Patents by Inventor Michael F. Angelo

Michael F. Angelo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 6886109
    Abstract: A computer system includes multiple controllers that assist in executing the Power-On Self Test (POST) sequence to minimize the time required to complete system initialization. By shifting some of the responsibilities for executing the POST sequence to other controllers within the system, the testing and initialization of system devices can proceed concurrently. The controllers interface with peripheral devices, and include a register set that includes command information for initializing the testing and initialization of associated peripherals. The register set also includes dedicated bits for indicating the status of testing and initialization cycles, which can be read by the CPU to determine if testing or initialization is in progress, if it has completed, and if any errors have occurred. The register set also includes a configuration register for indicating configuration information and operating parameters of the initialized drive or peripheral.
    Type: Grant
    Filed: May 18, 2001
    Date of Patent: April 26, 2005
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Sompong P. Olarig, Michael F. Angelo, Chai S. Heng
  • Publication number: 20040210754
    Abstract: A shared security transform device is described as being usable to couple to a plurality of nodes via a common switch comprises control logic and memory coupled to the control logic. The memory may contain security information. The shared security transform device receives packets from any of the nodes via the switch and, using a value in the packets, retrieves security handling instructions to determine whether or not to apply a security transform to the packet. If a security transform is to be applied to the packet, the shared security transform device may determine which of a plurality of transforms is to be applied to the packet.
    Type: Application
    Filed: April 16, 2003
    Publication date: October 21, 2004
    Inventors: Dwight L. Barron, Daniel N. Cripe, Michael F. Angelo
  • Publication number: 20040204182
    Abstract: A radio frequency (RF) device for authorizing user access to portions of a computer system. The RF device includes a power supply, processing circuitry that accesses the power supply according to a location of the RF device, and an antenna that transmits communication signals from the processing circuitry to a transponder that is coupled to the computer system. The processing circuitry is configured to operate at a first power level until the communication signals indicate that the location of the RF device is within a first range of the transponder. The processing circuitry is configured to begin operations at a second power level after the RF device is positioned within the first range of the transponder. The processing circuitry is also configured to operate at the second power level until the communication signals indicate that the location of the RF device has moved outside of a second range from the transponder.
    Type: Application
    Filed: June 7, 2002
    Publication date: October 14, 2004
    Applicant: Compaq Information Technologies Group, L.P.
    Inventors: Michael F. Angelo, Raymond A. Toves
  • Publication number: 20040162974
    Abstract: A secure boot environment may be provided that includes a secure memory isolated but accessible to a coupled processing device. The secure memory may store and provide boot strap instruction to the processing device. In addition, a authentication system may be provided to ensure secure access to the secure memory.
    Type: Application
    Filed: February 18, 2003
    Publication date: August 19, 2004
    Inventors: Michael F. Angelo, Thomas J. Bonola
  • Publication number: 20040064708
    Abstract: A security token is used to dynamically create a user account on a host computer system. The token preferably is programmed with a user's credentials which includes information regarding the user account and security data. Once programmed, the token then can be inserted into a host computer. The user verifies himself or herself to the host computer/token and the token verifies itself to the host computer. Once verified, the user's credentials stored on the token are accessed to dynamically create the user account on the host system. The token may comprise a smart card, USB-compatible memory device, and the like. Storage media, such as floppy disks, also can be used if fewer security features are acceptable.
    Type: Application
    Filed: September 30, 2002
    Publication date: April 1, 2004
    Applicant: Compaq Information Technologies Group, L.P.
    Inventors: Michael F. Angelo, Manuel Novoa, John A. Carchide
  • Publication number: 20040059926
    Abstract: An electronic device has a plurality of selectable capabilities. The capabilities may include CPU speed, NIC speed, various protocols, or, in general, any parameters, characteristics or features which a user might desire to have in the electronic device. The device receives a key, such as from an external licensing authority, and the key specifies which capabilities the device should use to configure itself. The user may have to pay the licensing authority for the key. The electronic device thus can be configured into any one of a plurality of capabilities without having to change any hardware—the user simply purchases a key commensurate with a capability desired by the user.
    Type: Application
    Filed: September 20, 2002
    Publication date: March 25, 2004
    Applicant: Compaq Information Technology Group, L.P.
