Patents by Inventor Patrick J. Callaghan
Patrick J. Callaghan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20180314831Abstract: A computer-implemented method for protecting a kernel for secure boot of an operating system includes preparing a kernel component with a signature for a secure boot. A processing unit modifies a machine owner key (MOK) file to include a trusted certificate. The MOK is separate from the kernel file. The processing unit validates the kernel component using a modified Grub file, a modified Shim file, and the MOK, and executes a secure boot using the validated kernel component. The kernel is unchanged by the secure boot process. The kernel component that is protected may be either a program executable (PE) file or a non-PE file.Type: ApplicationFiled: November 14, 2017Publication date: November 1, 2018Inventors: Pu Liu, Timothy V. Bolan, Patrick J. Callaghan
-
Publication number: 20180314829Abstract: A computer-implemented method for protecting a kernel for secure boot of an operating system includes preparing a kernel component with a signature for a secure boot. A processing unit modifies a machine owner key (MOK) file to include a trusted certificate. The MOK is separate from the kernel file. The processing unit validates the kernel component using a modified Grub file, a modified Shim file, and the MOK, and executes a secure boot using the validated kernel component. The kernel is unchanged by the secure boot process. The kernel component that is protected may be either a program executable (PE) file or a non-PE file.Type: ApplicationFiled: May 1, 2017Publication date: November 1, 2018Inventors: Pu Liu, Timothy V. Bolan, Patrick J. Callaghan
-
Patent number: 9998459Abstract: Technical solutions are described for securely deploying a shrouded virtual server. An example method includes sending, by a host manager, authentication information of a hosting system to a client device in response to a request from the client device. The \method also includes receiving a request to deploy a virtual server using a shrouded mode. The method also includes deploying a preconfigured hypervisor on the hosting system, where the preconfigured hypervisor is deployed in an immutable mode that disables changes to security settings of the preconfigured hypervisor. The method also includes deploying, by the preconfigured hypervisor, a preconfigured boot image as an instance of the virtual server on the preconfigured hypervisor. The method also includes sending, by the host manager, an identifier of the virtual server for receipt by the client device.Type: GrantFiled: November 17, 2017Date of Patent: June 12, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Khary J. Alexander, Utz Bacher, Reinhard T. Buendgen, Patrick J. Callaghan, John C. Dayka, Thomas B. Mathias, K. Paul Muller, James A. O'Connor, William J. Rooney, Kurt N. Schroeder, Peter G. Spera, Tiberiu Suto, Sean Swehla, Stefan Usenbinz, Craig R. Walters
-
Patent number: 9928228Abstract: A method and workstation for completing an audiovisual form. In response to a user speaking a command for the web browser to accept keyboard entry of text, the web browser accepts entry of text and displays the form with the text entered into a blank area in a field of the form. In response to all fields in the form having been processed, the web browser generates a pause for a specified period of time. In response to the specified period of time of the pause having expired, the web browser loops back to a top of the form.Type: GrantFiled: January 4, 2016Date of Patent: March 27, 2018Assignee: International Business Machines CorporationInventors: Patrick J. Callaghan, Stephen V. Feustel, Michael J. Howland, Steven M. Pritko
-
Publication number: 20180063136Abstract: Technical solutions are described for securely deploying a shrouded virtual server. An example method includes sending, by a host manager, authentication information of a hosting system to a client device in response to a request from the client device. The \method also includes receiving a request to deploy a virtual server using a shrouded mode. The method also includes deploying a preconfigured hypervisor on the hosting system, where the preconfigured hypervisor is deployed in an immutable mode that disables changes to security settings of the preconfigured hypervisor. The method also includes deploying, by the preconfigured hypervisor, a preconfigured boot image as an instance of the virtual server on the preconfigured hypervisor. The method also includes sending, by the host manager, an identifier of the virtual server for receipt by the client device.Type: ApplicationFiled: November 17, 2017Publication date: March 1, 2018Inventors: Khary J. Alexander, Utz Bacher, Reinhard T. Buendgen, Patrick J. Callaghan, John C. Dayka, Thomas B. Mathias, K. Paul Muller, James A. O'Connor, William J. Rooney, Kurt N. Schroeder, Peter G. Spera, Tiberiu Suto, Sean Swehla, Stefan Usenbinz, Craig R. Walters
-
Patent number: 9882901Abstract: Technical solutions are described for securely deploying a shrouded virtual server. An example method includes sending, by a host manager, authentication information of a hosting system to a client device in response to a request from the client device. The \method also includes receiving a request to deploy a virtual server using a shrouded mode. The method also includes deploying a preconfigured hypervisor on the hosting system, where the preconfigured hypervisor is deployed in an immutable mode that disables changes to security settings of the preconfigured hypervisor. The method also includes deploying, by the preconfigured hypervisor, a preconfigured boot image as an instance of the virtual server on the preconfigured hypervisor. The method also includes sending, by the host manager, an identifier of the virtual server for receipt by the client device.Type: GrantFiled: December 14, 2015Date of Patent: January 30, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Khary J. Alexander, Utz Bacher, Reinhard T. Buendgen, Patrick J. Callaghan, John C. Dayka, Thomas B. Mathias, K. Paul Muller, James A. O'Connor, William J. Rooney, Kurt N. Schroeder, Peter G. Spera, Tiberiu Suto, Sean Swehla, Stefan Usenbinz, Craig R. Walters
