Patents by Inventor John J. Auvenshine

John J. Auvenshine has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11526633
    Abstract: A media exfiltration authorization system is provided. A computer device receives a request from an application on a remote device, wherein the request is to store data on an external storage device. The computing device validates that the application is running in protected space on the remote device and includes an established unique identifier. The computing device generates an encryption key for the external storage device based, at least in part, on the validating. The computing device sends the encryption key to the application with authorization for the application to reformat the external storage device, store the requested data on the external storage device, and encrypt the external storage device using the encryption key.
    Type: Grant
    Filed: August 27, 2020
    Date of Patent: December 13, 2022
    Assignee: Kyndryl, Inc.
    Inventors: John J. Auvenshine, Joseph Dawson Davis, III, Khwaja Jawahar Jahangir Shaik
  • Publication number: 20220067215
    Abstract: A media exfiltration authorization system is provided. A computer device receives a request from an application on a remote device, wherein the request is to store data on an external storage device. The computing device validates that the application is running in protected space on the remote device and includes an established unique identifier. The computing device generates an encryption key for the external storage device based, at least in part, on the validating. The computing device sends the encryption key to the application with authorization for the application to reformat the external storage device, store the requested data on the external storage device, and encrypt the external storage device using the encryption key.
    Type: Application
    Filed: August 27, 2020
    Publication date: March 3, 2022
    Inventors: John J. Auvenshine, Joseph Dawson Davis, III, Khwaja Jawahar Jahangir Shaik
  • Patent number: 11189290
    Abstract: A method, system, and program product for selecting software is provided. The method includes retrieving audio data during a call with a subject matter expert (SME). The audio data is converted into a data training set and documents of the SME are converted into a document training set. Canonical documents generated by authors are analyzed and specified code is extracted from the text data training set and document training set. Attributes of individuals are detected. The attributes are compared with specified data and the canonical documents and it is determined that the individuals are requesting information associated with the text data. The information is provided to the individuals via the canonical documents or the documents of the SME and it is determined if a matched set of data exists between the attributes, the specified data, and the canonical documents. A digital action associated with results of the determination is executed.
    Type: Grant
    Filed: December 4, 2019
    Date of Patent: November 30, 2021
    Assignee: International Business Machines Corporation
    Inventors: John J. Auvenshine, Jason LaScola, Michael Flores, Marci Devorah Formato, Ramesh Babu Kothamasu, Vidula M Patel
  • Patent number: 11153291
    Abstract: A method for verifying that default passwords have been changed without causing a security lockout, is provided, including enabling user identifiers associated with a plurality of devices, prior to an initial security test, identifying, a default password for a user identifier of each device, attempting a login to each device using the default password for the user identifier of each device, wherein: in response to determining that the login is successful, raising an alert against the user identifier as a security concern and maintaining an enabled state of the user identifier, in response to determining that the login is unsuccessful, disabling the user identifier so that the user identifier is in a non-enabled state, until a security lockout interval elapses, and retrying the login only for each user identifier in an enabled state during one or more subsequent security tests initiated after a predetermined alert interval.
    Type: Grant
    Filed: September 12, 2019
    Date of Patent: October 19, 2021
    Assignee: International Business Machines Corporation
    Inventors: John J. Auvenshine, Per Lutkemeyer, Christian Sonder
  • Publication number: 20210174808
    Abstract: A method, system, and program product for selecting software is provided. The method includes retrieving audio data during a call with a subject matter expert (SME). The audio data is converted into a data training set and documents of the SME are converted into a document training set. Canonical documents generated by authors are analyzed and specified code is extracted from the text data training set and document training set. Attributes of individuals are detected. The attributes are compared with specified data and the canonical documents and it is determined that the individuals are requesting information associated with the text data. The information is provided to the individuals via the canonical documents or the documents of the SME and it is determined if a matched set of data exists between the attributes, the specified data, and the canonical documents. A digital action associated with results of the determination is executed.
