Patents by Inventor Kenneth A. Abrams
Kenneth A. Abrams has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8720725Abstract: An attachable closure device for reclosing contains a base member, a resilient expandable band coupled to and extending from the base member, an adhesive layer on a surface of the base member, and a release agent on the adhesive layer. The release agent is housed in a coating on a release support layer, which may be coupled to the base member and unitary with the base member. The resilient, expandable band may be coupled and retained to the attachable closure device solely by a portion of the unitary base member-release support layer.Type: GrantFiled: June 12, 2013Date of Patent: May 13, 2014Inventor: Kenneth A. Abrams
-
Publication number: 20130270275Abstract: An attachable closure device for reclosing contains a base member, a resilient expandable band coupled to and extending from the base member, an adhesive layer on a surface of the base member, and a release agent on the adhesive layer. The release agent is housed in a coating on a release support layer, which may be coupled to the base member and unitary with the base member. The resilient, expandable band may be coupled and retained to the attachable closure device solely by a portion of the unitary base member-release support layer.Type: ApplicationFiled: June 12, 2013Publication date: October 17, 2013Inventor: Kenneth A. Abrams
-
Patent number: 8485380Abstract: An attachable closure device for reclosing contains a base member, a resilient expandable band coupled to and extending from the base member, an adhesive layer on a surface of the base member, and a release agent on the adhesive layer. The release agent is housed in a coating on a release support layer, which may be coupled to the base member and unitary with the base member. The resilient, expandable band may be coupled and retained to the attachable closure device solely by a portion of the unitary base member-release support layer.Type: GrantFiled: August 4, 2009Date of Patent: July 16, 2013Inventor: Kenneth A. Abrams
-
Patent number: 8165927Abstract: Processing purchasing items is provided. A broadcast television signal is received at a television system. The broadcast television signal contains data indicating that an item in the broadcast television signal is being offered for sale. A visual cue is presented in association with the item being presented in the television system in response to receiving the data. In response to receiving a user input to purchase the item, a purchase request process is sent to a seller of the item to purchase the item using personal information needed to purchase the item stored in the television system.Type: GrantFiled: December 10, 2007Date of Patent: April 24, 2012Assignee: International Business Machines CorporationInventors: Roger Kenneth Abrams, Robert Thomas Cato, Jeff David Thomas
-
Patent number: 7793349Abstract: Disclosed as a system and method for providing enhanced security to processes running on a data processing system. The disclosed system and method selectively revokes execute privileges from memory pages being used for stacks of susceptible processes running on the data processing system. By selectively resetting execute privileges on a per page and per process basis, the system and method maintains system performance and provides enhanced security to processes running on the data processing system.Type: GrantFiled: January 24, 2008Date of Patent: September 7, 2010Assignee: International Business Machines CorporationInventor: Roger Kenneth Abrams
-
Patent number: 7743406Abstract: A system and method for securing data on a wireless device. A secured zone is defined by a boundary sensor. A data processing system is coupled to the boundary sensor and a wireless device. If the data processing system detects that the signal strength of the wireless device has fallen below a first predetermined value for longer than a second predetermined value, the data processing system deletes a digital certificate corresponding to the wireless device from memory. Thus, when the wireless device is reintroduced into the secured zone, in response to determining that a digital certificate corresponding to the wireless device is not stored in memory, the disabling module disables the wireless device from operation within the secured zone.Type: GrantFiled: December 21, 2004Date of Patent: June 22, 2010Assignee: International Business Machines CorporationInventors: Scott Sina Abedi, Roger Kenneth Abrams, Ryan Charles Catherman, James Patrick Hoff, James Stephen Rutledge
-
Publication number: 20090150257Abstract: A computer implemented method, apparatus, and computer usable program code for processing purchasing items. A broadcast television signal is received at a television system. The broadcast television signal contains data indicating that an item in the broadcast television signal is being offered for sale. A visual cue is presented in association with the item being presented in the television system in response to receiving the data. In response to receiving a user input to purchase the item, a purchase request process is sent to a seller of the item to purchase the item using personal information needed to purchase the item stored in the television system.Type: ApplicationFiled: December 10, 2007Publication date: June 11, 2009Applicant: International Business Machines CorporationInventors: Roger Kenneth Abrams, Robert Thomas Cato, Jeff David Thomas
