Patents by Inventor Chad Lee Gettelfinger
Chad Lee Gettelfinger has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7174465Abstract: A method is disclosed for securely updating system attributes of a client computer with a BIOS and includes signing a public key of a secure server with a private key of the BIOS prior to completion of manufacturing of the client computer to create an encrypted public key and embedded private key stored at the server. The method includes receiving at the server a request packet transmitted from the client computer requesting system attribute modification, encrypting the request packet to create an encrypted packet, and transmitting a return packet to client computer comprising the encrypted packet, the server's public key, and server instructions. The client computer decrypts the request packet using the server's public key and compares it to the original request packet, and if identical, executes the server instructions to modify the client computer's boot block to update client computer's system attributes.Type: GrantFiled: June 26, 2002Date of Patent: February 6, 2007Assignee: Lenovo Singapore Pte, LtdInventors: Joseph Wayne Freeman, Chad Lee Gettelfinger, Steven Dale Goodman, William Fred Keown, Jr., Eric Richard Kern, Randall Scott Springfield
-
Patent number: 7082129Abstract: In a computer network including a plurality of interconnected computers, one of the computers being a sleeping computer in a power down state, the sleeping computer listening for a packet associated with the sleeping computer, a method and system of waking the sleeping computer from the computer network. An incoming packet of data is transmitted from one of the computers in the network to the sleeping computer. When the sleeping computer detects the incoming packet, it determines if the incoming packet contains a data sequence associated with the sleeping computer. Further, the sleeping computer compares a transit value in the incoming packet to a predetermined value stored at the sleeping computer. The transit value indicates how far the data packet has traveled through the network, indicating the approximate origin of the data packet. Knowing the approximate origin of the data packet allows the client system to identify if the data packet originated from an external network.Type: GrantFiled: April 29, 2002Date of Patent: July 25, 2006Assignee: International Business Machines CorporationInventors: Daryl Carvis Cromer, Joseph Wayne Freeman, Chad Lee Gettelfinger, Steven Dale Goodman, Eric Richard Kern, Randall Scott Springfield
-
Patent number: 7017052Abstract: A method for reducing the boot time for a computer includes: supplying power to the computer; disabling a plurality of input/output (I/O) devices coupled to the computer; performing a boot process for the computer; and placing the computer in a suspend to memory state before a user turns on the computer. The method reduces the boot time for a computer by placing the computer in a suspend to memory mode rather than completely shutting off the computer. In this manner, when a user of the computer pushes the power button, the computer wakes up from the suspend to memory mode instead of being required to perform the entire boot process. This significantly reduces the time required to make the computer available to the user, allowing the computer to function like an appliance.Type: GrantFiled: November 16, 2001Date of Patent: March 21, 2006Assignee: Lenovo Pte. Ltd.Inventors: Ameha Aklilu, Kamran Amini, Jordan Hsiao Ping Chin, James Alexander Day, Jr., Chad Lee Gettelfinger, Eric Richard Kern
-
Patent number: 6990515Abstract: In a computer network including a plurality of interconnected computers, one of the computers being a sleeping computer in a power down state, the sleeping computer listening for a packet associated with the sleeping computer, a method of waking the sleeping computer from the computer network. An incoming packet of data is transmitted from an administration system in the network to the sleeping computer. When the sleeping computer detects the incoming packet, it determines if the incoming packet contains a data sequence associated with the sleeping computer. If the incoming packet matches the particular data sequence associated with the sleeping computer, the sleeping computer transmits a reply message to the administration system. Upon receiving the reply, the administration system modifies the reply message in a predetermined manner and transmits the modified reply to the sleeping computer.Type: GrantFiled: April 29, 2002Date of Patent: January 24, 2006Assignee: International Business Machines CorporationInventors: Daryl Carvis Cromer, Joseph Wayne Freeman, Chad Lee Gettelfinger, Steven Dale Goodman, Eric Richard Kern, Randall Scott Springfield
-
Patent number: 6782349Abstract: A method and system for updating a root of trust measurement (RTM) function in a personal computer is disclosed. The RTM function is located in a boot block of the personal computer. The method and system comprise initializing a request to update the RTM function and unlocking the boot block based on an authentication process. The method and system further includes updating the RTM function. Through the use of the method and system in accordance with the present invention, the RTM function in a personal computer is updated in a manner that ensures that the update is authentic.Type: GrantFiled: May 3, 2002Date of Patent: August 24, 2004Assignee: International Business Machines CorporationInventors: David Carroll Challener, Chad Lee Gettelfinger, Steven Dale Goodman, Hernando Ovies, Randall Scott Springfield, James Peter Ward
