Patents by Inventor Richard Kern

Richard Kern has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7174465
    Abstract: A method is disclosed for securely updating system attributes of a client computer with a BIOS and includes signing a public key of a secure server with a private key of the BIOS prior to completion of manufacturing of the client computer to create an encrypted public key and embedded private key stored at the server. The method includes receiving at the server a request packet transmitted from the client computer requesting system attribute modification, encrypting the request packet to create an encrypted packet, and transmitting a return packet to client computer comprising the encrypted packet, the server's public key, and server instructions. The client computer decrypts the request packet using the server's public key and compares it to the original request packet, and if identical, executes the server instructions to modify the client computer's boot block to update client computer's system attributes.
    Type: Grant
    Filed: June 26, 2002
    Date of Patent: February 6, 2007
    Assignee: Lenovo Singapore Pte, Ltd
    Inventors: Joseph Wayne Freeman, Chad Lee Gettelfinger, Steven Dale Goodman, William Fred Keown, Jr., Eric Richard Kern, Randall Scott Springfield
  • Patent number: 7117334
    Abstract: A method and system for allowing nodes in a multi-node computer to be appropriated by a master node in the multi-node computer. The node to be appropriated is suspended into an ACPI S3 Sleep State, causing current system operations state information to be stored in a backup memory in the appropriated node. The master node then populated a primary memory in the appropriated node with OS and other information required to join a partition that includes the master node. When the master node no longer wishes to use the appropriated node, the backup memory in the appropriated node is mirrored back into the primary memory. When the appropriated node “wakes up” from the S3 state, it continues executing software commands where it left off, without knowing anything that had happened after going into the S3 state.
    Type: Grant
    Filed: May 14, 2004
    Date of Patent: October 3, 2006
    Assignee: International Business Machines Corporation
    Inventors: Jason Robert Almeida, Scott Neil Dunham, Eric Richard Kern, William Bradley Schwartz
  • Patent number: 7107487
    Abstract: A method, system and computer program product for implementing a fault tolerant sleep mode of operation. The system state information may be stored in a volatile memory and in a non-volatile storage unit prior to entering the sleep mode of operation. If a memory corruption event, e.g., power outage, brownout, power surge, occurs during the sleep mode of operation, then, upon receiving an invocation to resume to a normal mode of operation, the system state information stored in the non-volatile storage unit may be reloaded into the volatile memory. By reloading the system state information stored in the non-volatile storage into the volatile memory, the computer system may resume to a normal mode of operation from a sleep mode of operation without any corruption or loss of data.
    Type: Grant
    Filed: April 12, 2002
    Date of Patent: September 12, 2006
    Assignee: Lenovo (Singapore) Pte Ltd.
    Inventors: Nazir Haroon Ahmad, Ameha Aklilu, Jordan Hsiao Ping Chin, Richard Alan Dayan, James Patrick Hoff, Eric Richard Kern
  • Patent number: 7082129
    Abstract: In a computer network including a plurality of interconnected computers, one of the computers being a sleeping computer in a power down state, the sleeping computer listening for a packet associated with the sleeping computer, a method and system of waking the sleeping computer from the computer network. An incoming packet of data is transmitted from one of the computers in the network to the sleeping computer. When the sleeping computer detects the incoming packet, it determines if the incoming packet contains a data sequence associated with the sleeping computer. Further, the sleeping computer compares a transit value in the incoming packet to a predetermined value stored at the sleeping computer. The transit value indicates how far the data packet has traveled through the network, indicating the approximate origin of the data packet. Knowing the approximate origin of the data packet allows the client system to identify if the data packet originated from an external network.
    Type: Grant
    Filed: April 29, 2002
    Date of Patent: July 25, 2006
    Assignee: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Joseph Wayne Freeman, Chad Lee Gettelfinger, Steven Dale Goodman, Eric Richard Kern, Randall Scott Springfield
  • Patent number: 7076538
    Abstract: A method and system are disclosed for substituting an anonymous Universal Unique Identifier (UUID) for a computer system's real UUID in order to disguise an identity of the computer system to an application which is requesting a UUID for the client computer system. A storage device is established in the computer system. The storage device includes a primary and a second location. A UUID stored in the primary location is used as a UUID for the computer system. An anonymous UUID is generated. The anonymous UUID does not identify any particular computer system. The anonymous UUID is stored in the primary location within the storage device, and the real UUID is backed up by moving it into the secondary location. Thereafter, the anonymous UUID is provided in response to requests for the computer system's UUID.
