Patents by Inventor Lisa R. Martinez
Lisa R. Martinez has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11952827Abstract: A system includes a portable locker configured to contain contents and a remote server. The portable locker is configured to prevent access to the contents until the portable locker arrives at a preset destination from a starting location and notify a remote server in response to a determination that the portable locker is not within a threshold range of a user device during transit to the predefined destination.Type: GrantFiled: October 21, 2022Date of Patent: April 9, 2024Assignee: Wells Fargo Bank, N.A.Inventors: Darren M. Goetz, Lisa R. Magana, Andrew L. Martinez, Uma Meyyappan, Dennis E. Montenegro, Marla M. Pacis, Timothy R. Ward, Chris Kalaboukis
-
Patent number: 11372710Abstract: A computer-implemented method for preemptively migrating a failing extent includes receiving information of one or more failure conditions associated with an extent stored in a first storage portion of a first storage tier; predicting a failure of the extent based on the information; and selecting a second storage portion located in one of a plurality of storage tiers. The method also includes migrating the extent to the selected second storage portion. The selected second storage portion to which the extent is migrated is located in a lower storage tier. The lower storage tier includes less expensive and/or slower-to-access storage media than the first storage tier.Type: GrantFiled: March 20, 2019Date of Patent: June 28, 2022Assignee: International Business Machines CorporationInventors: Juan A. Coronado, Lisa R. Martinez, Beth A. Peterson, Jennifer S. Shioya
-
Patent number: 10902120Abstract: In one embodiment of file integrity preservation in accordance with the present description, a file is subdivided into a plurality of subfiles, and a write update originally targeted for a portion of that file contained within one of the subfiles, is instead directed to a temporary copy subfile. As a consequence, the temporary copy subfile which is updated with the write data, may be scanned for viruses or other malware separately from the original file and its corresponding original subfile. If the temporary copy subfile passes the scanning test, the originally targeted file may be updated with the updated contents of the clean temporary copy subfile. Conversely, in the event that the write update introduced malicious software to the temporary copy subfile, the original file and its corresponding original subfile remain uncontaminated by the write update. Other aspects are also described.Type: GrantFiled: July 18, 2017Date of Patent: January 26, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Juan A. Coronado, Sara M. Coronado, Christina A. Lara, Lisa R. Martinez
-
Patent number: 10649673Abstract: Embodiments of the present disclosure may relate to methods and a computer program product for allowing writes based on a granularity level. The method for a storage server may include receiving a received granularity level for a particular volume of a storage device of a client computer including an effective duration for the received granularity level. The method may include receiving an anticipated write to the particular volume at an anticipated write granularity level. The method may include verifying whether the anticipated write granularity level substantially matches the received granularity level at the effective duration. The method may also include writing, in response to the anticipated write granularity level substantially matching the received granularity level at the effective duration, the anticipated write to the particular volume for the received granularity level.Type: GrantFiled: April 15, 2019Date of Patent: May 12, 2020Assignee: International Business Machines CorporationInventors: Juan A. Coronado, Lisa R. Martinez, Beth A. Peterson, Clint A. Hardy, Jennifer S. Shioya
-
Publication number: 20190243564Abstract: Embodiments of the present disclosure may relate to methods and a computer program product for allowing writes based on a granularity level. The method for a storage server may include receiving a received granularity level for a particular volume of a storage device of a client computer including an effective duration for the received granularity level. The method may include receiving an anticipated write to the particular volume at an anticipated write granularity level. The method may include verifying whether the anticipated write granularity level substantially matches the received granularity level at the effective duration. The method may also include writing, in response to the anticipated write granularity level substantially matching the received granularity level at the effective duration, the anticipated write to the particular volume for the received granularity level.Type: ApplicationFiled: April 15, 2019Publication date: August 8, 2019Inventors: Juan A. Coronado, Lisa R. Martinez, Beth A. Peterson, Clint A. Hardy, Jennifer S. Shioya
-
Publication number: 20190220344Abstract: A computer-implemented method for preemptively migrating a failing extent includes receiving information of one or more failure conditions associated with an extent stored in a first storage portion of a first storage tier; predicting a failure of the extent based on the information; and selecting a second storage portion located in one of a plurality of storage tiers. The method also includes migrating the extent to the selected second storage portion. The selected second storage portion to which the extent is migrated is located in a lower storage tier. The lower storage tier includes less expensive and/or slower-to-access storage media than the first storage tier.Type: ApplicationFiled: March 20, 2019Publication date: July 18, 2019Inventors: Juan A. Coronado, Lisa R. Martinez, Beth A. Peterson, Jennifer S. Shioya
-
Patent number: 10346061Abstract: Embodiments of the present disclosure may relate to methods and a computer program product for allowing writes based on a granularity level. The method for a storage server may include receiving a received granularity level for a particular volume of a storage device of a client computer including an effective duration for the received granularity level. The method may include receiving an anticipated write to the particular volume at an anticipated write granularity level. The method may include verifying whether the anticipated write granularity level substantially matches the received granularity level at the effective duration. The method may also include writing, in response to the anticipated write granularity level substantially matching the received granularity level at the effective duration, the anticipated write to the particular volume for the received granularity level.Type: GrantFiled: September 9, 2016Date of Patent: July 9, 2019Assignee: International Business Machines CorporationInventors: Juan A. Coronado, Lisa R. Martinez, Beth A. Peterson, Clint A. Hardy, Jennifer S. Shioya
-
Patent number: 10346241Abstract: According to one embodiment, a method for preemptively migrating a failing extent includes receiving information of one or more failure conditions associated with an extent stored in a first storage portion of a first storage tier; predicting a failure of the extent based on the information; selecting a second storage portion located in one of a plurality of storage tiers; and migrating the extent to the selected second storage portion.Type: GrantFiled: May 5, 2016Date of Patent: July 9, 2019Assignee: International Business Machines CorporationInventors: Juan A. Coronado, Lisa R. Martinez, Beth A. Peterson, Jennifer S. Shioya
-
Patent number: 10204021Abstract: A primary storage controller determines that a quarantined area of the primary storage controller cannot be repaired, wherein the quarantined area is infected with a virus. A query is sent to a secondary storage controller to determine whether the secondary storage controller has data that is free of virus in an area of the secondary storage controller corresponding to the quarantined area of the primary storage controller. In response to receiving a notification that the secondary storage controller has data that is free of virus, the primary storage controller is repaired to remove the virus.Type: GrantFiled: November 30, 2017Date of Patent: February 12, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sara M. Coronado, Juan A. Coronado, Christina A. Lara, Lisa R. Martinez
-
Patent number: 10175973Abstract: A method for upgrading microcode in a multi-module storage system may include selecting a first module from two or more modules and operating the first module using an upgraded microcode. The method may include monitoring the performance of the first module by a second module of the two or more modules and rendering an indication of performance of the first module. Further, the method may include determining whether the indication of performance of the first module is greater than or equal to a performance metric.Type: GrantFiled: December 6, 2017Date of Patent: January 8, 2019Assignee: International Business Machines CorporationInventors: Juan A. Coronado, Lee C. LaFrese, Lisa R. Martinez
-
Publication number: 20180107474Abstract: A method for upgrading microcode in a multi-module storage system may include selecting a first module from two or more modules and operating the first module using an upgraded microcode. The method may include monitoring the performance of the first module by a second module of the two or more modules and rendering an indication of performance of the first module. Further, the method may include determining whether the indication of performance of the first module is greater than or equal to a performance metric.Type: ApplicationFiled: December 6, 2017Publication date: April 19, 2018Inventors: Juan A. Coronado, Lee C. LaFrese, Lisa R. Martinez
-
Publication number: 20180089039Abstract: A primary storage controller determines that a quarantined area of the primary storage controller cannot be repaired, wherein the quarantined area is infected with a virus. A query is sent to a secondary storage controller to determine whether the secondary storage controller has data that is free of virus in an area of the secondary storage controller corresponding to the quarantined area of the primary storage controller. In response to receiving a notification that the secondary storage controller has data that is free of virus, the primary storage controller is repaired to remove the virus.Type: ApplicationFiled: November 30, 2017Publication date: March 29, 2018Inventors: Sara M. Coronado, Juan A. Coronado, Christina A. Lara, Lisa R. Martinez
-
Patent number: 9898374Abstract: A primary storage controller determines that a quarantined area of the primary storage controller cannot be repaired, wherein the quarantined area is infected with a virus. A query is sent to a secondary storage controller to determine whether the secondary storage controller has data that is free of virus in an area of the secondary storage controller corresponding to the quarantined area of the primary storage controller. In response to receiving a notification that the secondary storage controller has data that is free of virus, the primary storage controller is repaired to remove the virus.Type: GrantFiled: April 8, 2014Date of Patent: February 20, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Juan A. Coronado, Sara M. Coronado, Christina A. Lara, Lisa R. Martinez
-
Patent number: 9875094Abstract: A method for upgrading microcode in a multi-module storage system may include selecting a first module from two or more modules and operating the first module using an upgraded microcode. The method may include monitoring the performance of the first module by a second module of the two or more modules and rendering an indication of performance of the first module. Further, the method may include determining whether the indication of performance of the first module is greater than or equal to a performance metric.Type: GrantFiled: August 29, 2012Date of Patent: January 23, 2018Assignee: International Business Machines CorporationInventors: Juan A. Coronado, Lee C. LaFrese, Lisa R. Martinez
-
Patent number: 9858418Abstract: A method to reduce delays associated with restoring quarantined files is disclosed. In one embodiment, such a method includes maintaining, for a file, a “current” pointer pointing to a current copy of the file and a “backup” pointer pointing to a virus-free backup copy of the file. The method receives an I/O request (a read or write request) to access the file. In response to receiving the I/O request, the method scans the current copy of the file for viruses. In the event a virus is discovered in the current copy, the method modifies the “current” pointer to point to the backup copy. This causes the backup copy to become the new current copy. The method then executes the I/O request with respect to the new current copy. A corresponding system and computer program product are also disclosed and claimed herein.Type: GrantFiled: May 29, 2015Date of Patent: January 2, 2018Assignee: International Business Machines CorporationInventors: Juan A. Coronado, Sara M. Coronado, Christina A. Lara, Lisa R. Martinez
-
Patent number: 9836604Abstract: In one embodiment of file integrity preservation in accordance with the present description, a file is subdivided into a plurality of subfiles, and a write update originally targeted for a portion of that file contained within one of the subfiles, is instead directed to a temporary copy subfile. As a consequence, the temporary copy subfile which is updated with the write data, may be scanned for viruses or other malware separately from the original file and its corresponding original subfile. If the temporary copy subfile passes the scanning test, the originally targeted file may be updated with the updated contents of the clean temporary copy subfile. Conversely, in the event that the write update introduced malicious software to the temporary copy subfile, the original file and its corresponding original subfile remain uncontaminated by the write update. Other aspects are also described.Type: GrantFiled: January 30, 2015Date of Patent: December 5, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Juan A. Coronado, Sara M. Coronado, Christina A. Lara, Lisa R. Martinez
-
Publication number: 20170316208Abstract: In one embodiment of file integrity preservation in accordance with the present description, a file is subdivided into a plurality of subfiles, and a write update originally targeted for a portion of that file contained within one of the subfiles, is instead directed to a temporary copy subfile. As a consequence, the temporary copy subfile which is updated with the write data, may be scanned for viruses or other malware separately from the original file and its corresponding original subfile. If the temporary copy subfile passes the scanning test, the originally targeted file may be updated with the updated contents of the clean temporary copy subfile. Conversely, in the event that the write update introduced malicious software to the temporary copy subfile, the original file and its corresponding original subfile remain uncontaminated by the write update. Other aspects are also described.Type: ApplicationFiled: July 18, 2017Publication date: November 2, 2017Inventors: Juan A. Coronado, Sara M. Coronado, Christina A. Lara, Lisa R. Martinez
-
Patent number: 9792181Abstract: Systems, methods, and computer program products for providing operating system (O/S) redundancy in a computing system are provided. One system includes a host computing device, a plurality of memory devices, and a sub-loader coupled between the host computing device and the plurality of memory devices. Each memory device stores a respective O/S and the sub-loader is configured such that the plurality of memory devices appear transparent to the host computing device. One method includes designating, a first logical unit device as a primary logical unit device and subsequently determining that the first logical unit device is unresponsive. The designation is removed from the first logical unit device and a second logical unit device is designated as a new primary logical unit device. One computer program product includes instructions for performing the above method.Type: GrantFiled: February 22, 2010Date of Patent: October 17, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Juan A. Coronado, Lisa R. Martinez, Raul E. Saba
-
Patent number: 9654497Abstract: A method for more efficiently scanning files for viruses includes determining a vulnerability date associated with a virus, wherein the vulnerability date is related to a release date of the virus. In certain embodiments, the vulnerability date is a user-tunable amount of time before or after the release date. The method further determines, on a storage system, which files that have been updated since the vulnerability date. These files are scanned for the virus in a first batch. The method further determines which files have not been updated since the vulnerability date. These files are scanned for the virus in a second batch. Because files in the first batch have been updated since the vulnerability date, scanning the first batch may be given priority over scanning the second batch. A corresponding system and computer program product are also disclosed.Type: GrantFiled: April 4, 2015Date of Patent: May 16, 2017Assignee: International Business Machines CorporationInventors: Juan A. Coronado, Sara M. Coronado, Christina A. Lara, Lisa R. Martinez
-
Patent number: 9619311Abstract: Storage area network (SAN) components contain a processor configured to provide a first event handling module that can receive an error event at a first hardware component of the storage area network. A database is accessed that contains associations between error event data and potential sources of errors. A plurality of hardware components are identified using the database and error event data. The hardware components are ranked and one is selected based on the ranking. An error notification is sent to a second event handling module of the hardware component. Based upon the response of the second event handling module, an error handling procedure is carried out.Type: GrantFiled: November 26, 2013Date of Patent: April 11, 2017Assignee: International Business Machines CorporationInventors: Juan A. Coronado, Lisa R. Martinez, James E. Olson, Beth A. Peterson