Patents by Inventor William Frank Hackenberger

William Frank Hackenberger has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7673137
    Abstract: Managing and controlling the execution of software programs with a computing device to protect the computing device from malicious activities. A protector system implements a two-step process to ensure that software programs do not perform malicious activities which may damage the computing device or other computing resources to which the device is coupled. In the first phase, the protector system determines whether a software program has been previously approved and validates that the software program has not been altered. If the software program is validated during the first phase, this will minimize or eliminate security monitoring operations while the software program is executing during the second phase. If the software program cannot be validated, the protector system enters the second phase and detects and observes executing activities at the kernel level of the operating system so that suspicious actions can be anticipated and addressed before they are able to do harm to the computing device.
    Type: Grant
    Filed: January 3, 2003
    Date of Patent: March 2, 2010
    Assignee: International Business Machines Corporation
    Inventors: Thomas James Satterlee, William Frank Hackenberger
  • Patent number: 7565549
    Abstract: Managing and controlling the execution of software programs with a computing device to protect the computing device from malicious activities. A protector system implements a two-step process to ensure that software programs do not perform malicious activities which may damage the computing device or other computing resources to which the device is coupled. In the first phase, the protector system determines whether a software program has been previously approved and validates that the software program has not been altered. If the software program is validated during the first phase, this will minimize or eliminate security monitoring operations while the software program is executing during the second phase. If the software program cannot be validated, the protector system enters the second phase and detects and observes executing activities at the kernel level of the operating system so that suspicious actions can be anticipated and addressed before they are able to do harm to the computing device.
    Type: Grant
    Filed: July 3, 2007
    Date of Patent: July 21, 2009
    Assignee: International Business Machines Corporation
    Inventors: Thomas James Satterlee, William Frank Hackenberger
  • Patent number: 7562388
    Abstract: Supporting the implementation and collaboration of a variety of security modules in a distributed computing network. A security interface provides a universal platform for coupling security modules to the network. The various security modules are linked to and provide identifying information to the security interface. The security interface also receives subscription requests used to coordinate which security modules will communicate. When a security event occurs, a message can be generated by the relevant security module. The security interface shares the message with those security modules that have subscribed to the relevant security module. The sharing of security information enables better performance by the entire network security system.
    Type: Grant
    Filed: May 31, 2002
    Date of Patent: July 14, 2009
    Assignee: International Business Machines Corporation
    Inventors: William Frank Hackenberger, Randy Jay Hendry, Christopher James Wood
  • Publication number: 20040025015
    Abstract: Managing and controlling the execution of software programs with a computing device to protect the computing device from malicious activities. A protector system implements a two-step process to ensure that software programs do not perform malicious activities which may damage the computing device or other computing resources to which the device is coupled. In the first phase, the protector system determines whether a software program has been previously approved and validates that the software program has not been altered. If the software program is validated during the first phase, this will minimize or eliminate security monitoring operations while the software program is executing during the second phase. If the software program cannot be validated, the protector system enters the second phase and detects and observes executing activities at the kernel level of the operating system so that suspicious actions can be anticipated and addressed before they are able to do harm to the computing device.
    Type: Application
    Filed: January 3, 2003
    Publication date: February 5, 2004
    Applicant: Internet Security Systems
    Inventors: Thomas James Satterlee, William Frank Hackenberger
  • Publication number: 20020184532
    Abstract: Supporting the implementation and collaboration of a variety of security modules in a distributed computing network. A security interface provides a universal platform for coupling security modules to the network. The various security modules are linked to and provide identifying information to the security interface. The security interface also receives subscription requests used to coordinate which security modules will communicate. When a security event occurs, a message can be generated by the relevant security module. The security interface shares the message with those security modules that have subscribed to the relevant security module. The sharing of security information enables better performance by the entire network security system.
    Type: Application
    Filed: May 31, 2002
    Publication date: December 5, 2002
    Applicant: Internet Security Systems
    Inventors: William Frank Hackenberger, Randy Jay Hendry, Christopher James Wood