Patents by Inventor L. Martinez
L. Martinez has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11509603Abstract: Systems and methods adjust workspaces based on available hardware resource of an IHS (Information Handling System) by which a user operates a workspace supported by a remote orchestration service. A security context and a productivity context of the IHS are determined based on reported context information. A workspace definition for providing access to a managed resource is selected based on the security context and the productivity context. A notification specifies a hardware resource of the IHS that is not used by the workspace definition, such as a microphone or camera that has not been enabled for use by workspaces. A productivity improvement that results from the updated productivity context that includes use of the first hardware resource is determined. Based on the productivity improvement, an updated workspace definition is selected that includes use of the first hardware resource in providing access to the managed resource via the IHS.Type: GrantFiled: November 30, 2020Date of Patent: November 22, 2022Assignee: Dell Products, L.P.Inventors: Carlton A. Andrews, Girish S. Dhoble, Nicholas D. Grobelny, David Konetski, Joseph Kozlowski, Ricardo L. Martinez, Charles D. Robison
-
Patent number: 11494495Abstract: An information handling system stores a hash values for firmware components for the information handling system. A processor receives an off-host image verification request from a second information handling system. In response to the off-host image verification request, the processor reads first metadata for a next firmware component, provides the first metadata to the second information handling system, and receives a golden hash value from the second information handling system. In response to the first hash value not matching the golden hash value, the processor applies a mitigation policy. In response to the first hash value matching the golden hash value, the processor provides a device verification signal.Type: GrantFiled: May 22, 2020Date of Patent: November 8, 2022Assignee: Dell Products L.P.Inventors: Balasingh Samuel, Ricardo L. Martinez, Anand Joshi
-
Patent number: 11492839Abstract: A system includes a plurality of portable lockers. Each of the portable lockers includes a lockable compartment configured to contain contents. The system also includes a docking station that includes a vault configured to secure the plurality of portable lockers, a user input device configured to receive a request from a user to take a first portable locker of the plurality of portable lockers, a biometrics sensor configured to collect a biometric from the user, and a processing circuit. The processing circuit is configured to determine, based on the biometric, whether the user has permission to take the first portable locker and control the vault to release the first portable locker to the user in response to a determination that the user has permission to take the first portable locker.Type: GrantFiled: November 20, 2020Date of Patent: November 8, 2022Assignee: Wells Fargo Bank, N.A.Inventors: Darren M. Goetz, Chris Kalaboukis, Lisa R. Magana, Andrew L. Martinez, Uma Meyyappan, Dennis E. Montenegro, Marla M. Pacis, Timothy R. Ward
-
Publication number: 20220350717Abstract: Establishing a diagnostic OS for an information handling system platform performing a UEFI BIOS boot to place the platform in a pre-OS state. Upon detecting a particular POST error and/or a platform configuration policy, an embedded OS kernel may be launched into a DRTM-authenticated measured launch environment (MLE). Additional objects for the diagnostic OS may be downloaded. The additional objects may include an initial ramdisk (initrd) module and one or more applications specific to the particular diagnostic OS. The diagnostic OS may be launched as follows: for each diagnostic OS application, launching the application and extending a measurement of the application into a DRTM PCR. Launching the diagnostic OS may include launching an initrd module and extending a measurement of the initrd module into the DRTM PCR. A measurement of embedded OS kernel may be extended into the TPM and the embedded OS kernel may validate the UEFI BIOS sequence.Type: ApplicationFiled: April 30, 2021Publication date: November 3, 2022Applicant: Dell Products L.P.Inventors: Sumanth VIDYADHARA, Nicholas D. GROBELNY, Lip Vui KAN, Ricardo L. MARTINEZ
-
Patent number: 11487881Abstract: Systems and methods for endpoint context-driven, dynamic workspaces are described.Type: GrantFiled: October 31, 2019Date of Patent: November 1, 2022Assignee: Dell Products, L.P.Inventors: Carlton A. Andrews, Girish S. Dhoble, Nicholas D. Grobelny, David Konetski, Joseph Kozlowski, Ricardo L. Martinez, Charles D. Robison
-
