Search Patents
  • Publication number: 20220107997
    Abstract: Data theft protection for a computing device is provided by flagging a suspicious user within the pre-boot environment by systematic evaluation to determine suspicious location and/or anomalous user behavior. Depending on a suspicion score and a risk evaluation, the system automatically triggers one or more actions with respect to the data on the computing device.
    Type: Application
    Filed: October 5, 2020
    Publication date: April 7, 2022
    Inventors: Parminder Singh Sethi, Durai S. Singh, Lakshmi Saroja Nalam
  • Publication number: 20210406345
    Abstract: One example method includes receiving, from a VM, a request for a software license, in response to the request, transmitting a UUID to the VM, receiving, from the VM, a response that comprises a first encrypted UUID corresponding to the request, and transmitting a client object that includes the first encrypted UUID, and the client object serves as a request for entry of the client object in a database of a cloud computing site.
    Type: Application
    Filed: June 29, 2020
    Publication date: December 30, 2021
    Inventors: Parminder Singh Sethi, Durai S. Singh
  • Patent number: 10860209
    Abstract: A mechanism for determining whether a user should be using a single-hand virtual keyboard for a large-format touch screen device is provided. Additionally, a mechanism is provided to determine whether the single-hand virtual keyboard should be configured for a left-handed or a right-handed user. Further, a mechanism is provided to determine an appropriate size for the single-hand virtual keyboard for a particular user. In this manner, embodiments provide an input mechanism that allows for efficient and comfortable typing on a large-format touch screen device.
    Type: Grant
    Filed: December 12, 2019
    Date of Patent: December 8, 2020
    Assignee: Dell Products L.P.
    Inventors: Parminder Singh Sethi, C Narasimhaiah, Durai S. Singh
  • Publication number: 20210157899
    Abstract: A system, method, and computer-readable medium are provided to protect passwords for computer applications by providing a user-triggered password scrambling mechanism. Scrambling is enabled with a user configurable character within the password to be a trigger. Once triggered, a user can enter several incorrect password strings without fear of being locked out of the system. Ultimately, a user can enter a correct password string or a modified version of the correct password string to gain access to the system. Through password scrambling, an observer will have a more difficult time determining the correct version of the password. This improves system security, thereby protecting valuable information, resources, and reputation of an enterprise provider.
    Type: Application
    Filed: November 25, 2019
    Publication date: May 27, 2021
    Applicant: Dell Products L.P.
    Inventors: Parminder Singh Sethi, Durai S. Singh
  • Patent number: 11429711
    Abstract: A system, method, and computer-readable medium are provided to protect passwords for computer applications by providing a user-triggered password scrambling mechanism. Scrambling is enabled with a user configurable character within the password to be a trigger. Once triggered, a user can enter several incorrect password strings without fear of being locked out of the system. Ultimately, a user can enter a correct password string or a modified version of the correct password string to gain access to the system. Through password scrambling, an observer will have a more difficult time determining the correct version of the password. This improves system security, thereby protecting valuable information, resources, and reputation of an enterprise provider.
    Type: Grant
    Filed: November 25, 2019
    Date of Patent: August 30, 2022
    Assignee: Dell Products L.P.
    Inventors: Parminder Singh Sethi, Durai S. Singh
  • Publication number: 20210350250
    Abstract: A method includes receiving data collected from a plurality of managed devices in a plurality of data collections. The data collections are performed using a plurality of collection protocols. A trigger that generated each of given ones of the data collections is determined. The method further includes identifying a collection protocol of the plurality of collection protocols used for each of the given ones of the data collections, and determining one or more attributes of a plurality of attributes of the plurality of managed devices that have been collected using given ones of the collection protocols. A mapping is generated between the triggers, the collection protocols and the attributes using one or more machine learning algorithms. The generated mapping is used to predict one or more collection protocols of the plurality of collection protocols to use to collect data from one or more of the managed devices.
