Patents by Inventor Harry R. McGregor

Harry R. McGregor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11809379
    Abstract: Embodiments of the present disclosure include a computer-implemented method, a computer program product, and a system for storing data based, at least partially, on the deduplication rates of a storage system within a storage environment. The computer-implemented method includes receiving data to be stored in a storage environment, computing a hash for the received data, and querying storage deduplication agents for statuses of storage systems within the storage environment. The computer-implemented method also includes receiving deduplication rates and hash tables relating to the storage systems from the storage deduplication agents. The computer-implemented method further includes analyzing stored data stored on the storage systems using the deduplication rates and the hash tables and comparing the stored data to the received data.
    Type: Grant
    Filed: November 19, 2019
    Date of Patent: November 7, 2023
    Assignee: International Business Machines Corporation
    Inventors: Harry R. McGregor, Shazad Naviwala, Dessa Simpson, Christopher B. Moore
  • Patent number: 11082425
    Abstract: In an approach to securing data using alternative value identification schemes, one or more computer processors receive user registration data, wherein the user registration data includes one or more authentication parameters, wherein the one or more authentication parameters includes one or more physical pressure-based inputs by a user. The one or more computer processors receive an access request requiring an authentication from the user, wherein the access request includes the one or more physical pressure-based inputs by the user associated with the one or more authentication parameters. The one or more computer processors determine whether the one or more authentication parameters match the user registration data. Responsive to determining that the authentication data matches the registration data, the one or more computer processors authenticate access for the user.
    Type: Grant
    Filed: September 26, 2019
    Date of Patent: August 3, 2021
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Harry R. McGregor, Yossi Mesika, Christopher B. Moore
  • Publication number: 20210149846
    Abstract: Embodiments of the present disclosure include a computer-implemented method, a computer program product, and a system for storing data based, at least partially, on the deduplication rates of a storage system within a storage environment. The computer-implemented method includes receiving data to be stored in a storage environment, computing a hash for the received data, and querying storage deduplication agents for statuses of storage systems within the storage environment. The computer-implemented method also includes receiving deduplication rates and hash tables relating to the storage systems from the storage deduplication agents. The computer-implemented method further includes analyzing stored data stored on the storage systems using the deduplication rates and the hash tables and comparing the stored data to the received data.
    Type: Application
    Filed: November 19, 2019
    Publication date: May 20, 2021
    Inventors: Harry R. McGregor, Shazad Naviwala, Duncan X. Simpson, Christopher B. Moore
  • Patent number: 10981542
    Abstract: An embodiment of the invention may include a method, computer program product and computer system for optimizing course understanding. The method, computer program product and computer system may include a computing device to receive fueling location data and vehicle identification data of a vehicle from a radio frequency identification (RFID) transceiver from a plurality of fueling stations. The RFID transceiver may receive the vehicle identification data at the RFID transceiver from a cryptographic RFID transponder as part of the vehicle. The computing device may receive user authentication signals authorizing a plurality of fueling stations from an authorized user of the vehicle. The computing device may determine from the fueling location data, the vehicle identification data, and the user authentication signals one or more fueling patterns. The computing device may detect a fueling location deviating from the one or more fueling patterns send an alert to an authorized device.
    Type: Grant
    Filed: February 6, 2019
    Date of Patent: April 20, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Neil Sondhi
  • Patent number: 10956569
    Abstract: A method for defending a computing system against ransomware attacks is disclosed. In one embodiment, such a method includes identifying, on a computing system, files to be protected against ransomware attacks. The method appends a public key to each of the files. Upon receiving a request to modify a specific file, the method reads the public key appended to the file, requests an authentication token from a user, and computes a private key associated with the files. The method combines the public key, authentication token, and private key to generate an unlock key. This unlock key is compared to a validation key. The method authorizes modification of the file in the event the unlock key matches the validation key. A corresponding system and computer program product are also disclosed.
