Patents by Inventor Roger Kenneth Abrams

Roger Kenneth Abrams has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8165927
    Abstract: Processing purchasing items is provided. A broadcast television signal is received at a television system. The broadcast television signal contains data indicating that an item in the broadcast television signal is being offered for sale. A visual cue is presented in association with the item being presented in the television system in response to receiving the data. In response to receiving a user input to purchase the item, a purchase request process is sent to a seller of the item to purchase the item using personal information needed to purchase the item stored in the television system.
    Type: Grant
    Filed: December 10, 2007
    Date of Patent: April 24, 2012
    Assignee: International Business Machines Corporation
    Inventors: Roger Kenneth Abrams, Robert Thomas Cato, Jeff David Thomas
  • Patent number: 7793349
    Abstract: Disclosed as a system and method for providing enhanced security to processes running on a data processing system. The disclosed system and method selectively revokes execute privileges from memory pages being used for stacks of susceptible processes running on the data processing system. By selectively resetting execute privileges on a per page and per process basis, the system and method maintains system performance and provides enhanced security to processes running on the data processing system.
    Type: Grant
    Filed: January 24, 2008
    Date of Patent: September 7, 2010
    Assignee: International Business Machines Corporation
    Inventor: Roger Kenneth Abrams
  • Patent number: 7743406
    Abstract: A system and method for securing data on a wireless device. A secured zone is defined by a boundary sensor. A data processing system is coupled to the boundary sensor and a wireless device. If the data processing system detects that the signal strength of the wireless device has fallen below a first predetermined value for longer than a second predetermined value, the data processing system deletes a digital certificate corresponding to the wireless device from memory. Thus, when the wireless device is reintroduced into the secured zone, in response to determining that a digital certificate corresponding to the wireless device is not stored in memory, the disabling module disables the wireless device from operation within the secured zone.
    Type: Grant
    Filed: December 21, 2004
    Date of Patent: June 22, 2010
    Assignee: International Business Machines Corporation
    Inventors: Scott Sina Abedi, Roger Kenneth Abrams, Ryan Charles Catherman, James Patrick Hoff, James Stephen Rutledge
  • Publication number: 20090150257
    Abstract: A computer implemented method, apparatus, and computer usable program code for processing purchasing items. A broadcast television signal is received at a television system. The broadcast television signal contains data indicating that an item in the broadcast television signal is being offered for sale. A visual cue is presented in association with the item being presented in the television system in response to receiving the data. In response to receiving a user input to purchase the item, a purchase request process is sent to a seller of the item to purchase the item using personal information needed to purchase the item stored in the television system.
    Type: Application
    Filed: December 10, 2007
    Publication date: June 11, 2009
    Applicant: International Business Machines Corporation
    Inventors: Roger Kenneth Abrams, Robert Thomas Cato, Jeff David Thomas
  • Publication number: 20080155692
    Abstract: Disclosed as a system and method for providing enhanced security to processes running on a data processing system. The disclosed system and method selectively revokes execute privileges from memory pages being used for stacks of susceptible processes running on the data processing system. By selectively resetting execute privileges on a per page and per process basis, the system and method maintains system performance and provides enhanced security to processes running on the data processing system.
    Type: Application
    Filed: January 24, 2008
    Publication date: June 26, 2008
    Applicant: International Business Machines Corporation
    Inventor: Roger Kenneth Abrams
  • Patent number: 7386886
    Abstract: Disclosed as a system and method for providing enhanced security to processes running on a data processing system. The disclosed system and method selectively revokes execute privileges from memory pages being used for stacks of susceptible processes running on the data processing system. By selectively resetting execute privileges on a per page and per process basis, the system and method maintains system performance and provides enhanced security to processes running on the data processing system.
    Type: Grant
    Filed: November 8, 2000
    Date of Patent: June 10, 2008
    Assignee: International Business Machines Corporation
    Inventor: Roger Kenneth Abrams
  • Patent number: 7240299
    Abstract: A two part method for improving the usage of a pointing device by a physically impaired user is disclosed. A first method is provided for learning how a user moves the pointing device by acquiring motion data for a user and generating motion vectors corresponding to when the user moves from source point icons to destination point icons. A second method of combining the learned user motion data with an application program where the user navigates the pointing device to select program icons on a graphical user interface (GUI) screen is provided. The method determines when the actual motion vector is similar to a previously acquired motion vector with a similar source point. The method predicts a destination point icon and highlights and locks the prediction icon until the user either actuates the iconor generates motion vectors that indicate that another destination point icon is the more likely destination.
