Patents by Inventor Mark V. Chitti

Mark V. Chitti has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10833854
    Abstract: Generating a secondary security key from a primary security key is provided. A first numeric code that is an alternate numeric representation of a first character in a primary security key is added to a second numeric code that is an alternate numeric representation of a second character in the primary security key to generate a running total value. The running total value is automatically designated as a secondary security key such that the primary security key is transformed into the secondary security key that is usable for encrypting data to provide a more secure computer system. The data is encrypted with the secondary security key.
    Type: Grant
    Filed: May 21, 2019
    Date of Patent: November 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Mark V. Chitti, Kirby G. Dahman, Ronda L. McCain, Kurt A. Rybczyk, Keith C. Williams
  • Patent number: 10608952
    Abstract: Resource configuration to exploit elastic network capability is provided by establishing an elastic network bandwidth allocation level to provide for an application for transfer of data between the application and an elastic network, the application hosted at a data center, then dynamically configuring, for the application, elastic network bandwidth allocation from the network service provider in accordance with the established elastic network bandwidth allocation level, and allocating storage resources of the data center for the application and processing resources of the data center for the application, the allocating being based on the established elastic network bandwidth allocation level and providing storage resources and processing resources to operate at a level commensurate with the established elastic network bandwidth allocation level.
    Type: Grant
    Filed: November 28, 2017
    Date of Patent: March 31, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark V. Chitti, Douglas M. Freimuth, John F. Hollingsworth, Baiju D. Mandalia
  • Publication number: 20190274037
    Abstract: Generating a secondary security key from a primary security key is provided. A first numeric code that is an alternate numeric representation of a first character in a primary security key is added to a second numeric code that is an alternate numeric representation of a second character in the primary security key to generate a running total value. The running total value is automatically designated as a secondary security key such that the primary security key is transformed into the secondary security key that is usable for encrypting data to provide a more secure computer system. The data is encrypted with the secondary security key.
    Type: Application
    Filed: May 21, 2019
    Publication date: September 5, 2019
    Inventors: Mark V. Chitti, Kirby G. Dahman, Ronda L. McCain, Kurt A. Rybczyk, Keith C. Williams
  • Patent number: 10382952
    Abstract: A method, system, and/or computer program product generate a secondary security key from a primary security key. One or more processors, receive a primary security key. The processor(s) retrieve a first numeric code that is an alternate numeric representation of a first character in the primary security key. The processor(s) retrieve a second numeric code that is an alternate numeric representation of a second character in the primary security key. The processor(s) add the first numeric code to the second numeric code to generate a running total value. The processor(s) designate the running total value as a secondary security key, and encrypt data with the secondary security key.
    Type: Grant
    Filed: May 19, 2016
    Date of Patent: August 13, 2019
    Assignee: International Business Machines Corporation
    Inventors: Mark V. Chitti, Kirby G. Dahman, Ronda L. McCain, Kurt A. Rybczyk, Keith C. Williams
  • Patent number: 10216441
    Abstract: Dynamic quality of service for storage I/O port allocation is provided by obtaining indications of anticipated demand on a plurality of storage ports of a storage device of a data center, the anticipated demand being at least in part for storage input/output supporting transfer of data to or from a network, and dynamically adjusting storage port allocations based on the indications of anticipated demand and on real-time evaluation of workloads being serviced by the plurality of storage ports.
    Type: Grant
    Filed: November 25, 2015
    Date of Patent: February 26, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark V. Chitti, Douglas M. Freimuth, John F. Hollingsworth, Baiju D. Mandalia
  • Patent number: 10177993
    Abstract: Event-based data transfer scheduling using elastic network optimization criteria is provided. Bandwidth optimization criteria corresponding to different types of data transfer event scenarios are maintained, and based on recognizing a data transfer event scenario, a bandwidth optimization criteria is selected based on a type of the data transfer event scenario. A schedule for transferring data from a source to a target across the elastic network is determined according to the selected bandwidth optimization criteria, and the elastic network is used in transferring the data to the target storage location, where the using includes dynamically configuring elastic network bandwidth allocation from an elastic network service provider and initiating transfer of the data to the target storage location according to the schedule.
