-
公开(公告)号:US20240364957A1
公开(公告)日:2024-10-31
申请号:US18307315
申请日:2023-04-26
申请人: DELL PRODUCTS L.P.
IPC分类号: H04N21/431 , G09G5/00 , H04N21/41
CPC分类号: H04N21/4312 , G09G5/006 , H04N21/4108
摘要: In response to detecting that a display device is in a multi-stream transport mode, an information handling system determines a display partition layout of the display device. The system transmits setup display patterns according to the display partition layout of the display device, wherein the setup display patterns include a first display pattern and a second display pattern, wherein the first display pattern is associated with a first display partition, and wherein the second display pattern is associated with a second display partition. In response to determining that the first display pattern should be associated with the second display partition and that the second display pattern should be associated with the first display partition, the system associates the first display pattern with the second display partition and associates the second display pattern with the first display partition.
-
2.
公开(公告)号:US20240364752A1
公开(公告)日:2024-10-31
申请号:US18308240
申请日:2023-04-27
申请人: Dell Products L.P.
发明人: OFIR EZRIELEV , YEHIEL ZOHAR , LEE SERFATY
IPC分类号: H04L9/40 , H04L9/32 , H04L67/1087
CPC分类号: H04L63/205 , H04L9/3263 , H04L67/1089
摘要: Methods and systems for securing distributed systems are disclosed. The distributed systems may include data processing systems subject to compromise by malicious entities. If compromised, the data processing systems may impair the services provided by the distributed system. To secure the distributed systems, the data processing systems may implement a security framework. The security framework may utilize a hierarchy that defines authority for validating trusted entities. The hierarchy may vest authority across the distributed system, and may be based on a reputation (e.g., weighted reputation) of each of the data processing systems within the distributed system. If the reputation of a data processing system meets criteria, the data processing system may be treated as being compromised and a local refresh of security data may be performed. Consequently, the impact of compromise of the data processing system may be limited by the distributed authority.
-
公开(公告)号:US20240364740A1
公开(公告)日:2024-10-31
申请号:US18306423
申请日:2023-04-25
申请人: Dell Products L.P.
发明人: Ofir Ezrielev , Lee Serfaty , Yehiel Zohar
CPC分类号: H04L63/1491 , H04L9/085 , H04L63/1416
摘要: Reinstating access to a system of an admin whose certificate is invalid or expired and detecting an attack are disclosed. A requestor, who may be an admin whose certificate is expired or invalid, may send a request for reinstatement to validators. The system may provide honeypot validators in addition to legitimate validators. When the request is received by a honeypot validator or if the honeypot validator is requested to provide their share or a secret, the requestor is determined to be malicious and a protective operation or action is performed.
-
公开(公告)号:US20240364734A1
公开(公告)日:2024-10-31
申请号:US18308225
申请日:2023-04-27
申请人: Dell Products L.P.
发明人: YEHIEL ZOHAR , OFIR EZRIELEV , LEE SERFATY
CPC分类号: H04L63/1441 , H04L9/3247 , H04L63/105 , H04L63/1425
摘要: Methods and systems for securing distributed systems are disclosed. The distributed systems may include data processing systems subject to compromise by malicious entities. If compromised, the data processing systems may impair the services provided by the distributed system. To secure the distributed systems, the data processing systems may implement a security framework. The security framework may utilize a hierarchy that defines authority for validating trusted entities. The hierarchy may vest authority across the distributed system. Consequently, the impact of compromise of a data processing system may be limited by the distributed authority.
-
5.
公开(公告)号:US20240364534A1
公开(公告)日:2024-10-31
申请号:US18309266
申请日:2023-04-28
申请人: Dell Products L.P.
发明人: OFIR EZRIELEV , TOMER KUSHNIR , MAXIM BALIN
CPC分类号: H04L9/3247 , G06F8/65
摘要: Methods and systems for securing data processing systems are disclosed. The data processing systems may be secured through analysis of recognition and simulation of commands that may be run on data processing systems. An analysis of recognition of the command may be used to query if the command has already been simulated for its effects on the data processing system. If the command may have already simulated the command, then the data processing system may know whether to execute the command. Conversely, if the command may not have been simulated, the command may be simulated to understand the effects on the data processing system. In understanding the effects of the command, the data processing system may formulate whether to execute the command.
-
公开(公告)号:US20240364030A1
公开(公告)日:2024-10-31
申请号:US18308745
申请日:2023-04-28
申请人: Dell Products, L.P.