    Type: Grant
    Filed: September 6, 2018
    Date of Patent: March 23, 2021
    Assignee: International Business Machiness Corporation
    Inventors: Harry R. McGregor, Christopher B. Moore, Oded Margalit, Itzhack Goldberg
  • Patent number: 10936223
    Abstract: Embodiments of the present invention provides methods, computer program products, and a system for improving serial performance of a computer system storage volume. Embodiments of the present invention can be used to reduce a partition scheme of a storage volume to allow for a computer system to read the storage volume using additional system resources that were previously idle during a serial read operation. Embodiments of the present invention can be used to reserve random-access memory (RAM) to store metadata describing data stored on a storage volume that utilizes a reduced partition scheme. Once the serial read of the storage volume is complete, the embodiments of the present invention can revert the partition scheme back to the original partition scheme for normal, non-serial read operations.
    Type: Grant
    Filed: August 13, 2019
    Date of Patent: March 2, 2021
    Assignee: International Business Machines Corporation
    Inventors: Deborah A. Messing, Harry R. McGregor, Itzhack Goldberg, Christopher B. Moore
  • Patent number: 10884632
    Abstract: A technique for operating a data storage system includes generating information that identifies data that is currently stored in a write cache of the data storage system. The information is stored in a data structure associated with the data storage system. In response to a failure of the data storage system, the information in the data structure is accessed to identify the data that was lost in the failure.
    Type: Grant
    Filed: November 8, 2018
    Date of Patent: January 5, 2021
    Assignee: International Business Machines Corporation
    Inventors: Deborah A. Messing, Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore
  • Patent number: 10768844
    Abstract: A computer-implemented method, according to one embodiment, is for performing internal striping within a subset of slices. The computer-implemented method includes: receiving, by a computer, a logical unit; splitting, by the computer, the logical unit into a plurality of data chunks; and distributing, by the computer, the plurality of data chunks across the subset of slices such that the plurality of data chunks are striped across the subset of slices, and striped across a plurality of physical partitions in each of the subset of slices. Moreover, each of the subset of slices correspond to a different physical storage module in a single storage device. Other systems, methods, and computer program products are described in additional embodiments.
    Type: Grant
    Filed: May 15, 2018
    Date of Patent: September 8, 2020
    Assignee: International Business Machines Corporation
    Inventors: Harry R. McGregor, Christopher B. Moore, Deborah A. Messing, Itzhack Goldberg, Tomer Goldberg, Avi Liani, Moshe Kalish, Jonathan Amit
  • Patent number: 10689225
    Abstract: In an approach for determining an optimal path for an elevator, a processor receives information, wherein the information includes social media data associated with a user and calendar entries associated with the user, indicating one or more locations within a building. A processor analyzes the received information. A processor determines a location to send an elevator within the building to minimize movement of the elevator, based on the analyzed information. A processor causes the elevator to move to the location.
    Type: Grant
    Filed: February 27, 2018
    Date of Patent: June 23, 2020
    Assignee: International Business Machines Corporation
    Inventors: Emmanuel Barajas Gonzalez, Shaun E. Harrington, Harry R. McGregor, Christopher B. Moore
  • Patent number: 10673846
    Abstract: In an approach to securing data using alternative value identification schemes, one or more computer processors receive user registration data, wherein the user registration data includes one or more authentication parameters, wherein the one or more authentication parameters includes one or more physical pressure-based inputs by a user. The one or more computer processors receive an access request requiring an authentication from the user, wherein the access request includes the one or more physical pressure-based inputs by the user associated with the one or more authentication parameters. The one or more computer processors determine whether the one or more authentication parameters match the user registration data. Responsive to determining that the authentication data matches the registration data, The one or more computer processors authenticate access for the user.
