Patents by Inventor Scott A. Piper
Scott A. Piper has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11934544Abstract: Target data may be associated with a location requirement established by a data owner. A data access module may be used to attempt access to the target data. Location requirement and provenance metadata associated with the target data are obtained. The provenance metadata must be validated, and evidence only approved data access locations identified in the location requirement. A current location of a computing device attempting access to the target data must also meet the location requirement. The computing device is allowed to access the target data only in response to the current location and each location identified in the provenance metadata meeting the location requirement. The provenance metadata is updated to include a new record including the current data access location.Type: GrantFiled: March 17, 2022Date of Patent: March 19, 2024Inventors: Pierre Mouallem, William Laurence Jaeger, Scott A. Piper, Michael Gerard Demeter
-
Publication number: 20240048568Abstract: A method for threat intelligence in a peer group includes identifying, at a first node in a network, a potential security threat. The first node is one of a plurality of nodes in a peer group and each node in the peer group has a level of trust for each node in the peer group. The method includes receiving a security communication from one or more other nodes of the peer group. Each security communication indicates that the node of the peer group sending the security communication has identified a potential security threat similar to the potential security threat identified by the first node. The method includes taking a corrective action to neutralize the potential security threat in response to reaching a consensus with the other nodes of the peer group that sent a security communication regarding the identified potential security threats that are similar.Type: ApplicationFiled: August 3, 2022Publication date: February 8, 2024Inventors: Pierre Mouallem, William Laurence Jaeger, Scott A. Piper, Michael Gerard Demeter
-
Patent number: 11804970Abstract: Baseboard management controller (‘BMC’) group administration includes: receiving, by a member BMC from a leader BMC, a leader certificate and a request to join a group of the leader BMC, where the request is signed by the leader BMC and the leader certificate is signed by a certificate authority; authenticating, by the member BMC, the leader certificate and the request; and sending, by the member BMC, an acknowledgement to the leader BMC to join the leader BMC's group.Type: GrantFiled: October 15, 2021Date of Patent: October 31, 2023Assignee: LENOVO GLOBAL TECHNOLOGY (UNITED STATES) INC.Inventors: Fred Allison Bower, III, Ming Lei, Michael Gerard Demeter, Scott A. Piper
-
Publication number: 20230297701Abstract: Target data may be associated with a location requirement established by a data owner. A data access module may be used to attempt access to the target data. Location requirement and provenance metadata associated with the target data are obtained. The provenance metadata must be validated, and evidence only approved data access locations identified in the location requirement. A current location of a computing device attempting access to the target data must also meet the location requirement. The computing device is allowed to access the target data only in response to the current location and each location identified in the provenance metadata meeting the location requirement. The provenance metadata is updated to include a new record including the current data access location.Type: ApplicationFiled: March 17, 2022Publication date: September 21, 2023Inventors: Pierre Mouallem, William Laurence Jaeger, Scott A. Piper, Michael Gerard Demeter
-
Publication number: 20230118344Abstract: Baseboard management controller (‘BMC’) group administration includes: receiving, by a member BMC from a leader BMC, a leader certificate and a request to join a group of the leader BMC, where the request is signed by the leader BMC and the leader certificate is signed by a certificate authority; authenticating, by the member BMC, the leader certificate and the request; and sending, by the member BMC, an acknowledgement to the leader BMC to join the leader BMC's group.Type: ApplicationFiled: October 15, 2021Publication date: April 20, 2023Inventors: FRED ALLISON BOWER, III, MING LEI, MICHAEL GERARD DEMETER, SCOTT A. PIPER
-
Patent number: 10984617Abstract: The present disclosure provides a computing apparatus and a method for securing access to the computing device. The computing apparatus comprises a housing, a data storage device disposed in the housing, a cover movably coupled to the housing to secure the data storage device in the housing, and a controller coupled to the data storage device. The controller is configured to grant access to the data storage device upon detecting an authorized attempt of opening the cover and to deny access to the data storage device upon detecting an unauthorized attempt of opening the cover.Type: GrantFiled: November 22, 2019Date of Patent: April 20, 2021Assignee: LENOVO Enterprise Solutions (Singapore) PTE. LTDInventors: Morgan Wu, Makoto Ono, Thou Vun Pang, Yueh-Ku Chung, Scott A. Piper, Hsiang Lung Yu
-
Publication number: 20200168016Abstract: The present disclosure provides a computing apparatus and a method for securing access to the computing device. The computing apparatus comprises a housing, a data storage device disposed in the housing, a cover movably coupled to the housing to secure the data storage device in the housing, and a controller coupled to the data storage device. The controller is configured to grant access to the data storage device upon detecting an authorized attempt of opening the cover and to deny access to the data storage device upon detecting an unauthorized attempt of opening the cover.Type: ApplicationFiled: November 22, 2019Publication date: May 28, 2020Inventors: MORGAN WU, MAKOTO ONO, THOU VUN PANG, YUEH-KU CHUNG, SCOTT A. PIPER, HSIANG LUNG YU
-