-
Publication number: 20080155692Abstract: Disclosed as a system and method for providing enhanced security to processes running on a data processing system. The disclosed system and method selectively revokes execute privileges from memory pages being used for stacks of susceptible processes running on the data processing system. By selectively resetting execute privileges on a per page and per process basis, the system and method maintains system performance and provides enhanced security to processes running on the data processing system.Type: ApplicationFiled: January 24, 2008Publication date: June 26, 2008Applicant: International Business Machines CorporationInventor: Roger Kenneth Abrams
-
Patent number: 7386886Abstract: Disclosed as a system and method for providing enhanced security to processes running on a data processing system. The disclosed system and method selectively revokes execute privileges from memory pages being used for stacks of susceptible processes running on the data processing system. By selectively resetting execute privileges on a per page and per process basis, the system and method maintains system performance and provides enhanced security to processes running on the data processing system.Type: GrantFiled: November 8, 2000Date of Patent: June 10, 2008Assignee: International Business Machines CorporationInventor: Roger Kenneth Abrams
-
Patent number: 7240299Abstract: A two part method for improving the usage of a pointing device by a physically impaired user is disclosed. A first method is provided for learning how a user moves the pointing device by acquiring motion data for a user and generating motion vectors corresponding to when the user moves from source point icons to destination point icons. A second method of combining the learned user motion data with an application program where the user navigates the pointing device to select program icons on a graphical user interface (GUI) screen is provided. The method determines when the actual motion vector is similar to a previously acquired motion vector with a similar source point. The method predicts a destination point icon and highlights and locks the prediction icon until the user either actuates the iconor generates motion vectors that indicate that another destination point icon is the more likely destination.Type: GrantFiled: April 26, 2001Date of Patent: July 3, 2007Assignee: International Business Machines CorporationInventor: Roger Kenneth Abrams
-
Patent number: 7178165Abstract: A method, system and computer program product for preventing at least in part a hacker from performing unwanted activities such as in a file system. A security layer may be added in the kernel space configured to determine whether a request to provide a service from a particular user was received from user space or kernel space. If the request was received from user space, then the user is an unauthenticated user. That is, the user may be a potential hacker. Subsequently, the security layer may determine whether the request satisfies requirements for unauthenticated requests. If the request was received from a secure connection manager in kernel space then the user may be treated as an authenticated user. The secure connection manager may be configured to establish a secure authorized connection with an authenticated user. Subsequently, the security layer may determine whether the request satisfies requirements for authenticated requests.Type: GrantFiled: August 20, 2001Date of Patent: February 13, 2007Assignee: Lenovo (Signapore) Pte Ltd.Inventor: Roger Kenneth Abrams
-
Publication number: 20050113603Abstract: Disclosed is a method and solvent composition capable of removing iron oxide deposits from the surface of titanium components without substantially damaging the underlying titanium component. Iron oxide deposits may be removed from the surface of a titanium component by contacting the titanium component with the solvent composition of the invention. The solvent composition may then be removed from contact with the titanium component to obtain a recyclable solvent composition which is recycled into repeated contact with the titanium component. The solvent composition comprises an aqueous mixture of an organic acid and a hydrohalide acid.Type: ApplicationFiled: December 17, 2004Publication date: May 26, 2005Inventors: Frank Belmonte, Kenneth Abrams, James Delaney, Scott Kramer, David Sikkenga
-
