deepak Gaikwad, Judith A. Furlong, Raj Suryavanshi, Biraj Silwal, Berke Belge, Chenhao Huang, Sarthak Madrecha
-
Publication number: 20250047710Abstract: Systems and methods provide controlled access to resources in a zero-trust computing environment. Requests for access to resources of the zero-trust environment are tracked, including identifying policies evaluated in response to requests for access to resources. Based on the tracked requests, policies are identified that were satisfied in granting access to resources and that were not satisfied in denying access to resources. Request for access to resources are evaluated based on a trust score for a resource that is calculated based on users requesting access to the resource, hardware requesting access to the resource, software applications requesting access to the resource, networks used to request access to the resource and data exposed by providing the requested access to the resource. The trust score for the resource is adjusted upwards based on the policies satisfied in granting requested access, and adjusted downwards based on policies not satisfied in denying requested access.Type: ApplicationFiled: August 1, 2023Publication date: February 6, 2025Applicant: Dell Products, L.P.Inventors: Deepak Gaikwad, Judith A. Furlong, Raj Suryavanshi, Biraj Silwal, Berke Belge, Chenhao Huang, Sarthak Madrecha
-
Publication number: 20250047676Abstract: System and methods provide a visualization for use in configuring controlled access to resources in a zero-trust computing environment. A request from a user for access to a resource of the zero-trust environment is received. When visualization of the request is enabled, a visualization of the request is initiated. An identity tenant trust score for the resource is calculated based on a record of users requesting access to the first resource. A hardware tenant trust score is calculated based on a record of hardware requesting access to the resource. A software tenant trust score is calculated based on a record of software requesting access to the resource. The visualization that is generated displays the identity tenant trust score, the hardware tenant trust score and the software tenant trust score associated with the request.Type: ApplicationFiled: August 1, 2023Publication date: February 6, 2025Applicant: Dell Products, L.P.Inventors: Deepak Gaikwad, Judith A. Furlong, Raj Suryavanshi, Biraj Silwal, Berke Belge, Chenhao Huang, Sarthak Madrecha
-
Publication number: 20250047679Abstract: Systems and methods are provided for controlling access to resources in a zero-trust computing environment. Requests for access to resources of the zero-trust environment are tracked, including tracking determinations to grant or deny access to resources of the environment. A trust score is calculated for a resource based on users requesting access to the resource, hardware components requesting access to the resource, software applications requesting access to the resource, networks used to request access to the resource and data exposed by providing the requested access to the resource. The trust score of the resource is adjusted upwards based on determinations to grant access to the resource and downwards based on determinations to deny access to the resource. Request for access to the resource are evaluated based on policies of the zero-trust environment that govern access to the resource, based in part on the adjusted trust score of the resource.Type: ApplicationFiled: August 1, 2023Publication date: February 6, 2025Applicant: Dell Products, L.P.Inventors: Deepak Gaikwad, Judith A. Furlong, Raj Suryavanshi, Biraj Silwal, Berke Belge, Chenhao Huang, Sarthak Madrecha
-
Patent number: 12155645Abstract: Embodiments of systems and methods to provide a firmware update to devices configured in a redundant configuration in an Information Handling System (IHS) are disclosed. In an illustrative, non-limiting embodiment, an IHS may include computer-executable instructions to, when a signed certificate associated with a client expires, challenge the client by transmitting a first plurality of keys to a client IHS, wherein the client IHS is configured to respond the challenge by associating each of the keys with a second plurality of keys, pairing each of the first key with its associated second key, sending the paired first and second keys to the server IHS, and authenticate the client IHS by verifying that each of the first plurality of keys is associated with the second plurality of keys.Type: GrantFiled: October 27, 2022Date of Patent: November 26, 2024Assignee: Dell Products, L.P.Inventors: Viswanath Ponnuru, Magesh Kumar Sivaswamy, Judith A. Furlong
-
Publication number: 20240330532Abstract: A method obtains at least one virtual representation representing an infrastructure in a first state and applies a first dataset to the virtual representation to artificially advance the virtual representation to represent the infrastructure in a second state. The method obtains results representing the infrastructure in the second state, wherein at least a portion of the results are indicative of a predicted condition associated with the infrastructure based on usage of the infrastructure. The method applies a second dataset to the virtual representation to artificially advance the virtual representation to represent the infrastructure in a third state and obtains results representing the infrastructure in the third state, wherein at least a portion of the results are indicative of an outcome to a solution applied via the second dataset to the predicted condition associated with the infrastructure.Type: ApplicationFiled: March 30, 2023Publication date: October 3, 2024Inventors: Judith A. Furlong, Aidan O Mahony, Said Tabet, Robert A. Lincourt, JR.
