Patents by Inventor Eric Richard Kern

Eric Richard Kern has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7076538
    Abstract: A method and system are disclosed for substituting an anonymous Universal Unique Identifier (UUID) for a computer system's real UUID in order to disguise an identity of the computer system to an application which is requesting a UUID for the client computer system. A storage device is established in the computer system. The storage device includes a primary and a second location. A UUID stored in the primary location is used as a UUID for the computer system. An anonymous UUID is generated. The anonymous UUID does not identify any particular computer system. The anonymous UUID is stored in the primary location within the storage device, and the real UUID is backed up by moving it into the secondary location. Thereafter, the anonymous UUID is provided in response to requests for the computer system's UUID.
    Type: Grant
    Filed: January 12, 2001
    Date of Patent: July 11, 2006
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: Daryl Carvis Cromer, Richard Alan Dayan, Eric Richard Kern, Randall Scott Springfield, Joseph Wayne Freeman, Robert Duane Johnson, Brandon Jon Ellison
  • Patent number: 7017052
    Abstract: A method for reducing the boot time for a computer includes: supplying power to the computer; disabling a plurality of input/output (I/O) devices coupled to the computer; performing a boot process for the computer; and placing the computer in a suspend to memory state before a user turns on the computer. The method reduces the boot time for a computer by placing the computer in a suspend to memory mode rather than completely shutting off the computer. In this manner, when a user of the computer pushes the power button, the computer wakes up from the suspend to memory mode instead of being required to perform the entire boot process. This significantly reduces the time required to make the computer available to the user, allowing the computer to function like an appliance.
    Type: Grant
    Filed: November 16, 2001
    Date of Patent: March 21, 2006
    Assignee: Lenovo Pte. Ltd.
    Inventors: Ameha Aklilu, Kamran Amini, Jordan Hsiao Ping Chin, James Alexander Day, Jr., Chad Lee Gettelfinger, Eric Richard Kern
  • Patent number: 6990515
    Abstract: In a computer network including a plurality of interconnected computers, one of the computers being a sleeping computer in a power down state, the sleeping computer listening for a packet associated with the sleeping computer, a method of waking the sleeping computer from the computer network. An incoming packet of data is transmitted from an administration system in the network to the sleeping computer. When the sleeping computer detects the incoming packet, it determines if the incoming packet contains a data sequence associated with the sleeping computer. If the incoming packet matches the particular data sequence associated with the sleeping computer, the sleeping computer transmits a reply message to the administration system. Upon receiving the reply, the administration system modifies the reply message in a predetermined manner and transmits the modified reply to the sleeping computer.
    Type: Grant
    Filed: April 29, 2002
    Date of Patent: January 24, 2006
    Assignee: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Joseph Wayne Freeman, Chad Lee Gettelfinger, Steven Dale Goodman, Eric Richard Kern, Randall Scott Springfield
  • Patent number: 6968462
    Abstract: A method and system for securing access to a keyboard driver in a host computer. The host computer includes a host processor that manages communication between a keyboard driver and a keyboard attached to the host computer. In accordance with a method of the present invention, a packet is received on a bus that connects the keyboard to the host processor. A determining is made of whether or not the packet originated from the keyboard. In response to determining that the packet originated from the keyboard, a independent bus traffic monitor processor sets an input secure bit which is then read by the host processor to selectively provide access to the keyboard driver in accordance with verification that the keyboard originated the packet.
    Type: Grant
    Filed: December 11, 2000
    Date of Patent: November 22, 2005
    Assignee: International Business Machines Corporation
    Inventors: David Carroll Challener, Richard Alan Dayan, Eric Richard Kern
  • Patent number: 6925557
    Abstract: A method, system and computer readable medium containing programming instructions for booting a computer system having a plurality of devices is disclosed. They include provisions for initiating a boot sequence in the computer system and determining whether a device of the plurality of devices is either a bootable device or a nonbootable device. If the device is a nonbootable device, a clean restart of the boot sequence is performed, wherein the nonbootable device is bypassed during the clean restart.
