Patents by Inventor Nicholas D. Grobelny
Nicholas D. Grobelny has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11977669Abstract: Methods and systems for securing data processing systems are disclosed. A data processing system may be operably connected to other devices via ports. When operably connected, some devices connected via the ports may cause undesired actions to be performed. To limit physical access to the ports, a security apparatus may be used to lock the ports. The security apparatus may transition between states where it may be inserted into openings for the ports and may be locked to the openings for the ports. When so locked, physical access to the ports may be limited.Type: GrantFiled: February 9, 2022Date of Patent: May 7, 2024Assignee: Dell Products L.P.Inventors: Jason Scott Morrison, Nicholas D. Grobelny, Mark Andrew Schwager
-
Patent number: 11909882Abstract: Various embodiments of systems and methods are provided to bind a system identifier that uniquely identifies an information handling system (IHS) to the system platform, so that the identity of the IHS can be cryptographically verified. More specifically, the present disclosure provides methods to bind a unique system identifier to an IHS platform, and methods to cryptographically verify the identity of the IHS using the unique system identifier and a plurality of keys generated and stored with a Trusted Platform Module (TPM) of the IHS. Systems are provided herein to perform such methods. As such, the systems and methods disclosed herein enable system identity to be irrefutably verified, thereby preventing theft and misuse of system identity.Type: GrantFiled: January 30, 2020Date of Patent: February 20, 2024Assignee: Dell Products L.P.Inventors: Charles D. Robison, Nicholas D. Grobelny, Amy C. Nelson
-
Patent number: 11905742Abstract: An information handling system housing is secured against unauthorized access with a security device integrated in the housing that selectively enables and disables screw movement relative to threads disposed in the housing. For instance, a freewheeling nut in the housing interfaces with an actuator that selectively releases or holds the freewheeling nut relative to the housing. When released, a screw coupled to the freewheeling nut cannot rotate relative to the threads of the freewheeling nut so that the screw maintains the housing secured until the freewheeling nut is held in position to allow removal of the screw.Type: GrantFiled: April 24, 2020Date of Patent: February 20, 2024Assignee: Dell Products L.P.Inventors: Jason S. Morrison, Nicholas D. Grobelny
-
Publication number: 20240037216Abstract: Systems and methods are provided that may be implemented to provide a basic input/output system (BIOS) with the ability to authenticate and then execute one-time unique instructions that are previously left behind (i.e., stored) in public memory of an information handling system by a containerized computing environment session that is no longer executing on the information handling system. The disclosed systems and methods may be so implemented to share with the system BIOS privileged instructions to identify which executables are authorized for execution on a targeted information handling system. The privileged instructions may be previously created and optionally stored together with an executable code in system public memory, and these instructions may provide instructions on how to execute the executable code.Type: ApplicationFiled: July 27, 2022Publication date: February 1, 2024Inventors: Nicholas D. Grobelny, Sumanth Vidyadhara, Richard M. Tonry, Amy C. Nelson
-
Publication number: 20240028723Abstract: Workspace instantiations are monitored for potentially suspicious behavior. When a workspace is instantiated, a client endpoint computer creates a log of historical workspace instantiations. Each time the client endpoint computer requests, receives, or executes a workspace, the client endpoint computer adds and timestamps a new entry in the log of historical workspace instantiations. The log of historical workspace instantiations thus represents a rich database description of each workspace, its corresponding workspace definition file, and its corresponding timestamp. A workspace orchestration service may monitor how frequently the log of historical workspace instantiations is generated and flag or alert of unusual or anomalous counts. Any current workspace instantiation may thus be terminated as a security precaution.Type: ApplicationFiled: July 21, 2022Publication date: January 25, 2024Inventors: Girish S. Dhoble, David Konetski, Nicholas D. Grobelny
-
Publication number: 20240028713Abstract: Workspace instantiations are monitored for potentially suspicious behavior. A client endpoint computer creates and maintains a log of historical events associated with a workspace instantiation. Each time the client endpoint computer processes an event associated with the workspace instantiation, the client endpoint computer adds and timestamps a new entry in the log of the historical events associated with the workspace instantiation. The log of the historical events thus represents a rich database description of the workspace instantiation, its corresponding workspace definition file, its corresponding workspace lifecycle events, and their corresponding timestamps. A workspace orchestration service (perhaps provided by a server) may monitor the log of historical events and flag or alert of any entries indicating suspicious behavior. Any current workspace instantiation may thus be terminated as a security precaution.Type: ApplicationFiled: July 22, 2022Publication date: January 25, 2024Inventors: Girish S. Dhoble, Nicholas D. Grobelny, David Konetski
-
Publication number: 20240020427Abstract: Systems and methods for preventing content rendered by an Information Handling System (IHS) display from being captured or recorded (e.g., photographed, filmed, recorded, etc.) are described. In an embodiment, an IHS may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the IHS to: receive an image from a camera; detect a device in the image; and in response to the detection, prevent content rendered by a display from being captured or recorded by the device.Type: ApplicationFiled: July 13, 2022Publication date: January 18, 2024Applicant: Dell Products, L.P.Inventors: Nicholas D. Grobelny, Daniel L. Hamlin
-
Publication number: 20240020212Abstract: Systems and methods for modernizing workspace and hardware lifecycle management in an enterprise productivity ecosystem are described.Type: ApplicationFiled: July 19, 2023Publication date: January 18, 2024Applicant: Dell Products, L.P.Inventors: Carlton A. Andrews, Girish S. Dhoble, Nicholas D. Grobelny, David Konetski, Joseph Kozlowski, Ricardo L. Martinez, Charles D. Robison
-
Patent number: 11876900Abstract: A system includes a communication channel monitor configured to calculate a hash value of a first encrypted code segment based on a measurement. A security module may derive a first encryption key using a key decryption function operation from the hash value of the first encrypted code segment. A processor decrypts the first encrypted code segment with a seed key retrieved from a storage device, and if the decryption is successful then executes the first decrypted code segment. The processor may retrieve a second one of the encrypted code segments, wherein the second encrypted code segment is a next encrypted code segment for execution after the first encrypted code segment according to a sequence of execution, decrypt the second encrypted code segment with the first encryption key, and if the decryption is successful then execute the second decrypted code segment.Type: GrantFiled: May 18, 2022Date of Patent: January 16, 2024Assignee: Dell Products L.P.Inventors: Nicholas D. Grobelny, Richard M. Tonry, Balasingh P. Samuel
-
Publication number: 20230401316Abstract: A virtual BIOS engine may be configured to, during runtime of an operating system, in response to an operating system event for updating firmware, load onto an isolated compute domain of the processor to emulate firmware update processes of a non-transitory computer-readable media with a virtual non-transitory computer-readable media and emulate the firmware update processes of the cryptoprocessor with a virtual cryptoprocessor, extract a firmware payload to the virtual non-transitory computer-readable media, and execute a virtual trust chain to measure the firmware payload in the virtual non-transitory computer-readable media.Type: ApplicationFiled: June 10, 2022Publication date: December 14, 2023Applicant: Dell Products L.P.Inventors: Shekar Babu SURYANARAYANA, Anand Prakash JOSHI, Amy Christine NELSON, Nicholas D. GROBELNY
-
Patent number: 11843509Abstract: Systems and methods for modernizing workspace and hardware lifecycle management in an enterprise productivity ecosystem are described. In some embodiments, a client Information Handling System (IHS) may include a processor and a memory, the memory having program instructions that, upon execution by the processor, cause the client IHS to: receive, from a workspace orchestration service, one or more files or policies configured to enable the client IHS to instantiate a first workspace based upon a first workspace definition; allow a user to execute a non-vetted application in the first workspace; determine that the first workspace is compromised; and receive, in response to the determination, from the workspace orchestration service, one or more other files or policies configured to enable the client IHS to instantiate a second workspace based upon a second workspace definition, where the second workspace definition allows execution of a vetted application corresponding to the non-vetted application.Type: GrantFiled: December 8, 2021Date of Patent: December 12, 2023Assignee: Dell Products L.P.Inventors: Carlton A. Andrews, Girish S. Dhoble, Nicholas D. Grobelny, David Konetski, Joseph Kozlowski, Ricardo L Martinez, Charles D. Robison
-
Patent number: 11809876Abstract: An information handling system is configured to support first and second boot sequences, which invokes first and second bootloaders respectively. The bootloaders may be stored in an NVMe storage boot partition. Each bootloader may be associated with a corresponding encryption key generated by a trusted platform module, which may seal the first and second keys in accordance with one or more measurements taken during the respective boot sequences. The system determines whether a boot sequence in progress comprises is to invoke the first or second bootloader. The system then unseals the appropriate encryption key to access the appropriate bootloader. The first bootloader may be a host OS bootloader and the second bootloader may be for a recovery resource invoked when the host OS fails to load. The recovery resource may enables BIOS to connect to a remote store and download an image via a HTTP mechanism.Type: GrantFiled: April 29, 2021Date of Patent: November 7, 2023Assignee: Dell Products L.P.Inventors: Nicholas D. Grobelny, Shun-Tang Hsu, Lip Vui Kan, Sumanth Vidyadhara
-
