Patents by Inventor Christopher Scott Long

Christopher Scott Long has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240184634
    Abstract: Communication fabric-coupled computing architectures, platforms, and systems are provided herein. In one example, an apparatus includes a management entity configured to establish a compute unit comprising components from among a plurality of physical computing components by at least instructing a communication fabric communicatively coupling the plurality of physical computing components to establish logical isolation within the communication fabric to form the compute unit. Responsive to an indication of a change in workload associated with at least a software component deployed to a processing element of the compute unit, the management entity is configured to adjust the logical isolation to alter a quantity of the plurality of physical computing components in the compute unit in accordance with the change in the workload.
    Type: Application
    Filed: February 8, 2024
    Publication date: June 6, 2024
    Inventors: Christopher R. Long, James Scott Cannata, Jason Breakstone
  • Publication number: 20240176754
    Abstract: Computing architectures, platforms, and systems are provided herein. In one example, system is provided. The system includes a management processor configured to initiate a communication arrangement between a first endpoint device coupled to a communication fabric and a second endpoint device coupled to the communication fabric. The communication arrangement is configured to redirect a transfer from the first endpoint device based on an address corresponding to an address range of the second endpoint device without passing the transfer through a host processor coupled to the communication fabric that executes an application initiating the transfer.
    Type: Application
    Filed: February 7, 2024
    Publication date: May 30, 2024
    Inventors: James Scott Cannata, Christopher R. Long, Sumit Puri, Bryan Schramm
  • Patent number: 11954326
    Abstract: Disaggregated computing architectures, platforms, and systems are provided herein. In one example, a method includes instructing a communication fabric to establish a first logical partition in the communication fabric that includes a first processing device and a memory device, and directing transfer of configuration data for storage by the memory device over the first logical partition. After transfer of the configuration data, the method includes instructing the communication fabric to remove the first logical partition in the communication fabric, where the configuration data remains stored by the memory device after removal of the first logical partition. The method also includes instructing the communication fabric to establish a second logical partition in the communication fabric that includes at least a second processing device and the memory device comprising the configuration data, where the second processing device is operated using the configuration data.
    Type: Grant
    Filed: January 13, 2022
    Date of Patent: April 9, 2024
    Assignee: Liqid Inc.
    Inventors: James Scott Cannata, Christopher R. Long, Phillip Clark, Sumit Puri
  • Patent number: 11922218
    Abstract: Communication fabric-coupled computing architectures, platforms, and systems are provided herein. In one example, an apparatus includes a management entity configured to establish a compute unit comprising components from among a plurality of physical computing components by at least instructing a communication fabric communicatively coupling the plurality of physical computing components to establish logical isolation within the communication fabric to form the compute unit. Responsive to an indication of a change in workload associated with at least a software component deployed to a processing element of the compute unit, the management entity is configured to adjust the logical isolation to alter a quantity of the plurality of physical computing components in the compute unit in accordance with the change in the workload.
    Type: Grant
    Filed: April 19, 2021
    Date of Patent: March 5, 2024
    Assignee: Liqid Inc.
    Inventors: Christopher R. Long, James Scott Cannata, Jason Breakstone
  • Patent number: 11921659
    Abstract: Computing architectures, platforms, and systems are provided herein. In one example, system is provided. The system includes a management processor configured to initiate a communication arrangement between a first endpoint device coupled to a communication fabric and a second endpoint device coupled to the communication fabric. The communication arrangement is configured to redirect a transfer from the first endpoint device based on an address corresponding to an address range of the second endpoint device without passing the transfer through a host processor coupled to the communication fabric that executes an application initiating the transfer.
    Type: Grant
    Filed: January 9, 2023
    Date of Patent: March 5, 2024
    Assignee: Liqid Inc.
    Inventors: James Scott Cannata, Christopher R. Long, Sumit Puri, Bryan Schramm
  • Patent number: 10506040
    Abstract: One embodiment provides a method, including: receiving, from a client device, a request by a user to access an aggregate service device; authenticating, at the aggregate service device, the user to provide access to at least one remote device; providing, by the aggregate service device, data analogous to data of the at least one remote device; receiving, by the aggregate service device, a selection of data accessible by the user from the at least one remote device; and facilitating data transfer associated with the selection of data. Other aspects are described and claimed.
    Type: Grant
    Filed: October 30, 2014
    Date of Patent: December 10, 2019
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: Christopher Donald Oman, Tony Eugene Thompson, Daniel Robert Carter, Christopher Scott Long, Trevin Michael Forkert, Philip L. Childs
  • Publication number: 20160127338
    Abstract: One embodiment provides a method, including: receiving, from a client device, a request by a user to access an aggregate service device; authenticating, at the aggregate service device, the user to provide access to at least one remote device; providing, by the aggregate service device, data analogous to data of the at least one remote device; receiving, by the aggregate service device, a selection of data accessible by the user from the at least one remote device; and facilitating data transfer associated with the selection of data. Other aspects are described and claimed.
