Patents by Inventor Sushma Basavarajaiah

Sushma Basavarajaiah has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10565169
    Abstract: An information handling system includes a processor, a managed device that provides a function to the processor, wherein the function is managed in accordance with a Managed Object Format (MOF) file, and a management controller that receives the MOF file, converts the MOF file to a Management Information Base (MIB), and manages the function based upon the MIB.
    Type: Grant
    Filed: August 19, 2015
    Date of Patent: February 18, 2020
    Assignee: Dell Products, LP
    Inventors: Chitrak Gupta, Ajay Shenoy, Lucky Pratap Khemani, Sushma Basavarajaiah
  • Patent number: 10430351
    Abstract: In accordance with embodiments of the present disclosure, an information handling system may include a processor, a peripheral device, and a service processor communicatively coupled to the processor and the peripheral device and configured to perform out-of-band management of the information handling system. The service processor may further configured to communicatively couple to a management controller having executing thereon a virtual service processor, receive a command associated with the peripheral device from the management controller, deliver the command to the peripheral device, receive data from the peripheral device, and communicate the data to the management controller.
    Type: Grant
    Filed: March 17, 2016
    Date of Patent: October 1, 2019
    Assignee: Dell Products L.P.
    Inventors: Chitrak Gupta, Elie Antoun Jreij, Rama Rao Bisa, Rajeshkumar Ichchhubhai Patel, Neeraj Joshi, Sushma Basavarajaiah, Kala Sampathkumar
  • Patent number: 10355861
    Abstract: Cryptographic affinities are generated to improve security in data centers. When a blade server is hot swapped, the cryptographic affinities protect electronic data stored within the blade server. The cryptographic affinities are generated based on hashing a unique chassis identifier. If the blade server is installed in a different chassis, the cryptographic affinities lock out the different chassis from read, write, and other access operations. The cryptographic affinities may even require deleting or reformatting before rekeying is commenced.
    Type: Grant
    Filed: March 28, 2017
    Date of Patent: July 16, 2019
    Assignee: Dell Products, LP
    Inventors: Sushma Basavarajaiah, Rama R. Bisa, Chitrak Gupta, Mukund P. Khatri
  • Publication number: 20190188373
    Abstract: In accordance with embodiments of the present disclosure, an information handling system may include a processor and a non-transitory computer-readable medium having stored thereon a program of instructions executable by the processor. The program of instructions may be configured to, when read and executed by the processor, receive an initial password, the initial password comprising a string of characters to be entered by a user of the information handling system for accessing the information handling system, separate the initial password into a plurality of compartments, select a random order of the plurality of compartments, generate a key based on the initial password as rearranged in accordance with the random order of the plurality of compartments, and store a key sequence representative of the random order of the plurality of compartments.
    Type: Application
    Filed: December 15, 2017
    Publication date: June 20, 2019
    Applicant: Dell Products L.P.
    Inventors: Chitrak GUPTA, Sushma BASAVARAJAIAH
  • Patent number: 10169602
    Abstract: A method and system for local key management setup and recovery includes receiving a lock request to secure one or more drives, then querying, for one or more key identifiers associated with a requesting device. The method includes: in response to receiving at least one key identifier, dynamically generating a first public-private key and a first public certificate associated with the at least one key identifier; and assigning the first public-private key and the first public certificate to the drives. The method further includes: concealing contents of the first public-private key and first public certificate; automatically transmitting the first public certificate to the first requesting device; and invoking the first public-private key to secure the drives. Finally, the method includes creating a recovery key, generating a recovery certificate associated with the recovery key, then, archiving the recovery key and the recovery certificate in a recovery database and a recovery server.
    Type: Grant
    Filed: February 22, 2016
    Date of Patent: January 1, 2019
    Assignee: Dell Products, L.P.
    Inventors: Chitrak Gupta, Rama Rao Bisa, Sushma Basavarajaiah, Mukund P. Khatri
  • Publication number: 20180287791
    Abstract: Cryptographic affinities are generated to improve security in data centers. When a blade server is hot swapped, the cryptographic affinities protect electronic data stored within the blade server. The cryptographic affinities are generated based on hashing a unique chassis identifier. If the blade server is installed in a different chassis, the cryptographic affinities lock out the different chassis from read, write, and other access operations. The cryptographic affinities may even require deleting or reformatting before rekeying is commenced.
    Type: Application
    Filed: March 28, 2017
    Publication date: October 4, 2018
    Inventors: Sushma Basavarajaiah, Rama R. Bisa, Chitrak Gupta, Mukund P. Khatri
  • Patent number: 10038705
    Abstract: A method and information handling system (IHS) for identifying communication threats in an IHS. The method includes triggering a board management controller (BMC) to transmit a plurality of memory addresses identifying where a plurality of network packets received by the IHS are stored. A field programmable gate array (FPGA) within a processor receives the memory addresses of the network packets and retrieves the network packets. The network packets are analyzed by comparing at least one threat signature that is associated with undesired network behavior with the contents of the network packets. In response to the at least one threat signature matching the contents of at least one of the network packets, an intrusion alert is transmitted to the BMC.
    Type: Grant
    Filed: October 12, 2015
    Date of Patent: July 31, 2018
    Assignee: Dell Products, L.P.
    Inventors: Elie Antoun Jreij, Chitrak Gupta, Wade Andrew Butcher, Sushma Basavarajaiah, Rama Rao Bisa
  • Patent number: 9998464
    Abstract: A storage device security system includes a server that is coupled to a storage device, a storage controller, a configuration IHS, and a remote access controller. The remote access controller receives a storage device access key request and a storage controller Globally Unique Identifier (GUID) from the storage controller. The remote access controller also receives a server GUID from the server. The remote access controller also receives a security key from the configuration IHS over a network. The remote access controller is configured to use a remote access controller Media Access Control (MAC) address, the storage controller GUID, the server IHS GUID, and the security key to generate a storage device access key. The remote access controller may then provide the storage device access key to the storage controller, and storage controller may use the storage device access key to access the storage device coupled to the server IHS.
    Type: Grant
    Filed: December 3, 2015
    Date of Patent: June 12, 2018
    Assignee: Dell Products L.P.
    Inventors: Chitrak Gupta, Sushma Basavarajaiah
  • Patent number: 9906604
    Abstract: A system and method for dynamic discovery of web services for a management console is disclosed. The method includes detecting, at a discovery module of a service processor, a profile request from a console application. The method further includes requesting class information for the detected profile request from a provider register, and generating a profile-based web services description language (WSDL) file. The method also includes communicating the profile-based WSDL file to the console application.
    Type: Grant
    Filed: March 9, 2015
    Date of Patent: February 27, 2018
    Assignee: Dell Products L.P.
    Inventors: Chitrak Gupta, Abhirup Seal, Lucky Pratap Khemani, Hari Venkatachalam, Sushma Basavarajaiah
  • Publication number: 20170270060
    Abstract: In accordance with embodiments of the present disclosure, an information handling system may include a processor, a peripheral device, and a service processor communicatively coupled to the processor and the peripheral device and configured to perform out-of-band management of the information handling system. The service processor may further configured to communicatively couple to a management controller having executing thereon a virtual service processor, receive a command associated with the peripheral device from the management controller, deliver the command to the peripheral device, receive data from the peripheral device, and communicate the data to the management controller.
    Type: Application
    Filed: March 17, 2016
    Publication date: September 21, 2017
    Applicant: Dell Products L.P.
    Inventors: Chitrak Gupta, Elie Antoun Jreij, Rama Rao Bisa, Rajeshkumar Ichchhubhai Patel, Neeraj Joshi, Sushma Basavarajaiah, Kala Sampathkumar
  • Publication number: 20170243021
    Abstract: A method and system for local key management setup and recovery includes receiving a lock request to secure one or more drives, then querying, for one or more key identifiers associated with a requesting device. The method includes: in response to receiving at least one key identifier, dynamically generating a first public-private key and a first public certificate associated with the at least one key identifier; and assigning the first public-private key and the first public certificate to the drives. The method further includes: concealing contents of the first public-private key and first public certificate; automatically transmitting the first public certificate to the first requesting device; and invoking the first public-private key to secure the drives. Finally, the method includes creating a recovery key, generating a recovery certificate associated with the recovery key, then, archiving the recovery key and the recovery certificate in a recovery database and a recovery server.
    Type: Application
    Filed: February 22, 2016
    Publication date: August 24, 2017
    Inventors: Chitrak GUPTA, Rama Rao BISA, Sushma BASAVARAJAIAH, Mukund P. KHATRI
  • Patent number: 9671992
    Abstract: A flexible display device monitoring system includes a display layer that is configured to flex into a plurality of flexed orientations. A sensor layer is coupled to the display layer and is configured to flex with the display layer into the plurality of flexed orientations. The sensor layer includes a plurality of sensors that each generate stress data in response to the sensor layer being flexed. A stress monitoring engine is coupled to the sensor layer and receives the stress data from the plurality of sensors when the sensor layer is flexed. The stress monitoring engine determines that the stress data exceeds a stress threshold and, in response, activates an alert system that may provide a vibration alert, a sound alert, or a visual alert. Visual alerts may include activating a relative portion on the display layer that corresponds to sensors that provided sensor data that exceeded the stress threshold.
    Type: Grant
    Filed: June 17, 2015
    Date of Patent: June 6, 2017
    Assignee: Dell Products L.P.
    Inventors: Chitrak Gupta, Alonzo Fleming Seay, Deeder Aurongzeb, Sushma Basavarajaiah
  • Publication number: 20170104770
    Abstract: A method and information handling system (IHS) for identifying communication threats in an IHS. The method includes triggering a board management controller (BMC) to transmit a plurality of memory addresses identifying where a plurality of network packets received by the IHS are stored. A field programmable gate array (FPGA) within a processor receives the memory addresses of the network packets and retrieves the network packets. The network packets are analyzed by comparing at least one threat signature that is associated with undesired network behavior with the contents of the network packets. In response to the at least one threat signature matching the contents of at least one of the network packets, an intrusion alert is transmitted to the BMC.
    Type: Application
    Filed: October 12, 2015
    Publication date: April 13, 2017
    Applicant: DELL PRODUCTS, L.P.
    Inventors: ELIE ANTOUN JREIJ, CHITRAK GUPTA, WADE ANDREW BUTCHER, SUSHMA BASAVARAJAIAH, RAMA RAO BISA
  • Publication number: 20170052978
    Abstract: An information handling system includes a processor, a managed device that provides a function to the processor, wherein the function is managed in accordance with a Managed Object Format (MOF) file, and a management controller that receives the MOF file, converts the MOF file to a Management Information Base (MIB), and manages the function based upon the MIB.
    Type: Application
    Filed: August 19, 2015
    Publication date: February 23, 2017
    Inventors: Chitrak Gupta, Ajay Shenoy, Lucky Pratap Khemani, Sushma Basavarajaiah
  • Publication number: 20160371043
    Abstract: A flexible display device monitoring system includes a display layer that is configured to flex into a plurality of flexed orientations. A sensor layer is coupled to the display layer and is configured to flex with the display layer into the plurality of flexed orientations. The sensor layer includes a plurality of sensors that each generate stress data in response to the sensor layer being flexed. A stress monitoring engine is coupled to the sensor layer and receives the stress data from the plurality of sensors when the sensor layer is flexed. The stress monitoring engine determines that the stress data exceeds a stress threshold and, in response, activates an alert system that may provide a vibration alert, a sound alert, or a visual alert. Visual alerts may include activating a relative portion on the display layer that corresponds to sensors that provided sensor data that exceeded the stress threshold.
    Type: Application
    Filed: June 17, 2015
    Publication date: December 22, 2016
    Inventors: Chitrak Gupta, Alonzo Fleming Seay, Deeder Aurongzeb, Sushma Basavarajaiah
  • Patent number: 9489320
    Abstract: An information handling system includes a tablet with a processor, and a dock with a second processor that determines that the tablet is coupled to the dock, boots the dock, receives a request for the tablet to be uncoupled from the dock, creates a migration image with state information of the dock and that identifies a process running on the dock, and sends the migration image to the tablet. The first processor receives the request, boots the tablet, receives the migration image from the second processor, loads the state information to the tablet, and launches the first process.
    Type: Grant
    Filed: May 31, 2016
    Date of Patent: November 8, 2016
    Assignee: DELL PRODUCTS, LP
    Inventors: Chitrak Gupta, Sushma Basavarajaiah
  • Publication number: 20160274985
    Abstract: An information handling system includes a tablet with a processor, and a dock with a second processor that determines that the tablet is coupled to the dock, boots the dock, receives a request for the tablet to be uncoupled from the dock, creates a migration image with state information of the dock and that identifies a process running on the dock, and sends the migration image to the tablet. The first processor receives the request, boots the tablet, receives the migration image from the second processor, loads the state information to the tablet, and launches the first process.
    Type: Application
    Filed: May 31, 2016
    Publication date: September 22, 2016
    Inventors: Chitrak Gupta, Sushma Basavarajaiah
  • Publication number: 20160269492
    Abstract: A system and method for dynamic discovery of web services for a management console is disclosed. The method includes detecting, at a discovery module of a service processor, a profile request from a console application. The method further includes requesting class information for the detected profile request from a provider register, and generating a profile-based web services description language (WSDL) file. The method also includes communicating the profile-based WSDL file to the console application.
    Type: Application
    Filed: March 9, 2015
    Publication date: September 15, 2016
    Inventors: CHITRAK GUPTA, ABHIRUP SEAL, LUCKY PRATAP KHEMANI, HARI VENKATACHALAM, SUSHMA BASAVARAJAIAH
  • Patent number: 9372814
    Abstract: An information handling system includes a tablet with a processor, and a dock with a second processor that determines that the tablet is coupled to the dock, boots the dock, receives a request for the tablet to be uncoupled from the dock, creates a migration image with state information of the dock and that identifies a process running on the dock, and sends the migration image to the tablet. The first processor receives the request, boots the tablet, receives the migration image from the second processor, loads the state information to the tablet, and launches the first process.
    Type: Grant
    Filed: August 11, 2014
    Date of Patent: June 21, 2016
    Assignee: DELL PRODUCTS, LP
    Inventors: Chitrak Gupta, Sushma Basavarajaiah
  • Publication number: 20160087986
    Abstract: A storage device security system includes a server that is coupled to a storage device, a storage controller, a configuration IHS, and a remote access controller. The remote access controller receives a storage device access key request and a storage controller Globally Unique Identifier (GUID) from the storage controller. The remote access controller also receives a server GUID from the server. The remote access controller also receives a security key from the configuration IHS over a network. The remote access controller is configured to use a remote access controller Media Access Control (MAC) address, the storage controller GUID, the server IHS GUID, and the security key to generate a storage device access key. The remote access controller may then provide the storage device access key to the storage controller, and storage controller may use the storage device access key to access the storage device coupled to the server IHS.
    Type: Application
    Filed: December 3, 2015
    Publication date: March 24, 2016
    Inventors: Chitrak Gupta, Sushma Basavarajaiah