Patents by Inventor David Carroll Challener

David Carroll Challener has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8140795
    Abstract: The invention partitions the HDD into three areas, namely, no access, write-only, and the conventional read/write. Sensitive data (antivirus programs, back up data, etc.) is written into write-only areas, which thereafter become designated “no access” by appropriately changing their designation a data structure known as “logical block address” or “LBA”. Only users having approved passwords can change the status of a “no access” block back to “write-only” or “read/write”.
    Type: Grant
    Filed: February 28, 2005
    Date of Patent: March 20, 2012
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: David Carroll Challener, Rod David Waltermann
  • Patent number: 8089468
    Abstract: An approach is provided that identifies when a wireless keyboard unit is connected to an information handling system that includes a display screen that is partially blocked when the keyboard is attached. A determination is made as to the size of the visible portion of the display screen. Items are displayed on the visible portion of the display screen. The approach refrains from displaying items on the blocked portion of the display screen. The user is able to move the wireless keyboard, the movement of the keyboard resulting in a changed size of the visible portion of the display screen. After the keyboard is repositioned, the visual items are re-displayed on the visible portion of the display screen so that the items fit in the changed size of the visible portion of the display screen.
    Type: Grant
    Filed: August 15, 2008
    Date of Patent: January 3, 2012
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: Howard Locker, David Carroll Challener, Daryl Carvis Cromer, Qian Ying Wang
  • Patent number: 8090962
    Abstract: A system, method, and program product is provided that detects whether a network adapter has been removed from a computer system. If the network adapter, such as a wireless network adapter, has been removed from the computer system, then a tamper evident indicator (e.g., bit) is set in a nonvolatile memory area of the computer system. In addition, a hard drive password is set to a different password according to a hard drive password policy. The hard drive password controls access to files stored on the hard drive. In one embodiment, the power-on password is also changed to a new password so that the user has to enter the new power-on password when initializing the computer system in order to access the files stored on the computer system.
    Type: Grant
    Filed: March 19, 2008
    Date of Patent: January 3, 2012
    Assignee: Lenoro (Singapore) Pte. Ltd.
    Inventors: David Carroll Challener, Justin Tyler Dubs, James Joseph Thrasher, Michael Terrell Vanover
  • Publication number: 20110244841
    Abstract: Apparatus, systems, and methods provide digital voice call redirection. A configuration module associates a phone number with a first identifier of a first voice terminal device and a second identifier of a second voice terminal device provided by an address module. A location module determines whether the first device is within a predefined proximity to the second device, such as by detecting connectivity between the devices, over a personal area network (“PAN”). A routing module redirects a digital voice call to a call module of the first device using the first identifier when the first device is not within the predefined proximity to the second device. Otherwise the routing module directs the call to a call module of the second device using the second identifier.
    Type: Application
    Filed: March 31, 2010
    Publication date: October 6, 2011
    Applicant: LENOVO (SINGAPORE) PTE, LTD.
    Inventors: Howard J. Locker, David Carroll Challener, Daryl C. Cromer, Randall Scott Springfield
  • Publication number: 20110238967
    Abstract: A method and apparatus are disclosed for sharing an integrity security module in a dual-environment computing device. The apparatus include an integrity security module, one or more processors, a detection module and a regeneration module. The one or more processors may have access to the integrity security module and may operate in two distinct operating environments of a dual-environment computing device. The detection module may detect, during an initialization sequence, a power state transition of an operating environment of the dual-environment computing device. The regeneration module may regenerate one or more integrity values from a stored integrity metric log in response to detecting the power state transition of the operating environment of the dual-environment computing device.
    Type: Application
    Filed: March 29, 2010
    Publication date: September 29, 2011
    Applicant: LENOVO (SINGAPORE) PTE, LTD.
