Patents by Inventor Joseph M. Pennisi
Joseph M. Pennisi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11734394Abstract: Apparatuses, methods, systems, and program products are disclosed for distributed license encryption and distribution. An apparatus includes a processor and a memory that stores code executable by the processor. The code is executable to select a license token from a pool of available license tokens associated with available digital licenses in response to a license request from a first device. The license token includes information identifying second devices where segments of a digital license associated with the license token are stored. The segments are encrypted using encryption keys for one or more participants. The code is executable to re-encrypt the segments of the digital license for the selected license token using an encryption key for the first device and send the license token to the first device where it is used to request the segments from the second devices, decrypt the segments, and reconstruct the digital license.Type: GrantFiled: October 23, 2019Date of Patent: August 22, 2023Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Igor Stolbikov, Alfredo Zugasti Hays, Joseph M. Pennisi, Rod D. Waltermann
-
Patent number: 11693968Abstract: In one aspect, an embedded controller (EC) in a device may receive a firmware update for another component in the device and determine whether the firmware update has been previously applied at the component. If the firmware update has not been previously applied, the EC may assign an identifier to the firmware update and digitally sign the identifier. The EC may then provide the firmware update and the digitally-signed identifier to the component so that the component may apply the firmware update.Type: GrantFiled: December 10, 2020Date of Patent: July 4, 2023Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Thorsten P. Stremlau, Kevin Wayne Beck, Russell Speight VanBlon, Joseph M. Pennisi
-
Patent number: 11665425Abstract: Apparatuses, methods, and program products are disclosed for operating a camera sense mode. One apparatus includes a processor, a camera, and a memory that stores code executable by the processor. The code is executable by the processor to determine, by use of the processor, whether the camera is set to a camera sense mode. The camera sense mode is a mode of the camera configured to use the camera as a sensor. The code is executable by the processor to, in response to the camera being set to the camera sense mode: analyze images captured by the camera, using a sensing application, to determine information related to the images; and inhibit applications separate from the sensing application from accessing images captured by the camera.Type: GrantFiled: December 8, 2020Date of Patent: May 30, 2023Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Kenneth Seethaler, Adam Jerome Cavenaugh, Brian Lee, Joseph M. Pennisi
-
Patent number: 11531761Abstract: Systems and methods are disclosed for generating a key based on at least one hardware component identifier for hardware of a first device and/or at least one piece of firmware code of the first device. The key may then be stored at a storage area accessible to the first device via hypertext transfer protocol secure (HTTPS) communication and the key may also be used to encrypt storage of the first device. Booting of the first device may then be facilitated based on HTTPS communication with a second device and using an extensible firmware interface (EFI) file and/or an IMG file stored at the second device. Then subsequent to at least partially facilitating the booting of the first device and based on verifying authentication credentials, the key may be transmitted to the first device to decrypt the storage of the first device.Type: GrantFiled: February 19, 2020Date of Patent: December 20, 2022Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Kevin Wayne Beck, Thorsten P. Stremlau, Russell Speight VanBlon, Joseph M. Pennisi
-
Patent number: 11379572Abstract: Apparatuses, methods, and program products are disclosed for proof of work based authentication. One apparatus includes a processor and a memory that stores code executable by the processor. The code is executable by the processor to determine, by use of the processor, a set of computer-based attributes corresponding to a first device. The code is executable by the processor to compute a proof of work based on the set of computer-based attributes. The code is executable by the processor to transmit the proof of work and the set of computer-based attributes to a second device for authentication based on the proof of work and the set of computer-based attributes.Type: GrantFiled: August 29, 2019Date of Patent: July 5, 2022Assignee: Lenovo (Singapore) PTE. LTD.Inventors: Igor Stolbikov, Joseph M. Pennisi, Joshua N. Novak, Philip Lee Childs
-
Patent number: 11374898Abstract: In one aspect, a first device may include at least one processor and storage accessible to the at least one processor. The storage may include instructions executable by the at least one processor to receive, from a second device, a partial hash of a domain name. The instructions may also be executable to use the partial hash and a probabilistic data structure to identify an Internet protocol (IP) address associated with the domain name. Responsive to identifying the IP address, the instructions may be executable to transmit the IP address to the second device.Type: GrantFiled: December 14, 2020Date of Patent: June 28, 2022Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Igor Stolbikov, Scott Wentao Li, Joseph M. Pennisi
-
Publication number: 20220188419Abstract: In one aspect, an embedded controller (EC) in a device may receive a firmware update for another component in the device and determine whether the firmware update has been previously applied at the component. If the firmware update has not been previously applied, the EC may assign an identifier to the firmware update and digitally sign the identifier. The EC may then provide the firmware update and the digitally-signed identifier to the component so that the component may apply the firmware update.Type: ApplicationFiled: December 10, 2020Publication date: June 16, 2022Inventors: Thorsten P. Stremlau, Kevin Wayne Beck, Russell Speight VanBlon, Joseph M. Pennisi
-
Publication number: 20220191164Abstract: In one aspect, a first device may include at least one processor and storage accessible to the at least one processor. The storage may include instructions executable by the at least one processor to receive, from a second device, a partial hash of a domain name. The instructions may also be executable to use the partial hash and a probabilistic data structure to identify an Internet protocol (IP) address associated with the domain name. Responsive to identifying the IP address, the instructions may be executable to transmit the IP address to the second device.Type: ApplicationFiled: December 14, 2020Publication date: June 16, 2022Inventors: Igor Stolbikov, Scott Wentao Li, Joseph M. Pennisi
-
Publication number: 20220182544Abstract: Apparatuses, methods, and program products are disclosed for operating a camera sense mode. One apparatus includes a processor, a camera, and a memory that stores code executable by the processor. The code is executable by the processor to determine, by use of the processor, whether the camera is set to a camera sense mode. The camera sense mode is a mode of the camera configured to use the camera as a sensor. The code is executable by the processor to, in response to the camera being set to the camera sense mode: analyze images captured by the camera, using a sensing application, to determine information related to the images; and inhibit applications separate from the sensing application from accessing images captured by the camera.Type: ApplicationFiled: December 8, 2020Publication date: June 9, 2022Inventors: Kenneth Seethaler, Adam Jerome Cavenaugh, Brian Lee, Joseph M. Pennisi
-
Patent number: 11343102Abstract: An approach is provided that receives a password that corresponds to a user identifier. A number of hashing algorithms are retrieved with the specific hashing algorithms that are retrieved being based on the received user identifier. The password is hashed using each of retrieved hashing algorithms resulting in a number of hash results. The hash results are combined with the combining of the hash result eventually resulting in a combined hash result. An expected hash result that corresponds to the user identifier is retrieved and compared to the combined hash result. The password is verified based on the results of the comparison.Type: GrantFiled: March 17, 2020Date of Patent: May 24, 2022Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Igor Stolbikov, Veronika Stolbikova, Rod D. Waltermann, Joseph M. Pennisi
-
Patent number: 11233651Abstract: An approach is provided that uses multiple hashing algorithms to verify a password. The approach receives a password that corresponds to a user identifier. A set of hashing algorithms are retrieved with the retrieved set based on the received user identifier so that different user identifiers utilize different sets of hashing algorithms. Hashing the password using each of the hashing algorithms included in the set of algorithms with the hashing resulting in a hash result. An expected hash result that corresponds to the user identifier is retrieved and the approach then verifies the received password by comparing the hash result to the first expected hash result.Type: GrantFiled: March 17, 2020Date of Patent: January 25, 2022Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Igor Stolbikov, Veronika Stolbikova, Rod D. Waltermann, Joseph M. Pennisi
-
Publication number: 20210297261Abstract: An approach is provided that receives a password that corresponds to a user identifier. A number of hashing algorithms are retrieved with the specific hashing algorithms that are retrieved being based on the received user identifier. The password is hashed using each of retrieved hashing algorithms resulting in a number of hash results. The hash results are combined with the combining of the hash result eventually resulting in a combined hash result. An expected hash result that corresponds to the user identifier is retrieved and compared to the combined hash result. The password is verified based on the results of the comparison.Type: ApplicationFiled: March 17, 2020Publication date: September 23, 2021Inventors: Igor Stolbikov, Veronika Stolbikova, Rod D. Waltermann, Joseph M. Pennisi
-
Publication number: 20210297256Abstract: An approach is provided that uses multiple hashing algorithms to verify a password. The approach receives a password that corresponds to a user identifier. A set of hashing algorithms are retrieved with the retrieved set based on the received user identifier so that different user identifiers utilize different sets of hashing algorithms. Hashing the password using each of the hashing algorithms included in the set of algorithms with the hashing resulting in a hash result. An expected hash result that corresponds to the user identifier is retrieved and the approach then verifies the received password by comparing the hash result to the first expected hash result.Type: ApplicationFiled: March 17, 2020Publication date: September 23, 2021Inventors: Igor Stolbikov, Veronika Stolbikova, Rod D. Waltermann, Joseph M. Pennisi
-