-
Publication number: 20240330531Abstract: A method obtains at least one virtual representation of an infrastructure, wherein the virtual representation represents the infrastructure in a first state. The method applies a dataset to the virtual representation to artificially advance the virtual representation to represent the infrastructure in a second state. The method obtains results representing the infrastructure in the second state, responsive to applying the dataset to the virtual representation, wherein at least a portion of the results are indicative of a predicted power consumption associated with the infrastructure. The method initiates one or more actions with respect to the infrastructure in accordance with the predicted power consumption.Type: ApplicationFiled: March 30, 2023Publication date: October 3, 2024Inventors: Judith A. Furlong, Aidan O Mahony, Said Tabet, Robert A. Lincourt, JR.
-
Publication number: 20240330529Abstract: Techniques for management of virtual representations (e.g., digital twins) of infrastructure are disclosed. For example, a method comprises obtaining at least one virtual representation of an infrastructure, wherein the virtual representation represents the infrastructure in a first state, and applying at least one dataset to the virtual representation to artificially advance the virtual representation to represent the infrastructure in a second state. The method further comprises obtaining results representing the infrastructure in the second state, responsive to applying the at least one dataset to the virtual representation, wherein at least a portion of the results are indicative of a cybersecurity issue on the infrastructure, and then initiating one or more of a remedial action and a preventative action with respect to the infrastructure to address the cybersecurity issue.Type: ApplicationFiled: March 30, 2023Publication date: October 3, 2024Inventors: Said Tabet, Judith A. Furlong, Aidan O Mahony
-
Publication number: 20240330136Abstract: Techniques for management of virtual representations (e.g., digital twins) of infrastructure are disclosed. For example, a method comprises obtaining at least one virtual representation of an infrastructure, wherein the virtual representation represents the infrastructure in a first state. The method further comprises applying at least one dataset to the virtual representation to artificially advance the virtual representation to represent the infrastructure in a second state. The method further comprises obtaining results representing the infrastructure in the second state, responsive to applying the at least one dataset to the virtual representation, wherein at least a portion of the results are indicative of an issue with the infrastructure, and then initiating one or more debugging actions with respect to the infrastructure to address the issue.Type: ApplicationFiled: March 30, 2023Publication date: October 3, 2024Inventors: Judith A. Furlong, Said Tabet, Aidan O Mahony
-
Publication number: 20240330530Abstract: A method obtains at least one virtual representation representing an infrastructure in a first state and applies a first dataset to the virtual representation to artificially advance the virtual representation to represent the infrastructure in a second state. The method obtains results representing the infrastructure in the second state, wherein at least a portion of the results are indicative of a predicted health condition associated with the infrastructure. The method applies a second dataset to the virtual representation to artificially advance the virtual representation to represent the infrastructure in a third state and obtains results representing the infrastructure in the third state, wherein at least a portion of the results are indicative of an outcome to a solution applied via the second dataset to the predicted health condition associated with the infrastructure.Type: ApplicationFiled: March 30, 2023Publication date: October 3, 2024Inventors: Judith A. Furlong, Aidan O Mahony, Robert A. Lincourt, JR., Said Tabet
-
Publication number: 20240330544Abstract: A method identifies training data from at least one of a plurality of data sources, wherein the identified training data is determined to be suitable for a use case for which the model is to be used for representing the infrastructure. The method trains the model based on the identified training data. The method monitors at least one of a performance and an accuracy of the model. The method identifies different training data from at least one of the plurality of data sources, responsive to the monitoring, wherein the identified different training data is determined to be more suitable for the use case for which the model is to be used for representing the infrastructure. The method retrains the model based on the identified different training data.Type: ApplicationFiled: March 30, 2023Publication date: October 3, 2024Inventors: Judith A. Furlong, Said Tabet, Aidan O Mahony, Robert A. Lincourt, JR.
-
Publication number: 20240330533Abstract: A method obtains at least one virtual representation of an infrastructure, wherein the virtual representation represents the infrastructure. The method applies, in a plurality of iterations, a plurality of simulated workloads to the virtual representation to artificially advance the virtual representation to generate a plurality of datasets respectively representing the infrastructure in a plurality of states. The method applies one or more gamification processes, between one or more of the plurality of iterations, to alter the corresponding one or more datasets generated by the virtual representation, wherein the one or more altered datasets are applied to the virtual representation along with one or more of the plurality of simulated workloads to represent the infrastructure in one or more subsequent states of the plurality of states. The method obtains gamification results representing the infrastructure, responsive to applying the one or more gamification processes.Type: ApplicationFiled: March 30, 2023Publication date: October 3, 2024Inventors: Robert A. Lincourt, JR., Said Tabet, Aidan O Mahony, Judith A. Furlong
-
Publication number: 20240256320Abstract: A method for processing a function command for a peripheral device, the method that includes obtaining, by a device controller intermediary, a function command from a virtual machine, where the function command is associated with a peripheral device, performing a lookup, in a function policy database to identify an emulated function policy associated with the function command, making a determination that the function command does not violate the emulated function policy, and in response to the determination, forwarding the function command to the peripheral device.Type: ApplicationFiled: January 27, 2023Publication date: August 1, 2024Inventors: William Price Dawkins, John S. Harwood, Douglas L. Farley, David Craig Lawson, Srinivas Giri Raju Gowda, Shawan M. Swanson, Judith A. Furlong
-
Publication number: 20240256319Abstract: A method for processing a function command, the method that includes obtaining, by a device controller intermediary, a function command from a virtual machine, where the function command is associated with a peripheral device, making a first determination that the function command is associated with a remote peripheral device, forwarding the function command to the remote peripheral device, and in response to forwarding the function command, receiving processed data from the remote peripheral device, and providing the processed data to the virtual machine.Type: ApplicationFiled: January 27, 2023Publication date: August 1, 2024Inventors: William Price Dawkins, John S. Harwood, Douglas Lang Farley, David Craig Lawson, Srinivas Giri Raju Gowda, Shawn M. Swanson, Judith A. Furlong
-
Patent number: 12009991Abstract: Techniques for management of virtual representations (e.g., digital twins) of infrastructure are disclosed. For example, a method comprises obtaining at least one virtual representation of an infrastructure, wherein the virtual representation represents the infrastructure in a first state. The method further comprises applying at least one dataset to the virtual representation to artificially advance the virtual representation to represent the infrastructure in a second state.Type: GrantFiled: March 30, 2023Date of Patent: June 11, 2024Assignee: Dell Products L.P.Inventors: Judith A. Furlong, Said Tabet, Robert A. Lincourt, Jr., Aidan O Mahony
-
Publication number: 20240146715Abstract: Embodiments of systems and methods to provide a firmware update to devices configured in a redundant configuration in an Information Handling System (IHS) are disclosed. In an illustrative, non-limiting embodiment, an IHS may include computer-executable instructions to, when a signed certificate associated with a client expires, challenge the client by transmitting a first plurality of keys to a client IHS, wherein the client IHS is configured to respond the challenge by associating each of the keys with a second plurality of keys, pairing each of the first key with its associated second key, sending the paired first and second keys to the server IHS, and authenticate the client IHS by verifying that each of the first plurality of keys is associated with the second plurality of keys.Type: ApplicationFiled: October 27, 2022Publication date: May 2, 2024Applicant: Dell Products, L.P.Inventors: Viswanath Ponnuru, Magesh Kumar Sivaswamy, Judith A. Furlong