Patents by Inventor Gerald McBrearty

Gerald McBrearty has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11902319
    Abstract: A computer-implemented process, computer program product, and system for dynamic change of a password under a brute force attack. A computer processor determines a quantity of consecutive unsuccessful attempts to access the targeted item protected by a password. Responsive to the quantity of consecutive unsuccessful attempts to access the targeted item exceeding a predefined threshold, the computer processor acquires a new password for access to the targeted item, wherein the new password is based on a more complex set of password generation rules than a current password. The computer processor changing the current password of the targeted item to the new password, and in response to changing the current password of the targeted item to the new password, the computer processor sends an encrypted message regarding the new password to a user associated with the targeted item.
    Type: Grant
    Filed: March 9, 2021
    Date of Patent: February 13, 2024
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald McBrearty, Jessica Murillo, Johnny Shieh
  • Patent number: 11119801
    Abstract: Method and system for deploying a virtual machine or attaching a storage volume to a virtual machine (VM). A process obtains information regarding fabrics attached to hosts and storage devices attached to the fabrics and determines whether a VM can be deployed to a host or whether storage volumes can be attached to a VM. In one case, determining that a fabric attached to a host can support a virtual SCSI volume causes migrating a VM to the host and attaching the virtual SCSI volume to the migrated VM. In another case, determining that the fabric attached to a host can support an NPIV volume causes migrating the VM to the host and attaching the NPIV volume to a virtual channel mapped to the fabric attached to the host. If the VM cannot be migrated, then the user is given an indication that the attachment is not possible.
    Type: Grant
    Filed: March 28, 2019
    Date of Patent: September 14, 2021
    Assignee: International Business Machines Corporation
    Inventor: Gerald McBrearty
  • Publication number: 20210218768
    Abstract: A computer-implemented process, computer program product, and system for dynamic change of a password under a brute force attack. A computer processor determines a quantity of consecutive unsuccessful attempts to access the targeted item protected by a password. Responsive to the quantity of consecutive unsuccessful attempts to access the targeted item exceeding a predefined threshold, the computer processor acquires a new password for access to the targeted item, wherein the new password is based on a more complex set of password generation rules than a current password. The computer processor changing the current password of the targeted item to the new password, and in response to changing the current password of the targeted item to the new password, the computer processor sends an encrypted message regarding the new password to a user associated with the targeted item.
    Type: Application
    Filed: March 9, 2021
    Publication date: July 15, 2021
    Inventors: Susann M. Keohane, Gerald McBrearty, Jessica Murillo, Johnny Shieh
  • Patent number: 10992663
    Abstract: A first processor may receive a first request, from a first user, to initiate a first application. The first processor may initiate a first recording device. Initiating the first recording may include executing firmware embedded in the first recording device. The first processor may validate the identity of the first user using the first recording device. The first processor may initiate the first application. Initiating the first application may include loading and executing a first operating system associated with the first application.
    Type: Grant
    Filed: November 16, 2017
    Date of Patent: April 27, 2021
    Assignee: International Business Machines Corporation
    Inventors: Johnny Shieh, Jessica Murillo, Susann Keohane, Gerald McBrearty
  • Patent number: 10992662
    Abstract: A first processor may receive a first request, from a first user, to initiate a first application. The first processor may initiate a first recording device. Initiating the first recording may include executing firmware embedded in the first recording device. The first processor may validate the identity of the first user using the first recording device. The first processor may initiate the first application. Initiating the first application may include loading and executing a first operating system associated with the first application.
    Type: Grant
    Filed: October 9, 2017
    Date of Patent: April 27, 2021
    Assignee: International Business Machines Corporation
    Inventors: Johnny Shieh, Jessica Murillo, Susann Keohane, Gerald McBrearty
  • Patent number: 10972498
    Abstract: A method, computer program product, and system for dynamic change of a password under a brute force attack. A computer processor monitors a password protected account. A frequency of access attempts to the account is determined and in response to the frequency of access attempts exceeding a first threshold, a brute force password attack against the account is determined. A quantity of consecutive unsuccessful access attempts is tracked and responsive to the unsuccessful access attempts exceeding a second predefined threshold, a new password of the account is acquired, in which the new password follows a more complex set of password generation rules than the current password. An encrypted message regarding the new password is sent to a user of the account, the password of the account is reset to the new password, and the quantity of consecutive unsuccessful attempts to access the account is reset to zero.
    Type: Grant
    Filed: October 8, 2018
    Date of Patent: April 6, 2021
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald McBrearty, Jessica Murillo, Johnny Shieh
  • Patent number: 10924336
    Abstract: Method and apparatus for dynamically updating a zoning methodology on a fibre channel (FC) fabric are provided. One example method generally includes receiving a request to provision storage to a virtual machine (VM) via the FC fabric connecting a host machine of the VM to a storage area network (SAN) and determining a dynamic zoning methodology to use for the VM. The method further includes determining a previous zoning methodology in use by the fabric, updating the FC fabric from the previous zoning methodology to the dynamic zoning methodology by modifying a zoning table of the FC fabric and activating the dynamic zoning methodology on the FC fabric.
