-
公开(公告)号:US11847082B2
公开(公告)日:2023-12-19
申请号:US17069161
申请日:2020-10-13
Applicant: Dell Products, L.P.
Inventor: Chandrasekhar Puthillathe , Chitrak Gupta , Raghavendra Venkataramudu , Chinmay Shripad Hegde , Anurag Sharma , Rajib Saha , Jitendra Kumar Rath
IPC: G06F15/16 , G06F13/38 , H04L67/565 , H04L41/12
CPC classification number: G06F13/387 , H04L67/565 , H04L41/12
Abstract: An Information Handling System (IHS) includes multiple hardware devices, and a Baseboard Management Controller (BMC) in communication with the hardware devices. The BMC includes executable code to cause the BMC to receive a message associated with a non-registered hardware device that is not registered to be managed by the BMC in which the message formatted according to a native protocol of the BMC. The code further causes the code to transmit the message to a device plugin associated with the non-registered hardware device in which the device plugin comprises custom instructions that, upon execution by a system processor, cause the IHS to convert the message into a protocol associated with the non-registered hardware device, and forward the converted message to the non-registered hardware device using the protocol of the non-registered hardware device.
-
公开(公告)号:US11682399B2
公开(公告)日:2023-06-20
申请号:US16928584
申请日:2020-07-14
Applicant: DELL PRODUCTS L.P.
Inventor: Deepaganesh Paulraj , Rochak Gupta , Chitrak Gupta , Nishi
IPC: H04L12/18 , G06F21/31 , G06F8/61 , G06F16/955 , G10L15/26 , G10L15/30 , H04L9/40 , H04L67/55 , H04L67/133
CPC classification number: G10L15/26 , G10L15/30 , H04L63/08 , H04L67/133 , H04L67/55
Abstract: A system for data processing, comprising a first processor operating under algorithmic control and configured to receive audio data during a first session and to convert the audio data into encoded electrical data. A second processor operating under algorithmic control and configured to identify speech data in the encoded electrical data and to convert the speech data to text data. The second processor further configured to process the text data to identify one or more commands and one or more missing parameters of the commands. The second processor further configured to map context data to one or more commands and the one or more missing parameters and to select replacement parameter data corresponding to the missing parameter data from the mapped context data.
-
公开(公告)号:US11416446B2
公开(公告)日:2022-08-16
申请号:US17071749
申请日:2020-10-15
Applicant: Dell Products, L.P.
Inventor: Anurag Sharma , Chitrak Gupta , Jo Ann Varble , Rajib Saha , Chandrasekhar Puthillathe , Ramesha He
Abstract: Support is provided for remote monitoring and management of non-standard devices of an IHS (Information Handling System) that are not supported by a remote management interface, such as the Redfish management interface. The IHS may be configured for remote management of a non-standard device as part of the manufacture of the IHS. Software for management of the non-standard device is validated against a checksum stored to the IHS during its manufacture to confirm the software for managing the non-standard device has not been altered. If the software is validated, the software is used to initialize a plugin for management of the non-standard device. Data collected by the plugin from monitoring of the non-standard device is provided to a remote access controller of the IHS and the remote access controller issues commands to the non-standard device via the plugin.
-
公开(公告)号:US20220121619A1
公开(公告)日:2022-04-21
申请号:US17071749
申请日:2020-10-15
Applicant: Dell Products, L.P.
Inventor: Anurag Sharma , Chitrak Gupta , Jo Ann Varble , Rajib Saha , Chandrasekhar Puthillathe , Ramesha He
Abstract: Embodiments are described for supporting remote monitoring and management of non-standard devices of an IHS (Information Handling System) that are not supported by a remote management interface, such as the Redfish management interface. The IHS may be configured for remote management of a non-standard device as part of the manufacture of the IHS. Software for management of the non-standard device is validated against a checksum stored to the IHS during its manufacture to confirm the software for managing the non-standard device has not been altered. If the software is validated, the software is used to initialize a plugin for management of the non-standard device according. Data collected by the plugin from monitoring of the non-standard device is provided to a remote access controller of the IHS and the remote access controller issues commands to the non-standard device via the plugin.
-
公开(公告)号:US11252138B2
公开(公告)日:2022-02-15
申请号:US16256792
申请日:2019-01-24
Applicant: Dell Products L.P.
Inventor: Chitrak Gupta , Shinose Abdul Rahiman , Sushma Basavarajaiah , Mukund P. Khatri , Elie Antoun Jreij , Rama Rao Bisa , Kala Sampathkumar
Abstract: A redundant key management system includes a key management system coupled to a plurality of server devices through a network. A first server device includes a managed device coupled to a first remote access controller device that receive a device locking key from the key management system and uses it to lock the managed device. The first remote access controller device then encrypts the device locking key, broadcasts the encrypted device locking key through the network to a second remote access controller device in a second server device, and erases the device locking key. Subsequently, the first remote access controller device transmits a request to retrieve the encrypted device locking key. When the first remote access controller receives the encrypted device locking key from the second remote access controller device, it decrypts the encrypted device locking key and uses the resulting device locking key to unlock the managed device.
