Patents by Inventor Alexei Kojenov

Alexei Kojenov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230093470
    Abstract: Methods and systems for account authorization mapping are described. An application server may transmit one or more authorization requests to one or more authorization entities associated with one or more applications. The application server may receive one or more access tokens associated with the one or more applications and may store one or more indications of authorization. The application server may further associate, at the authorization management entity, the one or more indications of authorization.
    Type: Application
    Filed: June 24, 2022
    Publication date: March 23, 2023
    Inventors: Thomas Charles Dvornik, Alexei Kojenov, Qingqing Liu
  • Patent number: 8630982
    Abstract: A method for restoring an object comprises receiving a request to restore an object. Also, the method includes outputting a representation of available backup files and receiving a selection of at least one of the available backup files. Further, the method comprises restoring at least one of the selected backup files into a temporary location and mounting at least one of the restored backup files as a server. In addition, the method includes outputting a representation of available objects from the server and receiving a selection of at least one of the available objects to be restored from the server. Also, the method includes copying one or more selected objects from the server into an Active Directory.
    Type: Grant
    Filed: June 21, 2012
    Date of Patent: January 14, 2014
    Assignee: International Business Machines Corporation
    Inventors: Bryan Wayne Freeman, Alexei Kojenov, Joanne T. Nguyen, Delbert Barron Hoobler, III
  • Patent number: 8494167
    Abstract: The present invention provides a computer implemented method, data processing system, and computer program product to restore an encrypted file. A computer receives a command to restore an encrypted file, wherein the encrypted file was previously backed up. The computer identifies a user associated with the encrypted file. The computer looks up a first keystore of the user based on the user, the first keystore having an active private key. The computer determines that a public key of the encrypted file fails to match an active public key of the first keystore. The computer restores a second keystore of the user to form a restored private key, wherein the second keystore was previously backed up. The computer responsive to a determination that the public key of the encrypted file fails to match the active public key of the first keystore, decrypts the encrypted file encryption key based on the restored private key to form a file encryption key.
    Type: Grant
    Filed: October 30, 2007
    Date of Patent: July 23, 2013
    Assignee: International Business Machines Corporation
    Inventors: Neeta Garimella, Alexei Kojenov, Shawn P. Mullen, Ravi A. Shankar, John Viksne
  • Patent number: 8453257
    Abstract: The various embodiments of the present invention include techniques for securing the use of data deduplication activities occurring in a source-deduplicating storage management system. These techniques are intended to prevent fake data backup, target data contamination, and data spoofing attacks initiated by a source. In one embodiment, one technique includes limiting chunk querying to authorized users. Another technique provides detection of attacks and unauthorized access to keys within the target system. Additional techniques include the combination of validating the existence of data from the source by validating the data chunk, validating a data sample of the data chunk, or validating a hash value of the data chunk. A further embodiment involves the use of policies to provide authorization levels for chunk sharing and linking within the target. These techniques separately and in combination provide a comprehensive strategy to avoid unauthorized access to data within the target storage system.
    Type: Grant
    Filed: August 14, 2009
    Date of Patent: May 28, 2013
    Assignee: International Business Machines Corporation
    Inventors: Matthew J. Anglin, David M. Cannon, Avishai H. Hochberg, Alexei Kojenov, James P. Smith, Mark L. Yakushev
  • Publication number: 20120265733
    Abstract: A method for restoring an object comprises receiving a request to restore an object. Also, the method includes outputting a representation of available backup files and receiving a selection of at least one of the available backup files. Further, the method comprises restoring at least one of the selected backup files into a temporary location and mounting at least one of the restored backup files as a server. In addition, the method includes outputting a representation of available objects from the server and receiving a selection of at least one of the available objects to be restored from the server. Also, the method includes copying one or more selected objects from the server into an Active Directory.
    Type: Application
    Filed: June 21, 2012
    Publication date: October 18, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Bryan Wayne Freeman, Alexei Kojenov, Joanne T. Nguyen, Delbert Barron Hoobler, III
  • Patent number: 8285680
    Abstract: A method for restoring an object comprises receiving a request to restore an object. Also, the method includes outputting a representation of available backup files and receiving a selection of at least one of the available backup files. Further, the method comprises restoring at least one of the selected backup files into a temporary location and mounting at least one of the restored backup files as a server. In addition, the method includes outputting a representation of available objects from the server and receiving a selection of at least one of the available objects to be restored from the server. Also, the method includes copying one or more selected objects from the server into an Active Directory.
