Patents by Inventor Cristian Medina
Cristian Medina has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220255993Abstract: A technique includes causing an agent device to setup a replication partnership between a first storage node and a second storage. Causing the agent device to setup the replication partnership includes configuring a proxy server that is associated with the second storage node to establish a secure communication channel for the replication partnership over a public network. Configuring the proxy server includes storing in the proxy server credentials for authenticating the first storage node to use the secure communication channel; and establishing port translations to be used in the secure communication channel in communicating replication data between the first storage node and the second storage node. Causing the agent device to setup the replication partnership may also include communicating replication partnership information to the second node.Type: ApplicationFiled: January 21, 2022Publication date: August 11, 2022Inventors: Gurunatha Karaje, Tomasz Barszczak, Kevin Kauffman, Nguyen Truong, Cristian Medina Abkarian, Michael E. Root, Liam McArdle, Zaid Bin Tariq
-
Patent number: 11233850Abstract: A technique includes causing an agent device to setup a replication partnership between a first storage node and a second storage. Causing the agent device to setup the replication partnership includes configuring a proxy server that is associated with the second storage node to establish a secure communication channel for the replication partnership over a public network. Configuring the proxy server includes storing in the proxy server credentials for authenticating the first storage node to use the secure communication channel; and establishing port translations to be used in the secure communication channel in communicating replication data between the first storage node and the second storage node. Causing the agent device to setup the replication partnership may also include communicating replication partnership information to the second node.Type: GrantFiled: April 17, 2018Date of Patent: January 25, 2022Assignee: Hewlett Packard Enterprise Development LPInventors: Gurunatha Karaje, Tomasz Barszczak, Kevin Kauffman, Nguyen Truong, Cristian Medina Abkarian, Michael E. Root, Liam McArdle, Zaid Bin Tariq
-
Patent number: 10944819Abstract: A technique includes setting up a replication partnership between a first storage node and a second storage node. The replication partnership includes establishment of a secure connection between the first storage node and the second storage node using a remote internet protocol address, a base port, and an identifying key pair. A port forwarding configuration may then be created, in part, by adding a pre-established port offset relative to a base port (e.g., a well-known TCP/IP port) for a first of a set of one or more pre-established port offsets. This process may be repeated for each remaining instance of the one or more pre-established port offsets. Encryption keys may be exchanged between the first storage node and the second storage node using at least one of the base port or the pre-established port offsets. Replication between the first storage node and the second storage node may be performed securely using the established communication channels.Type: GrantFiled: October 26, 2018Date of Patent: March 9, 2021Assignee: Hewlett Packard Enterprise Development LPInventors: Kevin Kauffman, Nguyen Truong, Cristian Medina Abkarian
-
Publication number: 20200137156Abstract: A technique includes setting up a replication partnership between a first storage node and a second storage node. The replication partnership includes establishment of a secure connection between the first storage node and the second storage node using a remote internet protocol address, a base port, and an identifying key pair. A port forwarding configuration may then be created, in part, by adding a pre-established port offset relative to a base port (e.g., a well-known TCP/IP port) for a first of a set of one or more pre-established port offsets. This process may be repeated for each remaining instance of the one or more pre-established port offsets. Encryption keys may be exchanged between the first storage node and the second storage node using at least one of the base port or the pre-established port offsets. Replication between the first storage node and the second storage node may be performed securely using the established communication channels.Type: ApplicationFiled: October 26, 2018Publication date: April 30, 2020Inventors: Kevin Kauffman, Nguyen Truong, Cristian Medina Abkarian
-
Publication number: 20190320018Abstract: A technique includes causing an agent device to setup a replication partnership between a first storage node and a second storage. Causing the agent device to setup the replication partnership includes configuring a proxy server that is associated with the second storage node to establish a secure communication channel for the replication partnership over a public network. Configuring the proxy server includes storing in the proxy server credentials for authenticating the first storage node to use the secure communication channel; and establishing port translations to be used in the secure communication channel in communicating replication data between the first storage node and the second storage node. Causing the agent device to setup the replication partnership may also include communicating replication partnership information to the second node.Type: ApplicationFiled: April 17, 2018Publication date: October 17, 2019Inventors: Gurunatha Karaje, Tomasz Barszczak, Kevin Kauffman, Nguyen Truong, Cristian Medina Abkarian, Michael E. Root, Liam McArdle, Zaid Bin Tariq