    Type: Application
    Filed: May 6, 2020
    Publication date: November 11, 2021
    Inventors: Parminder Singh Sethi, Durai S. Singh, Lakshmi Saroja Nalam
  • Publication number: 20200136928
    Abstract: In some examples, after a client system encounters a problem, a technical support specialist may connect to the client system via a console. The console may display a graphical representation of a client system that includes a plurality of components. The console may execute a machine learning module to determine one or more potential solutions to the particular problem. Each solution of the one or more solutions may correspond to a previously resolved problem that is similar to the particular problem and may have an associated confidence level determined based on: a similarity of the particular problem to the previously resolved problem, a similarity of the plurality of components to a second plurality of components included in a second client system associated with the previously resolved problem, a similarity of a network topology of the client system to a second network topology of the second client system.
    Type: Application
    Filed: October 29, 2018
    Publication date: April 30, 2020
    Inventors: Parminder Singh Sethi, Mohith Shanthigodu, Durai Singh, Vivekananda Hegde, Smita Kapil, Elanjelian V
  • Publication number: 20220229681
    Abstract: In one aspect, an example methodology implementing the disclosed techniques includes receiving, by a systems management console, a network address of a device in a virtual environment, and determining a network address associated with a virtual environment management console based on the received network address of the device in the virtual environment. The method also includes sending, by the systems management console via a systems management agent to the virtual environment management console using the determined network address associated with the virtual environment management console, a request for network addresses of virtual machine (VM) host servers and VMs in the virtual environment. The method also includes receiving, by the systems management console via the systems management agent from the virtual environment management console, the network addresses of the VM host servers and the VMs in the virtual environment and providing a notification of the discovered VM host servers and VMs.
    Type: Application
    Filed: January 20, 2021
    Publication date: July 21, 2022
    Applicant: Dell Products L.P.
    Inventors: Parminder Singh Sethi, Durai Singh, Suren Kumar
  • Patent number: 10652109
    Abstract: In some examples, after a client system encounters a problem, a technical support specialist may connect to the client system via a console. The console may display a graphical representation of a client system that includes a plurality of components. The console may execute a machine learning module to determine one or more potential solutions to the particular problem. Each solution of the one or more solutions may correspond to a previously resolved problem that is similar to the particular problem and may have an associated confidence level determined based on: a similarity of the particular problem to the previously resolved problem, a similarity of the plurality of components to a second plurality of components included in a second client system associated with the previously resolved problem, a similarity of a network topology of the client system to a second network topology of the second client system.
    Type: Grant
    Filed: October 29, 2018
    Date of Patent: May 12, 2020
    Assignee: Dell Products L. P.
    Inventors: Parminder Singh Sethi, Mohith Shanthigodu, Durai Singh, Vivekananda Hegde, Smita Kapil, Elanjelian V
  • Publication number: 20210182377
    Abstract: An access credential is modified at one device, wherein the device is part of a secure private network of multiple devices. Each other device in the secure private network receives notification of the modification. The credential modification is implemented when at least a subset of the other devices each accept the credential modification.
    Type: Application
    Filed: December 16, 2019
    Publication date: June 17, 2021
    Inventors: Parminder Singh Sethi, Anshul Saxena, Vamsi Krishna Tadikamalla
  • Publication number: 20210133770
    Abstract: An information handling system includes a processor configured to store a first module of a software application, the first module of the software application selected based on customer journey information pertaining to usage of the software application. The processor begins execution of the first module prior to receipt of a second module of the software application, the second module selected based on the customer journey information.
    Type: Application
    Filed: November 5, 2019
    Publication date: May 6, 2021
    Inventors: Parminder Singh Sethi, Sharmad Naik
  • Publication number: 20210397239
    Abstract: A method comprises analyzing performance data of a system using one or more machine learning techniques. The system comprises a plurality of hardware components. In the method, a priority list of the plurality of hardware components is generated based on the analysis, and power from one or more power sources is distributed to one or more of the plurality of hardware components based on the priority list.