    Type: Grant
    Filed: January 10, 2019
    Date of Patent: February 16, 2021
    Assignee: International Business Machines Corporation
    Inventor: Gerald McBrearty
  • Publication number: 20200310854
    Abstract: Method and system for deploying a virtual machine or attaching a storage volume to a virtual machine (VM). A process obtains information regarding fabrics attached to hosts and storage devices attached to the fabrics and determines whether a VM can be deployed to a host or whether storage volumes can be attached to a VM. In one case, determining that a fabric attached to a host can support a virtual SCSI volume causes migrating a VM to the host and attaching the virtual SCSI volume to the migrated VM. In another case, determining that the fabric attached to a host can support an NPIV volume causes migrating the VM to the host and attaching the NPIV volume to a virtual channel mapped to the fabric attached to the host. If the VM cannot be migrated, then the user is given an indication that the attachment is not possible.
    Type: Application
    Filed: March 28, 2019
    Publication date: October 1, 2020
    Inventor: Gerald MCBREARTY
  • Patent number: 10725660
    Abstract: A method for enabling management of cloud resources based on tiered storage data movement includes receiving a request from a cloud computing system to provide the cloud computing system a notification of a data movement initiated by a tiered storage system, where the data movement comprises moving data associated with the cloud computing system from a first storage tier to a second storage tier, and the notification comprises an indication of a condition for initiating the data movement. The method then includes determining that a condition for initiating the data movement was satisfied. The method further includes initiating the data movement in response to determining that the condition was satisfied. The method additionally includes transmitting the notification in response to initiating the data movement.
    Type: Grant
    Filed: November 17, 2017
    Date of Patent: July 28, 2020
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey W. Tenner, Gerald McBrearty
  • Publication number: 20200228398
    Abstract: Method and apparatus for dynamically updating a zoning methodology on a fibre channel (FC) fabric are provided. One example method generally includes receiving a request to provision storage to a virtual machine (VM) via the FC fabric connecting a host machine of the VM to a storage area network (SAN) and determining a dynamic zoning methodology to use for the VM. The method further includes determining a previous zoning methodology in use by the fabric, updating the FC fabric from the previous zoning methodology to the dynamic zoning methodology by modifying a zoning table of the FC fabric and activating the dynamic zoning methodology on the FC fabric.
    Type: Application
    Filed: January 10, 2019
    Publication date: July 16, 2020
    Inventor: Gerald MCBREARTY
  • Publication number: 20200112585
    Abstract: A method, computer program product, and system for dynamic change of a password under a brute force attack. A computer processor monitors a password protected account. A frequency of access attempts to the account is determined and in response to the frequency of access attempts exceeding a first threshold, a brute force password attack against the account is determined. A quantity of consecutive unsuccessful access attempts is tracked and responsive to the unsuccessful access attempts exceeding a second predefined threshold, a new password of the account is acquired, in which the new password follows a more complex set of password generation rules than the current password. An encrypted message regarding the new password is sent to a user of the account, the password of the account is reset to the new password, and the quantity of consecutive unsuccessful attempts to access the account is reset to zero.
    Type: Application
    Filed: October 8, 2018
    Publication date: April 9, 2020
    Inventors: Susann M. Keohane, Gerald McBrearty, Jessica Murillo, Johnny Shieh
  • Publication number: 20190155512
    Abstract: A method for enabling management of cloud resources based on tiered storage data movement includes receiving a request from a cloud computing system to provide the cloud computing system a notification of a data movement initiated by a tiered storage system, where the data movement comprises moving data associated with the cloud computing system from a first storage tier to a second storage tier, and the notification comprises an indication of a condition for initiating the data movement. The method then includes determining that a condition for initiating the data movement was satisfied. The method further includes initiating the data movement in response to determining that the condition was satisfied. The method additionally includes transmitting the notification in response to initiating the data movement.
    Type: Application
    Filed: November 17, 2017
    Publication date: May 23, 2019
    Inventors: Jeffrey W. Tenner, Gerald McBrearty
  • Publication number: 20190155511
    Abstract: A method for allocating cloud resources in a cloud computing system based on tiered storage data movement includes: transmitting a request to a tiered storage system to provide a notification of a data movement initiated by a tiered storage system, where the data movement comprises moving data associated with the cloud computing system from a first storage tier to a second storage tier, and the notification comprises an indication of a condition for initiating the data movement; receiving the notification from the tiered storage system; identifying, using the received notification, a hosted computing environment having a volume associated with the data movement; determining whether to change an allocation of resources to the hosted computing environment; and changing the allocation of resources to the hosted computing environment response to determining to change the allocation of resources to the hosted computing environment.
