Patents Represented by Attorney, Agent or Law Firm William A. Kinnaman
  • Patent number: 6499071
    Abstract: An exemplary embodiment of the invention is an interconnection system including a primary connector having a first detection contact coupled to a first voltage, a second detection contact coupled to said first voltage and a reference contact coupled to a second voltage. The interconnection system includes a secondary connector having a first contact, a second contact and a secondary reference contact. The second contact and secondary reference contact are electrically connected. The first contact makes electrical connection with the first detection contact, the second contact makes electrical connection with the second detection contact and the secondary reference contact makes electrical connection with the reference contact. When the second detection contact makes electrical connection with the second contact, the second detection contact is connected to the second voltage.
    Type: Grant
    Filed: July 14, 1999
    Date of Patent: December 24, 2002
    Assignee: International Business Machines Corporation
    Inventors: Scott J. Hadderman, William F. Relyea
  • Patent number: 6470417
    Abstract: A current generation, quad RAS, single CAS, stacked component (101) including four 4 Mb×4 bits 11/11 DRAMs (210-213) is arranged to emulate a next generation 16 Mb×4 bits 12/12 DRAM. The (24) bit address signal provided by memory controller (105) includes a row address of 12 bits and a column address of 12 bits. Each DRAM (210-213) within the current generation DRAM component (101) requires only 11 row address bits and 11 column address bits. The additional 1 row address bit and 1 column address bit are provided to decoder logic (103). The additional row address bit is decoded by the decoding logic (103) to direct the RAS signals over two of the four RAS lines (201-204), thereby activating the two signaled DRAMs. The additional column address bit is then decoded by decoding logic (103) to de-activate one of the two signaled DRAMs , leaving only one DRAM activated. CAS line (205) directs the CAS signal to all of the stacked DRAMs (210-213).
    Type: Grant
    Filed: June 12, 2000
    Date of Patent: October 22, 2002
    Assignee: International Business Machines Corporation
    Inventors: Daniel J. Kolor, Scott J. Hadderman
  • Patent number: 6462573
    Abstract: A method and apparatus of interconnecting with a system board is presented. A system board having a metal stiffener mounted thereon is provided with an opening in the stiffener to provide access to an area of interest on the system board. A probe test assembly is positioned at the opening and secured to the stiffener when testing is desired to provide access to the pins of the device under test (e.g., a Multi Chip Module (MCM) on the system board). Alternatively, a system enhancement device, such as a MCM or Single Chip Module (SCM) having additional Central Processing Units (CPU's) or other features, may be installed on the system board at the opening in the stiffener to enhance the function of the system board. Another alternate includes an interface assembly positioned at the opening in the stiffener. A cover is positioned at the opening and secured to the stiffener at all other times.
    Type: Grant
    Filed: March 16, 2000
    Date of Patent: October 8, 2002
    Assignee: International Business Machines Corporation
    Inventors: Michael F. McAllister, Klaus K. Kempter, Charles F. Pells, Stephan R. Richter, Gerhard Ruehle
  • Patent number: 6459810
    Abstract: An exemplary embodiment of the invention is a method for forming variant search strings. The method includes receiving a search string and parsing the search string to locate a mistaken search string character. A mistaken search string character is a character which is confused with other characters. A variant search string is formed in response to a presence of a mistaken search string character in the search string. The search string and variant search string may then be used to search a database. Another exemplary embodiment of the invention is a system for forming variant search strings. The system includes a user interface for receiving a search string. A variant search string generator parses the search string to locate a mistaken search string character. The mistaken search string character is a character which is confused with other characters. The variant search string generator forms a variant search string in response to a presence of a mistaken search string character in the search string.
    Type: Grant
    Filed: September 3, 1999
    Date of Patent: October 1, 2002
    Assignee: International Business Machines Corporation
    Inventor: Christopher T. Cring
  • Patent number: 6442583
    Abstract: A method for managing a workload distributed across data processing systems in accordance with a common processor consumption standard, including the steps of measuring the processor consumption of the work units to create local processor consumption data; sending the local processor consumption data to at least one other system; receiving processor consumption data from at least one other system to create remote processor consumption data; and adjusting at least one of the system control parameters to modify the remote processor consumption and the local processor consumption of the work units to achieve the common processor consumption standard is provided. Also provided is an apparatus according to the method.
