Patents by Inventor David Carroll Challener

David Carroll Challener has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7523319
    Abstract: When data changes in LBAs of a disk storage, the IDs of changed LBAs are written to a cache, with the LBAs being hashed to render a hash result. The hash result and contents of the cache are written to a file on the disk, the cache flushed, and the hash result written back to the cache for hashing together with subsequent changed LBAs. The process repeats. In this way, the hash result in the most current file on the disk can be compared with the hash result in cache, and if the two match, it indicates that the files on the disk contain an accurate record of changed LBAs.
    Type: Grant
    Filed: November 16, 2005
    Date of Patent: April 21, 2009
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: David Carroll Challener, Rod David Waltermann
  • Publication number: 20090083534
    Abstract: A method computer usable medium and computer system circuitry are disclosed for starting or “booting up” a computer from a remote location using a remote command device such as a cellular telephone. The method and system includes a secure means for remotely storing and transmitting security passwords.
    Type: Application
    Filed: September 26, 2007
    Publication date: March 26, 2009
    Applicant: Lenovo (Singapore) Pte. Ltd.
    Inventors: David Carroll Challener, Daryl Cromer, Howard Locker, Randall Scott Springfield
  • Publication number: 20090083539
    Abstract: A method and system for ensuring security-compliant creation and signing of endorsement keys of manufactured TPMs. The endorsement keys are generated for the TPM. The TPM vendor selects an N-byte secret and stores the N-byte secret in the TPM along with the endorsement keys. The secret number cannot be read outside of the TPM. The secret number is also provided to the OEM's credential server. During the endorsement key (EK) credential process, the TPM generates an endorsement key, which comprises both the public key and a hash of the secret and the public key. The credential server matches the hash within the endorsement key with a second hash of the received public key (from the endorsement key) and the vendor provided secret. The EK certificate is generated and inserted into the TPM only when a match is confirmed.
    Type: Application
    Filed: September 21, 2007
    Publication date: March 26, 2009
    Inventors: Ryan Charles Catherman, David Carroll Challener, James Patrick Hoff
  • Publication number: 20090083555
    Abstract: A method and system are disclosed for placing a computer in a safe and secure lock down state from a remote location using a remote command device such as a cellular telephone. The method and system includes optional security provisions before restarting the computer.
    Type: Application
    Filed: September 26, 2007
    Publication date: March 26, 2009
    Applicant: Lenovo (Singapore) Pte. Ltd.
    Inventors: David Carroll Challener, Daryl Cromer, Howard Locker, Randall Scott Springfield
  • Patent number: 7484241
    Abstract: Methods and arrangements are disclosed for secure single sign on to an operating system using only a power-on password. In many embodiments modified BIOS code prompts for, receives and verifies the power-on password. The power-on password is hashed and stored in a Platform Configuration Register of the Trusted Platform Module. In a setup mode, the trusted platform module encrypts the operating system password using the hashed power-on password. In a logon mode, the trusted platform module decrypts the operating system password using the hashed power-on password.
    Type: Grant
    Filed: November 22, 2004
    Date of Patent: January 27, 2009
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: David Carroll Challener, Steven Dale Goodman, James Patrick Hoff, David Rivera, Randall Scott Springfield
  • Publication number: 20080263378
    Abstract: To unlock a HDD when a computer is in the suspend state, at both BIOS and the HDD a secret is combined with a password to render a new one-time password. BIOS sends its new one-time password to the HDD which unlocks itself only if a match is found. The new one-time password is then saved as an “old” password for subsequent combination with the secret when coming out of subsequent suspend states. In this way, if a computer is stolen the thief cannot sniff the bus between BIOS and the HDD to obtain a password that is of any use once the computer ever re-enters the suspend state.
    Type: Application
    Filed: April 19, 2007
    Publication date: October 23, 2008
    Inventors: David Carroll Challener, Howard Jeffrey Locker, Randall Scott Springfield
  • Publication number: 20080244569
    Abstract: A system, method, and program product is provided that executes a start sequence of an information handling system that includes a hardware based TPM. Multiple PCRs are stored in the TPM and are initialized to a predetermined state when the start sequence commences. During execution of the start sequence, software modules, including a hypervisor, are loaded the system's memory. PCR values resulting from the loading of the software modules are calculated. The resulting PCR values are compared with expected PCR values. If the PCR values match the expected PCR values, then a virtual environment is created under the hypervisor. The virtual environment includes a VM and a virtual trust platform module (vTPM) that is used by the virtual machine to satisfy the virtual machines TPM requests.
    Type: Application
    Filed: March 30, 2007
    Publication date: October 2, 2008
    Inventors: David Carroll Challener, Mark Charles Davis
  • Patent number: 7421588
    Abstract: An apparatus, method, and system to seal a data repository to a trusted computing platform is described. The data repository may be sealed by encrypting the data on the repository and sealing a cryptographic key to a specific set of platform resources. With the data repository sealed to the platform, the system boot sequence will fail if the system configuration is compromised, for example by insertion of “snoopware” or a modified BIOS. Additionally, if the computer containing the data repository is lost or stolen, the encrypted data remains secure even if the repository is attached to a system modified to bypass normal safeguards.
