Search Patents
  • Publication number: 20220107997
    Abstract: Data theft protection for a computing device is provided by flagging a suspicious user within the pre-boot environment by systematic evaluation to determine suspicious location and/or anomalous user behavior. Depending on a suspicion score and a risk evaluation, the system automatically triggers one or more actions with respect to the data on the computing device.
    Type: Application
    Filed: October 5, 2020
    Publication date: April 7, 2022
    Inventors: Parminder Singh Sethi, Durai S. Singh, Lakshmi Saroja Nalam
  • Publication number: 20210406345
    Abstract: One example method includes receiving, from a VM, a request for a software license, in response to the request, transmitting a UUID to the VM, receiving, from the VM, a response that comprises a first encrypted UUID corresponding to the request, and transmitting a client object that includes the first encrypted UUID, and the client object serves as a request for entry of the client object in a database of a cloud computing site.
    Type: Application
    Filed: June 29, 2020
    Publication date: December 30, 2021
    Inventors: Parminder Singh Sethi, Durai S. Singh
  • Publication number: 20230418709
    Abstract: Techniques for device modification analysis are disclosed. For example, a method comprises collecting operational data from one or more devices, and receiving one or more modifications to at least one of firmware and software for the one or more devices. In the method, one or more virtual instances of respective ones of the one or more devices are generated, and the one or more modifications are tested on the one or more virtual instances to determine if there are one or more issues with the one or more modifications.
    Type: Application
    Filed: June 23, 2022
    Publication date: December 28, 2023
    Inventors: Parminder Singh Sethi, Durai S. Singh
  • Patent number: 11625462
    Abstract: Data theft protection for a computing device is provided by flagging a suspicious user within the pre-boot environment by systematic evaluation to determine suspicious location and/or anomalous user behavior. Depending on a suspicion score and a risk evaluation, the system automatically triggers one or more actions with respect to the data on the computing device.
    Type: Grant
    Filed: October 5, 2020
    Date of Patent: April 11, 2023
    Assignee: Dell Products L.P.
    Inventors: Parminder Singh Sethi, Durai S. Singh, Lakshmi Saroja Nalam
  • Publication number: 20230328157
    Abstract: A method comprises receiving data from a device over at least a first network and analyzing the data to identify one or more parameters for transmission of the data to a computing site. Based, at least in part, on the one or more parameters, at least a second network to be utilized for transmission of the data to the computing site is determined, wherein the second network is different from the first network. In the method, the data is configured for transmission over at least the second network, and is sent to at least the second network for transmission to the computing site.
    Type: Application
    Filed: April 6, 2022
    Publication date: October 12, 2023
    Inventors: Parminder Singh Sethi, Sanjay Singh
  • Publication number: 20230132116
    Abstract: Predictive techniques for issue impact management in a data center or other computing environment comprising a plurality of devices are disclosed. For example, a method comprises predicting an impact to a data center comprising a plurality of devices based on an issue associated with a given device of the plurality of devices within the data center, wherein the prediction utilizes at least one machine learning model. The method then causes one or more actions to be taken based on a result of the prediction.
    Type: Application
    Filed: October 21, 2021
    Publication date: April 27, 2023
    Inventors: Parminder Singh Sethi, Lakshmi Saroja Nalam, Durai S. Singh
  • Patent number: 12259953
    Abstract: One example method includes receiving, from a VM, a request for a software license, in response to the request, transmitting a UUID to the VM, receiving, from the VM, a response that comprises a first encrypted UUID corresponding to the request, and transmitting a client object that includes the first encrypted UUID, and the client object serves as a request for entry of the client object in a database of a cloud computing site.
    Type: Grant
    Filed: June 29, 2020
    Date of Patent: March 25, 2025
    Assignee: EMC IP Holding Company LLC
    Inventors: Parminder Singh Sethi, Durai S. Singh
  • Patent number: 12250285
    Abstract: A method comprises receiving data from a device over at least a first network and analyzing the data to identify one or more parameters for transmission of the data to a computing site. Based, at least in part, on the one or more parameters, at least a second network to be utilized for transmission of the data to the computing site is determined, wherein the second network is different from the first network. In the method, the data is configured for transmission over at least the second network, and is sent to at least the second network for transmission to the computing site.
    Type: Grant
    Filed: April 6, 2022
    Date of Patent: March 11, 2025
    Assignee: Dell Products L.P.
    Inventors: Parminder Singh Sethi, Sanjay Singh
  • Patent number: 11953992
    Abstract: Techniques for device modification analysis are disclosed. For example, a method comprises collecting operational data from one or more devices, and receiving one or more modifications to at least one of firmware and software for the one or more devices. In the method, one or more virtual instances of respective ones of the one or more devices are generated, and the one or more modifications are tested on the one or more virtual instances to determine if there are one or more issues with the one or more modifications.
    Type: Grant
    Filed: June 23, 2022
    Date of Patent: April 9, 2024
    Assignee: Dell Products L.P.
    Inventors: Parminder Singh Sethi, Durai S. Singh
  • Publication number: 20240291825
    Abstract: A method comprises receiving data from a plurality of devices and analyzing the data to identify one or more parameters for segregation of the data. In the method, the data is tagged with one or more metadata tags corresponding to the one or more parameters. The method further comprises segregating the data into a plurality of data portions based at least in part on the one or more parameters, and storing respective ones of the plurality of data portions in respective data stores of a plurality of data stores. The one or more parameters comprise at least one of one or more policies corresponding to the data and respective locations of the plurality of devices.
    Type: Application
    Filed: February 28, 2023
    Publication date: August 29, 2024
    Inventors: Sanjay Singh, Parminder Singh Sethi
  • Patent number: 10860209
    Abstract: A mechanism for determining whether a user should be using a single-hand virtual keyboard for a large-format touch screen device is provided. Additionally, a mechanism is provided to determine whether the single-hand virtual keyboard should be configured for a left-handed or a right-handed user. Further, a mechanism is provided to determine an appropriate size for the single-hand virtual keyboard for a particular user. In this manner, embodiments provide an input mechanism that allows for efficient and comfortable typing on a large-format touch screen device.
    Type: Grant
    Filed: December 12, 2019
    Date of Patent: December 8, 2020
    Assignee: Dell Products L.P.
    Inventors: Parminder Singh Sethi, C Narasimhaiah, Durai S. Singh
  • Publication number: 20230297402
    Abstract: A method comprises retrieving power utilization data of a plurality of host devices and identifying at least one virtual machine for migration from a source host device to a target host device of the plurality of host devices. In the method, power utilization of the at least one virtual machine is predicted. The target host device is determined based, at least in part, on the power utilization data of the plurality of host devices and the predicted power utilization of the at least one virtual machine. The method further comprises migrating at least one virtual machine from the source host device to the target host device.
    Type: Application
    Filed: March 15, 2022
    Publication date: September 21, 2023
    Inventors: Parminder Singh Sethi, Suren Kumar, Durai S. Singh
  • Publication number: 20210157899
    Abstract: A system, method, and computer-readable medium are provided to protect passwords for computer applications by providing a user-triggered password scrambling mechanism. Scrambling is enabled with a user configurable character within the password to be a trigger. Once triggered, a user can enter several incorrect password strings without fear of being locked out of the system. Ultimately, a user can enter a correct password string or a modified version of the correct password string to gain access to the system. Through password scrambling, an observer will have a more difficult time determining the correct version of the password. This improves system security, thereby protecting valuable information, resources, and reputation of an enterprise provider.
    Type: Application
    Filed: November 25, 2019
    Publication date: May 27, 2021
    Applicant: Dell Products L.P.
    Inventors: Parminder Singh Sethi, Durai S. Singh
  • Publication number: 20230124517
    Abstract: Techniques for detecting a modification to a configuration of a system are disclosed. For example, a method comprises the step of collecting a first data set for a system at a first time instance, wherein the first data set comprises inventory data for a configuration of the system present at the first time instance. The method compares the first data set to a second data set, wherein the second data set comprises inventory data for a configuration of the system present at a second time instance. The method obtains a third data set based on the comparison of the first data set and the second data set, wherein the third data set comprises data indicative of any differences between the inventory data for the configuration of the system present at the first time instance and the inventory data for the configuration of the system present at the second time instance.
    Type: Application
    Filed: October 20, 2021
    Publication date: April 20, 2023
    Inventors: Parminder Singh Sethi, Lakshmi Saroja Nalam, Durai S. Singh
  • Patent number: 11429711
    Abstract: A system, method, and computer-readable medium are provided to protect passwords for computer applications by providing a user-triggered password scrambling mechanism. Scrambling is enabled with a user configurable character within the password to be a trigger. Once triggered, a user can enter several incorrect password strings without fear of being locked out of the system. Ultimately, a user can enter a correct password string or a modified version of the correct password string to gain access to the system. Through password scrambling, an observer will have a more difficult time determining the correct version of the password. This improves system security, thereby protecting valuable information, resources, and reputation of an enterprise provider.