    Type: Grant
    Filed: May 1, 1997
    Date of Patent: August 27, 2002
    Assignee: International Business Machines Corporation
    Inventors: Catherine Krueger Eilert, Bernard Roy Pierce
  • Patent number: 6438654
    Abstract: Castout processing for duplexed data structures. A selective data item is written from a primary instance of a data structure to at least one storage medium. A determination is made as to whether the selective data item can be deleted from a secondary instance of the data structure. If the selective data item can be deleted, it is deleted from the secondary instance.
    Type: Grant
    Filed: February 22, 1999
    Date of Patent: August 20, 2002
    Assignee: International Business Machines Corporation
    Inventors: David Arlen Elko, Steven Bruce Jones, Jeffrey W. Josten, Inderpal Singh Narang, Jeffrey M. Nick, Kelly B. Pushong, David Harold Surman, James Zu-Chia Teng
  • Patent number: 6421679
    Abstract: A method of replacing a current version of a program module with a replacement version of the module concurrently with the execution of the program on a computer system. For each entry point within the current version of said module to which the program may make address reference, a corresponding entry point within the replacement version of the module is determined. While execution of the program is suspended, each address reference in the program to an entry point within the current version of the module is replaced with an address reference to the corresponding entry point within the replacement version of the module. Execution of the program is resumed when each address reference to the current module has been replaced with one to the replacement module.
    Type: Grant
    Filed: October 27, 1995
    Date of Patent: July 16, 2002
    Assignee: International Business Machines Corporation
    Inventors: Karen Udy Chang, Roger Eldred Hough, Jeffrey Paul Kubala, Steven Messinger, Michael Burrill Phillips, Ira Glenn Siegel
  • Patent number: 6411292
    Abstract: A computer display system, method and article of manufacture are presented allowing a user to interactively arrange two-dimensional windows for display in three dimensions on a two-dimensional display screen of the computer system. A window manager associated with the display screen is configured to respond to a user's selection of a frame edge of a window, e.g., using a third mouse button, by rotating the window from a two-dimensional depiction to a three-dimensional depiction. Rotation of the window occurs on an edge frame opposite to the selected edge frame and the rotation angle is related to the magnitude that the user drags the pointing device after selection of one edge frame of the window to be swung. In a similar manner, a pointing indicator is superimposed within the rotated window for tracking within the rotated coordinates of the window in response to user manipulation of an associated pointing device.
    Type: Grant
    Filed: March 31, 1999
    Date of Patent: June 25, 2002
    Assignee: International Business Machines Corporation
    Inventors: Thomas E. Cook, Michael D. Essenmacher, Clark A. Goodrich
  • Patent number: 6393455
    Abstract: A technique is disclosed for managing a workload distributed across multiple data processing systems to enhance shared resource access to meet a common performance standard. The technique includes on at least one system, measuring performance of the work units on the system to create local performance data, and on at least some of the systems sending the local performance data to at least one other system of the multiple data processing systems. The method further includes on at least one of the systems, receiving the performance data from the sending systems to create remote performance data, and adjusting at least one control parameter for accessing shared resources in response to the local and remote performance data to modify the performance of the work units distributed across the data processing systems to achieve the common performance standard. A dynamic resource clustering process is also employed to enhance the shared resource management.
    Type: Grant
    Filed: March 28, 1997
    Date of Patent: May 21, 2002
    Assignee: International Business Machines Corp.
    Inventors: Catherine K. Eilert, Peter B. Yocom, Gary M. King, Jeffrey D. Aman
  • Patent number: 6393563
    Abstract: A digital signature system that employs a temporary digital ID signed by using a private key, so that the digital ID can be used as a proxy for a specific period of time and for a specific purpose. When a signature is requested by a server application, a user does not use his or her private key, but employs a temporary key generated using the private key. A temporary certificate for the temporary key is signed using the user's private key. The temporary certificate includes information concerning the period of time during which the temporary certificate is valid and information concerning the purpose for which used. Upon receipt of a request from an application that a document be signed, a client transmits to the server a document signed using the temporary key, the temporary certificate and a user's certificate. First, the server examines the signature; second, it determines whether the temporary certificate is still effective, i.e.