    Type: Grant
    Filed: January 12, 2001
    Date of Patent: July 11, 2006
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: Daryl Carvis Cromer, Richard Alan Dayan, Eric Richard Kern, Randall Scott Springfield, Joseph Wayne Freeman, Robert Duane Johnson, Brandon Jon Ellison
  • Patent number: 7017052
    Abstract: A method for reducing the boot time for a computer includes: supplying power to the computer; disabling a plurality of input/output (I/O) devices coupled to the computer; performing a boot process for the computer; and placing the computer in a suspend to memory state before a user turns on the computer. The method reduces the boot time for a computer by placing the computer in a suspend to memory mode rather than completely shutting off the computer. In this manner, when a user of the computer pushes the power button, the computer wakes up from the suspend to memory mode instead of being required to perform the entire boot process. This significantly reduces the time required to make the computer available to the user, allowing the computer to function like an appliance.
    Type: Grant
    Filed: November 16, 2001
    Date of Patent: March 21, 2006
    Assignee: Lenovo Pte. Ltd.
    Inventors: Ameha Aklilu, Kamran Amini, Jordan Hsiao Ping Chin, James Alexander Day, Jr., Chad Lee Gettelfinger, Eric Richard Kern
  • Patent number: 6990515
    Abstract: In a computer network including a plurality of interconnected computers, one of the computers being a sleeping computer in a power down state, the sleeping computer listening for a packet associated with the sleeping computer, a method of waking the sleeping computer from the computer network. An incoming packet of data is transmitted from an administration system in the network to the sleeping computer. When the sleeping computer detects the incoming packet, it determines if the incoming packet contains a data sequence associated with the sleeping computer. If the incoming packet matches the particular data sequence associated with the sleeping computer, the sleeping computer transmits a reply message to the administration system. Upon receiving the reply, the administration system modifies the reply message in a predetermined manner and transmits the modified reply to the sleeping computer.
    Type: Grant
    Filed: April 29, 2002
    Date of Patent: January 24, 2006
    Assignee: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Joseph Wayne Freeman, Chad Lee Gettelfinger, Steven Dale Goodman, Eric Richard Kern, Randall Scott Springfield
  • Patent number: 6968462
    Abstract: A method and system for securing access to a keyboard driver in a host computer. The host computer includes a host processor that manages communication between a keyboard driver and a keyboard attached to the host computer. In accordance with a method of the present invention, a packet is received on a bus that connects the keyboard to the host processor. A determining is made of whether or not the packet originated from the keyboard. In response to determining that the packet originated from the keyboard, a independent bus traffic monitor processor sets an input secure bit which is then read by the host processor to selectively provide access to the keyboard driver in accordance with verification that the keyboard originated the packet.
    Type: Grant
    Filed: December 11, 2000
    Date of Patent: November 22, 2005
    Assignee: International Business Machines Corporation
    Inventors: David Carroll Challener, Richard Alan Dayan, Eric Richard Kern
  • Publication number: 20050227793
    Abstract: A method of evaluating the effectiveness of a baseball player or group of players, considering offensive inputs such as at bats and batting, base running and advancing other base runners and other baseball performances. This method reduces the baseball player effectiveness to a single number, or average. This average would be kept and updated over a series of baseball player at-bats and used to compare to other performances, such as other series of at-bats, seasons, or other players, or teams.
    Type: Application
    Filed: April 7, 2004
    Publication date: October 13, 2005
    Inventor: Richard Kerns
  • Patent number: 6925557
    Abstract: A method, system and computer readable medium containing programming instructions for booting a computer system having a plurality of devices is disclosed. They include provisions for initiating a boot sequence in the computer system and determining whether a device of the plurality of devices is either a bootable device or a nonbootable device. If the device is a nonbootable device, a clean restart of the boot sequence is performed, wherein the nonbootable device is bypassed during the clean restart.
