Patents by Inventor Daryl Cromer

Daryl Cromer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080244254
    Abstract: A mobile device, such as a laptop or notebook computer, capable of booting from at least two environments. If a remote environment is present, the mobile device may boot from the remote environment. The mobile device may also boot from the local environment.
    Type: Application
    Filed: March 30, 2007
    Publication date: October 2, 2008
    Applicant: Lenovo (Singapore) Pte. Ltd
    Inventors: Daryl Cromer, Richard W. Cheston, Howard Locker, Randall S. Springfield
  • Patent number: 7425810
    Abstract: Arrangements and methods for implementing a “spin-down policy” for HDD motors that is “smart”, flexible and admirably achieves an objective of ensuring prolonged motor life as just discussed. To this end, one specific implementation involves (among other things) the addition of a dedicated cache that acts as a buffer element of sorts for writing or obtaining data during a period when a motor may be spun down, especially (but not necessarily exclusively) in instances when a notebook needs to be running for a large portion of the day. Other analogous implementations are of course possible that would achieve similar ends.
    Type: Grant
    Filed: June 30, 2006
    Date of Patent: September 16, 2008
    Assignee: Lenovo (Singapore) Pte., Ltd.
    Inventors: Jeffrey R. Hobbet, Daryl Cromer, Donald R. Frame, Masahiko Nagai, Tin-Lup Wong
  • Publication number: 20080189469
    Abstract: Systems and methods for managing adjacent track interference in a hard drive. An adjacent track interference potential is ascertained in a region of the hard drive, and data corruption is averted via scrubbing data in the region with ascertained adjacent track interference potential, wherein limits of this region are defined.
    Type: Application
    Filed: February 7, 2007
    Publication date: August 7, 2008
    Inventors: Michael S. Mettler, Daryl Cromer, Matthew B. Griffith, Jeffrey R. Hobbet, Scott D. Ruppert
  • Publication number: 20080162805
    Abstract: A method for using non-addressable memory of a computer system is disclosed. Any system memory above an addressable memory limit of a computer system (i.e., non-addressable memory) is initially converted to a disk cache by a hypervisor. In response to a read request, the hypervisor intercepts the read request, and then sends the data for the read request from the disk cache to a read requestor if the data for the read request is available in the disk cache. In response to a write request, the hypervisor intercepts the write request, and then writes the data for the write request to the disk cache and updating corresponding disk cache tables.
    Type: Application
    Filed: January 3, 2007
    Publication date: July 3, 2008
    Inventors: Randall S. Springfield, Daryl Cromer, Howard Locker, Rod D. Waltermann
  • Publication number: 20080148389
    Abstract: A method for providing centralized user authorization to allow secure sign-on to a computer system is disclosed. In response to a user attempting to boot up a computer system, a message is sent to a trusted server by a hypervisor within the computer to request a new hard drive password for the computer system. If the user is not authorized to access the computer system, a packet is sent by the trusted server to instruct the hypervisor to stop any boot process on the computer system. If the user is authorized to access the computer system, a packet containing a partial hard drive password is sent by the trusted server to the computer system. The packet is then encrypted with a system public key by the computer system to yield the partial hard drive password. The computer system subsequently combines the partial hard drive password with a user password to generate a new complete hard drive password to continue with the boot process.
    Type: Application
    Filed: December 18, 2006
    Publication date: June 19, 2008
    Inventors: Howard Locker, Daryl Cromer, Randall S. Springfield, Rod D. Waltermann
  • Publication number: 20080140575
    Abstract: An apparatus, system, and method are disclosed for securely authorizing changes to a transaction restriction. A security module securely stores encryption keys for a payment instrument. The payment instrument electronically transacts payments and includes a transaction restriction. An authentication module receives an authentication from a user of the payment instrument. The security module validates the authentication with a first encryption key. In addition, the security module authorizes a change to the transaction restriction using a second encryption key if the authentication is valid. The security module resides on a computer that the user designates as authorized to validate the authentication.
    Type: Application
    Filed: December 12, 2006
    Publication date: June 12, 2008
    Inventors: Stacy John Cannady, David Carroll Challener, Daryl Cromer, Mark Charles Davis, David Rivera, Randall Scott Springfield, Rod D. Waltermann
  • Patent number: 7384001
    Abstract: A device that requires a regulatory label includes a label affixed to a surface of the device and a marking mechanism in the device that detects a configuration setting associated with the device and alters a portion of the label based on the configuration setting such that the label indicates information related to the configuration setting of the device.
