Patents by Inventor Gerald McBrearty
Gerald McBrearty has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11902319Abstract: A computer-implemented process, computer program product, and system for dynamic change of a password under a brute force attack. A computer processor determines a quantity of consecutive unsuccessful attempts to access the targeted item protected by a password. Responsive to the quantity of consecutive unsuccessful attempts to access the targeted item exceeding a predefined threshold, the computer processor acquires a new password for access to the targeted item, wherein the new password is based on a more complex set of password generation rules than a current password. The computer processor changing the current password of the targeted item to the new password, and in response to changing the current password of the targeted item to the new password, the computer processor sends an encrypted message regarding the new password to a user associated with the targeted item.Type: GrantFiled: March 9, 2021Date of Patent: February 13, 2024Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Gerald McBrearty, Jessica Murillo, Johnny Shieh
-
Patent number: 11119801Abstract: Method and system for deploying a virtual machine or attaching a storage volume to a virtual machine (VM). A process obtains information regarding fabrics attached to hosts and storage devices attached to the fabrics and determines whether a VM can be deployed to a host or whether storage volumes can be attached to a VM. In one case, determining that a fabric attached to a host can support a virtual SCSI volume causes migrating a VM to the host and attaching the virtual SCSI volume to the migrated VM. In another case, determining that the fabric attached to a host can support an NPIV volume causes migrating the VM to the host and attaching the NPIV volume to a virtual channel mapped to the fabric attached to the host. If the VM cannot be migrated, then the user is given an indication that the attachment is not possible.Type: GrantFiled: March 28, 2019Date of Patent: September 14, 2021Assignee: International Business Machines CorporationInventor: Gerald McBrearty
-
Publication number: 20210218768Abstract: A computer-implemented process, computer program product, and system for dynamic change of a password under a brute force attack. A computer processor determines a quantity of consecutive unsuccessful attempts to access the targeted item protected by a password. Responsive to the quantity of consecutive unsuccessful attempts to access the targeted item exceeding a predefined threshold, the computer processor acquires a new password for access to the targeted item, wherein the new password is based on a more complex set of password generation rules than a current password. The computer processor changing the current password of the targeted item to the new password, and in response to changing the current password of the targeted item to the new password, the computer processor sends an encrypted message regarding the new password to a user associated with the targeted item.Type: ApplicationFiled: March 9, 2021Publication date: July 15, 2021Inventors: Susann M. Keohane, Gerald McBrearty, Jessica Murillo, Johnny Shieh
-
Patent number: 10992663Abstract: A first processor may receive a first request, from a first user, to initiate a first application. The first processor may initiate a first recording device. Initiating the first recording may include executing firmware embedded in the first recording device. The first processor may validate the identity of the first user using the first recording device. The first processor may initiate the first application. Initiating the first application may include loading and executing a first operating system associated with the first application.Type: GrantFiled: November 16, 2017Date of Patent: April 27, 2021Assignee: International Business Machines CorporationInventors: Johnny Shieh, Jessica Murillo, Susann Keohane, Gerald McBrearty
-
Patent number: 10992662Abstract: A first processor may receive a first request, from a first user, to initiate a first application. The first processor may initiate a first recording device. Initiating the first recording may include executing firmware embedded in the first recording device. The first processor may validate the identity of the first user using the first recording device. The first processor may initiate the first application. Initiating the first application may include loading and executing a first operating system associated with the first application.Type: GrantFiled: October 9, 2017Date of Patent: April 27, 2021Assignee: International Business Machines CorporationInventors: Johnny Shieh, Jessica Murillo, Susann Keohane, Gerald McBrearty
-
Patent number: 10972498Abstract: A method, computer program product, and system for dynamic change of a password under a brute force attack. A computer processor monitors a password protected account. A frequency of access attempts to the account is determined and in response to the frequency of access attempts exceeding a first threshold, a brute force password attack against the account is determined. A quantity of consecutive unsuccessful access attempts is tracked and responsive to the unsuccessful access attempts exceeding a second predefined threshold, a new password of the account is acquired, in which the new password follows a more complex set of password generation rules than the current password. An encrypted message regarding the new password is sent to a user of the account, the password of the account is reset to the new password, and the quantity of consecutive unsuccessful attempts to access the account is reset to zero.Type: GrantFiled: October 8, 2018Date of Patent: April 6, 2021Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Gerald McBrearty, Jessica Murillo, Johnny Shieh
-
