Patents by Inventor Santosh Gore

Santosh Gore has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12189784
    Abstract: Systems and methods are provided for vulnerability proofing updates to an IHS (Information Handling System). An update system receives a notification of an update including updated configurations for hardware components of the IHS. The update system queries the IHS for vulnerability proofing requirements for updates that modify configurations of hardware components of the IHS. In response to the query, vulnerability proofing requirements are retrieved from a persistent data storage of the IHS and transmitted to the update system, where the vulnerability proofing requirements specify catalogs of known vulnerabilities of hardware components. The update system determines whether the updated configurations are identified as vulnerable in the one or more of catalogs. If the updated configurations are not identified in the catalogs, the update is transmitted to the IHS. If configurations from the update are identified in the catalogs, the update is terminated and the IHS is notified.
    Type: Grant
    Filed: October 19, 2022
    Date of Patent: January 7, 2025
    Assignee: Dell Products, L.P.
    Inventors: Raveendra Babu Madala, Santosh Gore
  • Patent number: 12174968
    Abstract: Systems and methods are provided for vulnerability proofing the installation of new hardware components in an IHS (Information Handling System). The coupling of a new hardware component to the IHS is detected. A profile is identified that is to be used in provisioning the new hardware component that has been coupled to the IHS. The profile may include various configurations for the coupled hardware component. One or more catalogs are accessed that specify known vulnerabilities of hardware components. Configurations from the profile for the coupled hardware component are used to identify any configuration that have known vulnerabilities that are listed in the catalogs. If known vulnerabilities are identified in the configuration for the new hardware component, further use of the new hardware component by the IHS is disabled until the profile is modified to include no configurations with vulnerabilities identified in the catalogs.
    Type: Grant
    Filed: October 19, 2022
    Date of Patent: December 24, 2024
    Assignee: Dell Products, L.P.
    Inventors: Raveendra Babu Madala, Santosh Gore
  • Patent number: 12169568
    Abstract: Systems and methods provide vulnerability proofing procedures for booting of an IHS (Information Handling System). A request to boot the IHS is detected. One or more boot configurations are determined that include configurations for operation of one or more of the hardware components of the IHS. One or more catalogs are accessed that specify known vulnerabilities of hardware components. The boot configurations are used to identify any hardware component configurations that have known vulnerabilities that are listed in the catalogs. If known vulnerabilities are identified in the boot configuration, further booting of the IHS may be disabled until the boot configuration is modified to include no configurations with vulnerabilities identified in the catalogs.
    Type: Grant
    Filed: October 19, 2022
    Date of Patent: December 17, 2024
    Assignee: Dell Products, L.P.
    Inventors: Raveendra Babu Madala, Santosh Gore
  • Publication number: 20240411538
    Abstract: An information handling system includes a storage and a processor. The storage stores a firmware update for a component of the information handling system. The processor receives a firmware update notification. The firmware update notification is associated with the firmware update for the component. The processor determines whether the component is weather dependent. In response to the firmware update being weather dependent, the processor determines whether the firmware update currently may be performed based on a weather report for a location of the information handling system. In response to a determination that the firmware update may be performed, the processor performs the firmware update on the component.
    Type: Application
    Filed: June 7, 2023
    Publication date: December 12, 2024
    Inventors: Palani Raja Zeavelou, Santosh Gore, Gargi Priyadarshini, Rahul Ranjan, Rushyendra Velamuri, Priti Parate
  • Patent number: 12158959
    Abstract: Systems and methods are provided for vulnerability proofing updates to an IHS. An update package is detected that includes configurations for one or more of the hardware components of the IHS. One or more catalogs are accessed that specify known vulnerabilities of hardware components. The updated configurations of the hardware component that are included in the update package are used to identify any hardware component configurations that have known vulnerabilities that are listed in the catalogs. If known vulnerabilities are identified in the updated configurations, further booting of the IHS may be disabled until the update package is modified to include no configurations with vulnerabilities identified in the catalogs.
    Type: Grant
    Filed: October 19, 2022
    Date of Patent: December 3, 2024
    Assignee: Dell Products, L.P.
