Patents by Inventor Rama R. Bisa

Rama R. Bisa has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240103846
    Abstract: Embodiments of systems and methods to provide a firmware update to devices configured in a redundant configuration in an Information Handling System (IHS) are disclosed. In an illustrative, non-limiting embodiment, an IHS may include first and second Remote Access Controllers (RACs) that each includes computer-executable instructions to receive, by the first RAC, a firmware update image associated with the firmware device, and commence transfer of the firmware update image to the firmware device to perform a firmware update on the firmware device using an update mode that restricts another update request to the firmware device until the first RAC finishes or cancels the firmware update. When the transfer is halted prior to completion, the program instructions cause the second RAC to determine where the firmware update image transfer was halted, and commence transferring the remainder of the firmware update image that has not yet been transferred to the firmware device.
    Type: Application
    Filed: September 23, 2022
    Publication date: March 28, 2024
    Applicant: Dell Products, L.P.
    Inventors: Deepaganesh Paulraj, Rama Rao Bisa, Rajeshkumar Ichchhubhai Patel, Mahesh Babu Ramaiah, Pavan Kumar Gavvala, Naveen Karthick Chandrasekaran, Chandrasekhar R
  • Publication number: 20240103844
    Abstract: Embodiments of systems and methods to provide a firmware update to devices configured in a redundant configuration in an Information Handling System (IHS) are disclosed. In an illustrative, non-limiting embodiment, an IHS may include first and second Remote Access Controllers (RACs) that each includes computer-executable instructions to receive a firmware update image associated with the firmware device, and gather data associated with a behavior of the firmware device following the firmware update after the firmware device is updated with the firmware update image. Using the data, the instructions generate a score for the firmware update based at least in part, on the behavior of the IHS following the firmware update.
    Type: Application
    Filed: September 23, 2022
    Publication date: March 28, 2024
    Applicant: Dell Products, L.P.
    Inventors: Chandrasekhar R, Rochak Gupta, Rama Rao Bisa, Deepaganesh Paulraj, Sandesh Hadhimane Balakrishna
  • Publication number: 20240103849
    Abstract: Embodiments of systems and methods to provide a firmware update to devices configured in a redundant configuration in an Information Handling System (IHS) are disclosed. In an illustrative, non-limiting embodiment, an IHS may include computer-executable instructions to receive a firmware update image associated with the firmware device, determine that the firmware update image possesses a critical sub-image portion, and schedule a firmware update to be performed in the future on the firmware device using the one firmware update image. The firmware update image conforms to a Platform Level Data Model (PLDM) protocol that is configured to perform rebootless firmware updates.
    Type: Application
    Filed: September 27, 2022
    Publication date: March 28, 2024
    Applicant: Dell Products, L.P.
    Inventors: Manjunath Vishwanath, Rama Rao Bisa, Pavan Kumar Gavvala, Manjunath AM, Shantanu Kumar Pradhan, Chandrasekhar R
  • Publication number: 20240103848
    Abstract: Embodiments of systems and methods to identify and remediate performance degradation during firmware update in a cluster environment are described. In an illustrative, non-limiting embodiment, an IHS may include computer-executable instructions to receive a request to perform a firmware update on a plurality of computing devices of a computing cluster, obtain an inventory of the computing cluster, and determine a scheduling sequence for updating the computing devices so that the performance of the cluster is optimally maintained. The instructions may then perform the firmware update on each of the computing devices according to the determined scheduling sequence.
    Type: Application
    Filed: September 26, 2022
    Publication date: March 28, 2024
    Applicant: Dell Products, L.P.
    Inventors: Pavan Kumar Gavvala, Chandrasekhar R, Rama Rao Bisa, Shantanu Kumar Pradhan
  • Patent number: 11210430
    Abstract: A system includes a storage device having a first encryption protocol, and a controller having a second encryption protocol. A processor implements the first encryption protocol or the second encryption protocol based on a strength of each encryption protocol, a topology of the system, a federal information processing standard certification status, a virtualization support, a multi-key support, a multi-band support, and an enterprise key management server support. Storage transactions may be encrypted using the implemented encryption protocol.
    Type: Grant
    Filed: April 2, 2019
    Date of Patent: December 28, 2021
    Assignee: Dell Products L.P.
    Inventors: Chitrak Gupta, Rama R. Bisa, Manjunath Vishwanath, Chandrashekar Nelogal
  • Patent number: 10877539
    Abstract: An information handling system includes first and second power supplies, and a management controller. The power supplies are configured to operate in a first power mode to supply power to the information handling system and in a second power mode to shut down from supplying power to the information handling system. The management controller is configured in a normal operation mode to set the first power supply to the first power mode and set the second power supply in the second power mode. The management controller is configured in a test operation mode to set the second power supply to the first power mode, to set the first power supply to the second power mode, to determine whether the second power supply is operating within a first limit, and when the second power supply is not operating within the first limit, to provide a first indication that the second power supply is failing.