    Inventors: Michael F. Angelo, B. Tod Cox, David L. Kasperson
  • Publication number: 20040059747
    Abstract: A method for restoring resources on a computer is provided. The method includes providing a configuration database including resource information, receiving a restoration request including a computer identifier associated with the computer, accessing the configuration database based on the computer identifier to identify a restorable resource associated with the computer, and providing the restorable resource to the computer. A computer system includes a computer and a configuration manager. The computer has a plurality of installed resources. The configuration manager is coupled to the computer and adapted to store a configuration database including resource information associated with the computer, receive a restoration request from the computer including a computer identifier associated with the computer, access the configuration database to identify a restorable resource based on the computer identifier associated with the computer, and provide the restorable resource to the computer.
    Type: Application
    Filed: September 23, 2003
    Publication date: March 25, 2004
    Inventors: Sompong P. Olarig, Michael F. Angelo, Thomas J. Bonola
  • Publication number: 20040002877
    Abstract: The disclosed embodiments relate to verifying whether equipment is within a promised warranty period before warranty service is performed on the equipment. In one embodiment, the MAC address of a computer system is used to verify whether the computer system is covered by a promised warranty.
    Type: Application
    Filed: June 28, 2002
    Publication date: January 1, 2004
    Inventors: Michael F. Angelo, E. David Neufeld
  • Publication number: 20030233556
    Abstract: The specification discloses a system and related method for tracking access to digital information that involves combining biometric information of a person seeking access with the digital information and a digital signature. Each person who accesses the digital information has their biometric and digital signatures combined in this manner. Thus, the digital information itself reflects who has accessed the information. Where the digital information is a video, the combining of the biometric and digital signatures is done on a frame-by-frame basis.
    Type: Application
    Filed: May 30, 2002
    Publication date: December 18, 2003
    Applicant: Compaq Information Technologies Group, L.P.
    Inventors: Michael F. Angelo, E. David Neufeld
  • Patent number: 6647415
    Abstract: A computer system and method of operating a network in which data overflow from workstation or PC hard drives is automatically transferred over to a network server hard drive allowing the workstation user to continue working without interruption. Furthermore, this system minimizes the amount of time a network administrator spends on attending to users who have no remaining hard drive space on their computers.
    Type: Grant
    Filed: September 30, 1999
    Date of Patent: November 11, 2003
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Sompong P. Olarig, Michael F. Angelo, Ramkrishna Prakash
  • Patent number: 6633978
    Abstract: A method for restoring resources on a computer is provided. The method includes providing a configuration database including resource information, receiving a restoration request including a computer identifier associated with the computer, accessing the configuration database based on the computer identifier to identify a restorable resource associated with the computer, and providing the restorable resource to the computer. A computer system includes a computer and a configuration manager. The computer has a plurality of installed resources. The configuration manager is coupled to the computer and adapted to store a configuration database including resource information associated with the computer, receive a restoration request from the computer including a computer identifier associated with the computer, access the configuration database to identify a restorable resource based on the computer identifier associated with the computer, and provide the restorable resource to the computer.
    Type: Grant
    Filed: March 31, 2000
    Date of Patent: October 14, 2003
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Michael F. Angelo, Sompong P. Olarig, Thomas J. Bonola
  • Patent number: 6625730
    Abstract: A method and apparatus for protecting a computer system. Specifically, a method and system for validating portions of memory at each power-on cycle is described. A Boot Block is used to validate the BIOS, CMOS and NVRAM of a system. The BIOS may also be used to validate the Boot Block, CMOS and NVRAM.
    Type: Grant
    Filed: March 31, 2000
    Date of Patent: September 23, 2003
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Michael F. Angelo, George David Wisecup, David L. Collins
  • Patent number: 6625729
    Abstract: A method and apparatus for protecting a computer system. Specifically, a method and system for validating portions of memory at each power-on cycle is described. A Boot Block is used to validate the BIOS, CMOS and NVRAM of a system. The BIOS may also be used to validate the Boot Block, CMOS and NVRAM.
    Type: Grant
    Filed: March 31, 2000
    Date of Patent: September 23, 2003
    Assignee: Hewlett-Packard Company, L.P.
    Inventors: Michael F. Angelo, George David Wisecup, David L. Collins
  • Patent number: 6609204
    Abstract: A computer system and method in which an electrically controlled “hoodlock,” which prevents the computer's chassis from unauthorized opening, can be remotely accessed through powerline communications.
    Type: Grant
    Filed: March 29, 1999
    Date of Patent: August 19, 2003
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Sompong P. Olarig, Michael F. Angelo, Chi Kim Sides
  • Patent number: 6581162
    Abstract: A secure environment for entering and storing information necessary to conduct encryption processes. In a computer system according to the invention, session keys, passwords, and encryption algorithms are maintained in a secure memory space such as System Management Mode (SMM) memory. In one disclosed embodiment of the invention, a user password is entered via a secure keyboard channel. The password is maintained in a secure memory space that is not accessible during normal computer operation. In addition to the user password, optional node identification information is stored in secure memory. The node identification information is appended to the user password, and both are subsequently encrypted by an encryption algorithm and encryption keys that are also stored in secure memory. Following the encryption process, the encrypted password and node identification information are communicated directly from secure memory to network interface circuitry for communication over a network.
    Type: Grant
    Filed: December 31, 1996
    Date of Patent: June 17, 2003
    Assignee: Compaq Information Technologies Group, L.P.
    Inventors: Michael F. Angelo, Peter J. Michels
  • Publication number: 20030105876
    Abstract: A verification technique in which a client verifies a server includes the use of two different digital certificates—one certificate derived from and including the other certificate. One certificate is programmed into the server it is desired to verify. This certificate includes various values that are signed with a secure private key, which may be, for example, the private key of the manufacturer of the server or subsystem within the server. The second certificate is derived from and includes the first certificate. This latter certificate also includes one or more server identity values (e.g., IP address, domain name) and is signed by a second private key that is preferably different than the private key used to sign the first certificate. Both certificates must be verified successfully by a client before a secured communication is permitted to proceed.
    Type: Application
    Filed: November 30, 2001
    Publication date: June 5, 2003
    Inventors: Michael F. Angelo, E. David Neufeld
  • Publication number: 20030105971
    Abstract: An electronic system embodies a security system which provides varying levels of security based on the location of the system. As such, the system includes a location module, such as a geosynchronous positioning system (“GPS”) receiver that permits the system to determine its location relative to a plurality of preset location areas. Such location areas might be programmed to include the user's office, home, predetermined location for a business trip and the like. Based on the location area in which the system is located, the system invokes a security mode associated with that particular location area. Different location areas may have different security modes.
    Type: Application
    Filed: December 5, 2001
    Publication date: June 5, 2003
    Inventors: Michael F. Angelo, Sompong P. Olarig
  • Publication number: 20030065934
    Abstract: A security system is provided which permits a user or owner of a portable electronic device to report the device missing to a security station. In response, the security station wirelessly transmits a security message or command to the portable electronic device which, in turn, responds by causing a “destructive” security action to occur. The destructive action may include erasing memory in the portable device, disabling certain functions (e.g., transmitting data, receiving data, accessing memory, etc.) or other types of actions such as reporting location information to the security station. Various security mechanisms can be implemented as well to minimize the risk that an unauthorized entity will be able to broadcast security messages to portable devices.
    Type: Application
    Filed: September 28, 2001
    Publication date: April 3, 2003
    Inventors: Michael F. Angelo, Manuel Novoa, Sompong P. Olarig
  • Publication number: 20030064731
    Abstract: An electronic device can automatically configure its communication capability depending on its location. The device preferably includes a location determination module which may comprise, for example, a GPS receiver. The location determination module provides a location value to a CPU which uses the location value to determine in which region of the world (e.g., a country) the device is located. Based on that determination, the device configures its communication capability to be compliant with the accepted communication protocols, carrier frequency, etc. of that region.
    Type: Application
    Filed: September 28, 2001
    Publication date: April 3, 2003
    Inventors: Michael F. Angelo, E. David Neufeld, Sompong P. Olarig
  • Publication number: 20030061493
    Abstract: A portable electronic device (e.g., a PDA) receives voice or other types of audio or even other types of media (e.g., video) and digitize, encrypt and transmit the voice stream to an external device (e.g., another portable electronic device) in real-time so that a real-time, two-way communication can occur. Each portable electronic device preferably includes a CPU executing security software to perform the encryption and decryption functions. The devices may communicate with each other via a standard telephone system or other type of communication media.
    Type: Application
    Filed: September 24, 2001
    Publication date: March 27, 2003
    Inventors: Michael F. Angelo, Manuel Novoa, Sompong P. Olarig