-
Publication number: 20170171197Abstract: Technical solutions are described for securely deploying a shrouded virtual server. An example method includes sending, by a host manager, authentication information of a hosting system to a client device in response to a request from the client device. The \method also includes receiving a request to deploy a virtual server using a shrouded mode. The method also includes deploying a preconfigured hypervisor on the hosting system, where the preconfigured hypervisor is deployed in an immutable mode that disables changes to security settings of the preconfigured hypervisor. The method also includes deploying, by the preconfigured hypervisor, a preconfigured boot image as an instance of the virtual server on the preconfigured hypervisor. The method also includes sending, by the host manager, an identifier of the virtual server for receipt by the client device.Type: ApplicationFiled: December 14, 2015Publication date: June 15, 2017Inventors: Khary J. Alexander, Utz Bacher, Reinhard T. Buendgen, Patrick J. Callaghan, John C. Dayka, Thomas B. Mathias, K. Paul Muller, James A. O'Connor, William J. Rooney, Kurt N. Schroeder, Peter G. Spera, Tiberiu Suto, Sean Swehla, Stefan Usenbinz, Craig R. Walters
-
Publication number: 20160117306Abstract: A method and workstation for completing an audiovisual form. In response to a user speaking a command for the web browser to accept keyboard entry of text, the web browser accepts entry of text and displays the form with the text entered into a blank area in a field of the form. In response to all fields in the form having been processed, the web browser generates a pause for a specified period of time. In response to the specified period of time of the pause having expired, the web browser loops back to a top of the form.Type: ApplicationFiled: January 4, 2016Publication date: April 28, 2016Inventors: Patrick J. Callaghan, Stephen V. Feustel, Michael J. Howland, Steven M. Pritko
-
Patent number: 9086918Abstract: An integrated hybrid system is provided. The hybrid system includes compute components of different types and architectures that are integrated and managed by a single point of control to provide federation and the presentation of the compute components as a single logical computing platform.Type: GrantFiled: December 20, 2012Date of Patent: July 21, 2015Assignee: INTERNATIONAL BUSINESS MACHINESS CORPORATIONInventors: Andreas Bieswanger, Patrick J. Callaghan, Joseph M. Gdaniec, Harm I. Osterndorf, Paul E. Rogers, Kurt N. Schroeder, Brian D. Valentine, Eric W. Weinmann, Friedrich M. Welter
-
Patent number: 9081613Abstract: An integrated hybrid system is provided. The hybrid system includes compute components of different types and architectures that are integrated and managed by a single point of control to provide federation and the presentation of the compute components as a single logical computing platform.Type: GrantFiled: November 2, 2010Date of Patent: July 14, 2015Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Andreas Bieswanger, Patrick J. Callaghan, Joseph M. Gdaniec, Harm I. Osterndorf, Kurt N. Schroeder, Paul E. Rogers, Brian D. Valentine, Eric A. Weinmann, Friedrich M. Welter
-
Patent number: 8473789Abstract: A system to check for memory leaks in storage may include a data processing application executing via a computer processor, and storage to store data generated by the data processing application. The system may also include a monitor executing via the computer processor that checks the storage over different time intervals in order to identify a particular sized memory leak in the storage based upon each time interval's length.Type: GrantFiled: September 21, 2009Date of Patent: June 25, 2013Assignee: International Business Machines CorporationInventors: Patrick J. Callaghan, Thomas B. Mathias
-
Processing multiple requests by a statically identified user server prior to user server termination
Patent number: 8250134Abstract: The simultaneous processing of requests under multiple user identifiers is facilitated. The requests are processed by user servers, in which a user server has an association with a particular user. A user server has a static identity associated therewith and is capable of processing a plurality of requests prior to terminating. The requests are dispatched to the appropriate user servers via a dispatcher server coupled to the user servers.Type: GrantFiled: December 27, 2006Date of Patent: August 21, 2012Assignee: International Business Machines CorporationInventors: Patrick J. Callaghan, Tung-Sing Chong -
Publication number: 20120110588Abstract: An integrated hybrid system is provided. The hybrid system includes compute components of different types and architectures that are integrated and managed by a single point of control to provide federation and the presentation of the compute components as a single logical computing platform.Type: ApplicationFiled: November 2, 2010Publication date: May 3, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Andreas Bieswanger, Patrick J. Callaghan, Joseph M. Gdaniec, Harm I. Osterndorf, Kurt N. Schroeder, Paul E. Rogers, Brian D. Valentine, Eric A. Weinmann, Friedrich M. Welter
-
Publication number: 20110072299Abstract: A system to check for memory leaks in storage may include a data processing application executing via a computer processor, and storage to store data generated by the data processing application. The system may also include a monitor executing via the computer processor that checks the storage over different time intervals in order to identify a particular sized memory leak in the storage based upon each time interval's length.Type: ApplicationFiled: September 21, 2009Publication date: March 24, 2011Applicant: International Business Machines CorporationInventors: Patrick J. Callaghan, Thomas B. Mathias
-
