Patents by Inventor Per Lutkemeyer

Per Lutkemeyer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11153291
    Abstract: A method for verifying that default passwords have been changed without causing a security lockout, is provided, including enabling user identifiers associated with a plurality of devices, prior to an initial security test, identifying, a default password for a user identifier of each device, attempting a login to each device using the default password for the user identifier of each device, wherein: in response to determining that the login is successful, raising an alert against the user identifier as a security concern and maintaining an enabled state of the user identifier, in response to determining that the login is unsuccessful, disabling the user identifier so that the user identifier is in a non-enabled state, until a security lockout interval elapses, and retrying the login only for each user identifier in an enabled state during one or more subsequent security tests initiated after a predetermined alert interval.
    Type: Grant
    Filed: September 12, 2019
    Date of Patent: October 19, 2021
    Assignee: International Business Machines Corporation
    Inventors: John J. Auvenshine, Per Lutkemeyer, Christian Sonder
  • Patent number: 10949287
    Abstract: Disclosed is a computer-implemented method of finding, troubleshooting and auto-remediating problems in storage environments.
    Type: Grant
    Filed: September 19, 2018
    Date of Patent: March 16, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Donald Charles Laing, John J. Auvenshine, Michael L. Camarco, III, Dominic Thibodeau, Per Lutkemeyer
  • Patent number: 10749748
    Abstract: A method and system. A health and compliance check report for a network including two or more devices is received. The report includes a list of health and compliance check findings at a particular time. Each finding indicates a determination of non-compliance of a subject device of the two or more devices with a predetermined requirement and includes a severity value associated with the determination of non-compliance of the subject device. For each finding in the report, a ranking value is determined based on the associated severity value and an importance value of one or more devices connected to the subject device.
    Type: Grant
    Filed: March 23, 2017
    Date of Patent: August 18, 2020
    Assignee: International Business Machines Corporation
    Inventors: John J. Auvenshine, Per Lutkemeyer, Christian Sonder, Stanley C. Wood
  • Patent number: 10671327
    Abstract: Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: examining information of first through Nth storage volumes and based on the examining providing for each storage volume of the first through Nth storage volumes a predicted storage space savings value, the predicted storage space savings value indicating a predicted terabyte volume of storage space savings producible by performance of data compression of data stored on the storage volume; predicting a per terabyte compression cost savings associated with compressing one or more storage volume of the first through Nth storage volumes, and providing a ranking of storage volumes of the first through Nth storage volumes based on the examining and the predicting; and scheduling a compression of storage volumes of the first through Nth storage volumes based on the ranking of storage volumes of the first through Nth storage volumes.
    Type: Grant
    Filed: March 8, 2019
    Date of Patent: June 2, 2020
    Assignee: International Business Machines Corporation
    Inventors: John J. Auvenshine, Per Lutkemeyer, Laura Richardson, David Schustek
  • Publication number: 20200089561
    Abstract: Disclosed is a computer-implemented method of finding, troubleshooting and auto-remediating problems in storage environments.
    Type: Application
    Filed: September 19, 2018
    Publication date: March 19, 2020
    Inventors: Donald Charles LAING, John J. AUVENSHINE, Michael L. CAMARCO, III, Dominic THIBODEAU, Per LÜTKEMEYER
  • Patent number: 10581821
    Abstract: A method for verifying that default passwords have been changed without causing a security lockout, is provided, including enabling user identifiers associated with a plurality of devices, prior to an initial security test, identifying, a default password for a user identifier of each device, attempting a login to each device using the default password for the user identifier of each device, wherein: in response to determining that the login is successful, raising an alert against the user identifier as a security concern and maintaining an enabled state of the user identifier, in response to determining that the login is unsuccessful, disabling the user identifier so that the user identifier is in a non-enabled state, until a security lockout interval elapses, and retrying the login only for each user identifier in an enabled state during one or more subsequent security tests initiated after a predetermined alert interval.