    Type: Grant
    Filed: April 24, 2019
    Date of Patent: June 2, 2020
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Harry R. McGregor, Yossi Mesika, Christopher B. Moore
  • Patent number: 10664367
    Abstract: A computer-implemented method, according to one embodiment, includes: determining that a data storage drive in a first array has failed, determining a location to rebuild the failed data storage drive, instructing performance of a rebuild operation at the determined location, determining one or more data storage drives in one or more arrays having a combined amount of available space that is sufficient to mirror data and/or parity information of the first array, instructing mirroring of the data and/or parity information of the first array in parallel with performing the rebuild operation, instructing deletion of the mirrored data and/or parity information of the first array from the one or more data storage drives in response to the rebuild operation being completed, and instructing reallocation of the space in the one or more data storage drives used to mirror the data and/or parity information of the first array as available space.
    Type: Grant
    Filed: November 30, 2017
    Date of Patent: May 26, 2020
    Assignee: International Business Machines Corporation
    Inventors: Gary Anna, Emmanuel Barajas Gonzalez, Shaun E. Harrington, Harry R. McGregor, Christopher B. Moore
  • Publication number: 20200150876
    Abstract: A technique for operating a data storage system includes generating information that identifies data that is currently stored in a write cache of the data storage system. The information is stored in a data structure associated with the data storage system. In response to a failure of the data storage system, the information in the data structure is accessed to identify the data that was lost in the failure.
    Type: Application
    Filed: November 8, 2018
    Publication date: May 14, 2020
    Inventors: Deborah A. Messing, Itzhack Goldberg, HARRY R. MCGREGOR, Christopher B. Moore
  • Publication number: 20200082074
    Abstract: A method for defending a computing system against ransomware attacks is disclosed. In one embodiment, such a method includes identifying, on a computing system, files to be protected against ransomware attacks. The method appends a public key to each of the files. Upon receiving a request to modify a specific file, the method reads the public key appended to the file, requests an authentication token from a user, and computes a private key associated with the files. The method combines the public key, authentication token, and private key to generate an unlock key. This unlock key is compared to a validation key. The method authorizes modification of the file in the event the unlock key matches the validation key. A corresponding system and computer program product are also disclosed.
    Type: Application
    Filed: September 6, 2018
    Publication date: March 12, 2020
    Applicant: International Business Machines Corporation
    Inventors: Harry R. McGregor, Christopher B. Moore, Oded Margalit, Itzhack Goldberg
  • Publication number: 20200065718
    Abstract: A computer-implemented method for determining ad-hoc availability of physical resources and facilitating reservation thereof is disclosed. The method includes: determining a predictive schedule of a property owner; determining, based on the predictive schedule, an availability status of one or more physical resources at a particular point in time, the one or more physical resources being owned by the property owner; and offering access to the one or more physical resources in accordance with availability status thereof. Corresponding systems and computer program product embodiments are also disclosed.
    Type: Application
    Filed: August 24, 2018
    Publication date: February 27, 2020
    Inventors: Christopher B. Moore, Harry R. McGregor, Shaun E. Harrington, Alec Forszt, Emmanuel Barajas Gonzalez
  • Patent number: 10545502
    Abstract: Embodiments of the present invention disclose a method, computer program product, and system for directing movements of an autonomous vehicle. A vehicle operator exiting a vehicle is detected. A plurality of metadata is received wherein the plurality of metadata includes at least location data of a user and a timestamp. A pickup time and pickup location is identified based on received metadata. A route to the pickup location is generated based on at least a default location of the autonomous vehicle. The autonomous vehicle is directed to travel to the identified location such that the autonomous vehicle is arriving at the identified pickup time. Updates to the pickup location and pickup time are determined by dynamically monitoring received metadata. A modified route is generated, in response determining updates in one or more of the pickup location and pickup time and the autonomous vehicle is redirected to the updated pickup location.
