Patents by Inventor Sumanth Vidyadhara
Sumanth Vidyadhara has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250247255Abstract: One example method includes receiving, by a distributed attestation proxy server (DAPS) from a client, an attestation request, establishing, by the DAPS, a secure communication channel with the client, performing, by the DAPS, a resource discovery process to identify a resource that meets a requirement of the client, facilitating, by the DAPS, an attestation exchange between the client and the resource, performing, by the DAPS, a verification and attestation process that comprises generation of an attestation result, transmitting, by the DAPS, the attestation result to the client, and when the attestation result is positive, establishing, by the DAPS, a secure communication channel between the client and the resource.Type: ApplicationFiled: January 25, 2024Publication date: July 31, 2025Inventors: Vinay Sawal, Viswanath Ponnuru, Sumanth Vidyadhara, Judith A. Furlong
-
Patent number: 12373097Abstract: A system can receive, from a remote computer of remote computers, inventory data representative of an inventory, wherein the inventory data indicates that the remote computer is configured to implement a shared memory pool with the remote computers according to a compute express link protocol. The system can receive, from the remote computer, a request to onboard the remote computer, wherein the request adheres to a defined security protocol and data model architecture, and wherein the system is configured to remotely manage the remote computers as part of a hybrid cloud platform that comprises the remote computers. The system can authenticate the remote computer based on the request and according to the defined security protocol and data model architecture. The system can implement the shared memory pool for the remote computers.Type: GrantFiled: June 28, 2023Date of Patent: July 29, 2025Assignee: Dell Products L.P.Inventors: Vinay Sawal, Viswanath Ponnuru, Sumanth Vidyadhara
-
Publication number: 20250240293Abstract: One example method includes receiving, by a confidential container service from a tenant, a request to provision a tenant node, provisioning the tenant node using a multi-tenant trusted execution environment (TEE) attested resource provisioning process, receiving, from the tenant, tenant-specific security information concerning the tenant node, storing the tenant-specific security information in a tenant-specific catalog, implementing security procedures, specified in the tenant-specific security information, in the tenant node, and upon successful authentication of the tenant, using the security procedures, enabling the tenant to access the tenant specific confidential resources from the tenant node(s).Type: ApplicationFiled: January 19, 2024Publication date: July 24, 2025Inventors: Viswanath Ponnuru, Vinay Sawal, Sumanth Vidyadhara, Judith A. Furlong
-
Publication number: 20250238554Abstract: One example method includes receiving, from a prospective tenant, a request to join a tenant cluster of a cloud computing environment, sending a request to verify an authenticity of the prospective tenant, a tenant membership policy applicable to the prospective tenant, and a trusted execution environment (TEE) remote attestation, checking the authenticity and TEE remote attestation against the tenant membership policy, and when the authenticity and TEE remote attestation against the tenant membership policy are verified as indicative of a compliance of the prospective tenant, adding the prospective tenant to the tenant cluster.Type: ApplicationFiled: January 19, 2024Publication date: July 24, 2025Inventors: Viswanath Ponnuru, Vinay Sawal, Sumanth Vidyadhara, Judith A. Furlong
-
Publication number: 20250233758Abstract: Confidential workload provisioning is disclosed. To overcome various hardware constraints, a workload (e.g., image or container) to be executed confidentially in an enclave is verified and then re-signed by the cloud service. Re-signing the workload allows workloads to be provisioned confidentially in enclaves or other secure environments while eliminating hardware constraints that may impact workload provisioning.Type: ApplicationFiled: January 11, 2024Publication date: July 17, 2025Inventors: Viswanath Ponnuru, Vinay Sawal, Sumanth Vidyadhara, Judith A. Furlong
-
Publication number: 20250232027Abstract: Confidential workload error recovery and reporting is disclosed. When an exception or other fault or error occurs in a trusted execution environment, context data is collected and stored in a remote access controller. The context data can be analyzed to determine a cause of the exception. The trusted execution environment is recovered based on the analysis of the context information and/or content of the trusted execution environment.Type: ApplicationFiled: January 11, 2024Publication date: July 17, 2025Inventors: Viswanath Ponnuru, Vinay Sawal, Sumanth Vidyadhara, Judith A. Furlong
-
Patent number: 12267315Abstract: Methods, systems, and devices for providing for trust in a distributed environment are disclosed. In a distributed environment, various devices may be remote to one another and may interact with one another via one or more operable connections. Through the operable connections, various communications may be exchanged. However, the operable connections may not natively support authentication of any particular device in the distributed system. Consequently, entities in the distributed system may not intrinsically trust that the communications received through the distributed environment are authentic. The entities of the system may mutually authenticate one another prior to trusting communications from the other entities. For example, in a scenario where a client wishes to access data hosted by a data source, the client and data source may go through a process of mutually authenticating one another. By doing so, a trusted environment may be established.Type: GrantFiled: November 15, 2021Date of Patent: April 1, 2025Assignee: Dell Products L.P.Inventors: Sumanth Vidyadhara, Manjunath Gr, Shubham Kumar
