Patents by Inventor KARTHIKEYAN RAJAGOPALAN

KARTHIKEYAN RAJAGOPALAN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11838408
    Abstract: A disclosed method for managing encryption keys, which may be performed by a key management server, responds to receiving, from a first client, a request to create a new key for a self-encrypting drive (SED) associated with the first client by retrieving unique identifiers of the first client and the SED, generating and storing the new key and a corresponding key identifier (KeyID), and associating the unique identifiers of the SED and first client with the new key. Upon receiving, from a second client, a locate key request that includes the SED identifier, providing the new key, the KeyID, and the first client identifier to the second client. Associating the SED and first client identifiers with the new key may include adding the identifiers as attributes of the KeyID. Embodiments may be implemented in accordance with a key management interoperability protocol (KMIP) standard.
    Type: Grant
    Filed: April 28, 2021
    Date of Patent: December 5, 2023
    Assignee: Dell Products L.P.
    Inventors: Karthik Arunachalam, Vigneswaran Ponnusamy, Karthikeyan Rajagopalan, Sanjeev Dambal, Kumaran Palaniappan Thangavelu
  • Patent number: 11740806
    Abstract: An information handling system may include a processor and a management controller communicatively coupled to the processor. The management controller may be configured to, in response to an encrypted storage resource being coupled to the information handling system: transmitting a request to at least one other management controller for an encryption key associated with the encrypted storage resource; receiving a response from the at least one other management controller, the response including the encryption key associated with the encrypted storage resource; and unlocking the encrypted storage resource with the received encryption key.
    Type: Grant
    Filed: April 29, 2021
    Date of Patent: August 29, 2023
    Assignee: Dell Products L.P.
    Inventors: Sanjeev Dambal, Kumaran Palaniappan, Vigneswaran Ponnusamy, Karthikeyan Rajagopalan, Karthik Arunachalam
  • Publication number: 20230237204
    Abstract: A method for managing a storage system includes initiating, by a hardware resource manager, a boot-up of a storage controller managing the storage system comprising a plurality of storage devices, making a determination, by the storage controller, that the storage controller is in a secured mode, based on the determination: identifying a security state of each of the plurality of storage devices, determining that a storage device of the plurality of storage devices is in an unsecured state, and based on the unsecured state, sending, by the storage controller, a security operation request for securing the storage device, obtaining a secure state response from the hardware resource manager corresponding to securing the storage device, and based on the secure state response, resuming operation of the storage controller based on the secure mode.
    Type: Application
    Filed: January 21, 2022
    Publication date: July 27, 2023
    Inventors: Mukund Khatri, Sanjeev S. Dambal, Chandrashekar Nelogal, Karthikeyan Rajagopalan, Craig Warren Phelps
  • Publication number: 20220353057
    Abstract: A disclosed method for managing encryption keys, which may be performed by a key management server, responds to receiving, from a first client, a request to create a new key for a self-encrypting drive (SED) associated with the first client by retrieving unique identifiers of the first client and the SED, generating and storing the new key and a corresponding key identifier (KeyID), and associating the unique identifiers of the SED and first client with the new key. Upon receiving, from a second client, a locate key request that includes the SED identifier, providing the new key, the KeyID, and the first client identifier to the second client. Associating the SED and first client identifiers with the new key may include adding the identifiers as attributes of the KeyID. Embodiments may be implemented in accordance with a key management interoperability protocol (KMIP) standard.
    Type: Application
    Filed: April 28, 2021
    Publication date: November 3, 2022
    Applicant: Dell Products L.P.
    Inventors: Karthik ARUNACHALAM, Vigneswaran PONNUSAMY, Karthikeyan RAJAGOPALAN, Sanjeev DAMBAL, Kumaran Palaniappan THANGAVELU
  • Publication number: 20220350930
    Abstract: An information handling system may include a processor; an encrypted storage resource, wherein the encrypted storage resource is coupled to the information handling system via a storage controller that does not implement locking and unlocking functionality for the encrypted storage resource; and a management controller configured to: receive a request to unlock the encrypted storage resource; determine an encryption key associated with the encrypted storage resource; and unlock the encrypted storage resource with the received encryption key via a sideband interface coupling the management controller to the encrypted storage resource.
    Type: Application
    Filed: April 29, 2021
    Publication date: November 3, 2022
    Applicant: Dell Products L.P.
    Inventors: Sanjeev DAMBAL, Vigneswaran PONNUSAMY, Kumaran PALANIAPPAN, Karthikeyan RAJAGOPALAN, Karthik ARUNACHALAM
  • Publication number: 20220350501
    Abstract: An information handling system may include a processor and a management controller communicatively coupled to the processor. The management controller may be configured to, in response to an encrypted storage resource being coupled to the information handling system: transmitting a request to at least one other management controller for an encryption key associated with the encrypted storage resource; receiving a response from the at least one other management controller, the response including the encryption key associated with the encrypted storage resource; and unlocking the encrypted storage resource with the received encryption key.
    Type: Application
    Filed: April 29, 2021
    Publication date: November 3, 2022
    Applicant: Dell Products L.P.
    Inventors: Sanjeev DAMBAL, Kumaran PALANIAPPAN, Vigneswaran PONNUSAMY, Karthikeyan RAJAGOPALAN, Karthik ARUNACHALAM
  • Patent number: 11146389
    Abstract: An information handling system includes a first node configured to generate a random alphanumeric string, to receive a cipher text and a key from an enterprise key management server, and to decrypt the cipher text using the key and an algorithm to generate a first decrypted value. The first node compares the random alphanumeric string with the first decrypted value to verify the key that is received at the first node. A second node receives the cipher text, the key, and the algorithm from the first node in response to the first decrypted value matching the random alphanumeric string. The second node decrypts the cipher text using the key and the algorithm to generate a second decrypted value, and the first node compares the second decrypted value with the random alphanumeric string to verify the key that is received at the second node.
    Type: Grant
    Filed: September 4, 2019
    Date of Patent: October 12, 2021
    Assignee: Dell Products L.P.
    Inventors: Sanjeev Dambal, Chandrashekar Nelogal, Karthikeyan Rajagopalan, Texas Roemer
  • Publication number: 20210067323
    Abstract: An information handling system includes a first node configured to generate a random alphanumeric string, to receive a cipher text and a key from an enterprise key management server, and to decrypt the cipher text using the key and an algorithm to generate a first decrypted value. The first node compares the random alphanumeric string with the first decrypted value to verify the key that is received at the first node. A second node receives the cipher text, the key, and the algorithm from the first node in response to the first decrypted value matching the random alphanumeric string. The second node decrypts the cipher text using the key and the algorithm to generate a second decrypted value, and the first node compares the second decrypted value with the random alphanumeric string to verify the key that is received at the second node.
    Type: Application
    Filed: September 4, 2019
    Publication date: March 4, 2021
    Inventors: Sanjeev Dambal, Chandrashekar Nelogal, Karthikeyan Rajagopalan, Texas Roemer
  • Publication number: 20160085604
    Abstract: A solution for providing an infrastructure for a generated application created from a model-driven application development framework to invoke an external library is realized that is targeted for situations when an operating platform of the generated application is different than that of the external library. First, a proxy host receives a call from the generated application to invoke a method. An intermediate library is loaded, and the call is marshaled from the proxy host to the intermediate library. Finally, an external library is loaded by the intermediate library and invokes the method that the runtime wants to invoke.
    Type: Application
    Filed: August 25, 2015
    Publication date: March 24, 2016
    Applicant: UNISYS CORPORATION
    Inventor: KARTHIKEYAN RAJAGOPALAN