    Type: Application
    Filed: December 4, 2019
    Publication date: June 10, 2021
    Inventors: John J. Auvenshine, Jason LaScola, Michael Flores, Marci Devorah Formato, Ramesh Babu Kothamasu, Vidula M Patel
  • Patent number: 10963179
    Abstract: A method to prevent the inadvertent removal of volumes on a storage system is disclosed. In one embodiment, such a method includes receiving a request to remove (e.g., delete, detach, unmask, etc.) a volume on a storage system. In response to receiving the request, the method initiates at least one process to monitor the volume for I/O activity over a specified period of time. In the event the at least one process does not detect I/O activity to the volume during the specified period of time, the method executes the request by removing the volume. In the event the at least one process detects I/O activity to the volume during the specified period of time, the method denies the request to remove the volume. A corresponding system and computer program product are also disclosed.
    Type: Grant
    Filed: January 29, 2019
    Date of Patent: March 30, 2021
    Assignee: International Business Machines Corporation
    Inventors: John J. Auvenshine, Dave Kodjo, Nicolas Andre Druet, Marcel Pop, Paul Cloutier
  • Patent number: 10949287
    Abstract: Disclosed is a computer-implemented method of finding, troubleshooting and auto-remediating problems in storage environments.
    Type: Grant
    Filed: September 19, 2018
    Date of Patent: March 16, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Donald Charles Laing, John J. Auvenshine, Michael L. Camarco, III, Dominic Thibodeau, Per Lutkemeyer
  • Patent number: 10936439
    Abstract: A method for distributing data among storage devices. The method comprising one or more processors receiving a first graph workload that executes within a networked computing environment. The method further includes identifying data from the first graph workload that is utilized during the execution of the first graph workload that includes a plurality of data packets. The method further includes creating a first graph workload model representative of the graph structure of the first graph workload and determining two or more partitions that are representative of a distribution of the identified data utilized by the first graph workload based, at least in part, on the first graph workload model. The method further includes allocating a plurality of network accessible storage devices among the two or more partitions and copying a first set of data packets of the plurality of data packets to a network accessible storage device.
    Type: Grant
    Filed: May 14, 2018
    Date of Patent: March 2, 2021
    Assignee: International Business Machines Corporation
    Inventors: John J. Auvenshine, Sunhwan Lee, James E. Olson, Mu Qiao, Ramani R. Routray, Stanley C. Wood
  • Patent number: 10929369
    Abstract: A method and associated systems for optimized orchestration of a data-migration project. A data-migration orchestration system represents a hierarchical organization of each dataset to be migrated as a tree, where each leaf node of the tree represents data to be migrated and where a path between the leaf node and the root node represents a hierarchical directory pathname of sensitive data represented by the leaf node. Each tree is assigned a sensitivity signature that is proportional to the relative sensitivity and access frequency of the dataset represented by that tree. The signatures are organized into clusters as a function of the distances between each signature, and each signature is associated with a soft migration cost specific to that signature's cluster. A soft cost for migrating an application that requires multiple datasets may be determined by adding the migration costs associated with each of the multiple datasets.
    Type: Grant
    Filed: June 18, 2019
    Date of Patent: February 23, 2021
    Assignee: International Business Machines Corporation
    Inventors: John J. Auvenshine, Bernhard J. Klingenberg, Sunhwan Lee, James E. Olson, Mu Qiao, Ramani R. Routray
  • Patent number: 10901841
    Abstract: A method and system for improving operation of a memory device is provided. The method includes detecting, via sensors, environmental factors affecting an operation of individual hardware storage devices within an array of hardware storage devices. The environmental factors are analyzed with respect to operational characteristics of the individual hardware storage devices and a resulting expected failure rate for the individual hardware storage devices is determined. Array parameters associated with a hardware configuration for the array of hardware storage devices with respect to each expected failure rate are determined and associated issues are detected. Reliability characteristics and associated risks of the array of hardware storage devices are determined and a functionality of the array of hardware storage devices is modified.
    Type: Grant
    Filed: February 27, 2019
    Date of Patent: January 26, 2021
    Assignee: International Business Machines Corporation
    Inventors: John J. Auvenshine, Perry J. Gallo, Bent B. Holst, Mikael Lindstrom
  • Patent number: 10891160
    Abstract: Systems and methods for resource provisioning are disclosed. A method includes: generating, by a computer device, a resource provisioning policy for a resource; receiving, by the computer device, a request for an allocation of the resource from an account; applying, by the computer device, the resource provisioning policy to the request based on receiving the request; automatically approving or denying, by the computer device, the request based on the applying the resource provisioning policy to the request; updating, by the computer device, the resource provisioning policy for the account based on the automatic approving or denying the request.
    Type: Grant
    Filed: April 30, 2019
    Date of Patent: January 12, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: John J. Auvenshine, Ramani R. Routray, Stanley C. Wood
  • Publication number: 20200372114
    Abstract: Methods, systems, and computer program products for media language translation and synchronization are provided. Aspects include receiving, by a processor, audio data associated with a speaker, wherein the audio data is in a first language, determining speaker characteristics associated with the speaker from the audio data, converting the audio data to a source text in the first language, converting the source text to a target text, wherein the target text is in a second language, and generating an output audio in the second language for the target text based on the speaker characteristics.
    Type: Application
    Filed: May 21, 2019
    Publication date: November 26, 2020
    Inventors: John J. Auvenshine, Anthony Ciaravella, John T. Olson, Richard A. Welp
  • Patent number: 10771369
    Abstract: A method for predicting a failure of a complex storage environment is provided. An earliest expected incident of resource exhaustion on a data path of interest is predicted. The method includes monitoring a current utilization of one or more resources over a data path of interest, and calculating a maximum utilization threshold for each resource, such that exceeding the maximum utilization threshold adversely impacts one or more performance measures. An expected performance threshold is created that is associated with an expected performance. A maximum values of resource usage over time is analyzed to predict when the expected performance will fall outside of an acceptable overall performance threshold for the data path of interest to determine an earliest expected incident of resource exhaustion.
    Type: Grant
    Filed: March 20, 2017
    Date of Patent: September 8, 2020
    Assignee: International Business Machines Corporation
    Inventors: John J. Auvenshine, Perry J. Gallo, Bent B. Holst, Mikael H. Lindstrom
  • Patent number: 10754551
    Abstract: A method and associated systems for a workload-aware thin-provisioning system that allocates physical storage to virtual resources from pools of physical storage volumes. The system receives constraints that limit the amount of storage that can be allocated from each pool and the total workload that can be directed to each pool. It also receives lists of previous workloads and allocations associated with each volume at specific times in the past. The system then predicts future workloads and allocation requirements for each volume by regressing linear equations derived from the received data. If the predicted values indicate that a pool will at a future time violate a received constraint, the system computes the minimum costs to move each volume of the offending pool to a less-burdened pool. It then selects the lowest-cost combination of volume and destination pool and then moves the selected volume to the selected pool.
    Type: Grant
    Filed: March 5, 2019
    Date of Patent: August 25, 2020
    Assignee: International Business Machines Corporation
    Inventors: John J. Auvenshine, Rakesh Jain, James E. Olson, Mu Qiao, Ramani R. Routray, Stanley C. Wood
  • Patent number: 10749748
    Abstract: A method and system. A health and compliance check report for a network including two or more devices is received. The report includes a list of health and compliance check findings at a particular time. Each finding indicates a determination of non-compliance of a subject device of the two or more devices with a predetermined requirement and includes a severity value associated with the determination of non-compliance of the subject device. For each finding in the report, a ranking value is determined based on the associated severity value and an importance value of one or more devices connected to the subject device.
    Type: Grant
    Filed: March 23, 2017
    Date of Patent: August 18, 2020
    Assignee: International Business Machines Corporation
    Inventors: John J. Auvenshine, Per Lutkemeyer, Christian Sonder, Stanley C. Wood
  • Publication number: 20200241786
    Abstract: A method to prevent the inadvertent removal of volumes on a storage system is disclosed. In one embodiment, such a method includes receiving a request to remove (e.g., delete, detach, unmask, etc.) a volume on a storage system. In response to receiving the request, the method initiates at least one process to monitor the volume for I/O activity over a specified period of time. In the event the at least one process does not detect I/O activity to the volume during the specified period of time, the method executes the request by removing the volume. In the event the at least one process detects I/O activity to the volume during the specified period of time, the method denies the request to remove the volume. A corresponding system and computer program product are also disclosed.
