Patents by Inventor Gerald Francis McBrearty
Gerald Francis McBrearty has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11442781Abstract: A method for deploying workloads in a heterogenous computing environment having multiple hosts of multiple different types and/or multiple monitors of multiple different types is disclosed. The method includes selecting a master image for deployment of a workload, wherein multiple subimages are associated with the master image, and the subimages correspond to at least some of the different types of hosts and/or the different types of monitors such that the master image is usable to deploy the workload on at least one of the hosts. The method also includes determining a host on which to deploy the workload using the master image; determining a monitor of the host to manage the workload; determining a monitor type of the monitor; determining, by an orchestration engine and based on the monitor type, a subimage that supports the first monitor; and cloning the associated resources to the host to initiate the workload thereon.Type: GrantFiled: September 18, 2019Date of Patent: September 13, 2022Assignee: International Business Machines CorporationInventor: Gerald Francis McBrearty
-
Patent number: 11159453Abstract: By querying a set of fabrics to determine an initiator logged into a fabric in the set of fabrics, a set of accessible fabrics is discovered, an accessible fabric in the set of accessible fabrics accessible to the initiator, an initiator comprising a transceiver connecting a server to a switch, a fabric in the set of fabrics comprising a switch connecting a server to a storage device, the storage device comprising a storage volume. Using a fabric usage policy, a set of allowed fabrics within the set of accessible fabrics is determined. Using the set of allowed fabrics, a storage volume is mapped to a server, the mapping enabling the server to access the storage volume via a fabric in the set of allowed fabrics.Type: GrantFiled: August 22, 2019Date of Patent: October 26, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Gerald Francis McBrearty
-
Publication number: 20210288790Abstract: A method, a computer program product, and a system for distributing a private signature key between authorization instances. The method includes registering a plurality of authorization instances in a configuration file and generating host instance key pairs by each of the authorization instances. The method also includes storing the public host keys in the shared database and electing one of the authorization instances to be a signature key leader instance. The method includes generating, by the signature key leader instance, a signature key pair. The signature key pair includes a public signature key and a private signature key. The method also includes storing the public signature key in the shared database and transmitting an encrypted private signature key to a requesting authorization instance of the authorization instances. The method further includes decrypting the encrypted private signature key using the private host key generated by the requesting authorization instance.Type: ApplicationFiled: March 13, 2020Publication date: September 16, 2021Inventors: Michael Beck, Martin Smolny, Thomas Dürr, Georg Ochs, Gerald Francis McBrearty, Stephen SooHoo
-
Patent number: 11121864Abstract: A method, a computer program product, and a system for distributing a private signature key between authorization instances. The method includes registering a plurality of authorization instances in a configuration file and generating host instance key pairs by each of the authorization instances. The method also includes storing the public host keys in the shared database and electing one of the authorization instances to be a signature key leader instance. The method includes generating, by the signature key leader instance, a signature key pair. The signature key pair includes a public signature key and a private signature key. The method also includes storing the public signature key in the shared database and transmitting an encrypted private signature key to a requesting authorization instance of the authorization instances. The method further includes decrypting the encrypted private signature key using the private host key generated by the requesting authorization instance.Type: GrantFiled: March 13, 2020Date of Patent: September 14, 2021Assignee: International Business Machines CorporationInventors: Michael Beck, Martin Smolny, Thomas Dürr, Georg Ochs, Gerald Francis McBrearty, Stephen SooHoo
-
Publication number: 20210081247Abstract: A method for deploying workloads in a heterogenous computing environment having multiple hosts of multiple different types and/or multiple monitors of multiple different types is disclosed. The method includes selecting a master image for deployment of a workload, wherein multiple subimages are associated with the master image, and the subimages correspond to at least some of the different types of hosts and/or the different types of monitors such that the master image is usable to deploy the workload on at least one of the hosts. The method also includes determining a host on which to deploy the workload using the master image; determining a monitor of the host to manage the workload; determining a monitor type of the monitor; determining, by an orchestration engine and based on the monitor type, a subimage that supports the first monitor; and cloning the associated resources to the host to initiate the workload thereon.Type: ApplicationFiled: September 18, 2019Publication date: March 18, 2021Inventor: Gerald Francis McBrearty
-
