Patents by Inventor Cristian Medina

Cristian Medina has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220255993
    Abstract: A technique includes causing an agent device to setup a replication partnership between a first storage node and a second storage. Causing the agent device to setup the replication partnership includes configuring a proxy server that is associated with the second storage node to establish a secure communication channel for the replication partnership over a public network. Configuring the proxy server includes storing in the proxy server credentials for authenticating the first storage node to use the secure communication channel; and establishing port translations to be used in the secure communication channel in communicating replication data between the first storage node and the second storage node. Causing the agent device to setup the replication partnership may also include communicating replication partnership information to the second node.
    Type: Application
    Filed: January 21, 2022
    Publication date: August 11, 2022
    Inventors: Gurunatha Karaje, Tomasz Barszczak, Kevin Kauffman, Nguyen Truong, Cristian Medina Abkarian, Michael E. Root, Liam McArdle, Zaid Bin Tariq
  • Patent number: 11233850
    Abstract: A technique includes causing an agent device to setup a replication partnership between a first storage node and a second storage. Causing the agent device to setup the replication partnership includes configuring a proxy server that is associated with the second storage node to establish a secure communication channel for the replication partnership over a public network. Configuring the proxy server includes storing in the proxy server credentials for authenticating the first storage node to use the secure communication channel; and establishing port translations to be used in the secure communication channel in communicating replication data between the first storage node and the second storage node. Causing the agent device to setup the replication partnership may also include communicating replication partnership information to the second node.
    Type: Grant
    Filed: April 17, 2018
    Date of Patent: January 25, 2022
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Gurunatha Karaje, Tomasz Barszczak, Kevin Kauffman, Nguyen Truong, Cristian Medina Abkarian, Michael E. Root, Liam McArdle, Zaid Bin Tariq
  • Patent number: 10944819
    Abstract: A technique includes setting up a replication partnership between a first storage node and a second storage node. The replication partnership includes establishment of a secure connection between the first storage node and the second storage node using a remote internet protocol address, a base port, and an identifying key pair. A port forwarding configuration may then be created, in part, by adding a pre-established port offset relative to a base port (e.g., a well-known TCP/IP port) for a first of a set of one or more pre-established port offsets. This process may be repeated for each remaining instance of the one or more pre-established port offsets. Encryption keys may be exchanged between the first storage node and the second storage node using at least one of the base port or the pre-established port offsets. Replication between the first storage node and the second storage node may be performed securely using the established communication channels.
    Type: Grant
    Filed: October 26, 2018
    Date of Patent: March 9, 2021
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Kevin Kauffman, Nguyen Truong, Cristian Medina Abkarian
  • Publication number: 20200137156
    Abstract: A technique includes setting up a replication partnership between a first storage node and a second storage node. The replication partnership includes establishment of a secure connection between the first storage node and the second storage node using a remote internet protocol address, a base port, and an identifying key pair. A port forwarding configuration may then be created, in part, by adding a pre-established port offset relative to a base port (e.g., a well-known TCP/IP port) for a first of a set of one or more pre-established port offsets. This process may be repeated for each remaining instance of the one or more pre-established port offsets. Encryption keys may be exchanged between the first storage node and the second storage node using at least one of the base port or the pre-established port offsets. Replication between the first storage node and the second storage node may be performed securely using the established communication channels.
    Type: Application
    Filed: October 26, 2018
    Publication date: April 30, 2020
    Inventors: Kevin Kauffman, Nguyen Truong, Cristian Medina Abkarian
  • Publication number: 20190320018
    Abstract: A technique includes causing an agent device to setup a replication partnership between a first storage node and a second storage. Causing the agent device to setup the replication partnership includes configuring a proxy server that is associated with the second storage node to establish a secure communication channel for the replication partnership over a public network. Configuring the proxy server includes storing in the proxy server credentials for authenticating the first storage node to use the secure communication channel; and establishing port translations to be used in the secure communication channel in communicating replication data between the first storage node and the second storage node. Causing the agent device to setup the replication partnership may also include communicating replication partnership information to the second node.
