Patents by Inventor Shiva R. Dasari

Shiva R. Dasari has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250111028
    Abstract: A process includes accessing by a management controller of a computer platform, a platform certificate that is stored in a secure memory. The platform certificate includes data representing a reference inventory for the computer platform. The platform certificate includes data representing information designated to bind the platform certificate to a security processor. The security processor is accessible by the management controller. The security processor is inaccessible by an operating system of the computer platform. The process includes verifying the platform certificate. Verifying the platform certificate includes validating, by the management controller, a signature of the platform certificate; and validating, by the management controller, the information designated to bind the platform certificate to the security processor. Verifying the platform certificate includes comparing, by the management controller, a second inventory of the computer platform to the reference inventory.
    Type: Application
    Filed: December 13, 2024
    Publication date: April 3, 2025
    Inventors: Dilip Kumar Ramakrishna Reddy, Kenneth J. Geer, Shiva R. Dasari
  • Publication number: 20250045398
    Abstract: In some examples, a security processor receives, from a first management device, measurement data of one or more second management devices. The measurement data is computed at the one or more second management devices based on information in the one or more second management devices and sent from the one or more second management devices to the first management device. The security processor stores the measurement data in a secure storage of the security processor, and provides a representation of the measurement data to validate an integrity of the information in the one or more second management devices.
    Type: Application
    Filed: July 31, 2023
    Publication date: February 6, 2025
    Inventors: Dilip Kumar Ramakrishna Reddy, Kenneth J. Geer, Stephen B. Lyle, Shiva R. Dasari
  • Patent number: 12204628
    Abstract: A process includes accessing by a management controller of a computer platform, a platform certificate that is stored in a secure memory. The platform certificate includes data representing a reference inventory for the computer platform. The platform certificate includes data representing information designated to bind the platform certificate to a security processor. The security processor is accessible by the management controller. The security processor is inaccessible by an operating system of the computer platform. The process includes verifying the platform certificate. Verifying the platform certificate includes validating, by the management controller, a signature of the platform certificate; and validating, by the management controller, the information designated to bind the platform certificate to the security processor. Verifying the platform certificate includes comparing, by the management controller, a second inventory of the computer platform to the reference inventory.
    Type: Grant
    Filed: April 25, 2022
    Date of Patent: January 21, 2025
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Dilip Kumar Ramakrishna Reddy, Kenneth J. Geer, Shiva R. Dasari
  • Publication number: 20240411938
    Abstract: An apparatus includes a host and a baseboard management controller. The baseboard management controller includes a semiconductor package; and the semiconductor package includes a memory, a security hardware processor; and a main hardware processor. The main hardware processor causes the baseboard management controller to serve as an agent that, independently from the host, responds to communications with a remote management entity to manage the host. The security hardware processor manages the storage of a secret of the host in the memory.
    Type: Application
    Filed: August 23, 2024
    Publication date: December 12, 2024
    Inventors: Theodore F. Emerson, Shiva R. Dasari, Luis E. Luciani, JR., Kevin E. Boyum, Naysen J. Robertson, Robert L. Noonan, Christopher M. Wesneski, David F. Heinrich
  • Publication number: 20240364720
    Abstract: A process includes aggregating a time sequence of samples. Each sample has a plurality of dimensions that correspond to respective metrics that are associated with a microservice. Each sample includes, for each dimension, a measurement of the metric that corresponds to the dimension. The process includes identifying a given sample of the time sequence of samples based on measurements of first samples of the time sequence of samples and determining a sensitivity dependency of the metrics based on the measurements of the given sample. The process includes determining whether the microservice has been subjected to a security attack based on the sensitive dependency.
    Type: Application
    Filed: April 26, 2023
    Publication date: October 31, 2024
    Inventors: Thomas Golway, Nigel J. Edwards, Shiva R. Dasari
  • Patent number: 12105859
    Abstract: An apparatus includes a host and a baseboard management controller. The baseboard management controller includes a semiconductor package; and the semiconductor package includes a memory, a security hardware processor; and a main hardware processor. The main hardware processor causes the baseboard management controller to serve as an agent that, independently from the host, responds to communications with a remote management entity to manage the host. The security hardware processor manages the storage of a secret of the host in the memory.
    Type: Grant
    Filed: October 28, 2021
    Date of Patent: October 1, 2024
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Theodore F. Emerson, Shiva R. Dasari, Luis E. Luciani, Jr., Kevin E. Boyum, Naysen J. Robertson, Robert L. Noonan, Christopher M. Wesneski, David F. Heinrich
  • Patent number: 12072990
    Abstract: A process includes a first tenant of a plurality of tenants communicating with a security processor of a computer platform, via a first physical request interface of the security processor, to acquire ownership of a first command execution engine of the security processor associated with the first physical request interface. The process includes a second tenant of the plurality of tenants communicating with the security processor, via a second physical request interface of the security processor, to acquire ownership of a second command execution engine of the security processor associated with the second physical request interface. The process includes the security processor receiving a first request from the first tenant in the first physical interface, and the second processor receiving a second request from the second tenant in the second physical request interface.
