Patents by Inventor Mohit Arora
Mohit Arora has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250247428Abstract: Methods and systems for managing operation of a data processing system are disclosed. To manage operation of the data processing system, a management controller of the data processing system may obtain validated location data for the data processing system via at least an out of band communication channel. The management controller may identify applicable security policies based on the validated location data. If the management controller identifies a security policy applicable to a geographical location of the data processing system, then the management controller may perform an action set to manage operation of the data processing system based on instructions associated with the applicable security policy.Type: ApplicationFiled: January 29, 2024Publication date: July 31, 2025Inventors: ADOLFO SANDOR MONTERO, MOHIT ARORA, BASSEM EL-AZZAMI, RAJARAVI CHANDRA KOLLARAPU, VINODKUMAR VASUDEV OTTAR, ABEYE TESHOME, RICHARD M. TONRY, LUIS ANTONIO VALENCIA REYES
-
Publication number: 20250247805Abstract: Methods and systems for managing a data processing system are disclosed. To manage the data processing system, a management controller may be included in the data processing system. The management controller may participate in time synchronization for the data processing system. To do so, the management controller may obtain true time values from a trusted time server via an interaction using an out of band communication channel. The true time values may be used to update any number of clocks hosted by the management controller and/or hardware resources of the data processing system. Therefore, software applications may utilize reliable time data to perform computer-implemented services. Doing so may decrease a likelihood of compromise of the data processing system and/or true time values used by the data processing system to perform the computer-implemented services.Type: ApplicationFiled: January 29, 2024Publication date: July 31, 2025Inventors: LUIS ANTONIO VALENCIA REYES, RICHARD M. TONRY, ABEYE TESHOME, BASSEM EL-AZZAMI, MOHIT ARORA, VINODKUMAR VASUDEV OTTAR, ADOLFO SANDOR MONTERO, RAJARAVI CHANDRA KOLLARAPU
-
Publication number: 20250245353Abstract: Methods and systems for managing operations of a data processing system are disclosed. To manage operations of the data processing system, a management controller of the data processing system may obtain validated location data for the data processing system via an out-of-band communication channel. The management controller may identify applicable policies based on the validated location data. If the management controller identifies a policy applicable to a geographical location of the data processing system, then the management controller may perform an action set to manage operation of the data processing system based on instructions associated with the applicable policy. The updated operation of the data processing system may increase the security of sensitive data managed by the data processing system.Type: ApplicationFiled: January 29, 2024Publication date: July 31, 2025Inventors: ADOLFO SANDOR MONTERO, MOHIT ARORA, BASSEM EL-AZZAMI, RAJARAVI CHANDRA KOLLARAPU, VINODKUMAR VASUDEV OTTAR, ABEYE TESHOME, RICHARD M. TONRY, LUIS ANTONIO VALENCIA REYES
-
Publication number: 20250245334Abstract: Methods and systems for managing firmware update events for data processing systems are disclosed. A firmware update event may indicate that an updated firmware image is available for hardware resources of a data processing system. A management controller for the data processing system may utilize an out of band communication channel to obtain the updated firmware image from a server while bypassing hardware resources of the data processing system. The updated firmware image may be verified, stored, and utilized to update firmware for the hardware resources to obtain an updated data processing system. The updated data processing system may provide computer-implemented services.Type: ApplicationFiled: January 29, 2024Publication date: July 31, 2025Inventors: BASSEM EL-AZZAMI, RICHARD M. TONRY, LUIS ANTONIO VALENCIA REYES, ABEYE TESHOME, ADOLFO SANDOR MONTERO, MOHIT ARORA, VINODKUMAR VASUDEV OTTAR, RAJARAVI CHANDRA KOLLARAPU
-
Publication number: 20250247425Abstract: Methods and systems for managing an endpoint device are disclosed. To do so, a key pair may be generated by a management controller of the endpoint device and a private key of the key pair may be kept secret by the management controller. A public key of the public private key pair may be provided to a first entity for use in generating a certificate for the endpoint device. The certificate may be provided to a second entity desiring a level of trust with the endpoint device. As a portion of establishing a secure connection between the second entity and the endpoint device, a TLS handshake may be performed. Performing the TLS handshake may include obtaining a TLS packet, signing the TLS packet using the private key, and providing the signed TLS packet to the second entity to demonstrate that the endpoint device is trustworthy for the level of trust.Type: ApplicationFiled: January 29, 2024Publication date: July 31, 2025Inventors: BASSEM EL-AZZAMI, RICHARD M. TONRY, MOHIT ARORA, ABEYE TESHOME, VINODKUMAR VASUDEV OTTAR, ADOLFO SANDOR MONTERO, LUIS ANTONIO VALENCIA REYES, RAJARAVI CHANDRA KOLLARAPU
-
Publication number: 20250247430Abstract: Methods and systems for managing a data processing system are disclosed. Motion data for the data processing system may be usable to characterize a gait pattern for a person transporting the data processing system while the motion data is obtained. A management controller of the data processing system may perform a motion analysis process using the motion data to determine whether the gait pattern of the motion data is expected for the data processing system. If the gait pattern is not expected for the data processing system, then the data processing system may be subject to unauthorized transport, which may negatively impact the security of the data processing system. In response, the management controller may initiate performance of an action set in order to place the data processing system in an elevated security state.Type: ApplicationFiled: January 29, 2024Publication date: July 31, 2025Inventors: ABEYE TESHOME, RICHARD M. TONRY, BASSEM EL-AZZAMI, ADOLFO SANDOR MONTERO, MOHIT ARORA, VINODKUMAR VASUDEV OTTAR, LUIS ANTONIO VALENCIA REYES, RAJARAVI CHANDRA KOLLARAPU, AMY CHRISTINE NELSON
-
Publication number: 20250247220Abstract: Methods and systems for establishing trust between an endpoint device and a server are disclosed. To do so, a key pair may be generated by a management controller of the endpoint device and a private key of the key pair may be kept secret by the management controller. A software agent hosted by hardware resources of the endpoint device may generate a data package which may be signed by the management controller using the private key. The signed data package may be provided to the server in order to generate a certificate for the endpoint device. The certificate may be usable by entities to establish trust with the endpoint device. A second entity may have access to the certificate and may provide a trust challenge to the endpoint device to establish a level of trust with the endpoint device.Type: ApplicationFiled: January 29, 2024Publication date: July 31, 2025Inventors: VINODKUMAR VASUDEV OTTAR, RAJARAVI CHANDRA KOLLARAPU, ABEYE TESHOME, BASSEM EL-AZZAMI, ADOLFO SANDOR MONTERO, MOHIT ARORA, RICHARD M. TONRY, LUIS ANTONIO VALENCIA REYES
-
Publication number: 20250244986Abstract: Methods and systems for updating a data processing system are disclosed. To update the data processing system, an out of band communication channel may be used by a management controller of the data processing system to: obtain a command, and based on the command, obtain an update package from a remote entity for updating the data processing system. The management controller may store the update package in a partition using local side band communication channels. After the update package is stored, the management controller may initiate a restart of the data processing system. During the restart, if the update package is determined to be in the partition, a startup management entity may use the update package to update operation of a component to obtain an updated component. After completion of the restart, the updated component may be used to provide desired computer implemented services.Type: ApplicationFiled: January 29, 2024Publication date: July 31, 2025Inventors: RAJARAVI CHANDRA KOLLARAPU, VINODKUMAR VASUDEV OTTAR, ADOLFO SANDOR MONTERO, RICHARD M. TONRY, ABEYE TESHOME, LUIS ANTONIO VALENCIA REYES, BASSEM EL-AZZAMI, MOHIT ARORA
-
Publication number: 20250247307Abstract: Methods and systems for managing a data processing system are disclosed. A management controller of the data processing system may provide behavior data for the data processing system to a service system via an out-of-band communication channel. The behavior data may indicate activity of the data processing system ascribed to a user of the data processing system. The management controller may obtain a response from the service system (via the out-of-band communication channel) that indicates whether the activity is expected for the user. If the activity is unexpected for the user, then the activity may indicate undesired use of the data processing system. Therefore, the management controller may initiate performance of an action set that is based on the behavior data in order to manage an impact of the undesired use of the data processing system.Type: ApplicationFiled: January 29, 2024Publication date: July 31, 2025Inventors: RICHARD M. TONRY, ABEYE TESHOME, MOHIT ARORA, BASSEM EL-AZZAMI, VINODKUMAR VASUDEV OTTAR, LUIS ANTONIO VALENCIA REYES, ADOLFO SANDOR MONTERO, RAJARAVI CHANDRA KOLLARAPU
-
Publication number: 20250245306Abstract: Methods and systems for managing data processing systems are disclosed. The data processing systems may operate in a secure environment (e.g., one that prevents hardware resources of the data processing systems from establishing an operable connection to remote devices), and may be managed by verifying the integrity of the data processing systems. The integrity may be verified as a prerequisite to use of the data processing systems. The integrity may be verified, at least in part, by verifying that the hardware component loadout of a data processing system is as expected. If the actual hardware component loadout diverges from an expected hardware component loadout, then remedial activity may be performed to manage an impact of component loadout differences.Type: ApplicationFiled: January 29, 2024Publication date: July 31, 2025Inventors: RAJARAVI CHANDRA KOLLARAPU, RICHARD M. TONRY, ABEYE TESHOME, BASSEM EL-AZZAMI, MOHIT ARORA, LUIS ANTONIO VALENCIA REYES, ADOLFO SANDOR MONTERO, VINODKUMAR VASUDEV OTTAR, AMY CHRISTINE NELSON
-
Publication number: 20250247670Abstract: Methods and systems for managing operations of data processing system are disclosed. To manage operations of the data processing system, a management controller of the data processing system may obtain and provide validated location data in the form of a location report for the data processing system to an external device via an out-of-band communication channel. The validated location data may be used to verify whether the data processing system is following expected geographical routes. By identifying any inconsistencies between the validated location data and expected geographical locations, the likelihood of identifying potential unauthorized modifications or other forms of compromise of the data processing system may be increased.Type: ApplicationFiled: January 29, 2024Publication date: July 31, 2025Inventors: ADOLFO SANDOR MONTERO, MOHIT ARORA, BASSEM EL-AZZAMI, RAJARAVI CHANDRA KOLLARAPU, VINODKUMAR VASUDEV OTTAR, ABEYE TESHOME, RICHARD M. TONRY, LUIS ANTONIO VALENCIA REYES
-
Publication number: 20250247703Abstract: Methods and systems for managing a data processing system are disclosed. To manage the data processing system, a management controller of the data processing system may obtain location data for the data processing system via an out-of-band communication channel. The location data for the data processing system may include different types of location data obtained via different location generation sources. The management controller may identify whether the different types of location data are consistently reporting location status of the data processing system. If the location data is determined to be consistent, then the management controller may provide a location report based on the location data using the out-of-band communication channel to a server to update a location status of the data processing system.Type: ApplicationFiled: January 29, 2024Publication date: July 31, 2025Inventors: BASSEM EL-AZZAMI, ABEYE TESHOME, RICHARD M. TONRY, MOHIT ARORA, ADOLFO SANDOR MONTERO, VINODKUMAR VASUDEV OTTAR, LUIS ANTONIO VALENCIA REYES, RAJARAVI CHANDRA KOLLARAPU
-
Publication number: 20250245059Abstract: Methods and systems for managing a data processing system are disclosed. The data processing system may experience an occurrence of a hardware event that may impair operation of hardware resources of the data processing system. When the occurrence of the hardware event is identified, the data processing system may undergo a reprovisioning process via an out-of-band channel established with a remote system. Once reprovisioned, a management controller of the data processing system may obtain system data usable to manage the hardware event from the remote server. An update process for the data processing system may be performed using the system data in order to mitigate the impairment of the operation of the hardware resources (e.g., to obtain updated hardware resources). A computer-implemented service may be provided using the updated hardware resources.Type: ApplicationFiled: January 29, 2024Publication date: July 31, 2025Inventors: RAJARAVI CHANDRA KOLLARAPU, VINODKUMAR VASUDEV OTTAR, ADOLFO SANDOR MONTERO, RICHARD M. TONRY, ABEYE TESHOME, LUIS ANTONIO VALENCIA REYES, BASSEM EL-AZZAMI, MOHIT ARORA
-
Patent number: 12360851Abstract: Methods and systems for managing data stored by a data processing system are disclosed. A management controller of the data processing system may identify an occurrence of a backup event for the data, the occurrence indicating that a portion of the data is to be backed up to a remote storage system. In response to the occurrence, the management controller may initiate a backup process to obtain a backup data package for the data processing system. The management controller may provide the backup data package to the remote storage system via an out-of-band communication channel in order to facilitate completion of the backup process. By doing so, the data may be placed in a restorable state, enabling the data processing system to continue providing computer-implemented services.Type: GrantFiled: October 31, 2023Date of Patent: July 15, 2025Assignee: Dell Products L.P.Inventors: Adolfo Sandor Montero, Abeye Teshome, Richard M. Tonry, Bassem El-Azzami, Mohit Arora, Vinodkumar Vasudev Ottar, Luis Antonio Valencia Reyes, Rajaravi Chandra Kollarapu
-
Patent number: 12348650Abstract: Methods and systems for managing onboarding of a data processing system are disclosed. To manage onboarding of the data processing system, an entitlement certificate may be obtained from an ownership voucher transferred to the data processing system as part of an onboarding of the data processing system. The entitlement certificate may include a list of entitlements for the data processing system signed using a private key of a public private key pair maintained by a manufacturer of the data processing system. A management controller of the data processing system may utilize the entitlement certificate to request entitlements for the data processing system and to perform action sets to manage the entitlements. The requested entitlements may be verified as trusted by any entity with a public key of the public private key pair maintained by the manufacturer.Type: GrantFiled: October 31, 2023Date of Patent: July 1, 2025Assignee: Dell Products L.P.Inventors: Rajaravi Chandra Kollarapu, Richard M. Tonry, Abeye Teshome, Bassem El-Azzami, Mohit Arora, Vinodkumar Vasudev Ottar, Adolfo Sandor Montero, Luis Antonio Valencia Reyes
