Patents by Inventor Philip R. Chauvet
Philip R. Chauvet has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11907087Abstract: A method for more effectively utilizing computing resources in a data replication environment is disclosed. In one embodiment, such a method detects, at a primary system, activity occurring on the primary system. This activity is recorded in systems logs located at the primary system. The method automatically mirrors the system logs from the primary system to a secondary system that is in a mirroring relationship with the primary system. The system logs are analyzed at the secondary system. In the event abnormal activity is detected in the system logs at the secondary system, the method automatically sends, from the secondary system to the primary system, one or more commands that are designed to address the abnormal activity. A corresponding system and computer program product are also disclosed.Type: GrantFiled: July 10, 2019Date of Patent: February 20, 2024Assignee: International Business Machines CorporationInventors: David C. Reed, Philip R. Chauvet, Esteban Rios, Thomas C. Reed
-
Patent number: 11614868Abstract: A method for preventing data overlays in a data storage system is disclosed. In one embodiment, such a method detects a write operation directed to a storage area of a data storage system. The write operation includes one or more of a format write operation and a full-track write operation. Upon detecting the write operation, the method determines a data set that is associated with the storage area. The method analyzes metadata associated with the data set to determine whether the storage area contains valid data. In the event the storage area contains valid data, the method performs a data protection operation that prevents execution of the write operation and/or logs details of the write operation. A corresponding system and computer program product are also disclosed.Type: GrantFiled: September 30, 2019Date of Patent: March 28, 2023Assignee: International Business Machines CorporationInventors: David C. Reed, Kenneth J. Owin, Philip R. Chauvet, Tabor Powelson
-
Patent number: 11295006Abstract: In one aspect of the present description, operations are described for detecting whether programming code of a first computer program has been modified by a second computer program. In one embodiment, the modification detecting includes registering a first section of programming code of the first computer program in a first registry data structure. To detect a modification, the registered first section of programming code may be validated. In one embodiment, the validating includes comparing the section of programming code actually located at the first memory address to the registered first section of programming code. In another aspect, various selectable remedial actions may be taken upon detecting modification of programming code of the first computer program. Other features and aspects may be realized, depending upon the particular application.Type: GrantFiled: January 6, 2020Date of Patent: April 5, 2022Assignee: International Business Machines CorporationInventors: Philip R. Chauvet, Joseph V. Malinowski, David C. Reed, Max D. Smith
-
Patent number: 11281694Abstract: A method for more effectively utilizing computing resources in a data replication environment is disclosed. In one embodiment, such a method detects, at a primary system, activity occurring on the primary system. This activity is recorded in systems logs located at the primary system. The method automatically mirrors the system logs from the primary system to a secondary system that is in a mirroring relationship with the primary system. The system logs are analyzed at the secondary system. In the event abnormal activity is detected in the system logs at the secondary system, the method identifies, on the secondary system, a data set that is associated with the abnormal activity. A snapshot is taken of this data set and saved on the secondary system for later analysis. A corresponding system and computer program product are also disclosed.Type: GrantFiled: July 10, 2019Date of Patent: March 22, 2022Assignee: International Business Machines CormorationInventors: David C. Reed, Philip R. Chauvet, Esteban Rios, Thomas C. Reed
-
Patent number: 11100056Abstract: A method for tracking actions performed in association with a data set includes identifying multiple sources of historical information describing actions performed on the data set. The method periodically gathers this historical information from the multiple sources and compiles the historical information in a centralized repository. In certain embodiments, the method stores the historical information in the form of individual records associated with the data set. In the event any actions performed on the data set are the result of policies established for the data set, the method determines the policies associated with the actions where possible. The method includes these policies with the historical information in the centralized repository. A corresponding system and computer program product are also disclosed.Type: GrantFiled: May 17, 2016Date of Patent: August 24, 2021Assignee: International Business Machines CorporationInventors: Philip R. Chauvet, Andrew E. Deiss, Kenneth J. Owin, David C. Reed
-
Patent number: 11061750Abstract: A method for analyzing data corruption is disclosed. In one embodiment, such a method includes identifying a data set to analyze for data corruption. This data set resides on tracks of a volume. The method further determines, from control information associated with the volume, on which tracks of the volume the data set resides. The method reads content of the data set without opening the data set by performing full-track reads of the tracks. The method further determines an expected format of the content by analyzing the control information. An actual format of the content is compared to the expected format to identify areas of the data set that may be corrupt. A corresponding system and computer program product are also disclosed.Type: GrantFiled: September 6, 2018Date of Patent: July 13, 2021Assignee: International Business Machines CorporationInventors: Philip R. Chauvet, David C. Reed, Franklin E. McCune, Keith R. Smith
-
Publication number: 20210096752Abstract: A method for preventing data overlays in a data storage system is disclosed. In one embodiment, such a method detects a write operation directed to a storage area of a data storage system. The write operation includes one or more of a format write operation and a full-track write operation. Upon detecting the write operation, the method determines a data set that is associated with the storage area. The method analyzes metadata associated with the data set to determine whether the storage area contains valid data. In the event the storage area contains valid data, the method performs a data protection operation that prevents execution of the write operation and/or logs details of the write operation. A corresponding system and computer program product are also disclosed.Type: ApplicationFiled: September 30, 2019Publication date: April 1, 2021Applicant: International Business Machines CorporationInventors: David C. Reed, Kenneth J. Owin, Philip R. Chauvet, Tabor Powelson
-
Publication number: 20210011927Abstract: A method for more effectively utilizing computing resources in a data replication environment is disclosed. In one embodiment, such a method detects, at a primary system, activity occurring on the primary system. This activity is recorded in systems logs located at the primary system. The method automatically mirrors the system logs from the primary system to a secondary system that is in a mirroring relationship with the primary system. The system logs are analyzed at the secondary system. In the event abnormal activity is detected in the system logs at the secondary system, the method identifies, on the secondary system, a data set that is associated with the abnormal activity. A snapshot is taken of this data set and saved on the secondary system for later analysis. A corresponding system and computer program product are also disclosed.Type: ApplicationFiled: July 10, 2019Publication date: January 14, 2021Applicant: International Business Machines CorporationInventors: David C. Reed, Philip R. Chauvet, Esteban Rios, Thomas C. Reed
-
Publication number: 20210011998Abstract: A method for detecting abnormal activity on a computing system is disclosed. In one embodiment, such a method includes observing, over a period of time, activity occurring on a computing system. The method establishes, for the computing system based on the observations, a normal range associated with the activity. The method further monitors the computing system for the activity and documents activity on the computing system that falls outside the normal range. In certain embodiments, when activity is detected on the computing system that falls outside the normal range, the method gathers or compiles additional information about the activity, notifies a user, and/or generates a report that describes the abnormal activity and events surrounding the abnormal activity. A corresponding system and computer program product are also disclosed.Type: ApplicationFiled: July 10, 2019Publication date: January 14, 2021Applicant: International Business Machines CorporationInventors: David C. Reed, Franklin E. McCune, Philip R. Chauvet, Thomas C. Reed
-
Publication number: 20210011821Abstract: A method for more effectively utilizing computing resources in a data replication environment is disclosed. In one embodiment, such a method detects, at a primary system, activity occurring on the primary system. This activity is recorded in systems logs located at the primary system. The method automatically mirrors the system logs from the primary system to a secondary system that is in a mirroring relationship with the primary system. The system logs are analyzed at the secondary system. In the event abnormal activity is detected in the system logs at the secondary system, the method automatically sends, from the secondary system to the primary system, one or more commands that are designed to address the abnormal activity. A corresponding system and computer program product are also disclosed.Type: ApplicationFiled: July 10, 2019Publication date: January 14, 2021Applicant: International Business Machines CorporationInventors: David C. Reed, Philip R. Chauvet, Esteban Rios, Thomas C. Reed
-
Patent number: 10762240Abstract: Apparatuses, methods, and computer program products are provided for anonymizing a data set having an index component and a data component. In certain embodiments, the apparatuses, methods and computer program products make a copy of the data set, removes personal information from the data component, modifies an index component key value with a random value, modifies a data component key value with the same random value, and maintains a data set structure of the index component and the data component.Type: GrantFiled: August 22, 2018Date of Patent: September 1, 2020Assignee: International Business Machines CorporationInventors: David C. Reed, Max D. Smith, Philip R. Chauvet, Franklin E. McCune
-
Publication number: 20200143039Abstract: In one aspect of the present description, operations are described for detecting whether programming code of a first computer program has been modified by a second computer program. In one embodiment, the modification detecting includes registering a first section of programming code of the first computer program in a first registry data structure. To detect a modification, the registered first section of programming code may be validated. In one embodiment, the validating includes comparing the section of programming code actually located at the first memory address to the registered first section of programming code. In another aspect, various selectable remedial actions may be taken upon detecting modification of programming code of the first computer program. Other features and aspects may be realized, depending upon the particular application.Type: ApplicationFiled: January 6, 2020Publication date: May 7, 2020Inventors: Philip R. Chauvet, Joseph V. Malinowski, David C. Reed, Max D. Smith
-
Patent number: 10628402Abstract: A method includes receiving a request to store a record in a base data set and determining whether the base data set can accommodate the record. In the event the base data set cannot accommodate the record, the method automatically creates an overflow data set to accommodate the record, stores the record in the overflow data set, and updates an index of the base data set to include a key associated with the record. The key points to the overflow data set as containing the record. In certain embodiments, the base data set and overflow data set are both keyed VSAM data sets. A corresponding system and computer program product are also disclosed.Type: GrantFiled: September 27, 2017Date of Patent: April 21, 2020Assignee: International Business Machines CorporationInventors: Philip R. Chauvet, David C. Reed, Michael R. Scott
