Patents by Inventor James Peter Ward

James Peter Ward has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7107460
    Abstract: An embedded security subsystem, and method for implementing the same, which provide secure controllability of a data security device within a data processing system. The embedded security subsystem of the present invention includes a persistent enable flag for providing control access to the data security device, wherein the persistent enable flag is accessible only in response to a power-on reset cycle of the data processing system. The persistent enable flag is read-only accessible to runtime program instructions. A pending state change flag that is write accessible by runtime program instructions is utilized for setting an intended next state of the persistent enable flag such that control access to the data security device is enabled only during a subsequent power-on reset of said data processing system.
    Type: Grant
    Filed: February 15, 2002
    Date of Patent: September 12, 2006
    Assignee: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Scott Thomas Elliott, James Patrick Hoff, Howard Jeffrey Locker, David Rivera, Randall Scott Springfield, James Peter Ward
  • Patent number: 7027843
    Abstract: A method and system for conserving battery strength of a mobile node, such as a laptop computer, on a wireless local area network (WLAN). The mobile node transmit symbols, which are units of data, during transmission cycles to maintain a connection with the WLAN. A battery charge level of the mobile node is measured. As the battery charge level drops below pre-defined levels, a frequency of symbol transmission for the mobile node is reduced. The reduction of the frequency of the symbol transmission results in lower power demands by a transmitter chipset of the mobile node. Thus, the mobile node is able to prolong the life of the battery of the mobile node.
    Type: Grant
    Filed: March 21, 2002
    Date of Patent: April 11, 2006
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: Daryl Carvis Cromer, Philip John Jakes, Howard Jeffrey Locker, James Peter Ward
  • Patent number: 7015790
    Abstract: A method and system for preventing theft of an object, includes an electronic article surveillance (EAS) device operatively attached to an object, a security path for detection of the EAS device, a reader operatively coupled to the security path, and a smart card for being read by the reader. The smart card contains an identification profile of an authorized user of the object.
    Type: Grant
    Filed: May 7, 1999
    Date of Patent: March 21, 2006
    Assignee: Lenovo Pte. Ltd.
    Inventors: Alejandro Gabriel Schrott, Michael J. Steinmetz, Robert Jacob von Gutfeld, James Peter Ward
  • Patent number: 7013384
    Abstract: A computer system contains selectively available boot block codes. A first boot block is of the conventional type and is stored in storage media such as flash ROM on a system planar with the processor of the computer system. A second boot block is located on a feature card and contains an immutable security code in compliance with the Trusted Computing Platform Alliance (TCPA) specification. The boot block on the feature card is enabled if the first boot block detects the presence of the feature card. The computer system can be readily modified as the computer system is reconfigured, while maintaining compliance with the TCPA specification. A switching mechanism controls which of the boot blocks is to be activated. The feature card is disabled in the event of a computer system reset to prevent access to the TCPA compliant code and function.
    Type: Grant
    Filed: January 15, 2002
    Date of Patent: March 14, 2006
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: David Carroll Challener, Steven Dale Goodman, Kevin Michael Reinberg, Randall Scott Springfield, James Peter Ward
  • Patent number: 7003331
    Abstract: The battery life of batteries of a mobile device operating in a wireless network is optimized by dynamically changing symbol rates and bits per symbol and selecting one for communicating based upon the source providing power to the mobile device.
    Type: Grant
    Filed: June 26, 2002
    Date of Patent: February 21, 2006
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: Daryl Carvis Cromer, Philip John Jakes, Howard Jeffrey Locker, James Peter Ward
  • Patent number: 6993648
    Abstract: When a flash unlock routine unlocks the flash memory to permit updating of a BIOS image, a message is left in secure non-volatile memory, such as a EEPROM. Upon the next re-boot, the boot block code will detect the special message in the non-volatile memory and perform a signature verification of the next block of code that is to be executed during the POST process. This code block will check the remainder of the BIOS image before POST proceeds.
