Patents by Inventor David C. Challener

David C. Challener has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20100162015
    Abstract: The instant invention broadly contemplates an energy saving subsystem comprising a secondary CPU that utilizes less power than a main CPU, thereby allowing an electronic device (e.g. a laptop PC) having the secondary CPU to use less power and run for longer periods of time on a limited power supply. Thus, the invention permits the electronic device to be utilized for extended periods and extends the battery life.
    Type: Application
    Filed: December 22, 2008
    Publication date: June 24, 2010
    Inventors: Russell A. Resnick, Howard Locker, Mark C. Davis, David C. Challener
  • Publication number: 20100162373
    Abstract: In the context of computer systems, the generation of preboot passwords at a server instead of at a client. Preferably, preboot passwords generated at the server are distributed to the client, and a process is offered whereby a user can establish his/her own proxy, not known to the server, that can be used to release the stored passwords to the client hardware. Since the passwords are generated at the server, management of the passwords is greatly facilitated since they are generated at the site where they are stored. This also makes it easy to implement management features such as a group policy, since the password generation software will be able to make logical connections between users and hardware.
    Type: Application
    Filed: December 22, 2008
    Publication date: June 24, 2010
    Applicant: Lenovo (Singapore) Pte. Ltd.
    Inventors: Randall S. Springfield, Jeffrey M. Estroff, Seiichi Kawano, Mikio Hagiwara, David C. Challener, James P. Hoff, Binqiang Ma
  • Publication number: 20100134409
    Abstract: The instant invention provides an apparatus, method and program storage device enabling a three-dimensional user interface for the movement of objects rendered upon a display device in a more realistic and intuitive manner. A Z distance is set whereupon a user crossing the Z distance is enabled to select an object, i.e. pick it up. As the user breaks the Z distance again, the object selected will move with the user's hand. As the user breaks the Z distance once more, the object will be released, i.e. dropped into a new position.
    Type: Application
    Filed: November 30, 2008
    Publication date: June 3, 2010
    Applicant: Lenovo (Singapore) Pte. Ltd.
    Inventors: David C. Challener, James S. Rutledge, Jinping Yang
  • Publication number: 20100134421
    Abstract: The invention includes a method, apparatus, and program storage device for providing a combined tap sequence and camera based user interface. The invention provides, among other features, an apparatus comprising: an accelerometer; a laser light generating module; wherein the laser light generating module provides a plane of laser light over a surface coupled to the accelerometer; at least one camera; at least one processor; and a memory; wherein the memory stores instructions, executable by the at least one processor, enabling the apparatus to ascertain an occurrence of an input event utilizing inputs from the accelerometer and a location of the input event utilizing inputs from the at least one camera.
    Type: Application
    Filed: November 30, 2008
    Publication date: June 3, 2010
    Inventors: David C. Challener, James S. Rutledge, Jinping Yang
  • Publication number: 20100103141
    Abstract: A technique for controlling operation of a device with a virtual touchscreen includes defining an area of a surface, associated with the device, as the virtual touchscreen. An operation within the device is then initiated based on activity within the virtual touchscreen. An overlay may be provided, on a display screen of the device, to indicate a location of the virtual touchscreen with respect to, for example, a keyboard of the device.
    Type: Application
    Filed: October 27, 2008
    Publication date: April 29, 2010
    Inventors: David C. Challener, James S. Rutledge, Jinping Yang
  • Publication number: 20100090983
    Abstract: A technique for creating a virtual touchscreen includes capturing, with a first infrared camera, a first reflection from an object that is at a known position adjacent a surface associated with a device. A second reflection from the object (at the known position) is captured with a second infrared camera. The first and second reflections are correlated with the known position to provide a two-dimensional position for the object that is calibrated with respect to the surface.
    Type: Application
    Filed: October 15, 2008
    Publication date: April 15, 2010
    Inventors: David C. Challener, James S. Rutledge, Jinping Yang
  • Publication number: 20100082746
    Abstract: The invention provides a system comprising: a CPU; a memory in communication with the CPU; instructions stored in the memory and executable by the CPU to establish a collaborative web browsing session, the instructions further comprising: instructions enabling at least one peer device to join the collaborative web browsing session at a web site hosted by an automated peer.
    Type: Application
    Filed: September 30, 2008
    Publication date: April 1, 2010
    Inventors: Sean M. Ulrich, Peter G. Gaucher, David C. Challener, Jennifer G. Zawacki, James J. Thrasher, Justin T. Dubs, Julie A. Morris
  • Publication number: 20100083357
    Abstract: Systems and arrangements for permitting the transmission of fingerprint authentication data to a system remotely, while also permitting the system to employ such data as well as passwords in order to operate a computer system, while ensuring a reliable level of security for any group or organization using such systems and arrangements.
    Type: Application
    Filed: September 30, 2008
    Publication date: April 1, 2010
    Applicant: Lenovo (Singapore) Pte. Ltd
    Inventors: David C. Challener, Howard J. Locker, Mark C. Davis, Daryl C. Cromer, Randall S. Springfield
  • Publication number: 20100083132
    Abstract: A system for preventing redirection loops during collaborative web browsing is provided comprising: a CPU; a memory in communication with the CPU; instructions stored in the memory and executable by the CPU to prevent redirects encountered during a collaborative web browsing session, the instructions further comprising: instructions enabling a device to join a collaborative web browsing session; instructions enabling detection of a redirection loop; and instructions enabling termination of the redirect loop.
    Type: Application
    Filed: September 30, 2008
    Publication date: April 1, 2010
    Applicant: Lenovo (Singapore) Pte. Ltd.
    Inventors: Sean M. Ulrich, Jennifer G. Zawacki, David C. Challener, Julie A. Morris, James J. Thrasher, Justin T. Dubs, Peter G. Gaucher
  • Publication number: 20100083135
    Abstract: A system for collaborative web browsing is provided comprising: a CPU; a system memory in communication with said CPU; a display medium; and instructions stored in the system memory and executable by the CPU, the instructions comprising: enabling a device to join a collaborative web browsing session; enabling a data navigation module to provide, upon an object appearing upon the display medium being selected by a user, outgoing navigation data that enables a rendering of the object to be distinguished from other objects rendered upon at least one other display medium of at least one other device.
    Type: Application
    Filed: September 30, 2008
    Publication date: April 1, 2010
    Applicant: Lenovo (Singapore) Pte. Ltd.
    Inventors: Jennifer G. Zawacki, Justin T. Dubs, James J. Thrasher, David C. Challener, Sean M. Ulrich, Julie A. Morris, Peter G. Gaucher
  • Patent number: 7661033
    Abstract: A method, computer readable medium and computer system for repairing a failed network connection between a client system and a network is disclosed. In a first aspect, the method preferably includes collecting real time connectivity information by the client system and utilizing the real time connectivity information by the client system to establish a connection with the network. In a second aspect, a computer system coupled to a network includes at least one network adapter for monitoring and collecting real time connectivity information from the network, memory for storing the real time connectivity information, and a processor coupled to the memory and to the at least one network adapter, where the processor is configured to execute program instructions for utilizing the real time connectivity information to repair a failed network connection between the computer system and the network.
    Type: Grant
    Filed: August 28, 2008
    Date of Patent: February 9, 2010
    Assignee: International Business Machines Corporation
    Inventors: David C. Challener, Steven J. Mastrianni, Joseph R. Parker, Ratan Ray, Leendert P. Van Doorn
  • Publication number: 20090327687
    Abstract: The employment of a process of applying user-defined defaults to a management engine or analogous arrangement, wherein a system BIOS calls or recalls such defaults, as needed, from NVRAM responsive to the need for a reset of defaults.
    Type: Application
    Filed: June 27, 2008
    Publication date: December 31, 2009
    Applicant: Lenovo (Singapore) Pte. Ltd
    Inventors: Randall S. Springfield, Howard Locker, David C. Challener, Joseph M. Pennisi
  • Patent number: 7600134
    Abstract: A method for theft deterrence of a computer system is disclosed. The computer system includes a trusted platform module (TPM) and storage medium. The method comprises providing a binding key in the TPM; and providing an encrypted symmetric key in the storage medium. The method further includes providing an unbind command to the TPM based upon an authorization to provide a decrypted symmetric key; and providing the decrypted symmetric key to the secure storage device to allow for use of the computer system. Accordingly, by utilizing a secure hard disk drive (HDD) that requires a decrypted key to function in conjunction with a TPM, a computer if stolen is virtually unusable by the thief. In so doing, the risk of theft of the computer is significantly reduced.
    Type: Grant
    Filed: November 8, 2004
    Date of Patent: October 6, 2009
    Assignee: Lenovo Singapore Pte. Ltd.
