Difference between revisions of "Dell Products L.P. patent applications published on October 12th, 2023"

From WikiPatents
Jump to navigation Jump to search
(Creating a new page)
Line 1: Line 1:
'''Summary of the patent applications from Dell Products L.P. on October 12th, 2023'''
+
==Patent applications for Dell Products L.P. on October 12th, 2023==
  
Dell Products L.P. has recently filed patents in various areas of technology. These patents cover a range of innovative solutions and systems that aim to improve the performance, reliability, and security of computing devices and networks. Some notable patents filed by Dell Products L.P. include:
+
===CARD RETENTION MECHANISM IN AN INFORMATION HANDLING SYSTEM ([[US Patent Application 17717259. CARD RETENTION MECHANISM IN AN INFORMATION HANDLING SYSTEM simplified abstract|17717259]])===
  
- A carrier assembly with an electro-magnetic interference (EMI) shield and an EMI finger that helps connect the shield to the carrier slot. This assembly provides protection against EMI for mounted equipment.
 
  
- An intrusion detection apparatus that uses a printed circuit board (PCB) with an electrical switch and a conductive ground ring. When a foreign conductive object comes into contact with the ground ring, it triggers an intrusion signal to indicate the presence of the object.
+
'''Main Inventor'''
  
- A data communication network that captures images of the coverage area and creates a 3D map using beamforming information. This network authenticates user equipment devices and verifies their identity based on their location within the 3D map.
+
Hung Wen Wu
  
- A method for analyzing data received from a device over a network and determining a different network for transmission based on certain parameters. The data is configured for transmission over the second network and sent to the computing site.
 
  
- A location verification system that checks the distance between a computerized device and another device to verify its physical location when accessing a network.
+
'''Brief explanation'''
 +
The abstract describes a card riser for an information handling system. The card riser has a bottom surface, multiple connector slots, and a locking mechanism. Each connector slot is designed to hold a different card's connector. The locking mechanism can be unlocked to insert the cards into the slots and then locked to securely hold the cards in place within the card riser.
  
- A cryptographic key management system for cached data that removes invalid data blocks from the cache and re-encrypts them with a new encryption key when the compromised key is detected.
+
'''Abstract'''
 +
A card riser for an information handling system includes a bottom surface, multiple connector slots in physical communication with the bottom surface, and a locking mechanism in physical communication with the bottom surface. Each connector slot is configured to receive a corresponding connector of a different one of multiple cards. When the locking mechanism is in an unlocked position, a different one of the cards is inserted within a different one of the connector slots. When the locking mechanism is in a locked position, the locking mechanism is placed in physical communication with each of the cards to securely hold the cards within the card riser.
  
- A battery management system that discharges a fully charged battery if its maximum error exceeds a certain limit, using a reserve capacity.
+
===MULTI-DEVICE-CHASSIS/DEVICE MOVABLE COUPLING LIQUID COOLING SYSTEM ([[US Patent Application 17715235. MULTI-DEVICE-CHASSIS/DEVICE MOVABLE COUPLING LIQUID COOLING SYSTEM simplified abstract|17715235]])===
  
- A method for testing the performance and reliability of solid-state storage systems by subjecting them to specific temperature ranges and reading data at different temperatures to generate test data.
 
  
- A system for ordering and manufacturing devices that includes a voucher management system for handling ownership transfer using public and private keys.
+
'''Main Inventor'''
  
- A networked system with a voucher management system that transfers ownership of a computing device from one owner system to another using ownership vouchers and new ownership transfer data.
+
Colin Montgomery
  
Notable applications:
 
  
* A system for managing and transferring ownership of computing devices using ownership vouchers and public-private key encryption.
+
'''Brief explanation'''
* A method for testing the performance and reliability of solid-state storage systems by subjecting them to specific temperature ranges.
+
The abstract describes a liquid cooling system for a computing device. It consists of a multi-device chassis, a computing device, and a movable coupling system that connects the computing device to the chassis. The system includes a mounting element on the computing device that transfers heat generated by the device. The chassis has a liquid cooling subsystem and a mounting element that allows the computing device to move. The chassis receives the heat from the computing device and uses the liquid cooling subsystem to dissipate it.
* A battery management system that discharges fully charged batteries with excessive errors.
 
* A cryptographic key management system for cached data that removes and re-encrypts invalid data blocks.
 
* A location verification system that checks the distance between devices to verify physical location.
 
* A data communication network that captures images and creates a 3D map of the coverage area.
 
* An intrusion detection apparatus that triggers an intrusion signal when a foreign conductive object is detected.
 
* A carrier assembly with an EMI shield and finger for mounting equipment into a carrier slot.
 
* A method for analyzing and transmitting data over different networks based on certain parameters.
 
* A system for ordering and manufacturing devices with a voucher management system.
 
  
 +
'''Abstract'''
 +
A computing device liquid cooling system includes a multi-device chassis, a computing device, and a multi-device-chassis/device movable coupling liquid cooling system that moveably couples the computing device to the multi-device chassis. The multi-device-chassis/device movable coupling liquid cooling system includes a computing device mounting element that is mounted to the computing device and configured to transfer heat generated by the computing device, a multi-device chassis mounting element that includes a liquid cooling subsystem and that is mounted to the multi-device chassis, and a movable coupling that is configured to allow the computing device mounting element to move relative to the multi-device chassis mounting element. The multi-device chassis mounting element is configured to receive the heat generated by the computing device and transferred by the computing device mounting element, and transfer the heat received from the computing device mounting element using the liquid cooling subsystem.
  
 +
===AIRFLOW GUIDE WITH INTEGRATED POWER CONDUCTION ([[US Patent Application 17726877. AIRFLOW GUIDE WITH INTEGRATED POWER CONDUCTION simplified abstract|17726877]])===
  
  
==Patent applications for Dell Products L.P. on October 12th, 2023==
+
'''Main Inventor'''
  
===CARD RETENTION MECHANISM IN AN INFORMATION HANDLING SYSTEM (17717259)===
+
Xin Zhi MA
  
'''Inventor'''
 
Hung Wen Wu
 
  
===MULTI-DEVICE-CHASSIS/DEVICE MOVABLE COUPLING LIQUID COOLING SYSTEM (17715235)===
+
'''Brief explanation'''
 +
This abstract describes an information handling system that includes a component that generates heat, an air mover (such as a fan), a power supply unit, and an airflow guide. The airflow guide has certain features that, along with parts of the system's chassis, create a space for air to flow between the air mover and the heat-generating component. The airflow guide also has electrical conduits built into it, which are used to deliver power from the power supply unit to the heat-generating component.
  
'''Inventor'''
+
'''Abstract'''
Colin Montgomery
+
An information handling system may include a heat-generating information handling resource, an air mover, a power supply unit, and an airflow guide. The airflow guide may include one or more features configured to, either alone or in combination with portions of a chassis of the information handling system, form an air plenum fluidically coupled between the air mover and the heat-generating information handling resource and electrical conduits integrated within the airflow guide configured to deliver electrical current from the power supply unit to the heat-generating information handling resource.
  
===AIRFLOW GUIDE WITH INTEGRATED POWER CONDUCTION (17726877)===
+
===COOLING CAPABILITY DEGRADATION DIAGNOSIS IN AN INFORMATION HANDLING SYSTEM ([[US Patent Application 17738143. COOLING CAPABILITY DEGRADATION DIAGNOSIS IN AN INFORMATION HANDLING SYSTEM simplified abstract|17738143]])===
  
'''Inventor'''
 
Xin Zhi MA
 
  
===COOLING CAPABILITY DEGRADATION DIAGNOSIS IN AN INFORMATION HANDLING SYSTEM (17738143)===
+
'''Main Inventor'''
  
'''Inventor'''
 
 
Xin Zhi Ma
 
Xin Zhi Ma
  
===STORAGE SYSTEM WITH MULTIPLE TARGET CONTROLLERS SUPPORTING DIFFERENT SERVICE LEVEL OBJECTIVES (17714312)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
This abstract describes an information handling system that includes a memory and a processor. The memory stores data related to cooling fans and other components in the system. The processor receives two sets of data - one for a baseline cooling condition and another for the current cooling condition. It then compares subsets of data from both sets to determine if they are substantially equal. If they are, the processor checks if the baseline device temperature is substantially equal to the current device temperature. If not, it identifies a degradation issue within the system. Specifically, it determines that cooling fans in a specific fan zone are operating at full speed, and both the device temperature and downstream components temperature have increased.
 +
 
 +
'''Abstract'''
 +
An information handling system includes a memory and a processor. The memory stores data associated with cooling fans and other components within the information handling system. The processor receives a first set of data for a baseline cooling condition within the information handling system, and a second set of data for a current cooling condition. The processor determines whether a first subset of data in the first set of data is substantially equal to a second subset of data in the second set of data. If so, the processor determines whether a baseline device temperature is substantially equal to a current device temperature. If not, the processor determines a first degradation issue within the information handling system based on cooling fans in a first fan zone are operating at full speed, and both a first device temperature increases and a downstream components temperature increase.
 +
 
 +
===STORAGE SYSTEM WITH MULTIPLE TARGET CONTROLLERS SUPPORTING DIFFERENT SERVICE LEVEL OBJECTIVES ([[US Patent Application 17714312. STORAGE SYSTEM WITH MULTIPLE TARGET CONTROLLERS SUPPORTING DIFFERENT SERVICE LEVEL OBJECTIVES simplified abstract|17714312]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Igor Achkinazi
 
Igor Achkinazi
  
===ADAPTIVE READ PREFETCH TO REDUCE HOST LATENCY AND INCREASE BANDWIDTH FOR SEQUENTIAL READ STREAMS (17715219)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
The abstract describes a storage system that has two target controllers associated with two different storage pools. Each storage pool has its own service level objectives. The storage system receives input-output operations from host devices and processes them. The IO operations are directed to either the first or second target controller based on the initiators of the host devices. The storage system provides separate feedback information to the host devices for each target controller. This feedback information allows the host devices to throttle additional IO operations differently depending on whether they are directed to the first or second target controller.
 +
 
 +
'''Abstract'''
 +
First and second target controllers implemented in a storage system are associated with respective first and second storage pools having respective first and second service level objectives. Input-output (IO) operations are received from one or more host devices and processed in the storage system, with different ones of the IO operations being directed from one or more initiators of the one or more host devices to different ones of the first and second target controllers. Separate feedback information is provided from the storage system to the one or more host devices for respective ones of the first and second target controllers, so as to permit different amounts of throttling of additional IO operations in the one or more host devices based at least in part on whether those additional IO operations are to be directed to the first target controller or the second target controller.
 +
 
 +
===ADAPTIVE READ PREFETCH TO REDUCE HOST LATENCY AND INCREASE BANDWIDTH FOR SEQUENTIAL READ STREAMS ([[US Patent Application 17715219. ADAPTIVE READ PREFETCH TO REDUCE HOST LATENCY AND INCREASE BANDWIDTH FOR SEQUENTIAL READ STREAMS simplified abstract|17715219]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Andrew Feld
 
Andrew Feld
  
===SELECTIVE POWERING OF STORAGE DRIVE COMPONENTS IN A STORAGE NODE BASED ON SYSTEM PERFORMANCE LIMITS (17718719)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
The abstract describes techniques for improving the performance of a storage system when reading data in a sequential manner. These techniques involve predicting and fetching data in advance based on a predetermined distance and size. The system keeps track of any failures that occur during these prefetch operations and adjusts the distance and size accordingly. By doing so, the latency experienced by the user is reduced, and the overall data transfer rate is increased.
 +
 
 +
'''Abstract'''
 +
Techniques for providing an adaptive approach to prefetching data for sequential read streams in a storage system. The techniques can include performing prefetch operations for a sequential read stream in accordance with a prefetch distance and a prefetch size, counting or otherwise keeping track of occurrences of failure scenarios in the prefetch operations while servicing the sequential read stream, and modifying or adjusting one of the prefetch distance and the prefetch size based on the occurrences of the respective failure scenarios. In this way, host input/output (IO) latency can be reduced, and IO bandwidth can be increased, in the servicing of sequential read streams by the storage system.
 +
 
 +
===SELECTIVE POWERING OF STORAGE DRIVE COMPONENTS IN A STORAGE NODE BASED ON SYSTEM PERFORMANCE LIMITS ([[US Patent Application 17718719. SELECTIVE POWERING OF STORAGE DRIVE COMPONENTS IN A STORAGE NODE BASED ON SYSTEM PERFORMANCE LIMITS simplified abstract|17718719]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Dan Aharoni
 
Dan Aharoni
  
===DATA PROTECTION AGAINST MASS DELETION BASED ON DATA STORAGE PERIOD (17714855)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
The abstract describes techniques for selectively powering storage drive components in a storage node based on system performance limits. This involves determining the number of storage drive components needed to support a workload, taking into account the system performance limit determined using the performance limit of other components. The component performance limit is based on factors such as the expected number of input/output operations and bandwidth. Once the number of components is determined, power is applied to those specific components in the storage node.
 +
 
 +
'''Abstract'''
 +
Techniques are provided for selective powering of storage drive components in a storage node based on system performance limits. One method comprises determining a number of storage drive components, of multiple storage drive components in a storage node, needed to support at least one workload of the storage node, wherein the determining is based at least in part on a number of storage drive components needed to support a system performance limit determined using a component performance limit of at least one other component of the storage node, wherein the component performance limit is based at least in part on one or more of an expected number of input/output operations of the storage node and an expected bandwidth of the storage node; and initiating an application of power to the determined number of storage drive components of the storage node.
 +
 
 +
===DATA PROTECTION AGAINST MASS DELETION BASED ON DATA STORAGE PERIOD ([[US Patent Application 17714855. DATA PROTECTION AGAINST MASS DELETION BASED ON DATA STORAGE PERIOD simplified abstract|17714855]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Senthil Ponnuswamy
 
Senthil Ponnuswamy
  
===REVERSIBLE WRITE TECHNIQUES USING PHYSICAL STORAGE DEVICE OFFLOADING (17715538)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
This abstract describes a system and method for preventing mass deletion of data in a data storage system. The system works by first marking blocks of data to be deleted and then removing these marked blocks through a garbage collection operation. The system uses historical data on deletions and user-defined thresholds based on data age to detect any significant deviations that may indicate a potential danger. If a deletion exceeds a certain threshold, the next garbage collection operation is skipped, allowing the user to investigate the deletion command and restore data if necessary. Certain conditions, such as abnormal high deletion periods or new system installations, can override the delay in garbage collection.
 +
 
 +
'''Abstract'''
 +
Embodiments of a system and method to prevent mass deletion of data in a data storage system. A data deletion operation comprises a delete operation marking blocks to be deleted followed by a garbage collection (GC) operation to remove marked blocks from storage media. Based on historical information regarding deletions per GC cycle and certain user-defined thresholds based on data age, the storage system can detect any significant deviations as potentially dangerous. If a deletion in excess of a deviation threshold is detected, the next GC operation is skipped to provide a delay period during which time the user can investigate the data delete command and restore data if necessary. De-risking conditions such as known abnormal high deletion periods or new system installation can be used to override any garbage collection delay.
 +
 
 +
===REVERSIBLE WRITE TECHNIQUES USING PHYSICAL STORAGE DEVICE OFFLOADING ([[US Patent Application 17715538. REVERSIBLE WRITE TECHNIQUES USING PHYSICAL STORAGE DEVICE OFFLOADING simplified abstract|17715538]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Vladimir Shveidel
 
Vladimir Shveidel
  
===HOST-BASED LOCALITY DETERMINATION FOR LOGICAL VOLUMES STORED ACROSS MULTIPLE NODES OF A DISTRIBUTED STORAGE SYSTEM (17716118)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
This abstract describes a system that uses solid-state drives (SSDs) for storage. The SSDs utilize internal log structured systems (LSSs) to manage data. The system can perform reversible write operations by writing new data to a specific logical address on the SSD. This operation updates the logical address to store the new data instead of the old data previously stored there. The old data is moved to a physical address on the SSD, and mapping information is used to indicate the logical address's mapping to the physical address. When a subsequent read operation occurs, the system can retrieve the old data using the retained mapping information.
 +
 
 +
'''Abstract'''
 +
A system can use non-volatile solid state drives (SSDs) to provide storage. The SSDs can implement internal log structured systems (LSSs). A reversible write operation can be serviced by an SSD to write first data to an SSD logical address. The reversible write operation can update the SSD logical address to store the first data rather than old data stored at the SSD logical address prior to servicing the reversible write operation. The old data can be stored at an SSD physical address and mapping information indicates the SSD logical address is mapped to the SSD physical address. Servicing the reversible write operation can include: retaining the mapping information and the old data; and adding second mapping information that maps the SSD logical address to a second SSD physical address storing the first data. A subsequent read operation can read the old data using the retained mapping information.
 +
 
 +
===HOST-BASED LOCALITY DETERMINATION FOR LOGICAL VOLUMES STORED ACROSS MULTIPLE NODES OF A DISTRIBUTED STORAGE SYSTEM ([[US Patent Application 17716118. HOST-BASED LOCALITY DETERMINATION FOR LOGICAL VOLUMES STORED ACROSS MULTIPLE NODES OF A DISTRIBUTED STORAGE SYSTEM simplified abstract|17716118]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Igor Achkinazi
 
Igor Achkinazi
  
===COORDINATED BOOT SYNCHRONIZATION AND STARTUP OF INFORMATION HANDLING SYSTEM SUBSYSTEMS (17714824)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
This abstract describes an apparatus that can identify and determine the location of different parts of a storage system. It does this by sending commands to multiple storage nodes and receiving responses from them. Based on these responses, the apparatus stores information about the location of each part of the storage system.
 +
 
 +
'''Abstract'''
 +
An apparatus includes at least one processing device configured to identify a logical storage volume stored across multiple storage nodes of a distributed storage system, and for each of a plurality of different portions of the logical storage volume, to send one or more locality determination commands to each of one or more of the storage nodes, a given such command requesting a corresponding one of the storage nodes to respond with an indication as to whether or not the portion of the logical storage volume is local to that storage node, and to receive from the one or more storage nodes responses to the one or more locality determination commands. The processing device is further configured to store locality information for the plurality of different portions of the logical storage volume based at least in part on the responses of the storage nodes to the locality determination commands.
 +
 
 +
===COORDINATED BOOT SYNCHRONIZATION AND STARTUP OF INFORMATION HANDLING SYSTEM SUBSYSTEMS ([[US Patent Application 17714824. COORDINATED BOOT SYNCHRONIZATION AND STARTUP OF INFORMATION HANDLING SYSTEM SUBSYSTEMS simplified abstract|17714824]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Deepaganesh PAULRAJ
 
Deepaganesh PAULRAJ
  
===DISCOVERY CONTROLLER-BASED NONVOLATILE MEMORY EXPRESS NAMESPACE RESOLUTION SERVICES (17714154)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
This abstract describes an information handling system that includes a processor, a subsystem, and a management controller. The management controller is responsible for managing the system, even when it is not actively running. When the system is powered on, the management controller instructs the basic input/output system (BIOS) to pause its boot process before it starts recognizing the functions of the subsystem. Once the subsystem has finished booting up and its virtual functions have been initialized, the management controller tells the BIOS to resume the boot process and recognize all the functions of the subsystem, including the virtual functions.
 +
 
 +
'''Abstract'''
 +
An information handling system may include a processor, a subsystem communicatively coupled to the processor, and a management controller communicatively coupled to the processor and the subsystem and configured for out-of-band management of the information handling system, the management controller further configured to, in response to an alternating current power cycle of the information handling system: cause a basic input/output system of the information handling system to pause its boot process prior to enumeration of functions of the subsystem; and upon completion of the boot process of the subsystem and initialization of virtual functions of the subsystem, cause the basic input/output system to unpause the boot process in order to enumerate the functions of the subsystem including the virtual functions.
 +
 
 +
===DISCOVERY CONTROLLER-BASED NONVOLATILE MEMORY EXPRESS NAMESPACE RESOLUTION SERVICES ([[US Patent Application 17714154. DISCOVERY CONTROLLER-BASED NONVOLATILE MEMORY EXPRESS NAMESPACE RESOLUTION SERVICES simplified abstract|17714154]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Claudio DESANTI
 
Claudio DESANTI
  
===HETEROGENEOUS COMPUTE DOMAINS WITH AN EMBEDDED OPERATING SYSTEM IN AN INFORMATION HANDLING SYSTEM (17716632)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
The abstract states that currently there is no efficient way to locate a namespace on an NVMe-oF fabric. This means that it is difficult to find the storage subsystem where the boot namespace is located or to discover all available namespaces on the fabric. This can make booting in a SAN environment slow and computationally expensive. The abstract suggests that there are embodiments that support discovery through a discovery controller, which can help a host efficiently resolve a given namespace identifier to the corresponding subsystem port(s) through which that namespace is accessible.
 +
 
 +
'''Abstract'''
 +
Currently, there is no scalable methodologies defined to locate a namespace on an NVMe-oF fabric. Therefore, it is necessary to configure a host with the NVMe™ Qualified Name (NQN) and transport information of the storage subsystem where the boot namespace is located or discover and enumerate all namespaces available to the host on an NVMe-oF fabric. With the current protocols, a host may need to perform many operations to locate the proper namespace and boot from the NVMe-oF fabric, making booting in a SAN environment an extremely slow operation and computationally expensive process. Embodiments herein support discovery, via a discovery controller, to provide a namespace resolution service able to facilitate a host to efficiently resolve a given namespace identifier to the corresponding subsystem port(s) through which that namespace is accessible.
 +
 
 +
===HETEROGENEOUS COMPUTE DOMAINS WITH AN EMBEDDED OPERATING SYSTEM IN AN INFORMATION HANDLING SYSTEM ([[US Patent Application 17716632. HETEROGENEOUS COMPUTE DOMAINS WITH AN EMBEDDED OPERATING SYSTEM IN AN INFORMATION HANDLING SYSTEM simplified abstract|17716632]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Shekar Babu Suryanarayana
 
Shekar Babu Suryanarayana
  
===MANAGEMENT CONTROLLER REQUESTS IN A UEFI PRE-BOOT ENVIRONMENT OF AN INFORMATION HANDLING SYSTEM (17716385)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
This abstract describes an information handling system that consists of various components such as a memory device, memory, chipset, and BIOS. The chipset includes two processors - a main processor and a hybrid processor.
 +
 
 +
During the first pre-boot phase, the BIOS memory maps the hybrid processor to a specific part of the memory device and stores an embedded operating system in the memory.
 +
 
 +
In the second pre-boot phase, the BIOS memory maps the main processor to another part of the memory device, stores a host operating system in the memory, and loads the embedded operating system on the hybrid processor.
 +
 
 +
It is worth noting that the second portion of the memory device allocated for the main processor is larger than the first portion allocated for the hybrid processor.
 +
 
 +
'''Abstract'''
 +
An information handling system includes a memory device, a memory, a chipset, and a basic input/output system (BIOS). The chipset includes a main processor and a hybrid processor. During a first pre-boot phase, the BIOS memory maps the hybrid processor to a first portion of the memory device, and stores an embedded operating system in the memory. During a second pre-boot phase, the BIOS memory maps the main processor to a second portion of the memory device, stores a host operating system in the memory, and loads the embedded operating system on the hybrid processor. The second portion is a larger portion of the memory device than the first portion.
 +
 
 +
===MANAGEMENT CONTROLLER REQUESTS IN A UEFI PRE-BOOT ENVIRONMENT OF AN INFORMATION HANDLING SYSTEM ([[US Patent Application 17716385. MANAGEMENT CONTROLLER REQUESTS IN A UEFI PRE-BOOT ENVIRONMENT OF AN INFORMATION HANDLING SYSTEM simplified abstract|17716385]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
William C. Edwards III
 
William C. Edwards III
  
===RELIABLE ONE-CLICK CLUSTER SHUTDOWN (17719154)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
This abstract describes an information handling system that consists of a Unified Extensible Firmware Interface (UEFI) and a management controller. The management controller establishes a communication channel with the UEFI and provides a memory path for a driver needed to perform a specific operation in the UEFI. The UEFI then retrieves the requested driver from its memory using the provided memory path and loads it. The UEFI executes the loaded driver and reports the execution status back to the management controller.
 +
 
 +
'''Abstract'''
 +
An information handling system includes a Unified Extensible Firmware Interface (UEFI) and a management controller. The management controller establishes a communication channel with the UEFI, and provides a memory path associated with a driver associated with an operation to be performed in the UEFI. Based on the memory path, the UEFI receives the requested driver from a memory associated with the UEFI, and loads the requested driver. The UEFI executes the loaded requested driver, and provides an execution status for executed driver to the management controller.
 +
 
 +
===RELIABLE ONE-CLICK CLUSTER SHUTDOWN ([[US Patent Application 17719154. RELIABLE ONE-CLICK CLUSTER SHUTDOWN simplified abstract|17719154]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Bo WANG
 
Bo WANG
  
===STORAGE DEVICE RAID DATA WRITE INTERMEDIATE PARITY SYSTEM (17716204)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
This abstract describes an information handling system that is part of a cluster of multiple systems. The system receives a shutdown instruction from a user, indicating that the entire cluster should be powered down. Without any further input from the user, the system performs the following actions:
 +
1. It migrates any virtual machines (VMs) that are currently running on the cluster to a specific node within the cluster, which has been designated as the primary node.
 +
2. It stores important data (metadata) at the primary node, which will be used to restore communication between the nodes once the shutdown is complete.
 +
3. It powers down all the nodes in the cluster.
 +
 
 +
'''Abstract'''
 +
An information handling system may include at least one processor and a memory. The information handling system may be a node of an information handling system cluster that comprises a plurality of nodes, and the information handling system is configured to: receive a shutdown instruction from a user, the shutdown instruction indicating that the cluster is to be powered down; and without further user input: cause virtual machines (VMs) that are executing on the cluster to be migrated to a particular node of the cluster that has been designated as a primary node; store metadata at the primary node, the metadata being usable to reestablish communication among the nodes after the shutdown; and cause the plurality of nodes to power down.
 +
 
 +
===STORAGE DEVICE RAID DATA WRITE INTERMEDIATE PARITY SYSTEM ([[US Patent Application 17716204. STORAGE DEVICE RAID DATA WRITE INTERMEDIATE PARITY SYSTEM simplified abstract|17716204]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Girish Desai
 
Girish Desai
  
===OPTIMIZED CLIENT-SIDE DEDUPLICATION (18327290)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
The abstract describes a storage device system that uses RAID technology to write data. It consists of a storage subsystem and a volatile memory system. When the system receives data from a host, it first stores it in the volatile memory. Then, it stores a portion of the data in the storage system and generates parity data based on that portion. The parity data is also stored in the volatile memory. Finally, the system erases the portion of the data from the volatile memory.
 +
 
 +
'''Abstract'''
 +
A storage device RAID data write intermediate parity system includes a storage device coupled to a host system and including a storage subsystem and a volatile memory system. The storage device RAID data write intermediate parity system receives first primary data from the host system, and stores the first primary data in the volatile memory system. The storage device RAID data write intermediate parity system then stores a first subset of the first primary data in the storage system, generates first intermediate parity data using the first subset of the first primary data, stores the first intermediate parity data in the volatile memory system and, in response, erases the first subset of the first primary data from the volatile memory system.
 +
 
 +
===OPTIMIZED CLIENT-SIDE DEDUPLICATION ([[US Patent Application 18327290. OPTIMIZED CLIENT-SIDE DEDUPLICATION simplified abstract|18327290]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Jehuda Shemer
 
Jehuda Shemer
  
===STORAGE HOST RETIREMENT AND ROLLBACK (17714211)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
The abstract describes a method for improving client-side deduplication during the backup process. The method involves determining a cadence (frequency) and a change log resolution (level of detail) for backing up a client's data. These values are then evaluated against certain thresholds. If any of the thresholds are met, client-side deduplication is enabled, otherwise it is disabled.
 +
 
 +
'''Abstract'''
 +
One example method includes optimizing client-side deduplication. When backing up a client, a cadence and a change log resolution are determined. These values are evaluated alone or in combination with respect to various thresholds. Client-side deduplication is enabled or disabled based on whether any one or more of the thresholds are satisfied.
 +
 
 +
===STORAGE HOST RETIREMENT AND ROLLBACK ([[US Patent Application 17714211. STORAGE HOST RETIREMENT AND ROLLBACK simplified abstract|17714211]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Timothy O'Connor
 
Timothy O'Connor
  
===CACHING TECHNIQUES (17715459)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
Rollback snapshots are created by a storage system when host servers are no longer in use. These snapshots contain information about the storage objects and masking views associated with the retired servers. By using these rollback snapshots, it is possible to recover the retired servers by reconstructing the masking views and recreating the storage objects. In simpler terms, rollback snapshots help in restoring retired host servers by preserving their configurations and associated storage data.
 +
 
 +
'''Abstract'''
 +
Rollback snapshots are created by a storage system when host servers are retired. The rollback snapshots include a masking views and information about the storage objects associated with the host servers. Retired host servers can be recovered by using the rollback snapshots to reconstruct masking views and recreate storage objects.
 +
 
 +
===CACHING TECHNIQUES ([[US Patent Application 17715459. CACHING TECHNIQUES simplified abstract|17715459]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Ashok Tamilarasan
 
Ashok Tamilarasan
  
===HYPERPARAMETER OPTIMIZATION IN FILE COMPRESSION USING SEQUENCE ALIGNMENT (17658930)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
The abstract describes a data storage system that uses a deduplicated data cache to store unique data portions. These data portions are promoted to the cache when servicing input/output (I/O) operations. When reading or writing data to a specific address, the system checks if the data portion stored at that address meets certain criteria for promotion to the cache. These criteria can include being a duplicate of content stored at multiple addresses and having a reference count above a minimum threshold, which indicates how many addresses the data portion is stored at. If the criteria are met, the data portion is stored in the deduplicated data cache.
 +
 
 +
'''Abstract'''
 +
A data storage system can include a deduplicated data cache used to store unique deduplicated data portions. Data portions can be promoted to the deduplicated data cache in connection with servicing I/O operations. Servicing the I/O operation that reads data from, or writes data to, a logical address can include determining whether a data portion stored at the logical address meets criteria for promoting the data portion to a deduplicated data cache. The criteria can include a condition that the data portion is a duplicate of content stored at multiple logical addresses, and can include a condition that the data portion has a reference count that is at least a minimum threshold where the reference count denotes a number of logical addresses at which the data portion is stored. Responsive to determining the data portion meets the criteria, the data portion can be stored in the deduplicated data cache.
 +
 
 +
===HYPERPARAMETER OPTIMIZATION IN FILE COMPRESSION USING SEQUENCE ALIGNMENT ([[US Patent Application 17658930. HYPERPARAMETER OPTIMIZATION IN FILE COMPRESSION USING SEQUENCE ALIGNMENT simplified abstract|17658930]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Ofir Ezrielev
 
Ofir Ezrielev
  
===WARM START FILE COMPRESSION USING SEQUENCE ALIGNMENT (17658932)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
The abstract describes a method for compressing files. The process involves aligning the input file and setting certain parameters to achieve desired performance. The aligned file is split into sequences, resulting in a compression matrix. A consensus sequence is determined from the compression matrix, and pointer pairs are generated using the consensus sequence. These pointer pairs, along with the consensus sequence, make up the compressed file.
 +
 
 +
'''Abstract'''
 +
Compressing files is disclosed. An input file to be compressed is first aligned. During or prior to aligning the input file, hyperparameters are set, determined, or configured. The hyperparameters may be set, determined, or configured to achieve a particular performance characteristic. Aligning the file includes splitting the file into sequences that can be aligned. The result is a compression matrix, where each row of the matrix corresponds to part of the file. A consensus sequence id determined from the compression matrix. Using the consensus sequence, pointer pairs are generated. Each pointer pair identifies a subsequence of the consensus matrix. The compressed file includes the pointer pairs and the consensus sequence.
 +
 
 +
===WARM START FILE COMPRESSION USING SEQUENCE ALIGNMENT ([[US Patent Application 17658932. WARM START FILE COMPRESSION USING SEQUENCE ALIGNMENT simplified abstract|17658932]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Ofir Ezrielev
 
Ofir Ezrielev
  
===COMPRESSING MULTIPLE DIMENSION FILES USING SEQUENCE ALIGNMENT (17658936)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
The abstract describes a method for compressing files. The process involves aligning the input file by splitting it into smaller sequences. This alignment creates a compression matrix, where each row represents a part of the file. This compression matrix can also be used as a starting point for further compression. The compression can be done in multiple stages, with larger letter sizes used in the first stage and smaller letter sizes used in the second stage. A consensus sequence is determined from the compression matrix, and pointer pairs are generated based on this consensus sequence. Each pointer pair identifies a subsection of the consensus matrix. The final compressed file includes these pointer pairs and the consensus sequence.
 +
 
 +
'''Abstract'''
 +
Compressing files is disclosed. An input file to be compressed is first aligned. Aligning the file includes splitting the file into sequences that can be aligned. The result is a compression matrix, where each row of the matrix corresponds to part of the file. The compression matrix may also serve as a warm start if additional compression is desired. Compression may be performed in stages, where an initial compression matrix is generated in a first stage using larger letter sizes for alignment and then a second compression stage is performed using smaller letter sizes. A consensus sequence id determined from the compression matrix. Using the consensus sequence, pointer pairs are generated. Each pointer pair identifies a subsequence of the consensus matrix. The compressed file includes the pointer pairs and the consensus sequence.
 +
 
 +
===COMPRESSING MULTIPLE DIMENSION FILES USING SEQUENCE ALIGNMENT ([[US Patent Application 17658936. COMPRESSING MULTIPLE DIMENSION FILES USING SEQUENCE ALIGNMENT simplified abstract|17658936]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Ofir Ezrielev
 
Ofir Ezrielev
  
===ARTIFICIAL INTELLIGENCE-BASED TECHNIQUES FOR AUTOMATED VISUAL DATA SEARCHING USING EDGE DEVICES (17718803)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
The abstract describes a method for compressing files. The process involves aligning the input file along its multiple axes or dimensions. This alignment is done by splitting the file into smaller sequences that can be aligned along each axis. This alignment generates a compression tensor, which represents different parts of the file. From this compression tensor, a consensus tensor is determined. Using the consensus tensor, pointer lists are created, which identify specific portions of the consensus tensor. The final compressed file includes these pointer lists and the consensus tensor.
 +
 
 +
'''Abstract'''
 +
Compressing files is disclosed. An input file to be compressed is first aligned. When the file has multiple axes or dimensions, the file is aligned along each of the axes. Aligning the file includes splitting the file into sequences that can be aligned along each of the axes or dimensions. Aligning the file generates a compression tensor, where each row or dimensional space of the compression tensor corresponds to part of the file. A consensus tensor is determined from the compression tensor. Using the consensus tensor, pointer lists are generated. Each pointer lists identifies a subsequence or portion of the consensus tensor. The compressed file includes the pointer lists and the consensus tensor.
 +
 
 +
===ARTIFICIAL INTELLIGENCE-BASED TECHNIQUES FOR AUTOMATED VISUAL DATA SEARCHING USING EDGE DEVICES ([[US Patent Application 17718803. ARTIFICIAL INTELLIGENCE-BASED TECHNIQUES FOR AUTOMATED VISUAL DATA SEARCHING USING EDGE DEVICES simplified abstract|17718803]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Min Gong
 
Min Gong
  
===BLOCK-BASED PROTECTION FROM RANSOMWARE (18303108)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
This abstract describes a technology that uses artificial intelligence to automate visual data searching on edge devices. It involves obtaining visual data from these devices, processing the data using AI techniques to create automated searching tools, deploying these tools to the devices, and performing automated actions based on the data received from the devices.
 +
 
 +
'''Abstract'''
 +
Methods, apparatus, and processor-readable storage media for artificial intelligence-based techniques for automated visual data searching using edge devices are provided herein. An example computer-implemented method includes obtaining visual data from one or more edge devices; generating at least one automated searching tool by processing at least a portion of the obtained data using one or more artificial intelligence techniques; deploying the at least one automated searching tool to at least a portion of the one or more edge devices; and performing one or more automated actions based at least in part on data received, from at least a portion of the one or more edge devices, in connection with operation of the at least one automated searching tool.
 +
 
