Patents by Inventor Shivanna

Shivanna has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180212951
    Abstract: An example device includes a processor coupled to a network and a memory coupled to the processor. The memory includes computer code for causing the processor to establish a secure connection between a manageability application and an interconnect device, the interconnect device being in communication with a newly connected networked device; and securely communicate, from the manageability application to the interconnect device, temporary login information for the networked device.
    Type: Application
    Filed: September 4, 2015
    Publication date: July 26, 2018
    Inventors: Alan Goodrum, Suhas Shivanna, David Koenen, Patrick Schoeller
  • Publication number: 20180096154
    Abstract: An example computing system in accordance with an aspect of the present disclosure includes a first controller and a second controller. The first controller is to verify integrity of a first root of trust (ROT), and generate an integrity signal indicating the results. The second controller is to verify integrity of a second ROT, write the firmware image to the first controller, and verify integrity of the written firmware image.
    Type: Application
    Filed: September 25, 2017
    Publication date: April 5, 2018
    Inventors: Suhas SHIVANNA, Patrick L GIBBONS, Shiva R DASARI, Luis E LUCIANI, JR., Kevin G DEPEW
  • Publication number: 20180041496
    Abstract: In one example, a system is disclosed, which may include a network device, a new server connected to the network device, and a management server communicatively connected to a cloud-based service and the network device. The management server may include a server deployment engine to discover the new server in the system using the network device, obtain an encrypted data blob associated with the new server from the cloud-based service, establish a trust, via a secure protocol, with the new server using the encrypted data blob, and deploy the new server in the system upon establishing the trust with the new server.
    Type: Application
    Filed: July 21, 2017
    Publication date: February 8, 2018
    Inventors: Suhas Shivanna, Alan L. Goodrum
  • Publication number: 20180034837
    Abstract: Disclosed are systems, methods, and non-transitory computer-readable storage media for identifying compromised computing devices in a computer network. A threat detection engine can gather network data describing performance of a secured computer network. The secured computer network can include a set of computing devices. The threat detection server can apply a set of threat detection algorithms to the network data to yield threat detection data for the secured computer network. The threat detection engine can then calculate, based on the threat detection data, a threat value for at least a first computing device from the set of computing devices. The threat value can indicate an estimated likelihood that the first computing device has been compromised and/or the severity of the compromise. The threat detection server can then present a visual representation of the threat value for at least the first computing device from the set of computing devices.
    Type: Application
    Filed: July 27, 2016
    Publication date: February 1, 2018
    Inventors: Faizel Zulfikar Lakhani, Rajdeep Singh Wadhwa, Nagendra Swamy Honnalagere Shivanna
  • Publication number: 20180025150
    Abstract: Examples include an authenticated access to manageability hardware components in a computing device. Some examples enumerate manageability hardware components connected to an operative system kernel of the computing device, the manageability hardware components comprising a bus configuration space and the bus configuration space comprising memory map registers. Some examples include encoding an address stored in the memory map registers of each of the manageability hardware components to produce encoded address to control unauthorized accesses and locks the bus configuration space of each manageability hardware component by setting a read-only attribute to the bus configuration space. Some examples reprogram, in response to a request for access of an authenticated OS component to a manageability hardware component, the memory map register of the requested manageability hardware component with an accessible address to provide the authenticated OS component with access to the manageability hardware component.
    Type: Application
    Filed: May 11, 2017
    Publication date: January 25, 2018
    Inventors: Suhas Shivanna, Srinivasa Ragavan Rajagopalan, Nagaraj S. Salotagi
  • Publication number: 20170315798
    Abstract: Example implementations relate to secure update of firmware and software. For example, a method for providing secure firmware and software updates to a computing system includes receiving, by a management processor, an update request from a management station for the computing system, where the update request comprises update parameters indicative of components to be updated within the computing system. Further, the method includes storing details of the update request including the update parameters at a pre-defined memory location, where the update parameters include at least one certificate associated with the update request. The method also includes accessing, at least one of a firmware image and a software patch corresponding to the update request based on identification of the update parameters stored at the pre-defined memory location by an update manager, where the update manager has predefined access rights and privileges within an Operating System (OS) of the computing system.
    Type: Application
    Filed: November 14, 2014
    Publication date: November 2, 2017
    Inventors: Suhas Shivanna, Sandeep B H, Neena M S, Tom L Vaden
  • Publication number: 20170315818
    Abstract: Techniques for detecting an early boot error are provided. In one aspect, a host processor may transition to a first phase of an early boot process. The early boot process may occur before the host processor initializes a primary link between the host processor and a management controller. The host processor may then update a dual purpose boot register to store an early boot phase identifier corresponding to the first phase and an early boot status identifier corresponding to the first phase.
