Patents by Inventor Kenneth Byrne
Kenneth Byrne has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240118979Abstract: Cloud metadata is generated by a cloud block management system on a first storage array. The cloud metadata includes information identifying one or more cloud providers, one or more cloud repositories created on the cloud providers, and block objects stored in the cloud repositories. A metadata backup file containing a copy of the cloud metadata is generated, encrypted, and exported to an external computer. A second cloud block management system is created on a second storage array, and the metadata backup file containing the copy of the cloud metadata is decrypted and imported to the second cloud block management system. The cloud metadata from the metadata backup file is used to configure the second cloud block management system to access the one or more cloud providers, access the one or more cloud repositories created on the cloud providers, and to access the block objects stored in the cloud repositories.Type: ApplicationFiled: October 8, 2022Publication date: April 11, 2024Inventors: Kenneth Byrne, Santhosh Krishnegowda, Shane Sullivan, Mark Aldred, Deepak Vokaliga
-
Publication number: 20230306119Abstract: Techniques are provided for intrusion detection on a computer system. In an example, a computer host device is configured to access data storage of the computer system via a communications network. It can be determined that the computer host device is behaving anomalously because a first current access by the computer host device to the data storage deviates from a second expected access by the computer host device to the data storage by more than a predefined amount. Then, in response to determining that the computer host device is behaving anomalously, the computer system can mitigate against the computer host device behaving anomalously.Type: ApplicationFiled: November 2, 2022Publication date: September 28, 2023Inventor: Kenneth Byrne
-
Publication number: 20230145988Abstract: A storage system management application contains control logic configured to enable the storage system management application to fully orchestrate setup of a containerized cloud communication system within embedded operating system, with minimal interaction from an end user. Upon receipt of an instruction to initiate cloud access, the storage system management application enrolls a cloud tethering subsystem and establishes a secure communication channel to the cloud tethering subsystem. The storage system management application also creates a cloud protection environment within the operating system for use by the cloud tethering subsystem, and registers the storage system to the cloud tethering subsystem. The storage system management application also creates external network interfaces on the cloud tethering subsystem and configures one or more private cloud provider endpoints on the cloud tethering subsystem.Type: ApplicationFiled: January 6, 2023Publication date: May 11, 2023Inventors: Deepak Vokaliga, Francisco Aquino, Warren Fleury, Kenneth Byrne
-
Patent number: 11579926Abstract: A request manager analyzes API calls from a client to a host application for state and performance information. If current utilization of host application processing or memory footprint resources exceed predetermined levels, then the incoming API call is not forwarded to the application. If current utilization of the host application processing and memory resources do not exceed the predetermined levels, then the request manager quantifies the processing or memory resources required to report the requested information and determines whether projected utilization of the host application processing or memory resources inclusive of the resources required to report the requested information exceed predetermined levels. If the predetermined levels are not exceeded, then the request manager forwards the API call to the application for processing.Type: GrantFiled: February 10, 2020Date of Patent: February 14, 2023Assignee: EMC IP HOLDING COMPANY LLCInventors: Aidan Hally, Paul Mcsweeney, Kenneth Byrne
-
Patent number: 11563807Abstract: A storage system management application contains control logic configured to enable the storage system management application to fully orchestrate setup of a containerized cloud communication system within embedded operating system, with minimal interaction from an end user. Upon receipt of an instruction to initiate cloud access, the storage system management application enrolls a cloud tethering subsystem and establishes a secure communication channel to the cloud tethering subsystem. The storage system management application also creates a cloud protection environment within the operating system for use by the cloud tethering subsystem, and registers the storage system to the cloud tethering subsystem. The storage system management application also creates external network interfaces on the cloud tethering subsystem and configures one or more private cloud provider endpoints on the cloud tethering subsystem.Type: GrantFiled: September 27, 2020Date of Patent: January 24, 2023Assignee: Dell Products, L.P.Inventors: Deepak Vokaliga, Francisco Aquino, Warren Fleury, Kenneth Byrne
-
Patent number: 11520898Abstract: Techniques are provided for intrusion detection on a computer system. In an example, a computer host device is configured to access data storage of the computer system via a communications network. It can be determined that the computer host device is behaving anomalously because a first current access by the computer host device to the data storage deviates from a second expected access by the computer host device to the data storage by more than a predefined amount. Then, in response to determining that the computer host device is behaving anomalously, the computer system can mitigate against the computer host device behaving anomalously.Type: GrantFiled: March 28, 2019Date of Patent: December 6, 2022Assignee: EMC IP HOLDING COMPANY LLCInventor: Kenneth Byrne
-
Patent number: 11386121Abstract: A SSMA (Storage System Management Application) automates creation of a cloud provider on a cloud repository. The SSMA instructs a CTS (Cloud Tethering Subsystem) to create the cloud provider, which causes the CTS to establish a secure connection to the cloud repository. The cloud repository creates the cloud provider and returns identifying information. The CTS then tests the connection to verify that the cloud provider is reachable at the cloud repository. The SSMA also instruct a solution enabler to install the cloud provider in the storage system embedded operating system. The SSMA also implements a cloud provider synchronization verification process, which enables the SSMA to determine if there are any differences between lists of cloud providers maintained by the CTS and the embedded operating system. If any differences are detected, the SSMA automates the process of installing the correct set of cloud providers in the storage system embedded operating system.Type: GrantFiled: September 27, 2020Date of Patent: July 12, 2022Assignee: Dell Products, L.P.Inventors: Deepak Vokaliga, Kenneth Byrne, Warren Fleury, Thiago Santos