    Type: Grant
    Filed: August 16, 2001
    Date of Patent: January 31, 2006
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: Steven Dale Goodman, James Patrick Hoff, Randall Scott Springfield, James Peter Ward
  • Patent number: 6988196
    Abstract: A computer system and method are disclosed for generating a certificate that can be validated against a trusted hardware subsystem within a computer system. A security subsystem is established within the computer system. A master key pair including a master public key and master private key are established. The master private key is stored in protected storage within the security subsystem such that the master private key is inaccessible outside of the security subsystem. Generation of a self-verifying certificate is requested. A user of the computer system is then prompted to enter an authentication code in response to the request for generation of the certificate. A certificate is generated utilizing the master key pair only in response to a correct entry of the authentication code. The certificate is used only internally within the computer system.
    Type: Grant
    Filed: December 22, 2000
    Date of Patent: January 17, 2006
    Assignee: Lenovo (Singapore) Pte Ltd
    Inventors: Daryl Carvis Cromer, Brandon Jon Ellison, Howard Jeffrey Locker, Andy Lloyd Trotter, James Peter Ward
  • Patent number: 6978385
    Abstract: A data processing system and method are disclosed for remotely recovering a client computer system's primary password. The primary password be correctly entered prior to the client computer system becoming fully accessible to a user. The client computer system is coupled to a server computer system utilizing a network. Prior to the client computer system completing a boot process, a user is prompted to enter the primary password. An interrogative password method is provided in response to an incorrect entry of the primary password. The primary password is recoverable in response to a successful execution of the interrogative password method. The primary password is recoverable from the server computer system by the client computer system prior to said client computer system completing said boot process utilizing the interrogative password method.
    Type: Grant
    Filed: March 1, 2000
    Date of Patent: December 20, 2005
    Assignee: International Business Machines Corporation
    Inventors: Richard W. Cheston, Daryl Carvis Cromer, Richard Alan Dayan, Dhruv Manmohandas Desai, Jan M. Janick, Howard Jeffery Locker, Andy Lloyd Trotter, James Peter Ward
  • Patent number: 6959390
    Abstract: A data processing system and method are disclosed for maintaining secure user private keys in a non-secure storage device. A master key pair is established for the system. The master key pair includes a master private key and a master public key. The master key pair is stored in a protected storage device. A unique user key pair is established for each user. The user key pair includes a user private key and a user public key. The user private key is encrypted utilizing the master public key. The encrypted user private key is stored in the non-secure storage device, wherein the encrypted user private key is secure while stored in the non-secure storage device.
    Type: Grant
    Filed: March 3, 1999
    Date of Patent: October 25, 2005
    Assignee: International Business Machines Corporation
    Inventors: David Carroll Challener, Daryl Carvis Cromer, Mark Charles Davis, Scott Thomas Elliott, Howard Jeffrey Locker, Andy Lloyd Trotter, James Peter Ward
  • Patent number: 6944867
    Abstract: The hard disk drive of a computer system is loaded with a preloaded image including an operating system, a number of application programs, and a device driver installation routine, all of which are not dependent on the hardware configuration of the computer system. A hidden partition of the hard disk drive is also loaded with a number of device drivers, which are dependent upon the hardware configuration. During the first boot only of the preloaded image, the device drivers are installed by the device driver installation routine.
    Type: Grant
    Filed: October 4, 2001
    Date of Patent: September 13, 2005
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: Richard Wayne Cheston, Daryl Carvis Cromer, Jeffrey Mark Estroff, James Anthony Hunt, Howard Jeffrey Locker, Joshua Neil Novak, Randall Scott Springfield, James Peter Ward, Arnold Stephen Weksler
  • Patent number: 6920561
    Abstract: A method for providing an authentication of a user of a computer system in a network is disclosed. The method comprises capturing biometric data of a user; encrypting and signing the biometric data with a private key and sending the encrypted and signed data to a central server in the network. The method further comprises accepting and verifying credentials associated with the signed and encrypted data from the server utilizing the public key from the server. The method further comprises installing the credentials into the computer if the credentials are verified. In a method and system in accordance with the present invention, a user can walk up to any client within an enterprise and have their locally captured biometric input authenticated at a central server. The user can then have their individual credentials securely imported to the local client for subsequent use during that time period, without needing any additional identification or memory token such as a smartcard.
