Patents by Inventor James O'Connor

James O'Connor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9834710
    Abstract: The present invention encompasses polyurethane adhesive compositions comprising aliphatic polycarbonate chains. In one aspect, the present invention encompasses polyurethane adhesives derived from aliphatic polycarbonate polyols and polyisocyanates wherein the polyol chains contain a primary repeating unit having a structure:. In another aspect, the invention provides articles comprising the inventive polyurethane compositions as well as methods of making such compositions.
    Type: Grant
    Filed: April 16, 2013
    Date of Patent: December 5, 2017
    Assignee: Saudi Aramco Technologies Company
    Inventors: Scott D. Allen, Vahid Sendijarevic, James O'Connor
  • Patent number: 9823967
    Abstract: A data storage system includes a plurality of storage devices forming a storage array for storing data and associated error correction codes and a controller coupled to the plurality of storage devices. The controller is configured to, responsive to an error in a data element among the data, rebuild the data element from other data elements and an error correction code in the storage array and overwrite the error correction code with the rebuilt data element.
    Type: Grant
    Filed: June 8, 2015
    Date of Patent: November 21, 2017
    Assignee: International Business Machines Corporation
    Inventor: James A. O'Connor
  • Publication number: 20170171179
    Abstract: Technical solutions are described for extending shrouding capability of a virtual server hosting system. An example method includes receiving a request to deploy a shrouded virtual server using a predetermined set of hardware components, and using a shrouded mode. The method also includes adding a guest server to the hosting system, the guest server including the predetermined set of hardware components. The method also includes deploying a preconfigured hypervisor on the guest server, where the preconfigured hypervisor is deployed in an immutable mode that disables changes to security settings of the preconfigured hypervisor. The method also includes deploying, by the preconfigured hypervisor, a preconfigured boot image as an instance of the virtual server on the preconfigured hypervisor. The method also includes sending an identifier of the virtual server for receipt by the client device.
    Type: Application
    Filed: December 14, 2015
    Publication date: June 15, 2017
    Inventors: Reinhard T. Buendgen, Jeffrey A. Frey, Jeb R. Linton, James A. O'Connor, William J. Rooney, George C. Wilson
  • Publication number: 20170170971
    Abstract: Technical solutions are described for extending shrouding capability of a virtual server hosting system. An example method includes receiving a request to deploy a shrouded virtual server using a predetermined set of hardware components, and using a shrouded mode. The method also includes adding a guest server to the hosting system, the guest server including the predetermined set of hardware components. The method also includes deploying a preconfigured hypervisor on the guest server, where the preconfigured hypervisor is deployed in an immutable mode that disables changes to security settings of the preconfigured hypervisor. The method also includes deploying, by the preconfigured hypervisor, a preconfigured boot image as an instance of the virtual server on the preconfigured hypervisor. The method also includes sending an identifier of the virtual server for receipt by the client device.
    Type: Application
    Filed: June 7, 2016
    Publication date: June 15, 2017
    Inventors: Reinhard T. Buendgen, Jeffrey A. Frey, Jeb R. Linton, James A. O'Connor, William J. Rooney, George C. Wilson
  • Publication number: 20170171164
    Abstract: Technical solutions are described for authenticating a hosting system prior to securely deploying a shrouded virtual server. An example method includes receiving, by a hypervisor, a request for a public certificate, from a client device that requested the virtual server, and sending the public certificate of the hosting system that executes the hypervisor. The method also includes receiving, in response to the public certificate being successfully authenticated by the client device using a third-party verification system, a session key based on a public key included in the public certificate. The method also includes decrypting the session key using a private key, where the private key is pre-installed in the hosting system by a manufacturer of the hosting system, and sending an acknowledgement message encrypted using the session key. The method also includes establishing a secure communication between the client device and the hypervisor using the session key.
    Type: Application
    Filed: December 14, 2015
    Publication date: June 15, 2017
    Inventors: Khary J. Alexander, Reinhard T. Buendgen, K. Paul Muller, James A. O'Connor, William J. Rooney, Tiberiu Suto, Craig R. Walters
  • Publication number: 20170171197
    Abstract: Technical solutions are described for securely deploying a shrouded virtual server. An example method includes sending, by a host manager, authentication information of a hosting system to a client device in response to a request from the client device. The \method also includes receiving a request to deploy a virtual server using a shrouded mode. The method also includes deploying a preconfigured hypervisor on the hosting system, where the preconfigured hypervisor is deployed in an immutable mode that disables changes to security settings of the preconfigured hypervisor. The method also includes deploying, by the preconfigured hypervisor, a preconfigured boot image as an instance of the virtual server on the preconfigured hypervisor. The method also includes sending, by the host manager, an identifier of the virtual server for receipt by the client device.
    Type: Application
    Filed: December 14, 2015
    Publication date: June 15, 2017
    Inventors: Khary J. Alexander, Utz Bacher, Reinhard T. Buendgen, Patrick J. Callaghan, John C. Dayka, Thomas B. Mathias, K. Paul Muller, James A. O'Connor, William J. Rooney, Kurt N. Schroeder, Peter G. Spera, Tiberiu Suto, Sean Swehla, Stefan Usenbinz, Craig R. Walters
  • Publication number: 20170139767
    Abstract: Systems, methods, and computer program products to perform an operation comprising storing, by a kernel and in a queue, an indication that a first process has called a second process, collecting process data for at least one of the first process and the second process, determining, by the kernel, that an amount of time that has elapsed since the first process called the second process exceeds a time threshold, storing the queue and the process data as part of a failure data capture, and performing a predefined operation on at least one of the first process and the second process.
    Type: Application
    Filed: November 18, 2015
    Publication date: May 18, 2017
    Inventors: Christopher J. CAIN, Reed B. FRANDSEN, Lee N. HELGESON, James A. O'CONNOR
  • Publication number: 20170115899
    Abstract: Technical solutions are described to forestall data loss caused by wearout of storage disks in an array of storage disks in a storage system by monitoring a rate of writes for a first storage disk in the array and determining a mean time to failure of the first storage disk. A start time is determined based on the mean time to failure, a number of storage disks in the array, and a time to replace a storage disk in the array. At the start time, a notification is issued as an alert to replace the first storage disk to forestall data loss caused by wearout of a second storage disk in conjunction with a wearout of the first storage disk.
    Type: Application
    Filed: October 22, 2015
    Publication date: April 27, 2017
    Inventors: JEFFERY M. FRANKE, JAMES A. O'CONNOR
  • Publication number: 20170115902
    Abstract: Technical solutions are described for shifting wearout of an array of storage disks in a storage system. In an aspect, a method includes staggering completion of maximum number of writes for each storage disk in the array. The method also includes copying data from a storage disk in the array to a replacement disk and redirecting a request to access the data from the storage disk to the replacement disk. The method also includes, in response to passage of a predetermined duration of time since copying the data from the storage disk to the replacement disk, copying the data from the replacement disk to the storage disk and directing the request to access the data from the storage disk back to the storage disk.
    Type: Application
    Filed: March 14, 2016
    Publication date: April 27, 2017
    Inventors: JEFFERY M. FRANKE, JAMES A. O'CONNOR
  • Publication number: 20170115903
    Abstract: Technical solutions are described to forestall data loss caused by wearout of storage disks in an array of storage disks in a storage system by monitoring a rate of writes for a first storage disk in the array and determining a mean time to failure of the first storage disk. A start time is determined based on the mean time to failure, a number of storage disks in the array, and a time to replace a storage disk in the array. At the start time, a notification is issued as an alert to replace the first storage disk to forestall data loss caused by wearout of a second storage disk in conjunction with a wearout of the first storage disk.
    Type: Application
    Filed: March 14, 2016
    Publication date: April 27, 2017
    Inventors: JEFFERY M. FRANKE, JAMES A. O'CONNOR
  • Publication number: 20170115897
    Abstract: Technical solutions are described that shift wearout of an array of storage disks in a storage system. In an aspect, a method includes receiving a request to write data to the storage system. The method also includes generating checksum data corresponding to the data and dividing the checksum data into portions of distinct sizes. The method also includes writing each portion of the checksum data onto a respective storage disk in the array.
    Type: Application
    Filed: October 22, 2015
    Publication date: April 27, 2017
    Inventors: JEFFERY M. FRANKE, JAMES A. O'CONNOR
  • Publication number: 20170115898
    Abstract: Technical solutions are described for shifting wearout of an array of storage disks in a storage system. In an aspect, a method includes staggering completion of maximum number of writes for each storage disk in the array. The method also includes copying data from a storage disk in the array to a replacement disk and redirecting a request to access the data from the storage disk to the replacement disk. The method also includes, in response to passage of a predetermined duration of time since copying the data from the storage disk to the replacement disk, copying the data from the replacement disk to the storage disk and directing the request to access the data from the storage disk back to the storage disk.
    Type: Application
    Filed: October 22, 2015
    Publication date: April 27, 2017
    Inventors: JEFFERY M. FRANKE, JAMES A. O'CONNOR
  • Publication number: 20170115901
    Abstract: Technical solutions are described that shift wearout of an array of storage disks in a storage system. In an aspect, a method includes receiving a request to write data to the storage system. The method also includes generating checksum data corresponding to the data and dividing the checksum data into portions of distinct sizes. The method also includes writing each portion of the checksum data onto a respective storage disk in the array.
    Type: Application
    Filed: March 14, 2016
    Publication date: April 27, 2017
    Inventors: JEFFERY M. FRANKE, JAMES A. O'CONNOR
  • Publication number: 20170111354
    Abstract: A method for booting and dumping a confidential image on a trusted computer system. Embodiments of the present invention disclose deploying a secure boot image and encrypted client data from a client to a trusted computer system. Embodiments of the present invention disclose booting a confidential image on a trusted computer system. Embodiments of the present invention also disclose a process of dumping a confidential image on the trusted computer system.
    Type: Application
    Filed: October 16, 2015
    Publication date: April 20, 2017
    Inventors: Reinhard T. Buendgen, James A. O'Connor, William J. Rooney
  • Patent number: 9563753
    Abstract: A computer system for dumping a confidential image on a trusted computer system. A trusted computer system loads an encrypted client dumper image key. The trusted computer system decrypts, with a private host key, the encrypted client dumper image key to generate a client dumper image key. The trusted computer system loads an encrypted dumper including a client dump key, in response to determining that the client dumper image key matches a client image key which encrypts a boot image of a current operating system. The trusted computer system decrypts, with the client dumper image key, the encrypted dumper to generate a dumper including the client dump key. The trusted computer system starts the dumper. The dumper generates an encrypted dump by encrypting, with the client dump key, an image to be dumped in the secure logical partition, and the dumper writes the encrypted dump on a client dump device.
    Type: Grant
    Filed: July 8, 2016
    Date of Patent: February 7, 2017
    Assignee: International Business Machines Corporation
    Inventors: Reinhard T. Buendgen, James A. O'Connor, William J. Rooney
  • Patent number: 9536095
    Abstract: A computer system for booting a confidential image on a trusted computer system. A trusted computer system loads an encrypted client image key onto a protected area on the trusted computer system. The trusted computer system loads an encrypted boot image onto a secure logical partition on the trusted computer system. The trusted computer system decrypts the encrypted client image key to obtain a client image key in the protected area. The trusted computer system decrypts, with the client image key, the encrypted boot image to obtain a boot image and a client data key. The trusted computer system starts the boot image, and the boot image mounts the encrypted client data onto the secure logical partition. The client data key is used by the boot image to decrypt data read from the encrypted client data and to encrypt data written to the encrypted client data.
    Type: Grant
    Filed: June 24, 2016
    Date of Patent: January 3, 2017
    Assignee: International Business Machines Corporation
    Inventors: Reinhard T. Buendgen, James A. O'Connor, William J. Rooney
  • Patent number: 9529670
    Abstract: A data storage system includes a plurality of storage devices forming a storage array for storing data and associated error correction codes and a controller coupled to the plurality of storage devices. The controller is configured to, responsive to an error in a data element among the data, rebuild the data element from other data elements and an error correction code in the storage array and overwrite the error correction code with the rebuilt data element.
    Type: Grant
    Filed: May 16, 2014
    Date of Patent: December 27, 2016
    Assignee: International Business Machines Corporation
    Inventor: James A. O'Connor
  • Patent number: 9471786
    Abstract: A method for dumping a confidential image on a trusted computer system. A trusted computer system loads an encrypted client dumper image key. The trusted computer system decrypts, with a private host key, the encrypted client dumper image key to generate a client dumper image key. The trusted computer system loads an encrypted dumper including a client dump key, in response to determining that the client dumper image key matches a client image key which encrypts a boot image of a current operating system. The trusted computer system decrypts, with the client dumper image key, the encrypted dumper to generate a dumper including the client dump key. The trusted computer system starts the dumper. The dumper generates an encrypted dump by encrypting, with the client dump key, an image to be dumped in the secure logical partition, and the dumper writes the encrypted dump on a client dump device.
    Type: Grant
    Filed: March 16, 2016
    Date of Patent: October 18, 2016
    Assignee: International Business Machines Corporation
    Inventors: Reinhard T. Buendgen, James A. O'Connor, William J. Rooney
  • Patent number: 9454662
    Abstract: A method for booting a confidential image on a trusted computer system. A trusted computer system loads an encrypted client image key onto a protected area on the trusted computer system. The trusted computer system loads an encrypted boot image onto a secure logical partition on the trusted computer system. The trusted computer system decrypts the encrypted client image key to obtain a client image key in the protected area. The trusted computer system decrypts, with the client image key, the encrypted boot image to obtain a boot image and a client data key. The trusted computer system starts the boot image, and the boot image mounts the encrypted client data onto the secure logical partition. The client data key is used by the boot image to decrypt data read from the encrypted client data and to encrypt data written to the encrypted client data.
    Type: Grant
    Filed: March 16, 2016
    Date of Patent: September 27, 2016
    Assignee: International Business Machines Corporation
    Inventors: Reinhard T. Buendgen, James A. O'Connor, William J. Rooney
  • Patent number: 9436398
    Abstract: A memory and a method of storing data in a memory are provided. The memory comprises a memory block comprising data bits and additional bits. The memory includes logic which, when receiving a first command, writes data into the data bits of the memory block, wherein the data is masked according to a first input. The logic, in response to a second command, writes data into the data bits of the memory block and writes a second input into the additional bits of the memory block.
    Type: Grant
    Filed: June 2, 2015
    Date of Patent: September 6, 2016
    Assignee: Advanced Micro Devices, Inc.
    Inventors: James O'Connor, Warren Kruger