Patents by Inventor Richard Cheston

Richard Cheston has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070240216
    Abstract: Hypervisors are a new technology in the industry that enable multiple Operating Systems to co-exist on a single client. The use of a hypervisor provides a novel approach to email virus protection. The hypervisor is able to fire up an Operating System on demand, for a specific purpose, or have it running from the powering of the computer. A second Operating System can be provided as a donor Operating System that acts as a scratch area or scratch pad. Emails sent to the recipient are opened under the donor Operating System, or the “Scratch OS”. Once the email activities are complete, the “Scratch OS” can be discarded. Thus, any damage that may be caused by an email virus would be nil, and further the User Operating System would be undamaged. This method would be effective in precluding any damage that a virus may have done.
    Type: Application
    Filed: March 31, 2006
    Publication date: October 11, 2007
    Applicant: Lenovo (Singapore) Pte. Ltd.
    Inventors: Frances O'Sullivan, Richard Cheston, Daryl Cromer, Robert Gamble, Howard Locker, Rod Walterman
  • Publication number: 20070168497
    Abstract: Apparatus, methods and program products by which the user of a computer system is notified of the desirability or urgency of initiating an interval during which the user leaves the system idle to permit some communication or update from a network with which the system is in communication.
    Type: Application
    Filed: January 19, 2006
    Publication date: July 19, 2007
    Applicant: Lenovo (Singapore) Pte. Ltd.
    Inventors: Howard Locker, Richard Cheston, Daryl Cromer, Deepak Advani
  • Publication number: 20060294019
    Abstract: A technique is disclosed for storing an electronic record of the existence of licenses available for use in a network of computers and the deployment status of programs covered by the licenses. License tokens are stored on a license server, and the stored license tokens are used to validate the deployment of applications stored on clients associated with the license server. The license server maintains the license tokens for all licensed applications used by the associated clients and maintains a license file for each client. Periodically, the license file containing token data is sent to the pre-boot environment of each client in the system, e.g., by a synching process. A license-maintenance application residing in the pre-boot environment of each client validates the applications stored on the client by comparing them with the token data in the license file upon the occurrence of a pre-boot process.
    Type: Application
    Filed: June 22, 2005
    Publication date: December 28, 2006
    Applicant: Lenovo (Singapore) Pte. Ltd.
    Inventors: Richard Dayan, Richard Cheston, Daryl Cromer, Howard Locker, Randall Springfield
  • Publication number: 20060190938
    Abstract: A system automatically determines probable idle times for a computing system and performs maintenance tasks, such as virus scanning, during these times. A prediction of probable idle times is based on an assessment of a user's past use or by an aggregate of information from several users if a company wishes to determine optimal times for running such tasks or pushing software patches to employees. A policy table set by the user or a company determines the priority of maintenance tasks to be run during the predicted idle time.
    Type: Application
    Filed: February 22, 2005
    Publication date: August 24, 2006
    Inventors: Peter Capek, Richard Cheston, Howard Locker, Clifford Pickover
  • Publication number: 20060185015
    Abstract: A method and system is described for a wireless client computer to be connected via an access point to a network only if the wireless client computer has executed all requisite anti-virus programs. Where necessary, a signal from the access point notifies an anti-viral program server that an anti-virus needs to be immediately downloaded to the wireless client computer. An anti-virus fix is installed on the wireless client computer, and a full session is then initiated between the wireless client computer and a wireless network via the access point.
    Type: Application
    Filed: February 14, 2005
    Publication date: August 17, 2006
    Applicant: International Business Machines Corporation
    Inventors: Richard Cheston, Daryl Cromer, Mark Davis, Howard Locker, Randall Springfield
  • Publication number: 20060179476
    Abstract: A method and system is presented for making a client computer compliant with a data security regulatory rule. A client computer is connected to a network that includes a compliance fix server. The compliance fix server determines if the client computer is in compliance with a data security regulatory rule, based on a level of compliance at which that the client computer is authorized. If the client computer has not executed the appropriate compliance software required to put the client computer in compliance with the data security regulatory rule, then the compliance fix server sends appropriate compliance software to the client computer for installation and execution.