    Type: Grant
    Filed: March 31, 2000
    Date of Patent: July 19, 2005
    Assignee: International Business Machines Corporation
    Inventors: Christopher Britton Gould, Howard Jeffery Locker, Andy Lloyd Trotter, Michael T. Vanover, James Peter Ward
  • Patent number: 6892305
    Abstract: A method and system for booting up a computer system in a secure fashion is disclosed. The method and system comprise determining the presence of a security feature element during an initialization of the computer system wherein the security feature element includes a public key and a corresponding private key, storing a portion of the public key in a nonvolatile memory within the computer system if the security feature element is present and utilizing an algorithm to determine the presence of the security feature element prior to a subsequent boot-up of the computer system. Through the use of the present invention, a computer system is capable of being booted up whereby the computer system determines if a security feature element was previously present in the system. If a security feature element was previously present in the computer system, any stored keys, along with the secrets that they protect, are prevented from being compromised.
    Type: Grant
    Filed: October 12, 2000
    Date of Patent: May 10, 2005
    Assignee: International Business Machines Corporation
    Inventors: Richard Alan Dayan, Steven Dale Goodman, Joseph Michael Pennisi, Randall Scott Springfield, James Peter Ward, Joseph Wayne Freeman
  • Patent number: 6889298
    Abstract: An apparatus and method for exclusively binding data to a data processing system. The logical binding apparatus of the present invention includes a detachable circuit device mounted within a system planar. Data to be bound within the system planar is stored in a memory device within the detachable circuit device. A battery signal is applied from the system planar to a binding pin on the detachable circuit device, wherein the binding pin is applied to the input of a binding latch. The binding latch remains in a reset state while the battery signal is applied. Upon removal of said binding signal from the binding pin, the binding latch is set thus signaling a processing unit within the detachable circuit device to remove the data from the memory device.
    Type: Grant
    Filed: November 2, 2001
    Date of Patent: May 3, 2005
    Assignee: International Business Machines Corporation
    Inventors: Scott Thomas Elliot, James Patrick Hoff, Randall Scott Springfield, James Peter Ward
  • Patent number: 6880095
    Abstract: A computing system includes a motherboard including one or more connection subsystems, each of which includes a port connector and a device interface circuit conditioning signals transmitted or received through the port connector. The port connector includes a connection-sensing terminal, which is connected to ground through a cable, and which is allowed to float to a voltage supplied through a pull-up resistor when the cable is disconnected. The motherboard also includes a main voltage plane supplying electrical power to a separate voltage plane for each device interface circuit only when a cable is connected to the port connector which is also connected to the device interface circuit.
    Type: Grant
    Filed: January 23, 2002
    Date of Patent: April 12, 2005
    Assignee: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Howard Jeffrey Locker, Andy Lloyd Trotter, James Peter Ward
  • Patent number: 6856688
    Abstract: A method and system for reconfiguring a multi-dimension sound system is disclosed. The method and system include a remote control that is capable of emitting a low-frequency sound wave pulse pattern, and a plurality of speakers, wherein each speaker includes a pulse counter that counts a number of sound wave pulses received from the remote control over a predetermined time period. The method and system further include an audio receiver that includes a digital audio encoding system. The receiver uses the respective sound wave pulse count from each of the speakers to compute the distance between the remote control and each speaker, and programs the digital audio encoding system with speaker delay times based on the computed distances.