Patent number: 11475126Abstract: Systems and methods for modernizing workspace and hardware lifecycle management in an enterprise productivity ecosystem are described.Type: GrantFiled: October 31, 2019Date of Patent: October 18, 2022Assignee: Dell Products, L.P.Inventors: Carlton A. Andrews, Girish S. Dhoble, Nicholas D. Grobelny, David Konetski, Joseph Kozlowski, Ricardo L. Martinez, Charles D. Robison
-
Patent number: 11429707Abstract: A method implemented on a visual computing device to authenticate one or more users includes receiving a first three-dimensional pattern from a user. The first three-dimensional pattern is sent to a server computer. At a time of user authentication, a second three-dimensional pattern is received from the user. The second three-dimensional pattern is sent to the server computer. An indication is received from the server computer as to whether the first three-dimensional pattern matches the second three-dimensional pattern within a margin of error. When the first three-dimensional pattern matches the second three-dimensional pattern within the margin of error, the user is authenticated at the server computer. When the first three-dimensional pattern does not match the second three-dimensional pattern within the margin of error, user is prevented from being authenticated at the server computer.Type: GrantFiled: August 22, 2019Date of Patent: August 30, 2022Assignee: Wells Fargo Bank, N.A.Inventors: Andrew L. Martinez, Chris Kalaboukis
-
Patent number: 11416614Abstract: Statistical detection of firmware-level compromises can be enabled and performed on a computing system. During pre-boot, a pre-boot agent can access firmware loaded in memory and cause it to be stored in a manner that will allow the firmware to be accessed at runtime. During runtime, the firmware can be accessed and stored as files in the file system or other storage location accessible to an antivirus solution. The antivirus solution can then analyze the files using statistics-based techniques to thereby detect compromises in firmware.Type: GrantFiled: July 1, 2020Date of Patent: August 16, 2022Assignee: Dell Products L.P.Inventors: Mark Aeden Walker, Ricardo L. Martinez
-
Patent number: 11416618Abstract: A root of trust may include one or more hardware components of an IHS (Information Handling System) that operate using validated hardware instructions. Once a root of trust has been established, it may be extended by validating additional components and the instructions by which these components operate. A chain of trusted boot components may be used to securely initialize a set of components required to support core functions of the IHS. In order to detect components of a trusted boot chain that have been compromised, boot chain components validate their own instructions as well as the instructions to be utilized by the next boot component and the instructions utilized by the prior boot component, thus providing bidirectional validation of trusted boot chain components.Type: GrantFiled: July 15, 2019Date of Patent: August 16, 2022Assignee: Dell Products, L.P.Inventors: Sudhir Mathane, Ricardo L. Martinez
-
Publication number: 20220201009Abstract: Systems and methods for creating and handling workspace indicators of compromise (IOC) based upon configuration drift are described. In some embodiments, a memory storage device may have program instructions stored thereon that, upon execution by one or more processors of an Information Handling System (IHS) of a workspace orchestration service, cause the IHS to: receive configuration information from a client IHS at a workspace orchestration service, where the configuration information represents a change in a configuration of a workspace executed by the client IHS, and where the workspace is instantiated based upon a workspace definition provided by the workspace orchestration service; determine, by the workspace orchestration service, that the configuration information matches an IOC; and transmit, from the workspace orchestration service to the client IHS, an instruction to perform an action responsive to the IOC.Type: ApplicationFiled: December 18, 2020Publication date: June 23, 2022Applicant: Dell Products, L.P.Inventors: Girish S. Dhoble, Nicholas D. Grobelny, Ricardo L. Martinez, Joseph Kozlowski
-
Publication number: 20220200796Abstract: Systems and methods for multilayer encryption for user privacy compliance and corporate confidentiality are described. In some embodiments, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the IHS to: transmit, from a workspace instantiated by a local management agent to a portal managed by an enterprise: (i) a request to store a once-encrypted document, and (ii) an indication that the once-encrypted document is encrypted with a controlvault key; receive, from the portal at the workspace, a request to encrypt the once-encrypted document with an enterprise-issued cryptographic key to produce a twice-encrypted document; and transmit, from the workspace to the portal, a copy of the twice-encrypted document.Type: ApplicationFiled: December 18, 2020Publication date: June 23, 2022Applicant: Dell Products, L.P.Inventors: Charles D. Robison, Nicholas D. Grobelny, Ricardo L. Martinez