Patent number: 10097613Abstract: Systems and methods for enhancing the performance of resource state polling are disclosed. According to an aspect, a method includes using at least one processor and memory for transmitting a request and a baseline timestamp for an updated resource state based on a current resource state, wherein the baseline timestamp defines a time period for the updated resource state. The method also includes determining the updated resource state based on the baseline timestamp and the current resource state. The method also includes providing the determined updated resource state and current timestamp of the determined updated resource state. Additionally, the method includes setting a current baseline resource state based on a current timestamp of the determined updated resource state.Type: GrantFiled: September 24, 2015Date of Patent: October 9, 2018Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.Inventor: Scott A. Piper
-
Publication number: 20170093951Abstract: Systems and methods for enhancing the performance of resource state polling are disclosed. According to an aspect, a method includes using at least one processor and memory for transmitting a request and a baseline timestamp for an updated resource state based on a current resource state, wherein the baseline timestamp defines a time period for the updated resource state. The method also includes determining the updated resource state based on the baseline timestamp and the current resource state. The method also includes providing the determined updated resource state and current timestamp of the determined updated resource state. Additionally, the method includes setting a current baseline resource state based on a current timestamp of the determined updated resource state.Type: ApplicationFiled: September 24, 2015Publication date: March 30, 2017Inventor: Scott A. Piper
-
Patent number: 9323317Abstract: A method of saving power in a computing system having a plurality of dial in-line memory modules (DIMMs) and employing a suspend-to-RAM sleep mode includes, when entering suspend-to-RAM sleep mode, consolidating selected information into a subset of DIMMs, and turning off power to all other DIMMs. A DIMM power rail may be coupled to each of the DIMMs, the DIMM power rail being configured to selectively have power being supplied to respective DIMMs turned off in response to enable/disable logic signals.Type: GrantFiled: December 12, 2012Date of Patent: April 26, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Canturk Isci, Jeffrey O. Kephart, Suzanne K. McIntosh, Scott A. Piper, Robert R. Wolford
-
Publication number: 20140164804Abstract: A method of saving power in a computing system having a plurality of dual in-line memory modules (DIMMs) and employing a suspend-to-RAM sleep mode includes, when entering suspend-to-RAM sleep mode, consolidating selected information into a subset of DIMMs, and turning off power to all other DIMMs. A DIMM power rail may be coupled to each of the DIMMs, the DIMM power rail being configured to selectively have power being supplied to respective DIMMs turned off in response to enable/disable logic signals.Type: ApplicationFiled: September 18, 2013Publication date: June 12, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: CANTURK ISCI, JEFFREY O. KEPHART, SUZANNE K. McINTOSH, SCOTT A. PIPER, ROBERT R. WOLFORD
-
Patent number: 8694810Abstract: One embodiment provides a power management method for servers in a data center. A group of servers is selected, and the total power allocated to a group of servers is limited to within a group power budget. A separate server power allocation is individually requested for each of a plurality of the servers. Within the constraints of the group power budget, the requested server power allocations are selectively granted for a specified magnitude and duration. The granted server power allocations are also selectively renewed, either automatically or upon request of the servers. Each server that has not received a renewed server power allocation from a group power management entity upon the expiration of the specified duration automatically reduces its own power consumption, such as by the server powering itself off.Type: GrantFiled: September 22, 2010Date of Patent: April 8, 2014Assignee: International Business Machines CorporationInventors: Vikas Ahluwalia, Scott A. Piper, Jeffery J. Van Heuklon
-
Patent number: 8694827Abstract: A method of managing the workload in a computer system having one or more semi-redundant hardware components is provided. The method comprises detecting loss or degradation of the level of performance of one or more of the semi-redundant hardware components, identifying hardware components affected by the loss or degradation, migrating a critical job from an affected hardware component to an unaffected hardware component, and performing less-critical jobs on an affected hardware component. Loss or degradation of the semi-redundant component reduces the capacity of affected hardware components in the computer system without entirely disabling the computer system. Jobs identified as critical run on hardware components having the most capacity and reliability, while less-critical jobs use the remaining capacity of affected hardware components. Examples of semi-redundant hardware components include a memory module, CPU core, Ethernet port, power supply, fan, disk drive, and an input output port.Type: GrantFiled: July 3, 2012Date of Patent: April 8, 2014Assignee: International Business Machines CorporationInventors: Fred A. Bower, III, Scott A. Piper, Gregory B. Pruett
-
Patent number: 8589728Abstract: A computer program product includes computer usable program code embodied on a computer usable storage medium for performing a method of managing the workload in a computer system having one or more semi-redundant hardware components are provided. The method comprises detecting loss or degradation of the level of performance of one or more of the semi-redundant hardware components, identifying hardware components that are affected by the loss or degradation of the one or more semi-redundant components, migrating a critical job from an affected hardware component to an unaffected hardware component, and performing less-critical jobs on an affected hardware component. Loss or degradation of the semi-redundant component reduces the capacity of affected hardware components in the computer system without entirely disabling the computer system. Optionally, the semi-redundant hardware component may be selected from a memory module, CPU core, Ethernet port, power supply, fan, disk drive, and an input output port.Type: GrantFiled: September 20, 2010Date of Patent: November 19, 2013Assignee: International Business Machines CorporationInventors: Fred A. Bower, III, Scott A. Piper, Gregory B. Pruett
-
Patent number: 8452093Abstract: A histogram has ranges, a value for each range, and a time value. A pattern is generated, having a zero value for each range having a zero value, and a one value for each range having a non-zero value. Any non-zero values of the ranges are compressed into a compressed value. The pattern and the time value match or do not match any given entry of a pattern table having a number of entries, each of which has an index value, a time range, and a pattern. Where the pattern and the time value do not match any given entry of the pattern table, a new entry is added to the pattern table, and is considered the given entry. An entry is then added to a histogram table. This entry has the time value, the index value of the given entry of the pattern table, and the compressed value.Type: GrantFiled: March 31, 2012Date of Patent: May 28, 2013Assignee: International Business Machines CorporationInventor: Scott A. Piper
-
Publication number: 20120290874Abstract: A method of managing the workload in a computer system having one or more semi-redundant hardware components is provided. The method comprises detecting loss or degradation of the level of performance of one or more of the semi-redundant hardware components, identifying hardware components affected by the loss or degradation, migrating a critical job from an affected hardware component to an unaffected hardware component, and performing less-critical jobs on an affected hardware component. Loss or degradation of the semi-redundant component reduces the capacity of affected hardware components in the computer system without entirely disabling the computer system. Jobs identified as critical run on hardware components having the most capacity and reliability, while less-critical jobs use the remaining capacity of affected hardware components. Examples of semi-redundant hardware components include a memory module, CPU core, Ethernet port, power supply, fan, disk drive, and an input output port.Type: ApplicationFiled: July 3, 2012Publication date: November 15, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Fred A. Bower, III, Scott A. Piper, Gregory B. Pruett
-
Patent number: 8266232Abstract: Commands are processed by hardware within a virtual client computing environment, such as graphics-related commands processed by graphics hardware. A server computing device includes graphics hardware, a virtual client computing environment, and a server computing environment. The graphics hardware processes graphics-related commands into responses. The virtual client computing environment includes an encoding application that issues the commands. The server computing environment includes a decoding application. The encoding application includes a first thread that receives the commands and places them onto a first queue. The encoding application includes a second thread that receives the responses from a second queue and communicates the responses to a remote display device.Type: GrantFiled: October 15, 2005Date of Patent: September 11, 2012Assignee: International Business Machines CorporationInventors: Scott A. Piper, Vikas Ahluwalia, Kam-Lun Ng, Paul R. Shaw, Vinod Menon
-
Publication number: 20120189201Abstract: A histogram has ranges, a value for each range, and a time value. A pattern is generated, having a zero value for each range having a zero value, and a one value for each range having a non-zero value. Any non-zero values of the ranges are compressed into a compressed value. The pattern and the time value match or do not match any given entry of a pattern table having a number of entries, each of which has an index value, a time range, and a pattern. Where the pattern and the time value do not match any given entry of the pattern table, a new entry is added to the pattern table, and is considered the given entry. An entry is then added to a histogram table. This entry has the time value, the index value of the given entry of the pattern table, and the compressed value.Type: ApplicationFiled: March 31, 2012Publication date: July 26, 2012Inventor: Scott A. Piper
-
Patent number: 8189912Abstract: A histogram has ranges, a value for each range, and a time value. A pattern is generated, having a zero value for each range having a zero value, and a one value for each range having a non-zero value. Any non-zero values of the ranges are compressed into a compressed value. The pattern and the time value match or do not match any given entry of a pattern table having a number of entries, each of which has an index value, a time range, and a pattern. Where the pattern and the time value do not match any given entry of the pattern table, a new entry is added to the pattern table, and is considered the given entry. An entry is then added to a histogram table. This entry has the time value, the index value of the given entry of the pattern table, and the compressed value.Type: GrantFiled: November 24, 2007Date of Patent: May 29, 2012Assignee: International Business Machines CorporationInventor: Scott A. Piper
-
Publication number: 20120072765Abstract: A computer program product and method of managing the workload in a computer system having one or more semi-redundant hardware components are provided. The method comprises detecting loss or degradation of the level of performance of one or more of the semi-redundant hardware components, identifying hardware components that are affected by the loss or degradation of the one or more semi-redundant components, migrating a critical job from an affected hardware component to an unaffected hardware component, and performing less-critical jobs on an affected hardware component. Loss or degradation of the semi-redundant component reduces the capacity of affected hardware components in the computer system without entirely disabling the computer system. Jobs identified as being critical are run on hardware components having the most capacity and reliability, while allowing less-critical jobs to make use of the remaining capacity of affected hardware components.Type: ApplicationFiled: September 20, 2010Publication date: March 22, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Fred A. Bower, III, Scott A. