Patents by Inventor KARTHIKEYAN RAJAGOPALAN
KARTHIKEYAN RAJAGOPALAN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12026291Abstract: A method for managing a storage system includes initiating, by a hardware resource manager, a boot-up of a storage controller managing the storage system comprising a plurality of storage devices, making a determination, by the storage controller, that the storage controller is in a secured mode, based on the determination: identifying a security state of each of the plurality of storage devices, determining that a storage device of the plurality of storage devices is in an unsecured state, and based on the unsecured state, sending, by the storage controller, a security operation request for securing the storage device, obtaining a secure state response from the hardware resource manager corresponding to securing the storage device, and based on the secure state response, resuming operation of the storage controller based on the secure mode.Type: GrantFiled: January 21, 2022Date of Patent: July 2, 2024Assignee: DELL PRODUCTS L.P.Inventors: Mukund Khatri, Sanjeev S. Dambal, Chandrashekar Nelogal, Karthikeyan Rajagopalan, Craig Warren Phelps
-
Patent number: 11838408Abstract: A disclosed method for managing encryption keys, which may be performed by a key management server, responds to receiving, from a first client, a request to create a new key for a self-encrypting drive (SED) associated with the first client by retrieving unique identifiers of the first client and the SED, generating and storing the new key and a corresponding key identifier (KeyID), and associating the unique identifiers of the SED and first client with the new key. Upon receiving, from a second client, a locate key request that includes the SED identifier, providing the new key, the KeyID, and the first client identifier to the second client. Associating the SED and first client identifiers with the new key may include adding the identifiers as attributes of the KeyID. Embodiments may be implemented in accordance with a key management interoperability protocol (KMIP) standard.Type: GrantFiled: April 28, 2021Date of Patent: December 5, 2023Assignee: Dell Products L.P.Inventors: Karthik Arunachalam, Vigneswaran Ponnusamy, Karthikeyan Rajagopalan, Sanjeev Dambal, Kumaran Palaniappan Thangavelu
-
Patent number: 11740806Abstract: An information handling system may include a processor and a management controller communicatively coupled to the processor. The management controller may be configured to, in response to an encrypted storage resource being coupled to the information handling system: transmitting a request to at least one other management controller for an encryption key associated with the encrypted storage resource; receiving a response from the at least one other management controller, the response including the encryption key associated with the encrypted storage resource; and unlocking the encrypted storage resource with the received encryption key.Type: GrantFiled: April 29, 2021Date of Patent: August 29, 2023Assignee: Dell Products L.P.Inventors: Sanjeev Dambal, Kumaran Palaniappan, Vigneswaran Ponnusamy, Karthikeyan Rajagopalan, Karthik Arunachalam
-
Publication number: 20230237204Abstract: A method for managing a storage system includes initiating, by a hardware resource manager, a boot-up of a storage controller managing the storage system comprising a plurality of storage devices, making a determination, by the storage controller, that the storage controller is in a secured mode, based on the determination: identifying a security state of each of the plurality of storage devices, determining that a storage device of the plurality of storage devices is in an unsecured state, and based on the unsecured state, sending, by the storage controller, a security operation request for securing the storage device, obtaining a secure state response from the hardware resource manager corresponding to securing the storage device, and based on the secure state response, resuming operation of the storage controller based on the secure mode.Type: ApplicationFiled: January 21, 2022Publication date: July 27, 2023Inventors: Mukund Khatri, Sanjeev S. Dambal, Chandrashekar Nelogal, Karthikeyan Rajagopalan, Craig Warren Phelps
-
Publication number: 20220350501Abstract: An information handling system may include a processor and a management controller communicatively coupled to the processor. The management controller may be configured to, in response to an encrypted storage resource being coupled to the information handling system: transmitting a request to at least one other management controller for an encryption key associated with the encrypted storage resource; receiving a response from the at least one other management controller, the response including the encryption key associated with the encrypted storage resource; and unlocking the encrypted storage resource with the received encryption key.Type: ApplicationFiled: April 29, 2021Publication date: November 3, 2022Applicant: Dell Products L.P.Inventors: Sanjeev DAMBAL, Kumaran PALANIAPPAN, Vigneswaran PONNUSAMY, Karthikeyan RAJAGOPALAN, Karthik ARUNACHALAM
