Patents by Inventor Sushma Basavarajaiah
Sushma Basavarajaiah has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11652806Abstract: A key management system includes a managed system coupled to a management system through a network. The managed system includes managed device locking subsystem(s) coupled to a managed device and a key storage. The managed device locking subsystem(s) retrieve, through the network from the management system, a managed device locking key that is configured to unlock the managed device. The managed device locking subsystem(s) then encrypt the managed device locking key to provide an encrypted managed device locking key, and store the encrypted managed device locking key in the key storage. Subsequent to storing the encrypted managed device locking key, the managed device locking subsystem(s) retrieve the encrypted managed device locking key from the key storage, and decrypt the encrypted managed device locking key to provide a decrypted managed device locking key. The managed device locking subsystem(s) then use the decrypted managed device locking key to unlock the managed device.Type: GrantFiled: July 12, 2021Date of Patent: May 16, 2023Assignee: Dell Products L.P.Inventors: Deepaganesh Paulraj, Rama Rao Bisa, Chitrak Gupta, Sushma Basavarajaiah, Mukund P. Khatri
-
Patent number: 11650938Abstract: A device-capability-based locking key management system includes a key management system coupled to a server device via a network. The server device includes storage devices coupled to a remote access controller device. The remote access controller device identifies each of the storage devices, and then identifies a key management profile for each of the storage devices. A first key management profile identified for at least one first storage device is different from a second key management profile identified for at least one second storage device. The remote access controller device then uses the respective key management profile identified for each of the storage devices to create a respective key management sub-client for each of the storage devices, and each respective key management sub-client communicates with the key management system to provide a locking key for its respective storage device.Type: GrantFiled: January 25, 2019Date of Patent: May 16, 2023Assignee: Dell Products L.P.Inventors: Rama Rao Bisa, Sushma Basavarajaiah, Mukund P. Khatri, Chandrashekar Nelogal, Chitrak Gupta, Manjunath Am
-
Patent number: 11423089Abstract: A natural language processing system includes a model trainer operable to train a natural language processing model based on a training corpus, wherein the training corpus includes a data set from one of multiple languages. An action manager curates application programming interfaces, and a processor receives a natural language query at the natural language processing system, wherein the natural language query is directed to a remote component, and the natural language query is in a language other than English. The processor determines the language of the natural language query, and binds the intent of the natural language query to an action, wherein the action is a function to be carried out by the remote component.Type: GrantFiled: September 25, 2019Date of Patent: August 23, 2022Assignee: Dell Products L.P.Inventors: Chitrak Gupta, Sushma Basavarajaiah, Mainak Roy
-
Patent number: 11409884Abstract: A system, method, and computer-readable medium for a security vulnerability detection operation. The security vulnerability operation includes configuring a firmware security profiling environment with a trusted host and a trusted service processor; receiving a firmware update file via the trusted service processor; using the trusted service processor to identify a security vulnerability within the firmware update file; and, installing the firmware update file to the information handling system only when no security vulnerability is identified by the trusted service processor, the installing being performed by the trusted host.Type: GrantFiled: October 31, 2018Date of Patent: August 9, 2022Assignee: Dell Products L.P.Inventors: Chitrak Gupta, Rama Rao Bisa, Elie A. Jreij, Sushma Basavarajaiah, Kala Sampathkumar, Mainak Roy
-
Patent number: 11252138Abstract: A redundant key management system includes a key management system coupled to a plurality of server devices through a network. A first server device includes a managed device coupled to a first remote access controller device that receive a device locking key from the key management system and uses it to lock the managed device. The first remote access controller device then encrypts the device locking key, broadcasts the encrypted device locking key through the network to a second remote access controller device in a second server device, and erases the device locking key. Subsequently, the first remote access controller device transmits a request to retrieve the encrypted device locking key. When the first remote access controller receives the encrypted device locking key from the second remote access controller device, it decrypts the encrypted device locking key and uses the resulting device locking key to unlock the managed device.Type: GrantFiled: January 24, 2019Date of Patent: February 15, 2022Assignee: Dell Products L.P.Inventors: Chitrak Gupta, Shinose Abdul Rahiman, Sushma Basavarajaiah, Mukund P. Khatri, Elie Antoun Jreij, Rama Rao Bisa, Kala Sampathkumar
-
Patent number: 11196549Abstract: A key retrieval system includes a management system and a managed system that is coupled to the management system through a network. The managed system includes a managed device, a management system configuration storage, a remote access controller device that stores a management system configuration for the management system in the management system configuration storage and provides a key management client subsystem that is configured to use the management system configuration to access the management system. The managed system also includes a BIOS. The BIOS detects an event that triggers unlocking the managed device. The BIOS determines that the remote access controller device is unavailable and, in response, retrieves the management system configuration and accesses the management system using the management system configuration. The BIOS then retrieves the locking key from the management system and unlocks the managed device using the locking key.Type: GrantFiled: January 30, 2019Date of Patent: December 7, 2021Assignee: Dell Products L.P.Inventors: Vigneswaran Ponnusamy, Chitrak Gupta, Sanjeev S. Dambal, Charles Stracener, Sanjay Rao, Diwahar Natarajan, Sushma Basavarajaiah, Rama Rao Bisa, Mukund P. Khatri
-
Publication number: 20210344658Abstract: A key management system includes a managed system coupled to a management system through a network. The managed system includes managed device locking subsystem(s) coupled to a managed device and a key storage. The managed device locking subsystem(s) retrieve, through the network from the management system, a managed device locking key that is configured to unlock the managed device. The managed device locking subsystem(s) then encrypt the managed device locking key to provide an encrypted managed device locking key, and store the encrypted managed device locking key in the key storage. Subsequent to storing the encrypted managed device locking key, the managed device locking subsystem(s) retrieve the encrypted managed device locking key from the key storage, and decrypt the encrypted managed device locking key to provide a decrypted managed device locking key. The managed device locking subsystem(s) then use the decrypted managed device locking key to unlock the managed device.Type: ApplicationFiled: July 12, 2021Publication date: November 4, 2021Inventors: Deepaganesh Paulraj, Rama Rao Bisa, Chitrak Gupta, Sushma Basavarajaiah, Mukund P. Khatri
-
Patent number: 11095445Abstract: A system includes a management system, a managed system that is coupled to the management system through a network. The managed system comprises a managed device, a key identifier storage, a first managed device locking system coupled to the managed device and the key identifier storage, and a second managed device locking system coupled to the managed device, the key identifier storage, and the first managed device locking system. The first managed device locking system is configured to store a key identifier of the managed device in the key identifier storage and to provide access to a locking key of the managed device based upon the key identifier of the managed device, stored in a management system. The second managed device locking system is configured to monitor the managed device for an event that triggers unlocking the managed device, monitor operating status of the first managed device locking system.Type: GrantFiled: January 30, 2019Date of Patent: August 17, 2021Assignee: Dell Products L.P.Inventors: Chitrak Gupta, Rama Rao Bisa, Sushma Basavarajaiah, Kala Sampathkumar, Shekar Babu Suryanarayana, Mukund P. Khatri, Ajay Shenoy
-
Patent number: 11095628Abstract: A key management system includes a managed system coupled to a management system through a network. The managed system includes managed device locking subsystem(s) coupled to a managed device and a key storage. The managed device locking subsystem(s) retrieve, through the network from the management system, a managed device locking key that is configured to unlock the managed device. The managed device locking subsystem(s) then encrypt the managed device locking key to provide an encrypted managed device locking key, and store the encrypted managed device locking key in the key storage. Subsequent to storing the encrypted managed device locking key, the managed device locking subsystem(s) retrieve the encrypted managed device locking key from the key storage, and decrypt the encrypted managed device locking key to provide a decrypted managed device locking key. The managed device locking subsystem(s) then use the decrypted managed device locking key to unlock the managed device.Type: GrantFiled: January 24, 2019Date of Patent: August 17, 2021Assignee: Dell Products L.P.Inventors: Deepaganesh Paulraj, Rama Rao Bisa, Chitrak Gupta, Sushma Basavarajaiah, Mukund P. Khatri
-
Publication number: 20210089587Abstract: A natural language processing system includes a model trainer operable to train a natural language processing model based on a training corpus, wherein the training corpus includes a data set from one of multiple languages. An action manager curates application programming interfaces, and a processor receives a natural language query at the natural language processing system, wherein the natural language query is directed to a remote component, and the natural language query is in a language other than English. The processor determines the language of the natural language query, and binds the intent of the natural language query to an action, wherein the action is a function to be carried out by the remote component.Type: ApplicationFiled: September 25, 2019Publication date: March 25, 2021Inventors: Chitrak Gupta, Sushma Basavarajaiah, Mainak Roy
-
Patent number: 10936510Abstract: A locking key secondary access system includes a key management system coupled to a secondary locking key access device and a server device via a network. The server device includes a managed device. The server device receives a request to unlock the managed device, and determines that a first access path via a first communication subsystem and through the network to the key management system is unavailable. In response, the server device provides locking key request information via a second communication subsystem to the secondary locking key access device. The secondary locking key access device may use the locking key information to retrieve a locking key for the managed device from the key management system. The secondary locking key access device sends the locking key to the server device via the second communication subsystem, and the server device uses the locking key to unlock the managed device.Type: GrantFiled: January 25, 2019Date of Patent: March 2, 2021Assignee: Dell Products L.P.Inventors: Chitrak Gupta, Sushma Basavarajaiah, Rama Rao Bisa, Mukund P. Khatri
-
Patent number: 10860707Abstract: In accordance with embodiments of the present disclosure, an information handling system may include a processor and a non-transitory computer-readable medium having stored thereon a program of instructions executable by the processor. The program of instructions may be configured to, when read and executed by the processor, receive an initial password, the initial password comprising a string of characters to be entered by a user of the information handling system for accessing the information handling system, separate the initial password into a plurality of compartments, select a random order of the plurality of compartments, generate a key based on the initial password as rearranged in accordance with the random order of the plurality of compartments, and store a key sequence representative of the random order of the plurality of compartments.Type: GrantFiled: December 15, 2017Date of Patent: December 8, 2020Assignee: Dell Products L.P.Inventors: Chitrak Gupta, Sushma Basavarajaiah
-
Publication number: 20200244632Abstract: A redundant key management system includes a key management system coupled to a plurality of server devices through a network. A first server device includes a managed device coupled to a first remote access controller device that receive a device locking key from the key management system and uses it to lock the managed device. The first remote access controller device then encrypts the device locking key, broadcasts the encrypted device locking key through the network to a second remote access controller device in a second server device, and erases the device locking key. Subsequently, the first remote access controller device transmits a request to retrieve the encrypted device locking key. When the first remote access controller receives the encrypted device locking key from the second remote access controller device, it decrypts the encrypted device locking key and uses the resulting device locking key to unlock the managed device.Type: ApplicationFiled: January 24, 2019Publication date: July 30, 2020Inventors: Chitrak Gupta, Shinose Abdul Rahiman, Sushma Basavarajaiah, Mukund P. Khatri, Elie Antoun Jreij, Rama Rao Bisa, Kala Sampathkumar
-
Publication number: 20200242052Abstract: A locking key secondary access system includes a key management system coupled to a secondary locking key access device and a server device via a network. The server device includes a managed device. The server device receives a request to unlock the managed device, and determines that a first access path via a first communication subsystem and through the network to the key management system is unavailable. In response, the server device provides locking key request information via a second communication subsystem to the secondary locking key access device. The secondary locking key access device may use the locking key information to retrieve a locking key for the managed device from the key management system. The secondary locking key access device sends the locking key to the server device via the second communication subsystem, and the server device uses the locking key to unlock the managed device.Type: ApplicationFiled: January 25, 2019Publication date: July 30, 2020Inventors: Chitrak Gupta, Sushma Basavarajaiah, Rama Rao Bisa, Mukund P. Khatri
-
Publication number: 20200244445Abstract: A key retrieval system includes a management system and a managed system that is coupled to the management system through a network. The managed system includes a managed device, a management system configuration storage, a remote access controller device that stores a management system configuration for the management system in the management system configuration storage and provides a key management client subsystem that is configured to use the management system configuration to access the management system. The managed system also includes a BIOS. The BIOS detects an event that triggers unlocking the managed device. The BIOS determines that the remote access controller device is unavailable and, in response, retrieves the management system configuration and accesses the management system using the management system configuration. The BIOS then retrieves the locking key from the management system and unlocks the managed device using the locking key.Type: ApplicationFiled: January 30, 2019Publication date: July 30, 2020Inventors: Vigneswaran Ponnusamy, Chitrak Gupta, Sanjeev S. Dambal, Charles Stracener, Sanjay Rao, Diwahar Natarajan, Sushma Basavarajaiah, Rama Rao Bisa, Mukund P. Khatri