    Type: Grant
    Filed: March 27, 2019
    Date of Patent: January 28, 2020
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Jose R. Mosqueda Mejia
  • Publication number: 20200021578
    Abstract: In an approach to securing data using alternative value identification schemes, one or more computer processors receive user registration data, wherein the user registration data includes one or more authentication parameters, wherein the one or more authentication parameters includes one or more physical pressure-based inputs by a user. The one or more computer processors receive an access request requiring an authentication from the user, wherein the access request includes the one or more physical pressure-based inputs by the user associated with the one or more authentication parameters. The one or more computer processors determine whether the one or more authentication parameters match the user registration data. Responsive to determining that the authentication data matches the registration data, the one or more computer processors authenticate access for the user.
    Type: Application
    Filed: September 26, 2019
    Publication date: January 16, 2020
    Inventors: Itzhack Goldberg, Harry R. McGregor, Yossi Mesika, Christopher B. Moore
  • Patent number: 10534755
    Abstract: An approach to de-duplicating data in an electronic text repository by performing the following steps: (i) processing one or more text documents associated with an electronic text repository to identify first instances of a plurality of words; (ii) adding words associated with the identified first instances of the plurality of words to a list, wherein each word added to the list is assigned a unique serial number; and (iii) replacing the plurality of words included in the one or more text documents with serial numbers corresponding to the words associated with the list for generating one or more reduced documents.
    Type: Grant
    Filed: October 13, 2016
    Date of Patent: January 14, 2020
    Assignee: International Business Machines Corporation
    Inventors: Olympia Gluck, Itzhack Goldberg, Harry R. McGregor, Christopher B. Moore, Neil Sondhi
  • Patent number: 10528295
    Abstract: A method for segregating zombie storage from dead storage is disclosed. In one embodiment, such a method includes tracking I/O to a storage tier intended to store inactive data. The method analyzes the I/O to identify slightly active data in the storage tier. The method further logically divides the storage tier into a zombie storage pool, intended to store slightly active data, and a dead storage pool, intended to store inactive data. The method segregates, within the storage tier, the slightly active data from the inactive data. This segregation process includes storing the slightly active data in the zombie storage pool and storing the inactive data in the dead storage pool. A corresponding system and computer program product are also disclosed.
    Type: Grant
    Filed: April 29, 2017
    Date of Patent: January 7, 2020
    Assignee: International Business Machines Corporation
    Inventors: Emmanuel Barajas Gonzalez, Shaun E. Harrington, Harry R. McGregor, Christopher B. Moore
  • Patent number: 10530770
    Abstract: In an approach to securing data using alternative value identification schemes, one or more computer processors receive user registration data, wherein the user registration data includes one or more authentication parameters, wherein the one or more authentication parameters includes one or more physical pressure-based inputs by a user. The one or more computer processors receive an access request requiring an authentication from the user, wherein the access request includes the one or more physical pressure-based inputs by the user associated with the one or more authentication parameters. The one or more computer processors determine whether the one or more authentication parameters match the user registration data. Responsive to determining that the authentication data matches the registration data, The one or more computer processors authenticate access for the user.
    Type: Grant
    Filed: June 28, 2017
    Date of Patent: January 7, 2020
    Assignee: International Business Machines Corporation
    Inventors: Itzhack Goldberg, Harry R. McGregor, Yossi Mesika, Christopher B. Moore
  • Publication number: 20190361619
    Abstract: Embodiments of the present invention provides methods, computer program products, and a system for improving serial performance of a computer system storage volume. Embodiments of the present invention can be used to reduce a partition scheme of a storage volume to allow for a computer system to read the storage volume using additional system resources that were previously idle during a serial read operation. Embodiments of the present invention can be used to reserve random-access memory (RAM) to store metadata describing data stored on a storage volume that utilizes a reduced partition scheme. Once the serial read of the storage volume is complete, the embodiments of the present invention can revert the partition scheme back to the original partition scheme for normal, non-serial read operations.
    Type: Application
    Filed: August 13, 2019
    Publication date: November 28, 2019
    Inventors: Deborah A. Messing, Harry R. McGregor, Itzhack Goldberg, Christopher B. Moore