Patent number: 7756048Abstract: A method in a data processing system for monitoring for errors on a network. Responsive to detecting a change in a state of the network, determine whether the change in state is a loss of a communications link to a remote data processing system. If the change in state is a loss of the communications link, determine whether the communications link was established for at least a first period of time to be considered an acceptable connection to the remote data processing system; and create a new serviceable event, if a second period of time passes without reestablishing the communications link to the selected data processing system. Repeat occurrences of identical outages are tracked and multiple detected instances of an outage for different partitions are counted as a single failure in the examples.Type: GrantFiled: December 21, 2007Date of Patent: July 13, 2010Assignee: International Business Machines CorporationInventors: George Henry Ahrens, Jr., Patrick J. Callaghan, Stephen V. Feustel, Robert Keith Overton, Richard Jeffrey Planutis, Alan David Seid
-
PROCESSING MULTIPLE REQUESTS BY A STATICALLY IDENTIFIED USER SERVER PRIOR TO USER SERVER TERMINATION
Publication number: 20080162624Abstract: The simultaneous processing of requests under multiple user identifiers is facilitated. The requests are processed by user servers, in which a user server has an association with a particular user. A user server has a static identity associated therewith and is capable of processing a plurality of requests prior to terminating. The requests are dispatched to the appropriate user servers via a dispatcher server coupled to the user servers.Type: ApplicationFiled: December 27, 2006Publication date: July 3, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Patrick J. Callaghan, Tung-Sing Chong -
Publication number: 20080162985Abstract: A method in a data processing system for monitoring for errors on a network. Responsive to detecting a change in a state of the network, determine whether the change in state is a loss of a communications link to a remote data processing system. If the change in state is a loss of the communications link, determine whether the communications link was established for at least a first period of time to be considered an acceptable connection to the remote data processing system; and create a new serviceable event, if a second period of time passes without reestablishing the communications link to the selected data processing system. Repeat occurrences of identical outages are tracked and multiple detected instances of an outage for different partitions are counted as a single failure in the examples.Type: ApplicationFiled: December 21, 2007Publication date: July 3, 2008Inventors: George Henry Ahrens, Patrick J. Callaghan, Stephen V. Feustel, Robert Keith Overton, Richard Jeffrey Planutis, Alan David Seid
-
Patent number: 7339885Abstract: A method in a data processing system for monitoring for errors on a network. Responsive to detecting a change in a state of the network, determine whether the change in state is a loss of a communications link to a remote data processing system. If the change in state is a loss of the communications link, determine whether the communications link was established for at least a first period of time to be considered an acceptable connection to the remote data processing system; and create a new serviceable event, if a second period of time passes without reestablishing the communications link to the selected data processing system. Repeat occurrences of identical outages are tracked and multiple detected instances of an outage for different partitions are counted as a single failure in the examples.Type: GrantFiled: June 5, 2003Date of Patent: March 4, 2008Assignee: International Business Machines CorporationInventors: George Henry Ahrens, Jr., Patrick J. Callaghan, Stephen V. Feustel, Robert Keith Overton, Richard Jeffrey Planutis, Alan David Seid
-
Patent number: 7114076Abstract: A user of a client computer is authenticated for first and second applications executing in a server. The server authenticates the user for the first application based on a userID and password of the user, and the server returns a token of the authentication to the client computer. The client computer uses the token to request a first function performed by the first application. The user subsequently requests a second function performed by the second application. In response, the client computer determines that the user has not yet been authenticated for the second application and sends a request to the server for an authentication ticket for using the second application. In response to the request for the authentication ticket, the server checks the authentication token. If valid, the server returns an authentication ticket to the client computer. The client computer requests the second function to the server. The client computer request for the second function includes the authentication ticket.Type: GrantFiled: May 23, 2003Date of Patent: September 26, 2006Assignee: International Business Machines CorporationInventor: Patrick J. Callaghan
-
Publication number: 20040246893Abstract: A method in a data processing system for monitoring for errors on a network. Responsive to detecting a change in a state of the network, determine whether the change in state is a loss of a communications link to a remote data processing system. If the change in state is a loss of the communications link, determine whether the communications link was established for at least a first period of time to be considered an acceptable connection to the remote data processing system; and create a new serviceable event, if a second period of time passes without reestablishing the communications link to the selected data processing system. Repeat occurrences of identical outages are tracked and multiple detected instances of an outage for different partitions are counted as a single failure in the examples.Type: ApplicationFiled: June 5, 2003Publication date: December 9, 2004Applicant: International Business Machines CorporationInventors: George Henry Ahrens, Patrick J. Callaghan, Stephen V. Feustel, Robert Keith Overton, Richard Jeffrey Planutis, Alan David Seid