-
Patent number: 11327844Abstract: A storage array creates snapshots of each of a plurality of devices of a storage group associated with a production device on which active application data is logically stored. Metadata that indicates associations between the snapshots and the devices is stored on cloud storage with the snapshots as a snapset object. A program running on a management station used the snapset metadata to automatically create new devices on which to recover the snapshots on a selected storage array and uses the snapset metadata to cause the snapshots to be automatically written from the cloud storage system to the new devices on the selected storage array.Type: GrantFiled: October 30, 2020Date of Patent: May 10, 2022Assignee: Dell Products L.P.Inventors: Francisco Aquino, Kenneth Byrne, Warren Fleury, Thiago Santos, Deepak Vokaliga
-
Publication number: 20220138047Abstract: A storage array creates snapshots of each of a plurality of devices of a storage group associated with a production device on which active application data is logically stored. Metadata that indicates associations between the snapshots and the devices is stored on cloud storage with the snapshots as a snapset object. A program running on a management station used the snapset metadata to automatically create new devices on which to recover the snapshots on a selected storage array and uses the snapset metadata to cause the snapshots to be automatically written from the cloud storage system to the new devices on the selected storage array.Type: ApplicationFiled: October 30, 2020Publication date: May 5, 2022Applicant: EMC IP HOLDING COMPANY LLCInventors: Francisco Aquino, Kenneth Byrne, Warren Fleury, Thiago Santos, Deepak Vokaliga
-
Publication number: 20220103627Abstract: A storage system management application contains control logic configured to enable the storage system management application to fully orchestrate setup of a containerized cloud communication system within embedded operating system, with minimal interaction from an end user. Upon receipt of an instruction to initiate cloud access, the storage system management application enrolls a cloud tethering subsystem and establishes a secure communication channel to the cloud tethering subsystem. The storage system management application also creates a cloud protection environment within the operating system for use by the cloud tethering subsystem, and registers the storage system to the cloud tethering subsystem. The storage system management application also creates external network interfaces on the cloud tethering subsystem and configures one or more private cloud provider endpoints on the cloud tethering subsystem.Type: ApplicationFiled: September 27, 2020Publication date: March 31, 2022Inventors: Deepak Vokaliga, Francisco Aquino, Warren Fleury, Kenneth Byrne
-
Publication number: 20220100776Abstract: A SSMA (Storage System Management Application) automates creation of a cloud provider on a cloud repository. The SSMA instructs a CTS (Cloud Tethering Subsystem) to create the cloud provider, which causes the CTS to establish a secure connection to the cloud repository. The cloud repository creates the cloud provider and returns identifying information. The CTS then tests the connection to verify that the cloud provider is reachable at the cloud repository. The SSMA also instruct a solution enabler to install the cloud provider in the storage system embedded operating system. The SSMA also implements a cloud provider synchronization verification process, which enables the SSMA to determine if there are any differences between lists of cloud providers maintained by the CTS and the embedded operating system. If any differences are detected, the SSMA automates the process of installing the correct set of cloud providers in the storage system embedded operating system.Type: ApplicationFiled: September 27, 2020Publication date: March 31, 2022Inventors: Deepak Vokaliga, Kenneth Byrne, Warren Fleury, Thiago Santos
-
Publication number: 20210248007Abstract: A request manager analyzes API calls from a client to a host application for state and performance information. If current utilization of host application processing or memory footprint resources exceed predetermined levels, then the incoming API call is not forwarded to the application. If current utilization of the host application processing and memory resources do not exceed the predetermined levels, then the request manager quantifies the processing or memory resources required to report the requested information and determines whether projected utilization of the host application processing or memory resources inclusive of the resources required to report the requested information exceed predetermined levels. If the predetermined levels are not exceeded, then the request manager forwards the API call to the application for processing. The request manager may implement a limited number of retries if the predetermined levels are exceeded.Type: ApplicationFiled: February 10, 2020Publication date: August 12, 2021Applicant: EMC IP HOLDING COMPANY LLCInventors: Aidan Hally, Paul Mcsweeney, Kenneth Byrne
-
Publication number: 20200311280Abstract: Techniques are provided for intrusion detection on a computer system. In an example, a computer host device is configured to access data storage of the computer system via a communications network. It can be determined that the computer host device is behaving anomalously because a first current access by the computer host device to the data storage deviates from a second expected access by the computer host device to the data storage by more than a predefined amount. Then, in response to determining that the computer host device is behaving anomalously, the computer system can mitigate against the computer host device behaving anomalously.Type: ApplicationFiled: March 28, 2019Publication date: October 1, 2020Inventor: Kenneth Byrne
-
Patent number: 6015248Abstract: A wood coring drill bit comprising a hollow tube having an internal bore (103) and an exterior (100) with equally spaced bodies (10) of substantially uniform width extending in a helical manner from a cutting end (10) of said drill bit, said bodies (10) defining equally spaced flutes (15) between the edges of adjacent bodies (10), each body (10) comprising a land (20) upstanding from a relief (21) at the leading edge of the body (10), a respective cutting face (12) and associated lip (25) being formed at the end of each body (10) at said cutting end. The wood coring drill bit is characterized by having three equally spaced bodies (10) and flutes (15) said cutting face (12) has an included angle which is preferably 125.degree. for hardwood and drywood and 112.degree. for softwood. The lip (25) has a lip clearance angle that is about 6.degree..+-.1.degree. , the lands (20) on the bodies (10) extend for an axial distance of about 65 mm.+-.Type: GrantFiled: September 1, 1998Date of Patent: January 18, 2000Assignee: Commonwealth Scientific and Industrial Research OrganisationInventors: Terrence Charles Elliott, Gary John Nevill, Ian Kenneth Byrne, Anthony Mason Adams, M Lyle Courtney, David Spencer