-
Publication number: 20220198043Abstract: Systems and methods for securely deploying a collective workspace across multiple local management agents are described. In some embodiments, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the IHS to: receive, at a workspace orchestration service from a first local management agent, first context information and a first split key; receive, at the workspace orchestration service from a second local management agent, second context information and a second split key; determining, by the workspace orchestration service, that the first and second context information match a collaborative workspace policy; in response to the determination, authenticate the first and second split keys; and in response to the authentication, transmit a collaborative workspace definition to the first and second local management agents.Type: ApplicationFiled: December 18, 2020Publication date: June 23, 2022Applicant: Dell Products, L.P.Inventors: Joseph Kozlowski, Ricardo L. Martinez, David Konetski, Carlton A. Andrews, Nicholas D. Grobelny, Charles D. Robison, Girish S. Dhoble
-
Publication number: 20220200806Abstract: Systems and methods for providing trusted local orchestration of workspaces are described. In some embodiments, an Information Handling System (IHS) may include a processor and a system memory coupled to the processor, the system memory having program instructions stored thereon that, upon execution, cause the IHS to: receive an orchestration code from a workspace orchestration service; record, using a trusted controller coupled to the processor, a log comprising: the orchestration code, and an indication of a sequence of operations performed during an instantiation of a workspace by the local management agent; provide a copy of the log to the workspace orchestration service; and establish a connection between the workspace and the workspace orchestration service in response to the workspace orchestration service's successful: (i) authentication of the orchestration code, and (ii) verification of the sequence of operations.Type: ApplicationFiled: December 18, 2020Publication date: June 23, 2022Applicant: Dell Products, L.P.Inventors: Nicholas D. Grobelny, Ricardo L. Martinez, Carlton A. Andrews, Charles D. Robison
-
Publication number: 20220191239Abstract: Systems and methods for providing fleet remediation of compromised workspaces are described. In some embodiments, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the IHS to: receive, from a first local management agent configured to provide a first workspace in a fleet of workspaces, an indication that the first workspace has suffered a security compromise, where the first workspace is instantiated based upon a first workspace definition; and in response to the indication, transmit a second workspace definition to a second local management agent configured to provide a second workspace in the fleet of workspaces, where the second workspace is instantiated based upon the first workspace definition, and where the second local management agent is configured to instantiate a third workspace based upon the second workspace definition.Type: ApplicationFiled: December 16, 2020Publication date: June 16, 2022Applicant: Dell Products, L.P.Inventors: Nicholas D. Grobelny, Charles D. Robison, Ricardo L. Martinez
-
Publication number: 20220157195Abstract: The present disclosure provides a surgical training model apparatus and a method for creating a surgical training model. The training model apparatus includes a functional brain model that responds to electrical stimulation and enables users to simulate cortical brain mapping outside the operating room. Methods for creating a surgical training model include consideration of engineering design inputs and other parameters.Type: ApplicationFiled: November 11, 2021Publication date: May 19, 2022Inventors: Rebecca B. Forry, Fidel Valero-Moreno, Maite S. Marin-Mera, Faith T. Colaguori, Jaime L. Martinez Santos, Megan E. McDonnell, W. C. Fox, Karim ReFaey, Alfredo Quinones-Hinojosa, William E. Clifton, III, Aaron C. Damon
-
