Patents by Inventor Richard Dayan

Richard Dayan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20060047858
    Abstract: A method and system for booting up multiple PCI peripheral devices, such that the number of bootable PCI peripheral devices is not limited by the amount of computer system memory that is dedicated to storing executable boot code for the peripheral devices. The executable boot code is stored on a Read Only Memory (ROM) on each peripheral device. When a new PCI peripheral device begins to boot up, a check for available memory space in a ROM scan memory address space is performed. If there is not enough available room in the ROM scan memory address space for the new device's executable boot code, then a ROM scan detection logic pages an image of another peripheral device's executable boot code out of the ROM scan memory address space before storing the new device's executable boot code into the ROM scan memory address space.
    Type: Application
    Filed: August 30, 2004
    Publication date: March 2, 2006
    Applicant: International Business Machines Corp.
    Inventors: William Atherton, Daryl Cromer, Richard Dayan, Scott Dunham, Eric Kern, Howard Locker, William Schwartz, Adam Soderlund
  • Publication number: 20060031830
    Abstract: A method, system, and operating system (OS) software utility that prevents installation of a software product in a computer system in an un-approved location. The OS of the computer system (or the application itself) is coded to require a check of geographical restrictions prior to installing certain software products. The computer system is provided with a GPS receiver, which provides current geographic or spatial location of the computer system. When application installation is requested, the current location is compared against a list of approved locations for installing software on the computer system. No software installation is allowed on the computer system unless the current location is an approved location for the software and/or the computer system.
    Type: Application
    Filed: August 3, 2004
    Publication date: February 9, 2006
    Applicant: International Business Machines Corp.
    Inventors: Simon Chu, Richard Dayan, Jeffery Jennings, David Rhoades
  • Publication number: 20060031448
    Abstract: A method, system and service for providing on-demand computing power to an owner of a multi-blade computer in a server blade chassis. The server blade chassis is delivered fully populated with server blades to a customer. However, only a portion of the total number of server blades is initially enabled. A management module in the server blade chassis monitors usage of the enabled server blades and associated hardware. If the usage of the enabled server blades exceeds a pre-defined parameter, then additional server blades in the server blade chassis are permanently turned on using the management module and a remotely provided key from the manufacturer of the multi-blade computer.
    Type: Application
    Filed: August 3, 2004
    Publication date: February 9, 2006
    Applicant: International Business Machines Corp.
    Inventors: Simon Chu, Richard Dayan, Gregory Pruett, David Rhoades
  • Publication number: 20050273625
    Abstract: The present invention relates to a method and system for protecting a password. In a first aspect, the method includes allowing a user to enter an apparent password into a computing system, wherein the apparent password is a string of characters and keystrokes including the password and an arbitrary number of non-password related characters and keystrokes. The method further includes analyzing the string of characters and keystrokes by the computing system to find the password, and validating the apparent password if the password is found in any position in the string of characters and keystrokes.
    Type: Application
    Filed: June 3, 2004
    Publication date: December 8, 2005
    Applicant: International Business Machines Corporation
    Inventors: Richard Dayan, Jeffery Jennings
  • Publication number: 20050257213
    Abstract: A method and system for a failover management module for a server blade chassis. A virtual out-of-band network connects management modules in different server blade chassis. Upon a detection of a failure of the management module(s) in a first server blade chassis, a management module in a second server blade chassis takes over control of the first server blade chassis.
    Type: Application
    Filed: May 14, 2004
    Publication date: November 17, 2005
    Applicant: International Business Machines Corporation
    Inventors: Simon Chu, Richard Dayan, Brandon Ellison, Eric Kern
  • Patent number: 6954147
    Abstract: Aspects for providing protection against theft and loss of a portable computer system are described. The aspects include establishing boundary conditions within which the portable computer system is authorized for use and tracking a position of the portable computer system with a global position system (GPS) unit in the portable computer system. The position is compared to the boundary conditions to identify whether the portable computer system has violated the boundary conditions, and anti-theft routines are performed when the position has violated the boundary conditions. The anti-theft routines include calling a preset phone number with a cellular calling facility of the portable computer system.
    Type: Grant
    Filed: March 31, 1999
    Date of Patent: October 11, 2005
    Assignee: Lenovo Pte. Ltd.
    Inventors: Daryl C. Cromer, David B. Rhoades, Howard J. Locker, James P. Ward, Eric R. Kern, Brandon J. Ellison, Richard A. Dayan
  • Publication number: 20050204095
    Abstract: A method, software, and system for loading data from disk include comparing a current sequence of disk I/O requests to data indicative of a previous disk I/O request sequence. Responsive to detecting a match between the current disk I/O sequence and the previous disk I/O sequence, a copy of data blocks accessed during the I/O sequence is stored in a contiguous portion of the disk. Responsive to a subsequent request to data in the disk sequence, the request is mapped to and serviced from the sequential portion of the disk. In one embodiment, the disk sequence represents a boot sequence of the system.
