Patents by Inventor Sudhir Vittal Shetty
Sudhir Vittal Shetty has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10491465Abstract: A device management system that receives a first service request message for a remote device node, the request including an address identifier and a connection profile identifier. The system retrieves from a database protocol configuration information associated with the service request. The system connects to the remote device using the protocol configuration information and iterates through device packs and identifies a device type and support for in-band and out-of band application protocols for the remote device. The system retrieves and stores the retrieved device type and in-band and out-of band application protocols. The system further receives a second service request message that includes a device identifier of the remote device and iteratively connect to the remote device associated with the device identifier using each of the in-band and out-of band application protocols and retrieves an inventory of management operations associated with each application protocol.Type: GrantFiled: May 12, 2017Date of Patent: November 26, 2019Assignee: DELL PRODUCTS L.P.Inventors: Vijayasimha Reddy Naga, Prakash Nara, Sudhir Vittal Shetty, Kathleen A. Hattaway, III, Dahir Nur Herzi, Madhav Karri, Venkata Bala Koteswararao Donepudi
-
Patent number: 10425287Abstract: An information handling system may include a processor, a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution by the processor, cause the processor to: (i) responsive to a physical connection being made between components of a system comprising multiple information handling system chassis, receive a message; (ii) process information present in the message indicative of a topology of connectivity among the components of the system; and (iii) update a data structure defining the topology of connectivity of the various components of the system based on the information present in the message.Type: GrantFiled: February 23, 2017Date of Patent: September 24, 2019Assignee: Dell Products L.P.Inventors: Sudhir Vittal Shetty, Sanjay Sane, Balaji Rajagopalan, Jacob R. Hutcheson, Prakash Nara, Babu Chandrasekhar
-
Publication number: 20190273798Abstract: In accordance with embodiments of the present disclosure, an information handling system may include a plurality of slots, each slot of the plurality of slots configured to receive a computing node, a wireless communication interface, and a management controller communicatively coupled to the slots, communicatively coupled to the wireless communication interface, and configured to provide management of the information handling system. The management controller may be further configured to execute an aggregator service, wherein the aggregator service exposes a plurality of proxy attributes through which a client mobile device external to the information handling system and configured to manage the information handling system via the wireless communication interface accesses services and attributes of the information handling system.Type: ApplicationFiled: March 1, 2018Publication date: September 5, 2019Applicant: Dell Products L.P.Inventors: Jeff M. LAIRSEY, Sudhir Vittal SHETTY, Arulnambi RAJU, My TRAN
-
Publication number: 20190258802Abstract: A method may include determining if both of two redundant operating system images for executing functionality of a chassis management controller were found during one or more previous boot sessions of the chassis management controller to be unsecure, wherein each operating system image comprises an integrated kernel and initial file root system stored in a respective first partition of a memory of the chassis management controller, verity hashes of a root file system of such operating system image, the verity hashes stored in a respective second partition of the memory, and the root file system of such operating system image stored in a respective third partition of the memory. The method may also include, in response to determining that one of the two redundant operating system images is secure, initiate verification of such operating system image to determine if such operating system image has indicia of tampering.Type: ApplicationFiled: May 3, 2019Publication date: August 22, 2019Applicant: Dell Products L.P.Inventors: Prakash NARA, Wei LIU, Charles E. ROSE, Santosh KUMAR, Sudhir Vittal SHETTY, Marshal F. SAVAGE, Rhushabh BHANDARI, Madhav KARRI
-
Patent number: 10348592Abstract: In accordance with embodiments of the present disclosure, a method may include, in response to an attempted execution of an executable endpoint, determining if the executable endpoint is unexpired, performing an endpoint operation of the executable endpoint if the endpoint is unexpired, after performance of the endpoint operation, determining if the executable endpoint has met a condition for expiration, and modifying metadata associated with the executable endpoint such that the executable endpoint is prevented from further attempted execution if the executable endpoint has met a condition for expiration.Type: GrantFiled: February 8, 2017Date of Patent: July 9, 2019Assignee: Dell Products L.P.Inventors: Prakash Nara, Sudhir Vittal Shetty
