Douglas M. Anson - Dripping Springs TX, US Frank H. Molsberry - Georgetown TX, US Clint H. O'Connor - Austin TX, US William F. Sauber - Georgetown TX, US
Assignee:
Dell Products L.P. - Round Rock TX
International Classification:
H04L 9/32 H04L 9/14 H04L 9/16
US Classification:
380264, 713 2, 713171
Abstract:
A system and method for securing access to memory modules includes a memory module, a virtual memory module, a boot module, and a gatekeeper. The boot module accepts a key and requests for the memory module and provides the requests and the key to the virtual memory module. The virtual memory module is externally accessible by the boot module and accepts the provided key and the requests from the boot module and transmits the requests and the provided key from the boot module to the gatekeeper. The gatekeeper regulates access to the memory module allowing no other components to directly access the memory module. The gatekeeper receives the provided key from the virtual memory module and the gatekeeper authenticates the provided key by comparing it with a stored key stored in secure location. Upon proper authentication of the provided key, the gatekeeper executes the request in the memory module.
Douglas M. Anson - Dripping Springs TX, US James C. Lowery - Austin TX, US Frank H. Molsberry - Georgetown TX, US
Assignee:
Dell Products L.P. - Round Rock TX
International Classification:
H01H 13/70
US Classification:
726 34
Abstract:
A method supports secure input/output (I/O) communications between an I/O device and a data processing system via a keyboard, video, and mouse (KVM) switch. An example embodiment includes the operations of establishing a first secure communication channel between the KVM switch and the I/O device and establishing a second secure communication channel between the KVM switch and the data processing system. In addition, I/O data may be received at the KVM switch from the I/O device via the first secure communication channel. In response to receipt of the I/O data from the I/O device, the I/O data may be transmitted from the KVM switch to the data processing system via the second secure communication channel. Embodiments may also include support for non-secure channels between the KVM switch and nonsecured I/O devices, nonsecured data processing systems, or both.
Ultra-Wideband (Uwb) Secure Wireless Device Pairing And Associated Systems
Liam B. Quinn - Austin TX, US Douglas M. Anson - Dripping Springs TX, US William Dale Todd Nix - Austin TX, US
Assignee:
Dell Products L.P. - Round Rock TX
International Classification:
H04L 27/00 H04L 23/00
US Classification:
375259, 375377
Abstract:
Methods and systems are disclosed for ultra-wideband (UWB) secure wireless device pairing. Secure pairing between devices for secure UWB communications is conducted over in-band UWB communications to provide secure pairing without requiring a visual confirmation through a graphical user interface (GUI), in particular, for wireless personal area network (WPAN) communications. The secure in-band pairing of wireless UWB devices over a UWB radio link provides considerable advantages over prior secure pairing techniques.
Methods And System For Configuring A Peripheral Device With An Information Handling System
Douglas M. Anson - Dripping Springs TX, US William Dale Todd Nix - Austin TX, US Clint H. O'Connor - Austin TX, US
Assignee:
Dell Products L.P. - Round Rock TX
International Classification:
G06F 3/00 G06F 13/00
US Classification:
710 15, 710 8, 710 33, 710 36
Abstract:
A method for configuring a peripheral device in communication with an information handling system (IHS) is disclosed, wherein the method includes receiving visual data associated with the peripheral device and mapping configuration data to the peripheral device based on the visual data. The method further includes utilizing the configuration data to configure the peripheral device in communication with the IHS. An information handling system (IHS) in communication with an image capturing device is further disclosed including a storage device operable to store a database, the database configured to store a standard image of a peripheral device, wherein the standard image is associated with configuration data for the peripheral device. The system further includes a memory coupled to the storage device and a processor to receive visual data associated with the peripheral device from the image capturing device. The processor is operable to execute a software application configured to match the visual data with the standard image to configure the peripheral device based on the configuration data.
System And Method For Secure Gesture Information Handling System Communication
Douglas Anson - Dripping Springs TX, US Gary Douglas Huber - Austin TX, US William Dale Todd Nix - Austin TX, US Roy Stedman - Austin TX, US
Assignee:
Dell Products L.P. - Round Rock TX
International Classification:
G06F 3/041 G09G 5/00
US Classification:
345173, 345156, 715863
Abstract:
A secured communication channel is established between two or more information handling systems by defining attributes for encrypting information with physical inputs made at touch devices of the information handling systems. Inputting the physical gesture at a touch device of each information handling system allows evaluation of one or more attributes at each information handling system so that the shared secret of the physical gesture form the basis for encrypted communications. The touch device includes touch screens or touch pads and the attributes include gesture speed, plural distinct gesture touch points, movement of touch points relative to each other, or other attributes that are determinable from physical gesture inputs at each information handling system.
System And Method For Selectively Restricting Portable Information Handling System Features
Wireless telephones retrieve feature restrictions from a wires telephone network, the feature restrictions having associated predetermined conditions. A wireless telephone applies the feature restrictions if the predetermined conditions are met to disable functions at the wireless telephone as defined by the feature restrictions. For example, a wireless telephone disables camera operations if the position of the wireless phone is in an academic testing location during an academic testing period.
Mobile And Automated Emergency Service Provider Contact System
Douglas M. Anson - Dripping Springs TX, US James W. Clardy - Austin TX, US Thomas Alexander Shows - Leander TX, US
Assignee:
Dell Products L.P. - Round Rock TX
International Classification:
G08B 1/08
US Classification:
34053913, 3404255, 379188
Abstract:
An emergency service provider contact system includes a portable chassis. A processor is housed in the portable chassis. A storage, a communications module, at least one sensor, and a display are coupled to the processor and housed in the portable chassis. A non-transitory, computer-readable medium is housed in the portable chassis, coupled to the processor, and includes instructions that, when executed by the processor, cause the processor to monitor the at least one sensor and, in response to detecting an alert event through the at least one sensor, search the storage using the alert event to retrieve contact information for at least one emergency service provider that is associated with the alert event, and contact the emergency service provider through the communications module using the contact information.
Douglas Anson - Dripping Springs TX, US James Lowery - Austin TX, US Frank Molsberry - Georgetown TX, US
Assignee:
Dell Products L.P. - Round Rock TX
International Classification:
H04L009/00
US Classification:
713/200000
Abstract:
A method supports secure input/output (I/O) communications between an I/O device and a data processing system via a keyboard, video, and mouse (KVM) switch. An example embodiment includes the operations of establishing a first secure communication channel between the KVM switch and the I/O device and establishing a second secure communication channel between the KVM switch and the data processing system. In addition, I/O data may be received at the KVM switch from the I/O device via the first secure communication channel. In response to receipt of the I/O data from the I/O device, the I/O data may be transmitted from the KVM switch to the data processing system via the second secure communication channel. Embodiments may also include support for non-secure channels between the KVM switch and non-secured I/O devices, non-secured data processing systems, or both.