    Type: Application
    Filed: November 17, 2017
    Publication date: May 23, 2019
    Inventors: Jeffrey W. Tenner, Gerald McBrearty
  • Publication number: 20190109845
    Abstract: A first processor may receive a first request, from a first user, to initiate a first application. The first processor may initiate a first recording device. Initiating the first recording may include executing firmware embedded in the first recording device. The first processor may validate the identity of the first user using the first recording device. The first processor may initiate the first application. Initiating the first application may include loading and executing a first operating system associated with the first application.
    Type: Application
    Filed: October 9, 2017
    Publication date: April 11, 2019
    Inventors: Johnny Shieh, Jessica Murillo, Susann Keohane, Gerald McBrearty
  • Publication number: 20190109846
    Abstract: A first processor may receive a first request, from a first user, to initiate a first application. The first processor may initiate a first recording device. Initiating the first recording may include executing firmware embedded in the first recording device. The first processor may validate the identity of the first user using the first recording device. The first processor may initiate the first application. Initiating the first application may include loading and executing a first operating system associated with the first application.
    Type: Application
    Filed: November 16, 2017
    Publication date: April 11, 2019
    Inventors: Johnny Shieh, Jessica Murillo, Susann Keohane, Gerald McBrearty
  • Publication number: 20080114677
    Abstract: A method, system and computer program product for enabling user-customization of an ATM display/receipt for a transaction carried out at an automated teller machine (ATM). The customer/user of the ATM creates/selects specific alerts to be outputted during subsequent ATM transactions. The alerts/notices are linked to the customer account. During subsequent access to the user's account via an ATM, the pre-selected alert/notice is displayed to the user or printed on the transaction receipt.
    Type: Application
    Filed: January 2, 2008
    Publication date: May 15, 2008
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20080109499
    Abstract: A method, system, and program for adjusting the size of a file system and an inline file system log housed in a static logical volume. A computer system includes a logical volume allocated between an file system and its inline file system log. A request is received to adjust the inline log from a current size to a new size while maintaining the size of the logical volume. Storage space is then allocated from within the logical volume to the inline log according to the storage requirement for the new size. Allocating storage space may require decreasing or increasing the amount of storage formerly allocated to the inline log. Then, the inline log is reformatted to the allocated storage space, such that the storage allocated to the inline log for a file system is adjusted while the size of the logical volume housing the inline log and file system remains static.
    Type: Application
    Filed: December 20, 2007
    Publication date: May 8, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: MARK GRUBBS, GERALD MCBREARTY, DUYEN TONG
  • Publication number: 20080082444
    Abstract: Controlling electronic withdrawals by a drawee including receiving in the drawee from a withdrawal device a withdrawal request, where the withdrawal request includes a withdrawal device identifier, a drawer identifier, and a withdrawal amount; retrieving from storage in computer memory of the drawee data representing limitations on electronic withdrawals for the drawer, wherein the limitations include a limitation on drawer location; and authorizing, by the drawee, an electronic withdrawal in dependence upon the limitations, including the limitation on drawer location. In typical embodiments, the limitations on electronic withdrawals may include limitations on withdrawal type account, withdrawal period, and maximum withdrawal amount. In typical embodiments, the limitation on drawer location may include a geographic area that includes one or more locations of withdrawal devices.
    Type: Application
    Filed: December 3, 2007
    Publication date: April 3, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20080067233
    Abstract: Controlling electronic withdrawals by a withdrawal device including creating in the withdrawal device a data structure representing a withdrawal request, where the data structure includes fields for a withdrawal device identifier, a drawer identifier, a drawee identifier, and a withdrawal amount; transmitting from the withdrawal device to a drawee a request for limitations on electronic withdrawals for the drawer, where the limitations include a limitation on drawer location; receiving in the withdrawal device from storage in computer memory of the drawee data representing the limitations on electronic withdrawals for the drawer, including the limitation on drawer location; and authorizing, by the withdrawal device, an electronic withdrawal in dependence upon the limitations, including the limitation on drawer location.
    Type: Application
    Filed: November 20, 2007
    Publication date: March 20, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20080052234
    Abstract: A method, system and computer program product for enabling user-customization of an ATM display/receipt for a transaction carried out at an automated teller machine (ATM). The customer/user of the ATM creates/selects specific alerts to be outputted during subsequent ATM transactions. The alerts/notices are linked to the customer account. During subsequent access to the user's account via an ATM, the pre-selected alert/notice is displayed to the user or printed on the transaction receipt.
    Type: Application
    Filed: August 30, 2007
    Publication date: February 28, 2008
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh