Patents by Inventor Kofi Kekessie
Kofi Kekessie has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20160294808Abstract: A method, system and apparatus for authenticating a communication request sent from a client computing device. The communication request is initially blocked by a firewall preventing delivery to a server. A first logging event corresponding to the communication request is created. The communication request and the logging event are stored in a firewall. The server is notified of the first logging event. The communication request corresponding to the first logging event is authenticated. A port in the firewall is enabled if the communication request is authenticated.Type: ApplicationFiled: June 19, 2016Publication date: October 6, 2016Inventors: Jeffery Bart Jennings, Kofi Kekessie
-
Patent number: 9374339Abstract: A method, system and apparatus for authenticating a communication request sent from a client computing device. The communication request is initially blocked by a firewall preventing delivery to a server. A first logging event corresponding to the communication request is created. The communication request and the logging event are stored in a firewall. The server is notified of the first logging event. The communication request corresponding to the first logging event is authenticated. A port in the firewall is enabled if the communication request is authenticated.Type: GrantFiled: August 4, 2014Date of Patent: June 21, 2016Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.Inventors: Jeffery Bart Jennings, Kofi Kekessie
-
Publication number: 20140344914Abstract: A method, system and apparatus for authenticating a communication request sent from a client computing device. The communication request is initially blocked by a firewall preventing delivery to a server. A first logging event corresponding to the communication request is created. The communication request and the logging event are stored in a firewall. The server is notified of the first logging event. The communication request corresponding to the first logging event is authenticated. A port in the firewall is enabled if the communication request is authenticated.Type: ApplicationFiled: August 4, 2014Publication date: November 20, 2014Inventors: Jeffery Bart Jennings, Kofi Kekessie
-
Patent number: 8826014Abstract: A method, system and apparatus for authenticating a communication request sent from a client computing device. The communication request is initially blocked by a firewall preventing delivery to a server. A first logging event corresponding to the communication request is created. The communication request and the logging event are stored in a firewall. The server is notified of the first logging event. The communication request corresponding to the first logging event is authenticated. A port in the firewall is enabled if the communication request is authenticated.Type: GrantFiled: January 21, 2005Date of Patent: September 2, 2014Assignee: International Business Machines CorporationInventors: Jeffery Bart Jennings, Kofi Kekessie
-
Patent number: 8191131Abstract: A system and method in which authentication data, such as a password, which is sent to a server/firewall as part of an authentication request, for example a logon request, is received at the server/firewall in a plurality of messages at a plurality of logical ports from the user, thus improving protection against replay attacks. In one embodiment, a plurality of user authentication data parts is obtained from a remote user device as part of an authentication request, the plurality of user authentication data parts is assembled into user authentication data; the authenticity of the authentication request is checked using the user authentication data; and communication with the remote user device is enabled if the authentication request data is determined to be authentic.Type: GrantFiled: August 23, 2006Date of Patent: May 29, 2012Assignee: International Business Machines CorporationInventors: Jeffrey Bart Jennings, Kofi Kekessie
-
Patent number: 7765587Abstract: Methods, systems, and computer program products are provided for glyphword-based security. Embodiments include establishing a glyphword comprising a plurality of glyphs; and creating a plurality of glyphsheets wherein each glyphsheet includes one or more glyphs included in the established glyphword and one or more glyphs not included in the established glyphword; and for each glyphsheet: presenting to a user the glyphsheet; receiving from the user at least one selection of a glyph included in the glyphsheet; determining whether the glyphsheet is the last glyphsheet if the glyph selected by the user is not included in the glyphs of the glyphword; and providing access to a resource if the glyphsheet is the last glyphsheet.Type: GrantFiled: August 14, 2006Date of Patent: July 27, 2010Assignee: International Business Machines CorporationInventors: Richard A. Dayan, Jeffrey B. Jennings, Kofi Kekessie
-
Publication number: 20090164555Abstract: A method, computer program product, and system for initiating execution of server-controlled tasks are provided. The method, computer program product, and system provide for providing a server-controlled task, the server-controlled task being a task that is to be initiated by a server and executed at a client in communication with the server, and triggering initiation of the server-controlled task by the server from the client.Type: ApplicationFiled: December 21, 2007Publication date: June 25, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: James T. BEZANSON, Jeffrey B. JENNINGS, Kofi KEKESSIE
-
Publication number: 20080072304Abstract: A system and method in which authentication data, such as a password, which is sent to a server/firewall as part of an authentication request, for example a logon request, is received at the server/firewall in a plurality of messages at a plurality of logical ports from the user, thus improving protection against replay attacks. In one embodiment, a plurality of user authentication data parts is obtained from a remote user device as part of an authentication request, the plurality of user authentication data parts is assembled into user authentication data; the authenticity of the authentication request is checked using the user authentication data; and communication with the remote user device is enabled if the authentication request data is determined to be authentic.Type: ApplicationFiled: August 23, 2006Publication date: March 20, 2008Inventors: JEFFREY BART JENNINGS, KOFI KEKESSIE
-
Publication number: 20080040612Abstract: Methods, systems, and computer program products are provided for glyphword-based security. Embodiments include establishing a glyphword comprising a plurality of glyphs; and creating a plurality of glyphsheets wherein each glyphsheet includes one or more glyphs included in the established glyphword and one or more glyphs not included in the established glyphword; and for each glyphsheet: presenting to a user the glyphsheet; receiving from the user at least one selection of a glyph included in the glyphsheet; determining whether the glyphsheet is the last glyphsheet if the glyph selected by the user is not included in the glyphs of the glyphword; and providing access to a resource if the glyphsheet is the last glyphsheet.Type: ApplicationFiled: August 14, 2006Publication date: February 14, 2008Inventors: Richard A. Dayan, Jeffrey B. Jennings, Kofi Kekessie
-
Publication number: 20070157016Abstract: An apparatus, system, and method are disclosed for autonomously preserving high-availability network boot services. The apparatus includes a monitor module, a detection module, and a substitution module. The monitor module actively monitors a distributed logical linked list. The detection module detects a variation in a distributed logical linked list configuration. The substitution module substitutes a network boot service of a failed element of the distributed logical linked list. The apparatus, system, and method provide preservation of on-demand network services autonomously, maintaining a high-availability of network boot services.Type: ApplicationFiled: December 29, 2005Publication date: July 5, 2007Inventors: Richard Dayan, Jeffrey Jennings, Kofi Kekessie
-
Publication number: 20060168654Abstract: A method, system and apparatus for authenticating a communication request sent from a client computing device. The communication request is initially blocked by a firewall preventing delivery to a server. A first logging event corresponding to the communication request is created. The communication request and the logging event are stored in a firewall. The server is notified of the first logging event. The communication request corresponding to the first logging event is authenticated. A port in the firewall is enabled if the communication request is authenticated.Type: ApplicationFiled: January 21, 2005Publication date: July 27, 2006Applicant: International Business Machines CorporationInventors: Jeffery Jennings, Kofi Kekessie
-
Patent number: 6658563Abstract: A data processing system and method are described for booting a computer system from a virtual floppy diskette. A native operating system is executed by the computer system which utilizes a native file system. A boot able floppy diskette image is stored on the hard drive. The image includes a second operating system which utilizes a second file system. A master boot record stored on the hard drive is modified to include a boot bit. The boot bit is set in response to a storage of the image. The computer system is then booted from the image in response to the boot bit being set. The native operating system and the native file system are unchanged during the booting of the computer system from the image.Type: GrantFiled: May 18, 2000Date of Patent: December 2, 2003Assignee: International Business Machines CorporationInventors: Herbert Jackson Ice, Jr., Robert Duane Johnson, Kofi Kekessie, David Rhoades, Gary Anthony Vaiskauckas