Patents by Inventor Kofi Kekessie

Kofi Kekessie has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160294808
    Abstract: A method, system and apparatus for authenticating a communication request sent from a client computing device. The communication request is initially blocked by a firewall preventing delivery to a server. A first logging event corresponding to the communication request is created. The communication request and the logging event are stored in a firewall. The server is notified of the first logging event. The communication request corresponding to the first logging event is authenticated. A port in the firewall is enabled if the communication request is authenticated.
    Type: Application
    Filed: June 19, 2016
    Publication date: October 6, 2016
    Inventors: Jeffery Bart Jennings, Kofi Kekessie
  • Patent number: 9374339
    Abstract: A method, system and apparatus for authenticating a communication request sent from a client computing device. The communication request is initially blocked by a firewall preventing delivery to a server. A first logging event corresponding to the communication request is created. The communication request and the logging event are stored in a firewall. The server is notified of the first logging event. The communication request corresponding to the first logging event is authenticated. A port in the firewall is enabled if the communication request is authenticated.
    Type: Grant
    Filed: August 4, 2014
    Date of Patent: June 21, 2016
    Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.
    Inventors: Jeffery Bart Jennings, Kofi Kekessie
  • Publication number: 20140344914
    Abstract: A method, system and apparatus for authenticating a communication request sent from a client computing device. The communication request is initially blocked by a firewall preventing delivery to a server. A first logging event corresponding to the communication request is created. The communication request and the logging event are stored in a firewall. The server is notified of the first logging event. The communication request corresponding to the first logging event is authenticated. A port in the firewall is enabled if the communication request is authenticated.
    Type: Application
    Filed: August 4, 2014
    Publication date: November 20, 2014
    Inventors: Jeffery Bart Jennings, Kofi Kekessie
  • Patent number: 8826014
    Abstract: A method, system and apparatus for authenticating a communication request sent from a client computing device. The communication request is initially blocked by a firewall preventing delivery to a server. A first logging event corresponding to the communication request is created. The communication request and the logging event are stored in a firewall. The server is notified of the first logging event. The communication request corresponding to the first logging event is authenticated. A port in the firewall is enabled if the communication request is authenticated.
    Type: Grant
    Filed: January 21, 2005
    Date of Patent: September 2, 2014
    Assignee: International Business Machines Corporation
    Inventors: Jeffery Bart Jennings, Kofi Kekessie
  • Patent number: 8191131
    Abstract: A system and method in which authentication data, such as a password, which is sent to a server/firewall as part of an authentication request, for example a logon request, is received at the server/firewall in a plurality of messages at a plurality of logical ports from the user, thus improving protection against replay attacks. In one embodiment, a plurality of user authentication data parts is obtained from a remote user device as part of an authentication request, the plurality of user authentication data parts is assembled into user authentication data; the authenticity of the authentication request is checked using the user authentication data; and communication with the remote user device is enabled if the authentication request data is determined to be authentic.
    Type: Grant
    Filed: August 23, 2006
    Date of Patent: May 29, 2012
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey Bart Jennings, Kofi Kekessie
  • Patent number: 7765587
    Abstract: Methods, systems, and computer program products are provided for glyphword-based security. Embodiments include establishing a glyphword comprising a plurality of glyphs; and creating a plurality of glyphsheets wherein each glyphsheet includes one or more glyphs included in the established glyphword and one or more glyphs not included in the established glyphword; and for each glyphsheet: presenting to a user the glyphsheet; receiving from the user at least one selection of a glyph included in the glyphsheet; determining whether the glyphsheet is the last glyphsheet if the glyph selected by the user is not included in the glyphs of the glyphword; and providing access to a resource if the glyphsheet is the last glyphsheet.
    Type: Grant
    Filed: August 14, 2006
    Date of Patent: July 27, 2010
    Assignee: International Business Machines Corporation
    Inventors: Richard A. Dayan, Jeffrey B. Jennings, Kofi Kekessie
  • Publication number: 20090164555
    Abstract: A method, computer program product, and system for initiating execution of server-controlled tasks are provided. The method, computer program product, and system provide for providing a server-controlled task, the server-controlled task being a task that is to be initiated by a server and executed at a client in communication with the server, and triggering initiation of the server-controlled task by the server from the client.
