Patents by Inventor Kirk Alan Hutchinson

Kirk Alan Hutchinson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240411565
    Abstract: Methods and systems for managing data processing systems are provided. Data processing systems may host various computer-implemented services. Data processing systems may also be changed to operate in different states where one or more currently hosted computer-implemented services may no longer be hosted in the new state. Removal of these no longer hosted computer-implemented services from the data processing systems may cause complications for the data processing systems in the new state. Undefine policies may be preconfigured for one or more hosted computer-implemented services to prevent occurrence of such complications.
    Type: Application
    Filed: June 7, 2023
    Publication date: December 12, 2024
    Inventors: BRADLEY K. GOODMAN, KIRK ALAN HUTCHINSON, JOSEPH CAISSE
  • Patent number: 12155642
    Abstract: Methods and systems for managing the security of distributed systems that utilize certificates for command and control purposes are disclosed. The certificates may be used to delegate authority to various entities and attest public keys associated with the entities. To manage security using the certificates, the system may limit use of certificates and public keys to only those that have been attested. By doing so, the vulnerability to attacks through unauthorized use of keys of delegates may be reduced.
    Type: Grant
    Filed: April 20, 2022
    Date of Patent: November 26, 2024
    Assignee: Dell Products L.P.
    Inventors: Bradley K. Goodman, Kirk Alan Hutchinson
  • Publication number: 20240385908
    Abstract: Techniques are provided for automated localization of microservices. One method comprises obtaining, by a given microservice of an application, a message to be provided to a client device using an application programming interface (API) of the given microservice, wherein the message comprises a text portion having an identifier, wherein the text portion is in a first language; obtaining, by the given microservice, using the identifier, a translation of the text portion, maintained by the given microservice, in a second language associated with the client device; and presenting, by the given microservice, the message, with the translation of the text portion, to the client device using the API of the given microservice. Continuous integration aggregation techniques may be used to: (i) detect changes to localized files of the application; (ii) transform changed localized files to a file format; and (iii) store the changed localized files in a shared storage for translation.
    Type: Application
    Filed: May 18, 2023
    Publication date: November 21, 2024
    Inventors: Lior Gdaliahu, Yonit Lopatinski, Roman Bober, Eli Rosenes, Kirk Alan Hutchinson
  • Publication number: 20240348496
    Abstract: Methods and systems for managing onboarding of endpoint devices are disclosed. Customized onboarding processes may be performed depending on roles for different endpoint devices. During onboarding, the endpoint devices may operate in secure modes of operation which may limit customization of onboarding. To facilitate customization of onboarding, the endpoint device may include tags. The tags may convey information usable to operably connected to intermediary devices that may allow for operable connections to control planes that manage the onboarding processes to be established. The control planes may not be limited by the secure modes of operation and allow for greater customization of onboarding.
    Type: Application
    Filed: April 17, 2023
    Publication date: October 17, 2024
    Inventors: BRADLEY K. GOODMAN, KIRK ALAN HUTCHINSON
  • Publication number: 20240129134
    Abstract: Systems, devices, and methods for managing operation of data processing systems are disclosed. To manage operation of the data processing systems, onboarding processes may be performed to conform the operation of the data processing systems to meet the expectations of owners of the data processing systems. During onboarding, keys usable to verify subsequently issued commands may be obtained by the data processing systems. The data processing systems may perform verifications processes for issued commands that rely on a root of trust established with the keys rather than identifies of entities that may issue the commands for command verification.
    Type: Application
    Filed: October 14, 2022
    Publication date: April 18, 2024
    Inventors: BRADLEY K. GOODMAN, KIRK ALAN HUTCHINSON, JOSEPH CAISSE
  • Publication number: 20240126845
    Abstract: Systems, devices, and method for managing data processing systems are disclosed. The data processing systems may be capable of operating in various manners. To manage the data processing systems, onboarding processes may be performed to conform the operation of the data processing systems to meet the expectations of owners of the data processing systems. To facilitate onboarding, onboarding payloads may be generated in a domain in which data necessary for onboarding is available. The onboarding payloads may be transferred to data processing systems in domains in which the necessary data is not available to onboard the data processing systems.
    Type: Application
    Filed: October 14, 2022
    Publication date: April 18, 2024
    Inventors: BRADLEY K. GOODMAN, KIRK ALAN HUTCHINSON, JOSEPH CAISSE
  • Publication number: 20240126905
    Abstract: Systems, devices, and methods for managing data processing systems are disclosed. The data processing systems may be capable of operating in various manners. To manage the data processing systems, onboarding processes may be performed to conform the operation of the data processing systems to meet the expectations of owners of the data processing systems. To manage security policies of the data processing systems during onboarding, ownership vouchers may be generated to provide data necessary for onboarding that defines security policies, hardware policies, and ownership of the data processing systems. The ownership voucher may be deployed to data processing systems during onboarding to reduce the likelihood of undesired use and/or interactions with the data processing systems.
    Type: Application
    Filed: October 14, 2022
    Publication date: April 18, 2024
    Inventors: BRADLEY K. GOODMAN, KIRK ALAN HUTCHINSON, JOSEPH CAISSE
  • Publication number: 20230344651
    Abstract: Methods and systems for certificate management in a distributed system are disclosed. The distributed system may include data processing systems that utilize certificates issued by a certificate issuer. The data processing systems may be intermittently connected to the certificate issuer. The certificate issuer may, at any point in time, revoke any issued certificate. The certificate issuer may not notify other entities of the revocation. To determine whether a certificate should be treated as being valid, the data processing systems may apply a set of rules to the certificate that compensate for intermittent connectivity to the certificate issuer that may prevent determining whether a certificate has been revoked, while limiting risk due to the potential for a certificate to have been revoked but the revocation not being known.
    Type: Application
    Filed: April 20, 2022
    Publication date: October 26, 2023
    Inventors: Bradley K. Goodman, Kirk Alan Hutchinson
  • Publication number: 20230344817
    Abstract: Methods and systems for managing the security of distributed systems that utilize certificates for command and control purposes are disclosed. The certificates may be used to delegate authority to various entities and attest public keys associated with the entities. To manage security using the certificates, the system may limit use of certificates and public keys to only those that have been attested. By doing so, the vulnerability to attacks through unauthorized use of keys of delegates may be reduced.
    Type: Application
    Filed: April 20, 2022
    Publication date: October 26, 2023
    Inventors: Bradley K. Goodman, Kirk Alan Hutchinson