Patents by Inventor David Otto Lewis
David Otto Lewis has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8135795Abstract: Method, apparatus and article of manufacture for on-demand access to computerized resources. A resource-time value includes a resource-identifying component and a usage limit component. The resource-identifying component specifies a given type of a resource and the usage limit component defines a maximum allowable usage value of the resource on the basis of time and quantity. Upon verifying the resource-time value, a quantity of the resource is enabled. The enabled resources may then be placed into service for specified time periods, wherein the quantity of resources placed into service and the time periods are delimited by the usage limit component.Type: GrantFiled: April 3, 2003Date of Patent: March 13, 2012Assignee: International Business Machines CorporationInventors: Daniel Charles Birkestrand, Randall Lane Grimm, David Otto Lewis, Terry Lyle Schardt
-
Patent number: 7958218Abstract: An apparatus, program product and method for determining unreturned standby resource usage. Unreturned standby resource data is monitored and stored separately from other standby resource data for billing and other accounting purposes.Type: GrantFiled: January 8, 2008Date of Patent: June 7, 2011Assignee: International Business Machines CorporationInventors: Daniel Charles Birkestrand, Randall Lane Grimm, David Otto Lewis, Terry Lyle Schardt
-
Patent number: 7818578Abstract: A smart chip protection system contains a unique public/private identity key pair and uses a separate public/private signature key pair. The identity private key is stored in permanent, secure storage such that it can not be read outside the chip. An issuing entity generates a descriptor containing the identity public key, attribute data, and a digital signature. The digital signature is generated by enciphering a derivation of the identity public key and the attribute data with the signature private key known only to the issuer. The authenticity of the descriptor data is verified by decrypting the signature with the signature public key using a known algorithm, and comparing the result to the derivation of the descriptor data. The identity of the object can be verified requesting the smart chip to perform an encryption/decryption operation using its identity private key, and performing the complement using the public key.Type: GrantFiled: December 29, 2005Date of Patent: October 19, 2010Assignee: International Business Machines CorporationInventors: David Otto Lewis, Jeffrey Earl Remfert
-
Patent number: 7809948Abstract: A smart chip protection system contains a unique public/private identity key pair and uses a separate public/private signature key pair. The internally stored identity private key can not be read outside the chip. An issuing entity generates a descriptor containing the identity public key, attribute data, and a digital signature of the two, using a signature private key known only to the issuer. The authenticity of the descriptor is verified by decrypting the signature using the signature public key, and comparing the result to source data. An object's identity can be verified by requesting the smart chip to perform a data transformation using its identity private key, and performing the complement using the public key. An exemplary embodiment is a cellular telephone, in which a service provider verifies identity of the telephone and correct signature as a condition to providing service.Type: GrantFiled: December 29, 2005Date of Patent: October 5, 2010Assignee: International Business Machines CorporationInventors: David Otto Lewis, Jeffrey Earl Remfert
-
Patent number: 7797541Abstract: A smart chip protection system contains a unique public/private identity key pair and uses a separate public/private signature key pair. The internally stored identity private key can not be read outside the chip. An issuing entity generates a descriptor containing the identity public key, attribute data, and a digital signature of the two, using a signature private key known only to the issuer. The authenticity of the descriptor is verified by decrypting the signature using the signature public key, and comparing the result to source data. An object's identity can be verified by requesting the smart chip to perform a data transformation using its identity private key, and performing the complement using the public key. An exemplary embodiment is a cellular telephone, in which a service provider verifies identity of the telephone and correct signature as a condition to providing service.Type: GrantFiled: December 29, 2005Date of Patent: September 14, 2010Assignee: International Business Machines CorporationInventors: David Otto Lewis, Jeffrey Earl Remfert
-
Patent number: 7783887Abstract: A smart chip protection system contains a unique public/private identity key pair and uses a separate public/private signature key pair. The internally stored identity private key can not be read outside the chip. An issuing entity generates a descriptor containing the identity public key, attribute data, and a digital signature of the two, using a signature private key known only to the issuer. The authenticity of the descriptor is verified by decrypting the signature using the signature public key, and comparing the result to source data. An object's identity can be verified by requesting the smart chip to perform a data transformation using its identity private key, and performing the complement using the public key. An exemplary embodiment is a television receiver system which verifies identity of an embedded smart chip and entitlement to receive television service.Type: GrantFiled: December 29, 2005Date of Patent: August 24, 2010Assignee: International Business Machines CorporationInventors: David Otto Lewis, Jeffrey Earl Remfert