    Type: Grant
    Filed: April 26, 2001
    Date of Patent: July 3, 2007
    Assignee: International Business Machines Corporation
    Inventor: Roger Kenneth Abrams
  • Patent number: 7178165
    Abstract: A method, system and computer program product for preventing at least in part a hacker from performing unwanted activities such as in a file system. A security layer may be added in the kernel space configured to determine whether a request to provide a service from a particular user was received from user space or kernel space. If the request was received from user space, then the user is an unauthenticated user. That is, the user may be a potential hacker. Subsequently, the security layer may determine whether the request satisfies requirements for unauthenticated requests. If the request was received from a secure connection manager in kernel space then the user may be treated as an authenticated user. The secure connection manager may be configured to establish a secure authorized connection with an authenticated user. Subsequently, the security layer may determine whether the request satisfies requirements for authenticated requests.
    Type: Grant
    Filed: August 20, 2001
    Date of Patent: February 13, 2007
    Assignee: Lenovo (Signapore) Pte Ltd.
    Inventor: Roger Kenneth Abrams
  • Publication number: 20030204745
    Abstract: A method and system for protecting a processing system from a buffer overflow attack are described. More particularly, embodiments of the present invention provide a plurality of local variables in a memory structure and provide a return address within the memory structure. The return address is at a lower address than the plurality of local variables to prevent the return address from being overwritten during a buffer overflow attack.
    Type: Application
    Filed: April 29, 2002
    Publication date: October 30, 2003
    Applicant: International Business Machines Corporation
    Inventor: Roger Kenneth Abrams
  • Publication number: 20030200385
    Abstract: A method and apparatus for increasing disk drive performance in a disk drive system are described. Embodiments of the present invention provide a method including the steps of providing a disk drive and a nonvolatile memory (NVM) as an integral part of the disk drive. Particular data can be selected and stored in the NVM. Such data can be file system or database metadata for example. According to the method and system disclosed herein, the present invention increases the speeds at which data is written and read to magnetic media. Drive performance is achieved while maintaining reliability.
    Type: Application
    Filed: April 18, 2002
    Publication date: October 23, 2003
    Inventor: Roger Kenneth Abrams
  • Publication number: 20030037252
    Abstract: A method, system and computer program product for preventing at least in part a hacker from performing unwanted activities such as in a file system. A security layer may be added in the kernel space configured to determine whether a request to provide a service from a particular user was received from user space or kernel space. If the request was received from user space, then the user is an unauthenticated user. That is, the user may be a potential hacker. Subsequently, the security layer may determine whether the request satisfies requirements for unauthenticated requests. If the request was received from a secure connection manager in kernel space then the user may be treated as an authenticated user. The secure connection manager may be configured to establish a secure authorized connection with an authenticated user. Subsequently, the security layer may determine whether the request satisfies requirements for authenticated requests.
    Type: Application
    Filed: August 20, 2001
    Publication date: February 20, 2003
    Applicant: International Business Machines Corporation
    Inventor: Roger Kenneth Abrams
  • Publication number: 20020158920
    Abstract: A two part method for improving the usage of a pointing device by a physically impaired user is disclosed. A first method is provided for learning how a user moves the pointing device by acquiring motion data for a user and generating motion vectors corresponding to when the user moves from source point icons to destination point icons. A second method of combining the learned user motion data with an application program where the user navigates the pointing device to select program icons on a graphical user interface (GUI) screen is provided. The method determines when the actual motion vector is similar to a previously acquired motion vector with a similar source point. The method predicts a destination point icon and highlights and locks the prediction icon until the user either actuates the iconor generates motion vectors that indicate that another destination point icon is the more likely destination.
    Type: Application
    Filed: April 26, 2001
    Publication date: October 31, 2002
    Applicant: International Business Machines Corporation
    Inventor: Roger Kenneth Abrams