    Type: Grant
    Filed: November 25, 2019
    Date of Patent: August 30, 2022
    Assignee: Dell Products L.P.
    Inventors: Parminder Singh Sethi, Durai S. Singh
  • Publication number: 20220393698
    Abstract: An apparatus comprises a processing device configured to collect system state information from host devices, to split the collected system state information into logical chunks, and to determine, based at least in part on a plurality of factors, a compression level to be applied to each of the logical chunks. The plurality of factors comprise a first factor characterizing a time at which the collected system state information is needed at a destination device and at least a second factor characterizing resources available for at least one of performing compression of the collected system state information and transmitting the collected system state information over at least one network to the destination device. The processing device is further configured to apply the determined compression level to each of the logical chunks to generate compressed logical chunks, and to transmit the compressed logical chunks to the destination device.
    Type: Application
    Filed: July 20, 2021
    Publication date: December 8, 2022
    Inventors: Parminder Singh Sethi, Lakshmi Saroja Nalam, Durai S. Singh
  • Patent number: 11954004
    Abstract: Techniques for detecting a modification to a configuration of a system are disclosed. For example, a method comprises the step of collecting a first data set for a system at a first time instance, wherein the first data set comprises inventory data for a configuration of the system present at the first time instance. The method compares the first data set to a second data set, wherein the second data set comprises inventory data for a configuration of the system present at a second time instance. The method obtains a third data set based on the comparison of the first data set and the second data set, wherein the third data set comprises data indicative of any differences between the inventory data for the configuration of the system present at the first time instance and the inventory data for the configuration of the system present at the second time instance.
    Type: Grant
    Filed: October 20, 2021
    Date of Patent: April 9, 2024
    Assignee: Dell Products L.P.
    Inventors: Parminder Singh Sethi, Lakshmi Saroja Nalam, Durai S. Singh
  • Publication number: 20240192997
    Abstract: Intelligent workload management techniques in a heterogenous computing environment are disclosed. For example, a method comprises obtaining first identifying information associated with a set of workload types, and obtaining second identifying information associated with a set of server configurations associated with a computing environment, wherein one or more server configurations in the set of server configurations are different than one or more other server configurations in the set of server configurations. The method then maps individual ones of the set of workload types to individual appropriate ones of the set of server configurations based on the obtained first and second identifying information, and causes distribution of one or more workloads to one or more servers in the computing environment, in accordance with the mapping, for execution thereon. At least a portion of the obtaining and mapping steps are performed using one or more machine learning algorithms.
    Type: Application
    Filed: December 9, 2022
    Publication date: June 13, 2024
    Inventors: Parminder Singh Sethi, Nithish Kote, Durai S. Singh
  • Publication number: 20200136928
    Abstract: In some examples, after a client system encounters a problem, a technical support specialist may connect to the client system via a console. The console may display a graphical representation of a client system that includes a plurality of components. The console may execute a machine learning module to determine one or more potential solutions to the particular problem. Each solution of the one or more solutions may correspond to a previously resolved problem that is similar to the particular problem and may have an associated confidence level determined based on: a similarity of the particular problem to the previously resolved problem, a similarity of the plurality of components to a second plurality of components included in a second client system associated with the previously resolved problem, a similarity of a network topology of the client system to a second network topology of the second client system.
    Type: Application
    Filed: October 29, 2018
    Publication date: April 30, 2020
    Inventors: Parminder Singh Sethi, Mohith Shanthigodu, Durai Singh, Vivekananda Hegde, Smita Kapil, Elanjelian V
  • Publication number: 20250141815
    Abstract: A method comprises receiving data corresponding to operation of a plurality of edge devices from respective ones of a plurality of edge computing sites. The data comprises requests received by the edge devices to perform a plurality of tasks. The data is analyzed using a first machine learning algorithm to determine workloads of respective ones of the edge devices. The method further comprises predicting future workloads of the edge devices. The predicting is performed using a second machine learning algorithm and is based on the determined workloads of the edge devices. A determination is made whether to transfer at least a portion of one or more of the tasks from a first edge device to a second edge device. The first and second edge devices are located at first and second edge computing sites, respectively, and the determination is based on one or more of the predicted future workloads.
    Type: Application
    Filed: October 26, 2023
    Publication date: May 1, 2025
    Inventors: Parminder Singh Sethi, Lakshmi Saroja Nalam, Durai S. Singh
Narrow Results

Filter by US Classification