    Type: Grant
    Filed: November 10, 1998
    Date of Patent: May 21, 2002
    Assignee: International Business Machines Corporation
    Inventors: Hiroshi Maruyama, Naohiko Uramoto
  • Patent number: 6389482
    Abstract: When applications connect to a data pipe, which is located on the same system as the connecting applications, the data pipe is considered a local pipe. That is, local media is used to pipe the data. If, however, an application on a different system is to access the pipe, the pipe is transitioned from a local pipe to a cross-system pipe, in which an alternative non-local media is used to pipe the data. The application causing the transition and any other applications to subsequently connect to the pipe use the cross-system pipe. Any local applications still allocated to the pipe are transitioned, such that they now access the cross-system pipe, instead of the local pipe. Likewise, when an application disconnects from a cross-system pipe, such that all remaining connections to the pipe are local connections, the pipe is transitioned from a cross-system pipe to a local pipe.
    Type: Grant
    Filed: August 28, 1997
    Date of Patent: May 14, 2002
    Assignee: International Business Machines Corp.
    Inventors: Roman Anthony Bobak, Scott Brady Compton, Jon Kim Johnson, David Lee Meck, William Robert Richardson
  • Patent number: 6377688
    Abstract: The object of the present invention is to provide a cryptographic communication system that maintains a high level of information security without a sender and a receiver being required to manage a secret key. According to the system of the present invention, a dedicated decryption server that has a secret key is employed in addition to a transmitter used by a sender and a receiver used by a recipient. While the presence of nonencrypted messages in the server is precluded, the server can decrypt an encrypted message and send the decrypted message to an authorized receiver.
    Type: Grant
    Filed: December 31, 1997
    Date of Patent: April 23, 2002
    Assignee: International Business Machines Corporation
    Inventor: Masayuki Numao
  • Patent number: 6377994
    Abstract: In a client/server system, a method and apparatus for handing requests for access to a host resource purportedly on behalf of a client from an untrusted application server that may be capable of operating as a “rogue” server. Upon receiving a service request from a client, an untrusted application server creates a new thread within its address space for the client and obtains from the security server a client security context, which is anchored to the task control block (TCB) for that thread. The client security context specifies the client and indicates whether the client is an authenticated client or an unauthenticated client. When the application server makes a request for access to a host resource purportedly on behalf of the client, the security server examines the security context created for the requesting thread.
    Type: Grant
    Filed: April 15, 1996
    Date of Patent: April 23, 2002
    Assignee: International Business Machines Corporation
    Inventors: Donald Fred Ault, John Carr Dayka, Eric Charles Finkelstein, Richard Henry Guski
  • Patent number: 6351843
    Abstract: A technique is presented for dynamically inserting a function into an existing application executable of an object-oriented system at runtime of the executable and without requiring recompiling of the code. This is accomplished by modifying configuration settings of the executable at runtime to add a setting to specify the function for at least one class of the executable. The modified configuration settings are then used when running the executable and when a class is encountered for which the function is active, a redirection stub is dynamically inserted to implement the function for the methods of that class. In one embodiment, the function is a trace function and the redirection stub implements an entry trace and an exit trace about each target method of a class for which the trace function is active. Various CORBA implementations of the technique are possible.
    Type: Grant
    Filed: August 31, 1998
    Date of Patent: February 26, 2002
    Assignee: International Business Machines Corporation
    Inventors: Donald J. Berkley, Frank J. De Gilio, Mark I. Dinges, Kevin R. Evans, Theodore R. Maeurer
  • Patent number: 6345280
    Abstract: Managing a log stream of a computer system. An entry of a log stream, desired to be removed from the log stream, but not eligible for removal, is logically deleted. Logical deletion keeps the entry on the log stream and indicates that the entry can be removed from the log stream when it is eligible. When the entry is eligible, it is removed. If a desired entry remains at the tail of the log stream for a given period of time, thus not all owing the removal of one or more undesired entries, the desired entry is rewritten to the head of the log stream and deleted from the tail. Thereafter, other logically deleted entries eligible for deletion are removed from the log stream.
    Type: Grant
    Filed: April 23, 1999
    Date of Patent: February 5, 2002
    Assignee: International Business Machines Corporation
    Inventors: Carl Edward Clark, Steven Jay Greenspan, Hiren Ramlal Shah
  • Patent number: 6345312
    Abstract: A technique for selectively dummying a data pipe transparent to a writer application is provided. A writer application writes data to a local data pipe or a cross-system data pipe and one or more reader applications read data from the data pipe. The technique involves determining when a last reader application of the at least one or more reader applications closes the data pipe before the writer application has completed writing data to the data pipe. Upon determining this condition, further writing of data to the data pipe by the writer application is transparently prevented. While transparently preventing writing to a dummied data pipe, writing of data to a fitting, e.g., for a permanent record, can proceed.