    Inventors: Ryan C. Catherman, David C. Challener, James P. Hoff, Joseph M. Pennisi, Randall S. Springfield
  • Publication number: 20090249485
    Abstract: A technique for identifying a user of a device includes receiving a tracking mechanism trigger and capturing (e.g., periodically) identifying information on the user of the device in response to the trigger.
    Type: Application
    Filed: March 25, 2008
    Publication date: October 1, 2009
    Inventors: David Rivera, David C. Challener, Rod D. Waltermann
  • Publication number: 20090228470
    Abstract: A technique for cataloging documents based on user activity includes assigning documents to a relevant document list based on activity of a user of a device. In this case, at least two of the documents are associated with different applications. The technique then provides the relevant document list to the user.
    Type: Application
    Filed: March 6, 2008
    Publication date: September 10, 2009
    Inventors: Jennifer G. Zawacki, David C. Challener, Justin T. Dubs, James J. Thrasher
  • Publication number: 20090222889
    Abstract: Methods and arrangements for ensuring that, when a computer system is stolen or otherwise misplaced, the system is rendered unusable (i.e., locked down). Conventional solutions have required software running on the system to perform the lockdown action, but in accordance with at least one preferred embodiment of the present invention is the linkage of TPM (Trusted Platform Module) and AMT (Active Management Technology) solutions whereby an AMT arrangement can remove secure data or identifiers so that any encrypted data present on the system will become unusable.
    Type: Application
    Filed: February 29, 2008
    Publication date: September 3, 2009
    Applicant: Lenovo (Singapore) Pte. Ltd.
    Inventors: David C. Challener, Howard Locker, Randall S. Springfield
  • Publication number: 20090222651
    Abstract: Arrangements for employing a system BIOS (basic input/output system) to handle email during a suspended state (such as an “S3” state as will be better understood herebelow). Preferably, the BIOS is employed to “jump” between two suspended images such that, e.g., two more powerful OS's can be employed to manage the mail function.
    Type: Application
    Filed: February 29, 2008
    Publication date: September 3, 2009
    Applicant: Lenovo (Singapore) Pte. Ltd.
    Inventors: David C. Challener, Daryl Cromer, Justin T. Dubs, Howard Locker, James S. Rutledge, Randall S. Springfield, James J. Thrasher, Michael T. Vanover
  • Publication number: 20090222909
    Abstract: In accordance with at least one presently preferred embodiment of the present invention, there is broadly contemplated herein the managing of a POP not solely in the BIOS but at least partly in a more secure location. In accordance with a particularly preferred embodiment of the present invention, this location could be in a NVRAM (non-volatile random access memory) inside a TPM (trusted platform module). Most preferably, this location will contain code that the BIOS preferably will need to access and employ in order to complete the booting of the system.
    Type: Application
    Filed: February 29, 2008
    Publication date: September 3, 2009
    Applicant: Lenovo (Singapore) Pte. Ltd
    Inventors: David C. Challener, Howard Locker, Randall S. Springfield
  • Publication number: 20090089875
    Abstract: In a system with a main memory, a network adapter, and a display, a transaction security module in communication with the network adapter. The transaction security module acts to: establish a secure identification item with an entity which positively identifies the entity; accept an application OS of the entity; and initiate a guest OS with the entity; the network adapter acting to connect with the entity subsequent to initiation of a guest OS; and the display acting to display the secure identification item subsequent to connection with the entity.
    Type: Application
    Filed: September 30, 2007
    Publication date: April 2, 2009
    Applicant: Lenovo (Singapore) Pte. Ltd
    Inventors: David C. Challener, Daryl Cromer, Howard Locker, Randall S. Springfield
  • Publication number: 20090089590
    Abstract: Methods and arrangements for managing a flash drive, hard disk, or connection between the two, in a manner to ensure that sensitive data is not decrypted at any time when it would be vulnerable. Accordingly, in a first implementation, the data may preferably be encrypted as it first goes into a flash drive and decrypted when it comes out of the flash drive. In another implementation, the flash drive may be logically bound to the hard disk, so that they would both use the same encryption key. In yet another implementation, if a hard disk is moved to another system, then the flash drive may also preferably be simultaneously moved.
    Type: Application
    Filed: September 30, 2007
    Publication date: April 2, 2009
    Applicant: Lenovo (Singapore) Pte.Ltd
    Inventors: David C. Challener, Daryl Cromer, Howard Locker, Randall S. Springfield