    Type: Grant
    Filed: December 30, 2003
    Date of Patent: September 2, 2008
    Assignee: Lenovo Pte Ltd
    Inventors: David Carroll Challener, Joseph Wayne Freeman, Steven Dale Goodman, Randall Scott Springfield
  • Publication number: 20080192937
    Abstract: A system, method, and program product is provided that uses environments to control access to encryption keys. A request for an encryption key and an environment identifier is received. If the encryption key is not associated with the environment identifier, the request is denied. If they are associated, the system receives user-supplied environment authentication data items from a user. Examples of environment authentication data include passwords, user identifiers, user biometric data (e.g., fingerprint scan, etc.), smart cards, and the like. The system retrieves stored environment authentication data items from a secure (e.g., encrypted) storage location. The retrieved stored environment authentication data items correspond to the environment identifier that was received. The received environment authentication data items are authenticated using the retrieved stored environment authentication data items.
    Type: Application
    Filed: February 9, 2007
    Publication date: August 14, 2008
    Inventor: David Carroll Challener
  • Patent number: 7412596
    Abstract: A method and system for enabling security attestation for a computing device during a return from an S4 sleep state. When the computing device enters into the S4 state following a successful boot up, the attestation log is appended to the TPM tick count and the log is signed (with a security signature). When the device is awaken from S4 state, the BIOS obtains and verifies the log created during the previous boot. The CRTM maintains a set of virtual PCRs and references these virtual PCRs against the log. If the values do not match, the return from S4 state fails and the device is rebooted.
    Type: Grant
    Filed: October 16, 2004
    Date of Patent: August 12, 2008
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: David Carroll Challener, Daryl Carvis Cromer, Joseph Wayne Freeman, Steven Dale Goodman, James Patrick Hoff, Howard Jeffrey Locker, Randall Scott Springfield, James Peter Ward
  • Publication number: 20080162932
    Abstract: A system and method for authenticating suspect code includes steps of: receiving the suspect code for a first instance of a trusted platform module; loading the suspect code into a trusted platform module device operatively associated with a processor, wherein the suspect code is loaded outside of a shielded location within the trusted platform module device; retrieving a validation public key from a table and storing it in a register in the trusted platform module device, the validation public key indexed by the suspect code; and retrieving a hash algorithm from the table, the hash algorithm indexed by the suspect code. The hash algorithm is run to derive a first hash value; then, using the validation public key, the second hash value is decrypted to derive a second decrypted hash value. The two hash values are compared; and upon determining a match, the suspect code is loaded into the shielded location of the processor for execution by the processor.
    Type: Application
    Filed: December 29, 2006
    Publication date: July 3, 2008
    Applicant: Lenovo (Singapore) PTE Ltd.
    Inventors: David Carroll Challener, John H. Nicholson, Joseph Michael Pennisi, Rod D. Waltermann
  • Publication number: 20080148064
    Abstract: An apparatus, system, and method are disclosed for authentication of a core root of trust measurement chain. The apparatus for authentication of a CRTM chain is provided with a plurality of modules configured to carry out the steps of retrieving a decryption key from a predetermined location on the device selected for authentication, decrypting an authentication signal using the decryption key, and communicating the decrypted authentication signal to a user. In the described embodiments, these modules include a retrieval module, a decryption module, and a communication module. Beneficially, such an apparatus, system, and method would reliably verify that a link in the CRTM chain has not been corrupted, modified, or infected with a computer virus. Specifically, such an apparatus, system, and method would enable verification that the hypervisor has not been corrupted, modified, or infected with a computer virus.
    Type: Application
    Filed: December 18, 2006
    Publication date: June 19, 2008
    Inventors: David Carroll Challener, Howard Locker, Randall Scott Springfield, Rod D. Waltermann
  • Patent number: 7389536
    Abstract: Access to secure data through a portable computing system is provided only when a timer within the system is running. The timer is reset with the portable system connected to a base system, either directly, as by a cable, or indirectly, as through a telephone network. In an initialization process, the portable and base systems exchange data, such as public cryptographic keys, which are later used to confirm that the portable system is connected to the same base system. In one embodiment, the initialization process also includes storing a password transmitted from the portable system within the base system, with this password later being required within the reset process.
    Type: Grant
    Filed: November 14, 2001
    Date of Patent: June 17, 2008
    Assignee: Lenovo Singapore Pte Ltd.
    Inventors: David Carroll Challener, Ernest Nelson Mandese, Hernando Ovies, James Peter Ward
  • Publication number: 20080140575
    Abstract: An apparatus, system, and method are disclosed for securely authorizing changes to a transaction restriction. A security module securely stores encryption keys for a payment instrument. The payment instrument electronically transacts payments and includes a transaction restriction. An authentication module receives an authentication from a user of the payment instrument. The security module validates the authentication with a first encryption key. In addition, the security module authorizes a change to the transaction restriction using a second encryption key if the authentication is valid. The security module resides on a computer that the user designates as authorized to validate the authentication.
