Patents by Inventor Ryan P. Grimm
Ryan P. Grimm has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9852056Abstract: According to one embodiment of the present disclosure, an approach is provided in which a processor selects a page of data that is compressed by a first compression algorithm and stored in a memory block. The processor identifies a utilization amount of the compressed page of data and determines whether the utilization amount meets a utilization threshold. When the utilization amount fails to meet the utilization threshold, the processor uses a second compression algorithm to recompresses the page of data.Type: GrantFiled: September 12, 2013Date of Patent: December 26, 2017Assignee: International Business Machines CorporationInventors: Christopher J. Arges, Nathan Fontenot, Jeffrey D. George, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosaker, Mark W. VanderWiele
-
Patent number: 9852055Abstract: According to one embodiment of the present disclosure, an approach is provided in which a processor selects a page of data that is compressed by a first compression algorithm and stored in a memory block. The processor identifies a utilization amount of the compressed page of data and determines whether the utilization amount meets a utilization threshold. When the utilization amount fails to meet the utilization threshold, the processor uses a second compression algorithm to recompresses the page of data.Type: GrantFiled: February 25, 2013Date of Patent: December 26, 2017Assignee: International Business Machines CorporationInventors: Christopher J. Arges, Nathan Fontenot, Jeffrey D. George, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosaker, Mark W. VanderWiele
-
Patent number: 9172719Abstract: Embodiments of the invention relate to implementation of an intermediate trusted state of an electronic account based upon questionable account communication(s). A profile of malicious or unauthorized activity is created, and a profile of account activity is created. As account activity takes place, the activity is assessed against one or both of the profiles to statistically determine if the activity resembles that associated with malicious or unauthorized intent. The state of the account is placed in the intermediate trusted state if the activity statistically matches the unauthorized activity profile. An authentication activity enables the trusted state to be removed and for the account activity to resume.Type: GrantFiled: December 20, 2013Date of Patent: October 27, 2015Assignee: International Business Machines CorporationInventors: Nathan D. Fontenot, Jeffrey D. George, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosaker, George C. Wilson
-
Publication number: 20150180897Abstract: Embodiments of the invention relate to implementation of an intermediate trusted state of an electronic account based upon questionable account communication(s). A profile of malicious or unauthorized activity is created, and a profile of account activity is created. As account activity takes place, the activity is assessed against one or both of the profiles to statistically determine if the activity resembles that associated with malicious or unauthorized intent. The state of the account is placed in the intermediate trusted state if the activity statistically matches the unauthorized activity profile. An authentication activity enables the trusted state to be removed and for the account activity to resume.Type: ApplicationFiled: December 20, 2013Publication date: June 25, 2015Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nathan D. Fontenot, Jeffrey D. George, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosaker, George C. Wilson
-
Patent number: 9053018Abstract: A method, system, and computer program product for selecting memory pages for compression based on a population count associated with their datasets are disclosed. For example, a dataset stored in a memory page of an uncompressed memory is analyzed. Based on the analyzing, a population count associated with the dataset is identified. The population count is compared to at least one threshold. Based on the comparing, the memory page is selected or rejected for compression.Type: GrantFiled: June 29, 2012Date of Patent: June 9, 2015Assignee: International Business Machines CorporationInventors: Nathan D. Fontenot, Jeffrey David George, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosaker
-
Patent number: 8955071Abstract: A method which controls modification of passwords. An end user designates, in advance, a universe of social media contacts such as friends on social media web sites such as Facebook and LinkedIn. Contacts so identified are used as a set of potential identity verifiers. In order to enable a reset or modification of an account password, a subset of the universe is required to assert that they have verified the identity of the user requesting to reset a password. Such verification can be accomplished by varying means by those to whom an inquiry has been directed.Type: GrantFiled: October 23, 2013Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventors: Nathan Fortenot, Jeffrey D George, Ryan P Grimm, Joel H Schopp, Michael T Strosker, George C Wilson
-
Patent number: 8955070Abstract: Apparatus which control modification of passwords by implementing a procedure by which end user designates, in advance, a universe of social media contacts such as friends on social media web sites such as Facebook and Linkedln. Contacts so identified are used as a set of potential identity verifiers. In order to enable a reset or modification of an account password, a subset of the universe is required to assert that they have verified the identity of the user requesting to reset a password. Such verification can be accomplished by varying means by those to whom an inquiry has been directed. Te apparatus may be in the form of a computer system or a computer readable storage medium.Type: GrantFiled: March 12, 2013Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventors: Nathan Fontenot, Jeffrey D George, Ryan P Grimm, Joel H Schopp, Michael T Strosker, George C Wilson
-
Publication number: 20140282946Abstract: A method which controls modification of passwords. An end user designates, in advance, a universe of social media contacts such as friends on social media web sites such as Facebook and LinkedIn. Contacts so identified are used as a set of potential identity verifiers. In order to enable a reset or modification of an account password, a subset of the universe is required to assert that they have verified the identity of the user requesting to reset a password. Such verification can be accomplished by varying means by those to whom an inquiry has been directed.Type: ApplicationFiled: October 23, 2013Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Nathan Fortenot, Jeffrey D. George, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosker, George C. Wilson
-
Publication number: 20140282955Abstract: Apparatus which control modification of passwords by implementing a procedure by which end user designates, in advance, a universe of social media contacts such as friends on social media web sites such as Facebook and LinkedIn. Contacts so identified are used as a set of potential identity verifiers. In order to enable a reset or modification of an account password, a subset of the universe is required to assert that they have verified the identity of the user requesting to reset a password. Such verification can be accomplished by varying means by those to whom an inquiry has been directed. The apparatus may be in the form of a computer system or a computer readable storage medium.Type: ApplicationFiled: March 12, 2013Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Nathan D. Fontenet, Jeffrey D. George, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosker, George C. Wilson
-
Publication number: 20140244603Abstract: According to one embodiment of the present disclosure, an approach is provided in which a processor selects a page of data that is compressed by a first compression algorithm and stored in a memory block. The processor identifies a utilization amount of the compressed page of data and determines whether the utilization amount meets a utilization threshold. When the utilization amount fails to meet the utilization threshold, the processor uses a second compression algorithm to recompresses the page of data.Type: ApplicationFiled: February 25, 2013Publication date: August 28, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Christopher J. Arges, Nathan Fontenot, Jeffrey D. George, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosaker, Mark W. VanderWiele
-
Publication number: 20140244962Abstract: According to one embodiment of the present disclosure, an approach is provided in which a processor selects a page of data that is compressed by a first compression algorithm and stored in a memory block. The processor identifies a utilization amount of the compressed page of data and determines whether the utilization amount meets a utilization threshold. When the utilization amount fails to meet the utilization threshold, the processor uses a second compression algorithm to recompresses the page of data.Type: ApplicationFiled: September 12, 2013Publication date: August 28, 2014Applicant: International Business Machines CorporationInventors: Christopher J. Arges, Nathan Fontenot, Jeffrey D. George, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosaker, Mark W. VanderWiele
-
Patent number: 8788763Abstract: An apparatus and system for protecting memory of a virtual guest includes initializing a virtual guest on a host computing system. The host computing system includes a virtual machine manager that manages operation of the virtual guest. The virtual guest includes a distinct operating environment executing in a virtual operation platform provided by the virtual machine manager. The method includes receiving an allocation of run-time memory for the virtual guest, the allocation of run-time memory comprising a portion of run-time memory of the host computing system. The method includes setting, by the virtual guest, at least a portion of the allocation of run-time memory to be inaccessible by the virtual machine manager.Type: GrantFiled: May 29, 2012Date of Patent: July 22, 2014Assignee: International Business Machines CorporationInventors: Christopher J. Arges, Nathan D. Fontenot, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosaker
-
Patent number: 8782351Abstract: The method for protecting memory of a virtual guest includes initializing a virtual guest on a host computing system. The host computing system includes a virtual machine manager that manages operation of the virtual guest. The virtual guest includes a distinct operating environment executing in a virtual operation platform provided by the virtual machine manager. The method includes receiving an allocation of run-time memory for the virtual guest, the allocation of run-time memory comprising a portion of run-time memory of the host computing system. The method includes setting, by the virtual guest, at least a portion of the allocation of run-time memory to be inaccessible by the virtual machine manager.Type: GrantFiled: October 13, 2011Date of Patent: July 15, 2014Assignee: International Business Machines CorporationInventors: Christopher J. Arges, Nathan D. Fontenot, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosaker
-
Publication number: 20140006745Abstract: Memory pages are selected for compression based on the population count associated with their datasets. For example, a dataset stored in a memory page of an uncompressed memory is analyzed. Based on the analyzing, a population count associated with the dataset is calculated. The population count is compared to at least one threshold. Based on the comparing, the memory page is selected or rejected for compression.Type: ApplicationFiled: June 29, 2012Publication date: January 2, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nathan D. FONTENOT, Jeffrey David GEORGE, Ryan P. GRIMM, Joel H. SCHOPP, Michael T. STROSAKER
-
Publication number: 20130097392Abstract: An apparatus and system for protecting memory of a virtual guest includes initializing a virtual guest on a host computing system. The host computing system includes a virtual machine manager that manages operation of the virtual guest. The virtual guest includes a distinct operating environment executing in a virtual operation platform provided by the virtual machine manager. The method includes receiving an allocation of run-time memory for the virtual guest, the allocation of run-time memory comprising a portion of run-time memory of the host computing system. The method includes setting, by the virtual guest, at least a portion of the allocation of run-time memory to be inaccessible by the virtual machine manager.Type: ApplicationFiled: May 29, 2012Publication date: April 18, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Christopher J. Arges, Nathan D. Fontenot, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosaker
-
Publication number: 20130097354Abstract: The method for protecting memory of a virtual guest includes initializing a virtual guest on a host computing system. The host computing system includes a virtual machine manager that manages operation of the virtual guest. The virtual guest includes a distinct operating environment executing in a virtual operation platform provided by the virtual machine manager. The method includes receiving an allocation of run-time memory for the virtual guest, the allocation of run-time memory comprising a portion of run-time memory of the host computing system. The method includes setting, by the virtual guest, at least a portion of the allocation of run-time memory to be inaccessible by the virtual machine manager.Type: ApplicationFiled: October 13, 2011Publication date: April 18, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Christopher J. Arges, Nathan D. Fontenot, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosaker
-
Patent number: 8386726Abstract: A computer implemented method for managing an execution mode for a parallel processor is provided. A monitor identifies a first efficiency rate for a first contested resource of the parallel processor operating in a first operating mode. Responsive to identifying the first efficiency rate for the first contested resource, the monitor identifies whether the first efficiency rate for the contested resource of the parallel processor operating in the first operating mode exceeds a threshold. Responsive to identifying that the efficiency rate for the contested resource exceeds the threshold, an operation of the parallel processor is changed to a second operating mode.Type: GrantFiled: April 27, 2012Date of Patent: February 26, 2013Assignee: International Business Machines CorporationInventors: Nathan D. Fontenot, Ryan P. Grimm, Monty C. Poppe, Joel H. Schopp, Michael T. Strosaker
-
Publication number: 20120216030Abstract: A computer implemented method for managing an execution mode for a parallel processor is provided. A monitor identifies a first efficiency rate for a first contested resource of the parallel processor operating in a first operating mode. Responsive to identifying the first efficiency rate for the first contested resource, the monitor identifies whether the first efficiency rate for the contested resource of the parallel processor operating in the first operating mode exceeds a threshold. Responsive to identifying that the efficiency rate for the contested resource exceeds the threshold, an operation of the parallel processor is changed to a second operating mode.Type: ApplicationFiled: April 27, 2012Publication date: August 23, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nathan D. Fontenot, Ryan P. Grimm, Monty C. Poppe, Joel H. Schopp, Michael T. Strosaker
-
Publication number: 20110302372Abstract: A computer implemented method for managing an execution mode for a parallel processor is provided. A monitor identifies a first efficiency rate for a first contested resource of the parallel processor operating in a first operating mode. Responsive to identifying the first efficiency rate for the first contested resource, the monitor identifies whether the first efficiency rate for the contested resource of the parallel processor operating in the first operating mode exceeds a threshold. Responsive to identifying that the efficiency rate for the contested resource exceeds the threshold, an operation of the parallel processor is changed to a second operating mode.Type: ApplicationFiled: June 3, 2010Publication date: December 8, 2011Applicant: International Business Machines CorporationInventors: Nathan D Fontenot, Ryan P. Grimm, Monty C. Poppe, Joel H. Schopp, Michael T. Strosaker
-
Publication number: 20080256534Abstract: The present invention relates to a method for the customization of virtual machine images. The method comprises identifying and retrieving a virtual machine image template. A customized virtual machine image is created from the virtual machine image template. The customized virtual machine image template being created by identifying at least one file-system or memory image that is associated with the virtual machine image template, identifying within the at least one file-system or memory image at least one data set, wherein the at least one data set comprises metadata. The metadata contains information detailing the required execution context customization aspects for at least one specified image subset of the virtual machine. Execution context-specific information that is required to customize the image subset of the virtual machine is retrieved. Further, the image subset of the virtual machine is modified in accordance with the retrieved execution context-specific information.Type: ApplicationFiled: April 12, 2007Publication date: October 16, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David M. Chess, Sean L. Dague, Tamar Eilam, Ronald T. Goering, Ryan P. Grimm, James E. Hanson, Giovanni Pacifici, Benny Rochwerger, Hidayatullah H. Shaikh, Ian N. Whalley, Jian Yin