-
Patent number: 9935931Abstract: A user who is currently unauthorized to access a resource sends a request to access the resource. It is determined whether a number of authorized users of the resource who have indicated that the user should be permitted to access the resource satisfies the threshold condition. If the number of authorized users who have indicated that the user should be permitted access satisfies the threshold condition, the user is permitted to access the resource. The threshold condition can be based on replies received responsive to messages sent to the authorized users of the resource asking whether the user should be permitted to access the resource. The threshold condition can be based on public digital keys of the authorized users from the user.Type: GrantFiled: September 28, 2015Date of Patent: April 3, 2018Assignee: Lenovo Enterprise Solutions (Singapore) PTE. LTD.Inventors: David Daniel Chudy, Gary David Cudak, James Gordon McLean, Cristian Medina
-
Patent number: 9749860Abstract: A peer-to-peer wireless connection is established between a mobile client computing device and a server computing device, and information is communicated between the mobile client computing device and the server computing device over this connection. The information is sufficient for the server computing device and/or the mobile client computing device to authenticate the mobile client computing device with the server computing device. After the mobile client computing device has been authenticated with the server computing device, a user of the mobile client computing device is permitted to perform management tasks on the server computing device using the mobile client computing device, such as over the peer-to-peer wireless connection. For example, license keys can be moved from the mobile client computing device to the server computing device to upgrade the server computing device, and from the server computing device to the mobile computing device to downgrade the server computing device.Type: GrantFiled: September 11, 2015Date of Patent: August 29, 2017Assignee: Lenovo Enterprise Solutions (Singapore) PTE, LTD.Inventors: David Daniel Chudy, James Gordon McLean, Cristian Medina, Dharmesh Narendra Topiwala
-
Publication number: 20170093831Abstract: A user who is currently unauthorized to access a resource sends a request to access the resource. It is determined whether a number of authorized users of the resource who have indicated that the user should be permitted to access the resource satisfies the threshold condition. If the number of authorized users who have indicated that the user should be permitted access satisfies the threshold condition, the user is permitted to access the resource. The threshold condition can be based on replies received responsive to messages sent to the authorized users of the resource asking whether the user should be permitted to access the resource. The threshold condition can be based on public digital keys of the authorized users from the user.Type: ApplicationFiled: September 28, 2015Publication date: March 30, 2017Inventors: David Daniel Chudy, Gary David Cudak, James Gordon McLean, Cristian Medina, Dharmesh Narendra Topiwala
-
Patent number: 9600641Abstract: Embodiments of the invention provide for user permissions based control of pooled FoD activation keys. In an embodiment of the invention, a method for user permissions based control of pooled FoD activation keys is provided. The method includes pooling one or more authorization codes for access by different end users in activating different features of a set of hardware components using FoD. The method also includes responding to an FoD request to activate one of the features by a particular one of the end users by determining whether or not a pre-defined code usage policy permits the particular one of the end users to use a pooled one of the authorization codes and if permitted according to the pre-defined code usage policy, generating an FoD activation key with the pooled one of the authorization codes and activating the one of the features with the FoD activation key.Type: GrantFiled: December 16, 2013Date of Patent: March 21, 2017Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.Inventors: Fred Bower, David D. Chudy, James G. McLean, Cristian Medina, Michael T. Shelton
-
Publication number: 20170078877Abstract: A peer-to-peer wireless connection is established between a mobile client computing device and a server computing device, and information is communicated between the mobile client computing device and the server computing device over this connection. The information is sufficient for the server computing device and/or the mobile client computing device to authenticate the mobile client computing device with the server computing device. After the mobile client computing device has been authenticated with the server computing device, a user of the mobile client computing device is permitted to perform management tasks on the server computing device using the mobile client computing device, such as over the peer-to-peer wireless connection. For example, license keys can be moved from the mobile client computing device to the server computing device to upgrade the server computing device, and from the server computing device to the mobile computing device to downgrade the server computing device.Type: ApplicationFiled: September 11, 2015Publication date: March 16, 2017Inventors: David Daniel Chudy, James Gordon McLean, Cristian Medina, Dharmesh Narendra Topiwala
-
Patent number: 9576113Abstract: Embodiments of the invention provide for user permissions based control of pooled FoD activation keys. In an embodiment of the invention, a method for user permissions based control of pooled FoD activation keys is provided. The method includes pooling one or more authorization codes for access by different end users in activating different features of a set of hardware components using FoD. The method also includes responding to an FoD request to activate one of the features by a particular one of the end users by determining whether or not a pre-defined code usage policy permits the particular one of the end users to use a pooled one of the authorization codes and if permitted according to the pre-defined code usage policy, generating an FoD activation key with the pooled one of the authorization codes and activating the one of the features with the FoD activation key.Type: GrantFiled: December 18, 2013Date of Patent: February 21, 2017Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.Inventors: Fred Bower, David D. Chudy, James G. McLean, Cristian Medina, Michael T. Shelton
-
Patent number: 9515879Abstract: Establishing an action list for reconfiguration of a remote hardware system includes: receiving, by an action list generator via a graphical user interface (‘GUI’) presenting a graphical representation of the remote hardware system, a command to record subsequent actions; while recording: receiving, by the action list generator via the GUI, a series of user operations; identifying, for each user operation in the series, an action associated with the user operation; recording, by the action list generator, each identified action in an action list ordered in accordance with the series of user operations; and receiving a command to cease recording of subsequent actions.Type: GrantFiled: January 9, 2014Date of Patent: December 6, 2016Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.Inventors: David D. Chudy, James G. McLean, Cristian Medina, Michael T. Shelton, Jr.
-
Patent number: 9443221Abstract: Embodiments of the invention provide a method, system and computer program product for physical location tagging via image recognition of physical components in a data center. The method includes acquiring an image scan of a field of view of a camera at a known location in a data center and matching an image of a device in the image scan to a pre-stored image of a similar device to determine a device type of the device in the image scan. The method also includes transmitting a directive to a known device in inventory of the determined device type to activate a visual indicator disposed on an exterior portion of the known device. Finally, the method includes re-acquiring the image scan to detect an activated visual indicator on the device in the image scan and, in response, mapping the known location in the data center to the known device in inventory.Type: GrantFiled: December 16, 2013Date of Patent: September 13, 2016Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.Inventors: David D. Chudy, James G. McLean, Cristian Medina, Michael T. Shelton
-
Patent number: 9316884Abstract: Aspects of the present invention include systems for reflective digital light processing (DLP). Embodiments include a light source, a plurality of optically reflective switching devices each having an optically reflective layer in contact with a substrate; a circuit means and power source; controller logic; a projection means; and a display means; wherein each of said plurality of devices is a capable of receiving light from said light source and thereafter reflecting said received light in direct response to a reflective state condition of said each device.Type: GrantFiled: August 4, 2014Date of Patent: April 19, 2016Assignee: International Business Machines CorporationInventors: Slavek P. Aksamit, David D. Chudy, Cristian Medina
-
Patent number: 9092865Abstract: Systems and methods for map generation for an environment based on captured images are disclosed. According to an aspect, a method includes capturing a first image of an environment. The method also includes identifying a reference in the first image. Further, the method includes generating, based on the identified reference, a map of the environment to use for physically orienting a computing device within the environment based on a second image including the reference.Type: GrantFiled: August 16, 2013Date of Patent: July 28, 2015Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.Inventors: David D. Chudy, James G. McLean, Cristian Medina, Michael T. Shelton, Jr.
-
Publication number: 20150195135Abstract: Establishing an action list for reconfiguration of a remote hardware system includes: receiving, by an action list generator via a graphical user interface (‘GUI’) presenting a graphical representation of the remote hardware system, a command to record subsequent actions; while recording: receiving, by the action list generator via the GUI, a series of user operations; identifying, for each user operation in the series, an action associated with the user operation; recording, by the action list generator, each identified action in an action list ordered in accordance with the series of user operations; and receiving a command to cease recording of subsequent actions.Type: ApplicationFiled: January 9, 2014Publication date: July 9, 2015Inventors: David D. Chudy, James G. McLean, Cristian Medina, Michael T. Shelton, JR.
-
Publication number: 20150170095Abstract: Embodiments of the invention provide a method, system and computer program product for physical location tagging via image recognition of physical components in a data center. The method includes acquiring an image scan of a field of view of a camera at a known location in a data center and matching an image of a device in the image scan to a pre-stored image of a similar device to determine a device type of the device in the image scan. The method also includes transmitting a directive to a known device in inventory of the determined device type to activate a visual indicator disposed on an exterior portion of the known device. Finally, the method includes re-acquiring the image scan to detect an activated visual indicator on the device in the image scan and, in response, mapping the known location in the data center to the known device in inventory.Type: ApplicationFiled: December 16, 2013Publication date: June 18, 2015Applicant: International Business Machines CorporationInventors: David D. Chudy, James G. McLean, Cristian Medina, Michael T. Shelton
-
Publication number: 20150170443Abstract: Embodiments of the invention provide for user permissions based control of pooled FoD activation keys. In an embodiment of the invention, a method for user permissions based control of pooled FoD activation keys is provided. The method includes pooling one or more authorization codes for access by different end users in activating different features of a set of hardware components using FoD. The method also includes responding to an FoD request to activate one of the features by a particular one of the end users by determining whether or not a pre-defined code usage policy permits the particular one of the end users to use a pooled one of the authorization codes and if permitted according to the pre-defined code usage policy, generating an FoD activation key with the pooled one of the authorization codes and activating the one of the features with the FoD activation key.Type: ApplicationFiled: December 16, 2013Publication date: June 18, 2015Applicant: International Business Machines CorporationInventors: Fred Bower, David D. Chudy, James G. McLean, Cristian Medina, Michael T. Shelton
-
Publication number: 20150169848Abstract: Embodiments of the invention provide for user permissions based control of pooled FoD activation keys. In an embodiment of the invention, a method for user permissions based control of pooled FoD activation keys is provided. The method includes pooling one or more authorization codes for access by different end users in activating different features of a set of hardware components using FoD. The method also includes responding to an FoD request to activate one of the features by a particular one of the end users by determining whether or not a pre-defined code usage policy permits the particular one of the end users to use a pooled one of the authorization codes and if permitted according to the pre-defined code usage policy, generating an FoD activation key with the pooled one of the authorization codes and activating the one of the features with the FoD activation key.Type: ApplicationFiled: December 18, 2013Publication date: June 18, 2015Applicant: International Business Machines CorporationInventors: Fred Bower, David D. Chudy, James G. McLean, Cristian Medina, Michael T. Shelton
-
Publication number: 20150049905Abstract: Systems and methods for map generation for an environment based on captured images are disclosed. According to an aspect, a method includes capturing a first image of an environment. The method also includes identifying a reference in the first image. Further, the method includes generating, based on the identified reference, a map of the environment to use for physically orienting a computing device within the environment based on a second image including the reference.Type: ApplicationFiled: August 16, 2013Publication date: February 19, 2015Applicant: International Business Machines CorporationInventors: David D. Chudy, James G. McLean, Cristian Medina, Michael T. Shelton, Jr.