    Type: Application
    Filed: January 29, 2019
    Publication date: July 30, 2020
    Applicant: International Business Machines Corporation
    Inventors: John J. Auvenshine, Dave Kodjo, Nicolas Andre Druet, Marcel Pop, Paul Cloutier
  • Patent number: 10691367
    Abstract: A computer-implemented method of information lifecycle management is disclosed. The computer-implemented method includes reading, by a data processing system of a storage environment, business rules and policies for managing data in storage volumes of the storage environment, the policies being based on the predetermined business rules, and analyzing, by the data processing system, available storage and capacity in the storage environment. The computer-implemented method further includes dynamically prioritizing, by the data processing system, the policies based, at least in part, on results of the analyzing, resulting in prioritized policies, cognitively translating, by the data processing system, one or more of the predetermined business rules into action(s) against one or more of the storage volumes based, at least in part, on the prioritized policies, and executing, by the data processing system, the action(s).
    Type: Grant
    Filed: October 30, 2018
    Date of Patent: June 23, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: John J. Auvenshine, David Schustek, Tron H. Pryor, Luis Ignacio Callero, Laura Richardson, Robert Ong Sio, David Lutz, Dave Aime Desire Kodjo
  • Patent number: 10671327
    Abstract: Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: examining information of first through Nth storage volumes and based on the examining providing for each storage volume of the first through Nth storage volumes a predicted storage space savings value, the predicted storage space savings value indicating a predicted terabyte volume of storage space savings producible by performance of data compression of data stored on the storage volume; predicting a per terabyte compression cost savings associated with compressing one or more storage volume of the first through Nth storage volumes, and providing a ranking of storage volumes of the first through Nth storage volumes based on the examining and the predicting; and scheduling a compression of storage volumes of the first through Nth storage volumes based on the ranking of storage volumes of the first through Nth storage volumes.
    Type: Grant
    Filed: March 8, 2019
    Date of Patent: June 2, 2020
    Assignee: International Business Machines Corporation
    Inventors: John J. Auvenshine, Per Lutkemeyer, Laura Richardson, David Schustek
  • Patent number: 10656835
    Abstract: A method, computer system, and computer program product for determining whether data compression should be performed at a storage virtualization layer or a backend layer, within a storage area network, including assessing a volume of data to decide whether the volume of data should be compressed or is already compressed, and in response to deciding that the volume of data should be compressed: checking whether a restriction exists on the volume of data, and in response to deciding that the volume of data is already compressed: determining that the volume of data already compressed should be uncompressed based on at least one metric.
    Type: Grant
    Filed: May 3, 2018
    Date of Patent: May 19, 2020
    Assignee: International Business Machines Corporation
    Inventors: John J. Auvenshine, Laura Richardson, Dave Aime Desire Kodjo, Lisa M. Chavez
  • Publication number: 20200133559
    Abstract: A computer-implemented method of information lifecycle management is disclosed. The computer-implemented method includes reading, by a data processing system of a storage environment, business rules and policies for managing data in storage volumes of the storage environment, the policies being based on the predetermined business rules, and analyzing, by the data processing system, available storage and capacity in the storage environment. The computer-implemented method further includes dynamically prioritizing, by the data processing system, the policies based, at least in part, on results of the analyzing, resulting in prioritized policies, cognitively translating, by the data processing system, one or more of the predetermined business rules into action(s) against one or more of the storage volumes based, at least in part, on the prioritized policies, and executing, by the data processing system, the action(s).
    Type: Application
    Filed: October 30, 2018
    Publication date: April 30, 2020
    Inventors: John J. AUVENSHINE, David SCHUSTEK, Tron H. PRYOR, Luis Ignacio CALLERO, Laura RICHARDSON, Robert Ong SIO, David LUTZ, Dave Aime Desire KODJO