 +
===BLOCK-BASED PROTECTION FROM RANSOMWARE ([[US Patent Application 18303108. BLOCK-BASED PROTECTION FROM RANSOMWARE simplified abstract|18303108]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Philippe Armangau
 
Philippe Armangau
  
===SECURE WIPE OF DATA PROCESSING UNIT USING FIRMWARE CAPSULE (17714324)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
The abstract describes a method to protect data from ransomware attacks. It involves identifying a specific set of blocks of data that were written between two specific points in time. The method then analyzes the attributes of these blocks and determines if there is a high chance of a ransomware attack. If such an attack is likely, the method secures the data object to its state as of the first point in time, effectively preventing any potential damage caused by the attack.
 +
 
 +
'''Abstract'''
 +
A technique of protecting data from ransomware attacks identifies a set of blocks written to a data object between first and second points in time, determines a set of attributes of the set of blocks, and, in response to the set of attributes indicating a likelihood of a ransomware attack, secures a state of the data object as of the first point in time.
 +
 
 +
===SECURE WIPE OF DATA PROCESSING UNIT USING FIRMWARE CAPSULE ([[US Patent Application 17714324. SECURE WIPE OF DATA PROCESSING UNIT USING FIRMWARE CAPSULE simplified abstract|17714324]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Deepaganesh PAULRAJ
 
Deepaganesh PAULRAJ
  
===FAST IDENTITY ONLINE (FIDO) DEVICE ONBOARDING (FDO) PROTOCOL COMPUTING DEVICE HARDWARE ATTESTATION SYSTEM (17717820)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
This abstract describes an information handling system that includes a processor, a data processing unit, and a management controller. The management controller is responsible for managing the system and can perform tasks outside of the normal operation of the system. In this case, the management controller obtains information about the hardware and capabilities of the data processing unit. Based on this information, it generates a firmware capsule that can be executed during the system's startup phase to securely erase the contents of the memory. The management controller then communicates this firmware capsule to the data processing unit during its normal operating phase and causes the unit to reboot into its startup phase to execute the firmware and securely erase the memory.
 +
 
 +
'''Abstract'''
 +
An information handling system may include a processor, a data processing unit communicatively coupled to the processor, and a management controller communicatively coupled to the processor and the data processing unit and configured for out-of-band management of the information handling system. The management controller may further be configured to obtain a hardware inventory and capabilities of the data processing unit; based on the hardware inventory and capabilities, generate a firmware capsule for execution during a basic input/output system phase of the data processing unit to cause a secure erasure of contents of a memory of the data processing unit; and communicate the firmware capsule to the data processing unit during an operating system phase of the data processing unit and cause the data processing unit to reboot to its basic input/output system phase in order to execute drivers of the firmware capsule in order to securely erase the memory.
 +
 
 +
===FAST IDENTITY ONLINE (FIDO) DEVICE ONBOARDING (FDO) PROTOCOL COMPUTING DEVICE HARDWARE ATTESTATION SYSTEM ([[US Patent Application 17717820. FAST IDENTITY ONLINE (FIDO) DEVICE ONBOARDING (FDO) PROTOCOL COMPUTING DEVICE HARDWARE ATTESTATION SYSTEM simplified abstract|17717820]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Anurag Sharma
 
Anurag Sharma
  
===INTEGRATED THERMAL-ELECTRICAL CO-SIMULATION (17716527)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
The abstract describes a system that manages ownership vouchers for computing devices. It receives an ownership voucher and a hardware attestation certificate from the manufacturer, and stores them in a database. When the system decides to transfer ownership to an end user, it generates a second ownership transfer data by signing the end user's public key with its private key. This data is then added to the ownership voucher to transfer ownership to the end user. The ownership voucher and the hardware attestation certificate are provided to the end user.
 +
 
 +
'''Abstract'''
 +
A voucher management system receives, from a computing device manufacturer system, an ownership voucher that transfers ownership of a computing device from the computing device manufacturer system to the voucher management system, and a hardware attestation certificate for the computing device, and associates them with the computing device in a voucher management database. When the voucher management system determines that the ownership of the computing device should be transferred to an end user system, it automatically generates second ownership transfer data by signing an end user system public key with a voucher management system private key, provides the second ownership transfer data in the ownership voucher in order to transfer ownership of the computing device from the voucher management system to the end user system, and provides the ownership voucher and the hardware attestation certificate to the end user system.
 +
 
 +
===INTEGRATED THERMAL-ELECTRICAL CO-SIMULATION ([[US Patent Application 17716527. INTEGRATED THERMAL-ELECTRICAL CO-SIMULATION simplified abstract|17716527]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Vijender Kumar
 
Vijender Kumar
  
===BUNDLED AND CUSTOMIZABLE DOCUMENTATION-VIEWER FOR APPLICATION FOR INCREASED ASCCESSIBLITY (17718464)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
This abstract describes an information handling system that consists of a memory device and a processor. The memory device stores two types of data: the first data represents the thermal profile (temperature distribution) of a motherboard, and the second data represents a circuit trace on the motherboard. A circuit trace is a high-speed data connection between different circuit devices on the motherboard.
 +
 
 +
The processor in the system uses the first and second data to determine the average temperature of the circuit trace on the motherboard. It then uses this average temperature to create a model or layout for the circuit trace on the motherboard. In other words, the processor designs the placement of the circuit trace based on its average temperature to ensure optimal performance and prevent overheating.
 +
 
 +
'''Abstract'''
 +
An information handling system includes a memory device and a processor. The memory device includes first data representing a thermal profile of a motherboard, and second data representing a circuit trace of the motherboard. The circuit trace provides a high-speed data interconnection between two or more circuit devices. The processor determines an average temperature of the circuit trace on the motherboard based upon the first data and the second data, and models a trace layout for the circuit trace on the motherboard based upon the average temperature.
 +
 
 +
===BUNDLED AND CUSTOMIZABLE DOCUMENTATION-VIEWER FOR APPLICATION FOR INCREASED ASCCESSIBLITY ([[US Patent Application 17718464. BUNDLED AND CUSTOMIZABLE DOCUMENTATION-VIEWER FOR APPLICATION FOR INCREASED ASCCESSIBLITY simplified abstract|17718464]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Jason Bassford
 
Jason Bassford
  
===FAST IDENTITY ONLINE (FIDO) DEVICE ONBOARDING (FDO) PROTOCOL OWNERSHIP VOUCHER MANAGEMENT SYSTEM (17717321)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
The abstract describes a system that includes methods, a system, and a storage medium for a content viewer. The system is capable of receiving a request for content and rendering that content in a graphical user interface. The content viewer contains both the content and the interface for viewing it.
 +
 
 +
'''Abstract'''
 +
Methods, system, and non-transitory processor-readable storage medium for content viewer system are provided herein. An example method includes receiving a content viewer in which to render content in response to a request to receive the content. The content viewer comprises the content and a graphical user interface and rendering the content in the content viewer.
 +
 
 +
===FAST IDENTITY ONLINE (FIDO) DEVICE ONBOARDING (FDO) PROTOCOL OWNERSHIP VOUCHER MANAGEMENT SYSTEM ([[US Patent Application 17717321. FAST IDENTITY ONLINE (FIDO) DEVICE ONBOARDING (FDO) PROTOCOL OWNERSHIP VOUCHER MANAGEMENT SYSTEM simplified abstract|17717321]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Anurag Sharma
 
Anurag Sharma
  
===FAST IDENTITY ONLINE (FIDO) DEVICE ONBOARDING (FDO) PROTOCOL COMPUTING DEVICE ORDERING/MANUFACTURING SYSTEM (17717496)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
The abstract describes a networked system that involves two owner systems and a voucher management system. The first owner system sends an ownership voucher to the voucher management system, which includes data for transferring ownership of a computing device from the first owner system to the voucher management system. The voucher management system then determines that the ownership of the computing device should be transferred to the second owner system. In response, it generates new ownership transfer data by signing the second owner system's public key with its own private key. This new data is included in the ownership voucher to transfer ownership of the computing device from the voucher management system to the second owner system.
 +
 
 +
'''Abstract'''
 +
A networked system includes a first owner system and a second owner system coupled to a voucher management system. The voucher management system receives, from the first owner system, an ownership voucher having first ownership transfer data including a voucher management system public key that has been signed by a first owner system private key in order to transfer ownership of a computing device from the first owner system to the voucher management system. The voucher management system determines that the ownership of the computing device should be transferred to the second owner system and, in response, automatically generates second ownership transfer data by signing a second owner system public key with a voucher management system private key, and provides the second ownership transfer data in the ownership voucher in order to transfer ownership of the computing device from the voucher management system to the second owner system.
 +
 
 +
===FAST IDENTITY ONLINE (FIDO) DEVICE ONBOARDING (FDO) PROTOCOL COMPUTING DEVICE ORDERING/MANUFACTURING SYSTEM ([[US Patent Application 17717496. FAST IDENTITY ONLINE (FIDO) DEVICE ONBOARDING (FDO) PROTOCOL COMPUTING DEVICE ORDERING/MANUFACTURING SYSTEM simplified abstract|17717496]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Muzhar S. Khokhar
 
Muzhar S. Khokhar
  
===TEMPERATURE-ACCELERATED SOLID-STATE STORAGE TESTING METHODS (17716069)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
The abstract describes a system used by a computing device manufacturer to order and manufacture devices. The system includes a voucher management system that manages ownership transfers. When a computing device is ordered, the manufacturer includes information about a rendezvous system in the device. The manufacturer also uses its private key to sign the voucher management system's public key, creating ownership transfer data. This data is then provided in an ownership voucher to transfer ownership of the device from the manufacturer to the voucher management system.
 +
 
 +
'''Abstract'''
 +
A FDO protocol computing device ordering/manufacturing system includes a computing device manufacturer system coupled to a voucher management system. The computing device manufacturer system identifies, as part of an ordering process for a computing device being ordered by a subsequent owner, rendezvous system reachability information for a rendezvous system. The computing device manufacturer system provides the rendezvous system reachability information in the computing device prior to its transfer to the subsequent owner. The computing device provisioning subsystem retrieves a voucher management system public key from the voucher management system, uses a computing device manufacturer private key to sign the voucher management system public key to generate first ownership transfer data, provides the first ownership transfer data in an ownership voucher in order to transfer ownership of the computing device from the computing device manufacturer system to the voucher management system, and provides the ownership voucher to the voucher management system.
 +
 
 +
===TEMPERATURE-ACCELERATED SOLID-STATE STORAGE TESTING METHODS ([[US Patent Application 17716069. TEMPERATURE-ACCELERATED SOLID-STATE STORAGE TESTING METHODS simplified abstract|17716069]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Samuel Hudson
 
Samuel Hudson
  
===BATTERY STATE OF HEALTH CALIBRATION SYSTEM (17715846)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
This abstract describes a method for testing the performance and reliability of a solid-state storage system. The method involves writing data to the storage system and subjecting it to a higher temperature for a shorter period of time, which simulates the effects of operating at a lower temperature for a longer period of time. The data is then read from the storage system at a different temperature to generate test data. Based on the results of the first test, the storage system is subjected to the higher temperature for a reduced time period, equivalent to operating at a different temperature for a longer period of time. The data is then read again to generate a second set of test data. This method allows for accelerated testing of the storage system's performance and reliability under different temperature conditions.
 +
 
 +
'''Abstract'''
 +
A temperature-accelerated solid-state storage testing method includes writing data to a storage system and subjecting the storage system to a first temperature range for a first time period that is equivalent to operation at a lower/second temperature for a greater/second time period. Subsequently, the data from the storage system is read within a third time period at a third temperature range to generate first test data. The storage system is then subjected to the first temperature range for a fourth time period that was reduced relative to the first time period based on the reading of the data to generate the first test data causing the operation of storage system to be equivalent to operating at the second temperature range for a fifth time period. Subsequently the data from the storage system is read within the third time period at the third temperature range to generate second test data.
 +
 
 +
===BATTERY STATE OF HEALTH CALIBRATION SYSTEM ([[US Patent Application 17715846. BATTERY STATE OF HEALTH CALIBRATION SYSTEM simplified abstract|17715846]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Lawrence Ho
 
