Patents by Inventor Marshal F. Savage

Marshal F. Savage has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180276387
    Abstract: A verification for a secure boot process may include determining a determined signature for a compendium stored in a memory where the compendium includes a bootloader and an operating system, accessing a verification signature corresponding to the compendium, and comparing the verification signature with the determined signature where if the verification signature is the same as the determined signature, the compendium is verified as secure and a secure boot process is performed with the bootloader and operating system. The compendium may include one or more applications such that the applications may be verified as secure with the verification signature.
    Type: Application
    Filed: March 23, 2017
    Publication date: September 27, 2018
    Inventors: Wei Liu, Prakash Nara, Sudhir V. Shetty, Marshal F. Savage, Charles E. Rose, Mukund P. Khatri, Madhav Karri, Santosh Kumar
  • Publication number: 20180247059
    Abstract: A method may include determining if both of two redundant operating system images for executing functionality of a chassis management controller were found during one or more previous boot sessions of the chassis management controller to be unsecure, wherein each operating system image comprises an integrated kernel and initial file root system stored in a respective first partition of a memory of the chassis management controller, verity hashes of a root file system of such operating system image, the verity hashes stored in a respective second partition of the memory, and the root file system of such operating system image stored in a respective third partition of the memory. The method may also include, in response to determining that one of the two redundant operating system images is secure, initiate verification of such operating system image to determine if such operating system image has indicia of tampering.
    Type: Application
    Filed: February 24, 2017
    Publication date: August 30, 2018
    Applicant: Dell Products L.P.
    Inventors: Prakash NARA, Wei LIU, Charles E. ROSE, Santosh KUMAR, Sudhir Vittal SHETTY, Marshal F. SAVAGE, Rhushabh BHANDARI, Madhav KARRI
  • Publication number: 20180077568
    Abstract: A service controller of an information handling system provides a login user interface to a remotely located user. The service controller includes a factory-installed random unique password as its default password. If the service controller is in its original state, the service controller may grant access to the remote user based on original access input that differs from the default password. If the service controller verifies the user's access entitlement, remote access may be granted to the remote user and the remote user may modifying the default password. Access may be granted to the remote user based on user input that includes the user's credentials for accessing a database of asset, owner, and entitlement information maintained by the system supplier. Access may also be granted based on original access input including or indicative of the service controller license.
    Type: Application
    Filed: September 9, 2016
    Publication date: March 15, 2018
    Applicant: Dell Products L.P.
    Inventors: Jason Matthew YOUNG, Marshal F. SAVAGE
  • Publication number: 20180063166
    Abstract: A rootkit detection method includes obtaining, from a target system, first data comprising raw data stored in a data block of a storage drive, checking the first data for known malware, and generating a first alert if known malware is detected. The drive may include a public key, the first data may include a digital signature based on the key, and checking the first data may include validating the signature. The method may be performed by a system management resource that sends a management request for a particular data block. Second data, corresponding to an operating system access of the particular data block, may be obtained and compared to the first data. Responsive to detecting a discrepancy, generating a second alert. The system management resource may be a cloud based server, a premise installed appliance, premise installed security server, or a management controller of the target system.
    Type: Application
    Filed: August 31, 2016
    Publication date: March 1, 2018
    Applicant: Dell Products L.P.
    Inventors: David WARDEN, Marshal F. SAVAGE
  • Publication number: 20180020007
    Abstract: Methods and systems for receiving speed dial configuration changes may involve receiving a packet, determining whether the packet is associated with a valid command, determining whether a username in a header of the packet is a valid user, validating a signature using a public key, decrypting encrypted data using a first factor key, and executing the valid command associated with the decrypted data. The packet includes the header, encrypted data, and the signature, and is sent without a one-to-many management console and without prior group configuration. The validation of the signature may be based on the determination that the packet is associated with a valid command and that the username in the header of the packet is a valid user.
    Type: Application
    Filed: July 15, 2016
    Publication date: January 18, 2018
    Inventors: Anto DolphinJose Jesurajan Marystella, Cyril Jose, Marshal F. Savage
  • Publication number: 20180019869
    Abstract: Methods and systems for secure messaging may involve receiving an encrypted message from a node, decrypting the message using a default key, sending a message, rotating a group key, and distributing a key rotation message. The message received may be to discover a master of a group. The message sent may welcome the node into the group as a member. The welcome message may be encrypted with the default key and may include information to determine the group key. The group key may be rotated based on an expiration of a group key rotation window. The group key may become a prior group key and the rotated group key may be a current group key. The key rotation message may be encrypted with one of the default key or the prior group key and may include information to determine the current group key.
    Type: Application
    Filed: July 15, 2016
    Publication date: January 18, 2018
    Inventors: Marshal F. Savage, Cyril Jose
  • Publication number: 20180019919
    Abstract: Methods and systems for refreshing an information handling system may include receiving a request for information, searching a group inventory for the information, and responding to the request with the information. The information may correspond to a configuration. The request may be received from a node in a group with a plurality of nodes. The information requested may correspond to an update to the configuration of the node. The group inventory may be sourced from the group. The information in the response may be based on finding a match in the group inventory.
    Type: Application
    Filed: July 15, 2016
    Publication date: January 18, 2018
    Inventors: Vigneswaran Ponnusamy, Sundar Dasar, Cyril Jose, Yogesh P. Kulkarni, Marshal F. Savage
  • Publication number: 20180019923
    Abstract: Methods and systems for managing distributed group identity may involve exchanging, at a node in a group, node identifiers with another node in the group, sorting the node identifiers, selecting an identifier from the sorted identifier, proposing the selected identifier as a persistent group name, setting the persistent group name based on the proposed identifier, setting a user administered name based on the proposed identifier, determining that the user administered name is consistent across the group, and updating the user administered name to resolve the inconsistency. The persistent group name is common across the group.
    Type: Application
    Filed: July 15, 2016
    Publication date: January 18, 2018
    Inventors: Thi D. Huynh, Marshal F. Savage, Cyril Jose, Yee Ja
  • Publication number: 20170317908
    Abstract: A method of managing a server group comprising a plurality of group members in a server group may include receiving, from a group member, health status data and obtaining location data. The health status data may indicate a group member's status with respect to a health parameter. The set of health parameter states may include a compliant, borderline, and non-compliant state defined by one or more thresholds. The location information may indicate locations of the group members relative to one another. A status-location operation may be performed in accordance with the health status and location data to generate a display including, for each of the group members, a data point indicating a status for a particular health parameter and a location of the applicable group member relative to other group members. Historical status change data may be maintained and used to predict a next status change expected.
    Type: Application
    Filed: April 28, 2016
    Publication date: November 2, 2017
    Applicant: Dell Products L.P.
    Inventors: Cyril JOSE, Akkiah Choudary MADDUKURI, Marshal F. SAVAGE
  • Publication number: 20170193202
    Abstract: An information handling system includes a device, a controller, and a license manager subsystem. The controller is configured to determine whether the device has a license assigned and to extract a unique identification for the device in response to a request for information about the device. The license manager subsystem is configured to send the request for information about the device to the controller, to send the unique identification for the device to a license server as a request for the license for the device, to receive the license from the license server, and to assign the license to the device when the license is received.
    Type: Application
    Filed: March 22, 2017
    Publication date: July 6, 2017
    Inventors: Michael Brundridge, Sruthi Mothukupally, Darrell Rosser, Gang Liu, Jason C. Dale, Marshal F. Savage
  • Patent number: 9614678
    Abstract: An information handling system includes a device, a controller, and a license manager subsystem. The controller is configured to determine whether the device has a license assigned and to extract a unique identification for the device in response to a request for information about the device. The license manager subsystem is configured to send the request for information about the device to the controller, to send the unique identification for the device to a license server as a request for the license for the device, to receive the license from the license server, and to assign the license to the device when the license is received.
    Type: Grant
    Filed: June 10, 2011
    Date of Patent: April 4, 2017
    Assignee: DELL PRODUCTS, LP
    Inventors: Michael Brundridge, Sruthi Mothukupally, Darrell Rosser, Gang Liu, Jason C. Dale, Marshal F. Savage
  • Publication number: 20170085418
    Abstract: A method and information handling system (IHS) determines a master remote access controller (RAC) in a distributed IHS having multiple communicatively-connected computing nodes with corresponding RACs. The method includes transmitting a first set of RAC parameters from a first RAC to several other RACs. The first set of RAC parameters includes a locality of reference (LOR) value for the first RAC. Several other sets of RAC parameters are received from the other RACs. A first list of all of the RACs is generated including the associated LOR values. The first list is sorted based on the LOR values and the RAC having the highest LOR value in the first list is designated as a first master RAC candidate.
    Type: Application
    Filed: September 22, 2015
    Publication date: March 23, 2017
    Applicant: DELL PRODUCTS, L.P.
    Inventors: Cyril Jose, Marshal F. Savage
  • Patent number: 9577883
    Abstract: A method and system of automated compliance management is disclosed. The method includes receiving an application call from a remote information handling system (IHS) running an application, the application including a function configured to invoke the application call. The method also includes determining a location of operation of the remote IHS and determining a compliance criterion of the application based on the location of operation of the remote IHS. The method further includes sending a response to the application call from the remote IHS, the response including information for configuring the application to comply with the compliance criterion. Associated apparatuses and systems are disclosed.
    Type: Grant
    Filed: April 26, 2013
    Date of Patent: February 21, 2017
    Assignee: Dell Products L.P.
