Patents by Inventor Scott A. Piper

Scott A. Piper has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11934544
    Abstract: Target data may be associated with a location requirement established by a data owner. A data access module may be used to attempt access to the target data. Location requirement and provenance metadata associated with the target data are obtained. The provenance metadata must be validated, and evidence only approved data access locations identified in the location requirement. A current location of a computing device attempting access to the target data must also meet the location requirement. The computing device is allowed to access the target data only in response to the current location and each location identified in the provenance metadata meeting the location requirement. The provenance metadata is updated to include a new record including the current data access location.
    Type: Grant
    Filed: March 17, 2022
    Date of Patent: March 19, 2024
    Inventors: Pierre Mouallem, William Laurence Jaeger, Scott A. Piper, Michael Gerard Demeter
  • Publication number: 20240048568
    Abstract: A method for threat intelligence in a peer group includes identifying, at a first node in a network, a potential security threat. The first node is one of a plurality of nodes in a peer group and each node in the peer group has a level of trust for each node in the peer group. The method includes receiving a security communication from one or more other nodes of the peer group. Each security communication indicates that the node of the peer group sending the security communication has identified a potential security threat similar to the potential security threat identified by the first node. The method includes taking a corrective action to neutralize the potential security threat in response to reaching a consensus with the other nodes of the peer group that sent a security communication regarding the identified potential security threats that are similar.
    Type: Application
    Filed: August 3, 2022
    Publication date: February 8, 2024
    Inventors: Pierre Mouallem, William Laurence Jaeger, Scott A. Piper, Michael Gerard Demeter
  • Patent number: 11804970
    Abstract: Baseboard management controller (‘BMC’) group administration includes: receiving, by a member BMC from a leader BMC, a leader certificate and a request to join a group of the leader BMC, where the request is signed by the leader BMC and the leader certificate is signed by a certificate authority; authenticating, by the member BMC, the leader certificate and the request; and sending, by the member BMC, an acknowledgement to the leader BMC to join the leader BMC's group.
    Type: Grant
    Filed: October 15, 2021
    Date of Patent: October 31, 2023
    Assignee: LENOVO GLOBAL TECHNOLOGY (UNITED STATES) INC.
    Inventors: Fred Allison Bower, III, Ming Lei, Michael Gerard Demeter, Scott A. Piper
  • Publication number: 20230297701
    Abstract: Target data may be associated with a location requirement established by a data owner. A data access module may be used to attempt access to the target data. Location requirement and provenance metadata associated with the target data are obtained. The provenance metadata must be validated, and evidence only approved data access locations identified in the location requirement. A current location of a computing device attempting access to the target data must also meet the location requirement. The computing device is allowed to access the target data only in response to the current location and each location identified in the provenance metadata meeting the location requirement. The provenance metadata is updated to include a new record including the current data access location.
    Type: Application
    Filed: March 17, 2022
    Publication date: September 21, 2023
    Inventors: Pierre Mouallem, William Laurence Jaeger, Scott A. Piper, Michael Gerard Demeter
  • Publication number: 20230118344
    Abstract: Baseboard management controller (‘BMC’) group administration includes: receiving, by a member BMC from a leader BMC, a leader certificate and a request to join a group of the leader BMC, where the request is signed by the leader BMC and the leader certificate is signed by a certificate authority; authenticating, by the member BMC, the leader certificate and the request; and sending, by the member BMC, an acknowledgement to the leader BMC to join the leader BMC's group.
    Type: Application
    Filed: October 15, 2021
    Publication date: April 20, 2023
    Inventors: FRED ALLISON BOWER, III, MING LEI, MICHAEL GERARD DEMETER, SCOTT A. PIPER
  • Patent number: 10984617
    Abstract: The present disclosure provides a computing apparatus and a method for securing access to the computing device. The computing apparatus comprises a housing, a data storage device disposed in the housing, a cover movably coupled to the housing to secure the data storage device in the housing, and a controller coupled to the data storage device. The controller is configured to grant access to the data storage device upon detecting an authorized attempt of opening the cover and to deny access to the data storage device upon detecting an unauthorized attempt of opening the cover.