Publication number: 20210256133Abstract: Systems and methods are disclosed for generating a key based on at least one hardware component identifier for hardware of a first device and/or at least one piece of firmware code of the first device. The key may then be stored at a storage area accessible to the first device via hypertext transfer protocol secure (HTTPS) communication and the key may also be used to encrypt storage of the first device. Booting of the first device may then be facilitated based on HTTPS communication with a second device and using an extensible firmware interface (EFI) file and/or an IMG file stored at the second device. Then subsequent to at least partially facilitating the booting of the first device and based on verifying authentication credentials, the key may be transmitted to the first device to decrypt the storage of the first device.Type: ApplicationFiled: February 19, 2020Publication date: August 19, 2021Inventors: Kevin Wayne Beck, Thorsten P. Stremlau, Russell Speight VanBlon, Joseph M. Pennisi
-
Publication number: 20210124812Abstract: Apparatuses, methods, systems, and program products are disclosed for distributed license encryption and distribution. An apparatus includes a processor and a memory that stores code executable by the processor. The code is executable to select a license token from a pool of available license tokens associated with available digital licenses in response to a license request from a first device. The license token includes information identifying second devices where segments of a digital license associated with the license token are stored. The segments are encrypted using encryption keys for one or more participants. The code is executable to re-encrypt the segments of the digital license for the selected license token using an encryption key for the first device and send the license token to the first device where it is used to request the segments from the second devices, decrypt the segments, and reconstruct the digital license.Type: ApplicationFiled: October 23, 2019Publication date: April 29, 2021Inventors: Igor Stolbikov, Alfredo Zugasti Hays, Joseph M. Pennisi, Rod D. Waltermann
-
Publication number: 20210064733Abstract: Apparatuses, methods, and program products are disclosed for proof of work based authentication. One apparatus includes a processor and a memory that stores code executable by the processor. The code is executable by the processor to determine, by use of the processor, a set of computer-based attributes corresponding to a first device. The code is executable by the processor to compute a proof of work based on the set of computer-based attributes. The code is executable by the processor to transmit the proof of work and the set of computer-based attributes to a second device for authentication based on the proof of work and the set of computer-based attributes.Type: ApplicationFiled: August 29, 2019Publication date: March 4, 2021Inventors: Igor Stolbikov, Joseph M. Pennisi, Joshua N. Novak, Philip Lee Childs
-
Patent number: 9146601Abstract: Embodiments of the invention implement one or more power management policies on one or more devices in order intelligently to manage the finite amount of battery power available while maximizing synchronization between connected devices.Type: GrantFiled: November 20, 2009Date of Patent: September 29, 2015Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Randall S. Springfield, Kenneth S. Seethaler, Howard Locker, Richard W. Cheston, Joseph M. Pennisi
-
Patent number: 8539246Abstract: Systems, methods and products are described that provide secure resume for encrypted drives. One aspect provides a method including: receiving an indication to resume from a suspended state at a computing device; responsive to authenticating a user at one or more input devices, accessing a value in a BIOS derived from authenticating the user at the one or more input devices; responsive to accessing the value, releasing a credential for unlocking one or more encrypted drives; and thereafter proceeding to resume from the suspend state.Type: GrantFiled: March 16, 2011Date of Patent: September 17, 2013Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Kenneth S. Seethaler, Randall S. Springfield, Howard Locker, Joseph M. Pennisi
-
Patent number: 8473747Abstract: Systems, methods and products are described that provide secure boot with a minimum number of re-boots. One aspect provides a method including receiving an indication to boot from a power off state at a computing device; responsive to authenticating a user at one or more input devices, releasing a value derived from authenticating the user at the one or more input devices; responsive to releasing the value, unlocking one or more encrypted drives with a previously established alternate credential; and thereafter proceeding to boot from the power off state. By not having to call the non-BIOS software each boot, this minimizes the number of reboots for each boot cycle.Type: GrantFiled: March 16, 2011Date of Patent: June 25, 2013Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Randall S. Springfield, Joseph M. Pennisi, Howard Locker, Kenneth S. Seethaler
-
Patent number: 8364138Abstract: The invention broadly contemplates locking methods and arrangements for electronic devices, including laptop personal computing (PC) devices. The invention provides methods and arrangements for authorizing remote devices, such as cellular phones, to control the locking of electronic devices, such as laptop PCs. After receipt of a lock message from an authorized device at a guaranteed buffer, the laptop PC becomes locked such that only an authorized user may enable the functionality of the device.Type: GrantFiled: December 22, 2008Date of Patent: January 29, 2013Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Philip L. Childs, Michael T. Vanover, Tomoki Maruichi, Terry A. Buschbach, Adam M. Smith, Lisa L. Carter, Joseph M. Pennisi, Masahiko Shinomura