    Inventors: David Carroll Challener, Daryl C. Cromer, Howard J. Locker, Randall Scott Springfield
  • Publication number: 20110231671
    Abstract: An apparatus, system, and method are disclosed for auditing access to secure data. A detection module detects an access to the secure data. A record module records an encrypted log entry describing the access to the secure data. A verification module verifies the secure data is securely stored.
    Type: Application
    Filed: March 17, 2010
    Publication date: September 22, 2011
    Applicant: LENOVO (SINGAPORE) PTE, LTD.
    Inventors: Howard J. Locker, David Carroll Challener, Mark Charles Davis, Randall Scott Springfield
  • Patent number: 8024579
    Abstract: A system and method for authenticating suspect code includes steps of: receiving the suspect code for a first instance of a trusted platform module; loading the suspect code into a trusted platform module device operatively associated with a processor, wherein the suspect code is loaded outside of a shielded location within the trusted platform module device; retrieving a validation public key from a table and storing it in a register in the trusted platform module device, the validation public key indexed by the suspect code; and retrieving a hash algorithm from the table, the hash algorithm indexed by the suspect code. The hash algorithm is run to derive a first hash value; then, using the validation public key, the second hash value is decrypted to derive a second decrypted hash value. The two hash values are compared; and upon determining a match, the suspect code is loaded into the shielded location of the processor for execution by the processor.
    Type: Grant
    Filed: December 29, 2006
    Date of Patent: September 20, 2011
    Assignee: Lenovo (Singapore) PTE Ltd.
    Inventors: David Carroll Challener, John H. Nicholson, Joseph Michael Pennisi, Rod D. Waltermann
  • Patent number: 7861079
    Abstract: A method and system for ensuring security-compliant creation and signing of endorsement keys of manufactured TPMs. The endorsement keys are generated for the TPM. The TPM vendor selects an N-byte secret and stores the N-byte secret in the TPM along with the endorsement keys. The secret number cannot be read outside of the TPM. The secret number is also provided to the OEM's credential server. During the endorsement key (EK) credential process, the TPM generates an endorsement key, which comprises both the public key and a hash of the secret and the public key. The credential server matches the hash within the endorsement key with a second hash of the received public key (from the endorsement key) and the vendor provided secret. The EK certificate is generated and inserted into the TPM only when a match is confirmed.
    Type: Grant
    Filed: September 21, 2007
    Date of Patent: December 28, 2010
    Assignee: International Business Machines Corporation
    Inventors: Ryan Charles Catherman, David Carroll Challener, James Patrick Hoff
  • Patent number: 7841000
    Abstract: Protection of an authentication password stored in a database held by a SAM of Windows® is strengthened. A GINA, a part of the OS, receives an authentication password in ASCII codes. The authentication password is converted to first UNICODES, and the first UNICODES are salted with a random number and converted to second UNICODES. The random number used for salting is associated with a user account and a password and stored in a read/write protected non-volatile memory or a non-volatile memory which can be accessed only by a BIOS. An LSA of the OS can process UNICODES without being changed.
    Type: Grant
    Filed: October 16, 2006
    Date of Patent: November 23, 2010
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: Seiichi Kawano, Yuji Sugiyama, David Carroll Challener, Philip Lee Childs, Norman Arthur Dion, II
  • Patent number: 7814321
    Abstract: To unlock a HDD when a computer is in the suspend state, at both BIOS and the HDD a secret is combined with a password to render a new one-time password. BIOS sends its new one-time password to the HDD which unlocks itself only if a match is found. The new one-time password is then saved as an “old” password for subsequent combination with the secret when coming out of subsequent suspend states. In this way, if a computer is stolen the thief cannot sniff the bus between BIOS and the HDD to obtain a password that is of any use once the computer ever re-enters the suspend state.
