-
公开(公告)号:US20200244454A1
公开(公告)日:2020-07-30
申请号:US16262302
申请日:2019-01-30
Applicant: Dell Products L.P.
Inventor: Chitrak Gupta , Rama Rao Bisa , Sushma Basavarajaiah , Kala Sampathkumar , Shekar Babu Suryanarayana , Mukund P. Khatri , Ajay Shenoy
IPC: H04L9/08
Abstract: A system includes a management system, a managed system that is coupled to the management system through a network. The managed system comprises a managed device, a key identifier storage, a first managed device locking system coupled to the managed device and the key identifier storage, and a second managed device locking system coupled to the managed device, the key identifier storage, and the first managed device locking system. The first managed device locking system is configured to store a key identifier of the managed device in the key identifier storage and to provide access to a locking key of the managed device based upon the key identifier of the managed device, stored in a management system. The second managed device locking system is configured to monitor the managed device for an event that triggers unlocking the managed device, monitor operating status of the first managed device locking system. In some embodiments, where the first managed device locking system is unavailable, the second managed device locking system is configured to provide access to the locking key of the managed device based upon the key identifier of the managed device, stored in the management system.
-
公开(公告)号:US10606784B1
公开(公告)日:2020-03-31
申请号:US16170413
申请日:2018-10-25
Applicant: Dell Products, L.P.
Inventor: Elie Antoun Jreij , Choudary Maddukuri , Ajeesh Kumar , Kala Sampathkumar , Pablo R. Arias , Rama Rao Bisa
Abstract: Sideband device management bus messages are filtered using software operations in order to minimize dropped messages and to maintain the bus in an operable state. Redundant sideband device management buses are utilized in order to provide fail-over transmission of messages in scenarios where one of the buses becomes inoperable. Multi-packet messages are transmitted to managed devices via the sideband bus connections. If an inoperable state is detected in a sideband bus connection during transmission of a multi-packet message, the portion of the multi-packet message not received by the managed device is transmitted via a redundant sideband bus connection with the managed device. Software filtering of bus transactions utilizes a circular DMA buffer for storing all incoming transactions. Transactions of interest are copied to buffers associated with specific endpoints for processing.
-
公开(公告)号:US10003463B2
公开(公告)日:2018-06-19
申请号:US14885082
申请日:2015-10-16
Applicant: Dell Products L.P.
Inventor: Kala Sampathkumar , Elie Antoun Jreij , Ajeesh Kumar
CPC classification number: H04L9/0891
Abstract: In accordance with embodiments of the present disclosure, an information handling system may include a processor, an information handling resource communicatively coupled to the processor, and a management controller communicatively coupled to the processor and the information handling resource and configured to provide out-of-band management of the information handling system. The management controller may further configured to receive a message indicating that an existing private key associated with the information handling resource is compromised, the message including a replacement public key for replacing an existing public key associated with the information handling resource and associated with the existing private key and responsive to the message, cause the existing public key associated with the information handling resource to be replaced with the replacement public key.
-
公开(公告)号:US20180107572A1
公开(公告)日:2018-04-19
申请号:US15841083
申请日:2017-12-13
Applicant: Dell Products L.P.
Inventor: Lucky Pratap Khemani , Kala Sampathkumar
IPC: G06F11/20 , G06F12/0893 , G06F17/30
CPC classification number: G06F11/2094 , G06F11/2092 , G06F11/2097 , G06F12/0893 , G06F16/22 , G06F2201/85 , G06F2212/604
Abstract: A storage controller failover system includes servers, storage controllers coupled to storage subsystems, and a switching system coupling the servers to the storage controllers. A storage controller configurations and storage controller caches for each of the storage controllers are stored in one or more database. A failure is detected of a first storage controller that has provided first storage communications along a first path between a first server and a first storage subsystem and, in response, a second storage controller that is configured to take over the first storage communications from the first storage controller is determined based on its second storage controller configuration. A first storage controller cache for the first storage controller is provided to the second storage controller, and the second storage controller is caused to provide the first storage communications along a second path between the first server and the first storage subsystem.
-
公开(公告)号:US11252138B2
公开(公告)日:2022-02-15
申请号:US16256792
申请日:2019-01-24
Applicant: Dell Products L.P.
