Patents by Inventor David Carroll Challener

David Carroll Challener has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7676430
    Abstract: The Trusted Computing Platform Alliance (TCPA) Specification is implemented to allow a credit card company to remotely install a credit card private key into a TCPA module to create a Trusted Platform Module (TPM). More specifically, when a credit worthy user applies for a credit card, the user will send the credit card company a public portion of a “non-migratable storage key,” which is accredited a TPM endorsed by a Certification Authority. The credit card company will create its own public/private key pair according to the TCPA Specification, to create a TCPA header, and wrap the full structure by encrypting it with the public portion of the TCPA non-migratable storage key. The credit card company then sends by email the encrypted bundle with a certificate for it, and sends a corresponding pass phrase by regular mail.
    Type: Grant
    Filed: May 9, 2001
    Date of Patent: March 9, 2010
    Assignee: Lenovo (Singapore) Ptd. Ltd.
    Inventor: David Carroll Challener
  • Publication number: 20100058082
    Abstract: A low power processor in a computer is kept energized in a suspend state in which a main processor of the computer is deenergized. The low power processor maintains a network connection by sending keepalive packets as required by the network communication protocol.
    Type: Application
    Filed: August 27, 2008
    Publication date: March 4, 2010
    Inventors: Howard Jeffrey Locker, David Carroll Challener, Justin Tyler Dubs, Steven Richard Perrin, Michael Terrell Vanover, Jennifer Greenwood Zawacki
  • Patent number: 7673134
    Abstract: A method and system for remotely storing a user's admin key to gain access to an intranet is presented. The user's admin key and intranet user identification (ID) are encrypted using an enterprise's public key, and together they are concatenated into a single backup admin file, which is stored in the user's client computer. If the user needs his admin file and is unable to access it in a backup client computer, he sends the encrypted backup admin file to a backup server and his unencrypted intranet user ID to an intranet authentication server. The backup server decrypts the user's single backup admin file to obtain the user's admin key and intranet user ID. If the unencrypted intranet user ID in the authentication server matches the decrypted intranet user ID in the backup server, then the backup server sends the backup client computer the decrypted admin key.
    Type: Grant
    Filed: April 7, 2005
    Date of Patent: March 2, 2010
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: Ryan Charles Catherman, David Carroll Challener, Scott Thomas Elliott, James Patrick Hoff
  • Publication number: 20100039387
    Abstract: An approach is provided that identifies when a wireless keyboard unit is connected to an information handling system that includes a display screen that is partially blocked when the keyboard is attached. A determination is made as to the size of the visible portion of the display screen. Items are displayed on the visible portion of the display screen. The approach refrains from displaying items on the blocked portion of the display screen. The user is able to move the wireless keyboard, the movement of the keyboard resulting in a changed size of the visible portion of the display screen. After the keyboard is repositioned, the visual items are re-displayed on the visible portion of the display screen so that the items fit in the changed size of the visible portion of the display screen.
    Type: Application
    Filed: August 15, 2008
    Publication date: February 18, 2010
    Inventors: Howard Locker, David Carroll Challener, Daryl Carvis Cromer, Qian Ying Wang
  • Patent number: 7644278
    Abstract: A Method and system for ensuring security-compliant creation and signing of endorsement keys of manufactured trusted platform modules. The endorsement keys are generated for the trusted platform module (TPM). The TPM vendor selects an N-byte secret and stores the N-type secret in the trusted platform module along with the endorsement keys. The secret number cannot be read outside of the trusted platform module. The secret number is also provided to the credential server of the original equipment manufacturer. During the endorsement key (EK) credential process, the trusted platform module generates an endorsement key, which comprises both the public key and a hash of the secret and the public key. The credential server matches the hash within the endorsement key withy a second hash of the received public key (from the endorsement key) and the vendor provided secret. The EK certificate is generated and inserted into the trusted platform module only when a match is confirmed.
    Type: Grant
    Filed: December 31, 2003
    Date of Patent: January 5, 2010
    Assignee: International Business Machines Corporation
    Inventors: Ryan Charles Catherman, David Carroll Challener, James Patrick Hoff
  • Patent number: 7624279
    Abstract: If a user forgets the power-on password of his computer, he can depress the “enter” key or “access” key once to cause the BIOS to locate the power-on password in memory and attempt to unlock the HDD using the power-on password to boot a secure O.S. The HDD password either can be the same as the power-on password or the HDD can recognize the power-on password for the limited purpose of allowing access to the secure O.S. In any case, the secure O.S. is booted for password reset.
    Type: Grant
    Filed: June 29, 2005
    Date of Patent: November 24, 2009
    Assignee: Lenovo Singapore Pte. Ltd.