    Type: Grant
    Filed: November 25, 2015
    Date of Patent: January 8, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark V. Chitti, Douglas M. Freimuth, John F. Hollingsworth, Baiju D. Mandalia
  • Patent number: 10057327
    Abstract: Controlled transfer of data over an elastic network is provided and includes analyzing properties of a set of data for transfer from a source storage location to a target storage location across an elastic cloud computing network as part of a staged transfer of the set of data, assigning transfer queue weightings to data subsets of the set of data based on weighting parameters, the transfer queue weightings dictating order of transfer of the data subsets from the source storage location to the target storage location, and controlling transfer of the data subsets from the source storage location to the target storage location consistent with the transfer queue weightings assigned to the data subsets, the controlling transfer including controlling, based on costs to transfer the data subsets, bandwidth allocation of the elastic cloud computing network and a transfer schedule for the data subsets.
    Type: Grant
    Filed: November 25, 2015
    Date of Patent: August 21, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark V. Chitti, Douglas M. Freimuth, John F. Hollingsworth, Baiju D. Mandalia
  • Publication number: 20180083888
    Abstract: Resource configuration to exploit elastic network capability is provided by establishing an elastic network bandwidth allocation level to provide for an application for transfer of data between the application and an elastic network, the application hosted at a data center, then dynamically configuring, for the application, elastic network bandwidth allocation from the network service provider in accordance with the established elastic network bandwidth allocation level, and allocating storage resources of the data center for the application and processing resources of the data center for the application, the allocating being based on the established elastic network bandwidth allocation level and providing storage resources and processing resources to operate at a level commensurate with the established elastic network bandwidth allocation level.
    Type: Application
    Filed: November 28, 2017
    Publication date: March 22, 2018
    Inventors: Mark V. CHITTI, Douglas M. FREIMUTH, John F. HOLLINGSWORTH, Baiju D. MANDALIA
  • Patent number: 9923839
    Abstract: Resource configuration to exploit elastic network capability is provided by establishing an elastic network bandwidth allocation level to provide for an application for transfer of data between the application and an elastic network, the application hosted at a data center, then dynamically configuring, for the application, elastic network bandwidth allocation from the network service provider in accordance with the established elastic network bandwidth allocation level, and allocating storage resources of the data center for the application and processing resources of the data center for the application, the allocating being based on the established elastic network bandwidth allocation level and providing storage resources and processing resources to operate at a level commensurate with the established elastic network bandwidth allocation level.
    Type: Grant
    Filed: November 25, 2015
    Date of Patent: March 20, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark V. Chitti, Douglas M. Freimuth, John F. Hollingsworth, Baiju D. Mandalia
  • Patent number: 9923784
    Abstract: Data transfer using flexible dynamic elastic network service provider relationships is provided. A relationship is dynamically established with an elastic network service provider of multiple available elastic network service providers to transfer a portion of the set of data to the target. Peering policies for each of the multiple elastic network service providers are checked, where a respective peering policy for each elastic network service provider includes respective bandwidth pricing information. Based on the bandwidth pricing information for each of the plurality of elastic network service providers, an elastic network service provider and a schedule are selected to use in transferring the portion to the target. The elastic network service provider is used in transferring the portion to the target, which includes dynamically configuring elastic network bandwidth allocation from the elastic network service provider and initiating transfer of the portion to the target according to the selected schedule.
    Type: Grant
    Filed: November 25, 2015
    Date of Patent: March 20, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark V. Chitti, Douglas M. Freimuth, John F. Hollingsworth, Baiju D. Mandalia
  • Patent number: 9923965
    Abstract: An approach is provided for managing an allocation of a bandwidth of a dedicated channel in a network being utilized by an application performing a replication of data from a first to a second storage resource. Checks of parameters specified by the application are determined. The parameters include, but are not limited to, average compression ratio, compression ratio trend, throughput, throughput trend, and round trip time. Respective high and low threshold values for the parameters are determined. At least one of the checks of the parameters is executed, which determines a violation of a threshold value for one of the parameters. If the violation of the high threshold value is determined, an increase in the bandwidth is triggered. If the violation of the low threshold value is determined, a decrease in the bandwidth is triggered.