-
Patent number: 10331892Abstract: A method may include determining if both of two redundant operating system images for executing functionality of a chassis management controller were found during one or more previous boot sessions of the chassis management controller to be unsecure, wherein each operating system image comprises an integrated kernel and initial file root system stored in a respective first partition of a memory of the chassis management controller, verity hashes of a root file system of such operating system image, the verity hashes stored in a respective second partition of the memory, and the root file system of such operating system image stored in a respective third partition of the memory. The method may also include, in response to determining that one of the two redundant operating system images is secure, initiate verification of such operating system image to determine if such operating system image has indicia of tampering.Type: GrantFiled: February 24, 2017Date of Patent: June 25, 2019Assignee: Dell Products L.P.Inventors: Prakash Nara, Wei Liu, Charles E. Rose, Santosh Kumar, Sudhir Vittal Shetty, Marshal F. Savage, Rhushabh Bhandari, Madhav Karri
-
Patent number: 10303568Abstract: A chassis management controller may, responsive to initialization of the chassis management controller, execute cluster-aware services of the chassis management controller in a stand-by mode and communicate via a private management network fabric to determine if one or more other chassis management controllers are communicatively coupled to the private management network fabric. The chassis management controller may also, responsive to determining that one or more other chassis management controllers are communicatively coupled to the private management network fabric, alone or in concert with the one or more other chassis management controllers, elect an active chassis management controller from a plurality of chassis management controllers comprising the chassis management controller and the one or more other chassis management controllers.Type: GrantFiled: February 10, 2017Date of Patent: May 28, 2019Assignee: Dell Products L.P.Inventors: Prakash Nara, Sudhir Vittal Shetty, Balaji Shanmugam
-
Patent number: 10235235Abstract: Methods and systems for modular system awareness in virtualized information handling systems (IHSs) include generating, by a chassis management controller (CMC), dependency information indicating which ones of modular IHSs included in a chassis are dependent on individual shared components in the chassis. When a fault occurs at one of the shared components, the CMC may determine, using the dependency information, which particular ones of the modular IHSs are operationally dependent on the fault. The CMC may send information indicative of the fault and of the dependent modular IHSs to a virtual machine manager, which may generate a ranking of virtual machines. The virtual machine manager may use the rankings to make migration decisions for virtual machines among modular IHSs.Type: GrantFiled: January 25, 2017Date of Patent: March 19, 2019Assignee: Dell Products L.P.Inventors: Sudhir Vittal Shetty, Matthew Christian Paul, Manoj Sharad Gujarathi, Mukund P. Khatri, Damon Earley
-
Publication number: 20180331894Abstract: A device management system that receives a first service request message for a remote device node, the request including an address identifier and a connection profile identifier. The system retrieves from a database protocol configuration information associated with the service request. The system connects to the remote device using the protocol configuration information and iterates through device packs and identifies a device type and support for in-band and out-of band application protocols for the remote device. The system retrieves and stores the retrieved device type and in-band and out-of band application protocols. The system further receives a second service request message that includes a device identifier of the remote device and iteratively connect to the remote device associated with the device identifier using each of the in-band and out-of band application protocols and retrieves an inventory of management operations associated with each application protocol.Type: ApplicationFiled: May 12, 2017Publication date: November 15, 2018Inventors: Vijayasimha Reddy Naga, Prakash Nara, Sudhir Vittal Shetty, Kathleen A. Hattaway, III, Dahir Nur Herzi, Madhav Karri, Venkata B. Donepudi
-
