Patents by Inventor Chris Lionetti
Chris Lionetti has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9330282Abstract: A card can be communicationally coupled to a storage device. The card can then cause the storage device to perform stand-alone tasks without a computing device. The card can invoke instructions already present in the firmware of the storage device or the card can first copy instructions to the firmware and then invoke them. The card can cause the storage device to perform actions, such as a secure erase, and the storage device can remain inaccessible until such actions are performed, even if power is interrupted. The card can also receive information from the storage devices and then use that information with a new storage device to, for example, enable the new storage device to take the place of, and reconstruct the data of, the old storage device in a storage array directly from other storage devices in the array and without burdening a computing device or array controller.Type: GrantFiled: June 10, 2009Date of Patent: May 3, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Marius Strom, Sompong Paul Olarig, Chris Lionetti
-
Patent number: 9111103Abstract: An access control device can be communicationally coupled to a storage device and can control access thereto. The access control device can comprise information, such as identities of authorized entities, to enable the access control device to independently determine whether to provide access to an associated storage device. Alternatively, the access control device can comprise information to establish a secure connection to an authorization computing device and the access control device can implement the decisions of the authorization computing device. The access control device can control access by instructing a storage device to execute specific firmware instructions to prevent meaningful responses to data storage related requests. The access control device can also comprise storage-related cryptographic information utilized by the storage device to encrypt and decrypt data.Type: GrantFiled: November 26, 2012Date of Patent: August 18, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Vladimir Sadovsky, Sompong Paul Olarig, Chris Lionetti, James Robert Hamilton
-
Patent number: 8880825Abstract: A LUN is provided that can store multiple datasets (e.g., data and/or applications, such as virtual machines stored as virtual hard drives). The LUN is partitioned into multiple partitions. One or more datasets may be stored in each partition. As a result, multiple datasets can be accessed through a single LUN, rather than through a number of LUNs proportional to the number of datasets. Furthermore, the datasets stored in the LUN may be pivoted. A second LUN may be generated that is dedicated to storing a dataset of the multiple datasets stored in the first LUN. The dataset is copied to the second LUN, and the second LUN is exposed to a host computer to enable the host computer to interact with the dataset. Still further, the dataset may be pivoted from the second LUN back to a partition of the first LUN.Type: GrantFiled: June 24, 2013Date of Patent: November 4, 2014Assignee: Microsoft CorporationInventors: Chris Lionetti, Robert Pike
-
Publication number: 20130290631Abstract: A LUN is provided that can store multiple datasets (e.g., data and/or applications, such as virtual machines stored as virtual hard drives). The LUN is partitioned into multiple partitions. One or more datasets may be stored in each partition. As a result, multiple datasets can be accessed through a single LUN, rather than through a number of LUNs proportional to the number of datasets. Furthermore, the datasets stored in the LUN may be pivoted. A second LUN may be generated that is dedicated to storing a dataset of the multiple datasets stored in the first LUN. The dataset is copied to the second LUN, and the second LUN is exposed to a host computer to enable the host computer to interact with the dataset. Still further, the dataset may be pivoted from the second LUN back to a partition of the first LUN.Type: ApplicationFiled: June 24, 2013Publication date: October 31, 2013Inventors: Chris Lionetti, Robert Pike
-
Patent number: 8473698Abstract: A LUN is provided that can store multiple datasets (e.g., data and/or applications, such as virtual machines stored as virtual hard drives). The LUN is partitioned into multiple partitions. One or more datasets may be stored in each partition. As a result, multiple datasets can be accessed through a single LUN, rather than through a number of LUNs proportional to the number of datasets. Furthermore, the datasets stored in the LUN may be pivoted. A second LUN may be generated that is dedicated to storing a dataset of the multiple datasets stored in the first LUN. The dataset is copied to the second LUN, and the second LUN is exposed to a host computer to enable the host computer to interact with the dataset. Still further, the dataset may be pivoted from the second LUN back to a partition of the first LUN.Type: GrantFiled: November 17, 2011Date of Patent: June 25, 2013Assignee: Microsoft CorporationInventors: Chris Lionetti, Robert Pike
-
Patent number: 8321956Abstract: An access control device can be communicationally coupled to a storage device and can control access thereto. The access control device can comprise information, such as identities of authorized entities, to enable the access control device to independently determine whether to provide access to an associated storage device. Alternatively, the access control device can comprise information to establish a secure connection to an authorization computing device and the access control device can implement the decisions of the authorization computing device. The access control device can control access by instructing a storage device to execute specific firmware instructions to prevent meaningful responses to data storage related requests. The access control device can also comprise storage-related cryptographic information utilized by the storage device to encrypt and decrypt data.Type: GrantFiled: June 17, 2009Date of Patent: November 27, 2012Assignee: Microsoft CorporationInventors: Vladimir Sadovsky, Sompong Paul Olarig, Chris Lionetti, James Robert Hamilton
-
Patent number: 8286015Abstract: A multi-device storage system can be arranged into power saving systems by placing one or more storage devices into a reduced power consuming state when the storage activity associated with the system is sufficiently reduced that an attendant decrease in throughput will not materially affect users of the storage system. Where data redundancy is provided for, a redundant storage device can be placed into the reduced power consuming state and its redundancy responsibilities can be transitioned to a partition of a larger storage device. Such transitions can be based on specific parameters, such as write cycles or latency, crossing thresholds, including upper and lower thresholds, they can also be based on pre-set times, or a combination thereof. Lifecycle information, including lifecycle information collected in real-time by storage devices on a block-by-block basis, can be utilized to obtain historical empirical data from which to select the pre-set times.Type: GrantFiled: June 3, 2009Date of Patent: October 9, 2012Assignee: Microsoft CorporationInventors: Sompong Paul Olarig, Chris Lionetti, Shiv Rajpal, Vladimir Sadovsky
-
Publication number: 20120066452Abstract: A LUN is provided that can store multiple datasets (e.g., data and/or applications, such as virtual machines stored as virtual hard drives). The LUN is partitioned into multiple partitions. One or more datasets may be stored in each partition. As a result, multiple datasets can be accessed through a single LUN, rather than through a number of LUNs proportional to the number of datasets. Furthermore, the datasets stored in the LUN may be pivoted. A second LUN may be generated that is dedicated to storing a dataset of the multiple datasets stored in the first LUN. The dataset is copied to the second LUN, and the second LUN is exposed to a host computer to enable the host computer to interact with the dataset. Still further, the dataset may be pivoted from the second LUN back to a partition of the first LUN.Type: ApplicationFiled: November 17, 2011Publication date: March 15, 2012Applicant: MICROSOFT CORPORATIONInventors: Chris Lionetti, Robert Pike
-
Patent number: 8074038Abstract: A LUN is provided that can store multiple datasets (e.g., data and/or applications, such as virtual machines stored as virtual hard drives). The LUN is partitioned into multiple partitions. One or more datasets may be stored in each partition. As a result, multiple datasets can be accessed through a single LUN, rather than through a number of LUNs proportional to the number of datasets. Furthermore, the datasets stored in the LUN may be pivoted. A second LUN may be generated that is dedicated to storing a dataset of the multiple datasets stored in the first LUN. The dataset is copied to the second LUN, and the second LUN is exposed to a host computer to enable the host computer to interact with the dataset. Still further, the dataset may be pivoted from the second LUN back to a partition of the first LUN.Type: GrantFiled: May 12, 2009Date of Patent: December 6, 2011Assignee: Microsoft CorporationInventors: Chris Lionetti, Robert Pike
-
Publication number: 20100325736Abstract: An access control device can be communicationally coupled to a storage device and can control access thereto. The access control device can comprise information, such as identities of authorized entities, to enable the access control device to independently determine whether to provide access to an associated storage device. Alternatively, the access control device can comprise information to establish a secure connection to an authorization computing device and the access control device can implement the decisions of the authorization computing device. The access control device can control access by instructing a storage device to execute specific firmware instructions to prevent meaningful responses to data storage related requests. The access control device can also comprise storage-related cryptographic information utilized by the storage device to encrypt and decrypt data.Type: ApplicationFiled: June 17, 2009Publication date: December 23, 2010Applicant: MICROSOFT CORPORATIONInventors: Vladimir Sadovsky, Sompong Paul Olarig, Chris Lionetti, James Robert Hamilton
-
Publication number: 20100318810Abstract: A card can be communicationally coupled to a storage device. The card can then cause the storage device to perform stand-alone tasks without a computing device. The card can invoke instructions already present in the firmware of the storage device or the card can first copy instructions to the firmware and then invoke them. The card can cause the storage device to perform actions, such as a secure erase, and the storage device can remain inaccessible until such actions are performed, even if power is interrupted. The card can also receive information from the storage devices and then use that information with a new storage device to, for example, enable the new storage device to take the place of, and reconstruct the data of, the old storage device in a storage array directly from other storage devices in the array and without burdening a computing device or array controller.Type: ApplicationFiled: June 10, 2009Publication date: December 16, 2010Applicant: MICROSOFT CORPORATIONInventors: Marius Strom, Sompong Paul Olarig, Chris Lionetti
-
Publication number: 20100313045Abstract: A multi-device storage system can be arranged into power saving systems by placing one or more storage devices into a reduced power consuming state when the storage activity associated with the system is sufficiently reduced that an attendant decrease in throughput will not materially affect users of the storage system. Where data redundancy is provided for, a redundant storage device can be placed into the reduced power consuming state and its redundancy responsibilities can be transitioned to a partition of a larger storage device. Such transitions can be based on specific parameters, such as write cycles or latency, crossing thresholds, including upper and lower thresholds, they can also be based on pre-set times, or a combination thereof. Lifecycle information, including lifecycle information collected in real-time by storage devices on a block-by-block basis, can be utilized to obtain historical empirical data from which to select the pre-set times.Type: ApplicationFiled: June 3, 2009Publication date: December 9, 2010Applicant: MICROSOFT CORPORATIONInventors: Sompong Paul Olarig, Chris Lionetti, Shiv Rajpal, Vladimir Sadovsky
-
Publication number: 20100313044Abstract: A storage system can comprise multiple storage devices with differing characteristics, including differing power-related characteristics. A storage power manager can redirect Input/Output (I/O) communications to storage devices to maximize the power efficiency of the storage system. The storage power manager can reference metadata associated with the data of an I/O request, as well as power-related data, including continuously varying data and storage device characteristics, to select one or more storage devices to which to redirect the I/O. The storage power manager can also move or copy data between storage devices to facilitate maximum utilization of power efficient storage devices with limited storage capacity and to enable the placing of one or more storage devices into a reduced power consuming state. The moving or copying of data can be performed with reference to lifecycle information to identify data that has changed since a storage device was last active.Type: ApplicationFiled: June 3, 2009Publication date: December 9, 2010Applicant: Microsoft CorporationInventors: Shiv Rajpal, Sompong Paul Olarig, Chris Lionetti, Vladimir Sadovsky
-
Publication number: 20100306544Abstract: A secure container can comprise a security server, one or more container servers, and one or more sensors that can detect a breach of the physically secure computing environment provided by the container. A management server external to the container can be informed when the container is sealed and authorized and can subsequently provide a cryptographic key enabling the security server in the container to boot. Each container server can request and receive a cryptographic key from the security server enabling them to boot. If the container is breached, such keys can be withheld and any computing device that is powered off, or restarted, will be unable to complete a subsequent boot. If the container loses a support system and is degraded, so long as the security server does not lose power, it can provide the cryptographic keys to container servers restarted after the degradation is removed.Type: ApplicationFiled: June 2, 2009Publication date: December 2, 2010Applicant: MICROSOFT CORPORATIONInventors: Chris Lionetti, Sompong Paul Olarig
-
Publication number: 20100293349Abstract: A LUN is provided that can store multiple datasets (e.g., data and/or applications, such as virtual machines stored as virtual hard drives). The LUN is partitioned into multiple partitions. One or more datasets may be stored in each partition. As a result, multiple datasets can be accessed through a single LUN, rather than through a number of LUNs proportional to the number of datasets. Furthermore, the datasets stored in the LUN may be pivoted. A second LUN may be generated that is dedicated to storing a dataset of the multiple datasets stored in the first LUN. The dataset is copied to the second LUN, and the second LUN is exposed to a host computer to enable the host computer to interact with the dataset. Still further, the dataset may be pivoted from the second LUN back to a partition of the first LUN.Type: ApplicationFiled: May 12, 2009Publication date: November 18, 2010Applicant: MICROSOFT CORPORATIONInventors: Chris Lionetti, Robert Pike
-
Publication number: 20100185843Abstract: Storage devices can provide for hardware encryption and decryption of data stored by them. The hardware cryptographic functions can be applied with reference to cryptographic information of a communicationally, and physically, separable key device. Disconnection of the separable key device can render encrypted data inaccessible. Destruction of the separable key device can result in virtual destruction of the encrypted data. The cryptographic information on the separable key device can be provided by a storage device manufacturer, or by a provisioning computing device. The separable key device can be directly communicationally coupled to a provisioning computing device or it can establish a secure communication tunnel with the provisioning device through a computing device to which the separable key device is communicationally coupled. Cryptographic information can be provided by, and deleted from, the provisioning computing device prior to completion of the booting of that device.Type: ApplicationFiled: January 20, 2009Publication date: July 22, 2010Applicant: MICROSOFT CORPORATIONInventors: Sompong Paul Olarig, Vladimir Sadovsky, Chris Lionetti, James Robert Hamilton, Harry Raymond Rogers, Timothy Louis Falk