Patent number: 10924336Abstract: Method and apparatus for dynamically updating a zoning methodology on a fibre channel (FC) fabric are provided. One example method generally includes receiving a request to provision storage to a virtual machine (VM) via the FC fabric connecting a host machine of the VM to a storage area network (SAN) and determining a dynamic zoning methodology to use for the VM. The method further includes determining a previous zoning methodology in use by the fabric, updating the FC fabric from the previous zoning methodology to the dynamic zoning methodology by modifying a zoning table of the FC fabric and activating the dynamic zoning methodology on the FC fabric.Type: GrantFiled: January 10, 2019Date of Patent: February 16, 2021Assignee: International Business Machines CorporationInventor: Gerald McBrearty
-
Publication number: 20200310854Abstract: Method and system for deploying a virtual machine or attaching a storage volume to a virtual machine (VM). A process obtains information regarding fabrics attached to hosts and storage devices attached to the fabrics and determines whether a VM can be deployed to a host or whether storage volumes can be attached to a VM. In one case, determining that a fabric attached to a host can support a virtual SCSI volume causes migrating a VM to the host and attaching the virtual SCSI volume to the migrated VM. In another case, determining that the fabric attached to a host can support an NPIV volume causes migrating the VM to the host and attaching the NPIV volume to a virtual channel mapped to the fabric attached to the host. If the VM cannot be migrated, then the user is given an indication that the attachment is not possible.Type: ApplicationFiled: March 28, 2019Publication date: October 1, 2020Inventor: Gerald MCBREARTY
-
Patent number: 10725660Abstract: A method for enabling management of cloud resources based on tiered storage data movement includes receiving a request from a cloud computing system to provide the cloud computing system a notification of a data movement initiated by a tiered storage system, where the data movement comprises moving data associated with the cloud computing system from a first storage tier to a second storage tier, and the notification comprises an indication of a condition for initiating the data movement. The method then includes determining that a condition for initiating the data movement was satisfied. The method further includes initiating the data movement in response to determining that the condition was satisfied. The method additionally includes transmitting the notification in response to initiating the data movement.Type: GrantFiled: November 17, 2017Date of Patent: July 28, 2020Assignee: International Business Machines CorporationInventors: Jeffrey W. Tenner, Gerald McBrearty
-
Publication number: 20200228398Abstract: Method and apparatus for dynamically updating a zoning methodology on a fibre channel (FC) fabric are provided. One example method generally includes receiving a request to provision storage to a virtual machine (VM) via the FC fabric connecting a host machine of the VM to a storage area network (SAN) and determining a dynamic zoning methodology to use for the VM. The method further includes determining a previous zoning methodology in use by the fabric, updating the FC fabric from the previous zoning methodology to the dynamic zoning methodology by modifying a zoning table of the FC fabric and activating the dynamic zoning methodology on the FC fabric.Type: ApplicationFiled: January 10, 2019Publication date: July 16, 2020Inventor: Gerald MCBREARTY
-
Publication number: 20200112585Abstract: A method, computer program product, and system for dynamic change of a password under a brute force attack. A computer processor monitors a password protected account. A frequency of access attempts to the account is determined and in response to the frequency of access attempts exceeding a first threshold, a brute force password attack against the account is determined. A quantity of consecutive unsuccessful access attempts is tracked and responsive to the unsuccessful access attempts exceeding a second predefined threshold, a new password of the account is acquired, in which the new password follows a more complex set of password generation rules than the current password. An encrypted message regarding the new password is sent to a user of the account, the password of the account is reset to the new password, and the quantity of consecutive unsuccessful attempts to access the account is reset to zero.Type: ApplicationFiled: October 8, 2018Publication date: April 9, 2020Inventors: Susann M. Keohane, Gerald McBrearty, Jessica Murillo, Johnny Shieh
-
Publication number: 20190155512Abstract: A method for enabling management of cloud resources based on tiered storage data movement includes receiving a request from a cloud computing system to provide the cloud computing system a notification of a data movement initiated by a tiered storage system, where the data movement comprises moving data associated with the cloud computing system from a first storage tier to a second storage tier, and the notification comprises an indication of a condition for initiating the data movement. The method then includes determining that a condition for initiating the data movement was satisfied. The method further includes initiating the data movement in response to determining that the condition was satisfied. The method additionally includes transmitting the notification in response to initiating the data movement.Type: ApplicationFiled: November 17, 2017Publication date: May 23, 2019Inventors: Jeffrey W. Tenner, Gerald McBrearty
-
Publication number: 20190155511Abstract: A method for allocating cloud resources in a cloud computing system based on tiered storage data movement includes: transmitting a request to a tiered storage system to provide a notification of a data movement initiated by a tiered storage system, where the data movement comprises moving data associated with the cloud computing system from a first storage tier to a second storage tier, and the notification comprises an indication of a condition for initiating the data movement; receiving the notification from the tiered storage system; identifying, using the received notification, a hosted computing environment having a volume associated with the data movement; determining whether to change an allocation of resources to the hosted computing environment; and changing the allocation of resources to the hosted computing environment response to determining to change the allocation of resources to the hosted computing environment.Type: ApplicationFiled: November 17, 2017Publication date: May 23, 2019Inventors: Jeffrey W. Tenner, Gerald McBrearty