    Type: Application
    Filed: April 17, 2018
    Publication date: October 17, 2019
    Inventors: Gurunatha Karaje, Tomasz Barszczak, Kevin Kauffman, Nguyen Truong, Cristian Medina Abkarian, Michael E. Root, Liam McArdle, Zaid Bin Tariq
  • Patent number: 9935931
    Abstract: A user who is currently unauthorized to access a resource sends a request to access the resource. It is determined whether a number of authorized users of the resource who have indicated that the user should be permitted to access the resource satisfies the threshold condition. If the number of authorized users who have indicated that the user should be permitted access satisfies the threshold condition, the user is permitted to access the resource. The threshold condition can be based on replies received responsive to messages sent to the authorized users of the resource asking whether the user should be permitted to access the resource. The threshold condition can be based on public digital keys of the authorized users from the user.
    Type: Grant
    Filed: September 28, 2015
    Date of Patent: April 3, 2018
    Assignee: Lenovo Enterprise Solutions (Singapore) PTE. LTD.
    Inventors: David Daniel Chudy, Gary David Cudak, James Gordon McLean, Cristian Medina
  • Patent number: 9749860
    Abstract: A peer-to-peer wireless connection is established between a mobile client computing device and a server computing device, and information is communicated between the mobile client computing device and the server computing device over this connection. The information is sufficient for the server computing device and/or the mobile client computing device to authenticate the mobile client computing device with the server computing device. After the mobile client computing device has been authenticated with the server computing device, a user of the mobile client computing device is permitted to perform management tasks on the server computing device using the mobile client computing device, such as over the peer-to-peer wireless connection. For example, license keys can be moved from the mobile client computing device to the server computing device to upgrade the server computing device, and from the server computing device to the mobile computing device to downgrade the server computing device.
    Type: Grant
    Filed: September 11, 2015
    Date of Patent: August 29, 2017
    Assignee: Lenovo Enterprise Solutions (Singapore) PTE, LTD.
    Inventors: David Daniel Chudy, James Gordon McLean, Cristian Medina, Dharmesh Narendra Topiwala
  • Publication number: 20170093831
    Abstract: A user who is currently unauthorized to access a resource sends a request to access the resource. It is determined whether a number of authorized users of the resource who have indicated that the user should be permitted to access the resource satisfies the threshold condition. If the number of authorized users who have indicated that the user should be permitted access satisfies the threshold condition, the user is permitted to access the resource. The threshold condition can be based on replies received responsive to messages sent to the authorized users of the resource asking whether the user should be permitted to access the resource. The threshold condition can be based on public digital keys of the authorized users from the user.
    Type: Application
    Filed: September 28, 2015
    Publication date: March 30, 2017
    Inventors: David Daniel Chudy, Gary David Cudak, James Gordon McLean, Cristian Medina, Dharmesh Narendra Topiwala
  • Patent number: 9600641
    Abstract: Embodiments of the invention provide for user permissions based control of pooled FoD activation keys. In an embodiment of the invention, a method for user permissions based control of pooled FoD activation keys is provided. The method includes pooling one or more authorization codes for access by different end users in activating different features of a set of hardware components using FoD. The method also includes responding to an FoD request to activate one of the features by a particular one of the end users by determining whether or not a pre-defined code usage policy permits the particular one of the end users to use a pooled one of the authorization codes and if permitted according to the pre-defined code usage policy, generating an FoD activation key with the pooled one of the authorization codes and activating the one of the features with the FoD activation key.
    Type: Grant
    Filed: December 16, 2013
    Date of Patent: March 21, 2017
    Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.
    Inventors: Fred Bower, David D. Chudy, James G. McLean, Cristian Medina, Michael T. Shelton
  • Publication number: 20170078877
    Abstract: A peer-to-peer wireless connection is established between a mobile client computing device and a server computing device, and information is communicated between the mobile client computing device and the server computing device over this connection. The information is sufficient for the server computing device and/or the mobile client computing device to authenticate the mobile client computing device with the server computing device. After the mobile client computing device has been authenticated with the server computing device, a user of the mobile client computing device is permitted to perform management tasks on the server computing device using the mobile client computing device, such as over the peer-to-peer wireless connection. For example, license keys can be moved from the mobile client computing device to the server computing device to upgrade the server computing device, and from the server computing device to the mobile computing device to downgrade the server computing device.