    Type: Grant
    Filed: October 26, 2001
    Date of Patent: August 2, 2005
    Assignee: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Joseph Wayne Freeman, Steven Dale Goodman, Eric Richard Kern, Randall Scott Springfield
  • Patent number: 6912663
    Abstract: A system and method of securing a USB Interface of a personal computer against inputs from a user when the keyboard of the personal computer is secured against user inputs. By combining the hardware locking of the USB Interface is with the locking of the keyboard controllers, a potential circumvention of the keyboard controller lock is avoided and security of the data stored on a personal computer is increased.
    Type: Grant
    Filed: December 6, 1999
    Date of Patent: June 28, 2005
    Assignee: International Business Machines Corporation
    Inventors: Richard Alan Dayan, Eric Richard Kern
  • Patent number: 6832262
    Abstract: A method and system are disclosed for substituting an anonymous media access controller (MAC) address for a client computer system's real MAC address in order to disguise an identity of the client computer system when the client computer system is utilizing a network. The client computer system is coupled to a server computer system via the network. A primary storage device is established for storing a MAC address. A MAC address which is stored in the primary storage device is utilized as a network address for the client computer system when the client computer system is utilizing the network. An anonymous MAC address is generated. The anonymous MAC address is not associated with any particular client computer system. The anonymous MAC address is then stored in the primary storage device. The client computer system utilizes the anonymous MAC address as the network address for the client computer system when the client computer system is utilizing the network.
    Type: Grant
    Filed: January 12, 2001
    Date of Patent: December 14, 2004
    Assignee: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Richard Alan Dayan, Eric Richard Kern, Randall Scott Springfield, Joseph Wayne Freeman, Robert Duane Johnson, Brandon Jon Ellison
  • Patent number: 6742027
    Abstract: A data processing system and method are described for permitting a server computer system to remotely disable an input device included within a client computer system coupled to the server utilizing a network. The server computer system transmits a message to the client computer system to disable the input device. In response to a receipt of the message, a network adapter included within the client computer system disables the input device by prohibiting a data stream output from the input device from being received by an input/output controller included within the client computer system.
    Type: Grant
    Filed: February 24, 1999
    Date of Patent: May 25, 2004
    Assignee: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Richard Alan Dayan, Dhruv M. Desai, Brandon Jon Ellison, Eric Richard Kern, Randall Scott Springfield
  • Patent number: 6718464
    Abstract: A method and system are disclosed for dynamically loading selected BIOS modules and settings from a server computer system to a client computer system according to an identity of a user who is currently utilizing the client computer system. The client computer system is coupled to a server computer system via a network. Selected BIOS modules and settings are associated with a particular user. These BIOS modules and settings are those preferred by the particular user to use in order to customize the client computer system when the client computer system is used by the particular user. The associations among the particular user and the selected BIOS modules and settings are stored in the server computer system. The selected BIOS modules and settings are downloaded from the server computer system to the client computer system when the particular user causes the client computer system to start booting, i.e. when the particular user is the current user.
    Type: Grant
    Filed: January 23, 2001
    Date of Patent: April 6, 2004
    Assignee: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Eric Richard Kern, Howard Jeffrey Locker, David Rhoades, James Peter Ward
  • Patent number: 6701349
    Abstract: A data processing system and method are disclosed for prohibiting an unauthorized user from modifying a priority level associated with a client computer system. The priority level is utilized by a client computer system during transmission of the client's data over a network. One of a plurality of priority levels is associated with the client computer system. The plurality of priority levels includes a higher priority level and a lower priority level. The client computer system associates the priority level with the data transmitted by the client computer system over the network. The data associated with the higher priority level is typically transmitted prior to data associated with the lower priority level. In response to an attempt to modify the associated priority level, the client determines whether the attempt is being made by an approved user. In response to a determination that the attempt is not being made by an approved user, the attempted modification of the priority level is prohibited.
    Type: Grant
    Filed: July 16, 1999
    Date of Patent: March 2, 2004
    Assignee: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Brandon Jon Ellison, Eric Richard Kern, Howard Jeffery Locker, Andy Lloyd Trotter, James Peter Ward
  • Patent number: 6687744
    Abstract: A data processing system and method are described for permitting a server computer system to function as a remote keyboard input device for a client computer system prior to the client computer system completing its boot process. The client computer system is coupled to the server computer system utilizing a network. Each keystroke entered into the server computer system is captured by the server. A scan code associated with each captured keystroke is transmitted to the client computer system utilizing the server computer system via the network. The scan code associated with each keystroke is executed utilizing the client computer system. The server computer system functions as a remote keyboard input device for the client computer system.
    Type: Grant
    Filed: May 2, 2000
    Date of Patent: February 3, 2004
    Assignee: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Richard Alan Dayan, Brandon Jon Ellison, Robert Duane Johnson, Eric Richard Kern, Randall Scott Springfield
  • Publication number: 20040006700
    Abstract: The disclosed methods enable users to securably modify system attributes of completed computer systems, without requiring that the system be returned to their manufacturer or that the system be “overhauled.” The methods of the present invention permit manufacturing cost savings and efficiencies, while allowing existing built inventory to be modified to meet current market demands without the need to recall built systems back to the origin of manufacture.
    Type: Application
    Filed: June 26, 2002
    Publication date: January 8, 2004
    Applicant: International Business Machines Corporation
    Inventors: Joseph Wayne Freeman, Chad Lee Gettelfinger, Steven Dale Goodman, William Fred Keown, Eric Richard Kern, Randall Scott Springfield
  • Publication number: 20030202514
    Abstract: In a computer network including a plurality of interconnected computers, one of the computers being a sleeping computer in a power down state, the sleeping computer listening for a packet associated with the sleeping computer, a method and system of waking the sleeping computer from the computer network. An incoming packet of data is transmitted from one of the computers in the network to the sleeping computer. When the sleeping computer detects the incoming packet, it determines if the incoming packet contains a data sequence associated with the sleeping computer. Further, the sleeping computer compares a transit value in the incoming packet to a predetermined value stored at the sleeping computer. The transit value indicates how far the data packet has traveled through the network, indicating the approximate origin of the data packet. Knowing the approximate origin of the data packet allows the client system to identify if the data packet originated from an external network.
    Type: Application
    Filed: April 29, 2002
    Publication date: October 30, 2003
    Applicant: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Joseph Wayne Freeman, Chad Lee Gettelfinger, Steven Dale Goodman, Eric Richard Kern, Randall Scott Springfield
  • Publication number: 20030204754
    Abstract: A designated user of a computer system is allowed to conceal from access portions of information stored on a hard disk drive or comparable storage device. The program instructions which initiate operation of the computer system, sometimes also known as BIOS code, enable a designated user or an administrator to declare certain portions of information normally stored accessibly to the system to be concealed, hidden, or invisible to a technical support person having a lesser level of access. Certain partitions are made inaccessible to any operator lacking the password of a designated user or administrator. Instead, a separate password is provided which enables initiation of operation of the system for maintenance purposes using only partitions which are open or unconcealed.
    Type: Application
    Filed: April 26, 2002
    Publication date: October 30, 2003
    Applicant: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Richard Alan Dayan, Joseph Wayne Freeman, Steven Dale Goodman, Eric Richard Kern, Randall Scott Springfield
  • Publication number: 20030204746
    Abstract: In a computer network including a plurality of interconnected computers, one of the computers being a sleeping computer in a power down state, the sleeping computer listening for a packet associated with the sleeping computer, a method of waking the sleeping computer from the computer network. An incoming packet of data is transmitted from an administration system in the network to the sleeping computer. When the sleeping computer detects the incoming packet, it determines if the incoming packet contains a data sequence associated with the sleeping computer. If the incoming packet matches the particular data sequence associated with the sleeping computer, the sleeping computer transmits a reply message to the administration system. Upon receiving the reply, the administration system modifies the reply message in a predetermined manner and transmits the modified reply to the sleeping computer.
    Type: Application
    Filed: April 29, 2002
    Publication date: October 30, 2003
    Applicant: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Joseph Wayne Freeman, Chad Lee Gettelfinger, Steven Dale Goodman, Eric Richard Kern, Randall Scott Springfield
  • Publication number: 20030196137
    Abstract: A method, system and computer program product for implementing a fault tolerant sleep mode of operation. The system state information may be stored in a volatile memory and in a non-volatile storage unit prior to entering the sleep mode of operation. If a memory corruption event, e.g., power outage, brownout, power surge, occurs during the sleep mode of operation, then, upon receiving an invocation to resume to a normal mode of operation, the system state information stored in the non-volatile storage unit may be reloaded into the volatile memory. By reloading the system state information stored in the non-volatile storage into the volatile memory, the computer system may resume to a normal mode of operation from a sleep mode of operation without any corruption or loss of data.
    Type: Application
    Filed: April 12, 2002
    Publication date: October 16, 2003
    Applicant: International Business Machines Corporation
    Inventors: Nazir Haroon Ahmad, Ameha Aklilu, Jordan Hsiao Ping Chin, Richard Alan Dayan, James Patrick Hoff, Eric Richard Kern
  • Patent number: 6609207
    Abstract: A data processing system and method including a docking station and a portable computer capable of being coupled to the docking station are disclosed for securing the docking station, the portable computer, and for securing the attachment of the docking station to the portable computer. The portable computer is coupled to the docking station. A disconnection password is established. When the portable computer is disconnected from the docking station, a user is prompted for the disconnection password. The portable computer is disabled in response to a failure to correctly enter the disconnection password, wherein the portable computer is inoperable without a correct entry of the disconnection password. When a portable computer is connected to the docking station, a correct entry of a connection password is required. In response to a failure to correctly enter the connection password, access to the docking station is prohibited.
    Type: Grant
    Filed: March 2, 1999
    Date of Patent: August 19, 2003
    Assignee: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Brandon Jon Ellison, Eric Richard Kern, Howard Locker, Randall Scott Springfield, James Peter Ward
  • Patent number: 6601174
    Abstract: A data processing system and method are described for permitting a server computer system to remotely provide a client computer system's settings password to the client computer system. The client and server computer systems are coupled together utilizing a network. A network settings password is established within the client. The network settings password is required prior to permitting access to system settings included within the client. The client receives the network settings password from the server computer system utilizing the network. Access to the system settings is permitted in response to the receipt of the network settings password. In this manner, the server computer system remotely provides a network settings password to the client computer system.
    Type: Grant
    Filed: February 22, 1999
    Date of Patent: July 29, 2003
    Assignee: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Richard Alan Dayan, Brandon Jon Ellison, Eric Richard Kern, Randall Scott Springfield
  • Publication number: 20030097598
    Abstract: A method for reducing the boot time for a computer includes: supplying power to the computer; disabling a plurality of input/output (I/O) devices coupled to the computer; performing a boot process for the computer; and placing the computer in a suspend to memory state before a user turns on the computer. The method reduces the boot time for a computer by placing the computer in a suspend to memory mode rather than completely shutting off the computer. In this manner, when a user of the computer pushes the power button, the computer wakes up from the suspend to memory mode instead of being required to perform the entire boot process. This significantly reduces the time required to make the computer available to the user, allowing the computer to function like an appliance.
    Type: Application
    Filed: November 16, 2001
    Publication date: May 22, 2003
    Applicant: International Business Machines Corporation
    Inventors: Ameha Aklilu, Kamran Amini, Jordan Hsiao Ping Chin, James Alexander Day, Chad Lee Gettelfinger, Eric Richard Kern
  • Patent number: 6567920
    Abstract: A data processing system and method are disclosed for authenticating a client computer system to a secure network prior to permitting the client computer system to attempt to log-on to the network. The secure network is controlled by a server computer system. A unique identifier is established which identifies the client computer system. The unique identifier is encrypted. Prior to permitting the client computer system to attempt to log-on to the secure network, the client computer system transmits the encrypted identifier to the server computer system. Also prior to permitting the client computer system to attempt to log-on to the network, the server computer system utilizes the unique identifier to determine whether to permit the client computer system to attempt to log-on to the network. The client computer system is authenticated prior to permitting the client computer system to attempt to log-on to the network.
    Type: Grant
    Filed: March 31, 1999
    Date of Patent: May 20, 2003
    Assignee: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Dhruv M. Desai, Brandon Jon Ellison, Eric Richard Kern, Howard Locker, Andy Lloyd Trotter, James Peter Ward