    Type: Application
    Filed: December 12, 2006
    Publication date: June 12, 2008
    Inventors: Stacy John Cannady, David Carroll Challener, Daryl Cromer, Mark Charles Davis, David Rivera, Randall Scott Springfield, Rod D. Waltermann
  • Publication number: 20080133905
    Abstract: An apparatus, system, and method are disclosed for remotely accessing a shared password. A storage module stores identifiers, passwords, and keys within a secure key structure of a client. The passwords and keys include a shared password encrypted with a shared password key that is encrypted with a service structure key. The storage module also stores the service structure key encrypted with a key derived from a service password on a trusted server. An input/output module accesses the trusted server from the client with a prospective service password and receives the encrypted service structure key from the trusted server if a hash of the prospective service password is equivalent to the service password. An encryption module may decrypt the service structure key with the prospective service password, the shared password key with the service structure key, and the shared password with the shared password key.
    Type: Application
    Filed: November 30, 2006
    Publication date: June 5, 2008
    Inventors: David Carroll Challener, Seiichi Kawano, Randall Scott Springfield, Rod D. Waltermann
  • Publication number: 20080127309
    Abstract: A system and method for using a client-side hypervisor in conjunction with a secure network-side monitoring mechanism to detect removable media insertions since a client's last network session with the secure network is presented. The hypervisor uses a “client-side insertion value” to track the number of times that a user inserts removable media into a socket located on the client. When the client is connected to the secure network, the client's hypervisor notifies the secure network of each insertion and the secure network increments a “secure network-side tracker value.” For each login request, the client includes the client-side insertion value, which the secure network compares against its secure network-side tracker value. When the two values are different, the secure network sends an action request to the client, such as a request to perform a full system scan.
    Type: Application
    Filed: November 29, 2006
    Publication date: May 29, 2008
    Inventors: David Carroll Challener, Daryl Cromer, Howard Jeffrey Locker, Randall Scott Springfield
  • Publication number: 20080120510
    Abstract: An end user or IT owner via the use of an application specifies which TPM is to be loaded or which TPM operation is to be invoked given the authenticated presentation of a biometric such as a fingerprint or a token such as a smart card. A secure table stored in the microcontroller made up of TPM hashes and their corresponding endorsement keys is indexed to these authentication records. The microcontroller compares a received biometric or smart card value to the stored values to determine which TPM emulator to load. This architecture uniquely stores individually secured algorithms, and applications that can be bound to the user and the system on which they are running.
    Type: Application
    Filed: November 20, 2006
    Publication date: May 22, 2008
    Inventors: David Carroll Challener, John Hancock Nicholson, Joseph Michael Pennisi, Rod David Waltermann
  • Publication number: 20080092216
    Abstract: Protection of an authentication password stored in a database held by a SAM of Windows® is strengthened. A GINA, a part of the OS, receives an authentication password in ASCII codes. The authentication password is converted to first UNICODES, and the first UNICODES are salted with a random number and converted to second UNICODES. The random number used for salting is associated with a user account and a password and stored in a read/write protected non-volatile memory or a non-volatile memory which can be accessed only by a BIOS. An LSA of the OS can process UNICODES without being changed.
    Type: Application
    Filed: October 16, 2006
    Publication date: April 17, 2008
    Inventors: Seiichi Kawano, Yuji Sugiyama, David Carroll Challener, Philip Lee Childs, Norman Arthur Dion
  • Patent number: 7343493
    Abstract: A method for restricting access to an encryption key of an encrypted file system (EFS), whereby access is provided only when a computer system is booted in a trusted state. The EFS encrypts the files within a TPM chip according to TCPA specifications and simultaneously creates the encryption key, which is also stored in the TPM. The key is sealed to one or more platform control register (PCR) states (i.e., the TPM will export the key only when the PCRs are in a pre-defined state.). The original PCR states are modified during boot up of the computer system via a secure hashing algorithm, which extends a value of one PCR to a next PCR at each stage of the boot process and then hashes the value with the remaining content of the next PCR. When the system boot process is completed and before control passes to the user, the values within the PCRs are compared to values stored in a PCR table within the TPM, and the encryption key is exported to the OS kernel only when the PCR values match the table values.
    Type: Grant
    Filed: March 28, 2002
    Date of Patent: March 11, 2008
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: David Carroll Challener, David Robert Safford
  • Publication number: 20080040613
    Abstract: An apparatus, system, and method are disclosed for secure password reset. In one embodiment, an authentication module authenticates a user. An authorization key module retrieves an authorization key from a backup key blob using a backup password. In a certain embodiment, the authorization key module retrieves the authorization key in response to receiving the backup password. A user password module receives a user password. An active blob creation module creates an active key blob comprising the authorization key and the user password, allowing a user to retrieve the authorization key and access a secure asset by providing the user password.
    Type: Application
    Filed: August 14, 2006
    Publication date: February 14, 2008
    Inventor: David Carroll Challener