Patents by Inventor Peter G. Sutton
Peter G. Sutton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11163444Abstract: An abstraction for storage class memory is provided that hides the details of the implementation of storage class memory from a program, and provides a standard channel programming interface for performing certain actions, such as controlling movement of data between main storage and storage class memory or managing storage class memory.Type: GrantFiled: July 10, 2019Date of Patent: November 2, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Peter D. Driever, Charles W. Gainey, Jr., Steven G. Glassen, Thomas B. Mathias, Kenneth J. Oakes, Peter G. Sutton, Peter K. Szwed, Elpida Tzortzatos, Harry M. Yudenfriend
-
Patent number: 11144635Abstract: An embodiment of restricted command set management permits a storage controller to execute commands of a restricted command set if authorized. A command determined to be within the restricted command set is encrypted by a host prior to sending the encrypted command to a storage controller for execution. The command may be encrypted using a key shared between the host and the storage controller. The shared key may be generated by the host and encrypted by the host using a public key of a public-private key maintained by the storage controller. The encrypted shared key may be decrypted by the storage controller using the private key of the public-private key maintained by the storage controller. Execution of commands of the restricted command set is prevented absent proper decryption of the commands sent by the host. Other features and aspects may be realized, depending upon the particular application.Type: GrantFiled: November 6, 2018Date of Patent: October 12, 2021Assignee: International Business Machines CorporationInventors: Peter G. Sutton, Roger G. Hathorn, Harry M. Yudenfriend
-
Patent number: 11137933Abstract: A method for accelerating transaction execution across geographically dispersed clusters is disclosed. In one embodiment, such a method includes receiving a request to read data in a data replication system comprising a primary storage system and a secondary storage system in a synchronous mirroring relationship with the primary storage system. The method determines whether at least one of the following conditions is true: (1) the secondary storage system is closer from a communication standpoint; and (2) a high speed communication technology is available to communicate with the secondary storage system that is not available to communicate with the primary storage system. In the event either of the conditions is true, the method directs the request to the secondary storage system. In the event neither of the conditions is true, the method directs the request to the primary storage system. A corresponding system and computer program product are also disclosed.Type: GrantFiled: October 31, 2018Date of Patent: October 5, 2021Assignee: International Business Machines CorporationInventors: Harry M. Yudenfriend, Dale F. Riedy, Scott B. Compton, Nicolas M. Clayton, Peter G. Sutton
-
Patent number: 11080197Abstract: Provided are a computer program product, system, and method for managing access requests from a host to tracks in storage. A cursor is set to point to a track in a range of tracks established for sequential accesses. Cache resources are accessed for the cache for tracks in the range of tracks in advance of processing access requests to the range of tracks. Indication is received of a subset of tracks in the range of tracks for subsequent access transactions and a determination is made whether the cursor points to a track in the subset of tracks. The cursor is set to point to a track in the subset of tracks and cache resources are accessed for tracks in the subset of tracks for anticipation of access transactions to tracks in the subset of tracks.Type: GrantFiled: October 15, 2019Date of Patent: August 3, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ronald E. Bretschneider, Susan K. Candelaria, Beth A. Peterson, Dale F. Riedy, Peter G. Sutton, Harry M. Yudenfriend
-
Patent number: 11055015Abstract: A method for suppressing data mirroring between a primary storage system and a secondary storage system is disclosed. In one embodiment, such a method includes defining a data class with an attribute designed to suppress mirroring of data from a primary storage system to a secondary storage system. The method assigns a data set to the data class, thereby causing the data set to inherit the attribute. In certain embodiments, assigning the data set to the data class includes recording the attribute in one or more of a volume-table-of-contents (VTOC) and a catalog used to reference the data set. The method automatically suppresses mirroring of the data set from the primary storage system to the secondary storage system in accordance with the assigned attribute. A corresponding system and computer program product are also disclosed.Type: GrantFiled: April 16, 2019Date of Patent: July 6, 2021Assignee: International Business Machines CorporationInventors: Harry M. Yudenfriend, John R. Paveza, Peter G. Sutton, Tan Q. Nguyen, Gerard M. Dearing
-
Patent number: 11025413Abstract: Authentication is performed on a plurality of links coupling one node of the computing environment and another node of the computing environment. The performing authentication includes obtaining by the one node a shared key from a key server coupled to the one node and another node of the computing environment. A message encrypted with the shared key is sent from the one node to the other node via one link of the plurality of links. An indication that the other node decrypted the message using the shared key obtained by the other node is received from the other node via the one link. The sending and the receiving are repeated on one or more other links of the plurality of links using the shared key previously obtained.Type: GrantFiled: September 4, 2018Date of Patent: June 1, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Patricia G. Driever, Roger G. Hathorn, Christopher Colonna, John Flanagan, George P. Kuch, Richard M. Sczepczenski, Glen Jaquette, Peter G. Sutton
-
Patent number: 10990434Abstract: A system and related method provides within a data processing system (DPS), a first set of computing resources comprising a set of processor units that comprises a first core in an active state, and a second core that is initially in an inactive state. The processor allocates, for a partition that is hosted on the DPS, the first set of computing resources. The partition is operated using the first core before the second core has been activated. A resource manager determines whether to increase processing capacity based on an abnormal event. The processor then activates the second core from the inactive state to the active state. The partition is then operated using both the first and second (activated). In response to a predefined criterion, the second core is deactivated from the active state to the inactive state.Type: GrantFiled: February 5, 2019Date of Patent: April 27, 2021Assignee: International Business Machines CorporationInventor: Peter G. Sutton
-
Patent number: 10983833Abstract: An aspect includes hardware accelerator access. An application executing on a core of a multi-core processor triggers an interface code routine to acquire ownership of a hardware accelerator that is shared by a plurality of cores. The interface code routine partitions an input work package of the application into a plurality of pages in one or more input queues. The input work package is provided to the hardware accelerator in groups of one or more pages through the one or more input queues based on acquiring ownership of the hardware accelerator.Type: GrantFiled: July 31, 2019Date of Patent: April 20, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Brenton F. Belmar, Christian Jacobi, Matthias Klein, Peter G. Sutton
-
Patent number: 10904226Abstract: A processor-implemented method for a secure processing environment for protecting sensitive information is provided. The processor-implemented method may include receiving encrypted data and routing the encrypted data to the secure processing environment. Then the encrypted data may be decrypted and fields containing sensitive information may be found. The method may also include obfuscating the sensitive information and returning, by the secure processing environment, the decrypted data and obfuscated data.Type: GrantFiled: November 20, 2019Date of Patent: January 26, 2021Assignee: International Business Machines CorporationInventors: Richard H. Boivie, Alyson Comer, John C. Dayka, Donna N. Dillenberger, Kenneth A. Goldman, Mohit Kapur, Dimitrios Pendarakis, James A. Ruddy, Peter G. Sutton, Enriquillo Valdez
-
Patent number: 10902126Abstract: Provided are a computer program product, system, and method for verification of a boot loader program at a control unit to be provided to a host system to load an operating system. A stored value is generated from a cryptographic function applied to portions of a boot loader program stored in the storage. The boot loader program is read from the storage in response to execution of a boot loader request from the host system. The cryptographic function is applied to at least a portion of the read boot loader program to produce a calculated value. The host system is provided access to the boot loader program to use to load the operating system from the storage into the host system in response to the calculated value matching the stored value.Type: GrantFiled: March 10, 2017Date of Patent: January 26, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Peter G. Sutton, Harry M. Yudenfriend
-
Patent number: 10884818Abstract: According to one or more embodiments of the present invention a computer-implemented method includes allocating, for a partition from a plurality of partitions of a computer server, a first set of computing resources of the computer server. The method further includes receiving a request to increase processing capacity for the partition. The method further includes in response, allocating a second set of computer resources, in addition to the first set of computer resources, for the partition. The method further includes operating the partition using the first set of computing resources and the second set of computing resources.Type: GrantFiled: November 8, 2018Date of Patent: January 5, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Peter G. Sutton, David H. Surman, Matthew D. Whitbourne
-
Publication number: 20200333960Abstract: A method for suppressing data mirroring between a primary storage system and a secondary storage system is disclosed. In one embodiment, such a method includes defining a data class with an attribute designed to suppress mirroring of data from a primary storage system to a secondary storage system. The method assigns a data set to the data class, thereby causing the data set to inherit the attribute. In certain embodiments, assigning the data set to the data class includes recording the attribute in one or more of a volume-table-of-contents (VTOC) and a catalog used to reference the data set. The method automatically suppresses mirroring of the data set from the primary storage system to the secondary storage system in accordance with the assigned attribute. A corresponding system and computer program product are also disclosed.Type: ApplicationFiled: April 16, 2019Publication date: October 22, 2020Applicant: International Business Machines CorporationInventors: Harry M. Yudenfriend, John R. Paveza, Peter G. Sutton, Tan Q. Nguyen, Gerard M. Dearing
-
Patent number: 10764291Abstract: Access between a plurality of nodes of the computing environment is controlled by a key server. The key server receives from one node of the plurality of nodes, a request for a shared key, in which the shared key is created for a selected node pair. A determination is made by the key server as to whether the one node is a node of the selected node pair. In one example, the determining checks an alternate name of the one node to determine whether it matches an alternate name associated with the shared key. Based on determining the one node is a node of the selected node pair, the key server provides the shared key to the one node.Type: GrantFiled: September 4, 2018Date of Patent: September 1, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Patricia G. Driever, Roger G. Hathorn, Christopher Colonna, John Flanagan, George P. Kuch, Richard M. Sczepczenski, Glen Jaquette, Jacob L. Sheppard, Peter G. Sutton
-
Publication number: 20200249974Abstract: A system and related method provides within a data processing system (DPS), a first set of computing resources comprising a set of processor units that comprises a first core in an active state, and a second core that is initially in an inactive state. The processor allocates, for a partition that is hosted on the DPS, the first set of computing resources. The partition is operated using the first core before the second core has been activated. A resource manager determines whether to increase processing capacity based on an abnormal event. The processor then activates the second core from the inactive state to the active state. The partition is then operated using both the first and second (activated). In response to a predefined criterion, the second core is deactivated from the active state to the inactive state.Type: ApplicationFiled: February 5, 2019Publication date: August 6, 2020Inventor: Peter G. Sutton
-
Patent number: 10700869Abstract: Aspects include providing automatic access control and security for a synchronous input/output (I/O) link. Providing automatic access control and security includes initializing devices of a storage environment over a first link to verify that the devices are available within the storage environment; building a table of identifiers, where each of the identifiers is assigned one of the devices that have been initialized; and verifying a first device attempting to perform synchronous I/O commands across the synchronization I/O link by confirming that an identifier assigned to the first device is within the table of identifiers.Type: GrantFiled: August 30, 2018Date of Patent: June 30, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David F. Craddock, Beth A. Glendening, Dale F. Riedy, Peter G. Sutton, Harry M. Yudenfriend
-
Patent number: 10664406Abstract: A method for utilizing parallel paths of differing performance to improve efficiency is disclosed. In one embodiment, such a method includes transmitting, over a faster path, a first command to perform first actions intended to improve efficiency of second actions associated with a second command. The method transmits, over a slower path in parallel with the faster path, the second command. Alternatively, a method for utilizing parallel paths of differing performance to improve efficiency includes receiving, over a faster path, a first command to perform first actions intended to improve efficiency of second actions associated with a second command. The method executes the first command to perform the first actions. The method receives, over a slower path in parallel with the faster path, the second command and executes the second command to perform the second actions. Corresponding systems and computer program products are also disclosed.Type: GrantFiled: March 21, 2017Date of Patent: May 26, 2020Assignee: International Business Machines CorporationInventors: Dale F. Riedy, Peter G. Sutton, Harry M. Yudenfriend
-
Publication number: 20200151021Abstract: According to one or more embodiments of the present invention a computer-implemented method includes allocating, for a partition from a plurality of partitions of a computer server, a first set of computing resources of the computer server. The method further includes receiving a request to increase processing capacity for the partition. The method further includes in response, allocating a second set of computer resources, in addition to the first set of computer resources, for the partition. The method further includes operating the partition using the first set of computing resources and the second set of computing resources.Type: ApplicationFiled: November 8, 2018Publication date: May 14, 2020Inventors: Peter G. Sutton, David H. Surman, Matthew D. Whitbourne
-
Publication number: 20200143040Abstract: An embodiment of restricted command set management permits a storage controller to execute commands of a restricted command set if authorized. A command determined to be within the restricted command set is encrypted by a host prior to sending the encrypted command to a storage controller for execution. The command may be encrypted using a key shared between the host and the storage controller. The shared key may be generated by the host and encrypted by the host using a public key of a public-private key maintained by the storage controller. The encrypted shared key may be decrypted by the storage controller using the private key of the public-private key maintained by the storage controller. Execution of commands of the restricted command set is prevented absent proper decryption of the commands sent by the host. Other features and aspects may be realized, depending upon the particular application.Type: ApplicationFiled: November 6, 2018Publication date: May 7, 2020Inventors: Peter G. Sutton, Roger G. Hathorn, Harry M. Yudenfriend
-
Publication number: 20200133561Abstract: A method for accelerating transaction execution across geographically dispersed clusters is disclosed. In one embodiment, such a method includes receiving a request to read data in a data replication system comprising a primary storage system and a secondary storage system in a synchronous mirroring relationship with the primary storage system. The method determines whether at least one of the following conditions is true: (1) the secondary storage system is closer from a communication standpoint; and (2) a high speed communication technology is available to communicate with the secondary storage system that is not available to communicate with the primary storage system. In the event either of the conditions is true, the method directs the request to the secondary storage system. In the event neither of the conditions is true, the method directs the request to the primary storage system. A corresponding system and computer program product are also disclosed.Type: ApplicationFiled: October 31, 2018Publication date: April 30, 2020Applicant: International Business Machines CorporationInventors: Harry M. Yudenfriend, Dale F. Riedy, Scott B. Compton, Nicolas M. Clayton, Peter G. Sutton
-
Patent number: 10635307Abstract: Aspects include a computer-implemented method includes receiving an instruction at a processor, the instruction associated with a memory block having an address, and accessing a state indicator by the processor. The state indicator indicates whether the memory block is in a pre-defined state, and the state indicator is accessible by the processor independent of the memory block. The method also includes, based on the state indicator indicating that the memory block is in the pre-defined state, inspecting a subset of data values in the memory block, and identifying the pre-defined state of the memory block based on the subset of data values.Type: GrantFiled: June 30, 2015Date of Patent: April 28, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jane H. Bartik, Peter G. Sutton, Craig R. Walters, Charles F. Webb