    Type: Grant
    Filed: April 19, 2007
    Date of Patent: October 12, 2010
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: David Carroll Challener, Howard Jeffrey Locker, Randall Scott Springfield
  • Patent number: 7779454
    Abstract: A system and method for using a client-side hypervisor in conjunction with a secure network-side monitoring mechanism to detect removable media insertions since a client's last network session with the secure network is presented. The hypervisor uses a “client-side insertion value” to track the number of times that a user inserts removable media into a socket located on the client. When the client is connected to the secure network, the client's hypervisor notifies the secure network of each insertion and the secure network increments a “secure network-side tracker value.” For each login request, the client includes the client-side insertion value, which the secure network compares against its secure network-side tracker value. When the two values are different, the secure network sends an action request to the client, such as a request to perform a full system scan.
    Type: Grant
    Filed: November 29, 2006
    Date of Patent: August 17, 2010
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: David Carroll Challener, Daryl Cromer, Howard Jeffrey Locker, Randall Scott Springfield
  • Publication number: 20100205375
    Abstract: A method, apparatus, and system are disclosed of forward caching for a managed client. A storage module stores a software image on a storage device of a backend server. The backend server provides virtual disk storage on the storage device through a first intermediate network point for a plurality of diskless data processing devices. Each diskless data processing device communicates directly with the first intermediate network point. The storage module caches an image instance of the software image at the first intermediate network point. A tracking module detects an update to the software image on the storage device. The storage module copies the updated software image to the first intermediate network point as an updated image instance.
    Type: Application
    Filed: February 10, 2009
    Publication date: August 12, 2010
    Applicant: LENOVO (SINGAPORE) PTE, LTD.
    Inventors: David Carroll Challener, Richard Wayne Cheston, Howard Locker, Randall Scott Springfield, Rod D. Waltermann
  • Patent number: 7751568
    Abstract: A method and system for ensuring security-compliant creation and certificate generation for endorsement keys of manufactured TPMs. The endorsement keys are generated by the TPM manufacturer and stored within the TPM. The TPM manufacturer also creates a signing key pair and associated signing key certificate. The signing key pair is also stored within the TPM, while the certificate is provided to the OEM's credential server. During the endorsement key (EK) credential process, the TPM generates a signed endorsement key, which comprises the public endorsement key signed with the public signing key. The credential server matches the public signing key of the endorsement key with a public signing key within the received certificate. The EK certificate is generated and inserted into the TPM only when a match is confirmed.
    Type: Grant
    Filed: December 31, 2003
    Date of Patent: July 6, 2010
    Assignee: International Business Machines Corporation
    Inventors: Ryan Charles Catherman, David Carroll Challener, James Patrick Hoff
  • Patent number: 7747024
    Abstract: A system, method, and program product is provided that uses environments to control access to encryption keys. A request for an encryption key and an environment identifier is received. If the encryption key is not associated with the environment identifier, the request is denied. If they are associated, the system receives user-supplied environment authentication data items from a user. Examples of environment authentication data include passwords, user identifiers, user biometric data (e.g., fingerprint scan, etc.), smart cards, and the like. The system retrieves stored environment authentication data items from a secure (e.g., encrypted) storage location. The retrieved stored environment authentication data items correspond to the environment identifier that was received. The received environment authentication data items are authenticated using the retrieved stored environment authentication data items.
    Type: Grant
    Filed: February 9, 2007
    Date of Patent: June 29, 2010
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventor: David Carroll Challener
  • Publication number: 20100158253
    Abstract: A system, method, and program product is provided that uses environments to control access to encryption keys. A request for an encryption key and an environment identifier is received. If the encryption key is not associated with the environment identifier, the request is denied. If they are associated, the system receives user-supplied environment authentication data items from a user. Examples of environment authentication data include passwords, user identifiers, user biometric data (e.g., fingerprint scan, etc.), smart cards, and the like. The system retrieves stored environment authentication data items from a secure (e.g., encrypted) storage location. The retrieved stored environment authentication data items correspond to the environment identifier that was received. The received environment authentication data items are authenticated using the retrieved stored environment authentication data items.
