Patents by Inventor James McKeeth

James McKeeth has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11113127
    Abstract: A method including invoking, via an application, a call of a command line utility; providing, via the application, an identifier in the call of the command line utility, where the identifier comprises an operating system controlled memory location; storing output from the command line utility in operating system shared memory at the operating system controlled memory location identified by the identifier; and retrieving, by the application, the command line utility output from the operating system shared memory at the operating system controlled memory location identified by the identifier.
    Type: Grant
    Filed: April 25, 2017
    Date of Patent: September 7, 2021
    Assignee: Micron Technology, Inc.
    Inventor: James McKeeth
  • Patent number: 10331869
    Abstract: A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.
    Type: Grant
    Filed: January 24, 2018
    Date of Patent: June 25, 2019
    Assignee: MICRON TECHNOLOGY, INC.
    Inventor: James McKeeth
  • Patent number: 10311221
    Abstract: A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.
    Type: Grant
    Filed: January 24, 2018
    Date of Patent: June 4, 2019
    Assignee: MICRON TECHNOLOGY, INC.
    Inventor: James McKeeth
  • Publication number: 20180165440
    Abstract: A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.
    Type: Application
    Filed: January 24, 2018
    Publication date: June 14, 2018
    Inventor: James McKeeth
  • Publication number: 20180150625
    Abstract: A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.
    Type: Application
    Filed: January 24, 2018
    Publication date: May 31, 2018
    Inventor: James McKeeth
  • Patent number: 9910974
    Abstract: A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.
    Type: Grant
    Filed: January 27, 2017
    Date of Patent: March 6, 2018
    Assignee: Micron Technology, Inc.
    Inventor: James McKeeth
  • Patent number: 9811651
    Abstract: A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.
    Type: Grant
    Filed: September 14, 2016
    Date of Patent: November 7, 2017
    Assignee: Micron Technology, Inc.
    Inventor: James McKeeth
  • Publication number: 20170228268
    Abstract: A method including invoking, via an application, a call of a command line utility; providing, via the application, an identifier in the call of the command line utility, where the identifier comprises an operating system controlled memory location; storing output from the command line utility in operating system shared memory at the operating system controlled memory location identified by the identifier; and retrieving, by the application, the command line utility output from the operating system shared memory at the operating system controlled memory location identified by the identifier.
    Type: Application
    Filed: April 25, 2017
    Publication date: August 10, 2017
    Inventor: James McKeeth
  • Publication number: 20170140142
    Abstract: A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.
    Type: Application
    Filed: January 27, 2017
    Publication date: May 18, 2017
    Inventor: James McKeeth
  • Patent number: 9652303
    Abstract: In one embodiment the invention provides a method. The method includes invoking, via an application, a call of a command line utility; providing, via the application, an identifier in the call of the command line utility, wherein the identifier comprises an operating system controlled memory location; storing output from the command line utility in operating system shared memory at the operating system controlled memory location identified by the identifier; and retrieving, by the application, the command line utility output from the operating system shared memory at the operating system controlled memory location identified by the identifier.
    Type: Grant
    Filed: May 23, 2014
    Date of Patent: May 16, 2017
    Assignee: Micron Technology, Inc.
    Inventor: James McKeeth
  • Publication number: 20170124310
    Abstract: A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.
    Type: Application
    Filed: September 14, 2016
    Publication date: May 4, 2017
    Inventor: James McKeeth
  • Patent number: 9465929
    Abstract: A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.
    Type: Grant
    Filed: August 13, 2014
    Date of Patent: October 11, 2016
    Assignee: Micron Technology, Inc.
    Inventor: James McKeeth
  • Publication number: 20140351928
    Abstract: A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.
    Type: Application
    Filed: August 13, 2014
    Publication date: November 27, 2014
    Inventor: James McKeeth
  • Publication number: 20140344833
    Abstract: In one embodiment the invention provides a method. The method includes invoking, via an application, a call of a command line utility; providing, via the application, an identifier in the call of the command line utility, wherein the identifier comprises an operating system controlled memory location; storing output from the command line utility in operating system shared memory at the operating system controlled memory location identified by the identifier; and retrieving, by the application, the command line utility output from the operating system shared memory at the operating system controlled memory location identified by the identifier.
    Type: Application
    Filed: May 23, 2014
    Publication date: November 20, 2014
    Applicant: Micron Technology, Inc.
    Inventors: James McKeeth, Mark Frischman
  • Patent number: 8839416
    Abstract: A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.
    Type: Grant
    Filed: January 7, 2013
    Date of Patent: September 16, 2014
    Assignee: Micron Technology, Inc.
    Inventor: James McKeeth
  • Patent number: 8739122
    Abstract: In one embodiment the invention provides a method to provide command line utility output to an application without the need of temporary files. The method includes receiving an identifier, receiving output from a command line utility, and storing the command line utility output in a system storage at a location identified by the identifier. In one illustrative embodiment, command line utility output is stored in a system registry database. In another illustrative embodiment, command line utility output is stored in a shared system memory. The method may be stored in any media that is readable and executable by a computer system.
    Type: Grant
    Filed: May 19, 2011
    Date of Patent: May 27, 2014
    Assignee: Mircon Technology, Inc.
    Inventor: James McKeeth
  • Patent number: 8578331
    Abstract: In one embodiment the invention provides a method to provide command line utility output to an application without the need of temporary files. The method includes receiving an identifier, receiving output from a command line utility, and storing the command line utility output in a system storage at a location identified by the identifier. In one illustrative embodiment, command line utility output is stored in a system registry database. In another illustrative embodiment, command line utility output is stored in a shared system memory. The method may be stored in any media that is readable and executable by a computer system.
    Type: Grant
    Filed: May 19, 2011
    Date of Patent: November 5, 2013
    Assignee: Micron Technology, Inc.
    Inventor: James McKeeth
  • Patent number: 8352745
    Abstract: A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.
    Type: Grant
    Filed: April 10, 2012
    Date of Patent: January 8, 2013
    Assignee: Micron Technology, Inc.
    Inventor: James McKeeth
  • Publication number: 20120198544
    Abstract: A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.
    Type: Application
    Filed: April 10, 2012
    Publication date: August 2, 2012
    Applicant: MICRON TECHNOLOGY
    Inventor: James McKeeth
  • Patent number: 8176547
    Abstract: A system requires a user to enter a geometric pattern on an interface device to gain access to the system. After the correct geometric pattern is entered, a timer times a duration before an authenticating password is subsequently entered by the user. If the duration exceeds a predetermined length of time, access to a set of one or more files is at least temporarily prevented. If the user enters the authenticating password before the duration exceeds the predetermined length of time, access to the set of one or more files is granted.
    Type: Grant
    Filed: January 24, 2011
    Date of Patent: May 8, 2012
    Assignee: Micron Technology, Inc.
    Inventor: James McKeeth