Publication number: 20180255020Abstract: In accordance with embodiments of the present disclosure, a system may include a plurality of chassis, each chassis comprising a plurality of information handling systems and a private inter-chassis network configured to couple the plurality of chassis to one another. Each chassis of the plurality of chassis may be configured to advertise a message to the private inter-chassis network, the message comprising information regarding such chassis. The plurality of chassis may detect the presence of each other based on messages advertised from each chassis and the plurality of chassis may nominate a lead chassis from the plurality of chassis to serve as a single point of management of the system.Type: ApplicationFiled: March 1, 2017Publication date: September 6, 2018Applicant: Dell Products L.P.Inventors: Sudhir Vittal SHETTY, Prakash HARA, Stephanos S. HERACLEOUS, Jacob R. HUTCHESON, Balaji SHANMUGAM
-
Publication number: 20180247059Abstract: A method may include determining if both of two redundant operating system images for executing functionality of a chassis management controller were found during one or more previous boot sessions of the chassis management controller to be unsecure, wherein each operating system image comprises an integrated kernel and initial file root system stored in a respective first partition of a memory of the chassis management controller, verity hashes of a root file system of such operating system image, the verity hashes stored in a respective second partition of the memory, and the root file system of such operating system image stored in a respective third partition of the memory. The method may also include, in response to determining that one of the two redundant operating system images is secure, initiate verification of such operating system image to determine if such operating system image has indicia of tampering.Type: ApplicationFiled: February 24, 2017Publication date: August 30, 2018Applicant: Dell Products L.P.Inventors: Prakash NARA, Wei LIU, Charles E. ROSE, Santosh KUMAR, Sudhir Vittal SHETTY, Marshal F. SAVAGE, Rhushabh BHANDARI, Madhav KARRI
-
Publication number: 20180246837Abstract: In accordance with embodiments of the present disclosure, an information handling system may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution by the processor, cause the processor to (i) read plug-in configuration data setting forth data regarding user interface modifications to be made to a user interface of a management console application; (ii) based on the plug-in configuration data, call one or more pluggable modules; and (iii) integrate user interface features defined by the plug-in configuration data and the one or more pluggable modules into the user interface of the management console application.Type: ApplicationFiled: February 24, 2017Publication date: August 30, 2018Applicant: Dell Products L.P.Inventors: Stephanos S. HERACLEOUS, Sudhir Vittal SHETTY, Nitesh Kumar ANAND
-
Publication number: 20180241632Abstract: An information handling system may include a processor, a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution by the processor, cause the processor to: (i) responsive to a physical connection being made between components of a system comprising multiple information handling system chassis, receive a message; (ii) process information present in the message indicative of a topology of connectivity among the components of the system; and (iii) update a data structure defining the topology of connectivity of the various components of the system based on the information present in the message.Type: ApplicationFiled: February 23, 2017Publication date: August 23, 2018Applicant: Dell Products L.P.Inventors: Sudhir Vittal SHETTY, Sanjay SANE, Balaji RAJAGOPALAN, Jacob R. HUTCHESON, Prakash NARA, Babu CHANDRASEKHAR
-
Publication number: 20180241631Abstract: An information handling system may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution by the processor, cause the processor to determine a topology of connectivity of various components of a system comprising multiple information handling system chassis and apply validation rules to the topology to validate the topology.Type: ApplicationFiled: February 23, 2017Publication date: August 23, 2018Applicant: Dell Products L.P.Inventors: Sudhir Vittal SHETTY, Sanjay SANE, Balaji RAJAGOPALAN
-
Publication number: 20180232290Abstract: A chassis management controller may, responsive to initialization of the chassis management controller, execute cluster-aware services of the chassis management controller in a stand-by mode and communicate via a private management network fabric to determine if one or more other chassis management controllers are communicatively coupled to the private management network fabric. The chassis management controller may also, responsive to determining that one or more other chassis management controllers are communicatively coupled to the private management network fabric, alone or in concert with the one or more other chassis management controllers, elect an active chassis management controller from a plurality of chassis management controllers comprising the chassis management controller and the one or more other chassis management controllers.Type: ApplicationFiled: February 10, 2017Publication date: August 16, 2018Applicant: Dell Products L.P.Inventors: Prakash NARA, Sudhir Vittal SHETTY, Balaji SHANMUGAM
-
