Patents by Inventor Sushma Basavarajaiah

Sushma Basavarajaiah has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11652806
    Abstract: A key management system includes a managed system coupled to a management system through a network. The managed system includes managed device locking subsystem(s) coupled to a managed device and a key storage. The managed device locking subsystem(s) retrieve, through the network from the management system, a managed device locking key that is configured to unlock the managed device. The managed device locking subsystem(s) then encrypt the managed device locking key to provide an encrypted managed device locking key, and store the encrypted managed device locking key in the key storage. Subsequent to storing the encrypted managed device locking key, the managed device locking subsystem(s) retrieve the encrypted managed device locking key from the key storage, and decrypt the encrypted managed device locking key to provide a decrypted managed device locking key. The managed device locking subsystem(s) then use the decrypted managed device locking key to unlock the managed device.
    Type: Grant
    Filed: July 12, 2021
    Date of Patent: May 16, 2023
    Assignee: Dell Products L.P.
    Inventors: Deepaganesh Paulraj, Rama Rao Bisa, Chitrak Gupta, Sushma Basavarajaiah, Mukund P. Khatri
  • Patent number: 11650938
    Abstract: A device-capability-based locking key management system includes a key management system coupled to a server device via a network. The server device includes storage devices coupled to a remote access controller device. The remote access controller device identifies each of the storage devices, and then identifies a key management profile for each of the storage devices. A first key management profile identified for at least one first storage device is different from a second key management profile identified for at least one second storage device. The remote access controller device then uses the respective key management profile identified for each of the storage devices to create a respective key management sub-client for each of the storage devices, and each respective key management sub-client communicates with the key management system to provide a locking key for its respective storage device.
    Type: Grant
    Filed: January 25, 2019
    Date of Patent: May 16, 2023
    Assignee: Dell Products L.P.
    Inventors: Rama Rao Bisa, Sushma Basavarajaiah, Mukund P. Khatri, Chandrashekar Nelogal, Chitrak Gupta, Manjunath Am
  • Patent number: 11423089
    Abstract: A natural language processing system includes a model trainer operable to train a natural language processing model based on a training corpus, wherein the training corpus includes a data set from one of multiple languages. An action manager curates application programming interfaces, and a processor receives a natural language query at the natural language processing system, wherein the natural language query is directed to a remote component, and the natural language query is in a language other than English. The processor determines the language of the natural language query, and binds the intent of the natural language query to an action, wherein the action is a function to be carried out by the remote component.
    Type: Grant
    Filed: September 25, 2019
    Date of Patent: August 23, 2022
    Assignee: Dell Products L.P.
    Inventors: Chitrak Gupta, Sushma Basavarajaiah, Mainak Roy
  • Patent number: 11409884
    Abstract: A system, method, and computer-readable medium for a security vulnerability detection operation. The security vulnerability operation includes configuring a firmware security profiling environment with a trusted host and a trusted service processor; receiving a firmware update file via the trusted service processor; using the trusted service processor to identify a security vulnerability within the firmware update file; and, installing the firmware update file to the information handling system only when no security vulnerability is identified by the trusted service processor, the installing being performed by the trusted host.
    Type: Grant
    Filed: October 31, 2018
    Date of Patent: August 9, 2022
    Assignee: Dell Products L.P.
    Inventors: Chitrak Gupta, Rama Rao Bisa, Elie A. Jreij, Sushma Basavarajaiah, Kala Sampathkumar, Mainak Roy
  • Patent number: 11252138
    Abstract: A redundant key management system includes a key management system coupled to a plurality of server devices through a network. A first server device includes a managed device coupled to a first remote access controller device that receive a device locking key from the key management system and uses it to lock the managed device. The first remote access controller device then encrypts the device locking key, broadcasts the encrypted device locking key through the network to a second remote access controller device in a second server device, and erases the device locking key. Subsequently, the first remote access controller device transmits a request to retrieve the encrypted device locking key. When the first remote access controller receives the encrypted device locking key from the second remote access controller device, it decrypts the encrypted device locking key and uses the resulting device locking key to unlock the managed device.
    Type: Grant
    Filed: January 24, 2019
    Date of Patent: February 15, 2022
    Assignee: Dell Products L.P.
    Inventors: Chitrak Gupta, Shinose Abdul Rahiman, Sushma Basavarajaiah, Mukund P. Khatri, Elie Antoun Jreij, Rama Rao Bisa, Kala Sampathkumar
  • Patent number: 11196549
    Abstract: A key retrieval system includes a management system and a managed system that is coupled to the management system through a network. The managed system includes a managed device, a management system configuration storage, a remote access controller device that stores a management system configuration for the management system in the management system configuration storage and provides a key management client subsystem that is configured to use the management system configuration to access the management system. The managed system also includes a BIOS. The BIOS detects an event that triggers unlocking the managed device. The BIOS determines that the remote access controller device is unavailable and, in response, retrieves the management system configuration and accesses the management system using the management system configuration. The BIOS then retrieves the locking key from the management system and unlocks the managed device using the locking key.
    Type: Grant
    Filed: January 30, 2019
    Date of Patent: December 7, 2021
    Assignee: Dell Products L.P.
    Inventors: Vigneswaran Ponnusamy, Chitrak Gupta, Sanjeev S. Dambal, Charles Stracener, Sanjay Rao, Diwahar Natarajan, Sushma Basavarajaiah, Rama Rao Bisa, Mukund P. Khatri
  • Publication number: 20210344658
    Abstract: A key management system includes a managed system coupled to a management system through a network. The managed system includes managed device locking subsystem(s) coupled to a managed device and a key storage. The managed device locking subsystem(s) retrieve, through the network from the management system, a managed device locking key that is configured to unlock the managed device. The managed device locking subsystem(s) then encrypt the managed device locking key to provide an encrypted managed device locking key, and store the encrypted managed device locking key in the key storage. Subsequent to storing the encrypted managed device locking key, the managed device locking subsystem(s) retrieve the encrypted managed device locking key from the key storage, and decrypt the encrypted managed device locking key to provide a decrypted managed device locking key. The managed device locking subsystem(s) then use the decrypted managed device locking key to unlock the managed device.
    Type: Application
    Filed: July 12, 2021
    Publication date: November 4, 2021
    Inventors: Deepaganesh Paulraj, Rama Rao Bisa, Chitrak Gupta, Sushma Basavarajaiah, Mukund P. Khatri
  • Patent number: 11095445
    Abstract: A system includes a management system, a managed system that is coupled to the management system through a network. The managed system comprises a managed device, a key identifier storage, a first managed device locking system coupled to the managed device and the key identifier storage, and a second managed device locking system coupled to the managed device, the key identifier storage, and the first managed device locking system. The first managed device locking system is configured to store a key identifier of the managed device in the key identifier storage and to provide access to a locking key of the managed device based upon the key identifier of the managed device, stored in a management system. The second managed device locking system is configured to monitor the managed device for an event that triggers unlocking the managed device, monitor operating status of the first managed device locking system.
    Type: Grant
    Filed: January 30, 2019
    Date of Patent: August 17, 2021
    Assignee: Dell Products L.P.
    Inventors: Chitrak Gupta, Rama Rao Bisa, Sushma Basavarajaiah, Kala Sampathkumar, Shekar Babu Suryanarayana, Mukund P. Khatri, Ajay Shenoy
  • Patent number: 11095628
    Abstract: A key management system includes a managed system coupled to a management system through a network. The managed system includes managed device locking subsystem(s) coupled to a managed device and a key storage. The managed device locking subsystem(s) retrieve, through the network from the management system, a managed device locking key that is configured to unlock the managed device. The managed device locking subsystem(s) then encrypt the managed device locking key to provide an encrypted managed device locking key, and store the encrypted managed device locking key in the key storage. Subsequent to storing the encrypted managed device locking key, the managed device locking subsystem(s) retrieve the encrypted managed device locking key from the key storage, and decrypt the encrypted managed device locking key to provide a decrypted managed device locking key. The managed device locking subsystem(s) then use the decrypted managed device locking key to unlock the managed device.
    Type: Grant
    Filed: January 24, 2019
    Date of Patent: August 17, 2021
    Assignee: Dell Products L.P.
    Inventors: Deepaganesh Paulraj, Rama Rao Bisa, Chitrak Gupta, Sushma Basavarajaiah, Mukund P. Khatri
  • Publication number: 20210089587
    Abstract: A natural language processing system includes a model trainer operable to train a natural language processing model based on a training corpus, wherein the training corpus includes a data set from one of multiple languages. An action manager curates application programming interfaces, and a processor receives a natural language query at the natural language processing system, wherein the natural language query is directed to a remote component, and the natural language query is in a language other than English. The processor determines the language of the natural language query, and binds the intent of the natural language query to an action, wherein the action is a function to be carried out by the remote component.
    Type: Application
    Filed: September 25, 2019
    Publication date: March 25, 2021
    Inventors: Chitrak Gupta, Sushma Basavarajaiah, Mainak Roy
  • Patent number: 10936510
    Abstract: A locking key secondary access system includes a key management system coupled to a secondary locking key access device and a server device via a network. The server device includes a managed device. The server device receives a request to unlock the managed device, and determines that a first access path via a first communication subsystem and through the network to the key management system is unavailable. In response, the server device provides locking key request information via a second communication subsystem to the secondary locking key access device. The secondary locking key access device may use the locking key information to retrieve a locking key for the managed device from the key management system. The secondary locking key access device sends the locking key to the server device via the second communication subsystem, and the server device uses the locking key to unlock the managed device.
    Type: Grant
    Filed: January 25, 2019
    Date of Patent: March 2, 2021
    Assignee: Dell Products L.P.
    Inventors: Chitrak Gupta, Sushma Basavarajaiah, Rama Rao Bisa, Mukund P. Khatri
  • Patent number: 10860707
    Abstract: In accordance with embodiments of the present disclosure, an information handling system may include a processor and a non-transitory computer-readable medium having stored thereon a program of instructions executable by the processor. The program of instructions may be configured to, when read and executed by the processor, receive an initial password, the initial password comprising a string of characters to be entered by a user of the information handling system for accessing the information handling system, separate the initial password into a plurality of compartments, select a random order of the plurality of compartments, generate a key based on the initial password as rearranged in accordance with the random order of the plurality of compartments, and store a key sequence representative of the random order of the plurality of compartments.
    Type: Grant
    Filed: December 15, 2017
    Date of Patent: December 8, 2020
    Assignee: Dell Products L.P.
    Inventors: Chitrak Gupta, Sushma Basavarajaiah
  • Publication number: 20200244632
    Abstract: A redundant key management system includes a key management system coupled to a plurality of server devices through a network. A first server device includes a managed device coupled to a first remote access controller device that receive a device locking key from the key management system and uses it to lock the managed device. The first remote access controller device then encrypts the device locking key, broadcasts the encrypted device locking key through the network to a second remote access controller device in a second server device, and erases the device locking key. Subsequently, the first remote access controller device transmits a request to retrieve the encrypted device locking key. When the first remote access controller receives the encrypted device locking key from the second remote access controller device, it decrypts the encrypted device locking key and uses the resulting device locking key to unlock the managed device.
    Type: Application
    Filed: January 24, 2019
    Publication date: July 30, 2020
    Inventors: Chitrak Gupta, Shinose Abdul Rahiman, Sushma Basavarajaiah, Mukund P. Khatri, Elie Antoun Jreij, Rama Rao Bisa, Kala Sampathkumar
  • Publication number: 20200242052
    Abstract: A locking key secondary access system includes a key management system coupled to a secondary locking key access device and a server device via a network. The server device includes a managed device. The server device receives a request to unlock the managed device, and determines that a first access path via a first communication subsystem and through the network to the key management system is unavailable. In response, the server device provides locking key request information via a second communication subsystem to the secondary locking key access device. The secondary locking key access device may use the locking key information to retrieve a locking key for the managed device from the key management system. The secondary locking key access device sends the locking key to the server device via the second communication subsystem, and the server device uses the locking key to unlock the managed device.
    Type: Application
    Filed: January 25, 2019
    Publication date: July 30, 2020
    Inventors: Chitrak Gupta, Sushma Basavarajaiah, Rama Rao Bisa, Mukund P. Khatri
  • Publication number: 20200244445
    Abstract: A key retrieval system includes a management system and a managed system that is coupled to the management system through a network. The managed system includes a managed device, a management system configuration storage, a remote access controller device that stores a management system configuration for the management system in the management system configuration storage and provides a key management client subsystem that is configured to use the management system configuration to access the management system. The managed system also includes a BIOS. The BIOS detects an event that triggers unlocking the managed device. The BIOS determines that the remote access controller device is unavailable and, in response, retrieves the management system configuration and accesses the management system using the management system configuration. The BIOS then retrieves the locking key from the management system and unlocks the managed device using the locking key.
    Type: Application
    Filed: January 30, 2019
    Publication date: July 30, 2020
    Inventors: Vigneswaran Ponnusamy, Chitrak Gupta, Sanjeev S. Dambal, Charles Stracener, Sanjay Rao, Diwahar Natarajan, Sushma Basavarajaiah, Rama Rao Bisa, Mukund P. Khatri
  • Publication number: 20200244454
    Abstract: A system includes a management system, a managed system that is coupled to the management system through a network. The managed system comprises a managed device, a key identifier storage, a first managed device locking system coupled to the managed device and the key identifier storage, and a second managed device locking system coupled to the managed device, the key identifier storage, and the first managed device locking system. The first managed device locking system is configured to store a key identifier of the managed device in the key identifier storage and to provide access to a locking key of the managed device based upon the key identifier of the managed device, stored in a management system. The second managed device locking system is configured to monitor the managed device for an event that triggers unlocking the managed device, monitor operating status of the first managed device locking system.
    Type: Application
    Filed: January 30, 2019
    Publication date: July 30, 2020
    Inventors: Chitrak Gupta, Rama Rao Bisa, Sushma Basavarajaiah, Kala Sampathkumar, Shekar Babu Suryanarayana, Mukund P. Khatri, Ajay Shenoy
  • Publication number: 20200242051
    Abstract: A device-capability-based locking key management system includes a key management system coupled to a server device via a network. The server device includes storage devices coupled to a remote access controller device. The remote access controller device identifies each of the storage devices, and then identifies a key management profile for each of the storage devices. A first key management profile identified for at least one first storage device is different from a second key management profile identified for at least one second storage device. The remote access controller device then uses the respective key management profile identified for each of the storage devices to create a respective key management sub-client for each of the storage devices, and each respective key management sub-client communicates with the key management system to provide a locking key for its respective storage device.
    Type: Application
    Filed: January 25, 2019
    Publication date: July 30, 2020
    Inventors: Rama Rao Bisa, Sushma Basavarajaiah, Mukund P. Khatri, Chandrashekar Nelogal, Chitrak Gupta, Manjunath Am
  • Publication number: 20200244635
    Abstract: A key management system includes a managed system coupled to a management system through a network. The managed system includes managed device locking subsystem(s) coupled to a managed device and a key storage. The managed device locking subsystem(s) retrieve, through the network from the management system, a managed device locking key that is configured to unlock the managed device. The managed device locking subsystem(s) then encrypt the managed device locking key to provide an encrypted managed device locking key, and store the encrypted managed device locking key in the key storage. Subsequent to storing the encrypted managed device locking key, the managed device locking subsystem(s) retrieve the encrypted managed device locking key from the key storage, and decrypt the encrypted managed device locking key to provide a decrypted managed device locking key. The managed device locking subsystem(s) then use the decrypted managed device locking key to unlock the managed device.
    Type: Application
    Filed: January 24, 2019
    Publication date: July 30, 2020
    Inventors: Deepaganesh Paulraj, Rama Rao Bisa, Chitrak Gupta, Sushma Basavarajaiah, Mukund P. Khatri
  • Patent number: 10699668
    Abstract: Embodiments of systems and methods for providing configurable video redirection in a data center are discussed. In an embodiment, an Information Handling System (IHS) may include a Baseband Management Controller (BMC); and a memory coupled to the BMC, the memory having program instructions stored thereon that, upon execution by the BMC, cause the BMC to: receive a request from a remote client, where the request follows a first protocol; select one of a plurality of redirection components available to the IHS to populate a framebuffer with video frames using a second protocol; retrieve the video frames from the framebuffer; and transmit a response to the remote client following the first protocol, where the response comprises the video frames.
    Type: Grant
    Filed: March 8, 2019
    Date of Patent: June 30, 2020
    Assignee: Dell Products, L.P.
    Inventors: Chitrak Gupta, Rama Rao Bisa, Rajeshkumar Ichchhubhai Patel, Sushma Basavarajaiah, Elie Antoun Jreij, Jitendra Kumar
  • Publication number: 20200134192
    Abstract: A system, method, and computer-readable medium for a security vulnerability detection operation. The security vulnerability operation includes configuring a firmware security profiling environment with a trusted host and a trusted service processor; receiving a firmware update file via the trusted service processor; using the trusted service processor to identify a security vulnerability within the firmware update file; and, installing the firmware update file to the information handling system only when no security vulnerability is identified by the trusted service processor, the installing being performed by the trusted host.
    Type: Application
    Filed: October 31, 2018
    Publication date: April 30, 2020
    Applicant: Dell Products L.P.
    Inventors: Chitrak Gupta, Rama Rao Bisa, Elie A. Jreij, Sushma Basavarajaiah, Kala Sampathkumar, Mainak Roy