Patents by Inventor Kurt Rybczyk

Kurt Rybczyk has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10956277
    Abstract: Backup schedule optimization is provided. Data describing a first backup schedule for a first backup server is identified. Performance metric data and workload data for a first backup server and a second backup server is collected. If a count of backup windows represented by workload data for the first backup server exceeds a data collection threshold, an updated backup schedule that offloads a pending job from the first backup server to the second backup server can be generated. The updated backup schedule is generated if a maximum average I/O threshold for the first backup server was exceeded while a minimum average I/O threshold for the second backup server was deceeded. The maximum and minimum average I/O thresholds are calculated based on respective target average I/O rates for the first and second backup servers, the target average I/O rates derived from respective perform metric data.
    Type: Grant
    Filed: November 27, 2018
    Date of Patent: March 23, 2021
    Assignee: International Business Machines Corporation
    Inventors: Marci D. Formato, Bernhard J. Klingenberg, Steven M. Reps, Kurt A. Rybczyk, Lisa A. Shepard
  • Patent number: 10831888
    Abstract: A method for detecting ransomware. A set of control files in a set of locations in a file system is checked, by a computer system, in response to an event, wherein the set of control files has a set of extensions targeted by the ransomware. In response to detecting a change in any of the set of control files, a file copying process for the file system is disabled by the computer system.
    Type: Grant
    Filed: January 19, 2018
    Date of Patent: November 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Marci D. Formato, Bernhard J. Klingenberg, Andrew S. Kronstadt, Kurt A. Rybczyk, Lisa A. Shepard
  • Patent number: 10833854
    Abstract: Generating a secondary security key from a primary security key is provided. A first numeric code that is an alternate numeric representation of a first character in a primary security key is added to a second numeric code that is an alternate numeric representation of a second character in the primary security key to generate a running total value. The running total value is automatically designated as a secondary security key such that the primary security key is transformed into the secondary security key that is usable for encrypting data to provide a more secure computer system. The data is encrypted with the secondary security key.
    Type: Grant
    Filed: May 21, 2019
    Date of Patent: November 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Mark V. Chitti, Kirby G. Dahman, Ronda L. McCain, Kurt A. Rybczyk, Keith C. Williams
  • Patent number: 10761945
    Abstract: A method, apparatus, system, and computer program product for dynamically directing data in a deduplication backup system. A computer system identifies a data type for the data. The computer system determines whether the data is suitable for deduplication in the deduplication backup system based on the data type identified for the data and a policy. The computer system directs the data to a deduplication storage pool responsive to the data having the data type that is suitable for deduplication, reducing storage usage issues for backing up the data in the computer system.
    Type: Grant
    Filed: June 19, 2018
    Date of Patent: September 1, 2020
    Assignee: International Business Machines Corporation
    Inventors: Bernhard J. Klingenberg, Daniela Kern Mainieri Trevisan, Kurt Rybczyk, Lisa A. Shepard
  • Patent number: 10609086
    Abstract: A specification of a target network environment including target devices is received. The specification includes an identity of each of the target devices and a compression feature requirement, a deduplication feature requirement, and an encryption feature requirement of the target network environment. A performance parameter corresponding to each of the requirements is computed based on the specification. Possible combinations of the target devices and enabled features in the target devices are determined to meet the specification. Each possible combination is compared to a knowledge base to determine a performance reduction for each of the enabled features based upon the performance parameters. A desired combination of the enabled features is determined from the possible combinations for each target device based upon the comparison. The desired combination includes a combination having a performance reduction that does not exceed a threshold value for data reduction in one or more enabled features.
    Type: Grant
    Filed: April 11, 2019
    Date of Patent: March 31, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Nathan B. Best, Mikael H. Lindström, Kurt A. Rybczyk, Daniela Kern Mainieri Trevisan
  • Patent number: 10592355
    Abstract: Embodiments of the present invention provide methods, program products, and systems for determining an amount of usable storage in a backup environment. Embodiments of the present invention can be used to receive system information pertaining to a storage backup environment. Embodiments of the present invention can calculate a compression ratio of the storage on a backup server and a backup ratio between an amount of data on a client computer system and an amount of data on the backup server and calculate an average amount of storage consumed on the backup server. Embodiments of the present invention can determine an existing backup capacity for the storage backup environment by identifying an amount representing the actual capacity of data capable of being stored on the backup server and reducing the amount representing the actual capacity according to the calculated average amount of storage consumed on the backup server.
    Type: Grant
    Filed: November 13, 2018
    Date of Patent: March 17, 2020
    Assignee: International Business Machines Corporation
    Inventors: Marci D. Formato, Bernhard J. Klingenberg, Steven M. Reps, Kurt A. Rybczyk, Lisa A. Shepard
  • Publication number: 20190384675
    Abstract: A method, apparatus, system, and computer program product for dynamically directing data in a deduplication backup system. A computer system identifies a data type for the data. The computer system determines whether the data is suitable for deduplication in the deduplication backup system based on the data type identified for the data and a policy. The computer system directs the data to a deduplication storage pool responsive to the data having the data type that is suitable for deduplication, reducing storage usage issues for backing up the data in the computer system.
    Type: Application
    Filed: June 19, 2018
    Publication date: December 19, 2019
    Inventors: Bernhard J. Klingenberg, Daniela Kern Mainieri Trevisan, Kurt Rybczyk, Lisa A. Shepard
  • Publication number: 20190310920
    Abstract: Pre-fetching and staging restore data is provided. A set of data corresponding to a client device is collected from each respective data source in a plurality of data sources. A score is determined for each set of data collected. A probability of receiving a request to restore backup data on the client device is predicted based on analysis of the set of data from each respective data source and the score for each set of data. It is determined whether the predicted probability of receiving a request to restore the backup data on the client device is greater than a threshold. In response to determining that the predicted probability of receiving a request to restore the backup data on the client device is greater than the threshold, the backup data of the client device is preemptively moved to a fastest data storage tier in a multi-tiered backup data storage system.
    Type: Application
    Filed: April 4, 2018
    Publication date: October 10, 2019
    Inventors: Kurt Rybczyk, Christopher C. Bode, Lisa A. Shepard, Matthew Lavigne
  • Publication number: 20190274037
    Abstract: Generating a secondary security key from a primary security key is provided. A first numeric code that is an alternate numeric representation of a first character in a primary security key is added to a second numeric code that is an alternate numeric representation of a second character in the primary security key to generate a running total value. The running total value is automatically designated as a secondary security key such that the primary security key is transformed into the secondary security key that is usable for encrypting data to provide a more secure computer system. The data is encrypted with the secondary security key.
    Type: Application
    Filed: May 21, 2019
    Publication date: September 5, 2019
    Inventors: Mark V. Chitti, Kirby G. Dahman, Ronda L. McCain, Kurt A. Rybczyk, Keith C. Williams
  • Patent number: 10382952
    Abstract: A method, system, and/or computer program product generate a secondary security key from a primary security key. One or more processors, receive a primary security key. The processor(s) retrieve a first numeric code that is an alternate numeric representation of a first character in the primary security key. The processor(s) retrieve a second numeric code that is an alternate numeric representation of a second character in the primary security key. The processor(s) add the first numeric code to the second numeric code to generate a running total value. The processor(s) designate the running total value as a secondary security key, and encrypt data with the secondary security key.
    Type: Grant
    Filed: May 19, 2016
    Date of Patent: August 13, 2019
    Assignee: International Business Machines Corporation
    Inventors: Mark V. Chitti, Kirby G. Dahman, Ronda L. McCain, Kurt A. Rybczyk, Keith C. Williams
  • Publication number: 20190245891
    Abstract: A specification of a target network environment including target devices is received. The specification includes an identity of each of the target devices and a compression feature requirement, a deduplication feature requirement, and an encryption feature requirement of the target network environment. A performance parameter corresponding to each of the requirements is computed based on the specification. Possible combinations of the target devices and enabled features in the target devices are determined to meet the specification. Each possible combination is compared to a knowledge base to determine a performance reduction for each of the enabled features based upon the performance parameters. A desired combination of the enabled features is determined from the possible combinations for each target device based upon the comparison. The desired combination includes a combination having a performance reduction that does not exceed a threshold value for data reduction in one or more enabled features.