    Type: Grant
    Filed: June 5, 2015
    Date of Patent: March 20, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark V. Chitti, Douglas M. Freimuth, John F. Hollingsworth, Baiju D. Mandalia
  • Publication number: 20170338953
    Abstract: A method, system, and/or computer program product generate a secondary security key from a primary security key. One or more processors, receive a primary security key. The processor(s) retrieve a first numeric code that is an alternate numeric representation of a first character in the primary security key. The processor(s) retrieve a second numeric code that is an alternate numeric representation of a second character in the primary security key. The processor(s) add the first numeric code to the second numeric code to generate a running total value. The processor(s) designate the running total value as a secondary security key, and encrypt data with the secondary security key.
    Type: Application
    Filed: May 19, 2016
    Publication date: November 23, 2017
    Inventors: MARK V. CHITTI, KIRBY G. DAHMAN, RONDA L. MCCAIN, KURT A. RYBCZYK, KEITH C. WILLIAMS
  • Patent number: 9807014
    Abstract: An approach for reactive throttling of heterogeneous migration sessions running concurrently in a virtualized cloud environment is disclosed. The heterogeneous migration sessions are characterized by several attributes such as the type of function performed by the migration session and the value that is attained by performing the migration session. An input/output (I/O) path to any resource in the virtualized cloud environment computing that is experiencing excessive resource congestion is identified. Bottlenecks along the I/O path are then determined. Virtual-to-physical resource mapping information of resources in the virtualized cloud computing environment are used to obtain a list of the heterogeneous migration sessions contributing to the bottlenecks along the identified I/O path.
    Type: Grant
    Filed: September 27, 2013
    Date of Patent: October 31, 2017
    Assignee: International Business Machines Corporation
    Inventors: Gabriel Alatorre, Eric K. Butler, Mark V. Chitti, James E. Olson, Aameek Singh, Yang Song
  • Patent number: 9723002
    Abstract: A computer-implemented method, system, and/or computer program product controls access to an appliance. A host system receives, from a client computer, appliance-specific user data that includes a user password, a user-created name of an appliance, a user identifier, and a network address of the client computer, and then concatenates the appliance-specific user data with a host name of the host system to create and store an Aggregate Identity Instance (AII) in the host system. The host system receives, from the client computer, a request to access the appliance, and determines whether appliance-specific user data sent with the request is in the AII in the host system. If so, then the host system matches the user-created name of the appliance to an address of the appliance; establishes a session between the client computer and the appliance; and uses the AII to encrypt and decrypt data.
    Type: Grant
    Filed: January 4, 2016
    Date of Patent: August 1, 2017
    Assignee: International Business Machines Corporation
    Inventors: Mark V. Chitti, Kirby G. Dahman, Ronda L. McCain, Kurt A. Rybczyk, Keith C. Williams
  • Publication number: 20170195328
    Abstract: A computer-implemented method, system, and/or computer program product controls access to an appliance. A host system receives, from a client computer, appliance-specific user data that includes a user password, a user-created name of an appliance, a user identifier, and a network address of the client computer, and then concatenates the appliance-specific user data with a host name of the host system to create and store an Aggregate Identity Instance (AII) in the host system. The host system receives, from the client computer, a request to access the appliance, and determines whether appliance-specific user data sent with the request is in the AII in the host system. If so, then the host system matches the user-created name of the appliance to an address of the appliance; establishes a session between the client computer and the appliance; and uses the AII to encrypt and decrypt data.
    Type: Application
    Filed: January 4, 2016
    Publication date: July 6, 2017
    Inventors: Mark V. Chitti, Kirby G. Dahman, Ronda McCain, Kurt A. Rybczyk, Keith C. Williams
  • Publication number: 20170147248
    Abstract: Dynamic quality of service for storage I/O port allocation is provided by obtaining indications of anticipated demand on a plurality of storage ports of a storage device of a data center, the anticipated demand being at least in part for storage input/output supporting transfer of data to or from a network, and dynamically adjusting storage port allocations based on the indications of anticipated demand and on real-time evaluation of workloads being serviced by the plurality of storage ports.
