1
Ashileshwari N Chandra, Liam D Comerford, Steve R White: Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor. International Business Machines, Pollock Vande Sande & Priddy, March 28, 1989: US04817140 (371 worldwide citation)

The invention provides a software asset protection mechanism which is based on the separation of the software to be protected from the right to execute that software. Protected software can only be executed on composite computing systems in which a physically and logically secure coprocessor is asso ...


2
Daniel Coffman, Liam D Comerford, Steven DeGennaro, Edward A Epstein, Ponani Gopalakrishnan, Stephane H Maes, David Nahamoo: Conversational computing via conversational virtual machine. International Business Machines Corporation, F Chau & Associates, Frank V DeRosa, November 14, 2006: US07137126 (314 worldwide citation)

A conversational computing system that provides a universal coordinated multi-modal conversational user interface (CUI) (10) across a plurality of conversationally aware applications (11) (i.e., applications that “speak” conversational protocols) and conventional applications (12). The conversationa ...


3
Liam D Comerford, Steve R White: Manipulating rights-to-execute in connection with a software copy protection mechanism. International Business Machines Corporation, Pollock Vande Sande & Priddy, April 28, 1992: US05109413 (278 worldwide citation)

A software asset protection mechanism segregates the right to execute software from the software itself. The rights to execute, when installed on a composite computing system, are stored in a coprocessor element of the composite computing system. The software asset protection mechanism is enhanced a ...


4
Daniel Coffman, Liam D Comerford, Steven DeGennaro, Edward A Epstein, Ponani Gopalakrishnan, Stephane H Maes, David Nahamoo: Conversational computing via conversational virtual machine. International Business Machines Corporation, June 1, 2010: US07729916 (209 worldwide citation)

A conversational computing system that provides a universal coordinated multi-modal conversational user interface (CUI) 10 across a plurality of conversationally aware applications (11) (i.e., applications that “speak” conversational protocols) and conventional applications (12). The conversationall ...


5
Daniel Coffman, Liam D Comerford, Steven DeGennaro, Edward A Epstein, Ponani Gopalakrishnan, Stephane H Maes, David Nahamoo: Conversational computing via conversational virtual machine. International Business Machines Corporation, F Chau & Associates, Anne V Dougherty Esq, December 20, 2011: US08082153 (202 worldwide citation)

A method for conversational computing includes executing code embodying a conversational virtual machine, registering a plurality of input/output resources with a conversational kernel, providing an interface between a plurality of active applications and the conversational kernel processing input/o ...


6
Liam D Comerford, Steve R White: Hardware key-on-disk system for copy-protecting magnetic storage media. International Business Machines Corporation, Jack M Arnold, March 18, 1986: US04577289 (201 worldwide citation)

A copy-protection scheme is implemented for software which may be stored on a magnetic storage medium such as a disk. The medium is comprised of sections which are divided into subsections, with an original having indicia on at least one subsection of at least one section that is not modifiable by t ...


7
Liam D Comerford, Peter G Ledermann, Lawrence I Levy, Steve R White: Tamper resistant packaging for information protection in electronic circuitry. International Business Machines, Pollock Vande Sande & Priddy, May 26, 1992: US05117457 (199 worldwide citation)

A tamper-resistant package for protecting information stored in electronic circuitry is described. An energy source provides energy (electrical current, optical energy, microwave energy or RF energy, for example) within a region occupied by the circuitry to be protected. The energy is applied to an ...


8
Akhileshwari N Chandra, Liam D Comerford, Steve R White: Implementing a shared higher level of privilege on personal computers for copy protection of software. International Business Machines Corporation, Jack M Arnold, February 17, 1987: US04644493 (188 worldwide citation)

Method and apparatus which restricts software, distributed on magnetic media, to use on a single computing machine. The original medium is functionally uncopyable, until it is modified by the execution of a program stored in a tamper proof co-processor which forms a part of the computing machine. Th ...


9
Liam D Comerford, Hamed A Ellozy, Frederick Jelinek, Stephen E Levy, David Nahamoo: Method and apparatus for improving the paper interface to computing systems. International Business Machines, Pollock Vande Sande & Priddy, September 7, 1993: US05243149 (149 worldwide citation)

The novel notepad of the invention provides a convenient interface into the capabilities of computer technology from paper based information. The notepad has a form factor similar to a clipboard wherein the board portion includes a digitizing tablet and the clip portion includes an optical scanner. ...


10
Akhileshwari N Chandra, Liam D Comerford, Steve R White: Remote access terminal security. International Business Machines, Pollock Vande Sande & Priddy, April 10, 1990: US04916738 (146 worldwide citation)

The invention provides a method of securing remote terminal access to a central computer. The method uses the services of a physically secure coprocessor which is, or will be, coupled to the remote terminal for the purposes of effecting remote access to the central computer. The method comprises tra ...