    Type: Application
    Filed: March 4, 2010
    Publication date: June 24, 2010
    Applicant: Lenovo (Singapore) Pte. Ltd.
    Inventor: David Carroll Challener
  • Publication number: 20100146317
    Abstract: An apparatus, system, and method are disclosed for computer system power management. A control module 602 is activated on a computer 200 in response to an event and enters 818 a standby state if the computer 200 is not already 814 in the standby state. A policy module 604 detects 904 a power source of a predetermined type connected to the computer 200 and dictates 908 one or more processors 302 of higher power consumption for a more abundant type of power source such as an AC adapter 314, or one or more processors 304 of lower power consumption for a less abundant type of power source such as a battery 318. A configuration module 606, activated by the control module 602, switches 1004 the computer 200 to one or more processors 302 and 304 of a predetermined power consumption as dictated and exits 1016 the standby state.
    Type: Application
    Filed: December 8, 2008
    Publication date: June 10, 2010
    Applicant: LENOVO (SINGAPORE) PTE, LTD.
    Inventors: David Carroll Challener, Daryl Cromer, Howard Locker, Randall Scott Springfield
  • Publication number: 20100122250
    Abstract: An apparatus, system, and method are disclosed for granting hypervisor privileges. An installation module installs a monitor hypervisor wherein only the monitor hypervisor is granted the hypervisor privileges by the computer. An authentication module authenticates a second hypervisor. An eviction module evicts the monitor hypervisor if the second hypervisor is authenticated.
    Type: Application
    Filed: November 12, 2008
    Publication date: May 13, 2010
    Applicant: LENOVO (SINGAPORE) PTE, LTD.
    Inventors: David Carroll Challener, Mark Charles Davis, Randall Scott Springfield, Rod D. Waltermann
  • Publication number: 20100115256
    Abstract: An apparatus, system, and method are disclosed for quiescing a boot environment. A reservation module reserves a portion of a first storage device. A store module stores an update boot image to the reserved portion. A detection module detects the update boot image stored on the first storage device when the computer boots and executes the update boot image in place of a standard boot image in response to detecting the update boot image. The update boot image places a computer in a known quiescent state.
    Type: Application
    Filed: November 6, 2008
    Publication date: May 6, 2010
    Applicant: LENOVO (SINGAPORE) PTE, LTD.
    Inventors: David Carroll Challener, Howard Locker, Joseph Michael Pennist, Randall Scott Springfield
  • Publication number: 20100106994
    Abstract: A method, apparatus, and system are disclosed for adapting power consumption. A recording module records a usage record for each component within a computer at scheduled audit times. The usage record comprises a usage level, an application list, a time stamp, a network access point, a computation category, a time category, and a location category. A scenario module creates a plurality of usage scenarios. Each usage scenario comprises a unique combination of a specified computation category, a specified time category, and a specified location category. A profile module creates a power setting profile for each usage scenario. Each power setting profile specifies a target power status for each component of the computer. A scenario detection module detects a first usage scenario. An adjustment module sets a power status of each component to the first usage scenario target power status for the component.
    Type: Application
    Filed: October 27, 2008
    Publication date: April 29, 2010
    Inventors: David Carroll Challener, Harriss Christopher Neil Ganey, Howard Locker
  • Publication number: 20100083366
    Abstract: An approach is provided that receives a user identifier from a user of the information handling system. The user identifier can include a username as well as a user authentication code, such as a password. Hardware settings that correspond to the user identifier are retrieved from a nonvolatile memory. Hardware devices, such as ports (e.g., USB controller), network interfaces, storage devices, and boot sequences, are configured using the retrieved hardware settings. After the hardware devices have been configured to correspond to the identified user, an operating system is booted.
    Type: Application
    Filed: October 1, 2008
    Publication date: April 1, 2010
    Inventors: David Carroll Challener, Howard Jeffrey Locker, Joseph Michael Pennisi, Randall Scott Springfield