    Inventors: Raveendra Babu Madala, Santosh Gore
  • Patent number: 12153685
    Abstract: Systems and methods are provided for vulnerability proofing an IHS (Information Handling System) while being administered using a bootable image. Launching of a bootable image by the one or more CPUs is detected and one or more IHS configurations to be made using the bootable image are identified. One or more catalogs specifying known vulnerabilities of hardware components are accessed and used to determine whether any of the IHS configurations to be made using the bootable image are identified as vulnerable in one or more of the catalogs. Configuration of the IHS using the bootable image is blocked until the configurations to be made using the bootable image are modified to include no configurations with vulnerabilities identified in the plurality of catalogs.
    Type: Grant
    Filed: October 20, 2022
    Date of Patent: November 26, 2024
    Assignee: Dell Products, L.P.
    Inventors: Raveendra Babu Madala, Santosh Gore
  • Patent number: 12147544
    Abstract: Systems and methods provided vulnerability proofing of an IHS (Information Handling System) while it is being provisioned for deployment, such as upon receipt at a datacenter. An initial provisioning of the IHS is detected, where no provisioning of the IHS has been conducted other than the factory provisioning of the IHS. A profile is identified that is to be used in provisioning the IHS, where the profile includes configurations for one or more hardware components of the IHS. One or more catalogs are accessed that specify known vulnerabilities of hardware components. For each of the hardware configurations in the profile, configurations that are vulnerable are identified based on the catalogs of known vulnerabilities. If vulnerabilities are identified, further provisioning of the IHS is blocked until the profile is modified to include no hardware configurations with vulnerabilities identified in the catalogs.
    Type: Grant
    Filed: October 21, 2022
    Date of Patent: November 19, 2024
    Assignee: Dell Products, L.P.
    Inventors: Raveendra Babu Madala, Santosh Gore
  • Patent number: 12141294
    Abstract: Systems and methods are provided for vulnerability proofing the use of risk scores in the administration of hardware components of an IHS (Information Handling System). Proposed configurations for a first of the hardware components of the IHS are detected, where the proposed configurations are associated with a risk score. Catalogs specifying known vulnerabilities of hardware components are accessed and used to determine whether any of the proposed configurations of the first hardware component are identified as vulnerable in one or more of the catalogs. When a vulnerability for the proposed configuration is identified in the catalogs, the risk score of the configuration is increased based on the vulnerabilities identified in the plurality of catalogs. When the risk score is increased to an elevated level, the hardware component is disabled until the proposed configurations are changed to include no configurations with vulnerabilities identified in the catalogs.
    Type: Grant
    Filed: October 20, 2022
    Date of Patent: November 12, 2024
    Assignee: Dell Products, L.P.
    Inventors: Raveendra Babu Madala, Santosh Gore
  • Patent number: 12141295
    Abstract: Systems and methods are provided for vulnerability proofing the use of machine learning recommendations by an IHS. A machine learning recommendation is detected that provides configurations for one or more of the hardware components of the IHS. Catalogs specifying known vulnerabilities of hardware components are accessed to determine whether any of the hardware configurations from the machine learning recommendations are identified as vulnerable in one or more of the catalogs. If a machine learning recommendation is identified as vulnerable, use of the machine learning recommendation by the IHS is blocked until the recommendation is modified to include no recommended hardware configurations with vulnerabilities identified in the catalogs.
    Type: Grant
    Filed: October 21, 2022
    Date of Patent: November 12, 2024
    Assignee: Dell Products, L.P.
    Inventors: Raveendra Babu Madala, Santosh Gore
  • Patent number: 12135794
    Abstract: Systems and methods provided for vulnerability proofing updates to an IHS (Information Handling System). Upon receipt of an update to hardware component configurations of the IHS, vulnerability proofing requirements for modifications to the hardware component configurations are retrieved, including requirements for modifications that are validated for operation of a computational workload by the IHS. Based on the vulnerability proofing requirements, catalogs specifying known vulnerabilities of hardware components are consulted to determine whether the modifications are identified as vulnerable in the catalogs and whether remediations to the identified vulnerabilities are validated for operation of the workload. If the modifications are not identified as vulnerable in the catalogs, the update is transmitted to the IHS. If the modifications are identified as vulnerable in the catalogs and remediations to the identified vulnerabilities are not validated for operation of the workload, the update is terminated.
    Type: Grant
    Filed: October 20, 2022
    Date of Patent: November 5, 2024
    Assignee: Dell Products, L.P.
    Inventors: Raveendra Babu Madala, Santosh Gore, Muniswamy Setty K S
  • Patent number: 12137112
    Abstract: Systems and methods are provided for vulnerability proofing the use of an IHS (Information Handling System) in a computing cluster. Notification is received by the IHS of modifications to configurations of a computing cluster that includes the IHS. Vulnerability proofing requirements for computing cluster configurations including the IHS are retrieved from a persistent data storage of the IHS. Based on the vulnerability proofing requirements, catalogs comprising known vulnerabilities of IHS hardware components are accessed. Modifications to the computing cluster configurations are identified as vulnerable in one or more of the catalogs. When modifications to the computing cluster configurations are identified as vulnerable, participation by the IHS in the computing cluster is suspended until the modifications to the computing cluster configurations are changed to include no configurations with vulnerabilities identified in the catalogs.
    Type: Grant
    Filed: October 20, 2022
    Date of Patent: November 5, 2024
    Assignee: Dell Products, L.P.
    Inventors: Raveendra Babu Madala, Santosh Gore
  • Patent number: 12130931
    Abstract: Systems and methods are provided for vulnerability proofing subsystems of hardware components of an IHS (Information Handling System). A request to modify configurations of a hardware component of the IHS is detected. Catalogs specifying known vulnerabilities of hardware components are accessed to determine whether any of the modified hardware configurations are identified as vulnerable in one or more of the catalogs. When vulnerabilities are identified in the modified configurations for the hardware component, other hardware components of the IHS are identified that are interdependent on the hardware component as part of an IHS subsystem. Hardware configurations for any of the hardware components of the subsystem are evaluated for vulnerabilities based on the catalogs.
    Type: Grant
    Filed: October 21, 2022
    Date of Patent: October 29, 2024
    Assignee: Dell Products, L.P.
    Inventors: Raveendra Babu Madala, Santosh Gore
  • Patent number: 12045624
    Abstract: Facilitation of transfer of pre-operating system (pre-OS) data to a persistent store is enabled relative to an operation performed external to the OS. A system can comprise a processor, and a memory that stores computer executable instructions that, when executed by the processor, can facilitate performance of operations. The operations can comprise writing data relative to a pre-OS environment to a partition external to an operating system (OS) partition, and, in response to a reboot operation, booting an OS and transferring the data or a copy of the data to the OS partition. Alternatively, the operations can comprise, writing data relative to an updating operation to a log accessible by an OS of the system, assigning a variable value to the log, automatically searching, while operating the OS, for the variable value, and copying or transferring the data relative to the OS via identifying the variable value upon the identification.
    Type: Grant
    Filed: October 1, 2021
    Date of Patent: July 23, 2024
    Assignee: DELL PRODUCTS, L.P.
    Inventors: Krutika Dhanakshirur, Sasikumar Subramani, Vivek S, Harish Babu, Santosh Gore
  • Patent number: 12041044
    Abstract: Technology described herein can globally perform management of security tokens of plural nodes of a multi-node system. In an embodiment, a system can comprise an interconnected group of server nodes, and an administrator node communicatively connected to the interconnected group of server nodes and comprising a processor, and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations. The operations can comprise selecting a server node of the interconnected group of server nodes as a leader server node, resulting in a selection of the leader server node, in response, receiving, by the administrator node from the leader server node, a request for a new security token, and sending, to the leader server node, the new security token, and broadcasting, by the leader server node across a link layer discovery (LLDP) network, the new security token to additional nodes of the interconnected group of nodes.
    Type: Grant
    Filed: December 31, 2021
    Date of Patent: July 16, 2024
    Assignee: DELL PRODUCTS, L.P.
    Inventors: Bharath Koushik, Faizal SN, Santosh Gore, Ramesha He
  • Publication number: 20240232376
    Abstract: Systems and methods provided vulnerability proofing of an IHS (Information Handling System) while it is being provisioned for deployment, such as upon receipt at a datacenter. An initial provisioning of the IHS is detected, where no provisioning of the IHS has been conducted other than the factory provisioning of the IHS. A profile is identified that is to be used in provisioning the IHS, where the profile includes configurations for one or more hardware components of the IHS. One or more catalogs are accessed that specify known vulnerabilities of hardware components. For each of the hardware configurations in the profile, configurations that are vulnerable are identified based on the catalogs of known vulnerabilities. If vulnerabilities are identified, further provisioning of the IHS is blocked until the profile is modified to include no hardware configurations with vulnerabilities identified in the catalogs.