Lawrence Ho
  
===DYNAMIC CRYPTOGRAPHIC KEY MANAGEMENT FOR HANDLING KEY COMPROMISES IN CACHED DATA AND METADATA (17714954)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
The abstract describes a battery management system that monitors the maximum error of a battery. If the maximum error exceeds a certain threshold, the system checks if the battery is fully charged. If it is, the system then discharges the battery using a reserve capacity.
 +
 
 +
'''Abstract'''
 +
A battery management system determines whether a maximum error of a battery is greater than a threshold, and in response to a determination that the maximum error is greater than the threshold, determines whether the battery is fully charged. In response to a determination that the battery is fully charged, the system discharges the battery based on a reserve capacity.
 +
 
 +
===DYNAMIC CRYPTOGRAPHIC KEY MANAGEMENT FOR HANDLING KEY COMPROMISES IN CACHED DATA AND METADATA ([[US Patent Application 17714954. DYNAMIC CRYPTOGRAPHIC KEY MANAGEMENT FOR HANDLING KEY COMPROMISES IN CACHED DATA AND METADATA simplified abstract|17714954]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Niharika Avasarala
 
Niharika Avasarala
  
===Return-To-Site Tool Upholding Distance via Physical and Logical Indicators (17718482)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
This abstract describes a system for managing cryptographic keys for cached data. When a request is made to access a data block that is encrypted with a compromised encryption key, the system identifies the compromised key and removes the corresponding data block from the cache. The system then re-encrypts the data block with a new encryption key when a new request is received. Any other data blocks that are still encrypted with the compromised key are also removed from the cache according to a defined policy.
 +
 
 +
'''Abstract'''
 +
Embodiments of a cryptographic key management system for cached data that efficiently re-encrypts cached data encrypted with a compromised encryption key by receiving a request to access a cached data block encrypted with an original encryption key. Upon determining that the original encryption key is compromised or destroyed, thus resulting in the requested data block being invalid, evicting the requested data block from the cache storing the cached data. The data block is re-encrypted using a new encryption key upon receipt of a new request to access the cached data. Any remaining cached data encrypted with the original encryption key is evicted from the cache through a defined cache eviction policy.
 +
 
 +
===Return-To-Site Tool Upholding Distance via Physical and Logical Indicators ([[US Patent Application 17718482. Return-To-Site Tool Upholding Distance via Physical and Logical Indicators simplified abstract|17718482]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Yevgeni Gehtman
 
Yevgeni Gehtman
  
===NETWORK ORCHESTRATION FOR DEVICE MANAGEMENT OPERATIONS (17714595)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
The abstract describes a location verification system that verifies the access to a network based on the distance between two computerized devices. It explains that the system detects an attempt to access the network from a device at a specific physical location and determines the access status by checking if the device meets a certain distance requirement from another device.
 +
 
 +
'''Abstract'''
 +
Methods, system, and non-transitory processor-readable storage medium for a location verification system are provided herein. An example method includes detecting an attempt to access a network from a computerized device located at a physical location. The location verification system determines access status based on a distance requirement between the computerized device and another computerized device.
 +
 
 +
===NETWORK ORCHESTRATION FOR DEVICE MANAGEMENT OPERATIONS ([[US Patent Application 17714595. NETWORK ORCHESTRATION FOR DEVICE MANAGEMENT OPERATIONS simplified abstract|17714595]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Parminder Singh Sethi
 
Parminder Singh Sethi
  
===USER EQUIPMENT DEVICE INTEGRITY PROTECTION IN A DATA COMMUNICATION NETWORK (18194626)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
This abstract describes a method that involves receiving data from a device over a network and analyzing the data to determine how it should be transmitted to a computing site. The method then determines a different network to be used for transmitting the data based on certain parameters. The data is then configured for transmission over the chosen network and sent to that network for transmission to the computing site.
 +
 
 +
'''Abstract'''
 +
A method comprises receiving data from a device over at least a first network and analyzing the data to identify one or more parameters for transmission of the data to a computing site. Based, at least in part, on the one or more parameters, at least a second network to be utilized for transmission of the data to the computing site is determined, wherein the second network is different from the first network. In the method, the data is configured for transmission over at least the second network, and is sent to at least the second network for transmission to the computing site.
 +
 
 +
===USER EQUIPMENT DEVICE INTEGRITY PROTECTION IN A DATA COMMUNICATION NETWORK ([[US Patent Application 18194626. USER EQUIPMENT DEVICE INTEGRITY PROTECTION IN A DATA COMMUNICATION NETWORK simplified abstract|18194626]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Rowland Newman Shaw
 
Rowland Newman Shaw
  
===INTRUSION DETECTION APPARATUS FOR AN INFORMATION HANDLING SYSTEM (17658162)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
This abstract describes a data communication network that consists of a data communication node and an imaging device. The data communication node establishes a connection with a user equipment device and provides beamforming information for that connection. The imaging device captures image information for the coverage area of the data communication node.
 +
 
 +
The network then uses the image information to create a 3D map of the coverage area. It also authenticates the user equipment device and determines its location within the 3D map by using the beamforming information and the image information. Finally, it verifies the identity of the user equipment device based on this location correlation.
 +
 
 +
'''Abstract'''
 +
A data communication network includes a data communication node and an imaging device. The data communication node establishes a data connection with a user equipment device and provides beamforming information for the data connection. The imaging device provides image information for a coverage area of the data communication node. The network synthesizes a 3D map of the coverage area based upon the image information, authenticates the user equipment device, correlates a location of the user equipment device within the 3D map based upon the beamforming information for the data connection and upon the image information, and attests to an identity of the user equipment device based upon the correlation of the location.
 +
 
 +
===INTRUSION DETECTION APPARATUS FOR AN INFORMATION HANDLING SYSTEM ([[US Patent Application 17658162. INTRUSION DETECTION APPARATUS FOR AN INFORMATION HANDLING SYSTEM simplified abstract|17658162]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Chun-Che Wang
 
Chun-Che Wang
  
===TEAR-DROP SHAPED HDD CARRIER EMI FINGER (17717355)===
 
  
'''Inventor'''
+
'''Brief explanation'''
 +
The abstract describes an intrusion detection apparatus that is used in an information handling system. The apparatus consists of a printed circuit board (PCB) with an electrical switch. The switch has conductive pads on the top layer of the PCB and a conductive ground ring surrounding the pads. There is also a mechanical pin that is connected to a part of the system's chassis. The pin has a conductive gasket at one end. When a foreign conductive object comes into contact with the ground ring, it triggers an intrusion signal to indicate the presence of the object.
 +
 
 +
'''Abstract'''
 +
An intrusion detection apparatus, including: a printed circuit board (PCB), including: an electrical switch, the electrical switch including: conductive pads positioned on a top layer of the PCB, and a conductive ground ring positioned on the top layer and surrounding the conductive pads; and a mechanical pin coupled to a first portion of a chassis of the information handling system at a first end of the mechanical pin, the mechanical pin including a conductive gasket positioned at a second end of the mechanical pin, the first end opposite to the second end, wherein the ground ring provides an intrusion signal when a foreign conductive object is in contact with the ground ring to indicate a presence of the foreign conductive object.
 +
 
 +
===TEAR-DROP SHAPED HDD CARRIER EMI FINGER ([[US Patent Application 17717355. TEAR-DROP SHAPED HDD CARRIER EMI FINGER simplified abstract|17717355]])===
 +
 
 +
 
 +
'''Main Inventor'''
 +
 
 
Yu-Lin Chen
 
Yu-Lin Chen
 +
 +
 +
'''Brief explanation'''
 +
The abstract describes a carrier assembly that is used to mount equipment into a carrier slot. The assembly includes an electro-magnetic interference (EMI) shield, which protects the equipment from EMI. The EMI shield is formed in one plane of the assembly. There is also an EMI finger that protrudes from the EMI shield and is connected to it. The EMI finger is formed in a second plane that is perpendicular to the first plane. When the carrier assembly is installed into the carrier slot, the EMI finger couples the EMI shield to the slot. The EMI finger has a tear-drop shape when viewed from a specific direction.
 +
 +
'''Abstract'''
 +
A carrier assembly for mounting equipment into a carrier slot includes an electro-magnetic interference (EMI) shield and an EMI finger. The EMI shield protects the mounted equipment from EMI. The EMI shield is formed in a first plane of the carrier assembly. The EMI finger protrudes from the EMI shield and is coupled to the EMI shield. The EMI finger is formed in a second plane perpendicular to the first plane. The EMI finger operates, when the carrier assembly is installed into the carrier slot, to couple the EMI shield to the carrier slot. The EMI finger, when viewed from a first direction that is perpendicular to both the first plane and the second plane, is formed in a tear-drop shape.

Revision as of 23:31, 18 October 2023

Contents

Patent applications for Dell Products L.P. on October 12th, 2023

CARD RETENTION MECHANISM IN AN INFORMATION HANDLING SYSTEM (17717259)

Main Inventor

Hung Wen Wu


Brief explanation

The abstract describes a card riser for an information handling system. The card riser has a bottom surface, multiple connector slots, and a locking mechanism. Each connector slot is designed to hold a different card's connector. The locking mechanism can be unlocked to insert the cards into the slots and then locked to securely hold the cards in place within the card riser.

Abstract

A card riser for an information handling system includes a bottom surface, multiple connector slots in physical communication with the bottom surface, and a locking mechanism in physical communication with the bottom surface. Each connector slot is configured to receive a corresponding connector of a different one of multiple cards. When the locking mechanism is in an unlocked position, a different one of the cards is inserted within a different one of the connector slots. When the locking mechanism is in a locked position, the locking mechanism is placed in physical communication with each of the cards to securely hold the cards within the card riser.

MULTI-DEVICE-CHASSIS/DEVICE MOVABLE COUPLING LIQUID COOLING SYSTEM (17715235)

Main Inventor

Colin Montgomery


Brief explanation

The abstract describes a liquid cooling system for a computing device. It consists of a multi-device chassis, a computing device, and a movable coupling system that connects the computing device to the chassis. The system includes a mounting element on the computing device that transfers heat generated by the device. The chassis has a liquid cooling subsystem and a mounting element that allows the computing device to move. The chassis receives the heat from the computing device and uses the liquid cooling subsystem to dissipate it.

Abstract

A computing device liquid cooling system includes a multi-device chassis, a computing device, and a multi-device-chassis/device movable coupling liquid cooling system that moveably couples the computing device to the multi-device chassis. The multi-device-chassis/device movable coupling liquid cooling system includes a computing device mounting element that is mounted to the computing device and configured to transfer heat generated by the computing device, a multi-device chassis mounting element that includes a liquid cooling subsystem and that is mounted to the multi-device chassis, and a movable coupling that is configured to allow the computing device mounting element to move relative to the multi-device chassis mounting element. The multi-device chassis mounting element is configured to receive the heat generated by the computing device and transferred by the computing device mounting element, and transfer the heat received from the computing device mounting element using the liquid cooling subsystem.

AIRFLOW GUIDE WITH INTEGRATED POWER CONDUCTION (17726877)

Main Inventor

Xin Zhi MA


Brief explanation

This abstract describes an information handling system that includes a component that generates heat, an air mover (such as a fan), a power supply unit, and an airflow guide. The airflow guide has certain features that, along with parts of the system's chassis, create a space for air to flow between the air mover and the heat-generating component. The airflow guide also has electrical conduits built into it, which are used to deliver power from the power supply unit to the heat-generating component.

Abstract

An information handling system may include a heat-generating information handling resource, an air mover, a power supply unit, and an airflow guide. The airflow guide may include one or more features configured to, either alone or in combination with portions of a chassis of the information handling system, form an air plenum fluidically coupled between the air mover and the heat-generating information handling resource and electrical conduits integrated within the airflow guide configured to deliver electrical current from the power supply unit to the heat-generating information handling resource.

COOLING CAPABILITY DEGRADATION DIAGNOSIS IN AN INFORMATION HANDLING SYSTEM (17738143)

Main Inventor

Xin Zhi Ma


Brief explanation

This abstract describes an information handling system that includes a memory and a processor. The memory stores data related to cooling fans and other components in the system. The processor receives two sets of data - one for a baseline cooling condition and another for the current cooling condition. It then compares subsets of data from both sets to determine if they are substantially equal. If they are, the processor checks if the baseline device temperature is substantially equal to the current device temperature. If not, it identifies a degradation issue within the system. Specifically, it determines that cooling fans in a specific fan zone are operating at full speed, and both the device temperature and downstream components temperature have increased.

Abstract

An information handling system includes a memory and a processor. The memory stores data associated with cooling fans and other components within the information handling system. The processor receives a first set of data for a baseline cooling condition within the information handling system, and a second set of data for a current cooling condition. The processor determines whether a first subset of data in the first set of data is substantially equal to a second subset of data in the second set of data. If so, the processor determines whether a baseline device temperature is substantially equal to a current device temperature. If not, the processor determines a first degradation issue within the information handling system based on cooling fans in a first fan zone are operating at full speed, and both a first device temperature increases and a downstream components temperature increase.

STORAGE SYSTEM WITH MULTIPLE TARGET CONTROLLERS SUPPORTING DIFFERENT SERVICE LEVEL OBJECTIVES (17714312)

Main Inventor

Igor Achkinazi


Brief explanation

The abstract describes a storage system that has two target controllers associated with two different storage pools. Each storage pool has its own service level objectives. The storage system receives input-output operations from host devices and processes them. The IO operations are directed to either the first or second target controller based on the initiators of the host devices. The storage system provides separate feedback information to the host devices for each target controller. This feedback information allows the host devices to throttle additional IO operations differently depending on whether they are directed to the first or second target controller.

Abstract

First and second target controllers implemented in a storage system are associated with respective first and second storage pools having respective first and second service level objectives. Input-output (IO) operations are received from one or more host devices and processed in the storage system, with different ones of the IO operations being directed from one or more initiators of the one or more host devices to different ones of the first and second target controllers. Separate feedback information is provided from the storage system to the one or more host devices for respective ones of the first and second target controllers, so as to permit different amounts of throttling of additional IO operations in the one or more host devices based at least in part on whether those additional IO operations are to be directed to the first target controller or the second target controller.

ADAPTIVE READ PREFETCH TO REDUCE HOST LATENCY AND INCREASE BANDWIDTH FOR SEQUENTIAL READ STREAMS (17715219)

Main Inventor

Andrew Feld


Brief explanation

The abstract describes techniques for improving the performance of a storage system when reading data in a sequential manner. These techniques involve predicting and fetching data in advance based on a predetermined distance and size. The system keeps track of any failures that occur during these prefetch operations and adjusts the distance and size accordingly. By doing so, the latency experienced by the user is reduced, and the overall data transfer rate is increased.

Abstract

Techniques for providing an adaptive approach to prefetching data for sequential read streams in a storage system. The techniques can include performing prefetch operations for a sequential read stream in accordance with a prefetch distance and a prefetch size, counting or otherwise keeping track of occurrences of failure scenarios in the prefetch operations while servicing the sequential read stream, and modifying or adjusting one of the prefetch distance and the prefetch size based on the occurrences of the respective failure scenarios. In this way, host input/output (IO) latency can be reduced, and IO bandwidth can be increased, in the servicing of sequential read streams by the storage system.

SELECTIVE POWERING OF STORAGE DRIVE COMPONENTS IN A STORAGE NODE BASED ON SYSTEM PERFORMANCE LIMITS (17718719)

Main Inventor

Dan Aharoni


Brief explanation

The abstract describes techniques for selectively powering storage drive components in a storage node based on system performance limits. This involves determining the number of storage drive components needed to support a workload, taking into account the system performance limit determined using the performance limit of other components. The component performance limit is based on factors such as the expected number of input/output operations and bandwidth. Once the number of components is determined, power is applied to those specific components in the storage node.

Abstract

Techniques are provided for selective powering of storage drive components in a storage node based on system performance limits. One method comprises determining a number of storage drive components, of multiple storage drive components in a storage node, needed to support at least one workload of the storage node, wherein the determining is based at least in part on a number of storage drive components needed to support a system performance limit determined using a component performance limit of at least one other component of the storage node, wherein the component performance limit is based at least in part on one or more of an expected number of input/output operations of the storage node and an expected bandwidth of the storage node; and initiating an application of power to the determined number of storage drive components of the storage node.

DATA PROTECTION AGAINST MASS DELETION BASED ON DATA STORAGE PERIOD (17714855)

Main Inventor

Senthil Ponnuswamy


Brief explanation

This abstract describes a system and method for preventing mass deletion of data in a data storage system. The system works by first marking blocks of data to be deleted and then removing these marked blocks through a garbage collection operation. The system uses historical data on deletions and user-defined thresholds based on data age to detect any significant deviations that may indicate a potential danger. If a deletion exceeds a certain threshold, the next garbage collection operation is skipped, allowing the user to investigate the deletion command and restore data if necessary. Certain conditions, such as abnormal high deletion periods or new system installations, can override the delay in garbage collection.

Abstract

Embodiments of a system and method to prevent mass deletion of data in a data storage system. A data deletion operation comprises a delete operation marking blocks to be deleted followed by a garbage collection (GC) operation to remove marked blocks from storage media. Based on historical information regarding deletions per GC cycle and certain user-defined thresholds based on data age, the storage system can detect any significant deviations as potentially dangerous. If a deletion in excess of a deviation threshold is detected, the next GC operation is skipped to provide a delay period during which time the user can investigate the data delete command and restore data if necessary. De-risking conditions such as known abnormal high deletion periods or new system installation can be used to override any garbage collection delay.

REVERSIBLE WRITE TECHNIQUES USING PHYSICAL STORAGE DEVICE OFFLOADING (17715538)

Main Inventor

Vladimir Shveidel


Brief explanation

This abstract describes a system that uses solid-state drives (SSDs) for storage. The SSDs utilize internal log structured systems (LSSs) to manage data. The system can perform reversible write operations by writing new data to a specific logical address on the SSD. This operation updates the logical address to store the new data instead of the old data previously stored there. The old data is moved to a physical address on the SSD, and mapping information is used to indicate the logical address's mapping to the physical address. When a subsequent read operation occurs, the system can retrieve the old data using the retained mapping information.

Abstract

A system can use non-volatile solid state drives (SSDs) to provide storage. The SSDs can implement internal log structured systems (LSSs). A reversible write operation can be serviced by an SSD to write first data to an SSD logical address. The reversible write operation can update the SSD logical address to store the first data rather than old data stored at the SSD logical address prior to servicing the reversible write operation. The old data can be stored at an SSD physical address and mapping information indicates the SSD logical address is mapped to the SSD physical address. Servicing the reversible write operation can include: retaining the mapping information and the old data; and adding second mapping information that maps the SSD logical address to a second SSD physical address storing the first data. A subsequent read operation can read the old data using the retained mapping information.

HOST-BASED LOCALITY DETERMINATION FOR LOGICAL VOLUMES STORED ACROSS MULTIPLE NODES OF A DISTRIBUTED STORAGE SYSTEM (17716118)

Main Inventor

Igor Achkinazi


Brief explanation

This abstract describes an apparatus that can identify and determine the location of different parts of a storage system. It does this by sending commands to multiple storage nodes and receiving responses from them. Based on these responses, the apparatus stores information about the location of each part of the storage system.

Abstract

An apparatus includes at least one processing device configured to identify a logical storage volume stored across multiple storage nodes of a distributed storage system, and for each of a plurality of different portions of the logical storage volume, to send one or more locality determination commands to each of one or more of the storage nodes, a given such command requesting a corresponding one of the storage nodes to respond with an indication as to whether or not the portion of the logical storage volume is local to that storage node, and to receive from the one or more storage nodes responses to the one or more locality determination commands. The processing device is further configured to store locality information for the plurality of different portions of the logical storage volume based at least in part on the responses of the storage nodes to the locality determination commands.

COORDINATED BOOT SYNCHRONIZATION AND STARTUP OF INFORMATION HANDLING SYSTEM SUBSYSTEMS (17714824)

Main Inventor

Deepaganesh PAULRAJ


Brief explanation

This abstract describes an information handling system that includes a processor, a subsystem, and a management controller. The management controller is responsible for managing the system, even when it is not actively running. When the system is powered on, the management controller instructs the basic input/output system (BIOS) to pause its boot process before it starts recognizing the functions of the subsystem. Once the subsystem has finished booting up and its virtual functions have been initialized, the management controller tells the BIOS to resume the boot process and recognize all the functions of the subsystem, including the virtual functions.

Abstract

An information handling system may include a processor, a subsystem communicatively coupled to the processor, and a management controller communicatively coupled to the processor and the subsystem and configured for out-of-band management of the information handling system, the management controller further configured to, in response to an alternating current power cycle of the information handling system: cause a basic input/output system of the information handling system to pause its boot process prior to enumeration of functions of the subsystem; and upon completion of the boot process of the subsystem and initialization of virtual functions of the subsystem, cause the basic input/output system to unpause the boot process in order to enumerate the functions of the subsystem including the virtual functions.

DISCOVERY CONTROLLER-BASED NONVOLATILE MEMORY EXPRESS NAMESPACE RESOLUTION SERVICES (17714154)

Main Inventor

Claudio DESANTI


Brief explanation

The abstract states that currently there is no efficient way to locate a namespace on an NVMe-oF fabric. This means that it is difficult to find the storage subsystem where the boot namespace is located or to discover all available namespaces on the fabric. This can make booting in a SAN environment slow and computationally expensive. The abstract suggests that there are embodiments that support discovery through a discovery controller, which can help a host efficiently resolve a given namespace identifier to the corresponding subsystem port(s) through which that namespace is accessible.

Abstract

Currently, there is no scalable methodologies defined to locate a namespace on an NVMe-oF fabric. Therefore, it is necessary to configure a host with the NVMe™ Qualified Name (NQN) and transport information of the storage subsystem where the boot namespace is located or discover and enumerate all namespaces available to the host on an NVMe-oF fabric. With the current protocols, a host may need to perform many operations to locate the proper namespace and boot from the NVMe-oF fabric, making booting in a SAN environment an extremely slow operation and computationally expensive process. Embodiments herein support discovery, via a discovery controller, to provide a namespace resolution service able to facilitate a host to efficiently resolve a given namespace identifier to the corresponding subsystem port(s) through which that namespace is accessible.

HETEROGENEOUS COMPUTE DOMAINS WITH AN EMBEDDED OPERATING SYSTEM IN AN INFORMATION HANDLING SYSTEM (17716632)

Main Inventor

Shekar Babu Suryanarayana


Brief explanation

This abstract describes an information handling system that consists of various components such as a memory device, memory, chipset, and BIOS. The chipset includes two processors - a main processor and a hybrid processor. 

During the first pre-boot phase, the BIOS memory maps the hybrid processor to a specific part of the memory device and stores an embedded operating system in the memory.

In the second pre-boot phase, the BIOS memory maps the main processor to another part of the memory device, stores a host operating system in the memory, and loads the embedded operating system on the hybrid processor.

It is worth noting that the second portion of the memory device allocated for the main processor is larger than the first portion allocated for the hybrid processor.

Abstract

An information handling system includes a memory device, a memory, a chipset, and a basic input/output system (BIOS). The chipset includes a main processor and a hybrid processor. During a first pre-boot phase, the BIOS memory maps the hybrid processor to a first portion of the memory device, and stores an embedded operating system in the memory. During a second pre-boot phase, the BIOS memory maps the main processor to a second portion of the memory device, stores a host operating system in the memory, and loads the embedded operating system on the hybrid processor. The second portion is a larger portion of the memory device than the first portion.

MANAGEMENT CONTROLLER REQUESTS IN A UEFI PRE-BOOT ENVIRONMENT OF AN INFORMATION HANDLING SYSTEM (17716385)

Main Inventor

William C. Edwards III


Brief explanation

This abstract describes an information handling system that consists of a Unified Extensible Firmware Interface (UEFI) and a management controller. The management controller establishes a communication channel with the UEFI and provides a memory path for a driver needed to perform a specific operation in the UEFI. The UEFI then retrieves the requested driver from its memory using the provided memory path and loads it. The UEFI executes the loaded driver and reports the execution status back to the management controller.

Abstract

An information handling system includes a Unified Extensible Firmware Interface (UEFI) and a management controller. The management controller establishes a communication channel with the UEFI, and provides a memory path associated with a driver associated with an operation to be performed in the UEFI. Based on the memory path, the UEFI receives the requested driver from a memory associated with the UEFI, and loads the requested driver. The UEFI executes the loaded requested driver, and provides an execution status for executed driver to the management controller.