-
Publication number: 20250047712Abstract: The technology described herein, which can be incorporated into a bare metal as a service environment, is generally directed towards monitoring retrieving and analyzing security configuration stored on recovery partition storage (e.g., OEM partition drives), which can contain critical logs, error state data, and boot critical security data. A backend security policy engine enforces security context configuration policy data, including to prevent malicious attacks on the backend services. Bare metal in-band compute device health is monitored by an out-of-band network using telemetry data services. When an unrecoverable system state is detected, the out-of-band network activates the recovery partition storage for recording the system sensitive logs, debug data and error states, which is stored as encrypted per security policies. Security policy is enforced, including on system logs, to prevent data tampering and/or malicious attacks. A recovery scenario is performed to restore operation of the compute device.Type: ApplicationFiled: August 2, 2023Publication date: February 6, 2025Inventors: Vinay Sawal, Viswanath Ponnuru, Igor Pedan, Sumanth Vidyadhara, Magesh Kumar Sivaswamy
-
Publication number: 20250004639Abstract: A system can receive, from a remote computer of remote computers, inventory data representative of an inventory, wherein the inventory data indicates that the remote computer is configured to implement a shared memory pool with the remote computers according to a compute express link protocol. The system can receive, from the remote computer, a request to onboard the remote computer, wherein the request adheres to a defined security protocol and data model architecture, and wherein the system is configured to remotely manage the remote computers as part of a hybrid cloud platform that comprises the remote computers. The system can authenticate the remote computer based on the request and according to the defined security protocol and data model architecture. The system can implement the shared memory pool for the remote computers.Type: ApplicationFiled: June 28, 2023Publication date: January 2, 2025Inventors: Vinay Sawal, Viswanath Ponnuru, Sumanth Vidyadhara
-
Publication number: 20250007954Abstract: A system can receive, from a remote computer of remote computers, inventory data representative of an inventory, wherein the inventory data indicates that the remote computer is configured to interact with other remote computers of the remote computers according to a compute express link protocol. The system can receive, from the remote computer, a request to onboard the remote computer, wherein the request adheres to a defined security protocol and data model architecture, and wherein the system is configured to remotely manage the remote computers as part of a hybrid cloud platform that comprises the remote computers. The system can authenticate the remote computer based on the request and according to the defined security protocol and data model architecture. The system can remotely monitor hardware resources of the remote computers based on workload configuration map data representative of a workload configuration map of the remote computers.Type: ApplicationFiled: June 28, 2023Publication date: January 2, 2025Inventors: Vinay Sawal, Viswanath Ponnuru, Sumanth Vidyadhara
-
Patent number: 12182596Abstract: A system, method, and computer-readable medium are disclosed for servicing and managing a bare metal information handling system. An embedded lightweight operating system on the bare metal information handling system is booted up. The embedded lightweight operating system initiates a platform inference engine which is provided rules and policies as to applications to be run on the bare metal information handling system. The platform inference engine initiates a secure workspace launcher to launch a user workspace user experience environment. The user workspace user experience environment is provided on the bare metal information handling system.Type: GrantFiled: August 31, 2021Date of Patent: December 31, 2024Assignee: Dell Products L.P.Inventors: Anantha K. Boyapalle, Sumanth Vidyadhara
-
Patent number: 12141588Abstract: An information handling system includes a memory device, a memory, a chipset, and a basic input/output system (BIOS). The chipset includes a main processor and a hybrid processor. During a first pre-boot phase, the BIOS memory maps the hybrid processor to a first portion of the memory device, and stores an embedded operating system in the memory. During a second pre-boot phase, the BIOS memory maps the main processor to a second portion of the memory device, stores a host operating system in the memory, and loads the embedded operating system on the hybrid processor. The second portion is a larger portion of the memory device than the first portion.Type: GrantFiled: October 10, 2023Date of Patent: November 12, 2024Assignee: Dell Products L.P.Inventors: Shekar Babu Suryanarayana, Sumanth Vidyadhara, Vivek Viswanathan Iyer
-
Publication number: 20240370285Abstract: An information handling system may include at least one processor and a storage resource having a bare-metal operating system thereon. Upon a first boot of the information handling system, the bare-metal operating system may deploy a hypervisor to be executed by the at least one processor; and implement a device enumeration protocol mapping virtual objects associated with the bare-metal operating system to virtual device objects associated with the hypervisor.Type: ApplicationFiled: May 3, 2023Publication date: November 7, 2024Applicant: Dell Products L.P.Inventors: Shekar Babu SURYANARAYANA, Anand Prakash JOSHI, Sumanth VIDYADHARA
-