Patent number: 11334675Abstract: Systems and methods support secure transfer of data between workspaces operating on an IHS (Information Handling System). Upon a request for access to a first managed resource, such as protected data, a first workspace is deployed according to a first workspace definition. Upon a request for access to a second managed resource, a second workspace is deployed according to a second workspace definition. In response to an indication of a portion of the protected data from the first workspace being copied to a buffer supported by the IHS and of a request to paste the copied portion of the protected data to the second workspace, the protections provided by the second workspace are evaluated. If the protections of the second workspace are inadequate, an updated second workspace definition is selected that specifies additional protections. The second workspace is updated according to the updated second workspace definition and the transfer is permitted.Type: GrantFiled: October 31, 2019Date of Patent: May 17, 2022Assignee: Dell Products, L.P.Inventors: Carlton A. Andrews, Girish S. Dhoble, Nicholas D. Grobelny, David Konetski, Joseph Kozlowski, Ricardo L. Martinez, Charles D. Robison
-
Patent number: 11336655Abstract: Systems and methods provide multilevel authorization of workspaces using certificates, where all of the authorization levels may be authorized separately or may instead be authorized at once. A measurement of an IHS (Information Handling System) is calculated based on the identity of the IHS and based on firmware of the IHS. A measurement of the configuration of the IHS is calculated based on information for configuring the IHS for supporting workspaces and also based on the IHS measurement. A measurement of a workspace session is calculated based on properties of a session used to remotely support operation of the workspace by the IHS and also based on the configuration measurement. Workspace session data may by authorized at all three levels by evaluating the session measurement against a reference session measurement.Type: GrantFiled: October 31, 2019Date of Patent: May 17, 2022Assignee: Dell Products, L.P.Inventors: Carlton A. Andrews, Girish S. Dhoble, Nicholas D. Grobelny, David Konetski, Joseph Kozlowski, Ricardo L. Martinez, Charles D. Robison
-
Patent number: 11316902Abstract: Methods and system are provided for dynamically securing a workspace based on changes in the security context in which the workspace operates. Upon receiving a request from an IHS for access to a managed resource and receiving attributes of a risk context for the request, a risk score for the request is determined. A workspace definition that provides access to the managed resource is selected based on the risk score. A workspace definition includes security requirements for operation of the workspace by the IHS, where the security requirements are commensurate with the risk score. The workspace definition is transmitted to the IHS for operation of the workspace according to the security requirements. A risk context may include, IHS software, a physical environment in which the IHS is located, a physical location of the IHS, a classification of the requested resource, IHS hardware, and a user of the IHS.Type: GrantFiled: October 31, 2019Date of Patent: April 26, 2022Assignee: Dell Products, L.P.Inventors: Carlton A. Andrews, Girish S. Dhoble, Nicholas D. Grobelny, David Konetski, Joseph Kozlowski, Ricardo L. Martinez, Charles D. Robison
-
Publication number: 20220103432Abstract: Systems and methods for modernizing workspace and hardware lifecycle management in an enterprise productivity ecosystem are described. In some embodiments, a client Information Handling System (IHS) may include a processor and a memory, the memory having program instructions that, upon execution by the processor, cause the client IHS to: receive, from a workspace orchestration service, one or more files or policies configured to enable the client IHS to instantiate a first workspace based upon a first workspace definition; allow a user to execute a non-vetted application in the first workspace; determine that the first workspace is compromised; and receive, in response to the determination, from the workspace orchestration service, one or more other files or policies configured to enable the client IHS to instantiate a second workspace based upon a second workspace definition, where the second workspace definition allows execution of a vetted application corresponding to the non-vetted application.Type: ApplicationFiled: December 8, 2021Publication date: March 31, 2022Applicant: Dell Products, L.P.Inventors: Carlton A. Andrews, Girish S. Dhoble, Nicholas D. Grobelny, David Konetski, Joseph Kozlowski, Ricardo L. Martinez, Charles D. Robison
-
Patent number: 11276279Abstract: Examples described herein relate to apparatuses and methods of providing automated teller machine (ATM) status notifications using augmented reality. A method includes capturing, by a user device, an image of the ATM, determining a probability that the ATM has been compromised, augmenting the image of the ATM in a manner which reflects the probability that the image has been compromised, and displaying the augmented image on a user interface of the user device.Type: GrantFiled: September 14, 2020Date of Patent: March 15, 2022Assignee: Wells Fargo Bank, N.A.Inventors: Robert Hamchuck, Chris Kalaboukis, Andrew L. Martinez