    Type: Grant
    Filed: April 27, 2001
    Date of Patent: February 15, 2005
    Assignee: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Jan Michael Janick, Howard Jeffrey Locker, James Peter Ward
  • Patent number: 6823464
    Abstract: Authentication of an entity remotely managing a data processing system is enabled to allow changes by the remote entity to hard-locked critical security information normally accessible only during the POST and only to trusted entities such as the system BIOS. The remote entity builds a change request and generates a hash from the change request with a current password appended. The change request and the hash are stored in a lockable non-volatile buffer which, once locked, requires a system reset to access. During the next POST, a trusted entity such as the system BIOS reads the change request, generates an authentication hash from the change request and the current password within the hard-locked security information, and compares the buffered hash with the generated hash. If a match is determined, the security information is updated; otherwise a tamper error is reported.
    Type: Grant
    Filed: February 26, 2001
    Date of Patent: November 23, 2004
    Assignee: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Joseph Wayne Freeman, Steven Dale Goodman, Randall Scott Springfield, James Peter Ward
  • Publication number: 20040205362
    Abstract: A computer system is presented which provides a trusted platform by which operations can be performed with an increased level trust and confidence. The basis of trust for the computer system is established by an encryption coprocessor and by code which interfaces with the encryption coprocessor and establishes root of trust metrics for the platform. The encryption coprocessor is built such that certain critical operations are allowed only if physical presence of an operator has been detected. Physical presence is determined by inference based upon the status of registers in the core chipset.
    Type: Application
    Filed: April 10, 2003
    Publication date: October 14, 2004
    Applicant: International Business Machines Corporation
    Inventors: Ryan Charles Catherman, Steven Dale Goodman, James Patrick Hoff, Randall Scott Springfield, James Peter Ward
  • Publication number: 20040205353
    Abstract: A computer system is presented which provides a trusted platform by which operations can be performed with an increased level trust and confidence. The basis of trust for the computer system is established by an encryption coprocessor and by code which interfaces with the encryption coprocessor and establishes root of trust metrics for the platform. The encryption coprocessor is built such that certain critical operations are allowed only if physical presence of an operator has been detected. Physical presence is determined by inference based upon the status of registers in the core chipset.
    Type: Application
    Filed: April 10, 2003
    Publication date: October 14, 2004
    Applicant: International Business Machines Corporation
    Inventors: Ryan Charles Catherman, Steven Dale Goodman, James Patrick Hoff, Randall Scott Springfield, James Peter Ward
  • Publication number: 20040205070
    Abstract: A motherboard for a computer system is presented which provides a trusted platform by which operations can be performed with an increased level trust and confidence. The basis of trust for the motherboard is established by an encryption coprocessor and by code which interfaces with the encryption coprocessor and establishes root of trust metrics for the platform. The encryption coprocessor is built such that certain critical operations are allowed only if physical presence of an operator has been detected. Physical presence is determined by inference based upon the status of registers in the core chipset on the motherboard.
    Type: Application
    Filed: April 10, 2003
    Publication date: October 14, 2004
    Applicant: International Business Machines Corporation
    Inventors: Ryan Charles Catherman, Steven Dale Goodman, James Patrick Hoff, Randall Scott Springfield, James Peter Ward
  • Publication number: 20040204181
    Abstract: A method and system for conserving battery strength of a mobile node, such as a laptop computer, on a wireless local area network (WLAN). The mobile node transmit symbols, which are units of data, during transmission cycles to maintain a connection with the WLAN. A battery charge level of the mobile node is measured. As the battery charge level drops below pre-defined levels, a frequency of symbol transmission for the mobile node is reduced. The reduction of the frequency of the symbol transmission results in lower power demands by a transmitter chipset of the mobile node. Thus, the mobile node is able to prolong the life of the battery of the mobile node.
    Type: Application
    Filed: March 21, 2002
    Publication date: October 14, 2004
    Applicant: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Philip John Jakes, Howard Jeffrey Locker, James Peter Ward