    Type: Application
    Filed: June 19, 2020
    Publication date: December 23, 2021
    Inventors: Parminder Singh Sethi, Suren Kumar
  • Publication number: 20210124596
    Abstract: A user interface is presented to a user. The method determines whether or not to customize a size of one or more components on the user interface. The method then determines one or more candidate components on the user interface to customize, when a determination is made to customize a size of one or more components on the user interface. The method customizes the one or more candidate components on the user interface, and presents a customized user interface to the user.
    Type: Application
    Filed: October 24, 2019
    Publication date: April 29, 2021
    Inventors: Parminder Singh Sethi, Lakshmi Soroja Nalam
  • Publication number: 20220229753
    Abstract: A method comprises receiving a notification of an issue with at least one component of a plurality of components in a computing environment. One or more machine learning algorithms are used to determine one or more components of the plurality of components impacted by the issue with the at least one component. The method further comprises collecting operational data for the at least one component and the one or more impacted components.
    Type: Application
    Filed: January 15, 2021
    Publication date: July 21, 2022
    Inventors: Parminder Singh Sethi, Anannya Roy Chowdhury
  • Publication number: 20210406976
    Abstract: A method comprises extracting data for one or more assets corresponding to a user, and analyzing the data using one or more machine learning models. The analyzing comprises predicting whether the one or more assets will require at least one of replacement and service. In the method, one or more entitlement recommendations for the user are generated based on the analysis, and the one or more entitlement recommendations are transmitted to the user.
    Type: Application
    Filed: June 30, 2020
    Publication date: December 30, 2021
    Inventors: Parminder Singh Sethi, Sathish Kumar Bikumala, Deepak Gowda
  • Publication number: 20220318361
    Abstract: Aspects of the disclosure include an escalated authentication system based on user behavior patterns. A user's behavior pattern on a device is collected and/or learned. The collected or learned pattern can be compared to subsequent behavior patterns to determine whether the current user is genuine or suspicious. Users deemed suspicious are subject to increased authentication requirements, often on-the-fly.
    Type: Application
    Filed: April 6, 2021
    Publication date: October 6, 2022
    Inventors: Parminder Singh Sethi, Madhuri Dwarakanath, Bing Liu, Srinath Kappgal
  • Patent number: 11321446
    Abstract: An access credential is modified at one device, wherein the device is part of a secure private network of multiple devices. Each other device in the secure private network receives notification of the modification. The credential modification is implemented when at least a subset of the other devices each accept the credential modification.
    Type: Grant
    Filed: December 16, 2019
    Date of Patent: May 3, 2022
    Assignee: Dell Products L.P.
    Inventors: Parminder Singh Sethi, Anshul Saxena, Vamsi Krishna Tadikamalla
  • Publication number: 20210149760
    Abstract: An information handling system may obtain timing information for processing among layers of a first client-side information handling system, and compare the timing information to threshold values to provide a comparison. The information handling system may use the comparison to identify an area of the first client-side information handling system in which a problem exists, and initiate remedial action directed to the problem.
    Type: Application
    Filed: November 15, 2019
    Publication date: May 20, 2021
    Inventors: Parminder Singh Sethi, Abhishek Santosh, Anshul Saxena
  • Publication number: 20210149556
    Abstract: Graphical menu management may be based on variable-length inputs to a touch sensitive display. An information handling system displays a graphical user interface presenting a listing of messages, channels, or other content. When a user makes a gestural input to the touch sensitive display, the information handling system determines a relative length of the input. The information handling system generates a menu of options based on the relative length of the input.
    Type: Application
    Filed: November 18, 2019
    Publication date: May 20, 2021
    Inventors: Parminder Singh Sethi, Madhuri Dwarakanath, Avinash Vishwanath
  • Patent number: 11327545
    Abstract: A method comprises analyzing performance data of a system using one or more machine learning techniques. The system comprises a plurality of hardware components. In the method, a priority list of the plurality of hardware components is generated based on the analysis, and power from one or more power sources is distributed to one or more of the plurality of hardware components based on the priority list.
    Type: Grant
    Filed: June 19, 2020
    Date of Patent: May 10, 2022
    Assignee: Dell Products L.P.
    Inventors: Parminder Singh Sethi, Suren Kumar
Narrow Results

Filter by US Classification