    Inventors: Mark Charles Davis, Randall Scott Springfield, David Carroll Challener, Rod D. Waltermann
  • Patent number: 7620997
    Abstract: When an authenticated wireless computer loses connectivity to a wireless access point of a network and roams to another access point, the wireless computer (e.g., a hypervisor in the computer) determines whether the new access point is authorized for secure communication and if so, releases access to secure data on the network through the new access point.
    Type: Grant
    Filed: December 22, 2003
    Date of Patent: November 17, 2009
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: David Carroll Challener, Daryl Carvis Cromer, Howard Jeffrey Locker, Hernando Ovies, Randall Scott Springfield
  • Publication number: 20090249434
    Abstract: An apparatus, system, and method are disclosed for pre-boot policy modification. A key module exchanges a key with a server in a secure environment. A communication module receives a policy encoded with the key. A decode module decodes the encoded policy using the key and saves the policy setting prior to booting an operating system on the computer. An update module boots the computer using the policy.
    Type: Application
    Filed: March 31, 2008
    Publication date: October 1, 2009
    Inventors: David Carroll Challener, Jeffrey Mark Estroff, Mikio Hagiwara, Seiichi Kawano, Keiko Kokubun, Randall Scott Springfield
  • Publication number: 20090241032
    Abstract: An apparatus, system, and method are disclosed for URL sharing. A link module links a plurality of user browsing sessions in a URL sharing session. A select module selects a user browsing session. A communication module communicates a URL for the selected user browsing session to each linked user browsing session. A display module displays the URL and corresponding web page of the selected user browsing session at each user browsing session.
    Type: Application
    Filed: March 18, 2008
    Publication date: September 24, 2009
    Inventors: David Carroll Challener, Justin Tyler Dubs, Steven Richard Perrin, Jennifer Greenwood Zawacki
  • Publication number: 20090241164
    Abstract: A system, method, and program product is provided that detects whether a network adapter has been removed from a computer system. If the network adapter, such as a wireless network adapter, has been removed from the computer system, then a tamper evident indicator (e.g., bit) is set in a nonvolatile memory area of the computer system. In addition, a hard drive password is set to a different password according to a hard drive password policy. The hard drive password controls access to files stored on the hard drive. In one embodiment, the power-on password is also changed to a new password so that the user has to enter the new power-on password when initializing the computer system in order to access the files stored on the computer system.
    Type: Application
    Filed: March 19, 2008
    Publication date: September 24, 2009
    Inventors: David Carroll Challener, Justin Tyler Dubs, James Joseph Thrasher, Michael Terrell Vanover
  • Patent number: 7590834
    Abstract: A computer determines whether it has been booted from a hard disk drive or from an alternate source (e.g., a floppy drive or portable memory) that entails a higher risk of importing a virus into the computer, and if it is determined that a non-HDD source was booted from, corrective action such as a virus scan can be preemptively taken.
    Type: Grant
    Filed: February 10, 2006
    Date of Patent: September 15, 2009
    Assignee: Lenovo Singapore Pte. Ltd.
    Inventors: David Carroll Challener, Daryl Carvis Cromer, Mark Charles Davis, Jerry Clyde Dishman, Howard Jeffery Locker, Randall Scott Springfield
  • Patent number: 7587765
    Abstract: A client computer is connected via a network to an anti-virus server. A signal from the anti-virus server notifies the client computer that an anti-virus needs to be immediately downloaded from the anti-virus server. The client computer disengages from the network, and re-establishes a link with only the trusted anti-virus server. The anti-virus fix is installed, the client computer re-booted, and the client computer is then allowed to reconnect to the full network. If the client's primary operating system (OS) is infected, a secondary OS in the client computer performs the anti-virus download and execution. The disengagement from the network is performed by applying a filter in a network interface card (NIC) driver by the primary OS, the secondary OS, a service processor (SP), or by a virtual machine manager (VMM), depending on which is available at the client computer.
    Type: Grant
    Filed: April 16, 2004
    Date of Patent: September 8, 2009
    Assignee: International Business Machines Corporation
    Inventors: David Carroll Challener, Richard W. Cheston, Daryl Carvis Cromer, Mark Charles Davis, Howard Jeffrey Locker, Randall Scott Springfield
  • Publication number: 20090222635
    Abstract: A system, method, and program product is provided that initializes a computer system using an initialization process that identifies secrets that were stored in memory and not scrubbed during a prior use of the computer system. During the initialization process, one or more secret indicators are retrieved that identify whether one or more secrets were scrubbed from the computer system's memory during a previous use of the computer system. If the secret indicators show that one or more secrets were not scrubbed from the memory during the prior use of the computer system, then the initialization process scrubs the memory. On the other hand, if the secret indicators show that each of the secrets was scrubbed from the memory during the prior use of the computer system, then the memory is not scrubbed during the initialization process.
