Patents by Inventor Richard Roland Guyette

Richard Roland Guyette has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 5900019
    Abstract: Apparatus for protecting memory storage blocks (page frames) against unwanted I/O accesses, including I/O data transferred in an unwanted direction. I/O storage keys are provided in an I/O protection array. Each I/O key is comprised of one or two bits and is associated with a respective storage block in computer memory. If the array contains two bit I/O keys, each key has 4 settings for controlling I/O accesses to an associated storage block; which: 1) inhibit an I/O access in the input direction of I/O data flow, 2) inhibit an I/O access in the output direction of I/O data flow, 3) allow I/O accesses in both directions, or 4) prevent all I/O accesses. If the array contains single bit I/O storage keys, each key has two settings, which: 1) prevent all I/O accesses in the associated storage block, or 2) allow all I/O accesses in the associated block. No I/O program keys are needed for controlling this type of I/O protection, which avoids key comparison operations by the I/O access protection apparatus.
    Type: Grant
    Filed: May 23, 1996
    Date of Patent: May 4, 1999
    Assignee: International Business Machines Corporation
    Inventors: Paul Gregory Greenstein, Richard Roland Guyette, John Ted Rodell
  • Patent number: 5809546
    Abstract: I/O protection key processes for protecting storage blocks (page frames) in a shared main storage against unwanted I/O accesses. Independent CP (central processor) key protection may optionally be provided to protect the same storage against unwanted CP accesses. Processes are included for initializing, and addressing I/O buffers used by the I/O programs; each I/O buffer is comprised of a contiguous set of the blocks (page frames). The I/O keys may be used independently of any CP keys provided for protecting the same blocks against unwanted accesses by any CP in the system. The I/O keys must be supported by a hardware I/O storage array when only real (or absolute) addressing is used by I/O programs. However, the CP keys may be supported by either real CP keys in a second hardware key array; or alternatively the CP keys may be provided as virtual CP keys in a field in each page table entry (which is used for translating CP virtual addresses to CP real addresses).
    Type: Grant
    Filed: May 23, 1996
    Date of Patent: September 15, 1998
    Assignee: International Business Machines Corporation
    Inventors: Paul Gregory Greenstein, Richard Roland Guyette, John Ted Rodell
  • Patent number: 5802397
    Abstract: Protection against unwanted I/O accesses in main storage blocks/page frames independent of any storage protection provided against unwanted CPU accesses. An I/O protection array is used containing one-bit I/O keys used only for protecting which respectively protect associated blocks/page frames from unwanted accesses by I/O programs. Each one-bit I/O key is used to allow or disallow I/O accesses into an associated storage block. Any CPU access is not affected by the I/O storage key. No I/O program key is used and therefore no key compare operation is required. However, the embodiment is compatible with use of CPU storage protection using CPU storage keys in either real form in a CPU storage key array, or in virtual form in page table entries without using any CPU storage key array.
    Type: Grant
    Filed: May 23, 1996
    Date of Patent: September 1, 1998
    Assignee: International Business Machines Corporation
    Inventors: Paul Gregory Greenstein, Richard Roland Guyette, John Ted Rodell
  • Patent number: 5787309
    Abstract: Main storage access protection against unwanted I/O accesses in storage blocks/page frames independent of any protection provided against unwanted CPU accesses. I/O programs are each assigned an I/O program key which is matched against an I/O storage key selected from an I/O storage protection array used only for protecting blocks from accesses by I/O programs, but not from any accesses by CPU programs. The address of each storage access request by an I/O program selects a key entry in the array containing the I/O storage key used in the comparison with the I/O program key. Each entry in the I/O storage array may also contain a second I/O storage key which may be either a one-bit type as described and claimed in application Ser. No. 08/652,197 or a two-bit type as described and claimed in application Ser. No. 08/652,079, both applications of which were filed on the same day as this application and assigned to the same assignee.
    Type: Grant
    Filed: May 23, 1996
    Date of Patent: July 28, 1998
    Assignee: International Business Machines Corporation
    Inventors: Paul Gregory Greenstein, Richard Roland Guyette, John Ted Rodell
  • Patent number: 5784701
    Abstract: In a data processing system, a hardware system area ("HSA") storage is associated with the hardware configuration of the system. A change in the system hardware configuration typically corresponds to a change in HSA size. Upon determination of the requirement for, for example, increasing the size of HSA, a region of storage is freed from use as central storage or expanded storage. The freed region is incorporated into the data processing system as HSA storage. The process may be reversed to reduce the size of HSA by converting a region of HSA into either central storage or expanded storage.
    Type: Grant
    Filed: September 19, 1995
    Date of Patent: July 21, 1998
    Assignee: International Business Machines Corporation
    Inventors: Paul Gregory Greenstein, Richard Roland Guyette, John Ted Rodell
  • Patent number: 5784702
    Abstract: A dynamic reconfiguration request for a change in a system's physical configuration is transmitted from a configuration controller to a hypervisor controlling operating systems executing in one or more partitions of the system. The hypervisor translates the physical reconfiguration request into a request for reconfiguration of logical resources known to the operating systems, first verifying it against an installation policy, and passes the requests to the operating systems in the partitions. The operating systems perform logical reconfiguration, then request physical reconfiguration of the hypervisor. The hypervisor initiates the physical reconfiguration through the configuration controller.
    Type: Grant
    Filed: February 27, 1997
    Date of Patent: July 21, 1998
    Assignee: Internatinal Business Machines Corporation
    Inventors: Paul Gregory Greenstein, Richard Roland Guyette, John Ted Rodell
  • Patent number: 5724551
    Abstract: A program stored on a portable storage medium for transferring the program from/to a data processing system, including to or from a disk medium in the system. The program manages I/O buffers that use I/O storage protection key for protecting storage blocks (page frames) in a shared main storage against unwanted I/O accesses, but the I/O storage keys do not protect the storage blocks from an CP (central processor) accesses. CP key protection may optionally be provided to independently protect the same storage block against unwanted CP accesses. Processes initialize, and address I/O buffers used by I/O programs; each I/O buffer is comprised of a contiguous set of the blocks (page frames). The I/O keys are used independently of any CP keys, and both I/O and CP keys are required for protecting any block against unwanted accesses by both I/O and CP accesses. The I/O keys are supported by a hardware I/O storage key array when real (or absolute) addressing is used by I/O the programs.
    Type: Grant
    Filed: May 23, 1996
    Date of Patent: March 3, 1998
    Assignee: International Business Machines Corporation
    Inventors: Paul Gregory Greenstein, Richard Roland Guyette, John Ted Rodell
  • Patent number: 5675767
    Abstract: A method for dynamically detecting loss of map integrity in a form of system-managed storage (SMS). In SMS, maps are used to define access paths to data and to allocate and reallocate storage resources among applications running thereon. The method steps include incorporating as an indivisible part of an overwriting commmand the duplication of map information by appending a portion of it to each data block in store, and detecting loss of map integrity as a function of a comparison mismatch between the portion stored with a counterpart data block and the map upon each read/write access.
    Type: Grant
    Filed: November 10, 1992
    Date of Patent: October 7, 1997
    Assignee: International Business Machines Corporation
    Inventors: Robert Baird, Thomas Beretvas, Gerald Parks Bozman, Richard Roland Guyette, Paul Hodges, Alexander Stafford Lett, James Joseph Myers, William Harold Tetzlaff