Patents by Inventor Alexei Kojenov
Alexei Kojenov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230093470Abstract: Methods and systems for account authorization mapping are described. An application server may transmit one or more authorization requests to one or more authorization entities associated with one or more applications. The application server may receive one or more access tokens associated with the one or more applications and may store one or more indications of authorization. The application server may further associate, at the authorization management entity, the one or more indications of authorization.Type: ApplicationFiled: June 24, 2022Publication date: March 23, 2023Inventors: Thomas Charles Dvornik, Alexei Kojenov, Qingqing Liu
-
Patent number: 8630982Abstract: A method for restoring an object comprises receiving a request to restore an object. Also, the method includes outputting a representation of available backup files and receiving a selection of at least one of the available backup files. Further, the method comprises restoring at least one of the selected backup files into a temporary location and mounting at least one of the restored backup files as a server. In addition, the method includes outputting a representation of available objects from the server and receiving a selection of at least one of the available objects to be restored from the server. Also, the method includes copying one or more selected objects from the server into an Active Directory.Type: GrantFiled: June 21, 2012Date of Patent: January 14, 2014Assignee: International Business Machines CorporationInventors: Bryan Wayne Freeman, Alexei Kojenov, Joanne T. Nguyen, Delbert Barron Hoobler, III
-
Patent number: 8494167Abstract: The present invention provides a computer implemented method, data processing system, and computer program product to restore an encrypted file. A computer receives a command to restore an encrypted file, wherein the encrypted file was previously backed up. The computer identifies a user associated with the encrypted file. The computer looks up a first keystore of the user based on the user, the first keystore having an active private key. The computer determines that a public key of the encrypted file fails to match an active public key of the first keystore. The computer restores a second keystore of the user to form a restored private key, wherein the second keystore was previously backed up. The computer responsive to a determination that the public key of the encrypted file fails to match the active public key of the first keystore, decrypts the encrypted file encryption key based on the restored private key to form a file encryption key.Type: GrantFiled: October 30, 2007Date of Patent: July 23, 2013Assignee: International Business Machines CorporationInventors: Neeta Garimella, Alexei Kojenov, Shawn P. Mullen, Ravi A. Shankar, John Viksne
-
Patent number: 8453257Abstract: The various embodiments of the present invention include techniques for securing the use of data deduplication activities occurring in a source-deduplicating storage management system. These techniques are intended to prevent fake data backup, target data contamination, and data spoofing attacks initiated by a source. In one embodiment, one technique includes limiting chunk querying to authorized users. Another technique provides detection of attacks and unauthorized access to keys within the target system. Additional techniques include the combination of validating the existence of data from the source by validating the data chunk, validating a data sample of the data chunk, or validating a hash value of the data chunk. A further embodiment involves the use of policies to provide authorization levels for chunk sharing and linking within the target. These techniques separately and in combination provide a comprehensive strategy to avoid unauthorized access to data within the target storage system.Type: GrantFiled: August 14, 2009Date of Patent: May 28, 2013Assignee: International Business Machines CorporationInventors: Matthew J. Anglin, David M. Cannon, Avishai H. Hochberg, Alexei Kojenov, James P. Smith, Mark L. Yakushev
-
Publication number: 20120265733Abstract: A method for restoring an object comprises receiving a request to restore an object. Also, the method includes outputting a representation of available backup files and receiving a selection of at least one of the available backup files. Further, the method comprises restoring at least one of the selected backup files into a temporary location and mounting at least one of the restored backup files as a server. In addition, the method includes outputting a representation of available objects from the server and receiving a selection of at least one of the available objects to be restored from the server. Also, the method includes copying one or more selected objects from the server into an Active Directory.Type: ApplicationFiled: June 21, 2012Publication date: October 18, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bryan Wayne Freeman, Alexei Kojenov, Joanne T. Nguyen, Delbert Barron Hoobler, III
-
Patent number: 8285680Abstract: A method for restoring an object comprises receiving a request to restore an object. Also, the method includes outputting a representation of available backup files and receiving a selection of at least one of the available backup files. Further, the method comprises restoring at least one of the selected backup files into a temporary location and mounting at least one of the restored backup files as a server. In addition, the method includes outputting a representation of available objects from the server and receiving a selection of at least one of the available objects to be restored from the server. Also, the method includes copying one or more selected objects from the server into an Active Directory.Type: GrantFiled: January 8, 2009Date of Patent: October 9, 2012Assignee: International Business Machines CorporationInventors: Bryan Wayne Freeman, Alexei Kojenov, Joanne T. Nguyen, Delbert Barron Hoobler, III
-
Patent number: 8086572Abstract: Provided is a method, system and program for backing up the contents of a source storage device as an object in a data storage subsystem wherein the object contains image data representing the contents of the source storage device, and restoring the contents of the source storage device from the object to a file such as a flat file. The contents of the file may be copied to a target storage device to restore the contents of the source storage device from the file to the target storage device which may be the source storage device or another target storage device.Type: GrantFiled: March 30, 2004Date of Patent: December 27, 2011Assignee: International Business Machines CorporationInventors: Alexei Kojenov, Omar Bond Vargas
-
Patent number: 8041676Abstract: File system objects of unknown type are backed up and restored. A list of file system objects is received from a file system. The file system objects are to be backed up. For each file system object that has a file type that is unknown, the following is performed. First, the file system is queried to obtain information regarding the file system object that is sufficient for the file system to later recreate the file system object if necessary. Second, the file system object and the information regarding the file system object are stored. Examples of file system object types of the file system that may be unknown to an application running on a Microsoft Windows® operating system include symbolic links, named pipes, and special device files.Type: GrantFiled: December 2, 2005Date of Patent: October 18, 2011Assignee: International Business Machines CorporationInventors: Malahal R. Naineni, Ninad S. Palsule, Alexei Kojenov, Venkateswararao Jujjuri, James J. Seeger, Jr.
-
Publication number: 20110040732Abstract: The various embodiments of the present invention include techniques for securing the use of data deduplication activities occurring in a source-deduplicating storage management system. These techniques are intended to prevent fake data backup, target data contamination, and data spoofing attacks initiated by a source. In one embodiment, one technique includes limiting chunk querying to authorized users. Another technique provides detection of attacks and unauthorized access to keys within the target system. Additional techniques include the combination of validating the existence of data from the source by validating the data chunk, validating a data sample of the data chunk, or validating a hash value of the data chunk. A further embodiment involves the use of policies to provide authorization levels for chunk sharing and linking within the target. These techniques separately and in combination provide a comprehensive strategy to avoid unauthorized access to data within the target storage system.Type: ApplicationFiled: August 14, 2009Publication date: February 17, 2011Applicant: International Business Machines CorporationInventors: Matthew J. Anglin, David M. Cannon, Avishai H. Hochberg, Alexei Kojenov, James P. Smith, Mark L. Yakushev
-
Publication number: 20100174683Abstract: A method for restoring an object comprises receiving a request to restore an object. Also, the method includes outputting a representation of available backup files and receiving a selection of at least one of the available backup files. Further, the method comprises restoring at least one of the selected backup files into a temporary location and mounting at least one of the restored backup files as a server. In addition, the method includes outputting a representation of available objects from the server and receiving a selection of at least one of the available objects to be restored from the server. Also, the method includes copying one or more selected objects from the server into an Active Directory.Type: ApplicationFiled: January 8, 2009Publication date: July 8, 2010Inventors: Bryan Wayne Freeman, Alexei Kojenov, Joanne T. Nguyen, Delbert Barron Hoobler, III
-
Patent number: 7660836Abstract: Provided are techniques for determining whether content of an object has changed. Under control of a backup system, opaque object attributes and a data identifier are received, wherein the data identifier is generated based on one or more relevant object attributes of the opaque object attributes that indicate whether at least one of the content of the object and one or more of the relevant object attributes has changed. The received data identifier is compared with a previously stored data identifier. In response to determining that the received data identifier and the previously stored data identifier do not match, it is determined that the content of the object has changed.Type: GrantFiled: March 9, 2006Date of Patent: February 9, 2010Assignee: International Business Machines CorporationInventors: Christian Bolik, Venkateswararao Jujjuri, Alexei Kojenov, Malahal R. Naineni, Ninad S. Palsule, James John Seeger, James Patrick Smith, Jason Christopher Young
-
