Patents by Inventor Jeffrey J. Darcy
Jeffrey J. Darcy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11157459Abstract: A first storage server of the file system receives a request to perform an operation on the data file. The operation is to be performed on a first replica of the data file stored at the first storage server and a second replica of the data file stored at a second storage server of the file system. The first storage server configures first metadata associated with a first index file to indicate that the operation is to be performed on a first portion of the first replica. The first storage server determines the second replica is an outdated state indicating that the operation on the second replica has not been performed by the second storage server. In response to the second replica being in the outdated state, updating a first portion of the second replica identified in view of the first metadata and corresponding to the first portion of the first replica.Type: GrantFiled: February 26, 2016Date of Patent: October 26, 2021Assignee: Red Hat, Inc.Inventors: Pranith Kumar Karampuri, Jeffrey J. Darcy
-
Publication number: 20170249334Abstract: A granular data self-healing manager in a file system is described. A first storage server of the file system receives a request to perform an operation on the data file. The operation is to be performed on a first replica of the data file stored at the first storage server and a second replica of the data file stored at a second storage server of the file system. The first storage server configures first metadata associated with a first index file to indicate that the operation is to be performed on a first portion of the first replica. The first storage server determines the second replica is an outdated state indicating that the operation on the second replica has not been performed by the second storage server. In response to the second replica being in the outdated state, updating a first portion of the second replica identified in view of the first metadata and corresponding to the first portion of the first replica.Type: ApplicationFiled: February 26, 2016Publication date: August 31, 2017Inventors: Pranith Kumar Karampuri, Jeffrey J. Darcy
-
Patent number: 9038194Abstract: Methods and systems for encrypting and decrypting data are described. In one embodiment, a client computing system sends to a server computing system over a network a first network request to perform multiple operations such as a lease operation and a fetch operation. In response, the server computing system performs the operations. Subsequently, the client computing system can send subsequent network requests to write re-encrypted data and to relinquish the lease. The subsequent network requests may also be single network requests that perform lease operations, as well as other operations, such as operations for block alignment purposes. The client computing system can send an actual end of file when relinquishing the lease so that the server computing system can handle a remainder of data that is used for subsequently decrypting the re-encrypted data.Type: GrantFiled: November 30, 2011Date of Patent: May 19, 2015Assignee: Red Hat, Inc.Inventor: Jeffrey J. Darcy
-
Patent number: 8769071Abstract: Some embodiments of a system and a method to dynamically create mappings between tenant-specific user identifiers (IDs) and global user IDs in a multi-tenant computing system have been presented. In response to a request to map a tenant user identifier (ID) pair comprising a tenant identifier (ID) and a tenant-specific user ID, a server in a networked system creates a mapping of the tenant user ID pair to a global user ID that is not yet used. The server is communicably coupled to other servers in the networked system, and the tenant ID is associated with a tenant in the networked system. The server may immediately makes the mapping of the tenant user ID pair to the global user ID available to the other servers in the networked system.Type: GrantFiled: February 25, 2011Date of Patent: July 1, 2014Assignee: Red Hat, Inc.Inventor: Jeffrey J. Darcy
-
Patent number: 8767959Abstract: Methods and systems for encrypting and decrypting data are described. In one embodiment, a computing system determines a first initialization vector (IV) from another IV and a sequence number of a block of information, and hashes the first IV to create a hash. The computing system then determines a first block from the first block of information and the first hash and enciphers the first block to generate a block of ciphertext. In another embodiment, the computing system deciphers the block of ciphertext to generate the first block, and determines the first IV from the other IV and a sequence number of a block of information. The computing system hashes the first IV to create a hash and determines a block of information corresponding to the first block of ciphertext from the first block and the hash.Type: GrantFiled: November 30, 2011Date of Patent: July 1, 2014Assignee: Red Hat, Inc.Inventors: Robert Relyea, Jeffrey J. Darcy
-
Publication number: 20130138955Abstract: Methods and systems for encrypting and decrypting data are described. In one embodiment, a client computing system sends to a server computing system over a network a first network request to perform multiple operations such as a lease operation and a fetch operation. In response, the server computing system performs the operations. Subsequently, the client computing system can send subsequent network requests to write re-encrypted data and to relinquish the lease. The subsequent network requests may also be single network requests that perform lease operations, as well as other operations, such as operations for block alignment purposes. The client computing system can send an actual end of file when relinquishing the lease so that the server computing system can handle a remainder of data that is used for subsequently decrypting the re-encrypted data.Type: ApplicationFiled: November 30, 2011Publication date: May 30, 2013Inventor: Jeffrey J. Darcy
-
Publication number: 20130136256Abstract: Methods and systems for encrypting and decrypting data are described. In one embodiment, a computing system determines a first initialization vector (IV) from another IV and a sequence number of a block of information, and hashes the first IV to create a hash. The computing system then determines a first block from the first block of information and the first hash and enciphers the first block to generate a block of ciphertext. In another embodiment, the computing system deciphers the block of ciphertext to generate the first block, and determines the first IV from the other IV and a sequence number of a block of information. The computing system hashes the first IV to create a hash and determines a block of information corresponding to the first block of ciphertext from the first block and the hash.Type: ApplicationFiled: November 30, 2011Publication date: May 30, 2013Inventors: Robert Relyea, Jeffrey J. Darcy
-
Publication number: 20120221694Abstract: Some embodiments of a system and a method to dynamically create mappings between tenant-specific user identifiers (IDs) and global user IDs in a multi-tenant computing system have been presented. In response to a request to map a tenant user identifier (ID) pair comprising a tenant identifier (ID) and a tenant-specific user ID, a server in a networked system creates a mapping of the tenant user ID pair to a global user ID that is not yet used. The server is communicably coupled to other servers in the networked system, and the tenant ID is associated with a tenant in the networked system. The server may immediately makes the mapping of the tenant user ID pair to the global user ID available to the other servers in the networked system.Type: ApplicationFiled: February 25, 2011Publication date: August 30, 2012Inventor: Jeffrey J. Darcy
-
Patent number: 7325097Abstract: A method and apparatus for use in a computer system including a plurality of host computers including a root host computer and at least one child host computer. The root host computer exports at least a portion of the volume of storage to the at least one child host computer so they can share access to the volume of storage. In one embodiment, the volume of storage is stored on at least one non-volatile storage device. In another aspect, the volume of storage is made available to the root from a storage system. In a further aspect, at least a second portion of the volume of storage is exported from a child host computer to at least one grandchild host computer.Type: GrantFiled: October 1, 2003Date of Patent: January 29, 2008Assignee: EMC CorporationInventor: Jeffrey J. Darcy
-
Patent number: 7124249Abstract: A method and apparatus for use in a computer system including a plurality of host computers including a root host computer and at least one child host computer. The root host computer exports at least a portion of the volume of storage to the at least one child host computer so they can share access to the volume of storage. In one embodiment, the volume of storage is stored on at least one non-volatile storage device. In another aspect, the volume of storage is made available to the root from a storage system. In a further aspect, at least a second portion of the volume of storage is exported from a child host computer to at least one grandchild host computer.Type: GrantFiled: October 1, 2003Date of Patent: October 17, 2006Assignee: EMC CorporationInventor: Jeffrey J. Darcy