Patents by Inventor Terry Stokes

Terry Stokes has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11843630
    Abstract: Techniques can be implemented to provide for antivirus scanning in clustered storage where not all nodes of the cluster are connected to an antivirus server. A first computing node of computing nodes of a computing cluster can determine a status of an antivirus server. The first computing node can send a first indication of the status of the antivirus server to a group management protocol service of the computing cluster. The group management protocol service can send a second indication of whether the first computing node is available for antivirus scanning to a job engine of the computing cluster. The job engine can distribute an antivirus job among the computing nodes based on whether the first computing node is available for the antivirus scanning.
    Type: Grant
    Filed: April 8, 2021
    Date of Patent: December 12, 2023
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Terry Stokes, Teng Hong, Antony Richards
  • Publication number: 20220329607
    Abstract: Techniques can be implemented to provide for antivirus scanning in clustered storage where not all nodes of the cluster are connected to an antivirus server. A first computing node of computing nodes of a computing cluster can determine a status of an antivirus server. The first computing node can send a first indication of the status of the antivirus server to a group management protocol service of the computing cluster. The group management protocol service can send a second indication of whether the first computing node is available for antivirus scanning to a job engine of the computing cluster.
    Type: Application
    Filed: April 8, 2021
    Publication date: October 13, 2022
    Inventors: Terry Stokes, Teng Hong, Antony Richards
  • Publication number: 20080172563
    Abstract: A system and method for Write Once, Read Many (WORM) compliant storage is disclosed. A storage administrator in user space is employed as an interface between the kernel space WORM VFS and the user applications. The storage administrator accesses the WORM VFS through the operating system's Virtual File System. The WORM VFS comprises of three layers: a data encryption\compression layer, the WORM filesystem layer and a logical volume manager. The data encryption\compression layer preprocesses the data as it moves between from the user space and the WORM filesystem layer. The WORM filesystem layer stores the compressed and encrypted data on the physical disk drives in a specialized disk format. The logical volume manager manages the physical disk drives. A NVRAM journal aids in crash recovery.
    Type: Application
    Filed: January 15, 2008
    Publication date: July 17, 2008
    Inventor: Terry Stokes
  • Publication number: 20080172428
    Abstract: A system and method for Write Once, Read Many (WORM) compliant storage is disclosed. A storage administrator in user space is employed as an interface between the kernel space WORM VFS and the user applications. The storage administrator accesses the WORM VFS through the operating system's Virtual File System. The WORM VFS comprises of three layers: a data encryption\compression layer, the WORM filesystem layer and a logical volume manager. The data encryption\compression layer preprocesses the data as it moves between from the user space and the WORM filesystem layer. The WORM filesystem layer stores the compressed and encrypted data on the physical disk drives in a specialized disk format. The logical volume manager manages the physical disk drives. A NVRAM journal aids in crash recovery.
    Type: Application
    Filed: January 16, 2008
    Publication date: July 17, 2008
    Inventor: Terry Stokes
  • Publication number: 20080052284
    Abstract: A system and method for the capture and archival of electronic communication is disclosed. A network interface card in promiscuous mode connected to an electronic communications network is employed to capture network packets, which are reconstructed into the original electronic message. The electronic message is then hashed, parsed, analyzed and formatted for storage. The electronic message, in a structured format, is compressed and encrypted before being written to a storage unit based on the message hash. Meta Data information and keywords from the electronic message are written to an index database. Electronic messages can later be retrieved using a message query and retrieval component. A user created policy governs what electronic messages are captured, how those messages are stored and who can access them.
    Type: Application
    Filed: August 4, 2007
    Publication date: February 28, 2008
    Inventor: Terry Stokes
  • Publication number: 20080033905
    Abstract: A system and method for the capture and archival of electronic communication is disclosed. A network interface card in promiscuous mode connects the invention to an electronic communications network. Network packets are received on the network interface card and sent to a pseudo TCP/IP stack, which reconstructs the network packets into the original electronic message. The reconstructed electronic message is transferred to the traffic capture component in chunks until the entire message is captured. The traffic capture component forwards the electronic message to the message analysis component, which hashes, parses, analyzes and formats for storage the electronic message. The electronic message, in a structured format, is then sent to the storage manager component. The storage manager component selects a storage unit from the available network storage based on the message hash.
    Type: Application
    Filed: August 5, 2007
    Publication date: February 7, 2008
    Inventor: Terry Stokes
  • Publication number: 20080034049
    Abstract: A system and method for the capture and archival of electronic communication is disclosed. A network interface card in promiscuous mode connects the invention to an electronic communications network. Network packets are received on the network interface card and sent to a pseudo TCP/IP stack, which reconstructs the network packets into the original electronic message. The reconstructed electronic message is transferred to the traffic capture component in chunks until the entire message is captured. The traffic capture component forwards the electronic message to the message analysis component, which hashes, parses, analyzes and formats for storage the electronic message. The electronic message, in a structured format, is then sent to the storage manager component. The storage manager component selects a storage unit from the available network storage based on the message hash.
    Type: Application
    Filed: August 5, 2007
    Publication date: February 7, 2008
    Inventor: Terry Stokes