RELIABLE ONE-CLICK CLUSTER SHUTDOWN (17719154)

Main Inventor

Bo WANG


Brief explanation

This abstract describes an information handling system that is part of a cluster of multiple systems. The system receives a shutdown instruction from a user, indicating that the entire cluster should be powered down. Without any further input from the user, the system performs the following actions: 

1. It migrates any virtual machines (VMs) that are currently running on the cluster to a specific node within the cluster, which has been designated as the primary node. 2. It stores important data (metadata) at the primary node, which will be used to restore communication between the nodes once the shutdown is complete. 3. It powers down all the nodes in the cluster.

Abstract

An information handling system may include at least one processor and a memory. The information handling system may be a node of an information handling system cluster that comprises a plurality of nodes, and the information handling system is configured to: receive a shutdown instruction from a user, the shutdown instruction indicating that the cluster is to be powered down; and without further user input: cause virtual machines (VMs) that are executing on the cluster to be migrated to a particular node of the cluster that has been designated as a primary node; store metadata at the primary node, the metadata being usable to reestablish communication among the nodes after the shutdown; and cause the plurality of nodes to power down.

STORAGE DEVICE RAID DATA WRITE INTERMEDIATE PARITY SYSTEM (17716204)

Main Inventor

Girish Desai


Brief explanation

The abstract describes a storage device system that uses RAID technology to write data. It consists of a storage subsystem and a volatile memory system. When the system receives data from a host, it first stores it in the volatile memory. Then, it stores a portion of the data in the storage system and generates parity data based on that portion. The parity data is also stored in the volatile memory. Finally, the system erases the portion of the data from the volatile memory.

Abstract

A storage device RAID data write intermediate parity system includes a storage device coupled to a host system and including a storage subsystem and a volatile memory system. The storage device RAID data write intermediate parity system receives first primary data from the host system, and stores the first primary data in the volatile memory system. The storage device RAID data write intermediate parity system then stores a first subset of the first primary data in the storage system, generates first intermediate parity data using the first subset of the first primary data, stores the first intermediate parity data in the volatile memory system and, in response, erases the first subset of the first primary data from the volatile memory system.

OPTIMIZED CLIENT-SIDE DEDUPLICATION (18327290)

Main Inventor

Jehuda Shemer


Brief explanation

The abstract describes a method for improving client-side deduplication during the backup process. The method involves determining a cadence (frequency) and a change log resolution (level of detail) for backing up a client's data. These values are then evaluated against certain thresholds. If any of the thresholds are met, client-side deduplication is enabled, otherwise it is disabled.

Abstract

One example method includes optimizing client-side deduplication. When backing up a client, a cadence and a change log resolution are determined. These values are evaluated alone or in combination with respect to various thresholds. Client-side deduplication is enabled or disabled based on whether any one or more of the thresholds are satisfied.

STORAGE HOST RETIREMENT AND ROLLBACK (17714211)

Main Inventor

Timothy O'Connor


Brief explanation

Rollback snapshots are created by a storage system when host servers are no longer in use. These snapshots contain information about the storage objects and masking views associated with the retired servers. By using these rollback snapshots, it is possible to recover the retired servers by reconstructing the masking views and recreating the storage objects. In simpler terms, rollback snapshots help in restoring retired host servers by preserving their configurations and associated storage data.

Abstract

Rollback snapshots are created by a storage system when host servers are retired. The rollback snapshots include a masking views and information about the storage objects associated with the host servers. Retired host servers can be recovered by using the rollback snapshots to reconstruct masking views and recreate storage objects.

CACHING TECHNIQUES (17715459)

Main Inventor

Ashok Tamilarasan


Brief explanation

The abstract describes a data storage system that uses a deduplicated data cache to store unique data portions. These data portions are promoted to the cache when servicing input/output (I/O) operations. When reading or writing data to a specific address, the system checks if the data portion stored at that address meets certain criteria for promotion to the cache. These criteria can include being a duplicate of content stored at multiple addresses and having a reference count above a minimum threshold, which indicates how many addresses the data portion is stored at. If the criteria are met, the data portion is stored in the deduplicated data cache.

Abstract

A data storage system can include a deduplicated data cache used to store unique deduplicated data portions. Data portions can be promoted to the deduplicated data cache in connection with servicing I/O operations. Servicing the I/O operation that reads data from, or writes data to, a logical address can include determining whether a data portion stored at the logical address meets criteria for promoting the data portion to a deduplicated data cache. The criteria can include a condition that the data portion is a duplicate of content stored at multiple logical addresses, and can include a condition that the data portion has a reference count that is at least a minimum threshold where the reference count denotes a number of logical addresses at which the data portion is stored. Responsive to determining the data portion meets the criteria, the data portion can be stored in the deduplicated data cache.

HYPERPARAMETER OPTIMIZATION IN FILE COMPRESSION USING SEQUENCE ALIGNMENT (17658930)

Main Inventor

Ofir Ezrielev


Brief explanation

The abstract describes a method for compressing files. The process involves aligning the input file and setting certain parameters to achieve desired performance. The aligned file is split into sequences, resulting in a compression matrix. A consensus sequence is determined from the compression matrix, and pointer pairs are generated using the consensus sequence. These pointer pairs, along with the consensus sequence, make up the compressed file.

Abstract

Compressing files is disclosed. An input file to be compressed is first aligned. During or prior to aligning the input file, hyperparameters are set, determined, or configured. The hyperparameters may be set, determined, or configured to achieve a particular performance characteristic. Aligning the file includes splitting the file into sequences that can be aligned. The result is a compression matrix, where each row of the matrix corresponds to part of the file. A consensus sequence id determined from the compression matrix. Using the consensus sequence, pointer pairs are generated. Each pointer pair identifies a subsequence of the consensus matrix. The compressed file includes the pointer pairs and the consensus sequence.

WARM START FILE COMPRESSION USING SEQUENCE ALIGNMENT (17658932)

Main Inventor

Ofir Ezrielev


Brief explanation

The abstract describes a method for compressing files. The process involves aligning the input file by splitting it into smaller sequences. This alignment creates a compression matrix, where each row represents a part of the file. This compression matrix can also be used as a starting point for further compression. The compression can be done in multiple stages, with larger letter sizes used in the first stage and smaller letter sizes used in the second stage. A consensus sequence is determined from the compression matrix, and pointer pairs are generated based on this consensus sequence. Each pointer pair identifies a subsection of the consensus matrix. The final compressed file includes these pointer pairs and the consensus sequence.

Abstract

Compressing files is disclosed. An input file to be compressed is first aligned. Aligning the file includes splitting the file into sequences that can be aligned. The result is a compression matrix, where each row of the matrix corresponds to part of the file. The compression matrix may also serve as a warm start if additional compression is desired. Compression may be performed in stages, where an initial compression matrix is generated in a first stage using larger letter sizes for alignment and then a second compression stage is performed using smaller letter sizes. A consensus sequence id determined from the compression matrix. Using the consensus sequence, pointer pairs are generated. Each pointer pair identifies a subsequence of the consensus matrix. The compressed file includes the pointer pairs and the consensus sequence.

COMPRESSING MULTIPLE DIMENSION FILES USING SEQUENCE ALIGNMENT (17658936)

Main Inventor

Ofir Ezrielev


Brief explanation

The abstract describes a method for compressing files. The process involves aligning the input file along its multiple axes or dimensions. This alignment is done by splitting the file into smaller sequences that can be aligned along each axis. This alignment generates a compression tensor, which represents different parts of the file. From this compression tensor, a consensus tensor is determined. Using the consensus tensor, pointer lists are created, which identify specific portions of the consensus tensor. The final compressed file includes these pointer lists and the consensus tensor.

Abstract

Compressing files is disclosed. An input file to be compressed is first aligned. When the file has multiple axes or dimensions, the file is aligned along each of the axes. Aligning the file includes splitting the file into sequences that can be aligned along each of the axes or dimensions. Aligning the file generates a compression tensor, where each row or dimensional space of the compression tensor corresponds to part of the file. A consensus tensor is determined from the compression tensor. Using the consensus tensor, pointer lists are generated. Each pointer lists identifies a subsequence or portion of the consensus tensor. The compressed file includes the pointer lists and the consensus tensor.

ARTIFICIAL INTELLIGENCE-BASED TECHNIQUES FOR AUTOMATED VISUAL DATA SEARCHING USING EDGE DEVICES (17718803)

Main Inventor

Min Gong


Brief explanation

This abstract describes a technology that uses artificial intelligence to automate visual data searching on edge devices. It involves obtaining visual data from these devices, processing the data using AI techniques to create automated searching tools, deploying these tools to the devices, and performing automated actions based on the data received from the devices.

Abstract

Methods, apparatus, and processor-readable storage media for artificial intelligence-based techniques for automated visual data searching using edge devices are provided herein. An example computer-implemented method includes obtaining visual data from one or more edge devices; generating at least one automated searching tool by processing at least a portion of the obtained data using one or more artificial intelligence techniques; deploying the at least one automated searching tool to at least a portion of the one or more edge devices; and performing one or more automated actions based at least in part on data received, from at least a portion of the one or more edge devices, in connection with operation of the at least one automated searching tool.

BLOCK-BASED PROTECTION FROM RANSOMWARE (18303108)

Main Inventor

Philippe Armangau


Brief explanation

The abstract describes a method to protect data from ransomware attacks. It involves identifying a specific set of blocks of data that were written between two specific points in time. The method then analyzes the attributes of these blocks and determines if there is a high chance of a ransomware attack. If such an attack is likely, the method secures the data object to its state as of the first point in time, effectively preventing any potential damage caused by the attack.

Abstract

A technique of protecting data from ransomware attacks identifies a set of blocks written to a data object between first and second points in time, determines a set of attributes of the set of blocks, and, in response to the set of attributes indicating a likelihood of a ransomware attack, secures a state of the data object as of the first point in time.

SECURE WIPE OF DATA PROCESSING UNIT USING FIRMWARE CAPSULE (17714324)

Main Inventor

Deepaganesh PAULRAJ


Brief explanation

This abstract describes an information handling system that includes a processor, a data processing unit, and a management controller. The management controller is responsible for managing the system and can perform tasks outside of the normal operation of the system. In this case, the management controller obtains information about the hardware and capabilities of the data processing unit. Based on this information, it generates a firmware capsule that can be executed during the system's startup phase to securely erase the contents of the memory. The management controller then communicates this firmware capsule to the data processing unit during its normal operating phase and causes the unit to reboot into its startup phase to execute the firmware and securely erase the memory.

Abstract

An information handling system may include a processor, a data processing unit communicatively coupled to the processor, and a management controller communicatively coupled to the processor and the data processing unit and configured for out-of-band management of the information handling system. The management controller may further be configured to obtain a hardware inventory and capabilities of the data processing unit; based on the hardware inventory and capabilities, generate a firmware capsule for execution during a basic input/output system phase of the data processing unit to cause a secure erasure of contents of a memory of the data processing unit; and communicate the firmware capsule to the data processing unit during an operating system phase of the data processing unit and cause the data processing unit to reboot to its basic input/output system phase in order to execute drivers of the firmware capsule in order to securely erase the memory.

FAST IDENTITY ONLINE (FIDO) DEVICE ONBOARDING (FDO) PROTOCOL COMPUTING DEVICE HARDWARE ATTESTATION SYSTEM (17717820)

Main Inventor

Anurag Sharma


Brief explanation

The abstract describes a system that manages ownership vouchers for computing devices. It receives an ownership voucher and a hardware attestation certificate from the manufacturer, and stores them in a database. When the system decides to transfer ownership to an end user, it generates a second ownership transfer data by signing the end user's public key with its private key. This data is then added to the ownership voucher to transfer ownership to the end user. The ownership voucher and the hardware attestation certificate are provided to the end user.

Abstract

A voucher management system receives, from a computing device manufacturer system, an ownership voucher that transfers ownership of a computing device from the computing device manufacturer system to the voucher management system, and a hardware attestation certificate for the computing device, and associates them with the computing device in a voucher management database. When the voucher management system determines that the ownership of the computing device should be transferred to an end user system, it automatically generates second ownership transfer data by signing an end user system public key with a voucher management system private key, provides the second ownership transfer data in the ownership voucher in order to transfer ownership of the computing device from the voucher management system to the end user system, and provides the ownership voucher and the hardware attestation certificate to the end user system.