    Type: Grant
    Filed: August 10, 2017
    Date of Patent: March 3, 2020
    Assignee: International Business Machines Corporation
    Inventors: John J. Auvenshine, Per Lutkemeyer, Christian Sonder
  • Patent number: 10528415
    Abstract: An indication of a problem within the computing environment can be received by a data processing system external to a computing environment. Based on the indication of the problem within the computing environment, the data processing system can select a data log filter. The data log filter can be configured to access, from each of a plurality of data logs, a respective data set comprising log entries that are candidate indicators of the problem. Each of the plurality of data logs can be generated by a respective electronic device that is a member of the computing environment. The data processing system can access the respective data sets from the plurality of data logs using the data log filter, and output each respective data set.
    Type: Grant
    Filed: February 28, 2017
    Date of Patent: January 7, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: John J. Auvenshine, Nicolas A. Druet, Donald C. Laing, Per Lutkemeyer, Martin Proulx, Laura Richardson, Dominic Thibodeau, Stanley C. Wood
  • Publication number: 20200007521
    Abstract: A method for verifying that default passwords have been changed without causing a security lockout, is provided, including enabling user identifiers associated with a plurality of devices, prior to an initial security test, identifying, a default password for a user identifier of each device, attempting a login to each device using the default password for the user identifier of each device, wherein: in response to determining that the login is successful, raising an alert against the user identifier as a security concern and maintaining an enabled state of the user identifier, in response to determining that the login is unsuccessful, disabling the user identifier so that the user identifier is in a non-enabled state, until a security lockout interval elapses, and retrying the login only for each user identifier in an enabled state during one or more subsequent security tests initiated after a predetermined alert interval.
    Type: Application
    Filed: September 12, 2019
    Publication date: January 2, 2020
    Inventors: John J. Auvenshine, Per Lutkemeyer, Christian Sonder
  • Patent number: 10423480
    Abstract: An indication of a problem within the computing environment can be received by a data processing system external to a computing environment. Based on the indication of the problem within the computing environment, the data processing system can select a data log filter. The data log filter can be configured to access, from each of a plurality of data logs, a respective data set comprising log entries that are candidate indicators of the problem. Each of the plurality of data logs can be generated by a respective electronic device that is a member of the computing environment. The data processing system can access the respective data sets from the plurality of data logs using the data log filter, and output each respective data set.
    Type: Grant
    Filed: December 18, 2017
    Date of Patent: September 24, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: John J. Auvenshine, Nicolas A. Druet, Donald C. Laing, Per Lutkemeyer, Martin Proulx, Laura Richardson, Dominic Thibodeau, Stanley C. Wood
  • Publication number: 20190205032
    Abstract: Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: examining information of first through Nth storage volumes and based on the examining providing for each storage volume of the first through Nth storage volumes a predicted storage space savings value, the predicted storage space savings value indicating a predicted terabyte volume of storage space savings producible by performance of data compression of data stored on the storage volume; predicting a per terabyte compression cost savings associated with compressing one or more storage volume of the first through Nth storage volumes, and providing a ranking of storage volumes of the first through Nth storage volumes based on the examining and the predicting; and scheduling a compression of storage volumes of the first through Nth storage volumes based on the ranking of storage volumes of the first through Nth storage volumes.
    Type: Application
    Filed: March 8, 2019
    Publication date: July 4, 2019
    Inventors: John J. AUVENSHINE, Per LUTKEMEYER, Laura RICHARDSON, David SCHUSTEK
  • Patent number: 10331382
    Abstract: Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: examining information of first through Nth storage volumes and based on the examining providing for each storage volume of the first through Nth storage volumes a predicted storage space savings value, the predicted storage space savings value indicating a predicted terabyte volume of storage space savings producible by performance of data compression of data stored on the storage volume; predicting a per terabyte compression cost savings associated with compressing one or more storage volume of the first through Nth storage volumes, and providing a ranking of storage volumes of the first through Nth storage volumes based on the examining and the predicting; and scheduling a compression of storage volumes of the first through Nth storage volumes based on the ranking of storage volumes of the first through Nth storage volumes.