    Type: Application
    Filed: March 3, 2008
    Publication date: September 3, 2009
    Inventors: David Carroll Challener, Daryl Carvis Cromer, Howard Jeffrey Locker, Randall Scott Springfield
  • Publication number: 20090222915
    Abstract: A system, method, and program product is provided that initializes a counter maintained in a nonvolatile memory of a security module to an initialization value. The security module receives requests for a secret from requesters. The security module releases the secret to the requesters and the released secrets are stored in memory areas allocated to the requesters. A counter is incremented when the secret is released. Requestors send notifications to the security module indicating that the requestor has removed the secret from the requestor's memory area. The security module decrements the counter each time a notification is received. When the computer system is rebooted, if the counter is not at the initialization value, the system memory is scrubbed erasing any secrets that remain in memory.
    Type: Application
    Filed: March 3, 2008
    Publication date: September 3, 2009
    Inventors: David Carroll Challener, Daryl Carvis Cromer, Howard Jeffrey Locker, Randall Scott Springfield
  • Patent number: 7581252
    Abstract: A computer system includes a security subsystem which is able to trustfully track which files or storage areas of a storage device have been altered since a last virus scan. The trusted information can then be used to accelerate scans for undesirable code or data such as viruses and invalid or corrupt registry entries. In the case of viruses, files or storage areas which have been altered are scanned against a super-set of virus definitions. Unaltered files or storage areas are scanned against a subset of virus definitions.
    Type: Grant
    Filed: July 20, 2004
    Date of Patent: August 25, 2009
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: David Carroll Challener, John Peter Karidis
  • Patent number: 7581253
    Abstract: A computer system includes a security subsystem which is able to trustfully track which files or storage areas of a storage device have been altered since a last virus scan. The trusted information can then be used to accelerate scans for undesirable code or data such as viruses and invalid or corrupt registry entries. In the case of viruses, files or storage areas which have been altered are scanned against a super-set of virus definitions. Unaltered files or storage areas are scanned against a subset of virus definitions.
    Type: Grant
    Filed: July 20, 2004
    Date of Patent: August 25, 2009
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: David Carroll Challener, John Peter Karidis
  • Publication number: 20090205044
    Abstract: An apparatus, system, and method are disclosed for secure hard disk signed audit. The apparatus is provided with a plurality of modules configured to functionally execute the necessary steps of monitoring interactions with an audited system, detecting an interrupt event corresponding to an auditable interaction, and logging an audit record for the auditable interaction in response to the interrupt event, wherein the audit record is logged in an access-restricted portion of a portion-securable hard disk. These modules in the described embodiments include a gate module, a detection module, and a logging module.
    Type: Application
    Filed: February 7, 2008
    Publication date: August 13, 2009
    Inventors: David Carroll Challener, Howard Locker, Philip John Jakes, Randall Scott Springfield
  • Publication number: 20090182612
    Abstract: Applications are disclosed involving root measurable entities such as given a size of a garment from one manufacturer that fits, appropriate sizes for garments made by other manufacturers can be returned; also, given a particular computer network and a user-input desire for a particular task, optimum settings are returned.
    Type: Application
    Filed: January 10, 2008
    Publication date: July 16, 2009
    Inventors: David Carroll Challener, Daryl Carvis Cromer, Justin Tyler Dubs, Jennifer Greenwood Zawacki
  • Publication number: 20090178033
    Abstract: A system, method, and program product is provided that has a virtualized environment provided by a hypervisor. In the virtualized environment, one or more guest operating systems operate simultaneously with a privileged operating system. One of the guest operating systems identifies a device software update, such as a device driver or firmware update, corresponding to a hardware device that is attached to the computer system. The hypervisor is used to notify the privileged operating system of the device software update. When the privileged operating system is notified of the update, the privileged operating system uses one or more techniques to deny the guest operating systems access to the device. The privileged operating system then updates the device software update. After the device software update has been applied, the privileged operating system resumes access between the guest operating systems and the hardware device.
    Type: Application
    Filed: January 7, 2008
    Publication date: July 9, 2009
    Inventors: David Carroll Challener, Mark Charles Davis, Randall Scott Springfield, Rod David Waltermann
  • Publication number: 20090119785
    Abstract: A system, method, and program product is provided that establishes a shared secret between a computer system and a peripheral device such as a removable nonvolatile storage device or a printer. After establishing the shared secret, the peripheral device is locked. After the peripheral device is locked, an unlock request is received and the shared secret is sent to the peripheral device. The peripheral device then attempts to verify the shared secret. If the shared secret is successfully verified, then the peripheral device is unlocked allowing use of the device by using an encryption key that is made available by the verified shared secret. On the other hand, if the shared secret is not verified, then the peripheral device remains locked and use of the device is prevented.
    Type: Application
    Filed: November 5, 2007
    Publication date: May 7, 2009
    Inventors: David Carroll Challener, Daryl Cromer, Philip John Jakes, Howard Jeffrey Locker, Randall Scott Springfield