    Type: Application
    Filed: February 9, 2005
    Publication date: August 10, 2006
    Applicant: International Business Machines Corporation
    Inventors: David Challener, Richard Cheston, Daryl Cromer, Howard Locker
  • Publication number: 20060164399
    Abstract: A method and system for providing diagonal scrolling on a touchpad of a device is disclosed. The method and system comprises determining if at least one finger is in contact with the touchpad, and entering a diagonal scroll mode if more than one finger is in contact with the touchpad. A system and method in accordance with the present invention allows the user to initiate a diagonal scroll at any location on a touchpad by using two fingers, thereby greatly enhancing the functions of the touchpad and allowing the user to manipulate computer programs from the touchpad much more efficiently and easily. The present invention supports diagonal scrolling on a touchpad and does not require a precise location for vertical or horizontal scrolling, since the entire touchpad area/surface can be used. The system and method in accordance with the present invention will also operate correctly on existing touchpads when a change in software drivers has been carried out.
    Type: Application
    Filed: January 21, 2005
    Publication date: July 27, 2006
    Inventors: Richard Cheston, Daryl Cromer, Howard Locker, Caroline Patzer
  • Publication number: 20060085686
    Abstract: A system and method that restores a computer system is provided. An image is created of a primary drive that includes an operating system and one or more applications. A copy of the image is stored on a second nonvolatile storage area. In one embodiment, the second nonvolatile storage area is a hidden partition of a hard drive. Patches are received for the operating system and the applications and applied to the corresponding operating system or applications. A copy of the patch files is stored in the second nonvolatile storage area. When the system is restored, the primary drive is reformatted and the image stored on the second nonvolatile storage area is copied to the primary drive. The patches stored on the second nonvolatile storage area are then applied to the operating system and applications included in the image that was copied to the primary drive.
    Type: Application
    Filed: October 13, 2004
    Publication date: April 20, 2006
    Applicant: International Business Machines Corporation
    Inventors: Richard Cheston, Daryl Cromer, Lee Highsmith, Howard Locker, Rod Waltermann
  • Publication number: 20060085685
    Abstract: A system and method that rejuvenates a computer system is provided. The user uses the computer system that includes an operating system and applications for a first period of time creating data files and applying patches to the operating system and applications. An image is created of the primary drive and stored on a second nonvolatile storage area. In one embodiment, the second nonvolatile storage area is a hidden partition of a hard drive. The user continues using the system during a second period of time. When the computer system becomes sluggish, the primary drive is reformatted and the image is copied from the second nonvolatile storage area to the primary drive. In addition, patches and applications installed after the image was created are stored to the second nonvolatile storage area and reapplied and reinstalled on the primary drive after the image has been copied to the primary drive.
    Type: Application
    Filed: October 13, 2004
    Publication date: April 20, 2006
    Applicant: International Business Machines Corporation
    Inventors: Richard Cheston, Daryl Cromer, Howard Locker, Rod Waltermann
  • Publication number: 20060085625
    Abstract: An apparatus, system, and method are disclosed for autonomically disposing a computer such as a workstation. The computer's local persistent storage medium is configured with pre-boot image which is configured with a set of functional modules that facilitate disposal or recycling of the computer to the next user. The disposal and recycle methods are automated, require minimal user intervention, and facilitate moving configuration options and data to a different computer. The entire process may execute from the pre-boot image on the computer's local persistent storage medium without ever booting the primary operating system.
