Patents by Inventor Michael Vanover

Michael Vanover has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9505992
    Abstract: A method of removing water from phase separated fuel in a fluid reservoir, said method comprising the steps of: identifying layers of fluid within the reservoir; determining the heights of the respective fluid layers within said reservoir; providing a vacuum and a first suction tube, said vacuum and said first suction tube providing a first volumetric flow rate; inserting the first suction tube into said fluid reservoir; removing a first fluid layer; replacing said first suction tube with a second suction tube, said second suction tube having a greater cross-sectional area than said first suction tube such that said vacuum and said second suction tube have a second volumetric flow rate; inserting said second suction tube into said fluid reservoir; removing a second fluid from said reservoir; and sending said second fluid through a filtration system.
    Type: Grant
    Filed: January 30, 2015
    Date of Patent: November 29, 2016
    Inventors: Michael Vanover, Greggory Vanover
  • Publication number: 20160008750
    Abstract: A self contained system for removing contaminants from a fluid within a reservoir, on said fluid cleaning system comprising: a fluid intake port; means for fluidically engaging said reservoir; a mechanical straining subassembly fluidically connected to said intake port; a hydraulic pump for forcing said fluid from said reservoir through said system, said pump having a motor operably connected to a vehicle engine; said pump comprising an intake port fluidically connected to said mechanical straining subassembly and an outlet port fluidically connected to a first fluid filter subassembly; said first fluid filter subassembly fluidically connected to a second fluid filter subassembly; said second fluid filter subassembly fluidically connected to a third fluid filter subassembly; said third fluid filter subassembly connected to a fluid outlet port.
    Type: Application
    Filed: July 9, 2014
    Publication date: January 14, 2016
    Inventors: Michael Vanover, Greggory Vanover
  • Publication number: 20150218473
    Abstract: A method of removing water from phase separated fuel in a fluid reservoir, said method comprising the steps of: identifying layers of fluid within the reservoir; determining the heights of the respective fluid layers within said reservoir; providing a vacuum and a first suction tube, said vacuum and said first suction tube providing a first volumetric flow rate; inserting the first suction tube into said fluid reservoir; removing a first fluid layer; replacing said first suction tube with a second suction tube, said second suction tube having a greater cross-sectional area than said first suction tube such that said vacuum and said second suction tube have a second volumetric flow rate; inserting said second suction tube into said fluid reservoir; removing a second fluid from said reservoir; and sending said second fluid through a filtration system.
    Type: Application
    Filed: January 30, 2015
    Publication date: August 6, 2015
    Inventors: Michael Vanover, Greggory Vanover
  • Patent number: 8707327
    Abstract: Arrangements for permitting incoming mail to be transferred from a WAN Drive to a notebook computer hard drive under conditions that are not stressful to the hard drive. Preferably, a WAN card is configured to wake a notebook when mail capacity is full or close to full. Mail is then preferably moved from the flash drive to the hard drive, subject to verification that this will not overly stress the hard drive. In a variant embodiment, the WAN card may preferably be configured to wake a notebook when mail is received at all. Again, mail is then preferably moved from the flash drive to the hard drive, subject to verification that this will not overly stress the hard drive. Once mail is moved to the hard drive, the system preferably runs an embedded email program that allows the user to employ an existing VPN infrastructure.
    Type: Grant
    Filed: September 30, 2007
    Date of Patent: April 22, 2014
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: Howard Locker, David Challener, Daryl Cromer, James S. Rutledge, Randall Scott Springfield, James J. Thrasher, Michael Vanover
  • Publication number: 20090089808
    Abstract: Arrangements for permitting incoming mail to be transferred from a WAN Drive to a notebook computer hard drive under conditions that are not stressful to the hard drive. Preferably, a WAN card is configured to wake a notebook when mail capacity is full or close to full. Mail is then preferably moved from the flash drive to the hard drive, subject to verification that this will not overly stress the hard drive. In a variant embodiment, the WAN card may preferably be configured to wake a notebook when mail is received at all. Again, mail is then preferably moved from the flash drive to the hard drive, subject to verification that this will not overly stress the hard drive. Once mail is moved to the hard drive, the system preferably runs an embedded email program that allows the user to employ an existing VPN infrastructure.
    Type: Application
    Filed: September 30, 2007
    Publication date: April 2, 2009
    Applicant: Lenovo (Singapore) Pte. Ltd.
    Inventors: Howard Locker, David Challener, Daryl Cromer, James S. Rutledge, Randall Scott Springfield, James J. Thrasher, Michael Vanover
  • Publication number: 20080066166
    Abstract: In a system providing for user access of secure resources upon user authentication by a remote authentication server, a successful user authentication is saved locally for use when the authentication server is not available. The successful user authentication returns an authenticated credential which is stored on the local client utilizing a security method such as Public Key Infrastructure which prevents tampering with the credential. If a gateway machine provides connectivity between the client and the authentication server, the credential is also stored on the gateway.
    Type: Application
    Filed: June 15, 2007
    Publication date: March 13, 2008
    Applicant: Lenovo (Singapore) Pte. Ltd.
    Inventors: Philip Childs, Michael Vanover
  • Publication number: 20050192814
    Abstract: In a LAN environment, which provides access for multiple users to the Internet, clients (predictors) are selected for identifying Internet content, by their requests, which would be of interest to a larger audience, and then this content is “pushed down” to the caches of an audience of clients. In so selecting content there is a recognition of a shared intellectual direction (e.g. a joint effort) that exists to encourage interest in similar material. This cache “library” is particularly directed to mobile users who work unconnected at times and may lack the time or background to select and pre-load the library.
    Type: Application
    Filed: February 13, 2004
    Publication date: September 1, 2005
    Applicant: International Business Machines Corporation
    Inventors: David Challener, Michael Vanover
  • Publication number: 20050182701
    Abstract: A system is provided with at least one differentiating, chargeable technology. Methods of selling and pricing the system are disclosed allowing the system to be sold at a reduced initial purchase price. The execution by a user of the system of the chargeable technology is tracked and charged for on a per-usage basis. Systems and methods are disclosed for tracking, recording and reporting data regarding the execution of the chargeable teachnology.
    Type: Application
    Filed: February 12, 2004
    Publication date: August 18, 2005
    Applicant: International Business Machines Corporation
    Inventors: Richard Cheston, Daryl Cromer, Howard Locker, Michael Vanover
  • Publication number: 20050165916
    Abstract: A system and method for concurrent WLAN and WPAN wireless modes from a single device is presented. A client uses a Wi-Fi device's infrastructure mode to communicate in a WLAN environment and, during idle WLAN times, uses the Wi-Fi device's adhoc mode to communicate in a WPAN environment. The Wi-Fi device uses a watchdog timer to switch between infrastructure mode and adhoc mode. When the client's Wi-Fi device switches to infrastructure mode, the client's Wi-Fi device uses an infrastructure register and an infrastructure device driver to transfer data over the WLAN environment. Likewise, when the client's Wi-Fi device switches to adhoc mode, the client's Wi-Fi device uses an adhoc register and an adhoc device driver to transfer data over the WLAN environment. The client uses a code shim to act as a virtual device driver at times when either the infrastructure device driver or the adhoc device driver is inactive.
    Type: Application
    Filed: December 24, 2003
    Publication date: July 28, 2005
    Applicant: International Business Machines Corporation
    Inventors: Daryl Cromer, Philip Jakes, Howard Locker, Michael Vanover
  • Publication number: 20050138399
    Abstract: The loss of a computer primary O.S. password, BIOS password, or HDD password (or even an application password) is sensed by a secondary O.S. based on a number of failed log on attempts to the affected component. The password can be reset by having the secondary O.S. generate an intermediate password automatically, verify user authorization, and then make the intermediate password available to, e.g., the primary O.S., so that the affected component can be accessed and its password reset without help desk personnel intervention.