    Type: Grant
    Filed: January 8, 2009
    Date of Patent: October 9, 2012
    Assignee: International Business Machines Corporation
    Inventors: Bryan Wayne Freeman, Alexei Kojenov, Joanne T. Nguyen, Delbert Barron Hoobler, III
  • Patent number: 8086572
    Abstract: Provided is a method, system and program for backing up the contents of a source storage device as an object in a data storage subsystem wherein the object contains image data representing the contents of the source storage device, and restoring the contents of the source storage device from the object to a file such as a flat file. The contents of the file may be copied to a target storage device to restore the contents of the source storage device from the file to the target storage device which may be the source storage device or another target storage device.
    Type: Grant
    Filed: March 30, 2004
    Date of Patent: December 27, 2011
    Assignee: International Business Machines Corporation
    Inventors: Alexei Kojenov, Omar Bond Vargas
  • Patent number: 8041676
    Abstract: File system objects of unknown type are backed up and restored. A list of file system objects is received from a file system. The file system objects are to be backed up. For each file system object that has a file type that is unknown, the following is performed. First, the file system is queried to obtain information regarding the file system object that is sufficient for the file system to later recreate the file system object if necessary. Second, the file system object and the information regarding the file system object are stored. Examples of file system object types of the file system that may be unknown to an application running on a Microsoft Windows® operating system include symbolic links, named pipes, and special device files.
    Type: Grant
    Filed: December 2, 2005
    Date of Patent: October 18, 2011
    Assignee: International Business Machines Corporation
    Inventors: Malahal R. Naineni, Ninad S. Palsule, Alexei Kojenov, Venkateswararao Jujjuri, James J. Seeger, Jr.
  • Publication number: 20110040732
    Abstract: The various embodiments of the present invention include techniques for securing the use of data deduplication activities occurring in a source-deduplicating storage management system. These techniques are intended to prevent fake data backup, target data contamination, and data spoofing attacks initiated by a source. In one embodiment, one technique includes limiting chunk querying to authorized users. Another technique provides detection of attacks and unauthorized access to keys within the target system. Additional techniques include the combination of validating the existence of data from the source by validating the data chunk, validating a data sample of the data chunk, or validating a hash value of the data chunk. A further embodiment involves the use of policies to provide authorization levels for chunk sharing and linking within the target. These techniques separately and in combination provide a comprehensive strategy to avoid unauthorized access to data within the target storage system.
    Type: Application
    Filed: August 14, 2009
    Publication date: February 17, 2011
    Applicant: International Business Machines Corporation
    Inventors: Matthew J. Anglin, David M. Cannon, Avishai H. Hochberg, Alexei Kojenov, James P. Smith, Mark L. Yakushev
  • Publication number: 20100174683
    Abstract: A method for restoring an object comprises receiving a request to restore an object. Also, the method includes outputting a representation of available backup files and receiving a selection of at least one of the available backup files. Further, the method comprises restoring at least one of the selected backup files into a temporary location and mounting at least one of the restored backup files as a server. In addition, the method includes outputting a representation of available objects from the server and receiving a selection of at least one of the available objects to be restored from the server. Also, the method includes copying one or more selected objects from the server into an Active Directory.
    Type: Application
    Filed: January 8, 2009
    Publication date: July 8, 2010
    Inventors: Bryan Wayne Freeman, Alexei Kojenov, Joanne T. Nguyen, Delbert Barron Hoobler, III
  • Patent number: 7660836
    Abstract: Provided are techniques for determining whether content of an object has changed. Under control of a backup system, opaque object attributes and a data identifier are received, wherein the data identifier is generated based on one or more relevant object attributes of the opaque object attributes that indicate whether at least one of the content of the object and one or more of the relevant object attributes has changed. The received data identifier is compared with a previously stored data identifier. In response to determining that the received data identifier and the previously stored data identifier do not match, it is determined that the content of the object has changed.
    Type: Grant
    Filed: March 9, 2006
    Date of Patent: February 9, 2010
    Assignee: International Business Machines Corporation
    Inventors: Christian Bolik, Venkateswararao Jujjuri, Alexei Kojenov, Malahal R. Naineni, Ninad S. Palsule, James John Seeger, James Patrick Smith, Jason Christopher Young
  • Publication number: 20090110198
    Abstract: The present invention provides a computer implemented method, data processing system, and computer program product to restore an encrypted file. A computer receives a command to restore an encrypted file, wherein the encrypted file was previously backed up. The computer identifies a user associated with the encrypted file. The computer looks up a first keystore of the user based on the user, the first keystore having an active private key. The computer determines that a public key of the encrypted file fails to match an active public key of the first keystore. The computer restores a second keystore of the user to form a restored private key, wherein the second keystore was previously backed up. The computer responsive to a determination that the public key of the encrypted file fails to match the active public key of the first keystore, decrypts the encrypted file encryption key based on the restored private key to form a file encryption key.