    Type: Application
    Filed: September 11, 2015
    Publication date: March 16, 2017
    Inventors: David Daniel Chudy, James Gordon McLean, Cristian Medina, Dharmesh Narendra Topiwala
  • Patent number: 9576113
    Abstract: Embodiments of the invention provide for user permissions based control of pooled FoD activation keys. In an embodiment of the invention, a method for user permissions based control of pooled FoD activation keys is provided. The method includes pooling one or more authorization codes for access by different end users in activating different features of a set of hardware components using FoD. The method also includes responding to an FoD request to activate one of the features by a particular one of the end users by determining whether or not a pre-defined code usage policy permits the particular one of the end users to use a pooled one of the authorization codes and if permitted according to the pre-defined code usage policy, generating an FoD activation key with the pooled one of the authorization codes and activating the one of the features with the FoD activation key.
    Type: Grant
    Filed: December 18, 2013
    Date of Patent: February 21, 2017
    Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.
    Inventors: Fred Bower, David D. Chudy, James G. McLean, Cristian Medina, Michael T. Shelton
  • Patent number: 9515879
    Abstract: Establishing an action list for reconfiguration of a remote hardware system includes: receiving, by an action list generator via a graphical user interface (‘GUI’) presenting a graphical representation of the remote hardware system, a command to record subsequent actions; while recording: receiving, by the action list generator via the GUI, a series of user operations; identifying, for each user operation in the series, an action associated with the user operation; recording, by the action list generator, each identified action in an action list ordered in accordance with the series of user operations; and receiving a command to cease recording of subsequent actions.
    Type: Grant
    Filed: January 9, 2014
    Date of Patent: December 6, 2016
    Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
    Inventors: David D. Chudy, James G. McLean, Cristian Medina, Michael T. Shelton, Jr.
  • Patent number: 9443221
    Abstract: Embodiments of the invention provide a method, system and computer program product for physical location tagging via image recognition of physical components in a data center. The method includes acquiring an image scan of a field of view of a camera at a known location in a data center and matching an image of a device in the image scan to a pre-stored image of a similar device to determine a device type of the device in the image scan. The method also includes transmitting a directive to a known device in inventory of the determined device type to activate a visual indicator disposed on an exterior portion of the known device. Finally, the method includes re-acquiring the image scan to detect an activated visual indicator on the device in the image scan and, in response, mapping the known location in the data center to the known device in inventory.
    Type: Grant
    Filed: December 16, 2013
    Date of Patent: September 13, 2016
    Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.
    Inventors: David D. Chudy, James G. McLean, Cristian Medina, Michael T. Shelton
  • Patent number: 9316884
    Abstract: Aspects of the present invention include systems for reflective digital light processing (DLP). Embodiments include a light source, a plurality of optically reflective switching devices each having an optically reflective layer in contact with a substrate; a circuit means and power source; controller logic; a projection means; and a display means; wherein each of said plurality of devices is a capable of receiving light from said light source and thereafter reflecting said received light in direct response to a reflective state condition of said each device.
    Type: Grant
    Filed: August 4, 2014
    Date of Patent: April 19, 2016
    Assignee: International Business Machines Corporation
    Inventors: Slavek P. Aksamit, David D. Chudy, Cristian Medina
  • Patent number: 9092865
    Abstract: Systems and methods for map generation for an environment based on captured images are disclosed. According to an aspect, a method includes capturing a first image of an environment. The method also includes identifying a reference in the first image. Further, the method includes generating, based on the identified reference, a map of the environment to use for physically orienting a computing device within the environment based on a second image including the reference.
    Type: Grant
    Filed: August 16, 2013
    Date of Patent: July 28, 2015
    Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.
