Patents by Inventor Rod Waltermann

Rod Waltermann has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080091874
    Abstract: A method for booting into computer memory a non-operating system (O.S.) program from a hard disk drive (HDD) prior to booting into memory an O.S. from the HDD. The method includes establishing a table of contents (TOC) on the HDD that contains entries for special O.S. programs. A pointer to the TOC is placed in non-volatile memory of the computer that is associated with the HDD, and when BIOS of the computer is prompted to load into memory one of the special O.S. programs, the pointer is accessed and used to locate the TOC, which in turn is accessed to load the special O.S. program.
    Type: Application
    Filed: December 12, 2007
    Publication date: April 17, 2008
    Inventors: Rod Waltermann, Nathan Peterson, Joseph Freeman, Randall Springfield, Mark Davis, Steven Goodman, Isaac Kareel, Scott Kelso
  • Publication number: 20080046781
    Abstract: In the event of a virally infected MBR on a hard disk drive that might prevent booting, a service MBR in a hidden protected area (HPA) can be used to boot a service O.S., and then the service MBR can be replaced with a previously backed-up MBR, also in the HPA, to mount any missing partitions.
    Type: Application
    Filed: March 29, 2006
    Publication date: February 21, 2008
    Inventors: Philip Childs, Mark Davis, Steven Goodman, Joseph Freeman, Randall Springfield, Rod Waltermann
  • Publication number: 20070255790
    Abstract: The present invention relates to a method and system for providing an option when sending an email which will require the recipient of the email to provide an extra level of authentication before displaying the email contents in order to prove that he or she is indeed the correct recipient of the email. Validation is required by the recipient every time he or she opens an email. This validation occurs in the form of authentication that the user is indeed the intended recipient of the email, and can be provided in various means, including biometric identification, password phrases, and so forth.
    Type: Application
    Filed: April 29, 2006
    Publication date: November 1, 2007
    Inventors: Arnold Weksler, Scott Kelso, John Mese, Nathan Peterson, Rod Waltermann
  • Publication number: 20070244708
    Abstract: Hacking a rental computer to use it beyond purchased rental time is prevented by plugging a time card with internal counter into a DIMM socket of the motherboard and encrypting the register locations of the time card with the private key of the motherboard to bind the time card to the motherboard. Thus, if the time card is not detected at boot or if it is removed during operation the computer is disabled. The counter counts down the rented time period as it receives clocking signals, and at the elapse of the purchased period disables the computer.
    Type: Application
    Filed: April 13, 2006
    Publication date: October 18, 2007
    Inventors: Howard Locker, Daryl Cromer, Randall Springfield, Rod Waltermann
  • Publication number: 20070239996
    Abstract: Serial presence data in the EEPROM of a DIMM is encrypted with the private key of the motherboard with which the DIMM is intended to be used, so that only BIOS of the intended motherboard can decrypt the SPD to complete booting.
    Type: Application
    Filed: March 20, 2006
    Publication date: October 11, 2007
    Inventors: Daryl Cromer, Howard Locker, Randall Springfield, Rod Waltermann
  • Publication number: 20070240149
    Abstract: A hypervisor-based system and method for downloading device driver updates that prevents confusion on the part of the driver update software as to which driver, physical or virtual, is being updated.
    Type: Application
    Filed: March 29, 2006
    Publication date: October 11, 2007
    Inventors: Daryl Cromer, Scott Kelso, Howard Locker, John Mese, Nathan Peterson, Randall Springfield, Rod Waltermann, Arnold Weksler
  • Publication number: 20070240153
    Abstract: A system and method for installing a type-1 hypervisor onto a secondary storage of a computer while a user operating system is already installed and executing in main memory.
    Type: Application
    Filed: March 29, 2006
    Publication date: October 11, 2007
    Inventors: Daryl Cromer, Scott Kelso, Howard Locker, John Mese, Nathan Peterson, Randall Springfield, Rod Waltermann, Arnold Weksler
  • Publication number: 20070234073
    Abstract: A system, method, and computer readable medium are disclosed. The method includes automatically generating a set of security data. The security data is stored in non-volatile memory. The set of security data is also programmed into the data storage device as a security code.
    Type: Application
    Filed: March 31, 2006
    Publication date: October 4, 2007
    Applicant: Lenovo (Singapore) Pte. Ltd.