-
Publication number: 20190109845Abstract: A first processor may receive a first request, from a first user, to initiate a first application. The first processor may initiate a first recording device. Initiating the first recording may include executing firmware embedded in the first recording device. The first processor may validate the identity of the first user using the first recording device. The first processor may initiate the first application. Initiating the first application may include loading and executing a first operating system associated with the first application.Type: ApplicationFiled: October 9, 2017Publication date: April 11, 2019Inventors: Johnny Shieh, Jessica Murillo, Susann Keohane, Gerald McBrearty
-
Publication number: 20190109846Abstract: A first processor may receive a first request, from a first user, to initiate a first application. The first processor may initiate a first recording device. Initiating the first recording may include executing firmware embedded in the first recording device. The first processor may validate the identity of the first user using the first recording device. The first processor may initiate the first application. Initiating the first application may include loading and executing a first operating system associated with the first application.Type: ApplicationFiled: November 16, 2017Publication date: April 11, 2019Inventors: Johnny Shieh, Jessica Murillo, Susann Keohane, Gerald McBrearty
-
Publication number: 20080114677Abstract: A method, system and computer program product for enabling user-customization of an ATM display/receipt for a transaction carried out at an automated teller machine (ATM). The customer/user of the ATM creates/selects specific alerts to be outputted during subsequent ATM transactions. The alerts/notices are linked to the customer account. During subsequent access to the user's account via an ATM, the pre-selected alert/notice is displayed to the user or printed on the transaction receipt.Type: ApplicationFiled: January 2, 2008Publication date: May 15, 2008Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
-
Publication number: 20080109499Abstract: A method, system, and program for adjusting the size of a file system and an inline file system log housed in a static logical volume. A computer system includes a logical volume allocated between an file system and its inline file system log. A request is received to adjust the inline log from a current size to a new size while maintaining the size of the logical volume. Storage space is then allocated from within the logical volume to the inline log according to the storage requirement for the new size. Allocating storage space may require decreasing or increasing the amount of storage formerly allocated to the inline log. Then, the inline log is reformatted to the allocated storage space, such that the storage allocated to the inline log for a file system is adjusted while the size of the logical volume housing the inline log and file system remains static.Type: ApplicationFiled: December 20, 2007Publication date: May 8, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: MARK GRUBBS, GERALD MCBREARTY, DUYEN TONG
-
Publication number: 20080082444Abstract: Controlling electronic withdrawals by a drawee including receiving in the drawee from a withdrawal device a withdrawal request, where the withdrawal request includes a withdrawal device identifier, a drawer identifier, and a withdrawal amount; retrieving from storage in computer memory of the drawee data representing limitations on electronic withdrawals for the drawer, wherein the limitations include a limitation on drawer location; and authorizing, by the drawee, an electronic withdrawal in dependence upon the limitations, including the limitation on drawer location. In typical embodiments, the limitations on electronic withdrawals may include limitations on withdrawal type account, withdrawal period, and maximum withdrawal amount. In typical embodiments, the limitation on drawer location may include a geographic area that includes one or more locations of withdrawal devices.Type: ApplicationFiled: December 3, 2007Publication date: April 3, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
-
Publication number: 20080067233Abstract: Controlling electronic withdrawals by a withdrawal device including creating in the withdrawal device a data structure representing a withdrawal request, where the data structure includes fields for a withdrawal device identifier, a drawer identifier, a drawee identifier, and a withdrawal amount; transmitting from the withdrawal device to a drawee a request for limitations on electronic withdrawals for the drawer, where the limitations include a limitation on drawer location; receiving in the withdrawal device from storage in computer memory of the drawee data representing the limitations on electronic withdrawals for the drawer, including the limitation on drawer location; and authorizing, by the withdrawal device, an electronic withdrawal in dependence upon the limitations, including the limitation on drawer location.Type: ApplicationFiled: November 20, 2007Publication date: March 20, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
-
Publication number: 20080052234Abstract: A method, system and computer program product for enabling user-customization of an ATM display/receipt for a transaction carried out at an automated teller machine (ATM). The customer/user of the ATM creates/selects specific alerts to be outputted during subsequent ATM transactions. The alerts/notices are linked to the customer account. During subsequent access to the user's account via an ATM, the pre-selected alert/notice is displayed to the user or printed on the transaction receipt.Type: ApplicationFiled: August 30, 2007Publication date: February 28, 2008Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh