Patents by Inventor Philip R. Chauvet

Philip R. Chauvet has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11907087
    Abstract: A method for more effectively utilizing computing resources in a data replication environment is disclosed. In one embodiment, such a method detects, at a primary system, activity occurring on the primary system. This activity is recorded in systems logs located at the primary system. The method automatically mirrors the system logs from the primary system to a secondary system that is in a mirroring relationship with the primary system. The system logs are analyzed at the secondary system. In the event abnormal activity is detected in the system logs at the secondary system, the method automatically sends, from the secondary system to the primary system, one or more commands that are designed to address the abnormal activity. A corresponding system and computer program product are also disclosed.
    Type: Grant
    Filed: July 10, 2019
    Date of Patent: February 20, 2024
    Assignee: International Business Machines Corporation
    Inventors: David C. Reed, Philip R. Chauvet, Esteban Rios, Thomas C. Reed
  • Patent number: 11614868
    Abstract: A method for preventing data overlays in a data storage system is disclosed. In one embodiment, such a method detects a write operation directed to a storage area of a data storage system. The write operation includes one or more of a format write operation and a full-track write operation. Upon detecting the write operation, the method determines a data set that is associated with the storage area. The method analyzes metadata associated with the data set to determine whether the storage area contains valid data. In the event the storage area contains valid data, the method performs a data protection operation that prevents execution of the write operation and/or logs details of the write operation. A corresponding system and computer program product are also disclosed.
    Type: Grant
    Filed: September 30, 2019
    Date of Patent: March 28, 2023
    Assignee: International Business Machines Corporation
    Inventors: David C. Reed, Kenneth J. Owin, Philip R. Chauvet, Tabor Powelson
  • Patent number: 11295006
    Abstract: In one aspect of the present description, operations are described for detecting whether programming code of a first computer program has been modified by a second computer program. In one embodiment, the modification detecting includes registering a first section of programming code of the first computer program in a first registry data structure. To detect a modification, the registered first section of programming code may be validated. In one embodiment, the validating includes comparing the section of programming code actually located at the first memory address to the registered first section of programming code. In another aspect, various selectable remedial actions may be taken upon detecting modification of programming code of the first computer program. Other features and aspects may be realized, depending upon the particular application.
    Type: Grant
    Filed: January 6, 2020
    Date of Patent: April 5, 2022
    Assignee: International Business Machines Corporation
    Inventors: Philip R. Chauvet, Joseph V. Malinowski, David C. Reed, Max D. Smith
  • Patent number: 11281694
    Abstract: A method for more effectively utilizing computing resources in a data replication environment is disclosed. In one embodiment, such a method detects, at a primary system, activity occurring on the primary system. This activity is recorded in systems logs located at the primary system. The method automatically mirrors the system logs from the primary system to a secondary system that is in a mirroring relationship with the primary system. The system logs are analyzed at the secondary system. In the event abnormal activity is detected in the system logs at the secondary system, the method identifies, on the secondary system, a data set that is associated with the abnormal activity. A snapshot is taken of this data set and saved on the secondary system for later analysis. A corresponding system and computer program product are also disclosed.
    Type: Grant
    Filed: July 10, 2019
    Date of Patent: March 22, 2022
    Assignee: International Business Machines Cormoration
    Inventors: David C. Reed, Philip R. Chauvet, Esteban Rios, Thomas C. Reed
  • Patent number: 11100056
    Abstract: A method for tracking actions performed in association with a data set includes identifying multiple sources of historical information describing actions performed on the data set. The method periodically gathers this historical information from the multiple sources and compiles the historical information in a centralized repository. In certain embodiments, the method stores the historical information in the form of individual records associated with the data set. In the event any actions performed on the data set are the result of policies established for the data set, the method determines the policies associated with the actions where possible. The method includes these policies with the historical information in the centralized repository. A corresponding system and computer program product are also disclosed.
    Type: Grant
    Filed: May 17, 2016
    Date of Patent: August 24, 2021
    Assignee: International Business Machines Corporation
    Inventors: Philip R. Chauvet, Andrew E. Deiss, Kenneth J. Owin, David C. Reed
  • Patent number: 11061750
    Abstract: A method for analyzing data corruption is disclosed. In one embodiment, such a method includes identifying a data set to analyze for data corruption. This data set resides on tracks of a volume. The method further determines, from control information associated with the volume, on which tracks of the volume the data set resides. The method reads content of the data set without opening the data set by performing full-track reads of the tracks. The method further determines an expected format of the content by analyzing the control information. An actual format of the content is compared to the expected format to identify areas of the data set that may be corrupt. A corresponding system and computer program product are also disclosed.