    Type: Grant
    Filed: May 24, 2005
    Date of Patent: June 10, 2008
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: Daryl Cromer Carvis, Philip John Jakes, Raymond Gary Octaviano, II, Howard Jeffrey Locker
  • Publication number: 20080130154
    Abstract: Systems and methods for managing adjacent track interference in a hard drive. Adjacent track interference potential is ascertained in at least one track, and data corruption is averted via scrubbing data in at least one track with ascertained adjacent track interference potential.
    Type: Application
    Filed: November 30, 2006
    Publication date: June 5, 2008
    Inventors: Michael S. Mettler, Daryl Cromer, Matthew B. Griffith, Jeffrey R. Hobbet, Scott D. Ruppert
  • Publication number: 20080127309
    Abstract: A system and method for using a client-side hypervisor in conjunction with a secure network-side monitoring mechanism to detect removable media insertions since a client's last network session with the secure network is presented. The hypervisor uses a “client-side insertion value” to track the number of times that a user inserts removable media into a socket located on the client. When the client is connected to the secure network, the client's hypervisor notifies the secure network of each insertion and the secure network increments a “secure network-side tracker value.” For each login request, the client includes the client-side insertion value, which the secure network compares against its secure network-side tracker value. When the two values are different, the secure network sends an action request to the client, such as a request to perform a full system scan.
    Type: Application
    Filed: November 29, 2006
    Publication date: May 29, 2008
    Inventors: David Carroll Challener, Daryl Cromer, Howard Jeffrey Locker, Randall Scott Springfield
  • Publication number: 20080080433
    Abstract: Communications are provided for wide-channel and narrow-channel wireless devices within a common area over a number of channels within a common radio frequency band. Since communications using a wide-channel wireless signal interfere with at least two channels over which communications using narrow-channel wireless signals can occur, wide-channel communications are established only when it is determined that a wide-channel wireless device is present within the common area.
    Type: Application
    Filed: September 28, 2006
    Publication date: April 3, 2008
    Inventors: Daryl Cromer, Philip John Jakes, Howard Jeffrey Locker, Raymond Gary Octaviano
  • Publication number: 20080077420
    Abstract: A system, method, and program product is provided that manages a rental computer system by verifying installation of a secure time-day module in a computer system. The computer system is rendered inoperable if the secure time-day module is not installed. A current time-day value is retrieved from the secure time-day module and an end time-day value is retrieved from a secure storage area. The current time-day value is compared to the end time-day value in order to determine whether a rental period has expired. If the rental period has expired, then the user is prevented from using the rental computer system.
    Type: Application
    Filed: December 18, 2006
    Publication date: March 27, 2008
    Inventors: Daryl Cromer, Howard Jeffrey Locker, Randall Scott Springfield, Rod D. Waltermann
  • Publication number: 20080077785
    Abstract: A method for preventing unauthorized modifications to a rental computer system is disclosed. During boot up of the rental computer system, a determination is made whether or not a time-day card is bound to the rental computer system. If the time-day card is bound to the rental computer system, another determination is made whether or not a time/date value on the time-day card is less than a secure time/date value stored in a secure storage location during the most recent power down. If the time/date value on the time-day card is not less than the secure time/date value, yet another determination is made whether or not the time/date value is less than an end time/date rental value. If the time/date value is less than the end time/date rental value, the rental computer system continues to boot.
    Type: Application
    Filed: September 27, 2006
    Publication date: March 27, 2008
    Inventors: Rod D. Waltermann, Daryl Cromer, Howard J. Locker, Randall S. Springfield
  • Publication number: 20080042618
    Abstract: In the context of a notebook computer, multiple battery safety measures in the computer, battery pack, and individual battery cells. These battery packs include industry standard safety mechanisms as well as additional safeguards designed to increase safety. The additional safeguards can be categorized in the following ways. The first safeguard deals with multiple, independent levels of battery monitoring. The second safeguard employs abnormal condition detection methods. The third safeguard deals with improvements to mechanical and thermal design.
    Type: Application
    Filed: August 15, 2007
    Publication date: February 21, 2008
    Applicant: Lenovo (Singapore) Pte., Ltd.
    Inventors: Daryl Cromer, Anthony Corkell, Seita Horikoshi, Takeshi Matsumoto, Shigefumi Odaohhara, Tin-Lup Wong
  • Publication number: 20080046998
    Abstract: A hard disk drive unit includes a microprocessor programmed to erase data stored within the drive unit if it is determined that a process potentially leading to a misuse of the data stored within the drive unit, and if secure disposal configuration data stored in nonvolatile storage within the drive indicates that the data is to be erased. Such a process includes initializing the drive unit for operation without providing a password matching a password stored in the drive unit, initializing the drive unit in a system not having CMOS configuration data matching the drive unit, and determining that a failure rate within the drive unit exceeds a threshold level.
