Patents by Inventor Kenneth Byrne

Kenneth Byrne has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240118979
    Abstract: Cloud metadata is generated by a cloud block management system on a first storage array. The cloud metadata includes information identifying one or more cloud providers, one or more cloud repositories created on the cloud providers, and block objects stored in the cloud repositories. A metadata backup file containing a copy of the cloud metadata is generated, encrypted, and exported to an external computer. A second cloud block management system is created on a second storage array, and the metadata backup file containing the copy of the cloud metadata is decrypted and imported to the second cloud block management system. The cloud metadata from the metadata backup file is used to configure the second cloud block management system to access the one or more cloud providers, access the one or more cloud repositories created on the cloud providers, and to access the block objects stored in the cloud repositories.
    Type: Application
    Filed: October 8, 2022
    Publication date: April 11, 2024
    Inventors: Kenneth Byrne, Santhosh Krishnegowda, Shane Sullivan, Mark Aldred, Deepak Vokaliga
  • Publication number: 20230306119
    Abstract: Techniques are provided for intrusion detection on a computer system. In an example, a computer host device is configured to access data storage of the computer system via a communications network. It can be determined that the computer host device is behaving anomalously because a first current access by the computer host device to the data storage deviates from a second expected access by the computer host device to the data storage by more than a predefined amount. Then, in response to determining that the computer host device is behaving anomalously, the computer system can mitigate against the computer host device behaving anomalously.
    Type: Application
    Filed: November 2, 2022
    Publication date: September 28, 2023
    Inventor: Kenneth Byrne
  • Publication number: 20230145988
    Abstract: A storage system management application contains control logic configured to enable the storage system management application to fully orchestrate setup of a containerized cloud communication system within embedded operating system, with minimal interaction from an end user. Upon receipt of an instruction to initiate cloud access, the storage system management application enrolls a cloud tethering subsystem and establishes a secure communication channel to the cloud tethering subsystem. The storage system management application also creates a cloud protection environment within the operating system for use by the cloud tethering subsystem, and registers the storage system to the cloud tethering subsystem. The storage system management application also creates external network interfaces on the cloud tethering subsystem and configures one or more private cloud provider endpoints on the cloud tethering subsystem.
    Type: Application
    Filed: January 6, 2023
    Publication date: May 11, 2023
    Inventors: Deepak Vokaliga, Francisco Aquino, Warren Fleury, Kenneth Byrne
  • Patent number: 11579926
    Abstract: A request manager analyzes API calls from a client to a host application for state and performance information. If current utilization of host application processing or memory footprint resources exceed predetermined levels, then the incoming API call is not forwarded to the application. If current utilization of the host application processing and memory resources do not exceed the predetermined levels, then the request manager quantifies the processing or memory resources required to report the requested information and determines whether projected utilization of the host application processing or memory resources inclusive of the resources required to report the requested information exceed predetermined levels. If the predetermined levels are not exceeded, then the request manager forwards the API call to the application for processing.
    Type: Grant
    Filed: February 10, 2020
    Date of Patent: February 14, 2023
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Aidan Hally, Paul Mcsweeney, Kenneth Byrne
  • Patent number: 11563807
    Abstract: A storage system management application contains control logic configured to enable the storage system management application to fully orchestrate setup of a containerized cloud communication system within embedded operating system, with minimal interaction from an end user. Upon receipt of an instruction to initiate cloud access, the storage system management application enrolls a cloud tethering subsystem and establishes a secure communication channel to the cloud tethering subsystem. The storage system management application also creates a cloud protection environment within the operating system for use by the cloud tethering subsystem, and registers the storage system to the cloud tethering subsystem. The storage system management application also creates external network interfaces on the cloud tethering subsystem and configures one or more private cloud provider endpoints on the cloud tethering subsystem.
    Type: Grant
    Filed: September 27, 2020
    Date of Patent: January 24, 2023
    Assignee: Dell Products, L.P.
    Inventors: Deepak Vokaliga, Francisco Aquino, Warren Fleury, Kenneth Byrne
  • Patent number: 11520898
    Abstract: Techniques are provided for intrusion detection on a computer system. In an example, a computer host device is configured to access data storage of the computer system via a communications network. It can be determined that the computer host device is behaving anomalously because a first current access by the computer host device to the data storage deviates from a second expected access by the computer host device to the data storage by more than a predefined amount. Then, in response to determining that the computer host device is behaving anomalously, the computer system can mitigate against the computer host device behaving anomalously.
    Type: Grant
    Filed: March 28, 2019
    Date of Patent: December 6, 2022
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventor: Kenneth Byrne
  • Patent number: 11386121
    Abstract: A SSMA (Storage System Management Application) automates creation of a cloud provider on a cloud repository. The SSMA instructs a CTS (Cloud Tethering Subsystem) to create the cloud provider, which causes the CTS to establish a secure connection to the cloud repository. The cloud repository creates the cloud provider and returns identifying information. The CTS then tests the connection to verify that the cloud provider is reachable at the cloud repository. The SSMA also instruct a solution enabler to install the cloud provider in the storage system embedded operating system. The SSMA also implements a cloud provider synchronization verification process, which enables the SSMA to determine if there are any differences between lists of cloud providers maintained by the CTS and the embedded operating system. If any differences are detected, the SSMA automates the process of installing the correct set of cloud providers in the storage system embedded operating system.
    Type: Grant
    Filed: September 27, 2020
    Date of Patent: July 12, 2022
    Assignee: Dell Products, L.P.