    Type: Application
    Filed: March 11, 2004
    Publication date: September 15, 2005
    Applicant: International Business Machines Corporation
    Inventors: Richard Dayan, James Macon
  • Publication number: 20050182796
    Abstract: The present invention discloses a method and hard disk configuration for protecting data associated with a first image file in an appliance server after the first image file has been replaced with a second image file. In a first aspect, the method of the invention includes partitioning a hard disk of the appliance server into a plurality of partitions, wherein at least one of the plurality of partitions is a hidden partition and copying the data associated with the first image file to the hidden partition, wherein the data in the hidden partition is invisible to a network operating system during normal server operation.
    Type: Application
    Filed: February 12, 2004
    Publication date: August 18, 2005
    Applicant: International Business Machines Corporation
    Inventors: Simon Chu, Richard Dayan
  • Publication number: 20050144493
    Abstract: Systems and arrangements for remotely selecting a bootable image via a WOL packet for a wake-on-LAN (WOL) capable computer are contemplated. Server-side embodiments include hardware and/or software for determining a client to be managed, determining whether the client is active on the network, and transmitting a WOL packet having a vector, or operating system partition identification (OSPID), to describe a bootable image accessible by the WOL capable computer. Some embodiments may include an OSPID that points to a secure bootable image such as a bootable image on a hard drive, a compact disk (CD) connected to the computer, or other local resource. Client-side embodiments may receive the WOL packet at, for instance, a network interface card (NIC), recognize that the WOL packet includes an OSPID that describes the bootable image to boot, and implement an alternative boot sequence to boot from that bootable image.
    Type: Application
    Filed: December 31, 2003
    Publication date: June 30, 2005
    Applicant: International Business Machines Corporation
    Inventors: Daryl Cromer, Richard Dayan, Joseph Freeman, Steven Goodman, Eric Kern, Howard Locker, Randall Springfield
  • Publication number: 20050132360
    Abstract: A data processing system suitable for use as a client device in a network includes a service processor communicatively coupled to a general purpose processor of the system. The system is enabled to respond to a boot event by requesting boot information from a network device. If the boot information request expires unsuccessfully, the boot information is requested from the service processor. If the attempt to retrieve the boot information from the service processor is successful, the retrieved boot information is used to establish a network connection to a file transfer server. The file transfer server connection is then used to download an operating system image from the file transfer server to boot the operating system image and install an operating system on the client device. In one embodiment, the client device is a PXE client on a network lacking a DHCP server.
    Type: Application
    Filed: December 11, 2003
    Publication date: June 16, 2005
    Inventors: Simon Chu, Richard Dayan, James Matlock, David Rhoades
  • Publication number: 20050114544
    Abstract: A method and system for managing a secure configuration of a server blade on a network. The server blade has a Remote Supervisor Adapter (RSA) card, which contains a list of trusted Dynamic Host Configuration Protocol (DHCP) servers. A remote manager, which communicates with the RSA card via a hyper-secure network, maintains the list of trusted DHCP servers on the RSA card. When the server blade broadcasts a request for configuration parameters to join the network, a response offer is returned from a DHCP server. If the responding DHCP server is not on the list of trusted DHCP servers contained in the RSA card, then the offer is refused, and another DHCP server's offer is evaluated.
    Type: Application
    Filed: October 31, 2003
    Publication date: May 26, 2005
    Applicant: International Business Machines Corporation
    Inventors: Simon Chu, Richard Dayan, James Matlock, David Rhoades
  • Publication number: 20050097360
    Abstract: A method and system for managing a secure network boot of a secondary server (server blade). The server blade sends a request, via an Ethernet switch, for a boot program to multiple Dynamic Host Configuration Protocol (DHCP) servers. One of the DHCP servers responds with an address of at least one Pre-boot Execution Environment (PXE) server that can upload a boot program to the server blade. Only if the responding DHCP server is on a list of known trusted DHCP servers will the Ethernet switch allow the server blade to receive the response from the responding DHCP server, thus allowing the download of a boot program from a PXE server.
    Type: Application
    Filed: October 31, 2003
    Publication date: May 5, 2005
    Applicant: International Business Machines Corporation
    Inventors: Simon Chu, Richard Dayan, Gregory Pruett, David Rhoades
  • Publication number: 20050097310
    Abstract: A method and system for managing a secure network boot of a server blade. The server blade is part of a server blade chassis, which holds multiple server blades that communicate with outside devices via a Pre-boot eXecution Environment (PXE) enabled network interface card. When a server blade receives a response from a PXE boot server offering a boot program download, a Remote Supervisory Adapter (RSA) card, managed by a remote manager, compares the identity of the responding PXE boot server with a list of trusted PXE boot servers. Only if the responding PXE boot server is on the list of trusted PXE boot servers will the server blade be allowed to use a boot program provided by the responding PXE boot server.
    Type: Application
    Filed: October 31, 2003
    Publication date: May 5, 2005
    Applicant: International Business Machines Corporation
    Inventors: Simon Chu, Richard Dayan, James Matlock, David Rhoades
  • Publication number: 20050097549
    Abstract: A method and system for managing a download of software from an application server to a client computer depending on a physical location of the client computer. The client computer transmits a real-time Global Position System (GPS) coordinate to the application server. This location is then compared to a list of authorized location ranges associated with the requested application. If the client computer is located within an authorized location range, the application server then downloads the application to the client computer. If the client computer is not within an authorized area, then the application is not allowed be downloaded.