    Inventors: Daryl Cromer, Howard Locker, Randall Springfield, Rod Waltermann
  • Publication number: 20070234092
    Abstract: An apparatus, system, and method are disclosed for selecting a waking process. An input module receives a specified input during the off state of a data processing device. In addition, the input module stores the input in the storage module. The storage module may be integrated within the input module. The input module activates the data processing device in response to the input. A wake module retrieves the input from the storage module. In addition, the wake module determines a process that corresponds to the input. The wake module wakes the data processing device using the process.
    Type: Application
    Filed: March 28, 2006
    Publication date: October 4, 2007
    Inventors: Joseph Freeman, Randall Springfield, Rod Waltermann
  • Publication number: 20070234348
    Abstract: Computer implemented method, system and computer program product for controlling software entitlement. A computer implemented method for controlling software entitlement includes receiving a request to install a software item on a designated machine. A determination is made if the designated machine is of a machine type authorized for installation of the software item. If the designated machine is of a machine type authorized for installation of the software item, a determination is made, using stored configuration data, if at least one additional criterion specified for entitlement to install the software item on the designated machine is satisfied using stored configuration data. If the at least one additional criterion specified for entitlement to install the software item on the designated machine is satisfied, installation of the software item on the designated machine is enabled in accordance with the at least one additional criterion.
    Type: Application
    Filed: March 31, 2006
    Publication date: October 4, 2007
    Applicant: Lenovo (Singapore) Pte. Ltd.
    Inventors: Scott Kelso, Masahiko Nomura, David Sawin, Randall Springfield, Rod Waltermann
  • Publication number: 20070226711
    Abstract: A method for preventing malicious software from execution within a computer system is disclosed. Before any actual execution of an application program on a computer system, the application program needs to be cross-compiled to yield a set of cross-compiled code of the application program. The set of cross-compiled code of the application program can then be executed in an execution module that is capable of recognizing and translating the set of cross-compiled code of the application program to the actual machine code of the processor.
    Type: Application
    Filed: February 14, 2006
    Publication date: September 27, 2007
    Inventors: David Challener, Mark Davis, Peter Hortensius, Rod Waltermann
  • Publication number: 20070214233
    Abstract: A method, system, and computer-usable medium for implementing a cluster network including a collection of clients that further include a client operating system and a server operating system, wherein the server operating system caches data retrieved from the cluster network from prior successful access to the cluster network, removing at least one client among the collection of clients from the cluster network, and in response to detecting the removal of at least one client from the cluster network, intercepting and re-routing at least one request targeted to the cluster network to the server operating system, wherein the server operating system emulates the cluster network by providing at least one response to the at least one request from the at least one client to the cluster network utilizing the cached data.
    Type: Application
    Filed: March 7, 2006
    Publication date: September 13, 2007
    Inventors: Daryl Cromer, Howard Locker, Randall Springfield, Rod Waltermann
  • Publication number: 20070192620
    Abstract: A method for preventing malicious software from execution within a computer system is disclosed. A permutation is performed on a subset of instructions within an application program to yield a permuted sequence of instructions before any actual execution of the application program on the computer system. A permutation sequence number of the permuted sequence of instructions is stored in a permuted instruction pointer table. The permuted sequence of instructions is executed in an execution module that is capable of translating the permuted sequence of instructions to an actual machine code of a processor within the computer system according to the permutation sequence number of the permuted sequence of instructions stored in the permuted instruction pointer table.
    Type: Application
    Filed: February 14, 2006
    Publication date: August 16, 2007
    Inventors: David Challener, Mark Davis, Peter Hortensius, Rod Waltermann
  • Publication number: 20070156836
    Abstract: A system and method that validates the identity of an instant messaging session user is provided. An instant messaging session is established between two instant messaging applications running on two different computers connected through a computer network. After the instant messaging session has been established, one of the users requests identity authentication of the other user. The other user supplies the requested identity authentication data, such as a password. The identity authentication data is verified and, if the identity authentication data is successfully verified, a secure message is displayed.