Publication number: 20210058342Abstract: By querying a set of fabrics to determine an initiator logged into a fabric in the set of fabrics, a set of accessible fabrics is discovered, an accessible fabric in the set of accessible fabrics accessible to the initiator, an initiator comprising a transceiver connecting a server to a switch, a fabric in the set of fabrics comprising a switch connecting a server to a storage device, the storage device comprising a storage volume. Using a fabric usage policy, a set of allowed fabrics within the set of accessible fabrics is determined. Using the set of allowed fabrics, a storage volume is mapped to a server, the mapping enabling the server to access the storage volume via a fabric in the set of allowed fabrics.Type: ApplicationFiled: August 22, 2019Publication date: February 25, 2021Applicant: International Business Machines CorporationInventor: GERALD FRANCIS MCBREARTY
-
Publication number: 20200409882Abstract: Machine logic implemented policies are created. These policies guide the automated creation of zoning between multiple VMs (virtual machines) and storage on SANs (storage area networks). This zoning controls hardware (such as communication ports) of various host physical machines, where the VMs and SANs are hosted and connected in mutual data communication. Some embodiments pick the ports (based on policy) to be used by the VM by pruning the list of ports from the VM and likewise the pruning the storage ports (by policy) to create the zone. In some embodiments, machine logic rule based policy(ies) determines which fabrics will be used between the VM and a storage array.Type: ApplicationFiled: June 27, 2019Publication date: December 31, 2020Inventor: Gerald Francis McBrearty
-
Patent number: 9600459Abstract: A Visual Macro Program records and replays desired actions performed by a user in creating or editing a document. The recorded actions are appended to the document as an attachment that can be replayed by a user at a later time by enabling a tag associated with the recorded actions.Type: GrantFiled: July 16, 2008Date of Patent: March 21, 2017Assignee: International Business Machines CorporationInventors: Susann Marie Keohane, Gerald Francis McBrearty, Jessica Carol Murillo, Johnny Meng-Han Shieh, Shawn Patrick Mullen
-
Patent number: 9576277Abstract: A receipt receives an electronic message from a sender, wherein said electronic message comprises at least one suggested folder name specified by the sender for the recipient to select as a folder name for filing the electronic message, wherein the at least one suggested folder name is detected by a sender computer system from a selection by the sender within a user interface of the sender computer system of the at least one suggested folder name for the electronic message and inserted into the electronic message. The electronic message is filtered to detect the at least one suggested folder name for filing the electronic message in a messaging filing directory. Responsive to the recipient selecting to file the electronic message, the electronic message is filed in at least one folder with the suggested folder name from among a plurality of folders.Type: GrantFiled: July 19, 2012Date of Patent: February 21, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
-
Patent number: 9547717Abstract: A web browser displays a set of search results from a web search, each search result indicating a link to a web page. Responsive to selection of a first of the set of search results for exclusion from display, a subset of one or more of the set of search results that indicate related links is identified. The related links comprise links have a same domain name as the link of the first search result. The first search result and the subset of the set of search results are excluded. The search results are displayed without the excluded ones of the set of search results.Type: GrantFiled: February 9, 2012Date of Patent: January 17, 2017Assignee: International Business Machines CorporationInventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
-
Patent number: 9514445Abstract: A sender selection is detected at a sender computer system within a user interface of at least one suggested folder name for a composed electronic message for a recipient receiving the electronic message to select as a folder name for filing the electronic message. The at least one suggested folder name is attached to the electronic message at the sender computer system for distribution to the recipient. The electronic message is sent with the suggested filing folder name from the sender computer system to a recipient, wherein a recipient receiving the electronic message receives the at least one suggested folder name specified by the sender in the electronic message for selecting a folder for filing the electronic message in a messaging filing directory for the recipient.Type: GrantFiled: July 19, 2012Date of Patent: December 6, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
-
Patent number: 9281952Abstract: A system, method, and program product is provided that selects an instant messaging message that includes one or more words in a text area. The instant message is a communication with an instant messaging participant that corresponds to an instant messaging participant identifier. A count is kept of the words that match keywords that are associated with a selected instant messaging group data store that is stored in a nonvolatile data area. If the count exceeds a particular threshold, the instant messaging participant identifier is added to the selected instant messaging group.Type: GrantFiled: October 5, 2007Date of Patent: March 8, 2016Assignee: International Business Machines CorporationInventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
-
Patent number: 9251476Abstract: A computer implemented method, apparatus, and computer usable program code for managing calendar conflicts. A plurality of calendar invitations waiting to be processed is identified to form a plurality of unprocessed calendar invitations. Calendar invitations are grouped within the plurality of unprocessed calendar invitations together that conflict with each other to form a group of conflicting calendar invitations. Each conflicting calendar invitation in the group of conflicting calendar invitations is presented in association with other calendar invitations in the group for resolution.Type: GrantFiled: June 8, 2007Date of Patent: February 2, 2016Assignee: International Business Machines CorporationInventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