CPC分类号: H01R12/75 , H01R13/24 , H01R43/205
摘要: Embodiments of a highly-repairable, non-soldered Universal Serial Bus (USB) connector are described. In some non-limiting embodiments, a USB connector assembly comprises: a mounting bracket configured to removably attach to a printed circuit board (PCB); and a plurality of spring contacts disposed at least in part within the mounting bracket, wherein the spring contacts are configured to electrically connect to corresponding ones of a plurality of electrical contact pads of the PCB, and wherein an individual spring contact of the plurality of spring contacts applies a contact force to a corresponding one of the electrical contact pads of the PCB upon assembly of the mounting bracket onto the PCB.
-
公开(公告)号:US20240362621A1
公开(公告)日:2024-10-31
申请号:US18308161
申请日:2023-04-27
申请人: Dell Products L.P.
发明人: Ofir Ezrielev , Yehiel Zohar , Lee Serfaty
CPC分类号: G06Q20/36 , G06Q20/02 , G06Q2220/00
摘要: Access to digital assets when a private key is lost or unavailable is disclosed. A digital wallet may store a digital asset and a smart contract. When conditions of the smart contract are satisfied, the digital asset is automatically transferred to a new digital wallet that is associated with a new digital key. A user may acquire the new digital key and access the digital assets now stored in the new digital wallet.
-
公开(公告)号:US20240362295A1
公开(公告)日:2024-10-31
申请号:US18307963
申请日:2023-04-27
申请人: Dell Products L.P.
IPC分类号: G06F17/11
CPC分类号: G06F17/11
摘要: One example method includes accessing a parameter space including a set of binary inputs for an unconstrained objective function. The set of binary inputs are solved at a CPU or GPU using an algorithm that is different from the unconstrained objective function to generate a target solution. A subset of the binary inputs is selected. The unconstrained objective function is solved using the selected subset of binary inputs to generate a solution for each of the selected subset of binary inputs. A maximum possible change for each of the selected subset of binary inputs is determined. The maximum possible change defines a subspace including related binary inputs that are located around each of the selected subset of binary inputs. Those binary inputs and their corresponding related binary inputs whose solutions are greater than the target solution are removed from the parameter space to thereby generate a reduced parameter space.
-
公开(公告)号:US20240362132A1
公开(公告)日:2024-10-31
申请号:US18307893
申请日:2023-04-27
申请人: Dell Products, L.P.
发明人: Michael Albert Perks , Ramesha HE , Syama Sundar Poluri , Krishnaprasad Koladi , Bharath Koushik Bangalore Suryanarayana , Faizal SN
IPC分类号: G06F11/20
CPC分类号: G06F11/2094 , G06F2201/85
摘要: Systems and methods provide witness sled hardware installed in a chassis and supported during network failures using management resources of the chassis. A chassis may include data storage devices and Information Handling Systems (IHSs), each configured to store data redundantly to the data storage devices, such as part of a vSAN (Virtual Storage Area Network). The witness sled is configured to provide witness functions, such as to arbitrate discrepancies in the redundantly stored data. The chassis also includes a chassis management controller (CMC) configured to initiate a connection with the witness sled via a management signaling pathway in response to a notification indicating a network fault in a high-speed connection used by the IHSs in communicating with the witness sled. The CMC receives witness transactions from theses IHSs and utilizes the connection initiated via the management signaling pathway to submit the transactions for processing by the witness sled.
-
10.
公开(公告)号:US20240362125A1
公开(公告)日:2024-10-31
申请号:US18495098
申请日:2023-10-26
申请人: Dell Products L.P.
发明人: Salil Dangi , Nitin Madan
IPC分类号: G06F11/14
CPC分类号: G06F11/1464 , G06F11/1451 , G06F2201/84
摘要: System determines first context of messages between copy management system users and creates snapshot of copy management content part, which is displayed by user interface, and selected by system user as context for subsequent message. System creates hyperlink in message to snapshot that depicts copy management content part and stores user entries for tag that identifies at least one intended recipient of message, time when message is available for intended recipient(s), and text for message. System sends message at time to intended recipient(s) via internal communication channel of system. In response to recipient of message selecting message's hyperlink to snapshot, system outputs context for message to recipient's user interface, which enables recipient to respond to message. If second context of messages between copy management system users matches first context of messages, then information requested in message after first context of messages is conveyed to at least one user interface.
-
-
-
-
-
-
-
-
-