    Type: Grant
    Filed: October 22, 2021
    Date of Patent: August 27, 2024
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Ludovic Emmanuel Paul Noel Jacquin, Nigel J. Edwards, Thomas M. Laffey, Shiva R. Dasari
  • Publication number: 20240256679
    Abstract: In some examples, a security chip for an electronic device includes a nonvolatile memory to store a collection of encryption keys for encrypting information to produce encrypted information. The security chip includes a discrete secure erase hardware logic and is separate from a collection of device processors of the electronic device. The discrete secure erase hardware logic receives an erase indication indicating a request to erase the encrypted information. In response to the erase indication, the discrete secure erase hardware logic erases the collection of encryption keys in the nonvolatile memory, and activates an output indication to cause activation of an erase indicator at the electronic device.
    Type: Application
    Filed: January 31, 2023
    Publication date: August 1, 2024
    Inventors: Shiva R. Dasari, Dwight D. Riley
  • Publication number: 20230342446
    Abstract: A process includes accessing by a management controller of a computer platform, a platform certificate that is stored in a secure memory. The platform certificate includes data representing a reference inventory for the computer platform. The platform certificate includes data representing information designated to bind the platform certificate to a security processor. The security processor is accessible by the management controller. The security processor is inaccessible by an operating system of the computer platform. The process includes verifying the platform certificate. Verifying the platform certificate includes validating, by the management controller, a signature of the platform certificate; and validating, by the management controller, the information designated to bind the platform certificate to the security processor. Verifying the platform certificate includes comparing, by the management controller, a second inventory of the computer platform to the reference inventory.
    Type: Application
    Filed: April 25, 2022
    Publication date: October 26, 2023
    Inventors: Dilip Kumar Ramakrishna Reddy, Kenneth J. Geer, Shiva R. Dasari
  • Publication number: 20230134324
    Abstract: An apparatus includes a host and a baseboard management controller. The baseboard management controller includes a semiconductor package; and the semiconductor package includes a memory, a security hardware processor; and a main hardware processor. The main hardware processor causes the baseboard management controller to serve as an agent that, independently from the host, responds to communications with a remote management entity to manage the host. The security hardware processor manages the storage of a secret of the host in the memory.
    Type: Application
    Filed: October 28, 2021
    Publication date: May 4, 2023
    Inventors: Theodore F. Emerson, Shiva R. Dasari, Luis E. Luciani, JR., Kevin E. Boyum, Naysen J. Robertson, Robert L. Noonan, Christopher M. Wesneski, David F. Heinrich
  • Publication number: 20230129610
    Abstract: A process includes a first tenant of a plurality of tenants communicating with a security processor of a computer platform, via a first physical request interface of the security processor, to acquire ownership of a first command execution engine of the security processor associated with the first physical request interface. The process includes a second tenant of the plurality of tenants communicating with the security processor, via a second physical request interface of the security processor, to acquire ownership of a second command execution engine of the security processor associated with the second physical request interface. The process includes the security processor receiving a first request from the first tenant in the first physical interface, and the second processor receiving a second request from the second tenant in the second physical request interface.
    Type: Application
    Filed: October 22, 2021
    Publication date: April 27, 2023
    Inventors: Ludovic Emmanuel Paul Noel Jacquin, Nigel J. Edwards, Thomas M. Laffey, Shiva R. Dasari
  • Patent number: 11601473
    Abstract: In some examples, a system receives input information relating to a security level for an information technology (IT) stack comprising a plurality of layers including a hardware layer and a software layer, where the input information is technology and product agnostic. The system discovers components of the plurality of layers of the IT stack, accesses a knowledge base that maps the security level and the discovered components to configuration instructions relating to security controls, and configures the IT stack with the security controls using the configuration instructions.
    Type: Grant
    Filed: April 28, 2020
    Date of Patent: March 7, 2023
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Suhas Shivanna, Sridhar Bandi, Yelaka Surya Prakash, Shiva R. Dasari
  • Patent number: 11544382
    Abstract: A technique includes detecting a presence of a hardware security module in a computer. The hardware security module performs trusted computing base measurements in response to the boot of the computer. The technique includes detecting an intention to change firmware of the computer and regulating providing a message warning about an impact of the change based on the determination. The regulation includes determining whether an operating system of the computer binds operations to the trusted computing base measurements and allowing communication of the message based on the determination.