    Type: Application
    Filed: December 23, 2003
    Publication date: June 23, 2005
    Applicant: International Business Machines Corporation
    Inventors: Richard Cheston, Michael Vanover, Steven Welch
  • Publication number: 20050138408
    Abstract: A method and system for utilizing a processing system, when a primary operating environment within the processing system is not functioning is disclosed. The method and system comprises invoking an alternate operating system environment within the processing system. The alternate operating system environment includes personalization from the primary operating system environment. Accordingly, in a system and method in accordance with the present invention, when a user experiences a malfunction while working in a primary operating system environment, an alternate operating system environment which is highly reliable and can function as a substitute for the primary operating system environment is invoked. The alternate operating system environment can offer both rescue capabilities aimed at providing emergency productivity and file access, as well as recovery for those who wish to attempt to restore the failed system back into a stable state.
    Type: Application
    Filed: December 22, 2003
    Publication date: June 23, 2005
    Applicant: International Business Machines Corporation
    Inventors: Michael Vanover, Steven Welch
  • Publication number: 20050114411
    Abstract: A method, computer program product and system for restoring previously un-backed up data during a system restore. A computing system may include a locked partition in its storage medium to store an alternate operating system and backed-up files. The alternate operating system may determine which files have been modified since the most recent backup and run a virus scan on those modified files. The alternate operating system may copy the modified files with no detected viruses as well as those modified files with a detected virus but cleaned by the virus scan. The backup files in the locked partition that have been modified since the most recent backup operation may be replaced with these uncorrupted modified files. In this manner, the system may be able to recover files since the most recent backup while ensuring at least in part that the restored files do not contain any viruses.
    Type: Application
    Filed: November 24, 2003
    Publication date: May 26, 2005
    Applicant: International Business Machines Corporation
    Inventors: Philip Childs, Daryl Cromer, Howard Locker, Michael Vanover, Steven Welch
  • Publication number: 20050010918
    Abstract: A system and method for the migration and distribution of computer software using an appliance which non-invasively creates copies of computer files from a data set and installs them on destination computers. The system and method features several ways of configuring the software installed for its reliable operation in the new hardware environment. Also disclosed is a system and method for the manipulation of data set files in order to optimize and pre-configure them for the new hardware environment.
    Type: Application
    Filed: July 11, 2003
    Publication date: January 13, 2005
    Applicant: International Business Machines Corporation
    Inventors: Philip Childs, Michael Vanover, Steven Welch, Ted Bonkenburg, Dejan Diklic
  • Publication number: 20050010835
    Abstract: A system and method for backup data storage and retrieval which does not require a program to be installed on the host computer system. The system and method may operate over a network. A system and method for automatic execution of the backup and restoration, including installation of a recovery operating system, if desired or required, is also provided. A data structure for the optimization of the storage of backup data is also provided.
    Type: Application
    Filed: July 11, 2003
    Publication date: January 13, 2005
    Applicant: International Business Machines Corporation
    Inventors: Philip Childs, Michael Vanover, Steven Welch, Ted Bonkenburg, Dejan Diklic
  • Patent number: 6718468
    Abstract: A method for associating a password with a secured public/private key pair is disclosed. A user public/private key pair is first established for a user. The user public/private key pair includes a user public key and a user private key. Then, the user public/private key pair is encrypted along with a random password, utilizing a chip public key. Next, a first password is generated by hashing a pass phrase. Finally, the random password is encrypted along with the first password, also utilizing the chip public key. As a result, a user can assess the user private key to perform an authentication function by providing the pass phrase.
    Type: Grant
    Filed: November 12, 1999
    Date of Patent: April 6, 2004
    Assignee: International Business Machines Corporation
    Inventors: David Carroll Challener, Richard Alan Dayan, James Peter Ward, Michael Vanover
  • Patent number: 6704868
    Abstract: A method for associating a pass phrase with a secured public/private key pair is disclosed. A user public/private key pair is first established for a user. The user public/private key pair includes a user public key and a user private key. Then, the user public/private key pair is encrypted along with a random password, utilizing a chip public key. Next, a first symmetric key is generated. The random password is encrypted utilizing the first symmetric key. A first password is generated by hashing a first pass phrase. Finally, the first password is encrypted along with the first symmetric key, also utilizing the chip public key. As a result, a user can access the user private key to perform an authentication function by providing the first pass phrase.
    Type: Grant
    Filed: November 12, 1999
    Date of Patent: March 9, 2004
    Assignee: International Business Machines Corporation
    Inventors: David Carroll Challener, Richard Alan Dayan, James Peter Ward, Michael Vanover