-
Patent number: 9197629Abstract: An approach is provided in which a server receives a first request from a client over a command port connection. The server, in turn, sends a first phase authentication token to the client over the command port and receives a second request from the client over a management port connection. In response, the server sends a second phase authentication token to the client over the management port connection, which the server receives back from the client over the command port connection. In turn, the server authenticates the client to utilize the command port connection accordingly.Type: GrantFiled: January 14, 2013Date of Patent: November 24, 2015Assignee: International Business Machines CorporationInventors: Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
-
Patent number: 9122867Abstract: A method, system and computer program product for automatically displaying the potential risk associated with cracking a password. While creating or modifying a password, feedback is provided describing the risk associated with cracking the password. Risk assessment may be presented as a percentage, accompanied by an explanation of why the value was ascertained. Risk feedback during password creation provides an opportunity to improve computer, document, and file security.Type: GrantFiled: June 8, 2007Date of Patent: September 1, 2015Assignee: International Business Machines CorporationInventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
-
Patent number: 9111081Abstract: An approach is provided in which a server receives a first request from a client over a command port connection. The server, in turn, sends a first phase authentication token to the client over the command port and receives a second request from the client over a management port connection. In response, the server sends a second phase authentication token to the client over the management port connection, which the server receives back from the client over the command port connection. In turn, the server authenticates the client to utilize the command port connection accordingly.Type: GrantFiled: June 26, 2012Date of Patent: August 18, 2015Assignee: International Business Machines CorporationInventors: Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
-
Publication number: 20130347088Abstract: An approach is provided in which a server receives a first request from a client over a command port connection. The server, in turn, sends a first phase authentication token to the client over the command port and receives a second request from the client over a management port connection. In response, the server sends a second phase authentication token to the client over the management port connection, which the server receives back from the client over the command port connection. In turn, the server authenticates the client to utilize the command port connection accordingly.Type: ApplicationFiled: June 26, 2012Publication date: December 26, 2013Applicant: International Business Machines CorporationInventors: Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
-
Publication number: 20130347092Abstract: An approach is provided in which a server receives a first request from a client over a command port connection. The server, in turn, sends a first phase authentication token to the client over the command port and receives a second request from the client over a management port connection. In response, the server sends a second phase authentication token to the client over the management port connection, which the server receives back from the client over the command port connection. In turn, the server authenticates the client to utilize the command port connection accordingly.Type: ApplicationFiled: January 14, 2013Publication date: December 26, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
-
Patent number: 8607071Abstract: Replay attacks in an encrypted file system are prevented by generating a session key and providing the session key to one or more drive managers and an encrypted file system process. When a drive request is received by the encrypted file system process the drive request is encrypted using the generated session key. The encrypted drive request is sent to a drive manager. The drive manager attempts to decrypt the drive request using the session key. If the encrypted drive request is successfully decrypted, then the drive manager performs the requested operation. On the other hand, if the request is not decrypted successfully, then the request is not performed by the drive manager. Drive managers can include both disk device drivers and a logical volume managers.Type: GrantFiled: February 20, 2008Date of Patent: December 10, 2013Assignee: International Business Machines CorporationInventors: Susann Marie Keohane, Gerald Francis McBrearty, Jessica Carol Murillo, Shawn Patrick Mullen, Johnny Meng-Han Shieh
-
Patent number: 8589698Abstract: An approach is provided to receive a request at a first computer system from a second system. The first system generates an encryption key, modifies retrieved source code by inserting the generated encryption key into the source code, and compiles the modified source code into an executable. A hash value of the executable program is calculated and is stored along with the encryption key in a memory area. The executable and the hash value are sent to the second system over a network. The executable is executed and it generates an encrypted result using the hash value and the embedded encryption key. The encrypted result is sent back to the first system where it is authenticated using the stored encryption key and hash value.Type: GrantFiled: May 15, 2009Date of Patent: November 19, 2013Assignee: International Business Machines CorporationInventors: Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh