Patents by Inventor Judith A. Furlong

Judith A. Furlong has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12287714
    Abstract: Techniques for management of virtual representations (e.g., digital twins) of infrastructure are disclosed. For example, a method comprises obtaining at least one virtual representation of an infrastructure, wherein the virtual representation represents the infrastructure in a first state. The method further comprises applying at least one dataset to the virtual representation to artificially advance the virtual representation to represent the infrastructure in a second state. The method further comprises obtaining results representing the infrastructure in the second state, responsive to applying the at least one dataset to the virtual representation, wherein at least a portion of the results are indicative of an issue with the infrastructure, and then initiating one or more debugging actions with respect to the infrastructure to address the issue.
    Type: Grant
    Filed: March 30, 2023
    Date of Patent: April 29, 2025
    Assignee: Dell Products L.P.
    Inventors: Judith A. Furlong, Said Tabet, Aidan O Mahony
  • Publication number: 20250062917
    Abstract: Systems and methods for cryptographic algorithm identity certificate selection in an Information Handling System (IHS) are described. In one embodiment, an IHS includes a processor, and a memory coupled to the processor. The memory stores program instructions that, upon execution, cause the processor to receive a Certificate Signing Request (CSR) from a server, sign the CSR with a first Cryptographic Algorithm Identity (CAI) key stored in the memory, and send the signed CSR to the server. The server is configured to identify a geographical region that is associated with the first CAI key, identify an approved cryptographic algorithm that is approved for use in the identified region, and send a second CAI key associated with the identified approved cryptographic algorithm. When the IHS receives the second CAI key from the server, it may perform a cryptographic operation using a cryptographic algorithm associated with the second CAI key.
    Type: Application
    Filed: August 15, 2023
    Publication date: February 20, 2025
    Applicant: Dell Products, L.P.
    Inventors: Eugene David Cho, Mukund P. Khatri, Milton Olavo Decarvalho Taveira, Judith A. Furlong
  • Patent number: 12231468
    Abstract: A Logically Composed System (LCS) resource policy enforcement system includes resource devices coupled to an LCS provisioning administrator device, a client system, and an orchestrator device coupled to the resource devices and the client system. The orchestrator device uses a first subset of the resource devices to provide an LCS to the client system based on a workload intent provided by the client system, associates the LCS with a client identifier for the client system, and tags each of the first subset of the resource devices being used to provide the LCS with the client identifier. The orchestrator device then identifies a LCS policy for the LCS and applies the LCS policy to each of the first subset of the resource devices tagged with the client identifier to cause the LCS policy to be enforced on the client system and the LCS provisioning administrator device.
    Type: Grant
    Filed: July 15, 2022
    Date of Patent: February 18, 2025
    Assignee: Dell Products L.P.
    Inventors: Douglas Lang Farley, Ethan A. Kaley, Judith Furlong, Geoffrey A. Reid, John Harwood, Gaurav Chawla
  • Publication number: 20250045415
    Abstract: Systems and methods control access to resources in a zero-trust computing environment. Requests for access to resources are tracked, including tracking determinations to grant or deny requested access. Based on the tracked requests, an identity tenant trust score is calculated based on users that request access to a resource and based on a number of such requests that are granted and denied. A hardware tenant trust score is calculated based on hardware that requests access to the resource and based on a number of such requests that are granted and denied. A software tenant trust score is calculated based on software applications that request access to the first resource and further and based on a number of such requests that are granted and denied. The identity tenant trust score, hardware tenant trust score and software tenant trust score are aggregated to generate a trust score for the resource.
    Type: Application
    Filed: August 1, 2023
    Publication date: February 6, 2025
    Applicant: Dell Products, L.P.
    Inventors: Deepak Gaikwad, Judith A. Furlong, Raj Suryavanshi, Biraj Silwal, Berke Belge, Chenhao Huang, Sarthak Madrecha
  • Publication number: 20250045414
    Abstract: Methods and systems are included for evaluating trust in resources of a zero-trust computing environment. A request is received from a user for access to a resource of the zero-trust environment. A trust score is calculated for the resource based on: users requesting access to the resource, hardware components used to request access to the resource, software applications used to request access to the resource, networks used to request access to the resource and data exposed by providing the requested access to the resource. The request from the user is evaluated based on policies of the zero-trust environment that govern access to the resource, where policies grant or deny access to the resource based in part on the calculated trust score of the resource.
    Type: Application
    Filed: August 1, 2023
    Publication date: February 6, 2025
    Applicant: Dell Products, L.P.
    Inventors: Deepak Gaikwad, Judith A. Furlong, Raj Suryavanshi, Biraj Silwal, Berke Belge, Chenhao Huang, Sarthak Madrecha
  • Publication number: 20250047710
    Abstract: Systems and methods provide controlled access to resources in a zero-trust computing environment. Requests for access to resources of the zero-trust environment are tracked, including identifying policies evaluated in response to requests for access to resources. Based on the tracked requests, policies are identified that were satisfied in granting access to resources and that were not satisfied in denying access to resources. Request for access to resources are evaluated based on a trust score for a resource that is calculated based on users requesting access to the resource, hardware requesting access to the resource, software applications requesting access to the resource, networks used to request access to the resource and data exposed by providing the requested access to the resource. The trust score for the resource is adjusted upwards based on the policies satisfied in granting requested access, and adjusted downwards based on policies not satisfied in denying requested access.
    Type: Application
    Filed: August 1, 2023
    Publication date: February 6, 2025
    Applicant: Dell Products, L.P.
    Inventors: Deepak Gaikwad, Judith A. Furlong, Raj Suryavanshi, Biraj Silwal, Berke Belge, Chenhao Huang, Sarthak Madrecha
  • Publication number: 20250047676
    Abstract: System and methods provide a visualization for use in configuring controlled access to resources in a zero-trust computing environment. A request from a user for access to a resource of the zero-trust environment is received. When visualization of the request is enabled, a visualization of the request is initiated. An identity tenant trust score for the resource is calculated based on a record of users requesting access to the first resource. A hardware tenant trust score is calculated based on a record of hardware requesting access to the resource. A software tenant trust score is calculated based on a record of software requesting access to the resource. The visualization that is generated displays the identity tenant trust score, the hardware tenant trust score and the software tenant trust score associated with the request.
    Type: Application
    Filed: August 1, 2023
    Publication date: February 6, 2025
    Applicant: Dell Products, L.P.
    Inventors: Deepak Gaikwad, Judith A. Furlong, Raj Suryavanshi, Biraj Silwal, Berke Belge, Chenhao Huang, Sarthak Madrecha
  • Publication number: 20250047679
    Abstract: Systems and methods are provided for controlling access to resources in a zero-trust computing environment. Requests for access to resources of the zero-trust environment are tracked, including tracking determinations to grant or deny access to resources of the environment. A trust score is calculated for a resource based on users requesting access to the resource, hardware components requesting access to the resource, software applications requesting access to the resource, networks used to request access to the resource and data exposed by providing the requested access to the resource. The trust score of the resource is adjusted upwards based on determinations to grant access to the resource and downwards based on determinations to deny access to the resource. Request for access to the resource are evaluated based on policies of the zero-trust environment that govern access to the resource, based in part on the adjusted trust score of the resource.
    Type: Application
    Filed: August 1, 2023
    Publication date: February 6, 2025
    Applicant: Dell Products, L.P.
    Inventors: Deepak Gaikwad, Judith A. Furlong, Raj Suryavanshi, Biraj Silwal, Berke Belge, Chenhao Huang, Sarthak Madrecha
  • Patent number: 12155645
    Abstract: Embodiments of systems and methods to provide a firmware update to devices configured in a redundant configuration in an Information Handling System (IHS) are disclosed. In an illustrative, non-limiting embodiment, an IHS may include computer-executable instructions to, when a signed certificate associated with a client expires, challenge the client by transmitting a first plurality of keys to a client IHS, wherein the client IHS is configured to respond the challenge by associating each of the keys with a second plurality of keys, pairing each of the first key with its associated second key, sending the paired first and second keys to the server IHS, and authenticate the client IHS by verifying that each of the first plurality of keys is associated with the second plurality of keys.
    Type: Grant
    Filed: October 27, 2022
    Date of Patent: November 26, 2024
    Assignee: Dell Products, L.P.