    Type: Application
    Filed: November 13, 2014
    Publication date: November 2, 2017
    Inventors: SUHAS SHIVANNA, SRINIVASAN VARADARAJAN SAHASRANAMAM, NAGARAJ S SALOTAGI
  • Publication number: 20170212856
    Abstract: Example implementations relate to a server including a platform controller hub (PCH), where the PCH includes a peripheral device manager, a management processor coupled to the peripheral device manager, and a peripheral device interface to couple with a peripheral device and provide out of band access of the peripheral device via the management processor and peripheral device manager to a memory of the server.
    Type: Application
    Filed: April 30, 2015
    Publication date: July 27, 2017
    Inventors: Suhas Shivanna, Luis E. Luciani, JR., Mohammed Saleem, Andrew Brown
  • Publication number: 20170154184
    Abstract: Examples relate to providing operating system (OS) agnostic validation of firmware images. In some examples, a request to verify a number of firmware images is received, where each of the firmware images is associated with a metadata set. A first installation of a first firmware image of the firmware images is accessed via a physical interface, and a first metadata set is used to verify the first installation, where the first metadata set includes a firmware signature that is used to verify the first installation. At this stage, the request is forwarded to a child management processor, where the management processors are in a trusted group and related according to a tree hierarchy.
    Type: Application
    Filed: September 24, 2014
    Publication date: June 1, 2017
    Inventor: Suhas Shivanna
  • Patent number: 9630557
    Abstract: Alarm indications of objects (431, 631) in spaces (113) subject to vehicle movements are provided using a scanner unit configured to provide indications of directions and distances of objects within a scan area. A computer compares the signal output from a scanner unit (121) and resolves the signal output to a pattern of the indications of directions and distances, and further resolve multiple instances of the indications over time to resolve the pattern of indications and distances to movement corresponding to the movement of the objects (431, 631). The indications are compared to render an indication of objects (431) partially blocked by other ones (631) of the objects from line-of-sight of the scanner unit (121). Predetermined relative movements of the objects (431, 631) as resolved by the computer render predetermined indicator or alarm signals (341, 342, 345).
    Type: Grant
    Filed: August 13, 2015
    Date of Patent: April 25, 2017
    Assignee: SICK, INC.
    Inventors: Dale Hoepner, Monisha Shivanna, Aaron Rothmeyer, Don Alexander
  • Patent number: 9619478
    Abstract: A computer-implemented method to compress log messages is disclosed. The method starts with maintaining a log reference table having a plurality of log reference entries, each containing a string of characters to be recited repeatedly during logging of messages. In response to a request for logging a log message initiated from an application, the method creates a compressed log message entry in a compressed log file. The compressed log message entry includes: a time stamp indicating the time the log message being created; a log reference identifier identifying one of the plurality of log reference entries without reciting a corresponding string of characters of the log reference entry, where the one of the plurality of log reference entries contains one or more variable indications; and a log variable portion associated with the log message, where the log variable portion contains a part of the log message.
    Type: Grant
    Filed: December 18, 2013
    Date of Patent: April 11, 2017
    Assignee: EMC IP Holding Company LLC
    Inventors: Pranay Singh, Srikanta Shivanna
  • Patent number: 9594619
    Abstract: A robust hardware fault management system, method and framework for providing robust hardware fault management for enterprise devices are disclosed. In one example, hardware devices and associated hardware modules in each of the enterprise devices requiring the robust hardware fault management are identified. Further, error structures associated with each hardware module are determined and unique identifiers are assigned to the determined error structures. Furthermore, the error structures are modeled in a centralized repository. In addition, rules are associated with each modeled error structure for detecting hardware failures. Moreover, the rules of each modeled error structure are stored in the centralized repository using associated rule identifiers.
    Type: Grant
    Filed: October 8, 2012
    Date of Patent: March 14, 2017
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Suhas Shivanna, Valentin Anders, Sunil Malhotra, Omkar S Prabhakar
  • Publication number: 20170046233
    Abstract: Techniques for on-demand remote diagnostics for hardware component/device failure and disk drive data recovery using embedded media are described. In one example embodiment, a hardware device failure event alert along with a unique ID and a hardware device configuration fingerprint is sent upon detecting a hardware component failure event associated with the hardware device in a datacenter to an image management framework. A recovery image associated with the hardware device failure event is then obtained using the unique ID and the hardware device configuration fingerprint. The recovery image is then stored in an embedded storage media associated with the failed hardware device. The embedded storage media is then configured as a bootable hardware device. The hardware component failure is then diagnosed using the stored recovery image and the bootable hardware device upon hardware device boot-up. Recovering from the hardware device failure based on diagnosing the hardware component failure.