INTEGRATED THERMAL-ELECTRICAL CO-SIMULATION (17716527)

Main Inventor

Vijender Kumar


Brief explanation

This abstract describes an information handling system that consists of a memory device and a processor. The memory device stores two types of data: the first data represents the thermal profile (temperature distribution) of a motherboard, and the second data represents a circuit trace on the motherboard. A circuit trace is a high-speed data connection between different circuit devices on the motherboard. 

The processor in the system uses the first and second data to determine the average temperature of the circuit trace on the motherboard. It then uses this average temperature to create a model or layout for the circuit trace on the motherboard. In other words, the processor designs the placement of the circuit trace based on its average temperature to ensure optimal performance and prevent overheating.

Abstract

An information handling system includes a memory device and a processor. The memory device includes first data representing a thermal profile of a motherboard, and second data representing a circuit trace of the motherboard. The circuit trace provides a high-speed data interconnection between two or more circuit devices. The processor determines an average temperature of the circuit trace on the motherboard based upon the first data and the second data, and models a trace layout for the circuit trace on the motherboard based upon the average temperature.

BUNDLED AND CUSTOMIZABLE DOCUMENTATION-VIEWER FOR APPLICATION FOR INCREASED ASCCESSIBLITY (17718464)

Main Inventor

Jason Bassford


Brief explanation

The abstract describes a system that includes methods, a system, and a storage medium for a content viewer. The system is capable of receiving a request for content and rendering that content in a graphical user interface. The content viewer contains both the content and the interface for viewing it.

Abstract

Methods, system, and non-transitory processor-readable storage medium for content viewer system are provided herein. An example method includes receiving a content viewer in which to render content in response to a request to receive the content. The content viewer comprises the content and a graphical user interface and rendering the content in the content viewer.

FAST IDENTITY ONLINE (FIDO) DEVICE ONBOARDING (FDO) PROTOCOL OWNERSHIP VOUCHER MANAGEMENT SYSTEM (17717321)

Main Inventor

Anurag Sharma


Brief explanation

The abstract describes a networked system that involves two owner systems and a voucher management system. The first owner system sends an ownership voucher to the voucher management system, which includes data for transferring ownership of a computing device from the first owner system to the voucher management system. The voucher management system then determines that the ownership of the computing device should be transferred to the second owner system. In response, it generates new ownership transfer data by signing the second owner system's public key with its own private key. This new data is included in the ownership voucher to transfer ownership of the computing device from the voucher management system to the second owner system.

Abstract

A networked system includes a first owner system and a second owner system coupled to a voucher management system. The voucher management system receives, from the first owner system, an ownership voucher having first ownership transfer data including a voucher management system public key that has been signed by a first owner system private key in order to transfer ownership of a computing device from the first owner system to the voucher management system. The voucher management system determines that the ownership of the computing device should be transferred to the second owner system and, in response, automatically generates second ownership transfer data by signing a second owner system public key with a voucher management system private key, and provides the second ownership transfer data in the ownership voucher in order to transfer ownership of the computing device from the voucher management system to the second owner system.

FAST IDENTITY ONLINE (FIDO) DEVICE ONBOARDING (FDO) PROTOCOL COMPUTING DEVICE ORDERING/MANUFACTURING SYSTEM (17717496)

Main Inventor

Muzhar S. Khokhar


Brief explanation

The abstract describes a system used by a computing device manufacturer to order and manufacture devices. The system includes a voucher management system that manages ownership transfers. When a computing device is ordered, the manufacturer includes information about a rendezvous system in the device. The manufacturer also uses its private key to sign the voucher management system's public key, creating ownership transfer data. This data is then provided in an ownership voucher to transfer ownership of the device from the manufacturer to the voucher management system.

Abstract

A FDO protocol computing device ordering/manufacturing system includes a computing device manufacturer system coupled to a voucher management system. The computing device manufacturer system identifies, as part of an ordering process for a computing device being ordered by a subsequent owner, rendezvous system reachability information for a rendezvous system. The computing device manufacturer system provides the rendezvous system reachability information in the computing device prior to its transfer to the subsequent owner. The computing device provisioning subsystem retrieves a voucher management system public key from the voucher management system, uses a computing device manufacturer private key to sign the voucher management system public key to generate first ownership transfer data, provides the first ownership transfer data in an ownership voucher in order to transfer ownership of the computing device from the computing device manufacturer system to the voucher management system, and provides the ownership voucher to the voucher management system.

TEMPERATURE-ACCELERATED SOLID-STATE STORAGE TESTING METHODS (17716069)

Main Inventor

Samuel Hudson


Brief explanation

This abstract describes a method for testing the performance and reliability of a solid-state storage system. The method involves writing data to the storage system and subjecting it to a higher temperature for a shorter period of time, which simulates the effects of operating at a lower temperature for a longer period of time. The data is then read from the storage system at a different temperature to generate test data. Based on the results of the first test, the storage system is subjected to the higher temperature for a reduced time period, equivalent to operating at a different temperature for a longer period of time. The data is then read again to generate a second set of test data. This method allows for accelerated testing of the storage system's performance and reliability under different temperature conditions.

Abstract

A temperature-accelerated solid-state storage testing method includes writing data to a storage system and subjecting the storage system to a first temperature range for a first time period that is equivalent to operation at a lower/second temperature for a greater/second time period. Subsequently, the data from the storage system is read within a third time period at a third temperature range to generate first test data. The storage system is then subjected to the first temperature range for a fourth time period that was reduced relative to the first time period based on the reading of the data to generate the first test data causing the operation of storage system to be equivalent to operating at the second temperature range for a fifth time period. Subsequently the data from the storage system is read within the third time period at the third temperature range to generate second test data.

BATTERY STATE OF HEALTH CALIBRATION SYSTEM (17715846)

Main Inventor

Lawrence Ho


Brief explanation

The abstract describes a battery management system that monitors the maximum error of a battery. If the maximum error exceeds a certain threshold, the system checks if the battery is fully charged. If it is, the system then discharges the battery using a reserve capacity.

Abstract

A battery management system determines whether a maximum error of a battery is greater than a threshold, and in response to a determination that the maximum error is greater than the threshold, determines whether the battery is fully charged. In response to a determination that the battery is fully charged, the system discharges the battery based on a reserve capacity.

DYNAMIC CRYPTOGRAPHIC KEY MANAGEMENT FOR HANDLING KEY COMPROMISES IN CACHED DATA AND METADATA (17714954)

Main Inventor

Niharika Avasarala


Brief explanation

This abstract describes a system for managing cryptographic keys for cached data. When a request is made to access a data block that is encrypted with a compromised encryption key, the system identifies the compromised key and removes the corresponding data block from the cache. The system then re-encrypts the data block with a new encryption key when a new request is received. Any other data blocks that are still encrypted with the compromised key are also removed from the cache according to a defined policy.

Abstract

Embodiments of a cryptographic key management system for cached data that efficiently re-encrypts cached data encrypted with a compromised encryption key by receiving a request to access a cached data block encrypted with an original encryption key. Upon determining that the original encryption key is compromised or destroyed, thus resulting in the requested data block being invalid, evicting the requested data block from the cache storing the cached data. The data block is re-encrypted using a new encryption key upon receipt of a new request to access the cached data. Any remaining cached data encrypted with the original encryption key is evicted from the cache through a defined cache eviction policy.

Return-To-Site Tool Upholding Distance via Physical and Logical Indicators (17718482)

Main Inventor

Yevgeni Gehtman


Brief explanation

The abstract describes a location verification system that verifies the access to a network based on the distance between two computerized devices. It explains that the system detects an attempt to access the network from a device at a specific physical location and determines the access status by checking if the device meets a certain distance requirement from another device.

Abstract

Methods, system, and non-transitory processor-readable storage medium for a location verification system are provided herein. An example method includes detecting an attempt to access a network from a computerized device located at a physical location. The location verification system determines access status based on a distance requirement between the computerized device and another computerized device.

NETWORK ORCHESTRATION FOR DEVICE MANAGEMENT OPERATIONS (17714595)

Main Inventor

Parminder Singh Sethi


Brief explanation

This abstract describes a method that involves receiving data from a device over a network and analyzing the data to determine how it should be transmitted to a computing site. The method then determines a different network to be used for transmitting the data based on certain parameters. The data is then configured for transmission over the chosen network and sent to that network for transmission to the computing site.

Abstract

A method comprises receiving data from a device over at least a first network and analyzing the data to identify one or more parameters for transmission of the data to a computing site. Based, at least in part, on the one or more parameters, at least a second network to be utilized for transmission of the data to the computing site is determined, wherein the second network is different from the first network. In the method, the data is configured for transmission over at least the second network, and is sent to at least the second network for transmission to the computing site.

USER EQUIPMENT DEVICE INTEGRITY PROTECTION IN A DATA COMMUNICATION NETWORK (18194626)

Main Inventor

Rowland Newman Shaw


Brief explanation

This abstract describes a data communication network that consists of a data communication node and an imaging device. The data communication node establishes a connection with a user equipment device and provides beamforming information for that connection. The imaging device captures image information for the coverage area of the data communication node. 

The network then uses the image information to create a 3D map of the coverage area. It also authenticates the user equipment device and determines its location within the 3D map by using the beamforming information and the image information. Finally, it verifies the identity of the user equipment device based on this location correlation.

Abstract

A data communication network includes a data communication node and an imaging device. The data communication node establishes a data connection with a user equipment device and provides beamforming information for the data connection. The imaging device provides image information for a coverage area of the data communication node. The network synthesizes a 3D map of the coverage area based upon the image information, authenticates the user equipment device, correlates a location of the user equipment device within the 3D map based upon the beamforming information for the data connection and upon the image information, and attests to an identity of the user equipment device based upon the correlation of the location.

INTRUSION DETECTION APPARATUS FOR AN INFORMATION HANDLING SYSTEM (17658162)

Main Inventor

Chun-Che Wang


Brief explanation

The abstract describes an intrusion detection apparatus that is used in an information handling system. The apparatus consists of a printed circuit board (PCB) with an electrical switch. The switch has conductive pads on the top layer of the PCB and a conductive ground ring surrounding the pads. There is also a mechanical pin that is connected to a part of the system's chassis. The pin has a conductive gasket at one end. When a foreign conductive object comes into contact with the ground ring, it triggers an intrusion signal to indicate the presence of the object.

Abstract

An intrusion detection apparatus, including: a printed circuit board (PCB), including: an electrical switch, the electrical switch including: conductive pads positioned on a top layer of the PCB, and a conductive ground ring positioned on the top layer and surrounding the conductive pads; and a mechanical pin coupled to a first portion of a chassis of the information handling system at a first end of the mechanical pin, the mechanical pin including a conductive gasket positioned at a second end of the mechanical pin, the first end opposite to the second end, wherein the ground ring provides an intrusion signal when a foreign conductive object is in contact with the ground ring to indicate a presence of the foreign conductive object.

TEAR-DROP SHAPED HDD CARRIER EMI FINGER (17717355)

Main Inventor

Yu-Lin Chen


Brief explanation

The abstract describes a carrier assembly that is used to mount equipment into a carrier slot. The assembly includes an electro-magnetic interference (EMI) shield, which protects the equipment from EMI. The EMI shield is formed in one plane of the assembly. There is also an EMI finger that protrudes from the EMI shield and is connected to it. The EMI finger is formed in a second plane that is perpendicular to the first plane. When the carrier assembly is installed into the carrier slot, the EMI finger couples the EMI shield to the slot. The EMI finger has a tear-drop shape when viewed from a specific direction.

Abstract

A carrier assembly for mounting equipment into a carrier slot includes an electro-magnetic interference (EMI) shield and an EMI finger. The EMI shield protects the mounted equipment from EMI. The EMI shield is formed in a first plane of the carrier assembly. The EMI finger protrudes from the EMI shield and is coupled to the EMI shield. The EMI finger is formed in a second plane perpendicular to the first plane. The EMI finger operates, when the carrier assembly is installed into the carrier slot, to couple the EMI shield to the carrier slot. The EMI finger, when viewed from a first direction that is perpendicular to both the first plane and the second plane, is formed in a tear-drop shape.