Patents by Inventor Nicholas D. Fifer

Nicholas D. Fifer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7971200
    Abstract: A defective self-sustained code-upgrade code is recovered. A relevant unset variable is set to avoid an un-initialized command failure. A relevant set variable is unset to render a second invocation of the set variable to appear as a first invocation A fix-named file is retrieved containing a plurality of code entries organized in a stanza style. The fixed-named file is executed. The plurality of stanza-organized entries are sourced by the defective code-upgrade code to change a variable which has been previously set, thereby overriding an existing process.
    Type: Grant
    Filed: February 6, 2007
    Date of Patent: June 28, 2011
    Assignee: International Business Machines Corporation
    Inventors: Ilan Gayda, Itzhack Goldberg, Kenneth Nagin, Nicholas D. Fifer
  • Patent number: 7827592
    Abstract: A method for implicit authorization to a computer resource includes defining a behavioral signature including a plurality of defined computer actions known to an authorized user of the computer resource. A first performed computer action of a user is registered. The first performed computer action is compared with a first defined computer action of the plurality of defined computer actions, wherein, if the first performed computer action and the first defined computer action match, an authentication state is changed from a first authentication state to a second authentication state.
    Type: Grant
    Filed: May 2, 2007
    Date of Patent: November 2, 2010
    Assignee: International Business Machines Corporation
    Inventors: Nicholas D. Fifer, Itzhack Goldberg, Julianne F. Haugh
  • Publication number: 20080276306
    Abstract: A method for implicit authorization to a computer resource includes defining a behavioral signature including a plurality of defined computer actions known to an authorized user of the computer resource. A first performed computer action of a user is registered. The first performed computer action is compared with a first defined computer action of the plurality of defined computer actions, wherein, if the first performed computer action and the first defined computer action match, an authentication state is changed from a first authentication state to a second authentication state.
    Type: Application
    Filed: May 2, 2007
    Publication date: November 6, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Nicholas D. Fifer, Itzhack Goldberg, Julianne F. Haugh
  • Publication number: 20080189694
    Abstract: A defective self-sustained code-upgrade code is recovered. A relevant unset variable is set to avoid an un-initialized command failure. A relevant set variable is unset to render a second invocation of the set variable to appear as a first invocation A fix-named file is retrieved containing a plurality of code entries organized in a stanza style. The fixed-named file is executed. The plurality of stanza-organized entries are sourced by the defective code-upgrade code to change a variable which has been previously set, thereby overriding an existing process.
    Type: Application
    Filed: February 6, 2007
    Publication date: August 7, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Nicholas D. Fifer, Ilan Gayda, Itzhack Goldberg, Kenneth Nagin
  • Patent number: 7383404
    Abstract: A computer storage system includes a supervisor algorithm to detect a host computer's initiator logging in. The supervisor algorithm identifies data storage devices associated with the newly logged-on initiator and tags logical unit number control blocks (“LUNCBs”) as having priority in an initiation process. The supervisor algorithm assigns a task control block to each of the identified data storage devices and invokes a logical unit number (“LUN”) initialization algorithm. If the supervisor algorithm was invoked during an initial microcode load (“IML”) event, the LUN initialization algorithm initializes each of the identified data storage devices. However, if the supervisor algorithm was invoked during a warmstart procedure, the LUN initialization algorithm first checks to make sure the LUNCB was not mistakenly written too. If not, the LUN initialization algorithm terminates without initializing the associated data storage device.
    Type: Grant
    Filed: February 3, 2005
    Date of Patent: June 3, 2008
    Assignee: International Business Machines Corporation
    Inventors: Jeffery M. Barnes, Susan K. Candelaria, Nicholas D. Fifer, Matthew J. Kalos, Edwin K. Scott
  • Patent number: 7137033
    Abstract: Provided is a method, system and program for synchronizing sequential subtasks of a task, so that the subtasks can be dispatched to generate operations in a particular sequence. In one embodiment, a subtask which has been prepared for dispatching is queued in a queue until the queued subtask is the next subtask in sequence for dispatching. In one embodiment, the subtasks may be sorted in the queue by task and by subtask sequence.
    Type: Grant
    Filed: November 20, 2003
    Date of Patent: November 14, 2006
    Assignee: International Business Machines Corporation
    Inventors: Nicholas D. Fifer, Frederick James Carberry, II, William Henry Travis, Alex Chen, Theodore Timothy Harris, Jr.