Patents by Inventor Mark V. Chitti
Mark V. Chitti has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10833854Abstract: Generating a secondary security key from a primary security key is provided. A first numeric code that is an alternate numeric representation of a first character in a primary security key is added to a second numeric code that is an alternate numeric representation of a second character in the primary security key to generate a running total value. The running total value is automatically designated as a secondary security key such that the primary security key is transformed into the secondary security key that is usable for encrypting data to provide a more secure computer system. The data is encrypted with the secondary security key.Type: GrantFiled: May 21, 2019Date of Patent: November 10, 2020Assignee: International Business Machines CorporationInventors: Mark V. Chitti, Kirby G. Dahman, Ronda L. McCain, Kurt A. Rybczyk, Keith C. Williams
-
Patent number: 10608952Abstract: Resource configuration to exploit elastic network capability is provided by establishing an elastic network bandwidth allocation level to provide for an application for transfer of data between the application and an elastic network, the application hosted at a data center, then dynamically configuring, for the application, elastic network bandwidth allocation from the network service provider in accordance with the established elastic network bandwidth allocation level, and allocating storage resources of the data center for the application and processing resources of the data center for the application, the allocating being based on the established elastic network bandwidth allocation level and providing storage resources and processing resources to operate at a level commensurate with the established elastic network bandwidth allocation level.Type: GrantFiled: November 28, 2017Date of Patent: March 31, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mark V. Chitti, Douglas M. Freimuth, John F. Hollingsworth, Baiju D. Mandalia
-
Publication number: 20190274037Abstract: Generating a secondary security key from a primary security key is provided. A first numeric code that is an alternate numeric representation of a first character in a primary security key is added to a second numeric code that is an alternate numeric representation of a second character in the primary security key to generate a running total value. The running total value is automatically designated as a secondary security key such that the primary security key is transformed into the secondary security key that is usable for encrypting data to provide a more secure computer system. The data is encrypted with the secondary security key.Type: ApplicationFiled: May 21, 2019Publication date: September 5, 2019Inventors: Mark V. Chitti, Kirby G. Dahman, Ronda L. McCain, Kurt A. Rybczyk, Keith C. Williams
-
Patent number: 10382952Abstract: A method, system, and/or computer program product generate a secondary security key from a primary security key. One or more processors, receive a primary security key. The processor(s) retrieve a first numeric code that is an alternate numeric representation of a first character in the primary security key. The processor(s) retrieve a second numeric code that is an alternate numeric representation of a second character in the primary security key. The processor(s) add the first numeric code to the second numeric code to generate a running total value. The processor(s) designate the running total value as a secondary security key, and encrypt data with the secondary security key.Type: GrantFiled: May 19, 2016Date of Patent: August 13, 2019Assignee: International Business Machines CorporationInventors: Mark V. Chitti, Kirby G. Dahman, Ronda L. McCain, Kurt A. Rybczyk, Keith C. Williams
-
Patent number: 10216441Abstract: Dynamic quality of service for storage I/O port allocation is provided by obtaining indications of anticipated demand on a plurality of storage ports of a storage device of a data center, the anticipated demand being at least in part for storage input/output supporting transfer of data to or from a network, and dynamically adjusting storage port allocations based on the indications of anticipated demand and on real-time evaluation of workloads being serviced by the plurality of storage ports.Type: GrantFiled: November 25, 2015Date of Patent: February 26, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mark V. Chitti, Douglas M. Freimuth, John F. Hollingsworth, Baiju D. Mandalia
-
Patent number: 10177993Abstract: Event-based data transfer scheduling using elastic network optimization criteria is provided. Bandwidth optimization criteria corresponding to different types of data transfer event scenarios are maintained, and based on recognizing a data transfer event scenario, a bandwidth optimization criteria is selected based on a type of the data transfer event scenario. A schedule for transferring data from a source to a target across the elastic network is determined according to the selected bandwidth optimization criteria, and the elastic network is used in transferring the data to the target storage location, where the using includes dynamically configuring elastic network bandwidth allocation from an elastic network service provider and initiating transfer of the data to the target storage location according to the schedule.Type: GrantFiled: November 25, 2015Date of Patent: January 8, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mark V. Chitti, Douglas M. Freimuth, John F. Hollingsworth, Baiju D. Mandalia
-
Patent number: 10057327Abstract: Controlled transfer of data over an elastic network is provided and includes analyzing properties of a set of data for transfer from a source storage location to a target storage location across an elastic cloud computing network as part of a staged transfer of the set of data, assigning transfer queue weightings to data subsets of the set of data based on weighting parameters, the transfer queue weightings dictating order of transfer of the data subsets from the source storage location to the target storage location, and controlling transfer of the data subsets from the source storage location to the target storage location consistent with the transfer queue weightings assigned to the data subsets, the controlling transfer including controlling, based on costs to transfer the data subsets, bandwidth allocation of the elastic cloud computing network and a transfer schedule for the data subsets.Type: GrantFiled: November 25, 2015Date of Patent: August 21, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mark V. Chitti, Douglas M. Freimuth, John F. Hollingsworth, Baiju D. Mandalia
-
Publication number: 20180083888Abstract: Resource configuration to exploit elastic network capability is provided by establishing an elastic network bandwidth allocation level to provide for an application for transfer of data between the application and an elastic network, the application hosted at a data center, then dynamically configuring, for the application, elastic network bandwidth allocation from the network service provider in accordance with the established elastic network bandwidth allocation level, and allocating storage resources of the data center for the application and processing resources of the data center for the application, the allocating being based on the established elastic network bandwidth allocation level and providing storage resources and processing resources to operate at a level commensurate with the established elastic network bandwidth allocation level.Type: ApplicationFiled: November 28, 2017Publication date: March 22, 2018Inventors: Mark V. CHITTI, Douglas M. FREIMUTH, John F. HOLLINGSWORTH, Baiju D. MANDALIA
-
Patent number: 9923839Abstract: Resource configuration to exploit elastic network capability is provided by establishing an elastic network bandwidth allocation level to provide for an application for transfer of data between the application and an elastic network, the application hosted at a data center, then dynamically configuring, for the application, elastic network bandwidth allocation from the network service provider in accordance with the established elastic network bandwidth allocation level, and allocating storage resources of the data center for the application and processing resources of the data center for the application, the allocating being based on the established elastic network bandwidth allocation level and providing storage resources and processing resources to operate at a level commensurate with the established elastic network bandwidth allocation level.Type: GrantFiled: November 25, 2015Date of Patent: March 20, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mark V. Chitti, Douglas M. Freimuth, John F. Hollingsworth, Baiju D. Mandalia
-
Patent number: 9923784Abstract: Data transfer using flexible dynamic elastic network service provider relationships is provided. A relationship is dynamically established with an elastic network service provider of multiple available elastic network service providers to transfer a portion of the set of data to the target. Peering policies for each of the multiple elastic network service providers are checked, where a respective peering policy for each elastic network service provider includes respective bandwidth pricing information. Based on the bandwidth pricing information for each of the plurality of elastic network service providers, an elastic network service provider and a schedule are selected to use in transferring the portion to the target. The elastic network service provider is used in transferring the portion to the target, which includes dynamically configuring elastic network bandwidth allocation from the elastic network service provider and initiating transfer of the portion to the target according to the selected schedule.Type: GrantFiled: November 25, 2015Date of Patent: March 20, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mark V. Chitti, Douglas M. Freimuth, John F. Hollingsworth, Baiju D. Mandalia
-
Patent number: 9923965Abstract: An approach is provided for managing an allocation of a bandwidth of a dedicated channel in a network being utilized by an application performing a replication of data from a first to a second storage resource. Checks of parameters specified by the application are determined. The parameters include, but are not limited to, average compression ratio, compression ratio trend, throughput, throughput trend, and round trip time. Respective high and low threshold values for the parameters are determined. At least one of the checks of the parameters is executed, which determines a violation of a threshold value for one of the parameters. If the violation of the high threshold value is determined, an increase in the bandwidth is triggered. If the violation of the low threshold value is determined, a decrease in the bandwidth is triggered.Type: GrantFiled: June 5, 2015Date of Patent: March 20, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mark V. Chitti, Douglas M. Freimuth, John F. Hollingsworth, Baiju D. Mandalia
-
Publication number: 20170338953Abstract: A method, system, and/or computer program product generate a secondary security key from a primary security key. One or more processors, receive a primary security key. The processor(s) retrieve a first numeric code that is an alternate numeric representation of a first character in the primary security key. The processor(s) retrieve a second numeric code that is an alternate numeric representation of a second character in the primary security key. The processor(s) add the first numeric code to the second numeric code to generate a running total value. The processor(s) designate the running total value as a secondary security key, and encrypt data with the secondary security key.Type: ApplicationFiled: May 19, 2016Publication date: November 23, 2017Inventors: MARK V. CHITTI, KIRBY G. DAHMAN, RONDA L. MCCAIN, KURT A. RYBCZYK, KEITH C. WILLIAMS
-
Patent number: 9807014Abstract: An approach for reactive throttling of heterogeneous migration sessions running concurrently in a virtualized cloud environment is disclosed. The heterogeneous migration sessions are characterized by several attributes such as the type of function performed by the migration session and the value that is attained by performing the migration session. An input/output (I/O) path to any resource in the virtualized cloud environment computing that is experiencing excessive resource congestion is identified. Bottlenecks along the I/O path are then determined. Virtual-to-physical resource mapping information of resources in the virtualized cloud computing environment are used to obtain a list of the heterogeneous migration sessions contributing to the bottlenecks along the identified I/O path.Type: GrantFiled: September 27, 2013Date of Patent: October 31, 2017Assignee: International Business Machines CorporationInventors: Gabriel Alatorre, Eric K. Butler, Mark V. Chitti, James E. Olson, Aameek Singh, Yang Song
-
Patent number: 9723002Abstract: A computer-implemented method, system, and/or computer program product controls access to an appliance. A host system receives, from a client computer, appliance-specific user data that includes a user password, a user-created name of an appliance, a user identifier, and a network address of the client computer, and then concatenates the appliance-specific user data with a host name of the host system to create and store an Aggregate Identity Instance (AII) in the host system. The host system receives, from the client computer, a request to access the appliance, and determines whether appliance-specific user data sent with the request is in the AII in the host system. If so, then the host system matches the user-created name of the appliance to an address of the appliance; establishes a session between the client computer and the appliance; and uses the AII to encrypt and decrypt data.Type: GrantFiled: January 4, 2016Date of Patent: August 1, 2017Assignee: International Business Machines CorporationInventors: Mark V. Chitti, Kirby G. Dahman, Ronda L. McCain, Kurt A. Rybczyk, Keith C. Williams
-
Publication number: 20170195328Abstract: A computer-implemented method, system, and/or computer program product controls access to an appliance. A host system receives, from a client computer, appliance-specific user data that includes a user password, a user-created name of an appliance, a user identifier, and a network address of the client computer, and then concatenates the appliance-specific user data with a host name of the host system to create and store an Aggregate Identity Instance (AII) in the host system. The host system receives, from the client computer, a request to access the appliance, and determines whether appliance-specific user data sent with the request is in the AII in the host system. If so, then the host system matches the user-created name of the appliance to an address of the appliance; establishes a session between the client computer and the appliance; and uses the AII to encrypt and decrypt data.Type: ApplicationFiled: January 4, 2016Publication date: July 6, 2017Inventors: Mark V. Chitti, Kirby G. Dahman, Ronda McCain, Kurt A. Rybczyk, Keith C. Williams
-
Publication number: 20170149688Abstract: Resource configuration to exploit elastic network capability is provided by establishing an elastic network bandwidth allocation level to provide for an application for transfer of data between the application and an elastic network, the application hosted at a data center, then dynamically configuring, for the application, elastic network bandwidth allocation from the network service provider in accordance with the established elastic network bandwidth allocation level, and allocating storage resources of the data center for the application and processing resources of the data center for the application, the allocating being based on the established elastic network bandwidth allocation level and providing storage resources and processing resources to operate at a level commensurate with the established elastic network bandwidth allocation level.Type: ApplicationFiled: November 25, 2015Publication date: May 25, 2017Inventors: Mark V. CHITTI, Douglas M. FREIMUTH, John F. HOLLINGSWORTH, Baiju D. MANDALIA
-
Publication number: 20170149624Abstract: Event-based data transfer scheduling using elastic network optimization criteria is provided. Bandwidth optimization criteria corresponding to different types of data transfer event scenarios are maintained, and based on recognizing a data transfer event scenario, a bandwidth optimization criteria is selected based on a type of the data transfer event scenario. A schedule for transferring data from a source to a target across the elastic network is determined according to the selected bandwidth optimization criteria, and the elastic network is used in transferring the data to the target storage location, where the using includes dynamically configuring elastic network bandwidth allocation from an elastic network service provider and initiating transfer of the data to the target storage location according to the schedule.Type: ApplicationFiled: November 25, 2015Publication date: May 25, 2017Inventors: Mark V. CHITTI, Douglas M. FREIMUTH, John F. HOLLINGSWORTH, Baiju D. MANDALIA
-
Publication number: 20170147248Abstract: Dynamic quality of service for storage I/O port allocation is provided by obtaining indications of anticipated demand on a plurality of storage ports of a storage device of a data center, the anticipated demand being at least in part for storage input/output supporting transfer of data to or from a network, and dynamically adjusting storage port allocations based on the indications of anticipated demand and on real-time evaluation of workloads being serviced by the plurality of storage ports.Type: ApplicationFiled: November 25, 2015Publication date: May 25, 2017Inventors: Mark V. CHITTI, Douglas M. FREIMUTH, John F. HOLLINGSWORTH, Baiju D. MANDALIA
-
Publication number: 20170149625Abstract: Data transfer using flexible dynamic elastic network service provider relationships is provided. A relationship is dynamically established with an elastic network service provider of multiple available elastic network service providers to transfer a portion of the set of data to the target. Peering policies for each of the multiple elastic network service providers are checked, where a respective peering policy for each elastic network service provider includes respective bandwidth pricing information. Based on the bandwidth pricing information for each of the plurality of elastic network service providers, an elastic network service provider and a schedule are selected to use in transferring the portion to the target. The elastic network service provider is used in transferring the portion to the target, which includes dynamically configuring elastic network bandwidth allocation from the elastic network service provider and initiating transfer of the portion to the target according to the selected schedule.Type: ApplicationFiled: November 25, 2015Publication date: May 25, 2017Inventors: Mark V. CHITTI, Douglas M. FREIMUTH, John F. HOLLINGSWORTH, Baiju D. MANDALIA
-
Publication number: 20170149863Abstract: Controlled transfer of data over an elastic network is provided and includes analyzing properties of a set of data for transfer from a source storage location to a target storage location across an elastic cloud computing network as part of a staged transfer of the set of data, assigning transfer queue weightings to data subsets of the set of data based on weighting parameters, the transfer queue weightings dictating order of transfer of the data subsets from the source storage location to the target storage location, and controlling transfer of the data subsets from the source storage location to the target storage location consistent with the transfer queue weightings assigned to the data subsets, the controlling transfer including controlling, based on costs to transfer the data subsets, bandwidth allocation of the elastic cloud computing network and a transfer schedule for the data subsets.Type: ApplicationFiled: November 25, 2015Publication date: May 25, 2017Inventors: Mark V. CHITTI, Douglas M. FREIMUTH, John F. HOLLINGSWORTH, Baiju D. MANDALIA