-
Patent number: 12348569Abstract: Methods and systems for managing policies for data processing systems are disclosed. A management controller for the data processing system may utilize an out of band communication channel to obtain a policy for the data processing system from a trusted management system if the data processing system is reported as lost or stolen by an owner of the data processing system. The management controller may identify a state of the data processing system as powered or unpowered. The management controller may then identify one or more actions specified by the policy and based on the state of the data processing system to be performed. By doing so, the management controller may discourage unintended use of the data processing system by a user other than the owner of the data processing system.Type: GrantFiled: October 31, 2023Date of Patent: July 1, 2025Assignee: Dell Products L.P.Inventors: Bassem El-Azzami, Abeye Teshome, Richard M. Tonry, Mohit Arora, Adolfo Sandor Montero, Vinodkumar Vasudev Ottar, Luis Antonio Valencia Reyes, Rajaravi Chandra Kollarapu
-
Patent number: 12341764Abstract: Methods and systems for registering a management controller of a data processing system with a new message broker are disclosed. The management controller may be previously registered with an existing message broker. A server may provide a certificate for the data processing system to the new message broker and the server may notify the management controller that the registration process has been initiated. In response, hardware resources of the management controller may provide a registration request to the new message broker. The new message broker may provide a challenge to the management controller via an out of band communication channel and the management controller may provide a challenge response also via the out of band communication channel. Doing so may complete the registration of the management controller with the new message broker. The server may then un-enroll the management controller from the existing message broker.Type: GrantFiled: October 31, 2023Date of Patent: June 24, 2025Assignee: Dell Products L.P.Inventors: Vinodkumar Vasudev Ottar, Abeye Teshome, Richard M. Tonry, Bassem El-Azzami, Mohit Arora, Luis Antonio Valencia Reyes, Adolfo Sandor Montero, Rajaravi Chandra Kollarapu
-
Publication number: 20250202910Abstract: Systems and methods provide collection of telemetry by an Information Handling System (IHS). A policy decision point (PDP) of a zero-trust computing environment controls access to protected resources and receives an indicator of attack related to the IHS. The PDP identifies a telemetry definition specifying telemetry being collected by the IHS and updates the telemetry definition to specify a subsystem telemetry chain for configuring telemetry by hardware subsystems of the IHS that are related to the indicator of attack. The updated telemetry definition is transmitted to the IHS. Upon identifying the subsystem telemetry chain in the updated telemetry definition, the IHS adjusts telemetry generation by one or more of the hardware subsystems of the IHS based on their position in the subsystem telemetry chain.Type: ApplicationFiled: December 18, 2023Publication date: June 19, 2025Applicant: Dell Products, L.P.Inventors: Srikanth Kondapi, Mohit Arora, Balasingh P. Samuel
-
Publication number: 20250202904Abstract: Systems and methods provided adaptive collection of telemetry. A policy decision point of a zero-trust computing environment receives an indication of a change in risk posture within the environment. The policy decision point identifies a telemetry definition specifying telemetry being collected by one or more IHSs that are currently accessing a protected resource of the zero-trust computing environment. The telemetry definition is updated to specify adjusted telemetry to be collected by an IHS that is currently accessing the protected resource and the updated telemetry definition is transmitted to the IHS. Based on the updated telemetry definition received from the policy decision point, the IHS adjust measurements by one or more of the sensors of the IHS. Telemetry generated based on the adjusted measurements is transmitted by the IHS to one or more destinations specified in the updated telemetry definition.Type: ApplicationFiled: December 15, 2023Publication date: June 19, 2025Applicant: Dell Products, L.P.Inventors: Srikanth Kondapi, Mohit Arora, Girish S. Dhoble, Joseph Kozlowski, Balasingh P. Samuel
-
Publication number: 20250202946Abstract: Systems and methods provide synchronized collection of telemetry by an Information Handling System (IHS) operating in a zero-trust computing environment. Telemetry is identified that is ready for transmission by the IHS. A policy decision point of the zero-trust computing environment is notified of the identified telemetry that is ready for transmission by the IHS. The IHS receives a counter from the policy decision point for ordering the telemetry that is ready for transmission within the telemetry of the zero-trust computing environment. The telemetry is annotated with the counter that is received from the policy decision point. The transmitted telemetry may then be sequenced with all other telemetry generated in the zero-trust computing environment.Type: ApplicationFiled: December 18, 2023Publication date: June 19, 2025Applicant: Dell Products, L.P.Inventors: Srikanth Kondapi, Mohit Arora, Girish S. Dhoble, Balasingh P. Samuel