Bengaluru, India

Sushma Basavarajaiah


Average Co-Inventor Count = 3.7

ph-index = 3

Forward Citations = 27(Granted Patents)


Location History:

  • Tumkur, IN (2015 - 2018)
  • Sanjaynagar, IN (2021)
  • Karnataka, IN (2017 - 2022)
  • Bengaluru, IN (2016 - 2023)

Company Filing History:


Years Active: 2015-2023

Loading Chart...
22 patents (USPTO):Explore Patents

Sushma Basavarajaiah: A Pioneer in Security Technology

Sushma Basavarajaiah is a renowned inventor and patent holder in the field of security technology. With her notable contributions, she has marked her name in the list of inventors with 22 patents in her tally. Currently, she is located in Bengaluru, India, and is employed by Dell Technologies.

Her patents are an epitome of her zeal and innovative thinking, as they are all related to securing digital environments. Among her recent patents, the Security Profiling of System Firmware and Applications from an OOB Appliance at a Differentiated Trust Boundary and Redundant Device Locking Key Management System stand out in particular.

The Security Profiling of System Firmware and Applications from an OOB Appliance at a Differentiated Trust Boundary is a revolutionary system that detects security vulnerabilities in firmware updates. The system creates a firmware security profiling environment with a trusted host and a trusted service processor, which identifies the security vulnerabilities within the firmware update file. This is then installed to the information handling system only when there is no security vulnerability detected by the trusted service processor, with the installing being performed by the trusted host. This system solves a critical problem and provides better security controls in firmware updates.

Another patent, Redundant Device Locking Key Management System, is a smart device management system that enhances the security of devices through a network. This system includes a key management system coupled to a plurality of server devices, where it receives a device locking key from the key management system and uses it to lock the managed device. Even if the first remote access controller device is unable to retrieve the encrypted device locking key from the second remote access controller device, this system ensures device safety by encrypting the device locking key. It broadcasts the encrypted device locking key through the network to every device part of the system.

Sushma Basavarajaiah work at Dell Technologies, collaborating with coworkers such as Chitrak Gupta and Rama Rao Bisa, showcases her ability to work in a team, and explore new technologies to bolster security paradigms. It's pioneers like her that inspire the upcoming generation of inventors and change-makers, and make our digital world more secure.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…