    Type: Application
    Filed: January 5, 2006
    Publication date: July 5, 2007
    Inventors: Scott Kelso, John Mese, Nathan Peterson, Rod Waltermann, Arnold Weksler
  • Publication number: 20070136810
    Abstract: A method is provided for detecting viruses. According to the method, data is stored in a journal area of memory before changes embodied in the data are written to virtual memory. At least a first portion of the data in the journal area of memory is scanned for viruses. In some embodiments, a second portion of data that immediately precedes and/or immediately follows data to which the first portion of the data pertains is scanned for viruses. Preferably, the virtual memory includes a persistent storage device. Also provided is a system that includes a processor, a memory that includes virtual memory and a journal storage area, and a virus scanner controlled by the processor. The virus scanner scans the journal storage area for viruses.
    Type: Application
    Filed: December 7, 2005
    Publication date: June 14, 2007
    Applicant: Lenovo (Singapore) Pte. Ltd.
    Inventors: Rod Waltermann, John Mese, Scott Kelso, Mark Davis, Arnold Weksler, Nathan Peterson
  • Publication number: 20070130149
    Abstract: The present invention provides a client and server tool that interrogates file sharing attributes of a client/server system from both the client side and the server side. These attributes may include software fireballs, sharing policies, and security attributes. By interrogating the file sharing attributes from both the client and server sides, network access problems emanating from entire side (client and server) can be discovered, and automated solutions can be presented to rectify any problems.
    Type: Application
    Filed: October 12, 2005
    Publication date: June 7, 2007
    Applicant: Lenovo (Singapore) Pte. Ltd.
    Inventors: Scott Kelso, John Mese, Nathan Peterson, Rod Waltermann, Arnold Weksler
  • Publication number: 20070113045
    Abstract: When data changes in LBAs of a disk storage, the IDs of changed LBAs are written to a cache, with the LBAs being hashed to render a hash result. The hash result and contents of the cache are written to a file on the disk, the cache flushed, and the hash result written back to the cache for hashing together with subsequent changed LBAs. The process repeats. In this way, the hash result in the most current file on the disk can be compared with the hash result in cache, and if the two match, it indicates that the files on the disk contain an accurate record of changed LBAs.
    Type: Application
    Filed: November 16, 2005
    Publication date: May 17, 2007
    Inventors: David Challener, Rod Waltermann
  • Publication number: 20070101019
    Abstract: An apparatus, system, and method are disclosed for managing response latency. An identification module identifies a computation module that may communicate with a client through one or more communication modules. A calculation module calculates the number of communication modules that transceive a packet between the computation module and the client as a hop count. An association module associates the client with the first computation module in response to the hop count satisfying a count range of a response policy. In one embodiment, a trouble ticket module generates a trouble ticket in response to a specified number of clients having a hop count greater than the count range.
    Type: Application
    Filed: November 3, 2005
    Publication date: May 3, 2007
    Inventors: Daryl Cromer, Howard Locker, Randall Springfield, Rod Waltermann
  • Publication number: 20070101001
    Abstract: An apparatus, system, and method are disclosed for reassigning a client. A selection module selects a second computation module that is hardware compatible with a first computation module. A suspension module suspends a software process for a client executing on the first computation module. An execution state module copies a computation module execution state of the first computation module to the second computation module. A memory map module copies a memory map of a software process image associated with the software process and stored in a first storage system from the first computation module to the second computation module. In one embodiment, a resumption module resumes the software process executing on the second computation module.
    Type: Application
    Filed: November 3, 2005
    Publication date: May 3, 2007
    Inventors: Daryl Cromer, Howard Locker, Randall Springfield, Rod Waltermann
  • Publication number: 20070028231
    Abstract: A system and method is provided to track events related to shortcuts. These events include moving shortcuts from one location (menu) to another location (menu), renaming a folder in which a shortcut resides, and changing the name of a shortcut. Changes related to shortcuts generate operating system events. The system and method includes a process that is registered with the operating system in order to receive data regarding events that relate to shortcut changes. When a shortcut event is received by the process, the process updates applicable configuration files and references. Installation scripts are automatically updated so that the uninstall process (when eventually executed) can locate all shortcuts that pertain to the application and remove the shortcuts along with the uninstalled application.
    Type: Application
    Filed: August 1, 2005
    Publication date: February 1, 2007
    Applicant: International Business Machines Corporation
    Inventors: Scott Kelso, John Mese, Nathan Peterson, Rod Waltermann, Arnold Weksler