    Type: Application
    Filed: October 30, 2014
    Publication date: May 5, 2016
    Inventors: Christopher Donald Oman, Tony Euqene Thompson, Daniel Robert Carter, Christopher Scott Long, Trevin Michael Forket, Philip L. Childs
  • Patent number: 7600133
    Abstract: The present invention provides a method and system of backing up at least one encrypted computer file encrypted by an encryption filter driver running on an operating system of a computer system and restoring at least one encrypted computer file encrypted by an encryption filter driver running on an operating system of a computer system. In an exemplary embodiment, the method and system of backing up at least one encrypted computer file encrypted by an encryption filter driver running on an operating system of a computer system include (1) receiving the filename of the encrypted computer file, (2) starting a backup process for the encrypted computer file, (3) disabling the encryption filter driver for the backup process, (4) backing up the encrypted computer file via the backup process, and (5) reenabling the encryption filter driver for the backup process.
    Type: Grant
    Filed: February 24, 2005
    Date of Patent: October 6, 2009
    Assignee: Lenovo Singapore Pte. Ltd
    Inventors: Christopher Scott Long, Mark Andrew Smith
  • Patent number: 7519784
    Abstract: A computer implemented method, data processing system, and computer usable code are provided for reclaiming backup data storage space in memory. The process receives a selection to reclaim a set of memory locations associated with a set of backup copies of a selected file. The process searches a plurality of memory locations for the set of memory locations associated with the set of backup copies. The process then removes the data associated with the set of backup copies from the set of memory locations to form a set of reclaimed memory locations. The set of reclaimed memory locations are unoccupied by data associated with the set of backup copies of the selected file.
    Type: Grant
    Filed: March 31, 2006
    Date of Patent: April 14, 2009
    Assignee: Lenovo Singapore Pte. Ltd.
    Inventors: Philip Lee Childs, Lee Christopher Highsmith, Christopher Scott Long
  • Patent number: 7167982
    Abstract: A method, system and computer program product for securing decrypted files in a shared environment. A filter driver in a kernel space may be configured to control service requests to encrypted files stored in a shared area, e.g., a shared directory on a disk unit, accessible by multiple users. The filter driver may receive a service request to open an encrypted document in the shared area issued from an authorized user. Upon receiving the encrypted data, the filter driver may decrypt the encrypted data. The filter driver may subsequently store the decrypted data in a file in a non-shared area, e.g., a non-shared directory. The non-shared area may be accessible only by the authorized user that requested access to the encrypted file. By storing the decrypted data in a file in the non-shared area, a file once decrypted may be protected in a file sharing environment.
    Type: Grant
    Filed: September 14, 2001
    Date of Patent: January 23, 2007
    Assignee: Lenovo (Singapore) Pte Ltd.
    Inventors: Scott Thomas Elliott, James Patrick Hoff, Christopher Scott Long, David Rivera, James Peter Ward
  • Publication number: 20030056095
    Abstract: A method, system and computer program product for securing decrypted files in a shared environment. A filter driver in a kernel space may be configured to control service requests to encrypted files stored in a shared area, e.g., a shared directory on a disk unit, accessible by multiple users. The filter driver may receive a service request to open an encrypted document in the shared area issued from an authorized user. Upon receiving the encrypted data, the filter driver may decrypt the encrypted data. The filter driver may subsequently store the decrypted data in a file in a non-shared area, e.g., a non-shared directory. The non-shared area may be accessible only by the authorized user that requested access to the encrypted file. By storing the decrypted data in a file in the non-shared area, a file once decrypted may be protected in a file sharing environment.
    Type: Application
    Filed: September 14, 2001
    Publication date: March 20, 2003
    Applicant: International Business Machines Corporation
    Inventors: Scott Thomas Elliott, James Patrick Hoff, Christopher Scott Long, David Rivera, James Peter Ward
  • Publication number: 20030056109
    Abstract: A method and system for binding a device to a planar is disclosed. According to the preferred embodiment of the method and system of the present invention, a programmable memory chip is provided on the planar and the device is detachably attached to the planar. The method and system further includes using the programmable memory chip to bind the device to the planar.
    Type: Application
    Filed: September 14, 2001
    Publication date: March 20, 2003
    Applicant: International Business Machines Corporation
    Inventors: Scott Thomas Elliott, James Patrick Hoff, Christopher Scott Long, James Peter Ward
  • Publication number: 20030053630
    Abstract: A method and system for control of key pair usage in a computer system is disclosed. The method and system comprise creating key pair material for utilization with an embedded security chip of the computer system. The key pair material includes tag data. The method and system further includes determining whether the key pair material is bound to the embedded security chip based on the tag data.
    Type: Application
    Filed: September 20, 2001
    Publication date: March 20, 2003
    Applicant: International Business Machines Corporation
    Inventors: Scott Thomas Elliott, James Patrick Hoff, Christopher Scott Long, David Rivera, Andy Llovd Trotter, James Peter Ward