    Type: Grant
    Filed: November 22, 2019
    Date of Patent: April 20, 2021
    Assignee: LENOVO Enterprise Solutions (Singapore) PTE. LTD
    Inventors: Morgan Wu, Makoto Ono, Thou Vun Pang, Yueh-Ku Chung, Scott A. Piper, Hsiang Lung Yu
  • Publication number: 20200168016
    Abstract: The present disclosure provides a computing apparatus and a method for securing access to the computing device. The computing apparatus comprises a housing, a data storage device disposed in the housing, a cover movably coupled to the housing to secure the data storage device in the housing, and a controller coupled to the data storage device. The controller is configured to grant access to the data storage device upon detecting an authorized attempt of opening the cover and to deny access to the data storage device upon detecting an unauthorized attempt of opening the cover.
    Type: Application
    Filed: November 22, 2019
    Publication date: May 28, 2020
    Inventors: MORGAN WU, MAKOTO ONO, THOU VUN PANG, YUEH-KU CHUNG, SCOTT A. PIPER, HSIANG LUNG YU
  • Patent number: 10097613
    Abstract: Systems and methods for enhancing the performance of resource state polling are disclosed. According to an aspect, a method includes using at least one processor and memory for transmitting a request and a baseline timestamp for an updated resource state based on a current resource state, wherein the baseline timestamp defines a time period for the updated resource state. The method also includes determining the updated resource state based on the baseline timestamp and the current resource state. The method also includes providing the determined updated resource state and current timestamp of the determined updated resource state. Additionally, the method includes setting a current baseline resource state based on a current timestamp of the determined updated resource state.
    Type: Grant
    Filed: September 24, 2015
    Date of Patent: October 9, 2018
    Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
    Inventor: Scott A. Piper
  • Publication number: 20170093951
    Abstract: Systems and methods for enhancing the performance of resource state polling are disclosed. According to an aspect, a method includes using at least one processor and memory for transmitting a request and a baseline timestamp for an updated resource state based on a current resource state, wherein the baseline timestamp defines a time period for the updated resource state. The method also includes determining the updated resource state based on the baseline timestamp and the current resource state. The method also includes providing the determined updated resource state and current timestamp of the determined updated resource state. Additionally, the method includes setting a current baseline resource state based on a current timestamp of the determined updated resource state.
    Type: Application
    Filed: September 24, 2015
    Publication date: March 30, 2017
    Inventor: Scott A. Piper
  • Patent number: 9323317
    Abstract: A method of saving power in a computing system having a plurality of dial in-line memory modules (DIMMs) and employing a suspend-to-RAM sleep mode includes, when entering suspend-to-RAM sleep mode, consolidating selected information into a subset of DIMMs, and turning off power to all other DIMMs. A DIMM power rail may be coupled to each of the DIMMs, the DIMM power rail being configured to selectively have power being supplied to respective DIMMs turned off in response to enable/disable logic signals.
    Type: Grant
    Filed: December 12, 2012
    Date of Patent: April 26, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Canturk Isci, Jeffrey O. Kephart, Suzanne K. McIntosh, Scott A. Piper, Robert R. Wolford
  • Publication number: 20140164804
    Abstract: A method of saving power in a computing system having a plurality of dual in-line memory modules (DIMMs) and employing a suspend-to-RAM sleep mode includes, when entering suspend-to-RAM sleep mode, consolidating selected information into a subset of DIMMs, and turning off power to all other DIMMs. A DIMM power rail may be coupled to each of the DIMMs, the DIMM power rail being configured to selectively have power being supplied to respective DIMMs turned off in response to enable/disable logic signals.
    Type: Application
    Filed: September 18, 2013
    Publication date: June 12, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: CANTURK ISCI, JEFFREY O. KEPHART, SUZANNE K. McINTOSH, SCOTT A. PIPER, ROBERT R. WOLFORD
  • Patent number: 8694810
    Abstract: One embodiment provides a power management method for servers in a data center. A group of servers is selected, and the total power allocated to a group of servers is limited to within a group power budget. A separate server power allocation is individually requested for each of a plurality of the servers. Within the constraints of the group power budget, the requested server power allocations are selectively granted for a specified magnitude and duration. The granted server power allocations are also selectively renewed, either automatically or upon request of the servers. Each server that has not received a renewed server power allocation from a group power management entity upon the expiration of the specified duration automatically reduces its own power consumption, such as by the server powering itself off.
    Type: Grant
    Filed: September 22, 2010
    Date of Patent: April 8, 2014
    Assignee: International Business Machines Corporation
    Inventors: Vikas Ahluwalia, Scott A. Piper, Jeffery J. Van Heuklon
  • Patent number: 8694827
    Abstract: A method of managing the workload in a computer system having one or more semi-redundant hardware components is provided. The method comprises detecting loss or degradation of the level of performance of one or more of the semi-redundant hardware components, identifying hardware components affected by the loss or degradation, migrating a critical job from an affected hardware component to an unaffected hardware component, and performing less-critical jobs on an affected hardware component. Loss or degradation of the semi-redundant component reduces the capacity of affected hardware components in the computer system without entirely disabling the computer system. Jobs identified as critical run on hardware components having the most capacity and reliability, while less-critical jobs use the remaining capacity of affected hardware components. Examples of semi-redundant hardware components include a memory module, CPU core, Ethernet port, power supply, fan, disk drive, and an input output port.
    Type: Grant
    Filed: July 3, 2012
    Date of Patent: April 8, 2014
    Assignee: International Business Machines Corporation
    Inventors: Fred A. Bower, III, Scott A. Piper, Gregory B. Pruett
  • Patent number: 8589728
    Abstract: A computer program product includes computer usable program code embodied on a computer usable storage medium for performing a method of managing the workload in a computer system having one or more semi-redundant hardware components are provided. The method comprises detecting loss or degradation of the level of performance of one or more of the semi-redundant hardware components, identifying hardware components that are affected by the loss or degradation of the one or more semi-redundant components, migrating a critical job from an affected hardware component to an unaffected hardware component, and performing less-critical jobs on an affected hardware component. Loss or degradation of the semi-redundant component reduces the capacity of affected hardware components in the computer system without entirely disabling the computer system. Optionally, the semi-redundant hardware component may be selected from a memory module, CPU core, Ethernet port, power supply, fan, disk drive, and an input output port.
    Type: Grant
    Filed: September 20, 2010
    Date of Patent: November 19, 2013
    Assignee: International Business Machines Corporation
    Inventors: Fred A. Bower, III, Scott A. Piper, Gregory B. Pruett
  • Patent number: 8452093
    Abstract: A histogram has ranges, a value for each range, and a time value. A pattern is generated, having a zero value for each range having a zero value, and a one value for each range having a non-zero value. Any non-zero values of the ranges are compressed into a compressed value. The pattern and the time value match or do not match any given entry of a pattern table having a number of entries, each of which has an index value, a time range, and a pattern. Where the pattern and the time value do not match any given entry of the pattern table, a new entry is added to the pattern table, and is considered the given entry. An entry is then added to a histogram table. This entry has the time value, the index value of the given entry of the pattern table, and the compressed value.
    Type: Grant
    Filed: March 31, 2012
    Date of Patent: May 28, 2013
    Assignee: International Business Machines Corporation
    Inventor: Scott A. Piper
  • Publication number: 20120290874
    Abstract: A method of managing the workload in a computer system having one or more semi-redundant hardware components is provided. The method comprises detecting loss or degradation of the level of performance of one or more of the semi-redundant hardware components, identifying hardware components affected by the loss or degradation, migrating a critical job from an affected hardware component to an unaffected hardware component, and performing less-critical jobs on an affected hardware component. Loss or degradation of the semi-redundant component reduces the capacity of affected hardware components in the computer system without entirely disabling the computer system. Jobs identified as critical run on hardware components having the most capacity and reliability, while less-critical jobs use the remaining capacity of affected hardware components. Examples of semi-redundant hardware components include a memory module, CPU core, Ethernet port, power supply, fan, disk drive, and an input output port.
    Type: Application
    Filed: July 3, 2012
    Publication date: November 15, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Fred A. Bower, III, Scott A. Piper, Gregory B. Pruett
  • Patent number: 8266232
    Abstract: Commands are processed by hardware within a virtual client computing environment, such as graphics-related commands processed by graphics hardware. A server computing device includes graphics hardware, a virtual client computing environment, and a server computing environment. The graphics hardware processes graphics-related commands into responses. The virtual client computing environment includes an encoding application that issues the commands. The server computing environment includes a decoding application. The encoding application includes a first thread that receives the commands and places them onto a first queue. The encoding application includes a second thread that receives the responses from a second queue and communicates the responses to a remote display device.
    Type: Grant
    Filed: October 15, 2005
    Date of Patent: September 11, 2012
    Assignee: International Business Machines Corporation
    Inventors: Scott A. Piper, Vikas Ahluwalia, Kam-Lun Ng, Paul R. Shaw, Vinod Menon
  • Publication number: 20120189201
    Abstract: A histogram has ranges, a value for each range, and a time value. A pattern is generated, having a zero value for each range having a zero value, and a one value for each range having a non-zero value. Any non-zero values of the ranges are compressed into a compressed value. The pattern and the time value match or do not match any given entry of a pattern table having a number of entries, each of which has an index value, a time range, and a pattern. Where the pattern and the time value do not match any given entry of the pattern table, a new entry is added to the pattern table, and is considered the given entry. An entry is then added to a histogram table. This entry has the time value, the index value of the given entry of the pattern table, and the compressed value.
    Type: Application
    Filed: March 31, 2012
    Publication date: July 26, 2012
    Inventor: Scott A. Piper
  • Patent number: 8189912
    Abstract: A histogram has ranges, a value for each range, and a time value. A pattern is generated, having a zero value for each range having a zero value, and a one value for each range having a non-zero value. Any non-zero values of the ranges are compressed into a compressed value. The pattern and the time value match or do not match any given entry of a pattern table having a number of entries, each of which has an index value, a time range, and a pattern. Where the pattern and the time value do not match any given entry of the pattern table, a new entry is added to the pattern table, and is considered the given entry. An entry is then added to a histogram table. This entry has the time value, the index value of the given entry of the pattern table, and the compressed value.
    Type: Grant
    Filed: November 24, 2007
    Date of Patent: May 29, 2012
    Assignee: International Business Machines Corporation
    Inventor: Scott A. Piper
  • Publication number: 20120072765
    Abstract: A computer program product and method of managing the workload in a computer system having one or more semi-redundant hardware components are provided. The method comprises detecting loss or degradation of the level of performance of one or more of the semi-redundant hardware components, identifying hardware components that are affected by the loss or degradation of the one or more semi-redundant components, migrating a critical job from an affected hardware component to an unaffected hardware component, and performing less-critical jobs on an affected hardware component. Loss or degradation of the semi-redundant component reduces the capacity of affected hardware components in the computer system without entirely disabling the computer system. Jobs identified as being critical are run on hardware components having the most capacity and reliability, while allowing less-critical jobs to make use of the remaining capacity of affected hardware components.
    Type: Application
    Filed: September 20, 2010
    Publication date: March 22, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Fred A. Bower, III, Scott A. Piper, Gregory B. Pruett