    Type: Grant
    Filed: April 23, 2018
    Date of Patent: December 29, 2020
    Assignee: Dell Products, L.P.
    Inventors: Santosh Kumar Sahu, Rama R. Bisa, Sunil Lingappa, Ajaya K. Senapati, Vaideeswaran Ganesan
  • Publication number: 20200320226
    Abstract: A system includes a storage device having a first encryption protocol, and a controller having a second encryption protocol. A processor implements the first encryption protocol or the second encryption protocol based on a strength of each encryption protocol, a topology of the system, a federal information processing standard certification status, a virtualization support, a multi-key support, a multi-band support, and an enterprise key management server support. Storage transactions may be encrypted using the implemented encryption protocol.
    Type: Application
    Filed: April 2, 2019
    Publication date: October 8, 2020
    Inventors: Chitrak Chitrak Gupta, Rama R. Bisa, Manjunath Vishwanath, Chandrashekar Nelogal
  • Publication number: 20190324514
    Abstract: An information handling system includes first and second power supplies, and a management controller. The power supplies are configured to operate in a first power mode to supply power to the information handling system and in a second power mode to shut down from supplying power to the information handling system. The management controller is configured in a normal operation mode to set the first power supply to the first power mode and set the second power supply in the second power mode. The management controller is configured in a test operation mode to set the second power supply to the first power mode, to set the first power supply to the second power mode, to determine whether the second power supply is operating within a first limit, and when the second power supply is not operating within the first limit, to provide a first indication that the second power supply is failing.
    Type: Application
    Filed: April 23, 2018
    Publication date: October 24, 2019
    Inventors: Santosh Kumar Sahu, Rama R. Bisa, Sunil Lingappa, Ajaya K. Senapati, Vaideeswaran Ganesan
  • Patent number: 10355861
    Abstract: Cryptographic affinities are generated to improve security in data centers. When a blade server is hot swapped, the cryptographic affinities protect electronic data stored within the blade server. The cryptographic affinities are generated based on hashing a unique chassis identifier. If the blade server is installed in a different chassis, the cryptographic affinities lock out the different chassis from read, write, and other access operations. The cryptographic affinities may even require deleting or reformatting before rekeying is commenced.
    Type: Grant
    Filed: March 28, 2017
    Date of Patent: July 16, 2019
    Assignee: Dell Products, LP
    Inventors: Sushma Basavarajaiah, Rama R. Bisa, Chitrak Gupta, Mukund P. Khatri
  • Patent number: 10241879
    Abstract: Debugging operations may utilize a dedicated debug port associated with a baseboard management controller. The baseboard management controller executes software programming that eliminates any need for a debugging cable. The baseboard management controller also permits debugging between virtual machines.
    Type: Grant
    Filed: April 28, 2017
    Date of Patent: March 26, 2019
    Assignee: DELL PRODUCTS, LP
    Inventors: Chandrasekhar Puthillathe, Rama R. Bisa, Rajeshkumar I. Patel
  • Publication number: 20180314611
    Abstract: Debugging operations may utilize a dedicated debug port associated with a baseboard management controller. The baseboard management controller executes software programming that eliminates any need for a debugging cable. The baseboard management controller also permits debugging between virtual machines.
    Type: Application
    Filed: April 28, 2017
    Publication date: November 1, 2018
    Inventors: Chandrasekhar Puthillathe, Rama R. Bisa, Rajeshkumar I. Patel
  • Publication number: 20180287791
    Abstract: Cryptographic affinities are generated to improve security in data centers. When a blade server is hot swapped, the cryptographic affinities protect electronic data stored within the blade server. The cryptographic affinities are generated based on hashing a unique chassis identifier. If the blade server is installed in a different chassis, the cryptographic affinities lock out the different chassis from read, write, and other access operations. The cryptographic affinities may even require deleting or reformatting before rekeying is commenced.
    Type: Application
    Filed: March 28, 2017
    Publication date: October 4, 2018
    Inventors: Sushma Basavarajaiah, Rama R. Bisa, Chitrak Gupta, Mukund P. Khatri
  • Publication number: 20160371107
    Abstract: An information handling system includes a processor to run a hypervisor and a management controller coupled to the hypervisor. The management controller includes a virtual Universal Serial Bus (USB) hub, and the hypervisor launches a virtual machine on the processor. In response to an indication from the hypervisor that the virtual machine has been launched, the management controller instantiates a USB virtual NIC coupled to the virtual USB hub, and provides an address of the USB virtual NIC to the hypervisor. The hypervisor provides the address to the virtual machine. The virtual machine provides information to the management controller via the USB virtual NIC.
    Type: Application
    Filed: June 18, 2015
    Publication date: December 22, 2016
    Inventors: Chandrasekhar Puthillathe, Rama R. Bisa