Patent number: 11803454Abstract: Establishing a diagnostic OS for an information handling system platform performing a UEFI BIOS boot to place the platform in a pre-OS state. Upon detecting a particular POST error and/or a platform configuration policy, an embedded OS kernel may be launched into a DRTM-authenticated measured launch environment (MLE). Additional objects for the diagnostic OS may be downloaded. The additional objects may include an initial ramdisk (initrd) module and one or more applications specific to the particular diagnostic OS. The diagnostic OS may be launched as follows: for each diagnostic OS application, launching the application and extending a measurement of the application into a DRTM PCR. Launching the diagnostic OS may include launching an initrd module and extending a measurement of the initrd module into the DRTM PCR. A measurement of embedded OS kernel may be extended into the TPM and the embedded OS kernel may validate the UEFI BIOS sequence.Type: GrantFiled: April 30, 2021Date of Patent: October 31, 2023Assignee: Dell Products L.P.Inventors: Sumanth Vidyadhara, Nicholas D. Grobelny, Lip Vui Kan, Ricardo L. Martinez
-
Publication number: 20230325522Abstract: Systems and methods for securely deploying a collective workspace across multiple local management agents are described. In some embodiments, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the IHS to: receive, at a workspace orchestration service from a first local management agent, first context information and a first split key; receive, at the workspace orchestration service from a second local management agent, second context information and a second split key; determining, by the workspace orchestration service, that the first and second context information match a collaborative workspace policy; in response to the determination, authenticate the first and second split keys; and in response to the authentication, transmit a collaborative workspace definition to the first and second local management agents.Type: ApplicationFiled: June 13, 2023Publication date: October 12, 2023Applicant: Dell Products, L.P.Inventors: Joseph Kozlowski, Ricardo L. Martinez, David Konetski, Carlton A. Andrews, Nicholas D. Grobelny, Charles D. Robison, Girish S. Dhoble
-
Patent number: 11762750Abstract: Systems and methods for modernizing workspace and hardware lifecycle management in an enterprise productivity ecosystem are described.Type: GrantFiled: August 16, 2022Date of Patent: September 19, 2023Assignee: Dell Products, L.P.Inventors: Carlton A. Andrews, Girish S. Dhoble, Nicholas D. Grobelny, David Konetski, Joseph Kozlowski, Ricardo L. Martinez, Charles D. Robison
-
Patent number: 11757881Abstract: Systems and methods for workspace deployment using a secondary trusted device are described. In some embodiments, a first Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the first IHS to: establish a first connection with a second IHS, where the second IHS is configured to establish a second connection with a workspace orchestration service, and where the workspace orchestration service is configured to: receive device identification information of the first IHS from the second IHS; and authenticate the device identification information against a database provided by a manufacturer of the first IHS; and in response to a successful authentication, establish a third connection with the workspace orchestration service.Type: GrantFiled: December 18, 2020Date of Patent: September 12, 2023Assignee: Dell Products, L.P.Inventors: Carlton A. Andrews, Charles D. Robison, Nicholas D. Grobelny, Joseph Kozlowski, David Konetski
-
Patent number: 11755788Abstract: Methods and systems for securing data processing systems are disclosed. A data processing system may be operably connected to other devices via ports. When operably connected, some devices connected via the ports may cause undesired actions to be performed. To limit physical access to the ports, a security apparatus may be used to lock the ports. The security apparatus may transition between states where it may be inserted into openings for the ports and may be locked to the openings for the ports. When so locked, physical access to the ports may be limited.Type: GrantFiled: March 3, 2023Date of Patent: September 12, 2023Assignee: Dell Products L.P.Inventors: Jason Scott Morrison, Nicholas D. Grobelny, Mark Andrew Schwager
-
Publication number: 20230274001Abstract: Systems and methods for off-host integrity verification of Trusted Execution Environments (TEEs) are described. In some embodiments, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the IHS to obtain, by an Operating System (OS) agent, a measurement of contents of a selected area of a Non-Volatile Memory (NVM) used by a TEE coupled to the processor, transmit the measurement from the OS agent to another IHS configured to perform integrity verification of the TEE based, at least in part, upon the measurement, and receive, at the OS agent from the other IHS, an indication of a result of the integrity verification.Type: ApplicationFiled: February 25, 2022Publication date: August 31, 2023Applicant: Dell Products, L.P.Inventors: John Boyle, Ricardo L. Martinez, Nicholas D. Grobelny, Sudhakaran Jayakrishnan Venkateshaperumal, Justin W. Johnson, Golam Sarwar
-
Patent number: 11727122Abstract: Systems and methods for endpoint context-driven, dynamic workspaces are described.Type: GrantFiled: September 7, 2022Date of Patent: August 15, 2023Assignee: Dell Products, L.P.Inventors: Carlton A. Andrews, Girish S. Dhoble, Nicholas D. Grobelny, David Konetski, Joseph Kozlowski, Ricardo L. Martinez, Charles D. Robison
-
Publication number: 20230252195Abstract: Methods and systems for securing data processing systems are disclosed. A data processing system may be operably connected to other devices via ports. When operably connected, some devices connected via the ports may cause undesired actions to be performed. To limit physical access to the ports, a security apparatus may be used to lock the ports. The security apparatus may transition between states where it may be inserted into openings for the ports and may be locked to the openings for the ports. When so locked, physical access to the ports may be limited.Type: ApplicationFiled: March 3, 2023Publication date: August 10, 2023Inventors: Jason Scott MORRISON, Nicholas D. GROBELNY, Mark Andrew SCHWAGER