    Inventors: Deepak Vokaliga, Kenneth Byrne, Warren Fleury, Thiago Santos
  • Patent number: 11327844
    Abstract: A storage array creates snapshots of each of a plurality of devices of a storage group associated with a production device on which active application data is logically stored. Metadata that indicates associations between the snapshots and the devices is stored on cloud storage with the snapshots as a snapset object. A program running on a management station used the snapset metadata to automatically create new devices on which to recover the snapshots on a selected storage array and uses the snapset metadata to cause the snapshots to be automatically written from the cloud storage system to the new devices on the selected storage array.
    Type: Grant
    Filed: October 30, 2020
    Date of Patent: May 10, 2022
    Assignee: Dell Products L.P.
    Inventors: Francisco Aquino, Kenneth Byrne, Warren Fleury, Thiago Santos, Deepak Vokaliga
  • Publication number: 20220138047
    Abstract: A storage array creates snapshots of each of a plurality of devices of a storage group associated with a production device on which active application data is logically stored. Metadata that indicates associations between the snapshots and the devices is stored on cloud storage with the snapshots as a snapset object. A program running on a management station used the snapset metadata to automatically create new devices on which to recover the snapshots on a selected storage array and uses the snapset metadata to cause the snapshots to be automatically written from the cloud storage system to the new devices on the selected storage array.
    Type: Application
    Filed: October 30, 2020
    Publication date: May 5, 2022
    Applicant: EMC IP HOLDING COMPANY LLC
    Inventors: Francisco Aquino, Kenneth Byrne, Warren Fleury, Thiago Santos, Deepak Vokaliga
  • Publication number: 20220103627
    Abstract: A storage system management application contains control logic configured to enable the storage system management application to fully orchestrate setup of a containerized cloud communication system within embedded operating system, with minimal interaction from an end user. Upon receipt of an instruction to initiate cloud access, the storage system management application enrolls a cloud tethering subsystem and establishes a secure communication channel to the cloud tethering subsystem. The storage system management application also creates a cloud protection environment within the operating system for use by the cloud tethering subsystem, and registers the storage system to the cloud tethering subsystem. The storage system management application also creates external network interfaces on the cloud tethering subsystem and configures one or more private cloud provider endpoints on the cloud tethering subsystem.
    Type: Application
    Filed: September 27, 2020
    Publication date: March 31, 2022
    Inventors: Deepak Vokaliga, Francisco Aquino, Warren Fleury, Kenneth Byrne
  • Publication number: 20220100776
    Abstract: A SSMA (Storage System Management Application) automates creation of a cloud provider on a cloud repository. The SSMA instructs a CTS (Cloud Tethering Subsystem) to create the cloud provider, which causes the CTS to establish a secure connection to the cloud repository. The cloud repository creates the cloud provider and returns identifying information. The CTS then tests the connection to verify that the cloud provider is reachable at the cloud repository. The SSMA also instruct a solution enabler to install the cloud provider in the storage system embedded operating system. The SSMA also implements a cloud provider synchronization verification process, which enables the SSMA to determine if there are any differences between lists of cloud providers maintained by the CTS and the embedded operating system. If any differences are detected, the SSMA automates the process of installing the correct set of cloud providers in the storage system embedded operating system.
    Type: Application
    Filed: September 27, 2020
    Publication date: March 31, 2022
    Inventors: Deepak Vokaliga, Kenneth Byrne, Warren Fleury, Thiago Santos
  • Publication number: 20210248007
    Abstract: A request manager analyzes API calls from a client to a host application for state and performance information. If current utilization of host application processing or memory footprint resources exceed predetermined levels, then the incoming API call is not forwarded to the application. If current utilization of the host application processing and memory resources do not exceed the predetermined levels, then the request manager quantifies the processing or memory resources required to report the requested information and determines whether projected utilization of the host application processing or memory resources inclusive of the resources required to report the requested information exceed predetermined levels. If the predetermined levels are not exceeded, then the request manager forwards the API call to the application for processing. The request manager may implement a limited number of retries if the predetermined levels are exceeded.
    Type: Application
    Filed: February 10, 2020
    Publication date: August 12, 2021
    Applicant: EMC IP HOLDING COMPANY LLC
    Inventors: Aidan Hally, Paul Mcsweeney, Kenneth Byrne
  • Publication number: 20200311280
    Abstract: Techniques are provided for intrusion detection on a computer system. In an example, a computer host device is configured to access data storage of the computer system via a communications network. It can be determined that the computer host device is behaving anomalously because a first current access by the computer host device to the data storage deviates from a second expected access by the computer host device to the data storage by more than a predefined amount. Then, in response to determining that the computer host device is behaving anomalously, the computer system can mitigate against the computer host device behaving anomalously.
    Type: Application
    Filed: March 28, 2019
    Publication date: October 1, 2020
    Inventor: Kenneth Byrne
  • Patent number: 6015248
    Abstract: A wood coring drill bit comprising a hollow tube having an internal bore (103) and an exterior (100) with equally spaced bodies (10) of substantially uniform width extending in a helical manner from a cutting end (10) of said drill bit, said bodies (10) defining equally spaced flutes (15) between the edges of adjacent bodies (10), each body (10) comprising a land (20) upstanding from a relief (21) at the leading edge of the body (10), a respective cutting face (12) and associated lip (25) being formed at the end of each body (10) at said cutting end. The wood coring drill bit is characterized by having three equally spaced bodies (10) and flutes (15) said cutting face (12) has an included angle which is preferably 125.degree. for hardwood and drywood and 112.degree. for softwood. The lip (25) has a lip clearance angle that is about 6.degree..+-.1.degree. , the lands (20) on the bodies (10) extend for an axial distance of about 65 mm.+-.
    Type: Grant
    Filed: September 1, 1998
    Date of Patent: January 18, 2000
    Assignee: Commonwealth Scientific and Industrial Research Organisation
    Inventors: Terrence Charles Elliott, Gary John Nevill, Ian Kenneth Byrne, Anthony Mason Adams, M Lyle Courtney, David Spencer