    Type: Application
    Filed: November 25, 2015
    Publication date: May 25, 2017
    Inventors: Mark V. CHITTI, Douglas M. FREIMUTH, John F. HOLLINGSWORTH, Baiju D. MANDALIA
  • Publication number: 20170149688
    Abstract: Resource configuration to exploit elastic network capability is provided by establishing an elastic network bandwidth allocation level to provide for an application for transfer of data between the application and an elastic network, the application hosted at a data center, then dynamically configuring, for the application, elastic network bandwidth allocation from the network service provider in accordance with the established elastic network bandwidth allocation level, and allocating storage resources of the data center for the application and processing resources of the data center for the application, the allocating being based on the established elastic network bandwidth allocation level and providing storage resources and processing resources to operate at a level commensurate with the established elastic network bandwidth allocation level.
    Type: Application
    Filed: November 25, 2015
    Publication date: May 25, 2017
    Inventors: Mark V. CHITTI, Douglas M. FREIMUTH, John F. HOLLINGSWORTH, Baiju D. MANDALIA
  • Publication number: 20170149863
    Abstract: Controlled transfer of data over an elastic network is provided and includes analyzing properties of a set of data for transfer from a source storage location to a target storage location across an elastic cloud computing network as part of a staged transfer of the set of data, assigning transfer queue weightings to data subsets of the set of data based on weighting parameters, the transfer queue weightings dictating order of transfer of the data subsets from the source storage location to the target storage location, and controlling transfer of the data subsets from the source storage location to the target storage location consistent with the transfer queue weightings assigned to the data subsets, the controlling transfer including controlling, based on costs to transfer the data subsets, bandwidth allocation of the elastic cloud computing network and a transfer schedule for the data subsets.
    Type: Application
    Filed: November 25, 2015
    Publication date: May 25, 2017
    Inventors: Mark V. CHITTI, Douglas M. FREIMUTH, John F. HOLLINGSWORTH, Baiju D. MANDALIA
  • Publication number: 20170149624
    Abstract: Event-based data transfer scheduling using elastic network optimization criteria is provided. Bandwidth optimization criteria corresponding to different types of data transfer event scenarios are maintained, and based on recognizing a data transfer event scenario, a bandwidth optimization criteria is selected based on a type of the data transfer event scenario. A schedule for transferring data from a source to a target across the elastic network is determined according to the selected bandwidth optimization criteria, and the elastic network is used in transferring the data to the target storage location, where the using includes dynamically configuring elastic network bandwidth allocation from an elastic network service provider and initiating transfer of the data to the target storage location according to the schedule.
    Type: Application
    Filed: November 25, 2015
    Publication date: May 25, 2017
    Inventors: Mark V. CHITTI, Douglas M. FREIMUTH, John F. HOLLINGSWORTH, Baiju D. MANDALIA
  • Publication number: 20170149625
    Abstract: Data transfer using flexible dynamic elastic network service provider relationships is provided. A relationship is dynamically established with an elastic network service provider of multiple available elastic network service providers to transfer a portion of the set of data to the target. Peering policies for each of the multiple elastic network service providers are checked, where a respective peering policy for each elastic network service provider includes respective bandwidth pricing information. Based on the bandwidth pricing information for each of the plurality of elastic network service providers, an elastic network service provider and a schedule are selected to use in transferring the portion to the target. The elastic network service provider is used in transferring the portion to the target, which includes dynamically configuring elastic network bandwidth allocation from the elastic network service provider and initiating transfer of the portion to the target according to the selected schedule.
    Type: Application
    Filed: November 25, 2015
    Publication date: May 25, 2017
    Inventors: Mark V. CHITTI, Douglas M. FREIMUTH, John F. HOLLINGSWORTH, Baiju D. MANDALIA