Patents by Inventor Patricia G. Driever
Patricia G. Driever has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11714808Abstract: Provided are a computer program product, system, and method for processing request directed through a channel subsystem to a storage server. In one embodiment, a pattern search request is embedded in a Device Command Word (DCW) which allows the storage server to do all or substantially all of the search and comparison work in response to as few as a single DCW from the host. In addition, I/O processing can be enhanced to use the target record of interest of a successful embedded pattern search request as the starting point for read/write I/O processing, all in response to as few as a single DCW. Still further, orientation rules can also be relaxed such that once a target record is found, any and all fields of the record can be accessed and utilized in execution of subsequent commands of the initial or subsequent DCWs of the chain.Type: GrantFiled: September 8, 2021Date of Patent: August 1, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Beth Ann Peterson, Patricia G. Driever, Dale F. Riedy, John R. Paveza, Roger G. Hathorn, Wayne Erwin Rhoten
-
Publication number: 20230071356Abstract: Provided are a computer program product, system, and method for processing request directed through a channel subsystem to a storage server. In one embodiment, a pattern search request is embedded in a Device Command Word (DCW) which allows the storage server to do all or substantially all of the search and comparison work in response to as few as a single DCW from the host. In addition, I/O processing can be enhanced to use the target record of interest of a successful embedded pattern search request as the starting point for read/write I/O processing, all in response to as few as a single DCW. Still further, orientation rules can also be relaxed such that once a target record is found, any and all fields of the record can be accessed and utilized in execution of subsequent commands of the initial or subsequent DCWs of the chain.Type: ApplicationFiled: September 8, 2021Publication date: March 9, 2023Inventors: Beth Ann Peterson, Patricia G. Driever, Dale F. Riedy, John R. Paveza, Roger G. Hathorn, Wayne Erwin Rhoten
-
Patent number: 11563588Abstract: A path is secured from one node to another node of the computing environment. The one node obtains a first encryption key and a second encryption key. A shared key is obtained by the one node from a key server, and the shared key is used to encrypt a message. The encrypted message includes the first encryption key and the second encryption key. The encrypted message and an identifier of the shared key is sent from the one node to the other node, and a response message is received by the one node. The response message at least provides an indication that the other node received the encrypted message and obtained the shared key.Type: GrantFiled: May 10, 2021Date of Patent: January 24, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Patricia G. Driever, Roger G. Hathorn, Christopher Colonna, John Flanagan, George P. Kuch, Richard M. Sczepczenski, Glen Jaquette
-
Patent number: 11522681Abstract: A path for a node of a computing environment is secured. The securing includes obtaining, by the node, a message that includes an identifier of a shared key and an encrypted message. The node obtains the shared key from a key server and uses it to decrypt the encrypted message to obtain an encryption key and one or more parameters. A security parameters index to be associated with the encryption key and the one or more parameters is obtained. The node sends a response message to another node, the response message including the security parameters index.Type: GrantFiled: December 30, 2020Date of Patent: December 6, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Patricia G. Driever, Roger G. Hathorn, Christopher Colonna, John Flanagan, George P. Kuch, Richard M. Sczepczenski, Glen Jaquette
-
Publication number: 20220269833Abstract: A host port is enabled for security. In response to a determination by the host port that authentication or security association negotiation with a storage port cannot be completed successfully, the host port determines whether an audit mode indicator has been enabled in a login response from the storage port. The host port preserves input/output (I/O) access to the storage port based on determining whether the audit mode indicator has been enabled in the login response from the storage port.Type: ApplicationFiled: May 11, 2022Publication date: August 25, 2022Inventors: Roger G. Hathorn, Patricia G. Driever, Christopher J. Colonna, Evan Rivera, John R. Flanagan
-
Publication number: 20220198075Abstract: A storage port receives a login request. The storage port configures an audit mode indicator as enabled in a login response to a host port to enter a security enabled mode to indicate to the host port that Input/Output (I/O) operations are to be transmitted from the host port to the storage port even if authentication or security association negotiation with the storage port cannot be completed successfully.Type: ApplicationFiled: March 7, 2022Publication date: June 23, 2022Inventors: Roger G. Hathorn, Patricia G. Driever, John Flanagan, Christopher J. Colonna, Evan Rivera
-
Patent number: 11368413Abstract: Techniques for inter-switch link (ISL) identification and monitoring are described herein. An aspect includes sending a query fabric path command to a switch, the query fabric path command including an origin address and a destination address. Another aspect includes receiving a query fabric path response from the switch based on the query fabric path command, the query fabric path response including a plurality of port identifiers. Another aspect includes monitoring a plurality of ports, each of the plurality of ports corresponding to a respective port identifier of the plurality of port identifiers in the query fabric path response.Type: GrantFiled: June 11, 2019Date of Patent: June 21, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Christopher Colonna, Pasquale A. Catalano, Stephen Robert Guendert, Michael James Becht, Patricia G. Driever
-
Patent number: 11354455Abstract: A host port is enabled for security. In response to a determination by the host port that authentication or security association negotiation with a storage port cannot be completed successfully, the host port determines whether an audit mode indicator has been enabled in a login response from the storage port. The host port preserves input/output (I/O) access to the storage port based on determining whether the audit mode indicator has been enabled in the login response from the storage port.Type: GrantFiled: September 11, 2019Date of Patent: June 7, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Roger G. Hathorn, Patricia G. Driever, Christopher J. Colonna, Evan Rivera, John R. Flanagan
-
Patent number: 11308243Abstract: A storage port receives a login request. The storage port configures an audit mode indicator as enabled in a login response to a host port to enter a security enabled mode to indicate to the host port that Input/Output (I/O) operations are to be transmitted from the host port to the storage port even if authentication or security association negotiation with the storage port cannot be completed successfully.Type: GrantFiled: September 11, 2019Date of Patent: April 19, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Roger G. Hathorn, Patricia G. Driever, John Flanagan, Christopher J. Colonna, Evan Rivera
-
Patent number: 11303441Abstract: Provided are a computer program product, system, and method embodiments for reverting from a new security association to a previous security association in response to an error during a rekey operation. The responder maintains a first security association with the initiator having a first key to use to encrypt and decrypt messages transmitted with the initiator. The responder receives a message from the initiator for a rekey operation to establish a second security association with the initiator using a second key. The responder queues Input/Output (I/O) for transmission using the second key after completing the rekey operation. After activating the second security association, the responder receives a revert message from the initiator to revert back to using the first security association and first key in response to a failure of the rekey operation.Type: GrantFiled: September 25, 2019Date of Patent: April 12, 2022Assignee: International Business Machines CorporationInventors: Roger G. Hathorn, Patricia G. Driever, Christopher J. Colonna, Mooheng Zee, Mikel William Welsh, Alol Antony Crasta, John R. Flanagan
-
Patent number: 11251979Abstract: In response to receiving a login request message with a security indicator enabled for security, a storage port establishes a security association by transmitting a response indicating a login accept with the security indicator enabled for security. In response to establishing the security association, the storage port modifies a protocol behavior for transmitting and receiving information units.Type: GrantFiled: October 30, 2019Date of Patent: February 15, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Roger G. Hathorn, Patricia G. Driever, Christopher J. Colonna, John R. Flanagan
-
Patent number: 11245521Abstract: Provided are a computer program product, system, and method embodiments for reverting from a new security association to a previous security association in response to an error during a rekey operation. An initiator maintains a first security association with the responder having a first key to use to encrypt and decrypt data transmitted with the responder. The initiator initiates a rekey operation to establish a second security association with the responder using a second key. The initiator detects a failure of the rekey operation after the responder started using the second key for transmissions. A revert message is sent to the responder to revert back to using the first security association and first key in response to detecting the failure of the rekey operation.Type: GrantFiled: September 25, 2019Date of Patent: February 8, 2022Assignee: International Business Machines CorporationInventors: Roger G. Hathorn, Patricia G. Driever, Christopher J. Colonna, Mooheng Zee, John R. Flanagan, Alol Antony Crasta, Mikel William Welsh
-
Patent number: 11206144Abstract: Provided are a computer program product, system and method embodiments for secure communication between an initiator and a responder over a network. The responder receives, from the initiator, a security association initialization message to establish a security association with the responder including key material used to generate a key for the security association. The responder receives an authentication message from the initiator to program the responder to establish authentication between the responder and the initiator after establishing the security association. The responder sends an authentication message response to the initiator to establish authentication with the responder in response to the authentication message. The responder sends an authentication done message to the initiator after sending the authentication message response to cause the initiator to activate using the security association and the key to encrypt and decrypt communication between the responder and initiator.Type: GrantFiled: September 11, 2019Date of Patent: December 21, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Roger G. Hathorn, Patricia G. Driever, Christopher J. Colonna, Mooheng Zee, Mikel William Welsh, Richard Mark Sczepczenski, John R. Flanagan
-
Patent number: 11201749Abstract: Provided are a computer program product, system and method embodiments for secure communication between an initiator and a responder over a network. The initiator sends a security association initialization message to the responder to establish a security association including key material used to generate a key for the security association. In response to receiving a security association initialization response to accept the security association, the initiator sends an authentication message to the responder to establish authentication between the responder and the initiator. In response to receiving an authentication message response to the authentication message, the initiator is programmed with the security association. An authentication done message is received from the responder after receiving the authentication message response.Type: GrantFiled: September 11, 2019Date of Patent: December 14, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Roger G. Hathorn, Patricia G. Driever, Christopher J. Colonna, Mooheng Zee, Richard Mark Sczepczenski, Mikel William Welsh, John R. Flanagan
-
Patent number: 11188658Abstract: A storage port is enabled for security. The storage port performs Input/Output (I/O) in plaintext on a path between the storage port and a host port, in response to determining that an audit mode indicator has been enabled to allow I/O even if authentication or security association negotiation between the storage port and the host port cannot be completed successfully. Concurrently with performing of I/O in plaintext on the path, the storage port enables encryption of data for I/O on the path.Type: GrantFiled: September 11, 2019Date of Patent: November 30, 2021Assignee: International Business Machines CorporationInventors: Roger G. Hathorn, Patricia G. Driever, Mooheng Zee, Christopher J. Colonna, John R. Flanagan
-
Patent number: 11188659Abstract: A host port is enabled for security. The host port performs Input/Output (I/O) in plaintext on a path between the host port and a storage port, in response to determining that an audit mode indicator has been enabled to allow I/O even if authentication or security association negotiation between the host port and the storage port cannot be completed successfully. Concurrently with performing of I/O in plaintext on the path, the host port enables encryption of data for I/O on the path.Type: GrantFiled: September 11, 2019Date of Patent: November 30, 2021Assignee: International Business Machines CorporationInventors: Roger G. Hathorn, Patricia G. Driever, Christopher J. Colonna, Mooheng Zee, John R. Flanagan
-
Publication number: 20210266182Abstract: A path is secured from one node to another node of the computing environment. The one node obtains a first encryption key and a second encryption key. A shared key is obtained by the one node from a key server, and the shared key is used to encrypt a message. The encrypted message includes the first encryption key and the second encryption key. The encrypted message and an identifier of the shared key is sent from the one node to the other node, and a response message is received by the one node. The response message at least provides an indication that the other node received the encrypted message and obtained the shared key.Type: ApplicationFiled: May 10, 2021Publication date: August 26, 2021Inventors: Patricia G. Driever, Roger G. Hathorn, Christopher Colonna, John Flanagan, George P. Kuch, Richard M. Sczepczenski, Glen Jaquette
-
Publication number: 20210264347Abstract: A method, computer system, and a computer program product for product cycle management is provided. The present invention may include storing, in an inventory database, a batch-related information for a corresponding batch of products. The stored batch-related information may include a batch date assigned to the corresponding batch of products. The present invention may also include detecting a consumer identifier (ID) in a purchase transaction for a product of the corresponding batch of products. The present invention may further include recording the purchase transaction for the product with the detected consumer ID. The present invention may also include transmitting, to a device associated with the detected consumer ID, the batch date linked to the product of the corresponding batch of products.Type: ApplicationFiled: February 26, 2020Publication date: August 26, 2021Inventors: Erin Marlana Farr, Sudha Dhanwada, Patricia G. Driever, Shin Yang
-
Patent number: 11088998Abstract: Examples of techniques for encrypted fibre channel over internet protocol (FCIP) data replication are described herein. An aspect includes receiving replication data from a primary site host system, the replication data comprising header information. Another aspect includes encrypting the replication data. Another aspect includes writing the header information to a local memory, wherein the header information in the local memory is unencrypted. Yet another aspect includes encapsulating the encrypted replication data, wherein the unencrypted header information is accessed in the local memory during the encapsulation of the encrypted replication data.Type: GrantFiled: January 2, 2019Date of Patent: August 10, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Stephen Robert Guendert, Pasquale A. Catalano, Patricia G. Driever
-
Patent number: 11088829Abstract: A path for a node of a computing environment is secured. The securing includes obtaining, by the node, a message that includes an identifier of a shared key and an encrypted message, the encrypted message including a first encryption key, a second encryption key, one or more first parameters and one or more second parameters. The node obtains the shared key from a key server and uses it to decrypt the encrypted message to obtain the first encryption key, the second encryption key, the one or more first parameters and the one or more second parameters. A second security parameters index, to be associated with the second encryption key and the one or more second parameters, is obtained. The node sends a response message to another node, the response message including the second security parameters index.Type: GrantFiled: September 4, 2018Date of Patent: August 10, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Patricia G. Driever, Roger G. Hathorn, Christopher Colonna, John Flanagan, George P. Kuch, Richard M. Sczepczenski, Glen Jaquette