Patents by Inventor James McKeeth
James McKeeth has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11113127Abstract: A method including invoking, via an application, a call of a command line utility; providing, via the application, an identifier in the call of the command line utility, where the identifier comprises an operating system controlled memory location; storing output from the command line utility in operating system shared memory at the operating system controlled memory location identified by the identifier; and retrieving, by the application, the command line utility output from the operating system shared memory at the operating system controlled memory location identified by the identifier.Type: GrantFiled: April 25, 2017Date of Patent: September 7, 2021Assignee: Micron Technology, Inc.Inventor: James McKeeth
-
Patent number: 10331869Abstract: A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.Type: GrantFiled: January 24, 2018Date of Patent: June 25, 2019Assignee: MICRON TECHNOLOGY, INC.Inventor: James McKeeth
-
Patent number: 10311221Abstract: A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.Type: GrantFiled: January 24, 2018Date of Patent: June 4, 2019Assignee: MICRON TECHNOLOGY, INC.Inventor: James McKeeth
-
Publication number: 20180165440Abstract: A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.Type: ApplicationFiled: January 24, 2018Publication date: June 14, 2018Inventor: James McKeeth
-
Publication number: 20180150625Abstract: A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.Type: ApplicationFiled: January 24, 2018Publication date: May 31, 2018Inventor: James McKeeth
-
Patent number: 9910974Abstract: A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.Type: GrantFiled: January 27, 2017Date of Patent: March 6, 2018Assignee: Micron Technology, Inc.Inventor: James McKeeth
-
Patent number: 9811651Abstract: A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.Type: GrantFiled: September 14, 2016Date of Patent: November 7, 2017Assignee: Micron Technology, Inc.Inventor: James McKeeth
-
Publication number: 20170228268Abstract: A method including invoking, via an application, a call of a command line utility; providing, via the application, an identifier in the call of the command line utility, where the identifier comprises an operating system controlled memory location; storing output from the command line utility in operating system shared memory at the operating system controlled memory location identified by the identifier; and retrieving, by the application, the command line utility output from the operating system shared memory at the operating system controlled memory location identified by the identifier.Type: ApplicationFiled: April 25, 2017Publication date: August 10, 2017Inventor: James McKeeth
-
Publication number: 20170140142Abstract: A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.Type: ApplicationFiled: January 27, 2017Publication date: May 18, 2017Inventor: James McKeeth
-
Patent number: 9652303Abstract: In one embodiment the invention provides a method. The method includes invoking, via an application, a call of a command line utility; providing, via the application, an identifier in the call of the command line utility, wherein the identifier comprises an operating system controlled memory location; storing output from the command line utility in operating system shared memory at the operating system controlled memory location identified by the identifier; and retrieving, by the application, the command line utility output from the operating system shared memory at the operating system controlled memory location identified by the identifier.Type: GrantFiled: May 23, 2014Date of Patent: May 16, 2017Assignee: Micron Technology, Inc.Inventor: James McKeeth
-
Publication number: 20170124310Abstract: A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.Type: ApplicationFiled: September 14, 2016Publication date: May 4, 2017Inventor: James McKeeth
-
Patent number: 9465929Abstract: A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.Type: GrantFiled: August 13, 2014Date of Patent: October 11, 2016Assignee: Micron Technology, Inc.Inventor: James McKeeth
-
Publication number: 20140351928Abstract: A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.Type: ApplicationFiled: August 13, 2014Publication date: November 27, 2014Inventor: James McKeeth
-
Publication number: 20140344833Abstract: In one embodiment the invention provides a method. The method includes invoking, via an application, a call of a command line utility; providing, via the application, an identifier in the call of the command line utility, wherein the identifier comprises an operating system controlled memory location; storing output from the command line utility in operating system shared memory at the operating system controlled memory location identified by the identifier; and retrieving, by the application, the command line utility output from the operating system shared memory at the operating system controlled memory location identified by the identifier.Type: ApplicationFiled: May 23, 2014Publication date: November 20, 2014Applicant: Micron Technology, Inc.Inventors: James McKeeth, Mark Frischman
-
Patent number: 8839416Abstract: A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.Type: GrantFiled: January 7, 2013Date of Patent: September 16, 2014Assignee: Micron Technology, Inc.Inventor: James McKeeth
-
Patent number: 8739122Abstract: In one embodiment the invention provides a method to provide command line utility output to an application without the need of temporary files. The method includes receiving an identifier, receiving output from a command line utility, and storing the command line utility output in a system storage at a location identified by the identifier. In one illustrative embodiment, command line utility output is stored in a system registry database. In another illustrative embodiment, command line utility output is stored in a shared system memory. The method may be stored in any media that is readable and executable by a computer system.Type: GrantFiled: May 19, 2011Date of Patent: May 27, 2014Assignee: Mircon Technology, Inc.Inventor: James McKeeth
-
Patent number: 8578331Abstract: In one embodiment the invention provides a method to provide command line utility output to an application without the need of temporary files. The method includes receiving an identifier, receiving output from a command line utility, and storing the command line utility output in a system storage at a location identified by the identifier. In one illustrative embodiment, command line utility output is stored in a system registry database. In another illustrative embodiment, command line utility output is stored in a shared system memory. The method may be stored in any media that is readable and executable by a computer system.Type: GrantFiled: May 19, 2011Date of Patent: November 5, 2013Assignee: Micron Technology, Inc.Inventor: James McKeeth
-
Patent number: 8352745Abstract: A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.Type: GrantFiled: April 10, 2012Date of Patent: January 8, 2013Assignee: Micron Technology, Inc.Inventor: James McKeeth
-
Publication number: 20120198544Abstract: A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.Type: ApplicationFiled: April 10, 2012Publication date: August 2, 2012Applicant: MICRON TECHNOLOGYInventor: James McKeeth
-
Patent number: 8176547Abstract: A system requires a user to enter a geometric pattern on an interface device to gain access to the system. After the correct geometric pattern is entered, a timer times a duration before an authenticating password is subsequently entered by the user. If the duration exceeds a predetermined length of time, access to a set of one or more files is at least temporarily prevented. If the user enters the authenticating password before the duration exceeds the predetermined length of time, access to the set of one or more files is granted.Type: GrantFiled: January 24, 2011Date of Patent: May 8, 2012Assignee: Micron Technology, Inc.Inventor: James McKeeth