Patents by Inventor Dwight L. Barron

Dwight L. Barron has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080115217
    Abstract: A method of protecting data in a computer system against attack from viruses and worms comprising; storing morphed data in system memory; de-morphing data as it is being transferred to cache memory, resulting in de-morphed data.
    Type: Application
    Filed: October 31, 2006
    Publication date: May 15, 2008
    Applicant: Hewlett-Packard Development Company, L.P.
    Inventors: Dwight L. Barron, E. David Neufeld, Kevin M. Jones, Jonathan Bradshaw
  • Patent number: 7103626
    Abstract: A distributed computer system includes a first subnet including a first group of endnodes, each endnode in the first group of endnodes having a unique destination location identification (DLID) within the first subnet. A second subnet in the distributed computer system includes a second group of endnodes, each endnode in the second group of endnodes having a unique DLID within the second subnet. A communication fabric is physically coupled to the first group of endnodes and the second group of endnodes. A partitioning mechanism associates a first partition key to every DLID in the first subnet for enabling communication between the first group of endnodes over the communication fabric. The partitioning mechanism associates a second partition key to every DLID in the second subnet for enabling communication between the second group of endnodes over the communication fabric.
    Type: Grant
    Filed: May 24, 2000
    Date of Patent: September 5, 2006
    Assignee: Hewlett-Packard Development, L.P.
    Inventors: Renato J. Recio, Joe P. Cowan, Dwight L. Barron, Gregory F. Pfister, Mark W. Bradley
  • Patent number: 7103744
    Abstract: The disclosed embodiments may relate to memory window access and may include a memory window and plurality of queue pairs associated with a process. Each of the plurality of queue pairs may be associated with a memory window context that may have queue pair information. The memory window may be associated with a memory window context that includes a protection information field. Accordingly, access to memory window may be allowed if the queue pair information matches the protection information field.
    Type: Grant
    Filed: March 27, 2003
    Date of Patent: September 5, 2006
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: David J. Garcia, Jeffrey R. Hilland, Paul R. Culley, Dwight L. Barron, Michael R. Krause
  • Patent number: 7093158
    Abstract: A computer system includes a plurality of field replaceable units, each having volatile memory and at least one CPU. The FRUs communicate with each other via centralized logic. A RAID data fault tolerance technique is applied to the system so that an FRU can be lost or removed without loss of its data. An exclusive OR engine is included in the centralized logic or distributed among the FRUs. The RAID logic can restripe itself upon removal or addition of a FRU.
    Type: Grant
    Filed: March 11, 2002
    Date of Patent: August 15, 2006
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Dwight L. Barron, Sompong P. Olarig
  • Publication number: 20040210754
    Abstract: A shared security transform device is described as being usable to couple to a plurality of nodes via a common switch comprises control logic and memory coupled to the control logic. The memory may contain security information. The shared security transform device receives packets from any of the nodes via the switch and, using a value in the packets, retrieves security handling instructions to determine whether or not to apply a security transform to the packet. If a security transform is to be applied to the packet, the shared security transform device may determine which of a plurality of transforms is to be applied to the packet.
    Type: Application
    Filed: April 16, 2003
    Publication date: October 21, 2004
    Inventors: Dwight L. Barron, Daniel N. Cripe, Michael F. Angelo
  • Publication number: 20040193734
    Abstract: The disclosed embodiments relate to a communication device for use in a node of a system having a plurality of nodes. Each of the plurality of nodes may include network interface controllers (“NICs”) and each of the NICs may have an atomic operation logic device therewith. The atomic operation logic may receive from a requester a packet that contains a request to perform an atomic operation. Then the atomic operation logic may determine that the atomic operation is being requested from the information within the packet. The atomic operation logic may also respond to the requester to indicate whether the atomic operation has been performed.
    Type: Application
    Filed: March 27, 2003
    Publication date: September 30, 2004
    Inventors: Dwight L. Barron, Jeffrey R. Hilland
  • Publication number: 20040190557
    Abstract: The disclosed embodiments relate to a signaling packet that includes an indication that the packet is not part of a data transmission. The signaling packet may also include a specific value that is adapted to signal a condition. The indication may be purposely set to indicate that the signaling packet is not part of the data transmission to facilitate examination of the specific value by a receiver of the signaling packet.
    Type: Application
    Filed: March 27, 2003
    Publication date: September 30, 2004
    Inventor: Dwight L. Barron
  • Publication number: 20040190533
    Abstract: The disclosed embodiments relate to a communication device for use in a node of a system having a plurality of nodes. Each of the plurality of nodes may include network interface controllers (“NICs”) and each of the NICs may have a public identifier and a private identifier associated therewith. A first protocol stack may operate according to a first protocol that is associated with the public identifier and a second protocol stack may operate according to a second protocol that is associated with the private identifier. A storage device may associate the public identifier of one or more of the NICs with the first protocol stack and the private identifier of one or more of the NICs with the second protocol stack. Received messages that incorporate the public identifier may be directed to the first protocol stack and messages that incorporate the private identifier may be directed to the second protocol stack.
    Type: Application
    Filed: March 27, 2003
    Publication date: September 30, 2004
    Inventors: Prashant Modi, Ambitabha Biswas, Kathryn Hampton, Yiu Yip, Dwight L. Barron, Jeffrey R. Hilland
  • Publication number: 20040193825
    Abstract: The disclosed embodiments may relate to memory window access and may include a memory window and plurality of queue pairs associated with a process. Each of the plurality of queue pairs may be associated with a memory window context that may have queue pair information. The memory window may be associated with a memory window context that includes a protection information field. Accordingly, access to memory window may be allowed if the queue pair information matches the protection information field.
    Type: Application
    Filed: March 27, 2003
    Publication date: September 30, 2004
    Inventors: David J. Garcia, Jeffrey R. Hilland, Paul R. Culley, Dwight L. Barron, Michael R. Krause
  • Publication number: 20030172330
    Abstract: A computer system includes a plurality of field replaceable units, each having volatile memory and at least one CPU. The FRUs communicate with each other via centralized logic. A RAID data fault tolerance technique is applied to the system so that an FRU can be lost or removed without loss of its data. An exclusive OR engine is included in the centralized logic or distributed among the FRUs. The RAID logic can restripe itself upon removal or addition of a FRU.
    Type: Application
    Filed: March 11, 2002
    Publication date: September 11, 2003
    Inventors: Dwight L. Barron, Sompong P. Olarig
  • Patent number: 6502203
    Abstract: A method and system of quorum negotiation utilizing power mains. Unlike current systems, this communication is provided as a secondary channel, with the primary channel being a standard network system. By using this technique, if the heartbeat is lost over the primary communication system, the secondary, power-mains system can be used to check the heartbeat to validate whether or not the “lost” system is still in operation. If communication cannot be established over the power mains, it is assumed that the “lost” system is down and should be dropped from any cluster.
    Type: Grant
    Filed: April 16, 1999
    Date of Patent: December 31, 2002
    Assignee: Compaq Information Technologies Group, L.P.
    Inventors: Dwight L. Barron, Michael F. Angelo
  • Publication number: 20020152414
    Abstract: A method and system of quorum negotiation utilizing power mains. Unlike current systems, this communication is provided as a secondary channel, with the primary channel being a standard network system. By using this technique, if the heartbeat is lost over the primary communication system, the secondary, power-mains system can be used to check the heartbeat to validate whether or not the “lost” system is still in operation. If communication cannot be established over the power mains, it is assumed that the “lost” system is down and should be dropped from any cluster.
    Type: Application
    Filed: April 16, 1999
    Publication date: October 17, 2002
    Inventors: DWIGHT L. BARRON, MICHAEL F. ANGELO
  • Patent number: 5325532
    Abstract: A computer system which includes certain minimum capabilities in a system ROM. Device driver software is located in the system ROM or adapter ROM's. On boot the computer system collects these device drivers from ROM to develop a minimal system. If a removable medium such as a floppy disk or CD-ROM is present a configuration mode is entered when final driver files and operating system modules are stored on a selected hard disk. After this storage the device driver modules and operating system modules necessary to develop a boot image of the operating system are gathered and linked. The boot image is generated and stored, allowing use on the following boot operations. The computer system detects device changes and rebuilds the boot image as necessary. If the devices have remained the same the previously stored boot image is loaded and operating system execution commences.
    Type: Grant
    Filed: September 25, 1992
    Date of Patent: June 28, 1994
    Assignee: Compaq Computer Corporation
    Inventors: Wm. Caldwell Crosswy, Dwight L. Barron, David W. Abmayr, Harvey M. Rosenblum, David M. Burckhartt