-
公开(公告)号:US20220020377A1
公开(公告)日:2022-01-20
申请号:US16928584
申请日:2020-07-14
Applicant: DELL PRODUCTS L.P.
Inventor: Deepaganesh Paulraj , Rochak Gupta , Chitrak Gupta , Nishi
Abstract: A system for data processing, comprising a first processor operating under algorithmic control and configured to receive audio data during a first session and to convert the audio data into encoded electrical data. A second processor operating under algorithmic control and configured to identify speech data in the encoded electrical data and to convert the speech data to text data. The second processor further configured to process the text data to identify one or more commands and one or more missing parameters of the commands. The second processor further configured to map context data to one or more commands and the one or more missing parameters and to select replacement parameter data corresponding to the missing parameter data from the mapped context data.
-
公开(公告)号:US10922162B2
公开(公告)日:2021-02-16
申请号:US16006972
申请日:2018-06-13
Applicant: DELL PRODUCTS, L.P.
Inventor: Chandrasekhar Puthillathe , Chitrak Gupta , Rajeshkumar Patel
Abstract: A method, an information handling system (IHS), and a system for capturing video data and serial data during an IHS failure. The method includes detecting, via a controller, an occurrence of a system event log (SEL) incident in the IHS. In response to detecting the occurrence of the SEL incident in the IHS, a data recording window is retrieved from a volatile controller memory. The data recording window contains video data and serial data for a time period up to a time of detection of the SEL incident. The method further includes storing the data recording window including the video data and the serial data for the time period to a non-volatile controller memory.
-
公开(公告)号:US20200301984A1
公开(公告)日:2020-09-24
申请号:US16361509
申请日:2019-03-22
Applicant: Dell Products L.P.
Inventor: Mainak Roy , Chitrak Gupta , Rathi Babu , Amrita Nistala
IPC: G06F16/9535 , G06F16/22 , G06F16/9532
Abstract: A system, method, and computer-readable medium are disclosed for improved text and voice based searching. In various embodiments, a multi-level voice search system is implemented. In various embodiments, a voice based search is converted to text, where the text is used to determine a user's intent and context of the search. The search can be for a particular object and for data or information related to the object. Subsequent searches, which can be from a conversation using voice based searching can change the context and be directed to a different more specific level of the object. Metadata can link data or information, such as documents to one another. Based on search history or patterns, data or information can be updated.
-
公开(公告)号:US10715630B2
公开(公告)日:2020-07-14
申请号:US16041131
申请日:2018-07-20
Applicant: Dell Products L.P.
Inventor: Chitrak Gupta , Chandrasekhar Puthillathe , Kiran Krishnappa , Abhirup Seal , Hari Venkatachalam
Abstract: A Common Information Module (CIM) interoperability system includes a server device coupled to a network. A remote access controller in the server device is coupled to server component(s), and includes a CIM provider coupled via a CIM provider communication subsystem to a REpresentational State Transfer (REST)-CIM provider. The REST-CIM provider receives a REST request generated by a client device and redirected to the REST-CIM provider by the server device, and converts the REST request to CIM request. The REST-CIM provider then makes a call to the CIM provider that includes the CIM request and is based on a type of HTTP method request in the REST request. When the REST-CIM provider receives a CIM response from the CIM provider, it converts Common Manageability Programming Interface (CMPI) response data in that CIM response to JavaScript Object Notation (JSON) objects, and provides the JSON objects to the server device.
-
公开(公告)号:US20200218670A1
公开(公告)日:2020-07-09
申请号:US16241817
申请日:2019-01-07
Applicant: DELL PRODUCTS L.P.
Inventor: Deepaganesh Paulraj , Manjunath Vishwanath , Rama Rao Bisa , Chitrak Gupta , Elie Antoun Jreij
Abstract: On power-up, self-encrypting drives (SEDs, 150) are unlocked one after another in an order based on the SEDs' unlocking priorities. In determining the priorities, one or more of the following factors are taken into account: (1) the content stored on the SEDs; the SEDs storing the OS are given higher priorities; (2) the SEDs' access history on previous power-ups: if a SED was accessed earlier than other SEDs, then this SED is given a higher priority; (3) whether there is an access request pending for a SED. Such prioritization allows the system to reach full functionality faster on power-ups. Other features are also provided.
-
-
-
-
-
-
-
-
-