Publication number: 20050107630Abstract: A process for oxidation with oxygen of at least one aromatic hydrocarbon having oxidizable, substituents that maximizes the utilization of oxygen without reduction in the quality of the carboxylic acid products produced by means of a stagewise countercurrent oxidation system is disclosed.Type: ApplicationFiled: November 14, 2003Publication date: May 19, 2005Inventors: Frank Belmonte, David Sikkenga, Olusola Ogundiran, Kenneth Abrams, Linus Leung, Christopher Meller, Dale Figgins, Allen Mossman
-
Publication number: 20030204745Abstract: A method and system for protecting a processing system from a buffer overflow attack are described. More particularly, embodiments of the present invention provide a plurality of local variables in a memory structure and provide a return address within the memory structure. The return address is at a lower address than the plurality of local variables to prevent the return address from being overwritten during a buffer overflow attack.Type: ApplicationFiled: April 29, 2002Publication date: October 30, 2003Applicant: International Business Machines CorporationInventor: Roger Kenneth Abrams
-
Publication number: 20030200385Abstract: A method and apparatus for increasing disk drive performance in a disk drive system are described. Embodiments of the present invention provide a method including the steps of providing a disk drive and a nonvolatile memory (NVM) as an integral part of the disk drive. Particular data can be selected and stored in the NVM. Such data can be file system or database metadata for example. According to the method and system disclosed herein, the present invention increases the speeds at which data is written and read to magnetic media. Drive performance is achieved while maintaining reliability.Type: ApplicationFiled: April 18, 2002Publication date: October 23, 2003Inventor: Roger Kenneth Abrams
-
Publication number: 20030037252Abstract: A method, system and computer program product for preventing at least in part a hacker from performing unwanted activities such as in a file system. A security layer may be added in the kernel space configured to determine whether a request to provide a service from a particular user was received from user space or kernel space. If the request was received from user space, then the user is an unauthenticated user. That is, the user may be a potential hacker. Subsequently, the security layer may determine whether the request satisfies requirements for unauthenticated requests. If the request was received from a secure connection manager in kernel space then the user may be treated as an authenticated user. The secure connection manager may be configured to establish a secure authorized connection with an authenticated user. Subsequently, the security layer may determine whether the request satisfies requirements for authenticated requests.Type: ApplicationFiled: August 20, 2001Publication date: February 20, 2003Applicant: International Business Machines CorporationInventor: Roger Kenneth Abrams
-
Publication number: 20020158920Abstract: A two part method for improving the usage of a pointing device by a physically impaired user is disclosed. A first method is provided for learning how a user moves the pointing device by acquiring motion data for a user and generating motion vectors corresponding to when the user moves from source point icons to destination point icons. A second method of combining the learned user motion data with an application program where the user navigates the pointing device to select program icons on a graphical user interface (GUI) screen is provided. The method determines when the actual motion vector is similar to a previously acquired motion vector with a similar source point. The method predicts a destination point icon and highlights and locks the prediction icon until the user either actuates the iconor generates motion vectors that indicate that another destination point icon is the more likely destination.Type: ApplicationFiled: April 26, 2001Publication date: October 31, 2002Applicant: International Business Machines CorporationInventor: Roger Kenneth Abrams
-
Patent number: 5835634Abstract: A bitmap comparison technique that is able quickly to compare two bitmap images while discounting differences between the images likely due to noise. The bitmap comparison technique includes the operations of: comparing the first and second bitmaps, producing a difference map identifying differing bits between the first and second bitmaps, producing outline masks based on the outlines of the first and second bitmaps, identifying certain very different bits within the difference map that are to be weighted differently from the remaining bits within the difference map based upon the outline mask, and determining a comparison score to indicate the extent to which the first and second images differ by differently weighting the very different bits and the remaining bits. The certain bits are normally weighted to a lesser extent than the remaining bits when determining the comparison score so that the influence of noise in the comparison score is diminished.Type: GrantFiled: May 31, 1996Date of Patent: November 10, 1998Assignee: Adobe Systems IncorporatedInventor: Kenneth A. Abrams