Publication number: 20090110198Abstract: The present invention provides a computer implemented method, data processing system, and computer program product to restore an encrypted file. A computer receives a command to restore an encrypted file, wherein the encrypted file was previously backed up. The computer identifies a user associated with the encrypted file. The computer looks up a first keystore of the user based on the user, the first keystore having an active private key. The computer determines that a public key of the encrypted file fails to match an active public key of the first keystore. The computer restores a second keystore of the user to form a restored private key, wherein the second keystore was previously backed up. The computer responsive to a determination that the public key of the encrypted file fails to match the active public key of the first keystore, decrypts the encrypted file encryption key based on the restored private key to form a file encryption key.Type: ApplicationFiled: October 30, 2007Publication date: April 30, 2009Inventors: Neeta Garimella, Alexei Kojenov, Shawn P. Mullen, Ravi A. Shankar, John Viksne
-
Publication number: 20070214197Abstract: Provided are techniques for determining whether content of an object has changed. Under control of a backup system, opaque object attributes and a data identifier are received, wherein the data identifier is generated based on one or more relevant object attributes of the opaque object attributes that indicate whether at least one of the content of the object and one or more of the relevant object attributes has changed. The received data identifier is compared with a previously stored data identifier. In response to determining that the received data identifier and the previously stored data identifier do not match, it is determined that the content of the object has changed.Type: ApplicationFiled: March 9, 2006Publication date: September 13, 2007Inventors: Christian Bolik, Venkateswararao Jujjuri, Alexei Kojenov, Malahal Naineni, Ninad Palsule, James Seeger, James Smith, Jason Young
-
Publication number: 20070130230Abstract: File system objects of unknown type are backed up and restored. A list of file system objects is received from a file system. The file system objects are to be backed up. For each file system object that has a file type that is unknown, the following is performed. First, the file system is queried to obtain information regarding the file system object that is sufficient for the file system to later recreate the file system object if necessary. Second, the file system object and the information regarding the file system object are stored. Examples of file system object types of the file system that may be unknown to an application running on a Microsoft Windows® operating system include symbolic links, named pipes, and special device files.Type: ApplicationFiled: December 2, 2005Publication date: June 7, 2007Inventors: Malahal Naineni, Ninad Palsule, Alexei Kojenov, Venkateswararao Jujjuri, James Seeger
-
Patent number: 6988179Abstract: Disclosed is a method, system, and program for ordering data. Portions of a logical volume are matched with portions of one or more physical extents. The one or more physical extents are ordered according to the order of the matched portions of the logical volume.Type: GrantFiled: April 7, 2003Date of Patent: January 17, 2006Assignee: International Business Machines CorporationInventors: Christian Bolik, Alexei Kojenov
-
Publication number: 20050229031Abstract: Provided is a method, system and program for backing up the contents of a source storage device as an object in a data storage subsystem wherein the object contains image data representing the contents of the source storage device, and restoring the contents of the source storage device from the object to a file such as a flat file. The contents of the file may be copied to a target storage device to restore the contents of the source storage device from the file to the target storage device which may be the source storage device or another target storage device.Type: ApplicationFiled: March 30, 2004Publication date: October 13, 2005Inventors: Alexei Kojenov, Omar Vargas
-
Patent number: 6938136Abstract: Provided are a method, system, and program for performing an Input/Output (I/O) operation with respect to a logical device capable of being accessed by multiple host systems. Metadata in the logical device that is required in order to access the data in the logical device is overwritten to prevent at least one host system from accessing the data in the logical device represented by the overwritten metadata. An I/O operation is performed with respect to the logical device. Valid metadata is written to the logical device to enable host systems to access the data in the logical device represented by the metadata.Type: GrantFiled: July 14, 2003Date of Patent: August 30, 2005Assignee: International Business Machines CorporationInventors: Neeta Garimella, Alexei Kojenov
-
Publication number: 20050015415Abstract: Provided are a method, system, and program for performing an Input/Output (I/O) operation with respect to a logical device capable of being accessed by multiple host systems. Metadata in the logical device that is required in order to access the data in the logical device is overwritten to prevent at least one host system from accessing the data in the logical device represented by the overwritten metadata. An I/O operation is performed with respect to the logical device. Valid metadata is written to the logical device to enable host systems to access the data in the logical device represented by the metadata.Type: ApplicationFiled: July 14, 2003Publication date: January 20, 2005Inventors: Neeta Garimella, Alexei Kojenov
-
Publication number: 20040199744Abstract: Disclosed is a method, system, and program for ordering data. Portions of a logical volume are matched with portions of one or more physical extents. The one or more physical extents are ordered according to the order of the matched portions of the logical volume.Type: ApplicationFiled: April 7, 2003Publication date: October 7, 2004Applicant: International Business Machines CorporationInventors: Christian Bolik, Alexei Kojenov