-
Publication number: 20200244454Abstract: A system includes a management system, a managed system that is coupled to the management system through a network. The managed system comprises a managed device, a key identifier storage, a first managed device locking system coupled to the managed device and the key identifier storage, and a second managed device locking system coupled to the managed device, the key identifier storage, and the first managed device locking system. The first managed device locking system is configured to store a key identifier of the managed device in the key identifier storage and to provide access to a locking key of the managed device based upon the key identifier of the managed device, stored in a management system. The second managed device locking system is configured to monitor the managed device for an event that triggers unlocking the managed device, monitor operating status of the first managed device locking system.Type: ApplicationFiled: January 30, 2019Publication date: July 30, 2020Inventors: Chitrak Gupta, Rama Rao Bisa, Sushma Basavarajaiah, Kala Sampathkumar, Shekar Babu Suryanarayana, Mukund P. Khatri, Ajay Shenoy
-
Publication number: 20200242051Abstract: A device-capability-based locking key management system includes a key management system coupled to a server device via a network. The server device includes storage devices coupled to a remote access controller device. The remote access controller device identifies each of the storage devices, and then identifies a key management profile for each of the storage devices. A first key management profile identified for at least one first storage device is different from a second key management profile identified for at least one second storage device. The remote access controller device then uses the respective key management profile identified for each of the storage devices to create a respective key management sub-client for each of the storage devices, and each respective key management sub-client communicates with the key management system to provide a locking key for its respective storage device.Type: ApplicationFiled: January 25, 2019Publication date: July 30, 2020Inventors: Rama Rao Bisa, Sushma Basavarajaiah, Mukund P. Khatri, Chandrashekar Nelogal, Chitrak Gupta, Manjunath Am
-
Publication number: 20200244635Abstract: A key management system includes a managed system coupled to a management system through a network. The managed system includes managed device locking subsystem(s) coupled to a managed device and a key storage. The managed device locking subsystem(s) retrieve, through the network from the management system, a managed device locking key that is configured to unlock the managed device. The managed device locking subsystem(s) then encrypt the managed device locking key to provide an encrypted managed device locking key, and store the encrypted managed device locking key in the key storage. Subsequent to storing the encrypted managed device locking key, the managed device locking subsystem(s) retrieve the encrypted managed device locking key from the key storage, and decrypt the encrypted managed device locking key to provide a decrypted managed device locking key. The managed device locking subsystem(s) then use the decrypted managed device locking key to unlock the managed device.Type: ApplicationFiled: January 24, 2019Publication date: July 30, 2020Inventors: Deepaganesh Paulraj, Rama Rao Bisa, Chitrak Gupta, Sushma Basavarajaiah, Mukund P. Khatri
-
Patent number: 10699668Abstract: Embodiments of systems and methods for providing configurable video redirection in a data center are discussed. In an embodiment, an Information Handling System (IHS) may include a Baseband Management Controller (BMC); and a memory coupled to the BMC, the memory having program instructions stored thereon that, upon execution by the BMC, cause the BMC to: receive a request from a remote client, where the request follows a first protocol; select one of a plurality of redirection components available to the IHS to populate a framebuffer with video frames using a second protocol; retrieve the video frames from the framebuffer; and transmit a response to the remote client following the first protocol, where the response comprises the video frames.Type: GrantFiled: March 8, 2019Date of Patent: June 30, 2020Assignee: Dell Products, L.P.Inventors: Chitrak Gupta, Rama Rao Bisa, Rajeshkumar Ichchhubhai Patel, Sushma Basavarajaiah, Elie Antoun Jreij, Jitendra Kumar
-
Publication number: 20200134192Abstract: A system, method, and computer-readable medium for a security vulnerability detection operation. The security vulnerability operation includes configuring a firmware security profiling environment with a trusted host and a trusted service processor; receiving a firmware update file via the trusted service processor; using the trusted service processor to identify a security vulnerability within the firmware update file; and, installing the firmware update file to the information handling system only when no security vulnerability is identified by the trusted service processor, the installing being performed by the trusted host.Type: ApplicationFiled: October 31, 2018Publication date: April 30, 2020Applicant: Dell Products L.P.Inventors: Chitrak Gupta, Rama Rao Bisa, Elie A. Jreij, Sushma Basavarajaiah, Kala Sampathkumar, Mainak Roy