Patent number: 12126731Abstract: Methods and systems for managing the operation of host devices is disclosed. A host device may include a computing device that operates in accordance with operation data. The operation data may include, for example, startup data such as code for a management entity (e.g., a basic input output system), settings (e.g., hardware and/or software) for the startup management entity, setting for general operation after booting to an operating system, copies of code (e.g., computer instructions executable with a processor) for applications to be executed by the host device, etc. If the operation data is modified, operation of the host device may be similarly modified.Type: GrantFiled: October 28, 2021Date of Patent: October 22, 2024Assignee: Dell Products L.P.Inventors: Venkata Rama Krishna Rao Atta, Sumanth Vidyadhara, Adolfo Sandor Montero, Young Hwan Jang
-
Publication number: 20240281543Abstract: In response to reception of a hypercall addition request, a virtual machine receives a public key. Based on the public key, the virtual machine determines whether the hypercall addition request is valid. In response to the hypercall being valid, the virtual machine adds a hypercall associated with the hypercall addition request within a hypervisor of an information handling system.Type: ApplicationFiled: February 16, 2023Publication date: August 22, 2024Inventors: Ankit Singh, Sumanth Vidyadhara, Shrikant Hallur
-
Patent number: 12067385Abstract: Disclosed methods may push a capsule update including a best known configuration-compute express link (BKC-CXL) firmware update to a boot time memory area. Following a platform reboot, BKC-CXL firmware update operations are performed. The update operations include mapping a BKC-CXL runtime memory area to a non-volatile BKC store, identifying current CXL attributes from the runtime memory area, extracting the firmware update, creating one or more BKC-CXL objects from the firmware update to enable dynamic configuration of CXL parameters, comparing current CXL attributes with stored CXL attributes to identify CXL attribute changes, and saving information indicative of the CXL attribute changes back to the non-volatile BKC store.Type: GrantFiled: July 28, 2022Date of Patent: August 20, 2024Assignee: Dell Products L.P.Inventors: Shekar Babu Suryanarayana, Sumanth Vidyadhara
-
Patent number: 12061704Abstract: A vulnerability management method acquires, during an OS runtime of an information handling system, vulnerability information indicating potentially vulnerable resources of the system. Disclosed methods calculate a vulnerability determination code (VDC) based on the vulnerability information. The VDC may indicate a scan zone that includes one or more scan zone components. Each component may correspond to a region of a potentially vulnerable resource. After a system reset, disclosed methods may perform a vulnerability aware (VA) boot sequence. The VA boot sequence may include, prior to booting a runtime operating system, determining, in accordance with the vulnerability information, whether to perform a comprehensive vulnerability detection (CVD) boot. A CVD boot refers to a boot sequence configured to boot a distinct operating system dedicated to performing a targeted vulnerability assessment that includes scanning the scan zone components indicated by the VDC.Type: GrantFiled: April 25, 2022Date of Patent: August 13, 2024Assignee: Dell Products L.P.Inventors: Shekar Babu Suryanarayana, Sumanth Vidyadhara
-
Patent number: 12061911Abstract: An information handling system may include a processor and a basic input/output system configured to be the first code executed by the processor when the information handling system is booted and configured to initialize components of the information handling system into a known state, the basic input/output system further configured to implement a virtual machine monitor, the virtual machine monitor configured to isolate resources of the information handling system allocated to a network boot process of the information handling system from other resources of the information handling system allocated to other components of the basic input/output system.Type: GrantFiled: March 4, 2021Date of Patent: August 13, 2024Assignee: Dell Products L.P.Inventors: Sumanth Vidyadhara, Shubham Kumar
-
Patent number: 12045326Abstract: A disclosed method installs an I/O trap protocol to provide an authentication callback function for handling I/O trap events. I/O trap events may include write operations accessing any of one or more identified I/O addresses. An I/O trap event may be registered with the authentication callback function for each of one or more identified I/O addresses. Original values of data may be stored in a memory resource. Any occurrences of an I/O trap event triggers the authentication callback function to perform I/O trap operations. The I/O trap operations may include determining whether the I/O trap event is associated with an approved driver and, if not, restoring data stored at the identified I/O address to an original value. Installing the I/O trap protocol may include installing the I/O trap protocol during a system management mode (SMM) phase of a UEFI boot sequence.Type: GrantFiled: July 14, 2022Date of Patent: July 23, 2024Assignee: Dell Products L.P.Inventors: Sumanth Vidyadhara, Karunakar Poosapalli, Bibby Yeh
-
Publication number: 20240143814Abstract: Disclosed subject matter enables a recovery and resume of secure platform services based on indicator of attack for the UEFI boot path and UEFI drivers for any access to storage or network medium. Disclosed methods may employ an unsupervised learning model, based on information referred to herein as Indicator of Attack (IOA) information, and create a unique resilient BIOS access for UEFI drivers, file system, media and network. Disclosed teachings enable secure services for access to UEFI drivers, file systems, media, and network using a dynamic resilient layer to handle IOA. Dynamic methods to create runtime metadata for file system logical blocks for OEM nested file system partition and pre boot OEM authentication are also disclosed. Disclosed teachings support a UEFI file system interface that implements a runtime remap method for OEM-provided drivers.Type: ApplicationFiled: October 28, 2022Publication date: May 2, 2024Applicant: Dell Products L.P.Inventors: Sumanth VIDYADHARA, Karunakar POOSAPALLI