-
Publication number: 20220353057Abstract: A disclosed method for managing encryption keys, which may be performed by a key management server, responds to receiving, from a first client, a request to create a new key for a self-encrypting drive (SED) associated with the first client by retrieving unique identifiers of the first client and the SED, generating and storing the new key and a corresponding key identifier (KeyID), and associating the unique identifiers of the SED and first client with the new key. Upon receiving, from a second client, a locate key request that includes the SED identifier, providing the new key, the KeyID, and the first client identifier to the second client. Associating the SED and first client identifiers with the new key may include adding the identifiers as attributes of the KeyID. Embodiments may be implemented in accordance with a key management interoperability protocol (KMIP) standard.Type: ApplicationFiled: April 28, 2021Publication date: November 3, 2022Applicant: Dell Products L.P.Inventors: Karthik ARUNACHALAM, Vigneswaran PONNUSAMY, Karthikeyan RAJAGOPALAN, Sanjeev DAMBAL, Kumaran Palaniappan THANGAVELU
-
Publication number: 20220350930Abstract: An information handling system may include a processor; an encrypted storage resource, wherein the encrypted storage resource is coupled to the information handling system via a storage controller that does not implement locking and unlocking functionality for the encrypted storage resource; and a management controller configured to: receive a request to unlock the encrypted storage resource; determine an encryption key associated with the encrypted storage resource; and unlock the encrypted storage resource with the received encryption key via a sideband interface coupling the management controller to the encrypted storage resource.Type: ApplicationFiled: April 29, 2021Publication date: November 3, 2022Applicant: Dell Products L.P.Inventors: Sanjeev DAMBAL, Vigneswaran PONNUSAMY, Kumaran PALANIAPPAN, Karthikeyan RAJAGOPALAN, Karthik ARUNACHALAM
-
Patent number: 11146389Abstract: An information handling system includes a first node configured to generate a random alphanumeric string, to receive a cipher text and a key from an enterprise key management server, and to decrypt the cipher text using the key and an algorithm to generate a first decrypted value. The first node compares the random alphanumeric string with the first decrypted value to verify the key that is received at the first node. A second node receives the cipher text, the key, and the algorithm from the first node in response to the first decrypted value matching the random alphanumeric string. The second node decrypts the cipher text using the key and the algorithm to generate a second decrypted value, and the first node compares the second decrypted value with the random alphanumeric string to verify the key that is received at the second node.Type: GrantFiled: September 4, 2019Date of Patent: October 12, 2021Assignee: Dell Products L.P.Inventors: Sanjeev Dambal, Chandrashekar Nelogal, Karthikeyan Rajagopalan, Texas Roemer
-
Publication number: 20210067323Abstract: An information handling system includes a first node configured to generate a random alphanumeric string, to receive a cipher text and a key from an enterprise key management server, and to decrypt the cipher text using the key and an algorithm to generate a first decrypted value. The first node compares the random alphanumeric string with the first decrypted value to verify the key that is received at the first node. A second node receives the cipher text, the key, and the algorithm from the first node in response to the first decrypted value matching the random alphanumeric string. The second node decrypts the cipher text using the key and the algorithm to generate a second decrypted value, and the first node compares the second decrypted value with the random alphanumeric string to verify the key that is received at the second node.Type: ApplicationFiled: September 4, 2019Publication date: March 4, 2021Inventors: Sanjeev Dambal, Chandrashekar Nelogal, Karthikeyan Rajagopalan, Texas Roemer
-
Publication number: 20160085604Abstract: A solution for providing an infrastructure for a generated application created from a model-driven application development framework to invoke an external library is realized that is targeted for situations when an operating platform of the generated application is different than that of the external library. First, a proxy host receives a call from the generated application to invoke a method. An intermediate library is loaded, and the call is marshaled from the proxy host to the intermediate library. Finally, an external library is loaded by the intermediate library and invokes the method that the runtime wants to invoke.Type: ApplicationFiled: August 25, 2015Publication date: March 24, 2016Applicant: UNISYS CORPORATIONInventor: KARTHIKEYAN RAJAGOPALAN