-
Patent number: 7720972Abstract: An apparatus and program product for transferring entitlement to standby resources between respective computers. Standby resources are made available at a destination computer by rendering unavailable corresponding resources at a source computer. As such, the aggregate number of available standby resources may remain unchanged, but the distribution of the availability may be reapportioned according to operational requirements. Where desired, this transfer of entitlement may be accomplished automatically, dynamically and/or in a secure manner.Type: GrantFiled: October 7, 2008Date of Patent: May 18, 2010Assignee: International Business Machines CorporationInventors: Randall Lane Grimm, David Otto Lewis
-
Patent number: 7627506Abstract: An apparatus and method provides the capability of metering temporary capacity on demand in a computer system. A resource-time is specified, such as processor-days. The actual usage of the resource is monitored, and the customer is charged for only the actual usage of the resource. In this manner a customer may purchase a specified resource-time, and is only charged for the time that the resource is actually used. The preferred embodiments extend to metering temporary capacity on demand in a logically partitioned computer system. If a resource is shared, the actual usage of the resource is monitored, and the customer is only billed for actual usage that exceeds a predetermined non-zero threshold.Type: GrantFiled: July 10, 2003Date of Patent: December 1, 2009Assignee: International Business Machines CorporationInventors: Daniel Charles Birkestrand, Randall Lane Grimm, David Otto Lewis, Terry Lyle Schardt
-
Patent number: 7574507Abstract: An apparatus, program product and method for determining unreturned standby resource usage. Unreturned standby resource data is monitored and stored separately from other standby resource data for billing and other accounting purposes.Type: GrantFiled: October 23, 2007Date of Patent: August 11, 2009Assignee: International Business Machines CorporationInventors: Daniel Charles Birkestrand, Randall Lane Grimm, David Otto Lewis, Terry Lyle Schardt
-
Publication number: 20090043877Abstract: An apparatus and program product for transferring entitlement to standby resources between respective computers. Standby resources are made available at a destination computer by rendering unavailable corresponding resources at a source computer. As such, the aggregate number of available standby resources may remain unchanged, but the distribution of the availability may be reapportioned according to operational requirements. Where desired, this transfer of entitlement may be accomplished automatically, dynamically and/or in a secure manner.Type: ApplicationFiled: October 7, 2008Publication date: February 12, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Randall Lane Grimm, David Otto Lewis
-
Patent number: 7489596Abstract: A method and apparatus of defining a time interval includes providing a source of ionizing radiation that radiates emissions thereof; placing a radiation sensitive display material responsive to ionizing radiation in a close proximity relationship to the source of ionizing radiation whereby the radiated emissions of the source strike the radiation sensitive display material, thereby commencing a time interval; and, measuring changes in characteristics of the radiation sensitive display material that are indicative of the elapsed time.Type: GrantFiled: September 13, 2005Date of Patent: February 10, 2009Assignee: International Business Machines CorporationInventors: Joseph Kuczynski, David Otto Lewis
-
Patent number: 7454502Abstract: A method for transferring entitlement to standby resources between respective computers. Standby resources are made available at a destination computer by rendering unavailable corresponding resources at a source computer. As such, the aggregate number of available standby resources may remain unchanged, but the distribution of the availability may be reapportioned according to operational requirements. Where desired, this transfer of entitlement may be accomplished automatically, dynamically and/or in a secure manner.Type: GrantFiled: December 4, 2003Date of Patent: November 18, 2008Assignee: International Business Machines CorporationInventors: Randall Lane Grimm, David Otto Lewis
-
Publication number: 20080228644Abstract: An apparatus and method provides the capability of metering temporary capacity on demand in a computer system. A resource-time is specified, such as processor-days. The actual usage of the resource is monitored, and the customer is charged for only the actual usage of the resource. In this manner a customer may purchase a specified resource-time, and is only charged for the time that the resource is actually used. The preferred embodiments extend to metering temporary capacity on demand in a logically partitioned computer system. If a resource is shared, the actual usage of the resource is monitored, and the customer is only billed for actual usage that exceeds a predetermined non-zero threshold.Type: ApplicationFiled: May 31, 2008Publication date: September 18, 2008Applicant: International Business Machines CorporationInventors: Daniel Charles Birkestrand, Randall Lane Grimm, David Otto Lewis, Terry Lyle Schardt
-
Patent number: 7395334Abstract: An apparatus, program product and method for determining unreturned standby resource usage. Unreturned standby resource data is monitored and stored separately from other standby resource data for billing and other accounting purposes.Type: GrantFiled: April 25, 2003Date of Patent: July 1, 2008Assignee: International Business Machines CorporationInventors: Daniel Charles Birkestrand, Randall Lane Grimm, David Otto Lewis, Terry Lyle Schardt
-
