Patents by Inventor Mike Partington

Mike Partington has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8190869
    Abstract: Methods for authenticating firmware in a computing device include partitioning functions critical to the intended role of the computing device so that, upon successful authentication of the firmware, all functions of the device are made operational. Otherwise, the computing device behaves in a diagnostic mode of operation to assist users in troubleshooting to eventually authenticate firmware. At least first and second sets of firmware are loaded at various times into a controller of the computing device with the first set occurring without verification of trustworthiness, while the second set occurs upon authentication of the first. The second is used to authenticate a remainder set of firmware. Particular computing devices contemplate laser printers, mobile phones, PDA's, gaming consoles, etc. Firmware downloads, error messaging, hash comparisons, signature table construction, page-in techniques, computer program products, and particular computing arrangements are other noteworthy features, to name a few.
    Type: Grant
    Filed: April 17, 2007
    Date of Patent: May 29, 2012
    Assignee: Lexmark International, Inc.
    Inventors: James R. Booth, John F. Gostomski, Mike Partington
  • Publication number: 20080313453
    Abstract: A boot validation system and method may be used in a computer system to validate boot code before allowing the computer system to execute the boot code. In particular, a secure hash algorithm may be used to compute a hash value of the boot code and the computed hash value may be compared to a preprogrammed hash value stored in a secure non-volatile device. If the hash values match the boot code may be validated and the system may then be allowed to execute the boot code. Once the boot code is validated, the boot code may be executed to validate other code (e.g., firmware) in the computer system. In an exemplary embodiment, the boot validation system and method may be used in an imaging device, such as a printer.
    Type: Application
    Filed: August 1, 2008
    Publication date: December 18, 2008
    Inventors: James Ronald Booth, William Pohl Corbett, JR., John Francis Gostomski, Mike Partington
  • Publication number: 20080300899
    Abstract: In an imaging device, methods for managing replacement of supply items include providing users with one or more adjustable variables so they may balance individual image quality needs versus economic costs of purchasing new supply items. Representatively, users are provided with a first adjustable variable indicative of a countdown value of media remaining to be imaged before the imaging device ceases imaging and a second adjustable variable indicative of an amount of imaging material remaining that corresponds to a low warning threshold. Upon reaching the low warning threshold, users are messaged with the countdown value. Thereafter, the first variable is decremented per each media imaged and the decremented value is displayed to users to indicate a number of pages remaining before device shutdown (or before needing to replace the supply item).
    Type: Application
    Filed: May 30, 2007
    Publication date: December 4, 2008
    Inventors: Rickey C. Brown, Kevin D. Schoedinger, Mike Partington, David V. Snow, JR.
  • Publication number: 20080263345
    Abstract: Methods for authenticating firmware in a computing device include partitioning functions critical to the intended role of the computing device so that, upon successful authentication of the firmware, all functions of the device are made operational. Otherwise, the computing device behaves in a diagnostic mode of operation to assist users in troubleshooting to eventually authenticate firmware. At least first and second sets of firmware are loaded at various times into a controller of the computing device with the first set occurring without verification of trustworthiness, while the second set occurs upon authentication of the first. The second is used to authenticate a remainder set of firmware. Particular computing devices contemplate laser printers, mobile phones, PDA's, gaming consoles, etc. Firmware downloads, error messaging, hash comparisons, signature table construction, page-in techniques, computer program products, and particular computing arrangements are other noteworthy features, to name a few.
    Type: Application
    Filed: April 17, 2007
    Publication date: October 23, 2008
    Inventors: James R. Booth, John F. Gostomski, Mike Partington
  • Patent number: 7424398
    Abstract: A boot validation system and method may be used in a computer system to validate boot code before allowing the computer system to execute the boot code. In particular, a secure hash algorithm may be used to compute a hash value of the boot code and the computed hash value may be compared to a preprogrammed hash value stored in a secure non-volatile device. If the hash values match the boot code may be validated and the system may then be allowed to execute the boot code. Once the boot code is validated, the boot code may be executed to validate other code (e.g., firmware) in the computer system. In an exemplary embodiment, the boot validation systems and method may be used in an imaging device, such as a printer.
    Type: Grant
    Filed: June 22, 2006
    Date of Patent: September 9, 2008
    Assignee: Lexmark International, Inc.
    Inventors: James Ronald Booth, William Pohl Corbett, Jr., John Francis Gestomski, Mike Partington
  • Publication number: 20070300207
    Abstract: A boot validation system and method may be used in a computer system to validate boot code before allowing the computer system to execute the boot code. In particular, a secure hash algorithm may be used to compute a hash value of the boot code and the computed hash value may be compared to a preprogrammed hash value stored in a secure non-volatile device. If the hash values match the boot code may be validated and the system may then be allowed to execute the boot code. Once the boot code is validated, the boot code may be executed to validate other code (e.g., firmware) in the computer system. In an exemplary embodiment, the boot validation systems and method may be used in an imaging device, such as a printer.
    Type: Application
    Filed: June 22, 2006
    Publication date: December 27, 2007
    Inventors: James Ronald Booth, William Pohl Corbett, John Francis Gestomski, Mike Partington