Patents by Inventor Roger Kenneth Abrams
Roger Kenneth Abrams has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8165927Abstract: Processing purchasing items is provided. A broadcast television signal is received at a television system. The broadcast television signal contains data indicating that an item in the broadcast television signal is being offered for sale. A visual cue is presented in association with the item being presented in the television system in response to receiving the data. In response to receiving a user input to purchase the item, a purchase request process is sent to a seller of the item to purchase the item using personal information needed to purchase the item stored in the television system.Type: GrantFiled: December 10, 2007Date of Patent: April 24, 2012Assignee: International Business Machines CorporationInventors: Roger Kenneth Abrams, Robert Thomas Cato, Jeff David Thomas
-
Patent number: 7793349Abstract: Disclosed as a system and method for providing enhanced security to processes running on a data processing system. The disclosed system and method selectively revokes execute privileges from memory pages being used for stacks of susceptible processes running on the data processing system. By selectively resetting execute privileges on a per page and per process basis, the system and method maintains system performance and provides enhanced security to processes running on the data processing system.Type: GrantFiled: January 24, 2008Date of Patent: September 7, 2010Assignee: International Business Machines CorporationInventor: Roger Kenneth Abrams
-
Patent number: 7743406Abstract: A system and method for securing data on a wireless device. A secured zone is defined by a boundary sensor. A data processing system is coupled to the boundary sensor and a wireless device. If the data processing system detects that the signal strength of the wireless device has fallen below a first predetermined value for longer than a second predetermined value, the data processing system deletes a digital certificate corresponding to the wireless device from memory. Thus, when the wireless device is reintroduced into the secured zone, in response to determining that a digital certificate corresponding to the wireless device is not stored in memory, the disabling module disables the wireless device from operation within the secured zone.Type: GrantFiled: December 21, 2004Date of Patent: June 22, 2010Assignee: International Business Machines CorporationInventors: Scott Sina Abedi, Roger Kenneth Abrams, Ryan Charles Catherman, James Patrick Hoff, James Stephen Rutledge
-
Publication number: 20090150257Abstract: A computer implemented method, apparatus, and computer usable program code for processing purchasing items. A broadcast television signal is received at a television system. The broadcast television signal contains data indicating that an item in the broadcast television signal is being offered for sale. A visual cue is presented in association with the item being presented in the television system in response to receiving the data. In response to receiving a user input to purchase the item, a purchase request process is sent to a seller of the item to purchase the item using personal information needed to purchase the item stored in the television system.Type: ApplicationFiled: December 10, 2007Publication date: June 11, 2009Applicant: International Business Machines CorporationInventors: Roger Kenneth Abrams, Robert Thomas Cato, Jeff David Thomas
-
Publication number: 20080155692Abstract: Disclosed as a system and method for providing enhanced security to processes running on a data processing system. The disclosed system and method selectively revokes execute privileges from memory pages being used for stacks of susceptible processes running on the data processing system. By selectively resetting execute privileges on a per page and per process basis, the system and method maintains system performance and provides enhanced security to processes running on the data processing system.Type: ApplicationFiled: January 24, 2008Publication date: June 26, 2008Applicant: International Business Machines CorporationInventor: Roger Kenneth Abrams
-
Patent number: 7386886Abstract: Disclosed as a system and method for providing enhanced security to processes running on a data processing system. The disclosed system and method selectively revokes execute privileges from memory pages being used for stacks of susceptible processes running on the data processing system. By selectively resetting execute privileges on a per page and per process basis, the system and method maintains system performance and provides enhanced security to processes running on the data processing system.Type: GrantFiled: November 8, 2000Date of Patent: June 10, 2008Assignee: International Business Machines CorporationInventor: Roger Kenneth Abrams
-
Patent number: 7240299Abstract: A two part method for improving the usage of a pointing device by a physically impaired user is disclosed. A first method is provided for learning how a user moves the pointing device by acquiring motion data for a user and generating motion vectors corresponding to when the user moves from source point icons to destination point icons. A second method of combining the learned user motion data with an application program where the user navigates the pointing device to select program icons on a graphical user interface (GUI) screen is provided. The method determines when the actual motion vector is similar to a previously acquired motion vector with a similar source point. The method predicts a destination point icon and highlights and locks the prediction icon until the user either actuates the iconor generates motion vectors that indicate that another destination point icon is the more likely destination.Type: GrantFiled: April 26, 2001Date of Patent: July 3, 2007Assignee: International Business Machines CorporationInventor: Roger Kenneth Abrams
-
Patent number: 7178165Abstract: A method, system and computer program product for preventing at least in part a hacker from performing unwanted activities such as in a file system. A security layer may be added in the kernel space configured to determine whether a request to provide a service from a particular user was received from user space or kernel space. If the request was received from user space, then the user is an unauthenticated user. That is, the user may be a potential hacker. Subsequently, the security layer may determine whether the request satisfies requirements for unauthenticated requests. If the request was received from a secure connection manager in kernel space then the user may be treated as an authenticated user. The secure connection manager may be configured to establish a secure authorized connection with an authenticated user. Subsequently, the security layer may determine whether the request satisfies requirements for authenticated requests.Type: GrantFiled: August 20, 2001Date of Patent: February 13, 2007Assignee: Lenovo (Signapore) Pte Ltd.Inventor: Roger Kenneth Abrams
-
Publication number: 20030204745Abstract: A method and system for protecting a processing system from a buffer overflow attack are described. More particularly, embodiments of the present invention provide a plurality of local variables in a memory structure and provide a return address within the memory structure. The return address is at a lower address than the plurality of local variables to prevent the return address from being overwritten during a buffer overflow attack.Type: ApplicationFiled: April 29, 2002Publication date: October 30, 2003Applicant: International Business Machines CorporationInventor: Roger Kenneth Abrams
-
Publication number: 20030200385Abstract: A method and apparatus for increasing disk drive performance in a disk drive system are described. Embodiments of the present invention provide a method including the steps of providing a disk drive and a nonvolatile memory (NVM) as an integral part of the disk drive. Particular data can be selected and stored in the NVM. Such data can be file system or database metadata for example. According to the method and system disclosed herein, the present invention increases the speeds at which data is written and read to magnetic media. Drive performance is achieved while maintaining reliability.Type: ApplicationFiled: April 18, 2002Publication date: October 23, 2003Inventor: Roger Kenneth Abrams
-
Publication number: 20030037252Abstract: A method, system and computer program product for preventing at least in part a hacker from performing unwanted activities such as in a file system. A security layer may be added in the kernel space configured to determine whether a request to provide a service from a particular user was received from user space or kernel space. If the request was received from user space, then the user is an unauthenticated user. That is, the user may be a potential hacker. Subsequently, the security layer may determine whether the request satisfies requirements for unauthenticated requests. If the request was received from a secure connection manager in kernel space then the user may be treated as an authenticated user. The secure connection manager may be configured to establish a secure authorized connection with an authenticated user. Subsequently, the security layer may determine whether the request satisfies requirements for authenticated requests.Type: ApplicationFiled: August 20, 2001Publication date: February 20, 2003Applicant: International Business Machines CorporationInventor: Roger Kenneth Abrams
-
Publication number: 20020158920Abstract: A two part method for improving the usage of a pointing device by a physically impaired user is disclosed. A first method is provided for learning how a user moves the pointing device by acquiring motion data for a user and generating motion vectors corresponding to when the user moves from source point icons to destination point icons. A second method of combining the learned user motion data with an application program where the user navigates the pointing device to select program icons on a graphical user interface (GUI) screen is provided. The method determines when the actual motion vector is similar to a previously acquired motion vector with a similar source point. The method predicts a destination point icon and highlights and locks the prediction icon until the user either actuates the iconor generates motion vectors that indicate that another destination point icon is the more likely destination.Type: ApplicationFiled: April 26, 2001Publication date: October 31, 2002Applicant: International Business Machines CorporationInventor: Roger Kenneth Abrams