Patents by Inventor Vigneswaran Ponnusamy
Vigneswaran Ponnusamy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11989301Abstract: In one or more embodiments, one or more systems, one or more methods, and/or one or more processes may determine that the staged job needs to be executed by a baseboard management controller (BMC) while an information handling system (IHS) is held in a power-on self-test; create a hybrid job associated with the staged job; reboot the IHS; launch an IHS firmware application in a pre-boot IHS firmware environment; provide, to the BMC, a command to execute a first portion of the hybrid job; obtain, by the BMC, an authentication key; provide, by the BMC, the authentication key to the non-volatile storage device; execute, by the BMC, the first portion of the hybrid job to configure the non-volatile storage device; and execute, by the IHS firmware application, the second portion of the hybrid job to poll the baseboard management controller for a result status of configuring the non-volatile storage device.Type: GrantFiled: September 28, 2021Date of Patent: May 21, 2024Assignee: Dell Products L.P.Inventors: Sanjeev Surendra Dambal, Sanjay Rao, Charles D. Stracener, Diwahar Natarajan, Vigneswaran Ponnusamy
-
Patent number: 11838408Abstract: A disclosed method for managing encryption keys, which may be performed by a key management server, responds to receiving, from a first client, a request to create a new key for a self-encrypting drive (SED) associated with the first client by retrieving unique identifiers of the first client and the SED, generating and storing the new key and a corresponding key identifier (KeyID), and associating the unique identifiers of the SED and first client with the new key. Upon receiving, from a second client, a locate key request that includes the SED identifier, providing the new key, the KeyID, and the first client identifier to the second client. Associating the SED and first client identifiers with the new key may include adding the identifiers as attributes of the KeyID. Embodiments may be implemented in accordance with a key management interoperability protocol (KMIP) standard.Type: GrantFiled: April 28, 2021Date of Patent: December 5, 2023Assignee: Dell Products L.P.Inventors: Karthik Arunachalam, Vigneswaran Ponnusamy, Karthikeyan Rajagopalan, Sanjeev Dambal, Kumaran Palaniappan Thangavelu
-
Patent number: 11740806Abstract: An information handling system may include a processor and a management controller communicatively coupled to the processor. The management controller may be configured to, in response to an encrypted storage resource being coupled to the information handling system: transmitting a request to at least one other management controller for an encryption key associated with the encrypted storage resource; receiving a response from the at least one other management controller, the response including the encryption key associated with the encrypted storage resource; and unlocking the encrypted storage resource with the received encryption key.Type: GrantFiled: April 29, 2021Date of Patent: August 29, 2023Assignee: Dell Products L.P.Inventors: Sanjeev Dambal, Kumaran Palaniappan, Vigneswaran Ponnusamy, Karthikeyan Rajagopalan, Karthik Arunachalam
-
Publication number: 20230105250Abstract: A self-encrypted drive (SED) setup system uses a systems manager executable program that stores user account information associated with an External Key Management Server (EKMS) service provided by an EKMS in which the user account information has a unique identifier of an associated Information Handling System (IHS). Using the stored user account information, the systems manager may setup a secure encrypted drive (SED) on the IHS by generating a Certificate Signing Request (CSR) for the IHS, communicate with a Certificate Authority (CA) associated with the EKMS to obtain a signed CSR and an EKMS certificate, and load the signed CSR and the EKMS certificate on the IHS when the IHS is to be registered for use with the EKMS. The EKMS service is configured to provide a key for the computing device.Type: ApplicationFiled: October 4, 2021Publication date: April 6, 2023Applicant: Dell Products, L.P.Inventors: Pushkala Iyer, Sanjeev S. Dambal, Vigneswaran Ponnusamy, Matthew J. Maze, Saranya Shanmugam
-
Publication number: 20230100958Abstract: In one or more embodiments, one or more systems, one or more methods, and/or one or more processes may determine that the staged job needs to be executed by a baseboard management controller (BMC) while an information handling system (IHS) is held in a power-on self-test; create a hybrid job associated with the staged job; reboot the IHS; launch an IHS firmware application in a pre-boot IHS firmware environment; provide, to the BMC, a command to execute a first portion of the hybrid job; obtain, by the BMC, an authentication key; provide, by the BMC, the authentication key to the non-volatile storage device; execute, by the BMC, the first portion of the hybrid job to configure the non-volatile storage device; and execute, by the IHS firmware application, the second portion of the hybrid job to poll the baseboard management controller for a result status of configuring the non-volatile storage device.Type: ApplicationFiled: September 28, 2021Publication date: March 30, 2023Inventors: Sanjeev Surendra Dambal, Sanjay Rao, Charles D. Stracener, Diwahar Natarajan, Vigneswaran Ponnusamy
-
Publication number: 20220350930Abstract: An information handling system may include a processor; an encrypted storage resource, wherein the encrypted storage resource is coupled to the information handling system via a storage controller that does not implement locking and unlocking functionality for the encrypted storage resource; and a management controller configured to: receive a request to unlock the encrypted storage resource; determine an encryption key associated with the encrypted storage resource; and unlock the encrypted storage resource with the received encryption key via a sideband interface coupling the management controller to the encrypted storage resource.Type: ApplicationFiled: April 29, 2021Publication date: November 3, 2022Applicant: Dell Products L.P.Inventors: Sanjeev DAMBAL, Vigneswaran PONNUSAMY, Kumaran PALANIAPPAN, Karthikeyan RAJAGOPALAN, Karthik ARUNACHALAM
-
Publication number: 20220350501Abstract: An information handling system may include a processor and a management controller communicatively coupled to the processor. The management controller may be configured to, in response to an encrypted storage resource being coupled to the information handling system: transmitting a request to at least one other management controller for an encryption key associated with the encrypted storage resource; receiving a response from the at least one other management controller, the response including the encryption key associated with the encrypted storage resource; and unlocking the encrypted storage resource with the received encryption key.Type: ApplicationFiled: April 29, 2021Publication date: November 3, 2022Applicant: Dell Products L.P.Inventors: Sanjeev DAMBAL, Kumaran PALANIAPPAN, Vigneswaran PONNUSAMY, Karthikeyan RAJAGOPALAN, Karthik ARUNACHALAM
-
Publication number: 20220353057Abstract: A disclosed method for managing encryption keys, which may be performed by a key management server, responds to receiving, from a first client, a request to create a new key for a self-encrypting drive (SED) associated with the first client by retrieving unique identifiers of the first client and the SED, generating and storing the new key and a corresponding key identifier (KeyID), and associating the unique identifiers of the SED and first client with the new key. Upon receiving, from a second client, a locate key request that includes the SED identifier, providing the new key, the KeyID, and the first client identifier to the second client. Associating the SED and first client identifiers with the new key may include adding the identifiers as attributes of the KeyID. Embodiments may be implemented in accordance with a key management interoperability protocol (KMIP) standard.Type: ApplicationFiled: April 28, 2021Publication date: November 3, 2022Applicant: Dell Products L.P.Inventors: Karthik ARUNACHALAM, Vigneswaran PONNUSAMY, Karthikeyan RAJAGOPALAN, Sanjeev DAMBAL, Kumaran Palaniappan THANGAVELU
-
Patent number: 11196549Abstract: A key retrieval system includes a management system and a managed system that is coupled to the management system through a network. The managed system includes a managed device, a management system configuration storage, a remote access controller device that stores a management system configuration for the management system in the management system configuration storage and provides a key management client subsystem that is configured to use the management system configuration to access the management system. The managed system also includes a BIOS. The BIOS detects an event that triggers unlocking the managed device. The BIOS determines that the remote access controller device is unavailable and, in response, retrieves the management system configuration and accesses the management system using the management system configuration. The BIOS then retrieves the locking key from the management system and unlocks the managed device using the locking key.Type: GrantFiled: January 30, 2019Date of Patent: December 7, 2021Assignee: Dell Products L.P.Inventors: Vigneswaran Ponnusamy, Chitrak Gupta, Sanjeev S. Dambal, Charles Stracener, Sanjay Rao, Diwahar Natarajan, Sushma Basavarajaiah, Rama Rao Bisa, Mukund P. Khatri
-
Publication number: 20200244445Abstract: A key retrieval system includes a management system and a managed system that is coupled to the management system through a network. The managed system includes a managed device, a management system configuration storage, a remote access controller device that stores a management system configuration for the management system in the management system configuration storage and provides a key management client subsystem that is configured to use the management system configuration to access the management system. The managed system also includes a BIOS. The BIOS detects an event that triggers unlocking the managed device. The BIOS determines that the remote access controller device is unavailable and, in response, retrieves the management system configuration and accesses the management system using the management system configuration. The BIOS then retrieves the locking key from the management system and unlocks the managed device using the locking key.Type: ApplicationFiled: January 30, 2019Publication date: July 30, 2020Inventors: Vigneswaran Ponnusamy, Chitrak Gupta, Sanjeev S. Dambal, Charles Stracener, Sanjay Rao, Diwahar Natarajan, Sushma Basavarajaiah, Rama Rao Bisa, Mukund P. Khatri
-
Patent number: 10333786Abstract: Methods and systems for refreshing an information handling system may include receiving a request for information, searching a group inventory for the information, and responding to the request with the information. The information may correspond to a configuration. The request may be received from a node in a group with a plurality of nodes. The information requested may correspond to an update to the configuration of the node. The group inventory may be sourced from the group. The information in the response may be based on finding a match in the group inventory.Type: GrantFiled: July 15, 2016Date of Patent: June 25, 2019Assignee: Dell Products L.P.Inventors: Vigneswaran Ponnusamy, Sundar Dasar, Cyril Jose, Yogesh P. Kulkarni, Marshal F. Savage
-
Patent number: 10067771Abstract: In accordance with these and other embodiments of the present disclosure, a method may include receiving at a management controller of an information handling system a request for remote boot of the information handling system from a remote target communicatively coupled to a network interface of a host system comprising the network interface and a host system processor communicatively coupled to the network interface and the management controller, configuring the network interface for remote boot via the network interface, and issuing an instruction to reboot the host system, wherein receipt of the request for remote boot, configuration of the network interface for remote boot, and issuance of the instruction to reboot the host system are performed without an intervening boot of the host system.Type: GrantFiled: February 8, 2016Date of Patent: September 4, 2018Assignee: Dell Products L.P.Inventors: Vigneswaran Ponnusamy, Raja Tamilarasan, Yogesh Prabhakar Kulkarni, Mark W. Shutt, Sundar Dasar
-
Patent number: 10061596Abstract: In accordance with embodiments of the present disclosure, a method may include during boot of the information handling system, in response to one of a system management request received by a management controller or user input indicative of a task received during boot, downloading, by a basic input/output system (BIOS), from a network database communicatively coupled to the network interface, one or more executable modules for completing a system management request or a task. The method may also include executing the one or more downloaded modules.Type: GrantFiled: July 10, 2015Date of Patent: August 28, 2018Assignee: Dell Products L.P.Inventors: Sundar Dasar, Yogesh Prabhakar Kulkarni, Vigneswaran Ponnusamy, Sumanth Vidyadhara, Jon Robert Hass, Elie Antoun Jreij
-
Publication number: 20180019919Abstract: Methods and systems for refreshing an information handling system may include receiving a request for information, searching a group inventory for the information, and responding to the request with the information. The information may correspond to a configuration. The request may be received from a node in a group with a plurality of nodes. The information requested may correspond to an update to the configuration of the node. The group inventory may be sourced from the group. The information in the response may be based on finding a match in the group inventory.Type: ApplicationFiled: July 15, 2016Publication date: January 18, 2018Inventors: Vigneswaran Ponnusamy, Sundar Dasar, Cyril Jose, Yogesh P. Kulkarni, Marshal F. Savage
-
Publication number: 20170228237Abstract: In accordance with these and other embodiments of the present disclosure, a method may include receiving at a management controller of an information handling system a request for remote boot of the information handling system from a remote target communicatively coupled to a network interface of a host system comprising the network interface and a host system processor communicatively coupled to the network interface and the management controller, configuring the network interface for remote boot via the network interface, and issuing an instruction to reboot the host system, wherein receipt of the request for remote boot, configuration of the network interface for remote boot, and issuance of the instruction to reboot the host system are performed without an intervening boot of the host system.Type: ApplicationFiled: February 8, 2016Publication date: August 10, 2017Applicant: Dell Products L.P.Inventors: Vigneswaran Ponnusamy, Raja Tamilarasan, Yogesh Prabhakar Kulkarni, Mark W. Shutt, Sundar Dasar
-
Publication number: 20170010899Abstract: In accordance with embodiments of the present disclosure, a method may include during boot of the information handling system, in response to one of a system management request received by a management controller or user input indicative of a task received during boot, downloading, by a basic input/output system (BIOS), from a network database communicatively coupled to the network interface, one or more executable modules for completing a system management request or a task. The method may also include executing the one or more downloaded modules.Type: ApplicationFiled: July 10, 2015Publication date: January 12, 2017Inventors: Sundar Dasar, Yogesh Prabhakar Kulkarni, Vigneswaran Ponnusamy, Sumanth Vidyadhara, Jon Robert Hass, Elie Antoun Jreij