    Inventors: Viswanath Ponnuru, Magesh Kumar Sivaswamy, Judith A. Furlong
  • Publication number: 20240330532
    Abstract: A method obtains at least one virtual representation representing an infrastructure in a first state and applies a first dataset to the virtual representation to artificially advance the virtual representation to represent the infrastructure in a second state. The method obtains results representing the infrastructure in the second state, wherein at least a portion of the results are indicative of a predicted condition associated with the infrastructure based on usage of the infrastructure. The method applies a second dataset to the virtual representation to artificially advance the virtual representation to represent the infrastructure in a third state and obtains results representing the infrastructure in the third state, wherein at least a portion of the results are indicative of an outcome to a solution applied via the second dataset to the predicted condition associated with the infrastructure.
    Type: Application
    Filed: March 30, 2023
    Publication date: October 3, 2024
    Inventors: Judith A. Furlong, Aidan O Mahony, Said Tabet, Robert A. Lincourt, JR.
  • Publication number: 20240330531
    Abstract: A method obtains at least one virtual representation of an infrastructure, wherein the virtual representation represents the infrastructure in a first state. The method applies a dataset to the virtual representation to artificially advance the virtual representation to represent the infrastructure in a second state. The method obtains results representing the infrastructure in the second state, responsive to applying the dataset to the virtual representation, wherein at least a portion of the results are indicative of a predicted power consumption associated with the infrastructure. The method initiates one or more actions with respect to the infrastructure in accordance with the predicted power consumption.
    Type: Application
    Filed: March 30, 2023
    Publication date: October 3, 2024
    Inventors: Judith A. Furlong, Aidan O Mahony, Said Tabet, Robert A. Lincourt, JR.
  • Publication number: 20240330529
    Abstract: Techniques for management of virtual representations (e.g., digital twins) of infrastructure are disclosed. For example, a method comprises obtaining at least one virtual representation of an infrastructure, wherein the virtual representation represents the infrastructure in a first state, and applying at least one dataset to the virtual representation to artificially advance the virtual representation to represent the infrastructure in a second state. The method further comprises obtaining results representing the infrastructure in the second state, responsive to applying the at least one dataset to the virtual representation, wherein at least a portion of the results are indicative of a cybersecurity issue on the infrastructure, and then initiating one or more of a remedial action and a preventative action with respect to the infrastructure to address the cybersecurity issue.
    Type: Application
    Filed: March 30, 2023
    Publication date: October 3, 2024
    Inventors: Said Tabet, Judith A. Furlong, Aidan O Mahony
  • Publication number: 20240330136
    Abstract: Techniques for management of virtual representations (e.g., digital twins) of infrastructure are disclosed. For example, a method comprises obtaining at least one virtual representation of an infrastructure, wherein the virtual representation represents the infrastructure in a first state. The method further comprises applying at least one dataset to the virtual representation to artificially advance the virtual representation to represent the infrastructure in a second state. The method further comprises obtaining results representing the infrastructure in the second state, responsive to applying the at least one dataset to the virtual representation, wherein at least a portion of the results are indicative of an issue with the infrastructure, and then initiating one or more debugging actions with respect to the infrastructure to address the issue.
    Type: Application
    Filed: March 30, 2023
    Publication date: October 3, 2024
    Inventors: Judith A. Furlong, Said Tabet, Aidan O Mahony
  • Publication number: 20240330530
    Abstract: A method obtains at least one virtual representation representing an infrastructure in a first state and applies a first dataset to the virtual representation to artificially advance the virtual representation to represent the infrastructure in a second state. The method obtains results representing the infrastructure in the second state, wherein at least a portion of the results are indicative of a predicted health condition associated with the infrastructure. The method applies a second dataset to the virtual representation to artificially advance the virtual representation to represent the infrastructure in a third state and obtains results representing the infrastructure in the third state, wherein at least a portion of the results are indicative of an outcome to a solution applied via the second dataset to the predicted health condition associated with the infrastructure.
    Type: Application
    Filed: March 30, 2023
    Publication date: October 3, 2024
    Inventors: Judith A. Furlong, Aidan O Mahony, Robert A. Lincourt, JR., Said Tabet
  • Publication number: 20240330544
    Abstract: A method identifies training data from at least one of a plurality of data sources, wherein the identified training data is determined to be suitable for a use case for which the model is to be used for representing the infrastructure. The method trains the model based on the identified training data. The method monitors at least one of a performance and an accuracy of the model. The method identifies different training data from at least one of the plurality of data sources, responsive to the monitoring, wherein the identified different training data is determined to be more suitable for the use case for which the model is to be used for representing the infrastructure. The method retrains the model based on the identified different training data.