    Type: Grant
    Filed: December 17, 2017
    Date of Patent: June 25, 2019
    Assignee: International Business Machines Corporation
    Inventors: John J. Auvenshine, Per Lutkemeyer, Laura Richardson, David Schustek
  • Patent number: 10303400
    Abstract: Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: examining information of first through Nth storage volumes and based on the examining providing for each storage volume of the first through Nth storage volumes a predicted storage space savings value, the predicted storage space savings value indicating a predicted terabyte volume of storage space savings producible by performance of data compression of data stored on the storage volume; predicting a per terabyte compression cost savings associated with compressing one or more storage volume of the first through Nth storage volumes, and providing a ranking of storage volumes of the first through Nth storage volumes based on the examining and the predicting; and scheduling a compression of storage volumes of the first through Nth storage volumes based on the ranking of storage volumes of the first through Nth storage volumes.
    Type: Grant
    Filed: April 25, 2017
    Date of Patent: May 28, 2019
    Assignee: International Business Machines Corporation
    Inventors: John J. Auvenshine, Per Lutkemeyer, Laura Richardson, David Schustek
  • Publication number: 20190052615
    Abstract: A method for verifying that default passwords have been changed without causing a security lockout, is provided, including enabling user identifiers associated with a plurality of devices, prior to an initial security test, identifying, a default password for a user identifier of each device, attempting a login to each device using the default password for the user identifier of each device, wherein: in response to determining that the login is successful, raising an alert against the user identifier as a security concern and maintaining an enabled state of the user identifier, in response to determining that the login is unsuccessful, disabling the user identifier so that the user identifier is in a non-enabled state, until a security lockout interval elapses, and retrying the login only for each user identifier in an enabled state during one or more subsequent security tests initiated after a predetermined alert interval.
    Type: Application
    Filed: August 10, 2017
    Publication date: February 14, 2019
    Inventors: John J. Auvenshine, Per Lutkemeyer, Christian Sonder
  • Publication number: 20180307441
    Abstract: Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: examining information of first through Nth storage volumes and based on the examining providing for each storage volume of the first through Nth storage volumes a predicted storage space savings value, the predicted storage space savings value indicating a predicted terabyte volume of storage space savings producible by performance of data compression of data stored on the storage volume; predicting a per terabyte compression cost savings associated with compressing one or more storage volume of the first through Nth storage volumes, and providing a ranking of storage volumes of the first through Nth storage volumes based on the examining and the predicting; and scheduling a compression of storage volumes of the first through Nth storage volumes based on the ranking of storage volumes of the first through Nth storage volumes.
    Type: Application
    Filed: April 25, 2017
    Publication date: October 25, 2018
    Inventors: John J. AUVENSHINE, Per LUTKEMEYER, Laura RICHARDSON, David SCHUSTEK
  • Publication number: 20180307442
    Abstract: Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: examining information of first through Nth storage volumes and based on the examining providing for each storage volume of the first through Nth storage volumes a predicted storage space savings value, the predicted storage space savings value indicating a predicted terabyte volume of storage space savings producible by performance of data compression of data stored on the storage volume; predicting a per terabyte compression cost savings associated with compressing one or more storage volume of the first through Nth storage volumes, and providing a ranking of storage volumes of the first through Nth storage volumes based on the examining and the predicting; and scheduling a compression of storage volumes of the first through Nth storage volumes based on the ranking of storage volumes of the first through Nth storage volumes.
