Patents by Inventor Howard Jeffrey Locker

Howard Jeffrey Locker has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7697476
    Abstract: An arrangement facilitating the connection of a client to a network through an access point, particularly in an area with overlapping 0.11n channels. Preferably, a client may communicate with two access points and “ask” one of them to stop transmitting long enough so as to facilitate communication with the other access point. Current specifications otherwise provide no workable arrangement for handling overlapping channels.
    Type: Grant
    Filed: June 30, 2006
    Date of Patent: April 13, 2010
    Assignee: Lenovo Singapore Pte. Ltd
    Inventors: Raymond Gary Octaviano, II, Daryl Cromer, Philip John Jakes, Howard Jeffrey Locker
  • Publication number: 20100083366
    Abstract: An approach is provided that receives a user identifier from a user of the information handling system. The user identifier can include a username as well as a user authentication code, such as a password. Hardware settings that correspond to the user identifier are retrieved from a nonvolatile memory. Hardware devices, such as ports (e.g., USB controller), network interfaces, storage devices, and boot sequences, are configured using the retrieved hardware settings. After the hardware devices have been configured to correspond to the identified user, an operating system is booted.
    Type: Application
    Filed: October 1, 2008
    Publication date: April 1, 2010
    Inventors: David Carroll Challener, Howard Jeffrey Locker, Joseph Michael Pennisi, Randall Scott Springfield
  • Patent number: 7688779
    Abstract: A method, computer program product and system for handling the use of multiple 802.11n channels in a location where there are a small number of available channels. An access point (“access point A”) having a client (“client A”) located solely within its coverage area and another client (“client B”) located within its coverage area and a coverage area of an adjacent access point (“access point B”) may receive a request to hold back 802.11n traffic from client B. Client B sends such a request since it is prevented from communicating with access point B using the 802.11n standard due to the interference from access point A communicating with client A using the 802.11n standard. As a result, access point A switches its standard of operation from using the 802.11n standard to communicate with client A to a standard that uses a bandwidth of 22 MHz (e.g., 802.11b, 802.11a, 802.11g standards).
    Type: Grant
    Filed: May 16, 2006
    Date of Patent: March 30, 2010
    Assignee: Lenovo Singapore Pte. Ltd
    Inventors: Daryl Cromer, Howard Jeffrey Locker, Raymond Gary Octaviano, II, Philip John Jakes
  • Patent number: 7688851
    Abstract: A method and system for accessing a remote real communication port (“COM port”) from a server blade in a server blade chassis by creating a virtual COM port in the server blade. A basic input/output system (BIOS) controller monitors an internal COM port in the server blade for communication traffic. Upon detecting the communication traffic, the BIOS controller reroutes the traffic to a virtual USB COM port created by the BIOS controller chipset. The virtual USB COM port directs the communication traffic to an internal universal serial bus (USB) device in the server blade. The USB device then forwards the traffic to an Ethernet media access controller (MAC) input/output (I/O) on a sideband channel to a remote system, which passes the communication traffic to a real COM port in the remote system.
    Type: Grant
    Filed: April 3, 2008
    Date of Patent: March 30, 2010
    Assignee: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Brandon John Ellison, Eric Richard Kern, Howard Jeffrey Locker, Edward Stanley Suffern
  • Patent number: 7675937
    Abstract: A method and system for accessing a remote real communication port (“COM port”) from a server blade in a server blade chassis by creating a virtual COM port in the server blade. A basic input/output system (BIOS) controller monitors an internal COM port in the server blade for communication traffic. Upon detecting the communication traffic, the BIOS controller reroutes the traffic to a virtual USB COM port created by the BIOS controller chipset. The virtual USB COM port directs the communication traffic to an internal universal serial bus (USB) device in the server blade. The USB device then forwards the traffic to an Ethernet media access controller (MAC) input/output (I/O) on a sideband channel to a remote system, which passes the communication traffic to a real COM port in the remote system.
    Type: Grant
    Filed: April 3, 2008
    Date of Patent: March 9, 2010
    Assignee: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Brandon John Ellison, Eric Richard Kern, Howard Jeffrey Locker, Edward Stanely Suffern
  • Publication number: 20100058082
    Abstract: A low power processor in a computer is kept energized in a suspend state in which a main processor of the computer is deenergized. The low power processor maintains a network connection by sending keepalive packets as required by the network communication protocol.
    Type: Application
    Filed: August 27, 2008
    Publication date: March 4, 2010
    Inventors: Howard Jeffrey Locker, David Carroll Challener, Justin Tyler Dubs, Steven Richard Perrin, Michael Terrell Vanover, Jennifer Greenwood Zawacki
  • Publication number: 20100027151
    Abstract: When a disk sector is written to, a bit for the sector is set indicating that the sector will require secure data disposal (SDD) to be run on it. To save time during end of life disposal, SDD is executed only on sectors whose bits indicate that they have been written to. SDD can be executed on each dirty sector in one operation at end of life or incrementally during use as disk activity permits.