    Type: Grant
    Filed: August 28, 1997
    Date of Patent: February 5, 2002
    Assignee: International Business Machines Corporation
    Inventors: Roman Anthony Bobak, Scott Brady Compton, Jon Kim Johnson, David Lee Meck, William Robert Richardson
  • Patent number: 6339824
    Abstract: Public key security control (PKSC) is provided for a cryptographic module by means of digitally signed communications between the module and one or authorities with whom it interacts. Authorities interact with the crypto module by means of unsigned queries seeking nonsecret information or signed commands for performing specified operations. Each command signed by an authority also contains a transaction sequence number (TSN), which must match a corresponding number stored by the crypto module for the authority. The TSN for each authority is initially generated randomly and is incremented for each command accepted from that authority. A signature requirement array (SRA) controls the number of signatures required to validate each command type. Upon receiving a signed command from one or more authorities, the SRA is examined to determine whether a required number of authorities permitted to sign the command have signed the command for each signature requirement specification defined for that command type.
    Type: Grant
    Filed: June 30, 1997
    Date of Patent: January 15, 2002
    Assignee: International Business Machines Corporation
    Inventors: Ronald M. Smith, Sr., Edward J. D'Avignon, Robert S. DeBellis, Randall J. Easter, Lucina L. Green, Michael J. Kelly, William A. Merz, Vincent A. Spano, Phil Chi-Chung Yeh
  • Patent number: 6338090
    Abstract: A method and apparatus for selectively using input/output (I/O) buffers as a retransmit vehicle in a client/server system. The decision whether to use an I/O buffer as a retransmit vehicle is based on a number of factors, including the packet size, the expected round-trip time (RTT) for an acknowledgment of the transmission, the number of I/O buffers currently allocated, and the number of I/O buffers remaining. If the decision is made not to use the I/O buffer as a retransmit vehicle, then the data is copied into a send buffer that is maintained by the system for the particular requester. Initially three threshold values, the round-trip time (RTT) threshold, the critical threshold, and the tight buffer threshold, are set. Connections having a longer round-trip time than a set round-trip time threshold or connections made when the number of I/O buffers remaining is below the critical threshold are not allowed to keep the I/O buffer as a retransmission vehicle.
    Type: Grant
    Filed: March 27, 1998
    Date of Patent: January 8, 2002
    Assignee: International Business Machines Corporation
    Inventors: David B. Emmes, Donald W. Schmidt
  • Patent number: 6336184
    Abstract: A central processing unit of an information handling system is provided with a Trap instruction to facilitate transfer of control from a user program to a trap program. A dispatchable unit control block (DUCT) of the CPU is loaded with the address of a trap control block, which in turn contains the addresses of a trap save area and a trap program. The user program is provided with Trap instructions at the desired transfer points. Upon decoding a Trap instruction in the user program, the CPU saves state information from the program status word (PSW), general registers and access registers in the designated trap save area, loads the address of the trap control block into a general register, and copies the address of the trap program into the instruction address field of the PSW to transfer control to the trap program. Upon completion of execution, the trap program may issue a Resume Program (RP) instruction to restore the previously saved state information to return control to the user program.
    Type: Grant
    Filed: August 14, 1998
    Date of Patent: January 1, 2002
    Assignee: International Business Machines Corporation
    Inventors: Gregory A. Burke, Greg A. Dyck, David E. Lee, Brian B. Moore, Steven J. Repka
  • Patent number: 6333983
    Abstract: A method and apparatus for decrypting an input block encrypted under a predetermined key in a cryptographic system having a cryptographic facility providing cryptographic functions for transforming blocks of data. The cryptographic functions include an encryption function for encrypting a block under a predetermined key and a transformation function for transforming a block encrypted under a first key to the same block encrypted under a second key. The cryptographic functions have at least one key pair with the property that successive encryption of a block under the keys of the pair regenerates the block in clear form. The input block is first transformed into an intermediate block encrypted under one of the key pair using the transformation function. The intermediate block is then further encrypted under the other of the key pair using the encryption function to generate an output block successively encrypted under the keys of pair, thereby to regenerate the input block in clear form.
    Type: Grant
    Filed: December 16, 1997
    Date of Patent: December 25, 2001
    Assignee: International Business Machines Corporation
    Inventors: Margaret C. Enichen, Ronald M. Smith, Sr., Phil Chi-Chung Yeh