    Type: Grant
    Filed: October 26, 2001
    Date of Patent: August 2, 2005
    Assignee: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Joseph Wayne Freeman, Steven Dale Goodman, Eric Richard Kern, Randall Scott Springfield
  • Patent number: 6912663
    Abstract: A system and method of securing a USB Interface of a personal computer against inputs from a user when the keyboard of the personal computer is secured against user inputs. By combining the hardware locking of the USB Interface is with the locking of the keyboard controllers, a potential circumvention of the keyboard controller lock is avoided and security of the data stored on a personal computer is increased.
    Type: Grant
    Filed: December 6, 1999
    Date of Patent: June 28, 2005
    Assignee: International Business Machines Corporation
    Inventors: Richard Alan Dayan, Eric Richard Kern
  • Patent number: 6832262
    Abstract: A method and system are disclosed for substituting an anonymous media access controller (MAC) address for a client computer system's real MAC address in order to disguise an identity of the client computer system when the client computer system is utilizing a network. The client computer system is coupled to a server computer system via the network. A primary storage device is established for storing a MAC address. A MAC address which is stored in the primary storage device is utilized as a network address for the client computer system when the client computer system is utilizing the network. An anonymous MAC address is generated. The anonymous MAC address is not associated with any particular client computer system. The anonymous MAC address is then stored in the primary storage device. The client computer system utilizes the anonymous MAC address as the network address for the client computer system when the client computer system is utilizing the network.
    Type: Grant
    Filed: January 12, 2001
    Date of Patent: December 14, 2004
    Assignee: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Richard Alan Dayan, Eric Richard Kern, Randall Scott Springfield, Joseph Wayne Freeman, Robert Duane Johnson, Brandon Jon Ellison
  • Patent number: 6742027
    Abstract: A data processing system and method are described for permitting a server computer system to remotely disable an input device included within a client computer system coupled to the server utilizing a network. The server computer system transmits a message to the client computer system to disable the input device. In response to a receipt of the message, a network adapter included within the client computer system disables the input device by prohibiting a data stream output from the input device from being received by an input/output controller included within the client computer system.
    Type: Grant
    Filed: February 24, 1999
    Date of Patent: May 25, 2004
    Assignee: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Richard Alan Dayan, Dhruv M. Desai, Brandon Jon Ellison, Eric Richard Kern, Randall Scott Springfield
  • Patent number: 6718464
    Abstract: A method and system are disclosed for dynamically loading selected BIOS modules and settings from a server computer system to a client computer system according to an identity of a user who is currently utilizing the client computer system. The client computer system is coupled to a server computer system via a network. Selected BIOS modules and settings are associated with a particular user. These BIOS modules and settings are those preferred by the particular user to use in order to customize the client computer system when the client computer system is used by the particular user. The associations among the particular user and the selected BIOS modules and settings are stored in the server computer system. The selected BIOS modules and settings are downloaded from the server computer system to the client computer system when the particular user causes the client computer system to start booting, i.e. when the particular user is the current user.
    Type: Grant
    Filed: January 23, 2001
    Date of Patent: April 6, 2004
    Assignee: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Eric Richard Kern, Howard Jeffrey Locker, David Rhoades, James Peter Ward
  • Patent number: 6701349
    Abstract: A data processing system and method are disclosed for prohibiting an unauthorized user from modifying a priority level associated with a client computer system. The priority level is utilized by a client computer system during transmission of the client's data over a network. One of a plurality of priority levels is associated with the client computer system. The plurality of priority levels includes a higher priority level and a lower priority level. The client computer system associates the priority level with the data transmitted by the client computer system over the network. The data associated with the higher priority level is typically transmitted prior to data associated with the lower priority level. In response to an attempt to modify the associated priority level, the client determines whether the attempt is being made by an approved user. In response to a determination that the attempt is not being made by an approved user, the attempted modification of the priority level is prohibited.