    Type: Application
    Filed: March 30, 2023
    Publication date: October 3, 2024
    Inventors: Judith A. Furlong, Said Tabet, Aidan O Mahony, Robert A. Lincourt, JR.
  • Publication number: 20240330533
    Abstract: A method obtains at least one virtual representation of an infrastructure, wherein the virtual representation represents the infrastructure. The method applies, in a plurality of iterations, a plurality of simulated workloads to the virtual representation to artificially advance the virtual representation to generate a plurality of datasets respectively representing the infrastructure in a plurality of states. The method applies one or more gamification processes, between one or more of the plurality of iterations, to alter the corresponding one or more datasets generated by the virtual representation, wherein the one or more altered datasets are applied to the virtual representation along with one or more of the plurality of simulated workloads to represent the infrastructure in one or more subsequent states of the plurality of states. The method obtains gamification results representing the infrastructure, responsive to applying the one or more gamification processes.
    Type: Application
    Filed: March 30, 2023
    Publication date: October 3, 2024
    Inventors: Robert A. Lincourt, JR., Said Tabet, Aidan O Mahony, Judith A. Furlong
  • Publication number: 20240256320
    Abstract: A method for processing a function command for a peripheral device, the method that includes obtaining, by a device controller intermediary, a function command from a virtual machine, where the function command is associated with a peripheral device, performing a lookup, in a function policy database to identify an emulated function policy associated with the function command, making a determination that the function command does not violate the emulated function policy, and in response to the determination, forwarding the function command to the peripheral device.
    Type: Application
    Filed: January 27, 2023
    Publication date: August 1, 2024
    Inventors: William Price Dawkins, John S. Harwood, Douglas L. Farley, David Craig Lawson, Srinivas Giri Raju Gowda, Shawan M. Swanson, Judith A. Furlong
  • Publication number: 20240256319
    Abstract: A method for processing a function command, the method that includes obtaining, by a device controller intermediary, a function command from a virtual machine, where the function command is associated with a peripheral device, making a first determination that the function command is associated with a remote peripheral device, forwarding the function command to the remote peripheral device, and in response to forwarding the function command, receiving processed data from the remote peripheral device, and providing the processed data to the virtual machine.
    Type: Application
    Filed: January 27, 2023
    Publication date: August 1, 2024
    Inventors: William Price Dawkins, John S. Harwood, Douglas Lang Farley, David Craig Lawson, Srinivas Giri Raju Gowda, Shawn M. Swanson, Judith A. Furlong
  • Patent number: 12009991
    Abstract: Techniques for management of virtual representations (e.g., digital twins) of infrastructure are disclosed. For example, a method comprises obtaining at least one virtual representation of an infrastructure, wherein the virtual representation represents the infrastructure in a first state. The method further comprises applying at least one dataset to the virtual representation to artificially advance the virtual representation to represent the infrastructure in a second state.
    Type: Grant
    Filed: March 30, 2023
    Date of Patent: June 11, 2024
    Assignee: Dell Products L.P.
    Inventors: Judith A. Furlong, Said Tabet, Robert A. Lincourt, Jr., Aidan O Mahony
  • Publication number: 20240146715
    Abstract: Embodiments of systems and methods to provide a firmware update to devices configured in a redundant configuration in an Information Handling System (IHS) are disclosed. In an illustrative, non-limiting embodiment, an IHS may include computer-executable instructions to, when a signed certificate associated with a client expires, challenge the client by transmitting a first plurality of keys to a client IHS, wherein the client IHS is configured to respond the challenge by associating each of the keys with a second plurality of keys, pairing each of the first key with its associated second key, sending the paired first and second keys to the server IHS, and authenticate the client IHS by verifying that each of the first plurality of keys is associated with the second plurality of keys.
    Type: Application
    Filed: October 27, 2022
    Publication date: May 2, 2024
    Applicant: Dell Products, L.P.
    Inventors: Viswanath Ponnuru, Magesh Kumar Sivaswamy, Judith A. Furlong