    Type: Application
    Filed: April 11, 2019
    Publication date: August 8, 2019
    Applicant: International Business Machines Corporation
    Inventors: Nathan B. Best, Mikael H. Lindström, Kurt A. Rybczyk, Daniela Kern Mainieri Trevisan
  • Publication number: 20190228147
    Abstract: A method for detecting ransomware. A set of control files in a set of locations in a file system is checked, by a computer system, in response to an event, wherein the set of control files has a set of extensions targeted by the ransomware. In response to detecting a change in any of the set of control files, a file copying process for the file system is disabled by the computer system.
    Type: Application
    Filed: January 19, 2018
    Publication date: July 25, 2019
    Inventors: Marci D. Formato, Bernhard J. Klingenberg, Andrew S. Kronstadt, Kurt A. Rybczyk, Lisa A. Shepard
  • Patent number: 10333984
    Abstract: A specification of a target network environment including target devices is received. The specification includes an identity of each of the target devices and a compression feature requirement, a deduplication feature requirement, and an encryption feature requirement of the target network environment. A performance parameter corresponding to each of the requirements is computed based on the specification. Possible combinations of the target devices and enabled features in the target devices are determined to meet the specification. Each possible combination is compared to a knowledge base to determine a performance reduction for each of the enabled features based upon the performance parameters. A desired combination of the enabled features is determined from the possible combinations for each target device based upon the comparison. The desired combination includes a combination having a performance reduction that does not exceed a threshold value for data reduction in one or more enabled features.
    Type: Grant
    Filed: February 21, 2017
    Date of Patent: June 25, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Nathan B. Best, Mikael H. Lindström, Kurt A. Rybczyk, Daniela Kern Mainieri Trevisan
  • Patent number: 10331524
    Abstract: Backup schedule optimization is provided. Backup environment data is identified. Data describing a first backup schedule is identified. Performance metric data that includes data for a data storage array of computer data storage device(s) of a backup server is collected. Data describing backup log(s) that associated with jobs backed up to the data storage array and respectively executed during backup window(s) is received. A target average I/O rate is determined based on the performance metric data of the data storage array. A second backup schedule is generated based on the target average I/O rate, average I/O rate(s) of the data storage array, the backup environment data, and the data describing one or more backup logs. A start time of a job is scheduled in the second backup schedule for a different time in a backup window compared to a start time of the job in the first backup schedule.
    Type: Grant
    Filed: June 21, 2016
    Date of Patent: June 25, 2019
    Assignee: International Business Machines Corporation
    Inventors: Marci D. Formato, Bernhard J. Klingenberg, Steven M. Reps, Kurt A. Rybczyk, Lisa A. Shepard
  • Patent number: 10268401
    Abstract: A method, computer system and computer program product for managing tapes storing a backup for a node. The method identifies the node for which a current set of tapes is present. The method determines whether the current set of tapes exceeds a threshold for undesired fragmentation for the node and moves data in the current set of tapes to a new set of tapes when a physical tape count exceeds the threshold for undesired fragmentation, wherein the data is more contiguous in the new set of tapes than the current set of tapes.
    Type: Grant
    Filed: February 1, 2017
    Date of Patent: April 23, 2019
    Assignee: International Business Machines Corporation
    Inventors: Bernhard J. Klingenberg, Steven M. Reps, Kurt A. Rybczyk, Lisa A. Shepard
  • Patent number: 10248513
    Abstract: Embodiments of the present invention provide methods, program products, and systems for determining an amount of usable storage in a backup environment. Embodiments of the present invention can be used to receive system information pertaining to a storage backup environment. Embodiments of the present invention can calculate a compression ratio of the storage on a backup server and a backup ratio between an amount of data on a client computer system and an amount of data on the backup server and calculate an average amount of storage consumed on the backup server. Embodiments of the present invention can determine an existing backup capacity for the storage backup environment by identifying an amount representing the actual capacity of data capable of being stored on the backup server and reducing the amount representing the actual capacity according to the calculated average amount of storage consumed on the backup server.
    Type: Grant
    Filed: March 15, 2016
    Date of Patent: April 2, 2019
    Assignee: International Business Machines Corporation
    Inventors: Marci D. Formato, Bernhard J. Klingenberg, Steven M. Reps, Kurt A. Rybczyk, Lisa A. Shepard
  • Publication number: 20190095288
    Abstract: Backup schedule optimization is provided. Data describing a first backup schedule for a first backup server is identified. Performance metric data and workload data for a first backup server and a second backup server is collected. If a count of backup windows represented by workload data for the first backup server exceeds a data collection threshold, an updated backup schedule that offloads a pending job from the first backup server to the second backup server can be generated. The updated backup schedule is generated if a maximum average I/O threshold for the first backup server was exceeded while a minimum average I/O threshold for the second backup server was deceeded. The maximum and minimum average I/O thresholds are calculated based on respective target average I/O rates for the first and second backup servers, the target average I/O rates derived from respective perform metric data.
    Type: Application
    Filed: November 27, 2018
    Publication date: March 28, 2019
    Inventors: Marci D. Formato, Bernhard J. Klingenberg, Steven M. Reps, Kurt A. Rybczyk, Lisa A. Shepard
  • Publication number: 20190079833
    Abstract: Embodiments of the present invention provide methods, program products, and systems for determining an amount of usable storage in a backup environment. Embodiments of the present invention can be used to receive system information pertaining to a storage backup environment. Embodiments of the present invention can calculate a compression ratio of the storage on a backup server and a backup ratio between an amount of data on a client computer system and an amount of data on the backup server and calculate an average amount of storage consumed on the backup server. Embodiments of the present invention can determine an existing backup capacity for the storage backup environment by identifying an amount representing the actual capacity of data capable of being stored on the backup server and reducing the amount representing the actual capacity according to the calculated average amount of storage consumed on the backup server.
    Type: Application
    Filed: November 13, 2018
    Publication date: March 14, 2019
    Inventors: Marci D. Formato, Bernhard J. Klingenberg, Steven M. Reps, Kurt A. Rybczyk, Lisa A. Shepard
  • Publication number: 20180241777
    Abstract: A specification of a target network environment including target devices is received. The specification includes an identity of each of the target devices and a compression feature requirement, a deduplication feature requirement, and an encryption feature requirement of the target network environment. A performance parameter corresponding to each of the requirements is computed based on the specification. Possible combinations of the target devices and enabled features in the target devices are determined to meet the specification. Each possible combination is compared to a knowledge base to determine a performance reduction for each of the enabled features based upon the performance parameters. A desired combination of the enabled features is determined from the possible combinations for each target device based upon the comparison. The desired combination includes a combination having a performance reduction that does not exceed a threshold value for data reduction in one or more enabled features.
    Type: Application
    Filed: February 21, 2017
    Publication date: August 23, 2018
    Applicant: International Business Machines Corporation
    Inventors: Nathan B. Best, Mikael H. Lindström, Kurt A. Rybczyk, Daniela Kern Mainieri Trevisan
  • Publication number: 20180217767
    Abstract: A method, computer system and computer program product for managing tapes storing a backup for a node. The method identifies the node for which a current set of tapes is present. The method determines whether the current set of tapes exceeds a threshold for undesired fragmentation for the node and moves data in the current set of tapes to a new set of tapes when a physical tape count exceeds the threshold for undesired fragmentation, wherein the data is more contiguous in the new set of tapes than the current set of tapes.
    Type: Application
    Filed: February 1, 2017
    Publication date: August 2, 2018
    Inventors: Bernhard J. Klingenberg, Steven M. Reps, Kurt A. Rybczyk, Lisa A. Shepard