    Type: Application
    Filed: October 18, 2004
    Publication date: April 20, 2006
    Inventors: Richard Cheston, Daryl Cromer, Jan Janick, John Karidis, Howard Locker, Randall Springfield
  • Publication number: 20060085648
    Abstract: A method that restricts a user's access to critical data on a client and network by requiring renewal of a client's lease for accessing the network by an administrative utility of the network during each login by a user to the client. A user/client logon policy is created for each user and/or each client and stored at the lease server. The lease server executes a utility that utilizes the policies to control whether a user is allowed to access a particular client on the network. User access to the client and ultimately the network is only provided when the lease term is renewed for the client (and user). When a lease term is not renewed/extended, the user is blocked from accessing the client system.
    Type: Application
    Filed: October 16, 2004
    Publication date: April 20, 2006
    Applicant: International Business Machines Corp.
    Inventors: Richard Cheston, Daryl Cromer, Howard Locker, Randall Springfield
  • Publication number: 20060041932
    Abstract: Systems and methods to access password-protected stored data when a corresponding data password has been lost, forgotten, or is otherwise unavailable, and to recover the data password to facilitate access to the password-protected data from a digital memory device such as a hard disk drive associated with a user computer. In some embodiments the computer is communicatively coupled with a network and receives at least one encryption key from a secure computer via the network. In other embodiments the computer is a stand alone computer and receives at least one encryption key from a removable, non-volatile memory such as a CD ROM. The encryption key is used to encrypt the data password and both are stored on the hard disk drive. If the data password becomes lost, forgotten, or otherwise unavailable, the encrypted password is recovered from the hard disk drive and decrypted to recover the data password.
    Type: Application
    Filed: August 23, 2004
    Publication date: February 23, 2006
    Applicant: International Business Machines Corporation
    Inventors: Daryl Cromer, Richard Cheston, Steven Goodman, Howard Locker, Randall Springfield
  • Publication number: 20060023671
    Abstract: A network includes a plurality of wall plates, each of the wall plates couples a network resource such as a computer or a network attached device to the network and includes an RFID circuit to detect proximate devices having an RFID tag. The proximate devices can be network attached devices or non network attached devices such as desks, phones, and artwork. Logic is included within each wall plate which includes wall plate physical location information. The logic is designed to respond to a broadcast signal. In so doing, the physical location of any resource can be determined. The physical location of all known resources are provided to an inventory application in the network, thereby allowing network administrators and users to remotely determine the physical location (room, floor, building, etc.) of any and all known resources attached to the network. Likewise, local computer users are able to identify the network resources located in their vicinity.
    Type: Application
    Filed: July 28, 2004
    Publication date: February 2, 2006
    Applicant: International Business Machines Corporation
    Inventors: Richard Cheston, Daryl Cromer, Dhruv Desai, Howard Locker, James Ward
  • Publication number: 20050283640
    Abstract: A client computer is connected via a network to an anti-virus server and polls the server for indication that an anti-virus needs to be immediately downloaded from the anti-virus server. The client computer disengages from the network, and re-establishes a link with only the trusted anti-virus server. The anti-virus fix is installed, the client computer re-booted, and the client computer is then allowed to reconnect to the full network. If the client's primary operating system (OS) is infected, a secondary OS in the client computer performs the anti-virus download and execution. The disengagement from the network is performed by applying a filter in a network interface card (NIC) driver by the primary OS, the secondary OS, a service processor (SP), or by a virtual machine manager (VMM), depending on which is available at the client computer.
    Type: Application
    Filed: May 19, 2004
    Publication date: December 22, 2005
    Applicant: International Business Machines Corporation
    Inventors: Richard Cheston, Philip Childs, Daryl Cromer, Mark Davis, Howard Locker, Paul Plaskonos
  • Publication number: 20050182701
    Abstract: A system is provided with at least one differentiating, chargeable technology. Methods of selling and pricing the system are disclosed allowing the system to be sold at a reduced initial purchase price. The execution by a user of the system of the chargeable technology is tracked and charged for on a per-usage basis. Systems and methods are disclosed for tracking, recording and reporting data regarding the execution of the chargeable teachnology.