Inventor: Chitrak Gupta , Shinose Abdul Rahiman , Sushma Basavarajaiah , Mukund P. Khatri , Elie Antoun Jreij , Rama Rao Bisa , Kala Sampathkumar
Abstract: A redundant key management system includes a key management system coupled to a plurality of server devices through a network. A first server device includes a managed device coupled to a first remote access controller device that receive a device locking key from the key management system and uses it to lock the managed device. The first remote access controller device then encrypts the device locking key, broadcasts the encrypted device locking key through the network to a second remote access controller device in a second server device, and erases the device locking key. Subsequently, the first remote access controller device transmits a request to retrieve the encrypted device locking key. When the first remote access controller receives the encrypted device locking key from the second remote access controller device, it decrypts the encrypted device locking key and uses the resulting device locking key to unlock the managed device.
-
公开(公告)号:US20170269943A1
公开(公告)日:2017-09-21
申请号:US15073012
申请日:2016-03-17
Applicant: Dell Products, L.P.
Inventor: Ajeesh Kumar , Yarriswamy Chandranna , Kala Sampathkumar , Elie Antoun Jreij
CPC classification number: G06F9/4416 , G06F1/3287 , G06F9/4403 , G06F9/4411 , G06F9/442 , G06F13/4282
Abstract: Systems and methods for using Peripheral Component Interconnect Express Vendor-Defined Message (PCIe-VDM) and Inter-Integrated Circuit (I2C) transport for network communications are described. In some embodiments, an IHS may include: a host processor; a Basic Input/Output System (BIOS) coupled to the host processor; a Baseboard Management Controller (BMC) coupled to the host processor; and a memory coupled to the BMC, the memory having program instructions stored thereon that, upon execution, cause the BMC to: receive a message over a network while the host processor is powered off, wherein the message originates from a remote IHS and targets the BMC; and in response to a pass-through data transfer rate available to the BMC not meeting a threshold value: power on the host processor; request that the BIOS boot up; and perform a communication with the remote IHS via a PCIe bus using a PCIe-VDM supported by the host processor.
-
公开(公告)号:US09639408B1
公开(公告)日:2017-05-02
申请号:US14877483
申请日:2015-10-07
Applicant: Dell Products L.P.
Inventor: Dinesh Kunnathur Ragupathi , Arun Muthaiyan , Kala Sampathkumar , Yogesh Prabhakar Kulkarni , Abhijeet R. Singh
Abstract: In accordance with embodiments of the present disclosure, an information handling system may include a processor and a management controller communicatively coupled to the processor for out-of-band management of the information handling system. The management controller may be configured to receive an event relating to an information handling resource of the information handling system and communicate a command to the information handling resource for applying a customized indicator code behavior to a visual indicator associated with the information handling resource.
-
公开(公告)号:US20170102974A1
公开(公告)日:2017-04-13
申请号:US14877483
申请日:2015-10-07
Applicant: Dell Products L.P.
Inventor: Dinesh Kunnathur Ragupathi , Arun Muthaiyan , Kala Sampathkumar , Yogesh Prabhakar Kulkarni , Abhijeet R. Singh
Abstract: In accordance with embodiments of the present disclosure, an information handling system may include a processor and a management controller communicatively coupled to the processor for out-of-band management of the information handling system. The management controller may be configured to receive an event relating to an information handling resource of the information handling system and communicate a command to the information handling resource for applying a customized indicator code behavior to a visual indicator associated with the information handling resource.
-
公开(公告)号:US20240095020A1
公开(公告)日:2024-03-21
申请号:US17933238
申请日:2022-09-19
Applicant: Dell Products, L.P.
Inventor: Deepaganesh Paulraj , Rama Rao Bisa , Mahesh Babu Ramaiah , Kala Sampathkumar
Abstract: Embodiments of systems and methods to provide a firmware update to devices configured in a redundant configuration in an Information Handling System (IHS) are disclosed. In an illustrative, non-limiting embodiment, an IHS may include computer-executable instructions to receive a target firmware update image associated with a first of the devices, establish a shared memory communication channel with the first device, store the target firmware update image in the shared memory communication channel, and using the shared memory communication channel, perform a firmware update on the first device using the stored target firmware update image.
-
公开(公告)号:US11409884B2
公开(公告)日:2022-08-09
申请号:US16176096
申请日:2018-10-31
Applicant: Dell Products L.P.
Inventor: Chitrak Gupta , Rama Rao Bisa , Elie A. Jreij , Sushma Basavarajaiah , Kala Sampathkumar , Mainak Roy
Abstract: A system, method, and computer-readable medium for a security vulnerability detection operation. The security vulnerability operation includes configuring a firmware security profiling environment with a trusted host and a trusted service processor; receiving a firmware update file via the trusted service processor; using the trusted service processor to identify a security vulnerability within the firmware update file; and, installing the firmware update file to the information handling system only when no security vulnerability is identified by the trusted service processor, the installing being performed by the trusted host.
-
-
-
-
-
-
-
-
-