Patent number: 7085967Abstract: A flexible format for heterogeneous data records includes a fixed-length header containing a header ECC, a table of contents descriptor, and a table of contents ECC descriptor; a variable-length table of contents containing multiple entries, each entry containing a record descriptor and a corresponding record ECC descriptor; multiple variable-length records corresponding to the multiple entries in the table of contents; and optional ECCs corresponding to the ECC descriptors. Preferably, the format is used for vital component data in non-volatile memory of a computer system field replaceable unit, and is read by the system to identify the unit and configure the system.Type: GrantFiled: February 14, 2003Date of Patent: August 1, 2006Assignee: International Business Machines CorporationInventors: Herwig G. Elfering, Fritz Freier, Stephen Mark Igel, David Otto Lewis
-
Patent number: 7007210Abstract: The present invention provides an improved method, an system, and a set of computer implemented instructions for handling a cache containing multiple single-bit hard errors on multiple addresses within a data processing system. Such handles will prevent any down time by logging in the parts to be replaced by an operator when certain level of bit errors is reached. When a hard error exists on a cache address for the first time, serviceable first hard error, that cache line is deleted. Thus the damaged memory device is no longer used by the system. As a result, the system is running with “N?x” lines wherein “N” constitutes the total number of existing lines and “x” is less than “N”. An alternative method is to exchange the damaged memory device to a spare memory device. In order to provide such services, the system must first differentiate whether an error is a soft or hard error.Type: GrantFiled: January 30, 2002Date of Patent: February 28, 2006Assignee: International Business Machines CorporationInventors: James Stephen Fields, Jr., Alongkorn Kitamorn, Wayne Lemmon, David Otto Lewis, Kevin F. Reick
-
Patent number: 7000115Abstract: A smart chip protection system contains a unique public/private identity key pair and uses a separate public/private signature key pair. The identity private key is stored in permanent, secure storage such that it can not be read outside the chip. An issuing entity generates a descriptor containing the identity public key, attribute data, and a digital signature. The digital signature is generated by enciphering a derivation of the identity public key and the attribute data with the signature private key known only to the issuer. The authenticity of the descriptor data is verified by decrypting the signature with the signature public key using a known algorithm, and comparing the result to the derivation of the descriptor data. The identity of the object can be verified requesting the smart chip ro perform an encryption/decryption operation using its identity private key, and performing the complement using the public key.Type: GrantFiled: June 19, 2001Date of Patent: February 14, 2006Assignee: International Business Machines CorporationInventors: David Otto Lewis, Jeffrey Earl Remfert
-
Patent number: 6851071Abstract: An apparatus and method of repairing a processor array for a failure detected at runtime in a system supporting persistent component deallocation are provided. The apparatus and method of the present invention allow redundant array bits to be used for recoverable faults detected in arrays during run time, instead of only at system boot, while still maintaining the dynamic and persistent processor deallocation features of the computing system. With the apparatus and method of the present invention, a failure of a cache array is detected and a determination is made as to whether a repairable failure threshold is exceeded during runtime. If this threshold is exceeded, a determination is made as to whether cache array redundancy may be applied to correct the failure, i.e. a bit error. If so, the cache array redundancy is applied without marking the processor as unavailable.Type: GrantFiled: October 11, 2001Date of Patent: February 1, 2005Assignee: International Business Machines CorporationInventors: Douglas Craig Bossen, Daniel James Henderson, Raymond Leslie Hicks, Alongkorn Kitamorn, David Otto Lewis, Thomas Alan Liebsch
-
Publication number: 20040236852Abstract: Method, apparatus and article of manufacture for on-demand access to computerized resources. A resource-time value includes a resource-identifying component and a usage limit component. The resource-identifying component specifies a given type of a resource and the usage limit component defines a maximum allowable usage value of the resource on the basis of time and quantity. Upon verifying the resource-time value, a quantity of the resource is enabled. The enabled resources may then be placed into service for specified time periods, wherein the quantity of resources placed into service and the time periods are delimited by the usage limit component.Type: ApplicationFiled: April 3, 2003Publication date: November 25, 2004Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Daniel Charles Birkestrand, Randall Lane Grimm, David Otto Lewis, Terry Lyle Schardt
-
Publication number: 20040215569Abstract: Method, apparatus and article of manufacture for ensuring the uniqueness and non-alterability of vital product data (VPD) of computerized apparatus. To protect the vital product data from undesired alterations, the data is stored in a secure, write-protected location. A copy (or copies) of the VPD may also be stored elsewhere to facilitate recovery in the event the primary copy is lost, corrupted or invalid.Type: ApplicationFiled: April 24, 2003Publication date: October 28, 2004Applicant: International Business Machines CorporationInventors: Salim Ahmed Agha, Daniel Charles Birkestrand, Stephen Mark Igel, David Otto Lewis