    Type: Application
    Filed: February 12, 2004
    Publication date: August 18, 2005
    Applicant: International Business Machines Corporation
    Inventors: Richard Cheston, Daryl Cromer, Howard Locker, Michael Vanover
  • Publication number: 20050138158
    Abstract: A method and system for downloading software according to an identity of a user. Upon booting up a client computer, the user is automatically directed to a deployment server, which contains a listing of software to which the user is authorized to download and use. The directions to the deployment server are provided by a domain name server, or a domain controller. The software initially loaded onto the client computer is minimal, such that it is easily appended with additional features and programs.
    Type: Application
    Filed: December 23, 2003
    Publication date: June 23, 2005
    Applicant: International Business Machines Corp.
    Inventors: David Challener, Richard Cheston, Daryl Cromer, Howard Locker, Rod Waltermann
  • Publication number: 20050138399
    Abstract: The loss of a computer primary O.S. password, BIOS password, or HDD password (or even an application password) is sensed by a secondary O.S. based on a number of failed log on attempts to the affected component. The password can be reset by having the secondary O.S. generate an intermediate password automatically, verify user authorization, and then make the intermediate password available to, e.g., the primary O.S., so that the affected component can be accessed and its password reset without help desk personnel intervention.
    Type: Application
    Filed: December 23, 2003
    Publication date: June 23, 2005
    Applicant: International Business Machines Corporation
    Inventors: Richard Cheston, Michael Vanover, Steven Welch
  • Publication number: 20050138159
    Abstract: A client computer is connected via a network to an anti-virus server. A signal from the anti-virus server notifies the client computer that an anti-virus needs to be immediately downloaded from the anti-virus server. The client computer disengages from the network, and re-establishes a link with only the trusted anti-virus server. The anti-virus fix is installed, the client computer re-booted, and the client computer is then allowed to reconnect to the full network. If the client's primary operating system (OS) is infected, a secondary OS in the client computer performs the anti-virus download and execution. The disengagement from the network is performed by applying a filter in a network interface card (NIC) driver by the primary OS, the secondary OS, a service processor (SP), or by a virtual machine manager (VMM), depending on which is available at the client computer.
    Type: Application
    Filed: April 16, 2004
    Publication date: June 23, 2005
    Applicant: International Business Machines Corporation
    Inventors: David Challener, Richard Cheston, Daryl Cromer, Mark Davis, Howard Locker
  • Publication number: 20050081079
    Abstract: A data processing system service and method includes enabling the system to perform diagnostic processing in response to identified system problems and enabling the system to generate a trouble ticket containing machine and problem-specific information. The service and method further include forwarding the trouble ticket to an external server which responds with a unique identifier tied logically to the trouble ticket. The service and method of the present invention requires that requested services such as a help desk call or the return of the system for repair or replacement be obtained only upon presentation of the unique identifier. The system may be partitioned into at least two partitions including a diagnostic partition wherein the diagnostic processing is performed. The system boots to the diagnostic partition upon recognition of a system problem, either automatically or by a user.
    Type: Application
    Filed: October 10, 2003
    Publication date: April 14, 2005
    Applicant: International Business Machines Corporation
    Inventors: Richard Cheston, Daryl Cromer, Richard Dayan, Howard Locker
  • Publication number: 20050081118
    Abstract: A data processing system service includes enabling the system to perform diagnostic processing in response to a system failure and enabling the system to perform corrective action during the automated diagnostic processing to attempt to resolve the system failure. The service further includes configuring the system to generate a trouble ticket containing information characterizing the system failure and any attempted corrective action regardless of whether the corrective action was successful in resolving the system failure. The system may be further enabled to forward the trouble ticket to an external database for analysis and to access the external database to determine whether the detected failure has been encountered previously. The system may be partitioned into two partitions including a diagnostic partition. The system boots to the diagnostic partition following a failure or in response to a request from a user.
    Type: Application
    Filed: October 10, 2003
    Publication date: April 14, 2005
    Applicant: International Business Machines Corporation;
    Inventors: Richard Cheston, Daryl Cromer, Richard Dayan, Howard Locker