    Type: Application
    Filed: December 17, 2017
    Publication date: October 25, 2018
    Inventors: John J. AUVENSHINE, Per LUTKEMEYER, Laura RICHARDSON, David SCHUSTEK
  • Publication number: 20180278477
    Abstract: A method and system. A health and compliance check report for a network including two or more devices is received. The report includes a list of health and compliance check findings at a particular time. Each finding indicates a determination of non-compliance of a subject device of the two or more devices with a predetermined requirement and includes a severity value associated with the determination of non-compliance of the subject device. For each finding in the report, a ranking value is determined based on the associated severity value and an importance value of one or more devices connected to the subject device.
    Type: Application
    Filed: March 23, 2017
    Publication date: September 27, 2018
    Inventors: John J. Auvenshine, Per Lutkemeyer, Christian Sonder, Stanley C. Wood
  • Publication number: 20180246777
    Abstract: An indication of a problem within the computing environment can be received by a data processing system external to a computing environment. Based on the indication of the problem within the computing environment, the data processing system can select a data log filter. The data log filter can be configured to access, from each of a plurality of data logs, a respective data set comprising log entries that are candidate indicators of the problem. Each of the plurality of data logs can be generated by a respective electronic device that is a member of the computing environment. The data processing system can access the respective data sets from the plurality of data logs using the data log filter, and output each respective data set.
    Type: Application
    Filed: December 18, 2017
    Publication date: August 30, 2018
    Inventors: John J. Auvenshine, Nicolas A. Druet, Donald C. Laing, Per Lutkemeyer, Martin Proulx, Laura Richardson, Dominic Thibodeau, Stanley C. Wood
  • Publication number: 20180246776
    Abstract: An indication of a problem within the computing environment can be received by a data processing system external to a computing environment. Based on the indication of the problem within the computing environment, the data processing system can select a data log filter. The data log filter can be configured to access, from each of a plurality of data logs, a respective data set comprising log entries that are candidate indicators of the problem. Each of the plurality of data logs can be generated by a respective electronic device that is a member of the computing environment. The data processing system can access the respective data sets from the plurality of data logs using the data log filter, and output each respective data set.
    Type: Application
    Filed: February 28, 2017
    Publication date: August 30, 2018
    Inventors: John J. Auvenshine, Nicolas A. Druet, Donald C. Laing, Per Lutkemeyer, Martin Proulx, Laura Richardson, Dominic Thibodeau, Stanley C. Wood
  • Patent number: 9626123
    Abstract: A compliance method and associated system is provided. The method includes generating backup devices for devices of a list of devices associated with a data storage environment. A device from the list of devices is selected and available credentials for connecting and authenticating the device are determined. Configuration and operational state data for the device are retrieved. A backup device associated with the device is selected and associated policies are loaded. Each policy is evaluated with respect to the backup devices, associated dependencies, and the configuration and operational state data. Compliant and non-compliant policies with respect to the backup devices are determined.
    Type: Grant
    Filed: August 18, 2016
    Date of Patent: April 18, 2017
    Assignee: International Business Machines Corporation
    Inventors: Bent Braum Holst, Nicolai Kildal, Donald C. Laing, Thomas Lindgaard, Per Lutkemeyer, Susan K. Schreitmueller, Christian Sonder, Stanley C. Wood
  • Publication number: 20160357445
    Abstract: A compliance method and associated system is provided. The method includes generating backup devices for devices of a list of devices associated with a data storage environment. A device from the list of devices is selected and available credentials for connecting and authenticating the device are determined. Configuration and operational state data for the device are retrieved. A backup device associated with the device is selected and associated policies are loaded. Each policy is evaluated with respect to the backup devices, associated dependencies, and the configuration and operational state data. Compliant and non-compliant policies with respect to the backup devices are determined.
    Type: Application
    Filed: August 18, 2016
    Publication date: December 8, 2016
    Inventors: Bent Braum Holst, Nicolai Kildal, Donald C. Laing, Thomas Lindgaard, Per Lutkemeyer, Susan K. Schreitmueller, Christian Sonder, Stanley C. Wood