    Type: Grant
    Filed: October 29, 2020
    Date of Patent: January 3, 2023
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Terry Ping-Chung Lee, Kenneth J. Geer, Shiva R. Dasari
  • Publication number: 20220353093
    Abstract: Examples disclosed herein relate to systems and methods for assigning an identifier to a node-based system. For example, systems and methods may: discover the plurality of nodes; determine a node of the plurality of nodes to be a controller node: authenticate, at a management component of the controller node, a respective identifier associated with each node of the plurality of nodes; and based on the authentication, assign a complex identifier to a complex comprising the plurality of nodes, wherein the complex identifier comprises the identifier associated with the controller node.
    Type: Application
    Filed: April 30, 2021
    Publication date: November 3, 2022
    Inventors: Kenneth GEER, Shiva R. DASARI, Christopher HILLIER, Thomas LAFFEY
  • Patent number: 11455396
    Abstract: Examples disclosed herein relate to performing an action based on a pre-boot measurement of a firmware image. In an example, at a firmware component in a system, a measurement of a firmware image may be determined prior to booting of the system, beginning from a hardware root of trust boot block, by a Trusted Platform Module (TPM) emulator engine that emulates a hardware-based TPM. A pre-determined measurement of the firmware image may be retrieved from a storage location within the system. The measurement of the firmware image may be compared with the pre-determined measurement of the firmware image prior to booting of the system. In response to a determination that the measurement of the firmware image is different from the pre-determined measurement of the firmware image, performing an action.
    Type: Grant
    Filed: May 12, 2017
    Date of Patent: September 27, 2022
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Suhas Shivanna, Shiva R. Dasari
  • Publication number: 20220138324
    Abstract: A technique includes detecting a presence of a hardware security module in a computer. The hardware security module performs trusted computing base measurements in response to the boot of the computer. The technique includes detecting an intention to change firmware of the computer and regulating providing a message warning about an impact of the change based on the determination. The regulation includes determining whether an operating system of the computer binds operations to the trusted computing base measurements and allowing communication of the message based on the determination.
    Type: Application
    Filed: October 29, 2020
    Publication date: May 5, 2022
    Inventors: Terry Ping-Chung Lee, Kenneth J. Geer, Shiva R. Dasari
  • Patent number: 11226908
    Abstract: In exemplary aspects described herein, system memory is secured using protected memory regions. Portions of a system memory are assigned to endpoint devices, such as peripheral component interconnect express (PCIe) compliant devices. The portions of the system memory can include protected memory regions. The protected memory regions of the system memory assigned to each of the endpoint devices are configured to control access thereto using device identifiers and/or process identifiers, such as a process address space ID (PASID). When a transaction request is received by a device, the memory included in that request is used to determine whether it corresponds to a protected memory region. If so, the transaction request is executed if the identifiers in the request match the identifiers for which access is allowed to that protected memory region.
    Type: Grant
    Filed: July 31, 2019
    Date of Patent: January 18, 2022
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Dwight D. Riley, Shiva R. Dasari
  • Publication number: 20210336992
    Abstract: In some examples, a system receives input information relating to a security level for an information technology (IT) stack comprising a plurality of layers including a hardware layer and a software layer, where the input information is technology and product agnostic. The system discovers components of the plurality of layers of the IT stack, accesses a knowledge base that maps the security level and the discovered components to configuration instructions relating to security controls, and configures the IT stack with the security controls using the configuration instructions.
    Type: Application
    Filed: April 28, 2020
    Publication date: October 28, 2021
    Inventors: Suhas Shivanna, Sridhar Bandi, Yelaka Surya Prakash, Shiva R. Dasari
  • Publication number: 20210034547
    Abstract: In exemplary aspects described herein, system memory is secured using protected memory regions. Portions of a system memory are assigned to endpoint devices, such as peripheral component interconnect express (PCIe) compliant devices. The portions of the system memory can include protected memory regions. The protected memory regions of the system memory assigned to each of the endpoint devices are configured to control access thereto using device identifiers and/or process identifiers, such as a process address space ID (PASID). When a transaction request is received by a device, the memory included in that request is used to determine whether it corresponds to a protected memory region. If so, the transaction request is executed if the identifiers in the request match the identifiers for which access is allowed to that protected memory region.
    Type: Application
    Filed: July 31, 2019
    Publication date: February 4, 2021
    Inventors: Dwight D. Riley, Shiva R. Dasari
  • Publication number: 20200272739
    Abstract: Examples disclosed herein relate to performing an action based on a pre-boot measurement of a firmware image. In an example, at a firmware component in a system, a measurement of a firmware image may be determined prior to booting of the system, beginning from a hardware root of trust boot block, by a Trusted Platform Module (TPM) emulator engine that emulates a hardware-based TPM. A pre-determined measurement of the firmware image may be retrieved from a storage location within the system. The measurement of the firmware image may be compared with the pre-determined measurement of the firmware image prior to booting of the system. In response to a determination that the measurement of the firmware image is different from the pre-determined measurement of the firmware image, performing an action.
    Type: Application
    Filed: May 14, 2020
    Publication date: August 27, 2020
    Inventors: Suhas Shivanna, Shiva R. Dasari