    Type: Application
    Filed: December 21, 2007
    Publication date: June 25, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: James T. BEZANSON, Jeffrey B. JENNINGS, Kofi KEKESSIE
  • Publication number: 20080072304
    Abstract: A system and method in which authentication data, such as a password, which is sent to a server/firewall as part of an authentication request, for example a logon request, is received at the server/firewall in a plurality of messages at a plurality of logical ports from the user, thus improving protection against replay attacks. In one embodiment, a plurality of user authentication data parts is obtained from a remote user device as part of an authentication request, the plurality of user authentication data parts is assembled into user authentication data; the authenticity of the authentication request is checked using the user authentication data; and communication with the remote user device is enabled if the authentication request data is determined to be authentic.
    Type: Application
    Filed: August 23, 2006
    Publication date: March 20, 2008
    Inventors: JEFFREY BART JENNINGS, KOFI KEKESSIE
  • Publication number: 20080040612
    Abstract: Methods, systems, and computer program products are provided for glyphword-based security. Embodiments include establishing a glyphword comprising a plurality of glyphs; and creating a plurality of glyphsheets wherein each glyphsheet includes one or more glyphs included in the established glyphword and one or more glyphs not included in the established glyphword; and for each glyphsheet: presenting to a user the glyphsheet; receiving from the user at least one selection of a glyph included in the glyphsheet; determining whether the glyphsheet is the last glyphsheet if the glyph selected by the user is not included in the glyphs of the glyphword; and providing access to a resource if the glyphsheet is the last glyphsheet.
    Type: Application
    Filed: August 14, 2006
    Publication date: February 14, 2008
    Inventors: Richard A. Dayan, Jeffrey B. Jennings, Kofi Kekessie
  • Publication number: 20070157016
    Abstract: An apparatus, system, and method are disclosed for autonomously preserving high-availability network boot services. The apparatus includes a monitor module, a detection module, and a substitution module. The monitor module actively monitors a distributed logical linked list. The detection module detects a variation in a distributed logical linked list configuration. The substitution module substitutes a network boot service of a failed element of the distributed logical linked list. The apparatus, system, and method provide preservation of on-demand network services autonomously, maintaining a high-availability of network boot services.
    Type: Application
    Filed: December 29, 2005
    Publication date: July 5, 2007
    Inventors: Richard Dayan, Jeffrey Jennings, Kofi Kekessie
  • Publication number: 20060168654
    Abstract: A method, system and apparatus for authenticating a communication request sent from a client computing device. The communication request is initially blocked by a firewall preventing delivery to a server. A first logging event corresponding to the communication request is created. The communication request and the logging event are stored in a firewall. The server is notified of the first logging event. The communication request corresponding to the first logging event is authenticated. A port in the firewall is enabled if the communication request is authenticated.
    Type: Application
    Filed: January 21, 2005
    Publication date: July 27, 2006
    Applicant: International Business Machines Corporation
    Inventors: Jeffery Jennings, Kofi Kekessie
  • Patent number: 6658563
    Abstract: A data processing system and method are described for booting a computer system from a virtual floppy diskette. A native operating system is executed by the computer system which utilizes a native file system. A boot able floppy diskette image is stored on the hard drive. The image includes a second operating system which utilizes a second file system. A master boot record stored on the hard drive is modified to include a boot bit. The boot bit is set in response to a storage of the image. The computer system is then booted from the image in response to the boot bit being set. The native operating system and the native file system are unchanged during the booting of the computer system from the image.
    Type: Grant
    Filed: May 18, 2000
    Date of Patent: December 2, 2003
    Assignee: International Business Machines Corporation
    Inventors: Herbert Jackson Ice, Jr., Robert Duane Johnson, Kofi Kekessie, David Rhoades, Gary Anthony Vaiskauckas