    Type: Application
    Filed: February 8, 2008
    Publication date: February 4, 2010
    Inventors: DARYL CARVIS CROMER, HOWARD JEFFREY LOCKER, RANDALL SCOTT SPRINGFIELD
  • Patent number: 7652995
    Abstract: A wireless network access point is described which provides the resources of a backbone network to wireless clients. The access point is able to detect a degraded condition on the backbone network. Upon detecting the degraded condition, the access point transmits or broadcasts a reassociation request to one or more clients associated with the access point. In addition, the rate at which new associations are made is halted or reduced during the degraded backbone condition. In one embodiment, the association rate is reduced by increasing the interval between beacons transmitted by the access point which identify the access to the backbone network.
    Type: Grant
    Filed: December 19, 2003
    Date of Patent: January 26, 2010
    Assignee: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Philip John Jakes, Howard Jeffrey Locker
  • Publication number: 20090328233
    Abstract: Prior to disabling itself in response to a disable command, a lost or stolen portable computer first constructs a log of data that has been accessed recently and sends the log to the rightful owner's address, so the owner knows specifically what data might have been compromised.
    Type: Application
    Filed: June 25, 2008
    Publication date: December 31, 2009
    Inventors: Howard Jeffrey Locker, Richard Wayne Cheston, Daryl Carvis Cromer
  • Patent number: 7630713
    Abstract: An apparatus, system, and method are disclosed for rapid wireless network association. The apparatus includes a logic unit containing a plurality of modules configured to functionally execute the necessary steps of conducting a preliminary full band search on a predefined frequency spectrum to identify the frequency of an active communication channel, investigate the availability of the active communication channels identified during the preliminary search, and associate with a wireless network device on the available active communication channel. These modules in the described embodiments include a search module, an investigation module, and an association module. Beneficially such an apparatus, system, and method provide for more efficient searching, scanning, and association than typically found in wireless networks.
    Type: Grant
    Filed: February 18, 2005
    Date of Patent: December 8, 2009
    Assignee: Lenovo (Singapore) Pte Ltd.
    Inventors: Daryl Carvis Cromer, Philip John Jakes, Howard Jeffrey Locker, Randall Scott Springfield
  • Patent number: 7620997
    Abstract: When an authenticated wireless computer loses connectivity to a wireless access point of a network and roams to another access point, the wireless computer (e.g., a hypervisor in the computer) determines whether the new access point is authorized for secure communication and if so, releases access to secure data on the network through the new access point.
    Type: Grant
    Filed: December 22, 2003
    Date of Patent: November 17, 2009
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: David Carroll Challener, Daryl Carvis Cromer, Howard Jeffrey Locker, Hernando Ovies, Randall Scott Springfield
  • Patent number: 7600054
    Abstract: An apparatus, system, and method are disclosed for protecting a motion-sensitive device. The apparatus includes an identification module, a determination module, and a scheduler. The identification module identifies a use-intensive task involving the motion-sensitive device. The determination module determines a motion forecast that predicts a substantially motionless time interval. The scheduler schedules the use-intensive task such that the use-intensive task executes within the substantially motionless time interval. In this manner, a historical movement pattern is used to schedule future tasks such that the coincidence of task use of the motion-sensitive device and movement of the motion-sensitive device is minimized.
    Type: Grant
    Filed: November 14, 2005
    Date of Patent: October 6, 2009
    Assignee: Lenovo Singapore Pte Ltd
    Inventors: Daryl Carvis Cromer, Howard Jeffrey Locker, Tin-Lup Wong
  • Publication number: 20090248784
    Abstract: A local area network (LAN) server allows an authenticated user of a computer remote from the LAN to cause a diskless computer in the LAN to redirect screen shots to the computer remote from the LAN, with the screen shots being generated based on a users computer image persistently stored in an enterprise storage of the LAN.
    Type: Application
    Filed: March 28, 2008
    Publication date: October 1, 2009
    Inventors: Richard Wayne Cheston, Mark Charles Davis, Howard Jeffrey Locker, Rod David Waltermann
  • Patent number: 7587765
    Abstract: A client computer is connected via a network to an anti-virus server. A signal from the anti-virus server notifies the client computer that an anti-virus needs to be immediately downloaded from the anti-virus server. The client computer disengages from the network, and re-establishes a link with only the trusted anti-virus server. The anti-virus fix is installed, the client computer re-booted, and the client computer is then allowed to reconnect to the full network. If the client's primary operating system (OS) is infected, a secondary OS in the client computer performs the anti-virus download and execution. The disengagement from the network is performed by applying a filter in a network interface card (NIC) driver by the primary OS, the secondary OS, a service processor (SP), or by a virtual machine manager (VMM), depending on which is available at the client computer.
    Type: Grant
    Filed: April 16, 2004
    Date of Patent: September 8, 2009
    Assignee: International Business Machines Corporation
    Inventors: David Carroll Challener, Richard W. Cheston, Daryl Carvis Cromer, Mark Charles Davis, Howard Jeffrey Locker, Randall Scott Springfield
  • Publication number: 20090222915
    Abstract: A system, method, and program product is provided that initializes a counter maintained in a nonvolatile memory of a security module to an initialization value. The security module receives requests for a secret from requesters. The security module releases the secret to the requesters and the released secrets are stored in memory areas allocated to the requesters. A counter is incremented when the secret is released. Requestors send notifications to the security module indicating that the requestor has removed the secret from the requestor's memory area. The security module decrements the counter each time a notification is received. When the computer system is rebooted, if the counter is not at the initialization value, the system memory is scrubbed erasing any secrets that remain in memory.
    Type: Application
    Filed: March 3, 2008
    Publication date: September 3, 2009
    Inventors: David Carroll Challener, Daryl Carvis Cromer, Howard Jeffrey Locker, Randall Scott Springfield
  • Publication number: 20090222635
    Abstract: A system, method, and program product is provided that initializes a computer system using an initialization process that identifies secrets that were stored in memory and not scrubbed during a prior use of the computer system. During the initialization process, one or more secret indicators are retrieved that identify whether one or more secrets were scrubbed from the computer system's memory during a previous use of the computer system. If the secret indicators show that one or more secrets were not scrubbed from the memory during the prior use of the computer system, then the initialization process scrubs the memory. On the other hand, if the secret indicators show that each of the secrets was scrubbed from the memory during the prior use of the computer system, then the memory is not scrubbed during the initialization process.
    Type: Application
    Filed: March 3, 2008
    Publication date: September 3, 2009
    Inventors: David Carroll Challener, Daryl Carvis Cromer, Howard Jeffrey Locker, Randall Scott Springfield
  • Publication number: 20090217024
    Abstract: A system, method, and program product is provided that recovers from a sector error affecting a critical file. A damaged sector prevents a critical file from being read prevents the computer system from booting. A controller records a sector number corresponding to the damaged sector. The system is rebooted using an alternative boot media. The system accesses the primary nonvolatile storage media after the rebooting. The damaged sector number is read from the error log and a file map is used to determine the critical file that is stored in the damaged sector. A backup copy of the critical file is retrieved from a backup media. The backup copy is written to the primary media using undamaged sectors and the critical file is mapped to the undamaged sectors. The system is subsequently booted successfully from the primary nonvolatile storage media.
    Type: Application
    Filed: February 25, 2008
    Publication date: August 27, 2009
    Inventors: Philip Lee Childs, Donald R. Frame, Jeffrey R. Hobbet, Howard Jeffrey Locker, Michael Terrell Vanover
  • Patent number: 7555679
    Abstract: A system and method that rejuvenates a computer system is provided. The user uses the computer system that includes an operating system and applications for a first period of time creating data files and applying patches to the operating system and applications. An image is created of the primary drive and stored on a second nonvolatile storage area. In one embodiment, the second nonvolatile storage area is a hidden partition of a hard drive. The user continues using the system during a second period of time. When the computer system becomes sluggish, the primary drive is reformatted and the image is copied from the second nonvolatile storage area to the primary drive. In addition, patches and applications installed after the image was created are stored to the second nonvolatile storage area and reapplied and reinstalled on the primary drive after the image has been copied to the primary drive.
    Type: Grant
    Filed: October 13, 2004
    Date of Patent: June 30, 2009
    Assignee: Lenovo (Singapore) Pte Ltd
    Inventors: Richard W. Cheston, Daryl Carvis Cromer, Howard Jeffrey Locker, Rod David Waltermann
  • Patent number: 7535830
    Abstract: A method and corresponding network interface device for communicating between devices connected to a LAN includes attempting to communicate between the network devices over an initial subset of the network media wires. If the communication fails, a subsequent subset of media wires is selected. The wires of this subsequent subset differ from the wires of the initial subset. If the attempted communication succeeds, the current subset of network media wires is used as the media over which subsequent network data is transmitted. Attempting to communicate over the media may include sending an initialization sequence such as an Ethernet Auto-negotiate sequence. In one embodiment, the network media is implemented as 8 wires of CAT 5 cabling suitable for use with a Gigabit Ethernet. In this embodiment, any subsequent subsets of the network media wires may consist of 4 of the 8 wires over which 100 Mbps Ethernet operation may occur.
    Type: Grant
    Filed: December 17, 2002
    Date of Patent: May 19, 2009
    Assignee: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Howard Jeffrey Locker, Marc Richard Pamley
  • Publication number: 20090119785
    Abstract: A system, method, and program product is provided that establishes a shared secret between a computer system and a peripheral device such as a removable nonvolatile storage device or a printer. After establishing the shared secret, the peripheral device is locked. After the peripheral device is locked, an unlock request is received and the shared secret is sent to the peripheral device. The peripheral device then attempts to verify the shared secret. If the shared secret is successfully verified, then the peripheral device is unlocked allowing use of the device by using an encryption key that is made available by the verified shared secret. On the other hand, if the shared secret is not verified, then the peripheral device remains locked and use of the device is prevented.
    Type: Application
    Filed: November 5, 2007
    Publication date: May 7, 2009
    Inventors: David Carroll Challener, Daryl Cromer, Philip John Jakes, Howard Jeffrey Locker, Randall Scott Springfield