Patents by Inventor Christopher J. Berube

Christopher J. Berube has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11184399
    Abstract: Centralized monitoring of plural file systems that operate within or in association with an enterprise computing environment is provided. Each of the plural file systems are provided with a security policy, wherein the security policy defines one or more file system access activities to be monitored at the file system. Each file system is instrumented with a software agent that intercepts the relevant file system access activity. A centralized collector component is operative to receive from each of the plural file systems audit trail data, wherein the audit trail data is data that has been generated locally as file system access activity is intercepted at the file system by the local software agent in accordance with the applicable security policy. The collector applies the security policy against the audit trail data received from at least one of the plural file systems and, in response thereto, takes a given action.
    Type: Grant
    Filed: October 28, 2019
    Date of Patent: November 23, 2021
    Assignee: International Business Machines Corporation
    Inventors: Sean Christopher Foley, Christopher J. Berube, Sagi Shechter
  • Patent number: 10735459
    Abstract: A first computing system receives a user request. The user request includes a first set of data. The first computing system determines that one or more resources have exceeded at least one resource utilization threshold. In response to the determining that one or more resources have exceeded the at least one utilization threshold, a first data transfer rate is modified to a second data transfer rate based on transmitting a first subset of the first set of data to one or more host devices, wherein a second subset of the first set of data is not transmitted to the one or more host devices. The one or more host devices validate the user request against one or more security policies in order to complete or terminate the user request.
    Type: Grant
    Filed: November 2, 2017
    Date of Patent: August 4, 2020
    Assignee: International Business Machines Corporation
    Inventors: Leonid Rodniansky, Viktor Ginzburg, Christopher J. Berube, Sagi Shechter
  • Patent number: 10666680
    Abstract: A first computing system receives a user request. The user request includes a first set of data. The first computing system determines that one or more resources have exceeded at least one resource utilization threshold. In response to the determining that one or more resources have exceeded the at least one utilization threshold, a first data transfer rate is modified to a second data transfer rate based on transmitting a first subset of the first set of data to one or more host devices, wherein a second subset of the first set of data is not transmitted to the one or more host devices. The one or more host devices validate the user request against one or more security policies in order to complete or terminate the user request.
    Type: Grant
    Filed: May 20, 2019
    Date of Patent: May 26, 2020
    Assignee: International Business Machines Corporation
    Inventors: Leonid Rodniansky, Viktor Ginzburg, Christopher J. Berube, Sagi Shechter
  • Publication number: 20200067988
    Abstract: Centralized monitoring of plural file systems that operate within or in association with an enterprise computing environment is provided. Each of the plural file systems are provided with a security policy, wherein the security policy defines one or more file system access activities to be monitored at the file system. Each file system is instrumented with a software agent that intercepts the relevant file system access activity. A centralized collector component is operative to receive from each of the plural file systems audit trail data, wherein the audit trail data is data that has been generated locally as file system access activity is intercepted at the file system by the local software agent in accordance with the applicable security policy. The collector applies the security policy against the audit trail data received from at least one of the plural file systems and, in response thereto, takes a given action.
    Type: Application
    Filed: October 28, 2019
    Publication date: February 27, 2020
    Inventors: Sean Christopher Foley, Christopher J. Berube, Sagi Shechter
  • Patent number: 10462183
    Abstract: Centralized monitoring of plural file systems that operate within or in association with an enterprise computing environment is provided. Each of the plural file systems are provided with a security policy, wherein the security policy defines one or more file system access activities to be monitored at the file system. Each file system is instrumented with a software agent that intercepts the relevant file system access activity. A centralized collector component is operative to receive from each of the plural file systems audit trail data, wherein the audit trail data is data that has been generated locally as file system access activity is intercepted at the file system by the local software agent in accordance with the applicable security policy. The collector applies the security policy against the audit trail data received from at least one of the plural file systems and, in response thereto, takes a given action.
    Type: Grant
    Filed: July 21, 2015
    Date of Patent: October 29, 2019
    Assignee: International Business Machines Corporation
    Inventors: Sean Christopher Foley, Christopher J. Berube, Sagi Shechter
  • Publication number: 20190281084
    Abstract: A first computing system receives a user request. The user request includes a first set of data. The first computing system determines that one or more resources have exceeded at least one resource utilization threshold. In response to the determining that one or more resources have exceeded the at least one utilization threshold, a first data transfer rate is modified to a second data transfer rate based on transmitting a first subset of the first set of data to one or more host devices, wherein a second subset of the first set of data is not transmitted to the one or more host devices. The one or more host devices validate the user request against one or more security policies in order to complete or terminate the user request.
    Type: Application
    Filed: May 20, 2019
    Publication date: September 12, 2019
    Inventors: Leonid Rodniansky, Viktor Ginzburg, Christopher J. Berube, Sagi Shechter
  • Publication number: 20190132353
    Abstract: A first computing system receives a user request. The user request includes a first set of data. The first computing system determines that one or more resources have exceeded at least one resource utilization threshold. In response to the determining that one or more resources have exceeded the at least one utilization threshold, a first data transfer rate is modified to a second data transfer rate based on transmitting a first subset of the first set of data to one or more host devices, wherein a second subset of the first set of data is not transmitted to the one or more host devices. The one or more host devices validate the user request against one or more security policies in order to complete or terminate the user request.
    Type: Application
    Filed: November 2, 2017
    Publication date: May 2, 2019
    Inventors: Leonid Rodniansky, Viktor Ginzburg, Christopher J. Berube, Sagi Shechter
  • Publication number: 20170024408
    Abstract: Centralized monitoring of plural file systems that operate within or in association with an enterprise computing environment is provided. Each of the plural file systems are provided with a security policy, wherein the security policy defines one or more file system access activities to be monitored at the file system. Each file system is instrumented with a software agent that intercepts the relevant file system access activity. A centralized collector component is operative to receive from each of the plural file systems audit trail data, wherein the audit trail data is data that has been generated locally as file system access activity is intercepted at the file system by the local software agent in accordance with the applicable security policy. The collector applies the security policy against the audit trail data received from at least one of the plural file systems and, in response thereto, takes a given action.
    Type: Application
    Filed: July 21, 2015
    Publication date: January 26, 2017
    Inventors: Sean Christopher Foley, Christopher J. Berube, Sagi Shechter