    Inventors: Heidi Ding, Jianwen Yin, Marshal F. Savage, William James Widener
  • Publication number: 20160335421
    Abstract: A portable information handling system having an NFC device obtains identifier information from information handling systems through NFC and applies the identifier information to obtain license keys for applications stored on the information handling system from a license server through a network interface. NFC transfer of license keys in a secure environment, such as to server information handling system management controller in a data center, provides the convenience of public license servers without the security risk of an open public network access to the management controller.
    Type: Application
    Filed: May 12, 2015
    Publication date: November 17, 2016
    Applicant: Dell Products L.P.
    Inventor: Marshal F. Savage
  • Patent number: 9183395
    Abstract: Firmware updates at an information handling system flash memory device, such as provisioning information stored on a USB device, are securely performed by using a buffer memory and a secured code. An application running on a CPU generates a firmware update and a security code, such as a ciphered hash code based on the firmware update, stores the firmware update and security code in a buffer, and informs a management processor of the update. The management processor analyzes the firmware update to authorize copying of the update from the buffer to the flash memory device. For instance, the management processor creates the security code from the firmware update and compares the created code with the security code stored in the buffer to validate the firmware update.
    Type: Grant
    Filed: June 15, 2015
    Date of Patent: November 10, 2015
    Assignee: Dell Products L.P.
    Inventors: Terry Wayne Liles, Charles T. Perusse, Jr., Yong Cao, Abhay Arjun Salunke, Marshal F. Savage
  • Publication number: 20150278524
    Abstract: Firmware updates at an information handling system flash memory device, such as provisioning information stored on a USB device, are securely performed by using a buffer memory and a secured code. An application running on a CPU generates a firmware update and a security code, such as a ciphered hash code based on the firmware update, stores the firmware update and security code in a buffer, and informs a management processor of the update. The management processor analyzes the firmware update to authorize copying of the update from the buffer to the flash memory device. For instance, the management processor creates the security code from the firmware update and compares the created code with the security code stored in the buffer to validate the firmware update.
    Type: Application
    Filed: June 15, 2015
    Publication date: October 1, 2015
    Applicant: Dell Products L.P.
    Inventors: Terry Wayne Liles, Charles T. Perusse, JR., Yong Cao, Abhay Arjun Salunke, Marshal F. Savage
  • Publication number: 20140344159
    Abstract: An information handling system includes a product fulfillment system and a license generation system. The product fulfillment system processes orders for products, including maintaining product data and order data device. The license generation system receives product data and order data about orders for products from the product fulfillment system. It also generates license keys for the products. The generating includes executing software programs using as input values received from the product fulfillment system.
    Type: Application
    Filed: May 20, 2013
    Publication date: November 20, 2014
    Applicant: Dell Products, LP
    Inventors: Marshal F. Savage, Neelakandan Nagarajan, Travis J. Cain
  • Publication number: 20140325035
    Abstract: A method and system of automated compliance management is disclosed. The method includes receiving an application call from a remote information handling system (IHS) running an application, the application including a function configured to invoke the application call. The method also includes determining a location of operation of the remote IHS and determining a compliance criterion of the application based on the location of operation of the remote IHS. The method further includes sending a response to the application call from the remote IHS, the response including information for configuring the application to comply with the compliance criterion. Associated apparatuses and systems are disclosed.
    Type: Application
    Filed: April 26, 2013
    Publication date: October 30, 2014
    Inventors: Heidi Ding, Jianwen Yin, Marshal F. Savage, William James Widener
  • Publication number: 20140289861
    Abstract: Systems and method for provisioning license keys are disclosed. The systems and methods may include receiving an entitlement data set from a license manager, the entitlement data set associated with a plurality of entitlements, receiving a host data set from an access controller, the host data set associated with a plurality of components, assigning a subset of the plurality of entitlements based at least on the host data set, communicating a binding data set to the license manager, the binding data set associated with the subset, and communicating a license data set to the access controller, the license data set based at least on the binding data.
    Type: Application
    Filed: March 20, 2013
    Publication date: September 25, 2014
    Inventors: Marshal F. Savage, Robert A. Contreras, Vishwanath Jayaraman
  • Publication number: 20120317418
    Abstract: An information handling system includes a device, a controller, and a license manager subsystem. The controller is configured to determine whether the device has a license assigned and to extract a unique identification for the device in response to a request for information about the device. The license manager subsystem is configured to send the request for information about the device to the controller, to send the unique identification for the device to a license server as a request for the license for the device, to receive the license from the license server, and to assign the license to the device when the license is received.
    Type: Application
    Filed: June 10, 2011
    Publication date: December 13, 2012
    Applicant: DELL PRODUCTS, LP
    Inventors: Michael Brundridge, Sruthi Mothukupally, Darrell Rosser, Gang Liu, Jason C. Dale, Marshal F. Savage