Publication number: 20180227200Abstract: In accordance with embodiments of the present disclosure, a method may include, in response to an attempted execution of an executable endpoint, determining if the executable endpoint is unexpired, performing an endpoint operation of the executable endpoint if the endpoint is unexpired, after performance of the endpoint operation, determining if the executable endpoint has met a condition for expiration, and modifying metadata associated with the executable endpoint such that the executable endpoint is prevented from further attempted execution if the executable endpoint has met a condition for expiration.Type: ApplicationFiled: February 8, 2017Publication date: August 9, 2018Applicant: Dell Products L.P.Inventors: Prakash NARA, Sudhir Vittal SHETTY
-
Patent number: 9979627Abstract: Systems and methods for systems and methods for bare-metal network topology discovery. In an illustrative, non-limiting embodiment, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution by the processor, cause the IHS to: receive network topology information from a server, wherein the server is configured to collect at least one portion of the network topology information from one or more network devices via a baseboard management controller (BMC) circuit while the server operates in low-power mode; and provide a graphical display representing the network topology information, the graphical display including a representation of the server, the one or more network devices, and one or more connections between the server and the one or more network devices.Type: GrantFiled: February 6, 2015Date of Patent: May 22, 2018Assignee: Dell Products, L.P.Inventors: Sudhir Vittal Shetty, Hendrich M. Hernandez, Michael Brundridge, Chandrasekhar Puthillathe
-
Patent number: 9942158Abstract: An information handling system (IHS) network includes a switch IHS that coupled together a plurality of server IHSs. A source software-defined (SD) virtual appliance is located on one of the plurality of server IHSs. A destination SD virtual appliance is located on one of the plurality of server IHSs. An SD network controller is located on at least one of the plurality of server IHSs. The SD network controller is configured to receive a data traffic flow identifier and policy information that is associated with at least one data traffic flow policy from the source SD virtual appliance. The SD network controller determines a plurality of ports located between the source SD virtual appliance and the destination SD virtual appliance using the data traffic flow identifier. The SD network controller then configures each of the plurality of ports using the at least one data traffic flow policy.Type: GrantFiled: September 25, 2014Date of Patent: April 10, 2018Assignee: Dell Products L.P.Inventors: Sudhir Vittal Shetty, Gaurav Chawla, Joseph L. White
-
Patent number: 9807727Abstract: A rack location determination system includes a rack that defines a plurality of device housings. A rack wireless communication device is positioned on the rack and a computing device that includes a computing device wireless communication subsystem and that is positioned in a first device housing of the plurality of device housings in the rack. The computing device is configured to receive a wireless signal through the computing device wireless communication subsystem from the rack wireless communication device and determine a wireless signal strength of the received wireless signal. Based on the wireless signal strength of the wireless signal, the computing device is configured to determine a rack location of the computing device by using the wireless signal strength with a wireless signal strength/rack location mapping. The wireless signal strength/rack location mapping is associated with a location of the first rack wireless communication device.Type: GrantFiled: March 6, 2017Date of Patent: October 31, 2017Assignee: Dell Products L.P.Inventors: Sudhir Vittal Shetty, Jeffrey Lairsey
-
Publication number: 20170181116Abstract: A rack location determination system includes a rack that defines a plurality of device housings. A rack wireless communication device is positioned on the rack and a computing device that includes a computing device wireless communication subsystem and that is positioned in a first device housing of the plurality of device housings in the rack. The computing device is configured to receive a wireless signal through the computing device wireless communication subsystem from the rack wireless communication device and determine a wireless signal strength of the received wireless signal. Based on the wireless signal strength of the wireless signal, the computing device is configured to determine a rack location of the computing device by using the wireless signal strength with a wireless signal strength/rack location mapping. The wireless signal strength/rack location mapping is associated with a location of the first rack wireless communication device.Type: ApplicationFiled: March 6, 2017Publication date: June 22, 2017Inventors: Sudhir Vittal Shetty, Jeffrey Lairsey