Patents by Inventor Ryan P. Grimm

Ryan P. Grimm has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9852056
    Abstract: According to one embodiment of the present disclosure, an approach is provided in which a processor selects a page of data that is compressed by a first compression algorithm and stored in a memory block. The processor identifies a utilization amount of the compressed page of data and determines whether the utilization amount meets a utilization threshold. When the utilization amount fails to meet the utilization threshold, the processor uses a second compression algorithm to recompresses the page of data.
    Type: Grant
    Filed: September 12, 2013
    Date of Patent: December 26, 2017
    Assignee: International Business Machines Corporation
    Inventors: Christopher J. Arges, Nathan Fontenot, Jeffrey D. George, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosaker, Mark W. VanderWiele
  • Patent number: 9852055
    Abstract: According to one embodiment of the present disclosure, an approach is provided in which a processor selects a page of data that is compressed by a first compression algorithm and stored in a memory block. The processor identifies a utilization amount of the compressed page of data and determines whether the utilization amount meets a utilization threshold. When the utilization amount fails to meet the utilization threshold, the processor uses a second compression algorithm to recompresses the page of data.
    Type: Grant
    Filed: February 25, 2013
    Date of Patent: December 26, 2017
    Assignee: International Business Machines Corporation
    Inventors: Christopher J. Arges, Nathan Fontenot, Jeffrey D. George, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosaker, Mark W. VanderWiele
  • Patent number: 9172719
    Abstract: Embodiments of the invention relate to implementation of an intermediate trusted state of an electronic account based upon questionable account communication(s). A profile of malicious or unauthorized activity is created, and a profile of account activity is created. As account activity takes place, the activity is assessed against one or both of the profiles to statistically determine if the activity resembles that associated with malicious or unauthorized intent. The state of the account is placed in the intermediate trusted state if the activity statistically matches the unauthorized activity profile. An authentication activity enables the trusted state to be removed and for the account activity to resume.
    Type: Grant
    Filed: December 20, 2013
    Date of Patent: October 27, 2015
    Assignee: International Business Machines Corporation
    Inventors: Nathan D. Fontenot, Jeffrey D. George, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosaker, George C. Wilson
  • Publication number: 20150180897
    Abstract: Embodiments of the invention relate to implementation of an intermediate trusted state of an electronic account based upon questionable account communication(s). A profile of malicious or unauthorized activity is created, and a profile of account activity is created. As account activity takes place, the activity is assessed against one or both of the profiles to statistically determine if the activity resembles that associated with malicious or unauthorized intent. The state of the account is placed in the intermediate trusted state if the activity statistically matches the unauthorized activity profile. An authentication activity enables the trusted state to be removed and for the account activity to resume.
    Type: Application
    Filed: December 20, 2013
    Publication date: June 25, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Nathan D. Fontenot, Jeffrey D. George, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosaker, George C. Wilson
  • Patent number: 9053018
    Abstract: A method, system, and computer program product for selecting memory pages for compression based on a population count associated with their datasets are disclosed. For example, a dataset stored in a memory page of an uncompressed memory is analyzed. Based on the analyzing, a population count associated with the dataset is identified. The population count is compared to at least one threshold. Based on the comparing, the memory page is selected or rejected for compression.
    Type: Grant
    Filed: June 29, 2012
    Date of Patent: June 9, 2015
    Assignee: International Business Machines Corporation
    Inventors: Nathan D. Fontenot, Jeffrey David George, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosaker
  • Patent number: 8955071
    Abstract: A method which controls modification of passwords. An end user designates, in advance, a universe of social media contacts such as friends on social media web sites such as Facebook and LinkedIn. Contacts so identified are used as a set of potential identity verifiers. In order to enable a reset or modification of an account password, a subset of the universe is required to assert that they have verified the identity of the user requesting to reset a password. Such verification can be accomplished by varying means by those to whom an inquiry has been directed.
    Type: Grant
    Filed: October 23, 2013
    Date of Patent: February 10, 2015
    Assignee: International Business Machines Corporation
    Inventors: Nathan Fortenot, Jeffrey D George, Ryan P Grimm, Joel H Schopp, Michael T Strosker, George C Wilson
  • Patent number: 8955070
    Abstract: Apparatus which control modification of passwords by implementing a procedure by which end user designates, in advance, a universe of social media contacts such as friends on social media web sites such as Facebook and Linkedln. Contacts so identified are used as a set of potential identity verifiers. In order to enable a reset or modification of an account password, a subset of the universe is required to assert that they have verified the identity of the user requesting to reset a password. Such verification can be accomplished by varying means by those to whom an inquiry has been directed. Te apparatus may be in the form of a computer system or a computer readable storage medium.
    Type: Grant
    Filed: March 12, 2013
    Date of Patent: February 10, 2015
    Assignee: International Business Machines Corporation
    Inventors: Nathan Fontenot, Jeffrey D George, Ryan P Grimm, Joel H Schopp, Michael T Strosker, George C Wilson
  • Publication number: 20140282946
    Abstract: A method which controls modification of passwords. An end user designates, in advance, a universe of social media contacts such as friends on social media web sites such as Facebook and LinkedIn. Contacts so identified are used as a set of potential identity verifiers. In order to enable a reset or modification of an account password, a subset of the universe is required to assert that they have verified the identity of the user requesting to reset a password. Such verification can be accomplished by varying means by those to whom an inquiry has been directed.
    Type: Application
    Filed: October 23, 2013
    Publication date: September 18, 2014
    Applicant: International Business Machines Corporation
    Inventors: Nathan Fortenot, Jeffrey D. George, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosker, George C. Wilson
  • Publication number: 20140282955
    Abstract: Apparatus which control modification of passwords by implementing a procedure by which end user designates, in advance, a universe of social media contacts such as friends on social media web sites such as Facebook and LinkedIn. Contacts so identified are used as a set of potential identity verifiers. In order to enable a reset or modification of an account password, a subset of the universe is required to assert that they have verified the identity of the user requesting to reset a password. Such verification can be accomplished by varying means by those to whom an inquiry has been directed. The apparatus may be in the form of a computer system or a computer readable storage medium.
    Type: Application
    Filed: March 12, 2013
    Publication date: September 18, 2014
    Applicant: International Business Machines Corporation
    Inventors: Nathan D. Fontenet, Jeffrey D. George, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosker, George C. Wilson
  • Publication number: 20140244603
    Abstract: According to one embodiment of the present disclosure, an approach is provided in which a processor selects a page of data that is compressed by a first compression algorithm and stored in a memory block. The processor identifies a utilization amount of the compressed page of data and determines whether the utilization amount meets a utilization threshold. When the utilization amount fails to meet the utilization threshold, the processor uses a second compression algorithm to recompresses the page of data.
    Type: Application
    Filed: February 25, 2013
    Publication date: August 28, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Christopher J. Arges, Nathan Fontenot, Jeffrey D. George, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosaker, Mark W. VanderWiele
  • Publication number: 20140244962
    Abstract: According to one embodiment of the present disclosure, an approach is provided in which a processor selects a page of data that is compressed by a first compression algorithm and stored in a memory block. The processor identifies a utilization amount of the compressed page of data and determines whether the utilization amount meets a utilization threshold. When the utilization amount fails to meet the utilization threshold, the processor uses a second compression algorithm to recompresses the page of data.
    Type: Application
    Filed: September 12, 2013
    Publication date: August 28, 2014
    Applicant: International Business Machines Corporation
    Inventors: Christopher J. Arges, Nathan Fontenot, Jeffrey D. George, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosaker, Mark W. VanderWiele
  • Patent number: 8788763
    Abstract: An apparatus and system for protecting memory of a virtual guest includes initializing a virtual guest on a host computing system. The host computing system includes a virtual machine manager that manages operation of the virtual guest. The virtual guest includes a distinct operating environment executing in a virtual operation platform provided by the virtual machine manager. The method includes receiving an allocation of run-time memory for the virtual guest, the allocation of run-time memory comprising a portion of run-time memory of the host computing system. The method includes setting, by the virtual guest, at least a portion of the allocation of run-time memory to be inaccessible by the virtual machine manager.
    Type: Grant
    Filed: May 29, 2012
    Date of Patent: July 22, 2014
    Assignee: International Business Machines Corporation
    Inventors: Christopher J. Arges, Nathan D. Fontenot, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosaker
  • Patent number: 8782351
    Abstract: The method for protecting memory of a virtual guest includes initializing a virtual guest on a host computing system. The host computing system includes a virtual machine manager that manages operation of the virtual guest. The virtual guest includes a distinct operating environment executing in a virtual operation platform provided by the virtual machine manager. The method includes receiving an allocation of run-time memory for the virtual guest, the allocation of run-time memory comprising a portion of run-time memory of the host computing system. The method includes setting, by the virtual guest, at least a portion of the allocation of run-time memory to be inaccessible by the virtual machine manager.
    Type: Grant
    Filed: October 13, 2011
    Date of Patent: July 15, 2014
    Assignee: International Business Machines Corporation
    Inventors: Christopher J. Arges, Nathan D. Fontenot, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosaker
  • Publication number: 20140006745
    Abstract: Memory pages are selected for compression based on the population count associated with their datasets. For example, a dataset stored in a memory page of an uncompressed memory is analyzed. Based on the analyzing, a population count associated with the dataset is calculated. The population count is compared to at least one threshold. Based on the comparing, the memory page is selected or rejected for compression.