    Type: Grant
    Filed: September 6, 2018
    Date of Patent: July 13, 2021
    Assignee: International Business Machines Corporation
    Inventors: Philip R. Chauvet, David C. Reed, Franklin E. McCune, Keith R. Smith
  • Publication number: 20210096752
    Abstract: A method for preventing data overlays in a data storage system is disclosed. In one embodiment, such a method detects a write operation directed to a storage area of a data storage system. The write operation includes one or more of a format write operation and a full-track write operation. Upon detecting the write operation, the method determines a data set that is associated with the storage area. The method analyzes metadata associated with the data set to determine whether the storage area contains valid data. In the event the storage area contains valid data, the method performs a data protection operation that prevents execution of the write operation and/or logs details of the write operation. A corresponding system and computer program product are also disclosed.
    Type: Application
    Filed: September 30, 2019
    Publication date: April 1, 2021
    Applicant: International Business Machines Corporation
    Inventors: David C. Reed, Kenneth J. Owin, Philip R. Chauvet, Tabor Powelson
  • Publication number: 20210011927
    Abstract: A method for more effectively utilizing computing resources in a data replication environment is disclosed. In one embodiment, such a method detects, at a primary system, activity occurring on the primary system. This activity is recorded in systems logs located at the primary system. The method automatically mirrors the system logs from the primary system to a secondary system that is in a mirroring relationship with the primary system. The system logs are analyzed at the secondary system. In the event abnormal activity is detected in the system logs at the secondary system, the method identifies, on the secondary system, a data set that is associated with the abnormal activity. A snapshot is taken of this data set and saved on the secondary system for later analysis. A corresponding system and computer program product are also disclosed.
    Type: Application
    Filed: July 10, 2019
    Publication date: January 14, 2021
    Applicant: International Business Machines Corporation
    Inventors: David C. Reed, Philip R. Chauvet, Esteban Rios, Thomas C. Reed
  • Publication number: 20210011998
    Abstract: A method for detecting abnormal activity on a computing system is disclosed. In one embodiment, such a method includes observing, over a period of time, activity occurring on a computing system. The method establishes, for the computing system based on the observations, a normal range associated with the activity. The method further monitors the computing system for the activity and documents activity on the computing system that falls outside the normal range. In certain embodiments, when activity is detected on the computing system that falls outside the normal range, the method gathers or compiles additional information about the activity, notifies a user, and/or generates a report that describes the abnormal activity and events surrounding the abnormal activity. A corresponding system and computer program product are also disclosed.
    Type: Application
    Filed: July 10, 2019
    Publication date: January 14, 2021
    Applicant: International Business Machines Corporation
    Inventors: David C. Reed, Franklin E. McCune, Philip R. Chauvet, Thomas C. Reed
  • Publication number: 20210011821
    Abstract: A method for more effectively utilizing computing resources in a data replication environment is disclosed. In one embodiment, such a method detects, at a primary system, activity occurring on the primary system. This activity is recorded in systems logs located at the primary system. The method automatically mirrors the system logs from the primary system to a secondary system that is in a mirroring relationship with the primary system. The system logs are analyzed at the secondary system. In the event abnormal activity is detected in the system logs at the secondary system, the method automatically sends, from the secondary system to the primary system, one or more commands that are designed to address the abnormal activity. A corresponding system and computer program product are also disclosed.
    Type: Application
    Filed: July 10, 2019
    Publication date: January 14, 2021
    Applicant: International Business Machines Corporation
    Inventors: David C. Reed, Philip R. Chauvet, Esteban Rios, Thomas C. Reed
  • Patent number: 10762240
    Abstract: Apparatuses, methods, and computer program products are provided for anonymizing a data set having an index component and a data component. In certain embodiments, the apparatuses, methods and computer program products make a copy of the data set, removes personal information from the data component, modifies an index component key value with a random value, modifies a data component key value with the same random value, and maintains a data set structure of the index component and the data component.
    Type: Grant
    Filed: August 22, 2018
    Date of Patent: September 1, 2020
    Assignee: International Business Machines Corporation
    Inventors: David C. Reed, Max D. Smith, Philip R. Chauvet, Franklin E. McCune
  • Publication number: 20200143039
    Abstract: In one aspect of the present description, operations are described for detecting whether programming code of a first computer program has been modified by a second computer program. In one embodiment, the modification detecting includes registering a first section of programming code of the first computer program in a first registry data structure. To detect a modification, the registered first section of programming code may be validated. In one embodiment, the validating includes comparing the section of programming code actually located at the first memory address to the registered first section of programming code. In another aspect, various selectable remedial actions may be taken upon detecting modification of programming code of the first computer program. Other features and aspects may be realized, depending upon the particular application.
    Type: Application
    Filed: January 6, 2020
    Publication date: May 7, 2020
    Inventors: Philip R. Chauvet, Joseph V. Malinowski, David C. Reed, Max D. Smith
  • Patent number: 10628402
    Abstract: A method includes receiving a request to store a record in a base data set and determining whether the base data set can accommodate the record. In the event the base data set cannot accommodate the record, the method automatically creates an overflow data set to accommodate the record, stores the record in the overflow data set, and updates an index of the base data set to include a key associated with the record. The key points to the overflow data set as containing the record. In certain embodiments, the base data set and overflow data set are both keyed VSAM data sets. A corresponding system and computer program product are also disclosed.
    Type: Grant
    Filed: September 27, 2017
    Date of Patent: April 21, 2020
    Assignee: International Business Machines Corporation
    Inventors: Philip R. Chauvet, David C. Reed, Michael R. Scott
  • Publication number: 20200081762
    Abstract: A method for analyzing data corruption is disclosed. In one embodiment, such a method includes identifying a data set to analyze for data corruption. This data set resides on tracks of a volume. The method further determines, from control information associated with the volume, on which tracks of the volume the data set resides. The method reads content of the data set without opening the data set by performing full-track reads of the tracks. The method further determines an expected format of the content by analyzing the control information. An actual format of the content is compared to the expected format to identify areas of the data set that may be corrupt. A corresponding system and computer program product are also disclosed.
    Type: Application
    Filed: September 6, 2018
    Publication date: March 12, 2020
    Applicant: International Business Machines Corporation
    Inventors: Philip R. Chauvet, David C. Reed, Franklin E. McCune, Keith R. Smith
  • Publication number: 20200065520
    Abstract: Apparatuses, methods, and computer program products are provided for anonymizing a data set having an index component and a data component. In certain embodiments, the apparatuses, methods and computer program products make a copy of the data set, removes personal information from the data component, modifies an index component key value with a random value, modifies a data component key value with the same random value, and maintains a data set structure of the index component and the data component.
    Type: Application
    Filed: August 22, 2018
    Publication date: February 27, 2020
    Inventors: David C. Reed, Max D. Smith, Philip R. Chauvet, Franklin E. McCune
  • Patent number: 10565369
    Abstract: In one aspect of the present description, operations are described for detecting whether programming code of a first computer program has been modified by a second computer program. In one embodiment, the modification detecting includes registering a first section of programming code of the first computer program in a first registry data structure. To detect a modification, the registered first section of programming code may be validated. In one embodiment, the validating includes comparing the section of programming code actually located at the first memory address to the registered first section of programming code. In another aspect, various selectable remedial actions may be taken upon detecting modification of programming code of the first computer program. Other features and aspects may be realized, depending upon the particular application.
    Type: Grant
    Filed: March 6, 2018
    Date of Patent: February 18, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Philip R. Chauvet, Joseph V. Malinowski, David C. Reed, Max D. Smith
  • Publication number: 20190095473
    Abstract: A method includes receiving a request to store a record in a base data set and determining whether the base data set can accommodate the record. In the event the base data set cannot accommodate the record, the method automatically creates an overflow data set to accommodate the record, stores the record in the overflow data set, and updates an index of the base data set to include a key associated with the record. The key points to the overflow data set as containing the record. In certain embodiments, the base data set and overflow data set are both keyed VSAM data sets. A corresponding system and computer program product are also disclosed.
    Type: Application
    Filed: September 27, 2017
    Publication date: March 28, 2019
    Applicant: International Business Machines Corporation
    Inventors: Philip R. Chauvet, David C. Reed, Michael R. Scott
  • Patent number: 10169394
    Abstract: A method, system, and computer program product for managing data sets of a storage facility is disclosed. The method, system, and computer program product include determining, by analyzing a first data set, that the first data set includes a first record having padded data. To identify the padded data, the method, system, and computer program product include comparing at least a portion of the first record of the first data set with a second record of a second data set. Next, the method, system, and computer program product include removing, from the first record of the first data set, the padded data.
    Type: Grant
    Filed: June 5, 2014
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Philip R. Chauvet, Franklin E. McCune, David C. Reed, Max D. Smith
  • Patent number: 10042694
    Abstract: A method for validating control blocks in memory includes monitoring for operations configured to obtain storage space in memory. The method examines the storage space that has been obtained to identify control blocks stored in the storage space. These control blocks are then analyzed to determine whether the control blocks are valid. In certain embodiments, this may be accomplished by comparing the content of the control blocks to information in a validation table that indicates possible values and ranges of values for fields in the control blocks. If a control block is valid, the method records a date and time when the control block was validated. If a control block is not valid, the method generates a message indicating that the control block is not valid. A corresponding system and computer program product are also disclosed.
    Type: Grant
    Filed: September 6, 2016
    Date of Patent: August 7, 2018
    Assignee: International Business Machines Corporation
    Inventors: Philip R. Chauvet, Franklin E. McCune, David C. Reed, Esteban Rios
  • Publication number: 20180196938
    Abstract: In one aspect of the present description, operations are described for detecting whether programming code of a first computer program has been modified by a second computer program. In one embodiment, the modification detecting includes registering a first section of programming code of the first computer program in a first registry data structure. To detect a modification, the registered first section of programming code may be validated. In one embodiment, the validating includes comparing the section of programming code actually located at the first memory address to the registered first section of programming code. In another aspect, various selectable remedial actions may be taken upon detecting modification of programming code of the first computer program. Other features and aspects may be realized, depending upon the particular application.
    Type: Application
    Filed: March 6, 2018
    Publication date: July 12, 2018
    Inventors: Philip R. Chauvet, Joseph V. Malinowski, David C. Reed, Max D. Smith