    Type: Application
    Filed: July 27, 2006
    Publication date: February 21, 2008
    Inventors: Daryl Cromer, Howard Jeffrey Locker, Randall S. Springfield, Rod D. Waltermann
  • Publication number: 20080019334
    Abstract: A method, apparatus and computer-usable medium for minimizing in-band noise in a WLAN network is presented. The method includes the steps of detecting, at a first wireless device that communicates with a Wireless Local Area Network (WLAN) via a first access point, a signal interference that is caused by a second wireless device that communicates with the WLAN via a second access point, wherein the first and second access points communicate with their respective first and second wireless devices via a same channel; and minimizing the signal interference by sending an instruction to the second wireless device to switch to a third access point, wherein the third access point uses a different channel than the channel that is used by the first and second access points.
    Type: Application
    Filed: July 24, 2006
    Publication date: January 24, 2008
    Inventors: Stewart Lane Adams, Daryl Cromer, Philip John Jakes, Howard Jeffrey Locker, Raymond Gary Octaviano
  • Publication number: 20080002643
    Abstract: An arrangement facilitating the connection of a client to a network through an access point, particularly in an area with overlapping 0.11n channels. Preferably, a client may communicate with two access points and “ask” one of them to stop transmitting long enough so as to facilitate communication with the other access point. Current specifications otherwise provide no workable arrangement for handling overlapping channels.
    Type: Application
    Filed: June 30, 2006
    Publication date: January 3, 2008
    Applicant: Lenovo (Singapore) Pte. Ltd.
    Inventors: Raymond G. Octaviano, Daryl Cromer, Philip John Jakes, Howard Jeffrey Locker
  • Publication number: 20080001562
    Abstract: Arrangements and methods for implementing a “spin-down policy” for HDD motors that is “smart”, flexible and admirably achieves an objective of ensuring prolonged motor life as just discussed. To this end, one specific implementation involves (among other things) the addition of a dedicated cache that acts as a buffer element of sorts for writing or obtaining data during a period when a motor may be spun down, especially (but not necessarily exclusively) in instances when a notebook needs to be running for a large portion of the day. Other analogous implementations are of course possible that would achieve similar ends.
    Type: Application
    Filed: June 30, 2006
    Publication date: January 3, 2008
    Inventors: Jeffrey R. Hobbet, Daryl Cromer, Donald R. Frame, Masahiko Nagai, Tin-Lup Wong
  • Publication number: 20070294421
    Abstract: This present invention relates to a method for using hypervisors to enable stable wireless network connections. The crux of the invention involves pushing the control of the networking devices from the Operating System level down to a networking front end hypervisor level. The hypervisor will control all networking devices, the authentication for these devices, and the selection of which connection to use. The hypervisor will also perform Network Address Translation (NAT) to the Operating System. Thus, the Operating System will receive a single, private IP address for use with the Operating System's applications. The hypervisor will handle the change of the IP address when roaming between networks and hide it from the Operating System through the use of the NAT.
    Type: Application
    Filed: June 20, 2006
    Publication date: December 20, 2007
    Applicant: Lenovo (Singapore) Pte. Ltd.
    Inventors: Raymond G. Octaviano, Daryl Cromer, Philip J. Jakes, Howard J. Locker
  • Publication number: 20070268872
    Abstract: A method, computer program product and system for handling the use of multiple 802.11n channels in a location where there are a small number of available channels. An access point (“access point A”) having a client (“client A”) located solely within its coverage area and another client (“client B”) located within its coverage area and a coverage area of an adjacent access point (“access point B”) may receive a request to hold back 802.11n traffic from client B. Client B sends such a request since it is prevented from communicating with access point B using the 802.11n standard due to the interference from access point A communicating with client A using the 802.11n standard. As a result, access point A switches its standard of operation from using the 802.11n standard to communicate with client A to a standard that uses a bandwidth of 22 MHz (e.g., 802.11b, 802.11a, 802.11g standards).
    Type: Application
    Filed: May 16, 2006
    Publication date: November 22, 2007
    Inventors: Daryl Cromer, Howard Jeffrey Locker, Raymond Gary Octaviano, Philip John Jakes
  • Publication number: 20070268854
    Abstract: Methods, apparatus, and computer program products are disclosed for optimizing communications throughput in a wireless networking environment that supports a plurality of communications channel topologies that include identifying a plurality of clients having wireless network adapters supporting disparate channel bandwidths in the wireless networking environment, and periodically switching from one communications channel topology to another communications channel topology in dependence upon the supported channel bandwidths of the adapters of the identified clients.
    Type: Application
    Filed: May 18, 2006
    Publication date: November 22, 2007
    Inventors: Raymond G. Octaviano, Daryl Cromer, Philip J. Jakes, Howard J. Locker