-
Publication number: 20040006700Abstract: The disclosed methods enable users to securably modify system attributes of completed computer systems, without requiring that the system be returned to their manufacturer or that the system be “overhauled.” The methods of the present invention permit manufacturing cost savings and efficiencies, while allowing existing built inventory to be modified to meet current market demands without the need to recall built systems back to the origin of manufacture.Type: ApplicationFiled: June 26, 2002Publication date: January 8, 2004Applicant: International Business Machines CorporationInventors: Joseph Wayne Freeman, Chad Lee Gettelfinger, Steven Dale Goodman, William Fred Keown, Eric Richard Kern, Randall Scott Springfield
-
Publication number: 20030208338Abstract: A method and system for updating a root of trust measurement (RTM) function in a personal computer is disclosed. The RTM function is located in a boot block of the personal computer. The method and system comprise initializing a request to update the RTM function and unlocking the boot block based on an authentication process. The method and system further includes updating the RTM function. Through the use of the method and system in accordance with the present invention, the RTM function in a personal computer is updated in a manner that ensures that the update is authentic.Type: ApplicationFiled: May 3, 2002Publication date: November 6, 2003Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David Carroll Challener, Chad Lee Gettelfinger, Steven Dale Goodman, Hernando Ovies, Randall Scott Springfield, James Peter Ward
-
Publication number: 20030204746Abstract: In a computer network including a plurality of interconnected computers, one of the computers being a sleeping computer in a power down state, the sleeping computer listening for a packet associated with the sleeping computer, a method of waking the sleeping computer from the computer network. An incoming packet of data is transmitted from an administration system in the network to the sleeping computer. When the sleeping computer detects the incoming packet, it determines if the incoming packet contains a data sequence associated with the sleeping computer. If the incoming packet matches the particular data sequence associated with the sleeping computer, the sleeping computer transmits a reply message to the administration system. Upon receiving the reply, the administration system modifies the reply message in a predetermined manner and transmits the modified reply to the sleeping computer.Type: ApplicationFiled: April 29, 2002Publication date: October 30, 2003Applicant: International Business Machines CorporationInventors: Daryl Carvis Cromer, Joseph Wayne Freeman, Chad Lee Gettelfinger, Steven Dale Goodman, Eric Richard Kern, Randall Scott Springfield
-
Publication number: 20030202514Abstract: In a computer network including a plurality of interconnected computers, one of the computers being a sleeping computer in a power down state, the sleeping computer listening for a packet associated with the sleeping computer, a method and system of waking the sleeping computer from the computer network. An incoming packet of data is transmitted from one of the computers in the network to the sleeping computer. When the sleeping computer detects the incoming packet, it determines if the incoming packet contains a data sequence associated with the sleeping computer. Further, the sleeping computer compares a transit value in the incoming packet to a predetermined value stored at the sleeping computer. The transit value indicates how far the data packet has traveled through the network, indicating the approximate origin of the data packet. Knowing the approximate origin of the data packet allows the client system to identify if the data packet originated from an external network.Type: ApplicationFiled: April 29, 2002Publication date: October 30, 2003Applicant: International Business Machines CorporationInventors: Daryl Carvis Cromer, Joseph Wayne Freeman, Chad Lee Gettelfinger, Steven Dale Goodman, Eric Richard Kern, Randall Scott Springfield
-
Publication number: 20030097598Abstract: A method for reducing the boot time for a computer includes: supplying power to the computer; disabling a plurality of input/output (I/O) devices coupled to the computer; performing a boot process for the computer; and placing the computer in a suspend to memory state before a user turns on the computer. The method reduces the boot time for a computer by placing the computer in a suspend to memory mode rather than completely shutting off the computer. In this manner, when a user of the computer pushes the power button, the computer wakes up from the suspend to memory mode instead of being required to perform the entire boot process. This significantly reduces the time required to make the computer available to the user, allowing the computer to function like an appliance.Type: ApplicationFiled: November 16, 2001Publication date: May 22, 2003Applicant: International Business Machines CorporationInventors: Ameha Aklilu, Kamran Amini, Jordan Hsiao Ping Chin, James Alexander Day, Chad Lee Gettelfinger, Eric Richard Kern