Patents by Inventor Amit H. Lamba
Amit H. Lamba has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11709815Abstract: A method for execution by a processing system includes determining to retrieve index data for a set of objects stored by an object storage system. An index type is selected from a plurality of index. A request message indicating a request for the index data of one of a plurality of indices stored by the object storage system corresponding to the index type is generated, and the request message is transmitted to the object storage system. The index data for the set of objects is received in a response message from the object storage system. The index data includes a plurality of pairs that each include a key and a value, where the keys correspond to the index type, and where the value of each pair includes metadata of one of the set of objects. The index data is stored in local memory in response to receiving the index data.Type: GrantFiled: July 15, 2019Date of Patent: July 25, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Harsha Hegde, Andrew D. Baptist, Amit H. Lamba
-
Patent number: 11163458Abstract: A method for execution by a computing device includes determining a set of actor parties required to authorize a change of protection status of a stored resource from a protected status to an unprotected status. A minimum quorum is determined for each of the set of actor parties. A plurality of authorizations to change the protection status of the resource to the unprotected status are received from a plurality of requestors via the network. A plurality of subsets of the plurality of requestors corresponding to the set of actor parties are identified. The protection status of the resource is set to the unprotected status in response to determining, for every one of the set of actor parties, that a number of requestors in a corresponding one of the plurality of subsets is greater than or equal to the minimum quorum for the one of the set of actor parties.Type: GrantFiled: September 16, 2019Date of Patent: November 2, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Amit H. Lamba, Mark D. Seaborn, Akila Srinivasan
-
Patent number: 11163457Abstract: A method for execution by a computing device includes determining a set of actor parties required to authorize a change of protection status of a stored resource from a protected status to an unprotected status. A minimum quorum is determined for each of the set of actor parties. A plurality of authorizations to change the protection status of the resource to the unprotected status are received from a plurality of requestors via the network. A plurality of subsets of the plurality of requestors corresponding to the set of actor parties are identified. The protection status of the resource is set to the unprotected status in response to determining, for every one of the set of actor parties, that a number of requestors in a corresponding one of the plurality of subsets is greater than or equal to the minimum quorum for the one of the set of actor parties.Type: GrantFiled: June 24, 2019Date of Patent: November 2, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Amit H. Lamba, Mark D. Seaborn, Akila Srinivasan
-
Patent number: 10931544Abstract: A computing device identifies and classify errors detected between the client application and the computing service, maintains service specific statistics across all communication points associated with the computing service, and stores the statistics within a metric data store. The computing device also provides an interface for introspecting the health of the computing service via metrics stored within the metric data store, monitors the health of the computing service via the metric data store, and assigns an operational state to the computing device based on metrics stored with the metric data store. The computing device then determines how to optimally route the client request based on the operational state of the computing service and routes the client request to the computing service via the optimal route.Type: GrantFiled: June 25, 2018Date of Patent: February 23, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Amit H. Lamba, Brian F. Ober
-
Patent number: 10901849Abstract: A method for execution by a dispersed storage and task (DST) processing unit includes queuing authorization requests, corresponding to received operation requests, in response to determining that first system utilization data indicates a first utilization level that compares unfavorably to a normal utilization threshold. A first batched authorization request that includes the queued authorization requests is generated for transmission to an Identity and Access Management (IAM) system in response to determining that the first request queue compares unfavorably to a first queue limit condition. A second queue limit condition that is different from the first queue limit condition is determined based on second system utilization data. A second batched authorization request that includes a second plurality of authorization requests of a second request queue is generated in response to determining that the second request queue compares unfavorably to the second queue limit condition.Type: GrantFiled: July 17, 2019Date of Patent: January 26, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Amit H. Lamba, Brian F. Ober
-
Publication number: 20210019298Abstract: A method for execution by a processing system includes determining to retrieve index data for a set of objects stored by an object storage system. An index type is selected from a plurality of index. A request message indicating a request for the index data of one of a plurality of indices stored by the object storage system corresponding to the index type is generated, and the request message is transmitted to the object storage system. The index data for the set of objects is received in a response message from the object storage system. The index data includes a plurality of pairs that each include a key and a value, where the keys correspond to the index type, and where the value of each pair includes metadata of one of the set of objects. The index data is stored in local memory in response to receiving the index data.Type: ApplicationFiled: July 15, 2019Publication date: January 21, 2021Inventors: Harsha Hegde, Andrew D. Baptist, Amit H. Lamba
-
Publication number: 20200401325Abstract: A method for execution by a computing device includes determining a set of actor parties required to authorize a change of protection status of a stored resource from a protected status to an unprotected status. A minimum quorum is determined for each of the set of actor parties. A plurality of authorizations to change the protection status of the resource to the unprotected status are received from a plurality of requestors via the network. A plurality of subsets of the plurality of requestors corresponding to the set of actor parties are identified. The protection status of the resource is set to the unprotected status in response to determining, for every one of the set of actor parties, that a number of requestors in a corresponding one of the plurality of subsets is greater than or equal to the minimum quorum for the one of the set of actor parties.Type: ApplicationFiled: September 16, 2019Publication date: December 24, 2020Inventors: Amit H. Lamba, Mark D. Seaborn, Akila Srinivasan
-
Publication number: 20200401324Abstract: A method for execution by a computing device includes determining a set of actor parties required to authorize a change of protection status of a stored resource from a protected status to an unprotected status. A minimum quorum is determined for each of the set of actor parties. A plurality of authorizations to change the protection status of the resource to the unprotected status are received from a plurality of requestors via the network. A plurality of subsets of the plurality of requestors corresponding to the set of actor parties are identified. The protection status of the resource is set to the unprotected status in response to determining, for every one of the set of actor parties, that a number of requestors in a corresponding one of the plurality of subsets is greater than or equal to the minimum quorum for the one of the set of actor parties.Type: ApplicationFiled: June 24, 2019Publication date: December 24, 2020Inventors: Amit H. Lamba, Mark D. Seaborn, Akila Srinivasan
-
Patent number: 10642521Abstract: A method begins with a computing device of a distributed storage network (DSN) being designated to process a write request from a Decentralized, or Distributed, Agreement Protocol (DAP) and continues with the computing device retrieving a current policy for the storage units (SUs) associated with the write request, where the current policy specifies the current connectivity for the SUs. The method continues by using the current policy to configure a data structure to process the write request, where the data structure is based on scaling triggers and a load balancing scheme. The method continues with the data structure incorporating a primary queue and scaling the addition of secondary queues based on the scaling triggers and/or the load balancing scheme.Type: GrantFiled: May 11, 2018Date of Patent: May 5, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Amit H. Lamba, Daniel J. Scholl, Jason K. Resch, Brian F. Ober
-
Patent number: 10592340Abstract: A method for execution by a dispersed storage and task (DST) processing unit includes queuing authorization requests, corresponding to received operation requests, in response to determining that first system utilization data indicates a first utilization level that compares unfavorably to a normal utilization threshold. A first batched authorization request that includes the queued authorization requests is generated for transmission to an Identity and Access Management (IAM) system in response to determining that the first request queue compares unfavorably to a first queue limit condition. A second queue limit condition that is different from the first queue limit condition is determined based on second system utilization data. A second batched authorization request that includes a second plurality of authorization requests of a second request queue is generated in response to determining that the second request queue compares unfavorably to the second queue limit condition.Type: GrantFiled: February 28, 2018Date of Patent: March 17, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Amit H. Lamba, Brian F. Ober
-
Publication number: 20190394100Abstract: A computing device identifies and classify errors detected between the client application and the computing service, maintains service specific statistics across all communication points associated with the computing service, and stores the statistics within a metric data store. The computing device also provides an interface for introspecting the health of the computing service via metrics stored within the metric data store, monitors the health of the computing service via the metric data store, and assigns an operational state to the computing device based on metrics stored with the metric data store. The computing device then determines how to optimally route the client request based on the operational state of the computing service and routes the client request to the computing service via the optimal route.Type: ApplicationFiled: June 25, 2018Publication date: December 26, 2019Inventors: Amit H. Lamba, Brian F. Ober
-
Patent number: 10496571Abstract: A processing module of a memory storage unit includes an interface configured to interface and communicate with a communication system, one or more memory devices, and processing circuitry operably coupled to the interface and to the memory that is configured to receive an access request from a distributed storage network (DSN) client and determine whether a quality of service (QoS) identity for the DSN client is associated with the access request. Based on a determination that a QoS identity is associated with the access request, the processing module determines a QoS level associated with the access request, where the QoS level is based at least in part on the QoS identity that is associated with the access request. The processing module maps the QoS level to a storage layer priority for the access request and transmits the storage layer priority for execution by at least one of the one or more memory devices.Type: GrantFiled: February 12, 2019Date of Patent: December 3, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Amit H. Lamba, Praveen Viraraghavan
-
Publication number: 20190347005Abstract: A method begins with a computing device of a distributed storage network (DSN) being designated to process a write request from a Decentralized, or Distributed, Agreement Protocol (DAP) and continues with the computing device retrieving a current policy for the storage units (SUs) associated with the write request, where the current policy specifies the current connectivity for the SUs. The method continues by using the current policy to configure a data structure to process the write request, where the data structure is based on scaling triggers and a load balancing scheme. The method continues with the data structure incorporating a primary queue and scaling the addition of secondary queues based on the scaling triggers and/or the load balancing scheme.Type: ApplicationFiled: May 11, 2018Publication date: November 14, 2019Inventors: Amit H. Lamba, Daniel J. Scholl, Jason K. Resch, Brian F. Ober
-
Publication number: 20190340073Abstract: A method for execution by a dispersed storage and task (DST) processing unit includes queuing authorization requests, corresponding to received operation requests, in response to determining that first system utilization data indicates a first utilization level that compares unfavorably to a normal utilization threshold. A first batched authorization request that includes the queued authorization requests is generated for transmission to an Identity and Access Management (IAM) system in response to determining that the first request queue compares unfavorably to a first queue limit condition. A second queue limit condition that is different from the first queue limit condition is determined based on second system utilization data. A second batched authorization request that includes a second plurality of authorization requests of a second request queue is generated in response to determining that the second request queue compares unfavorably to the second queue limit condition.Type: ApplicationFiled: July 17, 2019Publication date: November 7, 2019Inventors: Amit H. Lamba, Brian F. Ober
-
Publication number: 20190266052Abstract: A method for execution by a dispersed storage and task (DST) processing unit includes queuing authorization requests, corresponding to received operation requests, in response to determining that first system utilization data indicates a first utilization level that compares unfavorably to a normal utilization threshold. A first batched authorization request that includes the queued authorization requests is generated for transmission to an Identity and Access Management (IAM) system in response to determining that the first request queue compares unfavorably to a first queue limit condition. A second queue limit condition that is different from the first queue limit condition is determined based on second system utilization data. A second batched authorization request that includes a second plurality of authorization requests of a second request queue is generated in response to determining that the second request queue compares unfavorably to the second queue limit condition.Type: ApplicationFiled: February 28, 2018Publication date: August 29, 2019Inventors: Amit H. Lamba, Brian F. Ober