    Type: Application
    Filed: October 21, 2022
    Publication date: July 11, 2024
    Applicant: Dell Products, L.P.
    Inventors: Raveendra Babu Madala, Santosh Gore
  • Publication number: 20240232372
    Abstract: Systems and methods are provided for vulnerability proofing the use of risk scores in the administration of hardware components of an IHS (Information Handling System). Proposed configurations for a first of the hardware components of the IHS are detected, where the proposed configurations are associated with a risk score. Catalogs specifying known vulnerabilities of hardware components are accessed and used to determine whether any of the proposed configurations of the first hardware component are identified as vulnerable in one or more of the catalogs. When a vulnerability for the proposed configuration is identified in the catalogs, the risk score of the configuration is increased based on the vulnerabilities identified in the plurality of catalogs. When the risk score is increased to an elevated level, the hardware component is disabled until the proposed configurations are changed to include no configurations with vulnerabilities identified in the catalogs.
    Type: Application
    Filed: October 20, 2022
    Publication date: July 11, 2024
    Applicant: Dell Products, L.P.
    Inventors: Raveendra Babu Madala, Santosh Gore
  • Publication number: 20240232379
    Abstract: Systems and methods are provided for vulnerability proofing the administration of hardware components of an IHS. A proposed configuration for a hardware component of the IHS is detected. Multiple catalogs specifying known vulnerabilities of hardware components are accessed, such as a catalog of known vulnerabilities provided by a manufacturer of the hardware component and such as a catalog of known vulnerabilities provided by a manufacturer of the IHS. The proposed configuration of the hardware component is evaluated as being vulnerable in the first catalog and also in the second catalog. If the proposed configuration is identified as vulnerable in either the first catalog or in the second catalog, the hardware component is disabled until the proposed configurations for the hardware component are changed to include no configurations with vulnerabilities identified in either the first or second catalogs.
    Type: Application
    Filed: October 21, 2022
    Publication date: July 11, 2024
    Applicant: Dell Products, L.P.
    Inventors: Raveendra Babu Madala, Santosh Gore
  • Publication number: 20240232369
    Abstract: Systems and methods provide vulnerability proofing procedures for booting of an IHS (Information Handling System). A request to boot the IHS is detected. One or more boot configurations are determined that include configurations for operation of one or more of the hardware components of the IHS. One or more catalogs are accessed that specify known vulnerabilities of hardware components. The boot configurations are used to identify any hardware component configurations that have known vulnerabilities that are listed in the catalogs. If known vulnerabilities are identified in the boot configuration, further booting of the IHS may be disabled until the boot configuration is modified to include no configurations with vulnerabilities identified in the catalogs.
    Type: Application
    Filed: October 19, 2022
    Publication date: July 11, 2024
    Applicant: Dell Products, L.P.
    Inventors: Raveendra Babu Madala, Santosh Gore
  • Publication number: 20240232378
    Abstract: Systems and methods are provided for vulnerability proofing the use of machine learning recommendations by an IHS. A machine learning recommendation is detected that provides configurations for one or more of the hardware components of the IHS. Catalogs specifying known vulnerabilities of hardware components are accessed to determine whether any of the hardware configurations from the machine learning recommendations are identified as vulnerable in one or more of the catalogs. If a machine learning recommendation is identified as vulnerable, use of the machine learning recommendation by the IHS is blocked until the recommendation is modified to include no recommended hardware configurations with vulnerabilities identified in the catalogs.
    Type: Application
    Filed: October 21, 2022
    Publication date: July 11, 2024
    Applicant: Dell Products, L.P.
    Inventors: Raveendra Babu Madala, Santosh Gore
  • Publication number: 20240232373
    Abstract: Systems and methods are provided for vulnerability proofing an IHS (Information Handling System) while being administered using a bootable image. Launching of a bootable image by the one or more CPUs is detected and one or more IHS configurations to be made using the bootable image are identified. One or more catalogs specifying known vulnerabilities of hardware components are accessed and used to determine whether any of the IHS configurations to be made using the bootable image are identified as vulnerable in one or more of the catalogs. Configuration of the IHS using the bootable image is blocked until the configurations to be made using the bootable image are modified to include no configurations with vulnerabilities identified in the plurality of catalogs.
    Type: Application
    Filed: October 20, 2022
    Publication date: July 11, 2024
    Applicant: Dell Products, L.P.
    Inventors: Raveendra Babu Madala, Santosh Gore