Patents by Inventor Michael F. Angelo

Michael F. Angelo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7228432
    Abstract: A method and apparatus for providing security for a computer system, which includes generating a request for a file. The request is received at a dedicated security processor, where the dedicated security processor may access the file to validate the requested file. Upon determining that the requested file is valid, the dedicated security processor may provide the requested file to another processor.
    Type: Grant
    Filed: September 11, 2003
    Date of Patent: June 5, 2007
    Inventors: Michael F. Angelo, E David Neufeld, David Heisey
  • Patent number: 7167987
    Abstract: Biometric sensors are used to control physical and logical access to various computer components or subsystems comprising a computer system. The biometric sensors may comprise fingerprint scanners, iris scanners or any other type of biometric sensor that can uniquely identify a person. The biometric sensors can be used to activate electromagnetic locks, which lock individual components within the system, or enabling locks which prevent devices from receiving power or being enabled (such as disk drives, network cards, etc.).
    Type: Grant
    Filed: August 29, 2001
    Date of Patent: January 23, 2007
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: Michael F. Angelo
  • Patent number: 7149556
    Abstract: A radio frequency (RF) device for authorizing user access to portions of a computer system. The RF device includes a power supply, processing circuitry that accesses the power supply according to a location of the RF device, and an antenna that transmits communication signals from the processing circuitry to a transponder that is coupled to the computer system. The processing circuitry is configured to operate at a first power level until the communication signals indicate that the location of the RF device is within a first range of the transponder. The processing circuitry is configured to begin operations at a second power level after the RF device is positioned within the first range of the transponder. The processing circuitry is also configured to operate at the second power level until the communication signals indicate that the location of the RF device has moved outside of a second range from the transponder.
    Type: Grant
    Filed: June 7, 2002
    Date of Patent: December 12, 2006
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Michael F. Angelo, Raymond A. Toves
  • Patent number: 7143278
    Abstract: A secure boot environment may be provided that includes a secure memory isolated but accessible to a coupled processing device. The secure memory may store and provide boot strap instruction to the processing device. In addition, a authentication system may be provided to ensure secure access to the secure memory.
    Type: Grant
    Filed: February 18, 2003
    Date of Patent: November 28, 2006
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Michael F. Angelo, Thomas J. Bonola
  • Patent number: 7073064
    Abstract: A method and apparatus for protecting a computer system. Specifically, a method and system for validating portions of memory at each power-on cycle is described. A Boot Block is used to validate the BIOS, CMOS and NVRAM of a system. The BIOS may also be used to validate the Boot Block, CMOS and NVRAM.
    Type: Grant
    Filed: March 31, 2000
    Date of Patent: July 4, 2006
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Michael F. Angelo, George David Wisecup, David L. Collins
  • Patent number: 7051196
    Abstract: An electronic system embodies a security system which provides varying levels of security based on the location of the system. As such, the system includes a location module, such as a geosynchronous positioning system (“GPS”) receiver that permits the system to determine its location relative to a plurality of preset location areas. Such location areas might be programmed to include the user's office, home, predetermined location for a business trip and the like. Based on the location area in which the system is located, the system invokes a security mode associated with that particular location area. Different location areas may have different security modes.
    Type: Grant
    Filed: December 5, 2001
    Date of Patent: May 23, 2006
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Michael F. Angelo, Sompong P. Olarig
  • Patent number: 7003672
    Abstract: A computer system comprises a security computer having a security database and at least one workstation computer on which software is accessible for execution. The database includes security values that the workstation computers use to verify whether their copy of software is authentic (i.e., unmodified such as might occur from action of a virus). The database can also be used verify whether the software can be run on a particular workstation computer.
    Type: Grant
    Filed: September 25, 2001
    Date of Patent: February 21, 2006
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Michael F. Angelo, Manuel Novoa
  • Patent number: 6952489
    Abstract: A fingerprint verification method having band detection is provided. In one embodiment, the method includes capturing a fingerprint image and processing the image to determine if it includes bands attributable to changes in illumination intensity during image capture. If such bands are detected, the method preferably aborts the creation of a fingerprint template. Otherwise, if this and other security screens are passed, the method preferably includes the creation of a fingerprint template which may be compared to a stored fingerprint template to verify user identity. If such verification is established, the user is granted access privileges. One embodiment of a system implementing this method includes a fingerprint scanner for capturing fingerprint images, and an interface card having a digital signal processor (DSP) or other suitable mechanisms including software or electronics for processing the fingerprint images and generating a fingerprint template representative of the images.
    Type: Grant
    Filed: September 29, 2000
    Date of Patent: October 4, 2005
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Michael F. Angelo, Manuel Novoa, Richard Churchill
  • Patent number: 6886109
    Abstract: A computer system includes multiple controllers that assist in executing the Power-On Self Test (POST) sequence to minimize the time required to complete system initialization. By shifting some of the responsibilities for executing the POST sequence to other controllers within the system, the testing and initialization of system devices can proceed concurrently. The controllers interface with peripheral devices, and include a register set that includes command information for initializing the testing and initialization of associated peripherals. The register set also includes dedicated bits for indicating the status of testing and initialization cycles, which can be read by the CPU to determine if testing or initialization is in progress, if it has completed, and if any errors have occurred. The register set also includes a configuration register for indicating configuration information and operating parameters of the initialized drive or peripheral.
    Type: Grant
    Filed: May 18, 2001
    Date of Patent: April 26, 2005
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Sompong P. Olarig, Michael F. Angelo, Chai S. Heng
  • Publication number: 20040210754
    Abstract: A shared security transform device is described as being usable to couple to a plurality of nodes via a common switch comprises control logic and memory coupled to the control logic. The memory may contain security information. The shared security transform device receives packets from any of the nodes via the switch and, using a value in the packets, retrieves security handling instructions to determine whether or not to apply a security transform to the packet. If a security transform is to be applied to the packet, the shared security transform device may determine which of a plurality of transforms is to be applied to the packet.
    Type: Application
    Filed: April 16, 2003
    Publication date: October 21, 2004
    Inventors: Dwight L. Barron, Daniel N. Cripe, Michael F. Angelo
  • Publication number: 20040204182
    Abstract: A radio frequency (RF) device for authorizing user access to portions of a computer system. The RF device includes a power supply, processing circuitry that accesses the power supply according to a location of the RF device, and an antenna that transmits communication signals from the processing circuitry to a transponder that is coupled to the computer system. The processing circuitry is configured to operate at a first power level until the communication signals indicate that the location of the RF device is within a first range of the transponder. The processing circuitry is configured to begin operations at a second power level after the RF device is positioned within the first range of the transponder. The processing circuitry is also configured to operate at the second power level until the communication signals indicate that the location of the RF device has moved outside of a second range from the transponder.
    Type: Application
    Filed: June 7, 2002
    Publication date: October 14, 2004
    Applicant: Compaq Information Technologies Group, L.P.
    Inventors: Michael F. Angelo, Raymond A. Toves
  • Publication number: 20040162974
    Abstract: A secure boot environment may be provided that includes a secure memory isolated but accessible to a coupled processing device. The secure memory may store and provide boot strap instruction to the processing device. In addition, a authentication system may be provided to ensure secure access to the secure memory.
    Type: Application
    Filed: February 18, 2003
    Publication date: August 19, 2004
    Inventors: Michael F. Angelo, Thomas J. Bonola
  • Publication number: 20040064708
    Abstract: A security token is used to dynamically create a user account on a host computer system. The token preferably is programmed with a user's credentials which includes information regarding the user account and security data. Once programmed, the token then can be inserted into a host computer. The user verifies himself or herself to the host computer/token and the token verifies itself to the host computer. Once verified, the user's credentials stored on the token are accessed to dynamically create the user account on the host system. The token may comprise a smart card, USB-compatible memory device, and the like. Storage media, such as floppy disks, also can be used if fewer security features are acceptable.
    Type: Application
    Filed: September 30, 2002
    Publication date: April 1, 2004
    Applicant: Compaq Information Technologies Group, L.P.
    Inventors: Michael F. Angelo, Manuel Novoa, John A. Carchide
  • Publication number: 20040059926
    Abstract: An electronic device has a plurality of selectable capabilities. The capabilities may include CPU speed, NIC speed, various protocols, or, in general, any parameters, characteristics or features which a user might desire to have in the electronic device. The device receives a key, such as from an external licensing authority, and the key specifies which capabilities the device should use to configure itself. The user may have to pay the licensing authority for the key. The electronic device thus can be configured into any one of a plurality of capabilities without having to change any hardware—the user simply purchases a key commensurate with a capability desired by the user.
    Type: Application
    Filed: September 20, 2002
    Publication date: March 25, 2004
    Applicant: Compaq Information Technology Group, L.P.
    Inventors: Michael F. Angelo, B. Tod Cox, David L. Kasperson
  • Publication number: 20040059747
    Abstract: A method for restoring resources on a computer is provided. The method includes providing a configuration database including resource information, receiving a restoration request including a computer identifier associated with the computer, accessing the configuration database based on the computer identifier to identify a restorable resource associated with the computer, and providing the restorable resource to the computer. A computer system includes a computer and a configuration manager. The computer has a plurality of installed resources. The configuration manager is coupled to the computer and adapted to store a configuration database including resource information associated with the computer, receive a restoration request from the computer including a computer identifier associated with the computer, access the configuration database to identify a restorable resource based on the computer identifier associated with the computer, and provide the restorable resource to the computer.
    Type: Application
    Filed: September 23, 2003
    Publication date: March 25, 2004
    Inventors: Sompong P. Olarig, Michael F. Angelo, Thomas J. Bonola
  • Publication number: 20040002877
    Abstract: The disclosed embodiments relate to verifying whether equipment is within a promised warranty period before warranty service is performed on the equipment. In one embodiment, the MAC address of a computer system is used to verify whether the computer system is covered by a promised warranty.
    Type: Application
    Filed: June 28, 2002
    Publication date: January 1, 2004
    Inventors: Michael F. Angelo, E. David Neufeld
  • Publication number: 20030233556
    Abstract: The specification discloses a system and related method for tracking access to digital information that involves combining biometric information of a person seeking access with the digital information and a digital signature. Each person who accesses the digital information has their biometric and digital signatures combined in this manner. Thus, the digital information itself reflects who has accessed the information. Where the digital information is a video, the combining of the biometric and digital signatures is done on a frame-by-frame basis.
    Type: Application
    Filed: May 30, 2002
    Publication date: December 18, 2003
    Applicant: Compaq Information Technologies Group, L.P.
    Inventors: Michael F. Angelo, E. David Neufeld
  • Patent number: 6647415
    Abstract: A computer system and method of operating a network in which data overflow from workstation or PC hard drives is automatically transferred over to a network server hard drive allowing the workstation user to continue working without interruption. Furthermore, this system minimizes the amount of time a network administrator spends on attending to users who have no remaining hard drive space on their computers.
    Type: Grant
    Filed: September 30, 1999
    Date of Patent: November 11, 2003
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Sompong P. Olarig, Michael F. Angelo, Ramkrishna Prakash
  • Patent number: 6633978
    Abstract: A method for restoring resources on a computer is provided. The method includes providing a configuration database including resource information, receiving a restoration request including a computer identifier associated with the computer, accessing the configuration database based on the computer identifier to identify a restorable resource associated with the computer, and providing the restorable resource to the computer. A computer system includes a computer and a configuration manager. The computer has a plurality of installed resources. The configuration manager is coupled to the computer and adapted to store a configuration database including resource information associated with the computer, receive a restoration request from the computer including a computer identifier associated with the computer, access the configuration database to identify a restorable resource based on the computer identifier associated with the computer, and provide the restorable resource to the computer.
    Type: Grant
    Filed: March 31, 2000
    Date of Patent: October 14, 2003
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Michael F. Angelo, Sompong P. Olarig, Thomas J. Bonola
  • Patent number: 6625729
    Abstract: A method and apparatus for protecting a computer system. Specifically, a method and system for validating portions of memory at each power-on cycle is described. A Boot Block is used to validate the BIOS, CMOS and NVRAM of a system. The BIOS may also be used to validate the Boot Block, CMOS and NVRAM.
    Type: Grant
    Filed: March 31, 2000
    Date of Patent: September 23, 2003
    Assignee: Hewlett-Packard Company, L.P.
    Inventors: Michael F. Angelo, George David Wisecup, David L. Collins