    Type: Application
    Filed: October 30, 2007
    Publication date: April 30, 2009
    Inventors: Neeta Garimella, Alexei Kojenov, Shawn P. Mullen, Ravi A. Shankar, John Viksne
  • Publication number: 20070214197
    Abstract: Provided are techniques for determining whether content of an object has changed. Under control of a backup system, opaque object attributes and a data identifier are received, wherein the data identifier is generated based on one or more relevant object attributes of the opaque object attributes that indicate whether at least one of the content of the object and one or more of the relevant object attributes has changed. The received data identifier is compared with a previously stored data identifier. In response to determining that the received data identifier and the previously stored data identifier do not match, it is determined that the content of the object has changed.
    Type: Application
    Filed: March 9, 2006
    Publication date: September 13, 2007
    Inventors: Christian Bolik, Venkateswararao Jujjuri, Alexei Kojenov, Malahal Naineni, Ninad Palsule, James Seeger, James Smith, Jason Young
  • Publication number: 20070130230
    Abstract: File system objects of unknown type are backed up and restored. A list of file system objects is received from a file system. The file system objects are to be backed up. For each file system object that has a file type that is unknown, the following is performed. First, the file system is queried to obtain information regarding the file system object that is sufficient for the file system to later recreate the file system object if necessary. Second, the file system object and the information regarding the file system object are stored. Examples of file system object types of the file system that may be unknown to an application running on a Microsoft Windows® operating system include symbolic links, named pipes, and special device files.
    Type: Application
    Filed: December 2, 2005
    Publication date: June 7, 2007
    Inventors: Malahal Naineni, Ninad Palsule, Alexei Kojenov, Venkateswararao Jujjuri, James Seeger
  • Patent number: 6988179
    Abstract: Disclosed is a method, system, and program for ordering data. Portions of a logical volume are matched with portions of one or more physical extents. The one or more physical extents are ordered according to the order of the matched portions of the logical volume.
    Type: Grant
    Filed: April 7, 2003
    Date of Patent: January 17, 2006
    Assignee: International Business Machines Corporation
    Inventors: Christian Bolik, Alexei Kojenov
  • Publication number: 20050229031
    Abstract: Provided is a method, system and program for backing up the contents of a source storage device as an object in a data storage subsystem wherein the object contains image data representing the contents of the source storage device, and restoring the contents of the source storage device from the object to a file such as a flat file. The contents of the file may be copied to a target storage device to restore the contents of the source storage device from the file to the target storage device which may be the source storage device or another target storage device.
    Type: Application
    Filed: March 30, 2004
    Publication date: October 13, 2005
    Inventors: Alexei Kojenov, Omar Vargas
  • Patent number: 6938136
    Abstract: Provided are a method, system, and program for performing an Input/Output (I/O) operation with respect to a logical device capable of being accessed by multiple host systems. Metadata in the logical device that is required in order to access the data in the logical device is overwritten to prevent at least one host system from accessing the data in the logical device represented by the overwritten metadata. An I/O operation is performed with respect to the logical device. Valid metadata is written to the logical device to enable host systems to access the data in the logical device represented by the metadata.
    Type: Grant
    Filed: July 14, 2003
    Date of Patent: August 30, 2005
    Assignee: International Business Machines Corporation
    Inventors: Neeta Garimella, Alexei Kojenov
  • Publication number: 20050015415
    Abstract: Provided are a method, system, and program for performing an Input/Output (I/O) operation with respect to a logical device capable of being accessed by multiple host systems. Metadata in the logical device that is required in order to access the data in the logical device is overwritten to prevent at least one host system from accessing the data in the logical device represented by the overwritten metadata. An I/O operation is performed with respect to the logical device. Valid metadata is written to the logical device to enable host systems to access the data in the logical device represented by the metadata.
    Type: Application
    Filed: July 14, 2003
    Publication date: January 20, 2005
    Inventors: Neeta Garimella, Alexei Kojenov
  • Publication number: 20040199744
    Abstract: Disclosed is a method, system, and program for ordering data. Portions of a logical volume are matched with portions of one or more physical extents. The one or more physical extents are ordered according to the order of the matched portions of the logical volume.
    Type: Application
    Filed: April 7, 2003
    Publication date: October 7, 2004
    Applicant: International Business Machines Corporation
    Inventors: Christian Bolik, Alexei Kojenov