Patents by Inventor John H. Nicholson

John H. Nicholson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8099789
    Abstract: Method and apparatus for enabling applications on security processors of computer systems. In one aspect, a security processor apparatus includes a processor and a memory coupled to the processor and operative to store a secure table. The secure table stores different certified endorsement keys and different values, each value associated with one of the endorsement keys. Each stored value is derived from a different application that is certified by the associated endorsement key to be executed on the processor.
    Type: Grant
    Filed: September 29, 2006
    Date of Patent: January 17, 2012
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: David C. Challener, John H. Nicholson, III, Joseph Pennisi, Rod D. Waltermann
  • Patent number: 8024579
    Abstract: A system and method for authenticating suspect code includes steps of: receiving the suspect code for a first instance of a trusted platform module; loading the suspect code into a trusted platform module device operatively associated with a processor, wherein the suspect code is loaded outside of a shielded location within the trusted platform module device; retrieving a validation public key from a table and storing it in a register in the trusted platform module device, the validation public key indexed by the suspect code; and retrieving a hash algorithm from the table, the hash algorithm indexed by the suspect code. The hash algorithm is run to derive a first hash value; then, using the validation public key, the second hash value is decrypted to derive a second decrypted hash value. The two hash values are compared; and upon determining a match, the suspect code is loaded into the shielded location of the processor for execution by the processor.
    Type: Grant
    Filed: December 29, 2006
    Date of Patent: September 20, 2011
    Assignee: Lenovo (Singapore) PTE Ltd.
    Inventors: David Carroll Challener, John H. Nicholson, Joseph Michael Pennisi, Rod D. Waltermann
  • Patent number: 7533097
    Abstract: In a customizable data migration method and system, when a migration program is launched, it queries a system server for entity-level and user-level policies. The migration program then creates a customized interface to the user, where the entity-level and user-level polices are applied with hierarchical priorities. In this manner, flexibility is provided in the data migration process. The end user is allowed to maintain a personality on a given user system and to transfer this personality along with the company specified data. This increases the uptime of the user by reducing the re-customization time when the user is cascaded to a new user system.
    Type: Grant
    Filed: June 29, 2004
    Date of Patent: May 12, 2009
    Assignee: International Business Machines Corporation
    Inventors: Abiola O. Ayediran, Justin T. Dubs, John H. Nicholson, III, Jennifer L. Zawacki
  • Publication number: 20080162932
    Abstract: A system and method for authenticating suspect code includes steps of: receiving the suspect code for a first instance of a trusted platform module; loading the suspect code into a trusted platform module device operatively associated with a processor, wherein the suspect code is loaded outside of a shielded location within the trusted platform module device; retrieving a validation public key from a table and storing it in a register in the trusted platform module device, the validation public key indexed by the suspect code; and retrieving a hash algorithm from the table, the hash algorithm indexed by the suspect code. The hash algorithm is run to derive a first hash value; then, using the validation public key, the second hash value is decrypted to derive a second decrypted hash value. The two hash values are compared; and upon determining a match, the suspect code is loaded into the shielded location of the processor for execution by the processor.
    Type: Application
    Filed: December 29, 2006
    Publication date: July 3, 2008
    Applicant: Lenovo (Singapore) PTE Ltd.
    Inventors: David Carroll Challener, John H. Nicholson, Joseph Michael Pennisi, Rod D. Waltermann
  • Publication number: 20080104416
    Abstract: Method and apparatus for enabling applications on security processors of computer systems. In one aspect, a security processor apparatus includes a processor and a memory coupled to the processor and operative to store a secure table. The secure table stores different certified endorsement keys and different values, each value associated with one of the endorsement keys. Each stored value is derived from a different application that is certified by the associated endorsement key to be executed on the processor.
    Type: Application
    Filed: September 29, 2006
    Publication date: May 1, 2008
    Inventors: David C. Challener, John H. Nicholson, Joseph Pennisi, Rod D. Waltermann
  • Publication number: 20080077805
    Abstract: Data exchanged between memory components is protected against possible misuse and breach of security by providing for encryption of data swapped out to another location such as a disk drive.
    Type: Application
    Filed: September 26, 2006
    Publication date: March 27, 2008
    Inventors: Ryan C. Catherman, David C. Challener, James P. Hoff, John H. Nicholson
  • Patent number: 4616976
    Abstract: A cooled vane or blade for a gas turbine engine has a cooling arrangement for its trailing region which can be accommodated in the relatively thin section available. In this arrangement the trailing region of the hollow interior of the blade is divided off from the remainder by a partition which may be apertured to allow cooling air to enter the compartment thus formed. The concave, pressure flank of the compartment is cooled by arrays of film cooling holes while the convex, suction flank has a perforated plate spaced therefrom to provide impingement cooling. The suction flank is therefore unapertured and there is no disturbance of the high speed airflow in this region. The spent impingement air leaves the aerofoil via a slot and may pass over pedestals en route to cool the entire trailing edge.
    Type: Grant
    Filed: June 28, 1982
    Date of Patent: October 14, 1986
    Assignee: Rolls-Royce plc
    Inventors: Barry W. Lings, John H. Nicholson