    Inventors: David D. Chudy, James G. McLean, Cristian Medina, Michael T. Shelton, Jr.
  • Publication number: 20150195135
    Abstract: Establishing an action list for reconfiguration of a remote hardware system includes: receiving, by an action list generator via a graphical user interface (‘GUI’) presenting a graphical representation of the remote hardware system, a command to record subsequent actions; while recording: receiving, by the action list generator via the GUI, a series of user operations; identifying, for each user operation in the series, an action associated with the user operation; recording, by the action list generator, each identified action in an action list ordered in accordance with the series of user operations; and receiving a command to cease recording of subsequent actions.
    Type: Application
    Filed: January 9, 2014
    Publication date: July 9, 2015
    Inventors: David D. Chudy, James G. McLean, Cristian Medina, Michael T. Shelton, JR.
  • Publication number: 20150170095
    Abstract: Embodiments of the invention provide a method, system and computer program product for physical location tagging via image recognition of physical components in a data center. The method includes acquiring an image scan of a field of view of a camera at a known location in a data center and matching an image of a device in the image scan to a pre-stored image of a similar device to determine a device type of the device in the image scan. The method also includes transmitting a directive to a known device in inventory of the determined device type to activate a visual indicator disposed on an exterior portion of the known device. Finally, the method includes re-acquiring the image scan to detect an activated visual indicator on the device in the image scan and, in response, mapping the known location in the data center to the known device in inventory.
    Type: Application
    Filed: December 16, 2013
    Publication date: June 18, 2015
    Applicant: International Business Machines Corporation
    Inventors: David D. Chudy, James G. McLean, Cristian Medina, Michael T. Shelton
  • Publication number: 20150170443
    Abstract: Embodiments of the invention provide for user permissions based control of pooled FoD activation keys. In an embodiment of the invention, a method for user permissions based control of pooled FoD activation keys is provided. The method includes pooling one or more authorization codes for access by different end users in activating different features of a set of hardware components using FoD. The method also includes responding to an FoD request to activate one of the features by a particular one of the end users by determining whether or not a pre-defined code usage policy permits the particular one of the end users to use a pooled one of the authorization codes and if permitted according to the pre-defined code usage policy, generating an FoD activation key with the pooled one of the authorization codes and activating the one of the features with the FoD activation key.
    Type: Application
    Filed: December 16, 2013
    Publication date: June 18, 2015
    Applicant: International Business Machines Corporation
    Inventors: Fred Bower, David D. Chudy, James G. McLean, Cristian Medina, Michael T. Shelton
  • Publication number: 20150169848
    Abstract: Embodiments of the invention provide for user permissions based control of pooled FoD activation keys. In an embodiment of the invention, a method for user permissions based control of pooled FoD activation keys is provided. The method includes pooling one or more authorization codes for access by different end users in activating different features of a set of hardware components using FoD. The method also includes responding to an FoD request to activate one of the features by a particular one of the end users by determining whether or not a pre-defined code usage policy permits the particular one of the end users to use a pooled one of the authorization codes and if permitted according to the pre-defined code usage policy, generating an FoD activation key with the pooled one of the authorization codes and activating the one of the features with the FoD activation key.
    Type: Application
    Filed: December 18, 2013
    Publication date: June 18, 2015
    Applicant: International Business Machines Corporation
    Inventors: Fred Bower, David D. Chudy, James G. McLean, Cristian Medina, Michael T. Shelton
  • Publication number: 20150049905
    Abstract: Systems and methods for map generation for an environment based on captured images are disclosed. According to an aspect, a method includes capturing a first image of an environment. The method also includes identifying a reference in the first image. Further, the method includes generating, based on the identified reference, a map of the environment to use for physically orienting a computing device within the environment based on a second image including the reference.
    Type: Application
    Filed: August 16, 2013
    Publication date: February 19, 2015
    Applicant: International Business Machines Corporation
    Inventors: David D. Chudy, James G. McLean, Cristian Medina, Michael T. Shelton, Jr.