    Type: Application
    Filed: April 30, 2014
    Publication date: February 16, 2017
    Inventors: Suhas Shivanna, Sandeep Bangalore Harshavardhana, Raghunandan Chikkaramaiah
  • Publication number: 20170043716
    Abstract: Alarm indications of objects (431, 631) in spaces (113) subject to vehicle movements are provided using a scanner unit configured to provide indications of directions and distances of objects within a scan area. A computer compares the signal output from a scanner unit (121) and resolves the signal output to a pattern of the indications of directions and distances, and further resolve multiple instances of the indications over time to resolve the pattern of indications and distances to movement corresponding to the movement of the objects (431, 631). The indications are compared to render an indication of objects (431) partially blocked by other ones (631) of the objects from line-of-sight of the scanner unit (121). Predetermined relative movements of the objects (431, 631) as resolved by the computer render predetermined indicator or alarm signals (341, 342, 345).
    Type: Application
    Filed: August 13, 2015
    Publication date: February 16, 2017
    Inventors: Dale HOEPNER, Monisha SHIVANNA, Aaron ROTHMEYER, Don ALEXANDER
  • Publication number: 20170039105
    Abstract: Techniques for support activity based self learning and analytics for datacenter device hardware/firmware fault management are described. In one example, a service event including a unique service event ID, a set of prioritized cause and support engineer actions/recommendations and associated unique support engineer action codes are generated for the support engineer upon detecting a hardware/firmware failure event. Support engineer actions taken by the support engineer upon completing the service event are then received. The support engineer actions are then analyzed using the set of prioritized cause and support engineer actions/recommendations and FRU configuration information before and after servicing the hardware/firmware failure. Any potential errors resulting from the support engineer actions are then determined and notified at real-time to the support engineer based on the outcome of the analysis.
    Type: Application
    Filed: April 30, 2014
    Publication date: February 9, 2017
    Inventors: Suhas Shivanna, Bino Joseph Polackal, Afreen Ahmed
  • Publication number: 20160381049
    Abstract: The present invention collects raw packet data related to network traffic flow over the course of time. By combining metadata from the application layer and/or session layer with user and device identity data as well as indicators of a network threat that are received from threat feeds, information concerning pre-existing or post-mortem network incidents may be identified. Based on the nature of a particular network threat and a collective history of network traffic flow over the course of time, analytics may allow for identification of compromised users, files, and network nodes. Such an identification may in turn allow for removal, rehabilitation, or further investigation.
    Type: Application
    Filed: June 26, 2015
    Publication date: December 29, 2016
    Inventors: Faizel Zulfikar Lakhani, Rajdeep Singh Wadhwa, Kevin Joseph McTiernan, Nagendra Swamy Honnalagere Shivanna
  • Publication number: 20160344582
    Abstract: In one implementation, a call home system comprises a configuration engine, a cluster engine and an assignment engine. The configuration engine can identify a plurality of potential call home devices. The cluster engine can group a plurality of compute devices into a plurality of clusters. The assignment engine can assign a master call home device to each cluster. In another implementation, a method for calling home can comprise broadcasting a first message, receiving a response from a call home master associated with a cluster, and selecting a group identifier to append to a second message.
    Type: Application
    Filed: January 10, 2014
    Publication date: November 24, 2016
    Inventors: Suhas Shivanna, Mahesh Babu Ramaiah, Dileesh Onniyil
  • Patent number: 9343181
    Abstract: Techniques for handling errors on memory modules are provided. An uncorrected error from a pair of memory modules may be received. Memory modules other than the pair of memory modules producing the error may be de-configured. Diagnostic tests may be run on the faded pair of memory modules. The memory module of the pair of memory modules that caused the uncorrected error may be determined.
    Type: Grant
    Filed: August 30, 2013
    Date of Patent: May 17, 2016
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Shivanna Suhas, Ramaiah Mahesh, Suresh Brinda Yelandur, Malhotra Sunil
  • Publication number: 20150293800
    Abstract: A robust hardware fault management system, method and framework for providing robust hardware fault management for enterprise devices are disclosed. In one example, hardware devices and associated hardware modules in each of the enterprise devices requiring the robust hardware fault management are identified. Further, error structures associated with each hardware module are determined and unique identifiers are assigned to the determined error structures. Furthermore, the error structures are modeled in a centralized repository. In addition, rules are associated with each modeled error structure for detecting hardware failures. Moreover, the rules of each modeled error structure are stored in the centralized repository using associated rule identifiers.
    Type: Application
    Filed: October 8, 2012
    Publication date: October 15, 2015
    Inventors: Suhas Shivanna, Valentin Anders, Sunil Malhotra, Omkar S Prabhakar
  • Patent number: 9148430
    Abstract: A share group of servers comprises a first server and a second server. The first server has a server partition and a management processor which is separate from said server partition. Usage rights may be transferred from the first server to the second server by executing machine readable instructions on the management processor which is separate from said server partition.
    Type: Grant
    Filed: August 17, 2011
    Date of Patent: September 29, 2015
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Santosh Kumar Gangaraj Manoharan, Suhas Shivanna