-
Publication number: 20200081762Abstract: A method for analyzing data corruption is disclosed. In one embodiment, such a method includes identifying a data set to analyze for data corruption. This data set resides on tracks of a volume. The method further determines, from control information associated with the volume, on which tracks of the volume the data set resides. The method reads content of the data set without opening the data set by performing full-track reads of the tracks. The method further determines an expected format of the content by analyzing the control information. An actual format of the content is compared to the expected format to identify areas of the data set that may be corrupt. A corresponding system and computer program product are also disclosed.Type: ApplicationFiled: September 6, 2018Publication date: March 12, 2020Applicant: International Business Machines CorporationInventors: Philip R. Chauvet, David C. Reed, Franklin E. McCune, Keith R. Smith
-
Publication number: 20200065520Abstract: Apparatuses, methods, and computer program products are provided for anonymizing a data set having an index component and a data component. In certain embodiments, the apparatuses, methods and computer program products make a copy of the data set, removes personal information from the data component, modifies an index component key value with a random value, modifies a data component key value with the same random value, and maintains a data set structure of the index component and the data component.Type: ApplicationFiled: August 22, 2018Publication date: February 27, 2020Inventors: David C. Reed, Max D. Smith, Philip R. Chauvet, Franklin E. McCune
-
Patent number: 10565369Abstract: In one aspect of the present description, operations are described for detecting whether programming code of a first computer program has been modified by a second computer program. In one embodiment, the modification detecting includes registering a first section of programming code of the first computer program in a first registry data structure. To detect a modification, the registered first section of programming code may be validated. In one embodiment, the validating includes comparing the section of programming code actually located at the first memory address to the registered first section of programming code. In another aspect, various selectable remedial actions may be taken upon detecting modification of programming code of the first computer program. Other features and aspects may be realized, depending upon the particular application.Type: GrantFiled: March 6, 2018Date of Patent: February 18, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Philip R. Chauvet, Joseph V. Malinowski, David C. Reed, Max D. Smith
-
Publication number: 20190095473Abstract: A method includes receiving a request to store a record in a base data set and determining whether the base data set can accommodate the record. In the event the base data set cannot accommodate the record, the method automatically creates an overflow data set to accommodate the record, stores the record in the overflow data set, and updates an index of the base data set to include a key associated with the record. The key points to the overflow data set as containing the record. In certain embodiments, the base data set and overflow data set are both keyed VSAM data sets. A corresponding system and computer program product are also disclosed.Type: ApplicationFiled: September 27, 2017Publication date: March 28, 2019Applicant: International Business Machines CorporationInventors: Philip R. Chauvet, David C. Reed, Michael R. Scott
-
Patent number: 10169394Abstract: A method, system, and computer program product for managing data sets of a storage facility is disclosed. The method, system, and computer program product include determining, by analyzing a first data set, that the first data set includes a first record having padded data. To identify the padded data, the method, system, and computer program product include comparing at least a portion of the first record of the first data set with a second record of a second data set. Next, the method, system, and computer program product include removing, from the first record of the first data set, the padded data.Type: GrantFiled: June 5, 2014Date of Patent: January 1, 2019Assignee: International Business Machines CorporationInventors: Philip R. Chauvet, Franklin E. McCune, David C. Reed, Max D. Smith
-
Patent number: 10042694Abstract: A method for validating control blocks in memory includes monitoring for operations configured to obtain storage space in memory. The method examines the storage space that has been obtained to identify control blocks stored in the storage space. These control blocks are then analyzed to determine whether the control blocks are valid. In certain embodiments, this may be accomplished by comparing the content of the control blocks to information in a validation table that indicates possible values and ranges of values for fields in the control blocks. If a control block is valid, the method records a date and time when the control block was validated. If a control block is not valid, the method generates a message indicating that the control block is not valid. A corresponding system and computer program product are also disclosed.Type: GrantFiled: September 6, 2016Date of Patent: August 7, 2018Assignee: International Business Machines CorporationInventors: Philip R. Chauvet, Franklin E. McCune, David C. Reed, Esteban Rios
-
Publication number: 20180196938Abstract: In one aspect of the present description, operations are described for detecting whether programming code of a first computer program has been modified by a second computer program. In one embodiment, the modification detecting includes registering a first section of programming code of the first computer program in a first registry data structure. To detect a modification, the registered first section of programming code may be validated. In one embodiment, the validating includes comparing the section of programming code actually located at the first memory address to the registered first section of programming code. In another aspect, various selectable remedial actions may be taken upon detecting modification of programming code of the first computer program. Other features and aspects may be realized, depending upon the particular application.Type: ApplicationFiled: March 6, 2018Publication date: July 12, 2018Inventors: Philip R. Chauvet, Joseph V. Malinowski, David C. Reed, Max D. Smith