Patents by Inventor Justin Bandholz

Justin Bandholz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9578777
    Abstract: A computing system includes a low-profile chassis a motherboard disposed therein and at least one full-size circuit board coupled to the motherboard within the chassis. A method and another computing system are disclosed.
    Type: Grant
    Filed: March 20, 2015
    Date of Patent: February 21, 2017
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Mickey Steven Felton, Robert P. Wierzbicki, Michael Gregoire, Ralph C. Frangioso, Jr., Jiabing Li, Justin Bandholz
  • Patent number: 8391485
    Abstract: Embodiments of the invention include methods of transmitting a hidden message within a secured primary data transmission. In one embodiment, a method involves transmitting a primary data transmission over a computer network from a source host to a receiving host. Intentionally-corrupted packets are introduced within the primary data transmission in a manner providing a hidden message. For example, a pattern of intentionally-corrupted packets may be used to encode the hidden message. Alternatively, the hidden message may be embedded within the data area of the intentionally-corrupted packets. The intentionally-corrupted packets are received and interpreted at the receiving host to determine the hidden message.
    Type: Grant
    Filed: May 13, 2012
    Date of Patent: March 5, 2013
    Assignee: International Business Machines Corporation
    Inventors: Justin Bandholz, Sr., William G. Pagan, William Piazza, III
  • Patent number: 8351605
    Abstract: Embodiments of the invention include methods of transmitting a hidden message within a secured primary data transmission. In one embodiment, a method involves transmitting a primary data transmission over a computer network from a source host to a receiving host. Intentionally-corrupted packets are introduced within the primary data transmission in a manner providing a hidden message. For example, a pattern of intentionally-corrupted packets may be used to encode the hidden message. Alternatively, the hidden message may be embedded within the data area of the intentionally-corrupted packets. The intentionally-corrupted packets are received and interpreted at the receiving host to determine the hidden message.
    Type: Grant
    Filed: September 16, 2009
    Date of Patent: January 8, 2013
    Assignee: International Business Machines Corporation
    Inventors: Justin Bandholz, William G. Pagan, William Piazza
  • Publication number: 20120219154
    Abstract: Embodiments of the invention include methods of transmitting a hidden message within a secured primary data transmission. In one embodiment, a method involves transmitting a primary data transmission over a computer network from a source host to a receiving host. Intentionally-corrupted packets are introduced within the primary data transmission in a manner providing a hidden message. For example, a pattern of intentionally-corrupted packets may be used to encode the hidden message. Alternatively, the hidden message may be embedded within the data area of the intentionally-corrupted packets. The intentionally-corrupted packets are received and interpreted at the receiving host to determine the hidden message.
    Type: Application
    Filed: May 13, 2012
    Publication date: August 30, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Justin Bandholz, William G. Pagan, William Piazza
  • Publication number: 20110066910
    Abstract: Embodiments of the invention include methods of transmitting a hidden message within a secured primary data transmission. In one embodiment, a method involves transmitting a primary data transmission over a computer network from a source host to a receiving host. Intentionally-corrupted packets are introduced within the primary data transmission in a manner providing a hidden message. For example, a pattern of intentionally-corrupted packets may be used to encode the hidden message. Alternatively, the hidden message may be embedded within the data area of the intentionally-corrupted packets. The intentionally-corrupted packets are received and interpreted at the receiving host to determine the hidden message.
    Type: Application
    Filed: September 16, 2009
    Publication date: March 17, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Justin Bandholz, William G. Pagan, William Piazza
  • Publication number: 20100123435
    Abstract: Method and apparatus are provided for controlling electrical current supplied to an electronic device, such as a computer system. The method includes drawing up to a predetermined amount of an electrical input current from a first current source, and supplying a first portion of the drawn electrical input current to the electronic device, wherein the amount of the first portion may change over time to supply the amount of electrical current demanded by the electronic device without exceeding the predetermined amount. A second portion is supplied to charge an energy storage device during a period that the first portion is less than the predetermined amount. The stored energy device is discharged, as needed, to supply supplemental electrical current to the electronic device. A power supply including an energy storage device, such as a rechargeable battery, may be used to carry out the method.
    Type: Application
    Filed: November 18, 2008
    Publication date: May 20, 2010
    Applicant: International Business Machines Corporation
    Inventors: William J. Piazza, Justin Bandholz, William G. Pagan
  • Publication number: 20070260890
    Abstract: Embodiments of the invention provide a novel and non-obvious method, system and computer program product for securing of leased resources on a computer. In one embodiment of the invention, a computer for securing resources may comprise at least one processor, a plurality of resources, wherein each resource is associated with configuration data and a programmable logic device connected to each of the plurality of resources. The programmable logic device may be configured for determining whether a resource is leased, reading un-encoded configuration data from a resource, and sending the configuration data to a first unit, if the resource is not leased. The programmable logic device may further be configured for reading encoded configuration data from a resource, decoding the configuration data, sending the configuration data that was decoded to a first unit, and logging use of the resource by the first unit, if the resource is leased.
    Type: Application
    Filed: May 8, 2006
    Publication date: November 8, 2007
    Applicant: International Business Machines Corporation
    Inventors: Justin Bandholz, Ralph Begun, Andrew Heinzmann, Fernando Lopez
  • Publication number: 20070143644
    Abstract: A receiving processor is configured with a normal (operational) path and a test path. The test path is configured in parallel with the normal path. The test path simulates and receives as input the same data as the normal path, but the test path has a separate voltage reference (Vref—test) which is applied to a test input buffer. The same data input to normal buffer is also input to the test buffer. The output of the test buffer is input to a test latch. A clocking signal supplied to the test latch is a variable clocking signal enabling the clock signal to be skewed selectively. The output of the test latch is compared with the output of the normal latch, and differences between the two output signals defines an error for a particular voltage/clock-skew combination.
    Type: Application
    Filed: December 19, 2005
    Publication date: June 21, 2007
    Applicant: Interntional Business Machines Corporation
    Inventors: Alfredo Aldereguia, Marcus Baker, Justin Bandholz, Jeffrey Williams
  • Publication number: 20070143606
    Abstract: This invention enables authenticated communications (transactions) to take place on a standard I2C bus without requiring modification of existing I2C devices. Read and write transactions occurring on the bus are authenticated using an Authentication Agent and a shared secret key. In addition to allowing verification of the legitimacy of the transactions, the authentication of the I2C transactions enhances the reliability and serviceability of the bus and devices on the bus by allowing the Baseboard Management Controller (BMC) to quickly determine and pinpoint errors.
    Type: Application
    Filed: December 20, 2005
    Publication date: June 21, 2007
    Applicant: International Business Machines Corporation
    Inventors: Justin Bandholz, Ralph Begun, Andrew Heinzmann, Fernando Lopez
  • Publication number: 20060265158
    Abstract: A computing system includes a semiconductor which sources/sinks current to/from components within the system, an in-circuit semiconductor on-resistance characterization circuit which measures the on-resistance of the semiconductor, and a processor which periodically or continuously engages the characterization circuit over the life of the semiconductor to obtain a series of on-resistance measurements. Depending on the type of semiconductor used, or depending on arbitrary design limitations, the computing system predicts semiconductor failure based on either a relative mode or an absolute mode. The relative mode is useful when using FET's since on-resistance values vary significantly. In the relative mode, an optional NVRAM is used to store one or more on-resistance measurements which may serve as a reference for assuring proper circuit operation within tolerable deviations from the reference.
    Type: Application
    Filed: May 9, 2005
    Publication date: November 23, 2006
    Applicant: International Business Machines Corporation
    Inventor: Justin Bandholz
  • Publication number: 20060129709
    Abstract: Methods and apparatus that may be utilized to improve the scalability of multi-processor systems are provided. Data packets constructed in accordance with a defined coherence protocol may be encapsulated in standard I/O packets. As a result, the same interconnect fabric may be used to route coherent data traffic and I/O data traffic.
    Type: Application
    Filed: December 9, 2004
    Publication date: June 15, 2006
    Applicant: International Business Machines Corporation
    Inventors: Justin Bandholz, John Borkenhagen, Andrew Heinzmann, Terry Lyon