    Type: Application
    Filed: June 29, 2012
    Publication date: January 2, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Nathan D. FONTENOT, Jeffrey David GEORGE, Ryan P. GRIMM, Joel H. SCHOPP, Michael T. STROSAKER
  • Publication number: 20130097392
    Abstract: An apparatus and system for protecting memory of a virtual guest includes initializing a virtual guest on a host computing system. The host computing system includes a virtual machine manager that manages operation of the virtual guest. The virtual guest includes a distinct operating environment executing in a virtual operation platform provided by the virtual machine manager. The method includes receiving an allocation of run-time memory for the virtual guest, the allocation of run-time memory comprising a portion of run-time memory of the host computing system. The method includes setting, by the virtual guest, at least a portion of the allocation of run-time memory to be inaccessible by the virtual machine manager.
    Type: Application
    Filed: May 29, 2012
    Publication date: April 18, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Christopher J. Arges, Nathan D. Fontenot, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosaker
  • Publication number: 20130097354
    Abstract: The method for protecting memory of a virtual guest includes initializing a virtual guest on a host computing system. The host computing system includes a virtual machine manager that manages operation of the virtual guest. The virtual guest includes a distinct operating environment executing in a virtual operation platform provided by the virtual machine manager. The method includes receiving an allocation of run-time memory for the virtual guest, the allocation of run-time memory comprising a portion of run-time memory of the host computing system. The method includes setting, by the virtual guest, at least a portion of the allocation of run-time memory to be inaccessible by the virtual machine manager.
    Type: Application
    Filed: October 13, 2011
    Publication date: April 18, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Christopher J. Arges, Nathan D. Fontenot, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosaker
  • Patent number: 8386726
    Abstract: A computer implemented method for managing an execution mode for a parallel processor is provided. A monitor identifies a first efficiency rate for a first contested resource of the parallel processor operating in a first operating mode. Responsive to identifying the first efficiency rate for the first contested resource, the monitor identifies whether the first efficiency rate for the contested resource of the parallel processor operating in the first operating mode exceeds a threshold. Responsive to identifying that the efficiency rate for the contested resource exceeds the threshold, an operation of the parallel processor is changed to a second operating mode.
    Type: Grant
    Filed: April 27, 2012
    Date of Patent: February 26, 2013
    Assignee: International Business Machines Corporation
    Inventors: Nathan D. Fontenot, Ryan P. Grimm, Monty C. Poppe, Joel H. Schopp, Michael T. Strosaker
  • Publication number: 20120216030
    Abstract: A computer implemented method for managing an execution mode for a parallel processor is provided. A monitor identifies a first efficiency rate for a first contested resource of the parallel processor operating in a first operating mode. Responsive to identifying the first efficiency rate for the first contested resource, the monitor identifies whether the first efficiency rate for the contested resource of the parallel processor operating in the first operating mode exceeds a threshold. Responsive to identifying that the efficiency rate for the contested resource exceeds the threshold, an operation of the parallel processor is changed to a second operating mode.
    Type: Application
    Filed: April 27, 2012
    Publication date: August 23, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Nathan D. Fontenot, Ryan P. Grimm, Monty C. Poppe, Joel H. Schopp, Michael T. Strosaker
  • Publication number: 20110302372
    Abstract: A computer implemented method for managing an execution mode for a parallel processor is provided. A monitor identifies a first efficiency rate for a first contested resource of the parallel processor operating in a first operating mode. Responsive to identifying the first efficiency rate for the first contested resource, the monitor identifies whether the first efficiency rate for the contested resource of the parallel processor operating in the first operating mode exceeds a threshold. Responsive to identifying that the efficiency rate for the contested resource exceeds the threshold, an operation of the parallel processor is changed to a second operating mode.
    Type: Application
    Filed: June 3, 2010
    Publication date: December 8, 2011
    Applicant: International Business Machines Corporation
    Inventors: Nathan D Fontenot, Ryan P. Grimm, Monty C. Poppe, Joel H. Schopp, Michael T. Strosaker
  • Publication number: 20080256534
    Abstract: The present invention relates to a method for the customization of virtual machine images. The method comprises identifying and retrieving a virtual machine image template. A customized virtual machine image is created from the virtual machine image template. The customized virtual machine image template being created by identifying at least one file-system or memory image that is associated with the virtual machine image template, identifying within the at least one file-system or memory image at least one data set, wherein the at least one data set comprises metadata. The metadata contains information detailing the required execution context customization aspects for at least one specified image subset of the virtual machine. Execution context-specific information that is required to customize the image subset of the virtual machine is retrieved. Further, the image subset of the virtual machine is modified in accordance with the retrieved execution context-specific information.
    Type: Application
    Filed: April 12, 2007
    Publication date: October 16, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David M. Chess, Sean L. Dague, Tamar Eilam, Ronald T. Goering, Ryan P. Grimm, James E. Hanson, Giovanni Pacifici, Benny Rochwerger, Hidayatullah H. Shaikh, Ian N. Whalley, Jian Yin