    Type: Grant
    Filed: July 16, 1999
    Date of Patent: March 2, 2004
    Assignee: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Brandon Jon Ellison, Eric Richard Kern, Howard Jeffery Locker, Andy Lloyd Trotter, James Peter Ward
  • Patent number: 6687744
    Abstract: A data processing system and method are described for permitting a server computer system to function as a remote keyboard input device for a client computer system prior to the client computer system completing its boot process. The client computer system is coupled to the server computer system utilizing a network. Each keystroke entered into the server computer system is captured by the server. A scan code associated with each captured keystroke is transmitted to the client computer system utilizing the server computer system via the network. The scan code associated with each keystroke is executed utilizing the client computer system. The server computer system functions as a remote keyboard input device for the client computer system.
    Type: Grant
    Filed: May 2, 2000
    Date of Patent: February 3, 2004
    Assignee: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Richard Alan Dayan, Brandon Jon Ellison, Robert Duane Johnson, Eric Richard Kern, Randall Scott Springfield
  • Publication number: 20040006700
    Abstract: The disclosed methods enable users to securably modify system attributes of completed computer systems, without requiring that the system be returned to their manufacturer or that the system be “overhauled.” The methods of the present invention permit manufacturing cost savings and efficiencies, while allowing existing built inventory to be modified to meet current market demands without the need to recall built systems back to the origin of manufacture.
    Type: Application
    Filed: June 26, 2002
    Publication date: January 8, 2004
    Applicant: International Business Machines Corporation
    Inventors: Joseph Wayne Freeman, Chad Lee Gettelfinger, Steven Dale Goodman, William Fred Keown, Eric Richard Kern, Randall Scott Springfield
  • Publication number: 20030202514
    Abstract: In a computer network including a plurality of interconnected computers, one of the computers being a sleeping computer in a power down state, the sleeping computer listening for a packet associated with the sleeping computer, a method and system of waking the sleeping computer from the computer network. An incoming packet of data is transmitted from one of the computers in the network to the sleeping computer. When the sleeping computer detects the incoming packet, it determines if the incoming packet contains a data sequence associated with the sleeping computer. Further, the sleeping computer compares a transit value in the incoming packet to a predetermined value stored at the sleeping computer. The transit value indicates how far the data packet has traveled through the network, indicating the approximate origin of the data packet. Knowing the approximate origin of the data packet allows the client system to identify if the data packet originated from an external network.
    Type: Application
    Filed: April 29, 2002
    Publication date: October 30, 2003
    Applicant: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Joseph Wayne Freeman, Chad Lee Gettelfinger, Steven Dale Goodman, Eric Richard Kern, Randall Scott Springfield
  • Publication number: 20030204746
    Abstract: In a computer network including a plurality of interconnected computers, one of the computers being a sleeping computer in a power down state, the sleeping computer listening for a packet associated with the sleeping computer, a method of waking the sleeping computer from the computer network. An incoming packet of data is transmitted from an administration system in the network to the sleeping computer. When the sleeping computer detects the incoming packet, it determines if the incoming packet contains a data sequence associated with the sleeping computer. If the incoming packet matches the particular data sequence associated with the sleeping computer, the sleeping computer transmits a reply message to the administration system. Upon receiving the reply, the administration system modifies the reply message in a predetermined manner and transmits the modified reply to the sleeping computer.
    Type: Application
    Filed: April 29, 2002
    Publication date: October 30, 2003
    Applicant: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Joseph Wayne Freeman, Chad Lee Gettelfinger, Steven Dale Goodman, Eric Richard Kern, Randall Scott Springfield
  • Publication number: 20030204754
    Abstract: A designated user of a computer system is allowed to conceal from access portions of information stored on a hard disk drive or comparable storage device. The program instructions which initiate operation of the computer system, sometimes also known as BIOS code, enable a designated user or an administrator to declare certain portions of information normally stored accessibly to the system to be concealed, hidden, or invisible to a technical support person having a lesser level of access. Certain partitions are made inaccessible to any operator lacking the password of a designated user or administrator. Instead, a separate password is provided which enables initiation of operation of the system for maintenance purposes using only partitions which are open or unconcealed.
    Type: Application
    Filed: April 26, 2002
    Publication date: October 30, 2003
    Applicant: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Richard Alan Dayan, Joseph Wayne Freeman, Steven Dale Goodman, Eric Richard Kern, Randall Scott Springfield