    Type: Application
    Filed: October 31, 2003
    Publication date: May 5, 2005
    Applicant: International Business Machines Corporation
    Inventors: Simon Chu, Richard Dayan, Jeffery Jennings, David Rhoades
  • Publication number: 20050097208
    Abstract: A method and system for method of removing a node from a multi-node computer. The node receives a system management interrupt (SMI), resulting in a quiescenting of only that node. The SMI receiving node then polls other nodes in the multi-node computer to determine if the SMI affects an operation of any of the other nodes, and quiescents any other node affected by the SMI. Each quiescent node then transfers all of the contents of its system memory to a backup memory in an unaffected remote node in the multi-node computer. The remote node than assumes the function of the removed node that had received the SMI. The method and system thus allows node removal in the event of a hot-swap request or a predicted failure of a node.
    Type: Application
    Filed: October 31, 2003
    Publication date: May 5, 2005
    Applicant: International Business Machines Corporation
    Inventors: Simon Chu, Richard Dayan, Brandon Ellison, Eric Kern, William Schwartz, Adam Soderlund
  • Publication number: 20050086391
    Abstract: A method and system for managing a download of software from an application server to a client computer depending on a physical location of the client computer. The client computer transmits a real-time Global Position System (GPS) coordinate to the application server. This location is then compared to a list of authorized location ranges associated with the requested application. If the client computer is located within an authorized location range, the application server then downloads the application to the client computer. If the client computer is not within an authorized area, then the application is not allowed be downloaded.
    Type: Application
    Filed: September 30, 2003
    Publication date: April 21, 2005
    Applicant: International Business machines Corporation
    Inventors: Simon Chu, Richard Dayan, Jeffery Jennings, David Rhoades
  • Publication number: 20050081118
    Abstract: A data processing system service includes enabling the system to perform diagnostic processing in response to a system failure and enabling the system to perform corrective action during the automated diagnostic processing to attempt to resolve the system failure. The service further includes configuring the system to generate a trouble ticket containing information characterizing the system failure and any attempted corrective action regardless of whether the corrective action was successful in resolving the system failure. The system may be further enabled to forward the trouble ticket to an external database for analysis and to access the external database to determine whether the detected failure has been encountered previously. The system may be partitioned into two partitions including a diagnostic partition. The system boots to the diagnostic partition following a failure or in response to a request from a user.
    Type: Application
    Filed: October 10, 2003
    Publication date: April 14, 2005
    Applicant: International Business Machines Corporation;
    Inventors: Richard Cheston, Daryl Cromer, Richard Dayan, Howard Locker
  • Publication number: 20050081079
    Abstract: A data processing system service and method includes enabling the system to perform diagnostic processing in response to identified system problems and enabling the system to generate a trouble ticket containing machine and problem-specific information. The service and method further include forwarding the trouble ticket to an external server which responds with a unique identifier tied logically to the trouble ticket. The service and method of the present invention requires that requested services such as a help desk call or the return of the system for repair or replacement be obtained only upon presentation of the unique identifier. The system may be partitioned into at least two partitions including a diagnostic partition wherein the diagnostic processing is performed. The system boots to the diagnostic partition upon recognition of a system problem, either automatically or by a user.
    Type: Application
    Filed: October 10, 2003
    Publication date: April 14, 2005
    Applicant: International Business Machines Corporation
    Inventors: Richard Cheston, Daryl Cromer, Richard Dayan, Howard Locker
  • Publication number: 20050071619
    Abstract: A method and system for managing a secure network boot of a server blade. The server blade is part of a server blade chassis, which holds multiple server blades that communicate with outside devices via a Pre-boot eXecution Environment (PXE) enabled network interface card. When a server blade receives a response from a PXE boot server offering a boot program download, a Remote Supervisory Adapter (RSA) card, managed by a remote manager, compares the identity of the responding PXE boot server with a list of trusted PXE boot servers. Only if the responding PXE boot server is on the list of trusted PXE boot servers will the server blade be allowed to use a boot program provided by the responding PXE boot server.
    Type: Application
    Filed: September 30, 2003
    Publication date: March 31, 2005
    Applicant: International Business Machines Corporation
    Inventors: Simon Chu, Richard Dayan, James Matlock, David Rhoades
  • Publication number: 20050071675
    Abstract: A method and system for managing a secure network boot of a secondary server (server blade). The server blade sends a request, via an Ethernet switch, for a boot program to multiple Dynamic Host Configuration Protocol (DHCP) servers. One of the DHCP servers responds with an address of at least one Pre-boot Execution Environment (PXE) server that can upload a boot program to the server blade. Only if the responding DHCP server is on a list of known trusted DHCP servers will the Ethernet switch allow the server blade to receive the response from the responding DHCP server, thus allowing the download of a boot program from a PXE server.
    Type: Application
    Filed: September 30, 2003
    Publication date: March 31, 2005
    Applicant: International Business Machines Corporation
    Inventors: Simon Chu, Richard Dayan, Gregory Pruett, David Rhoades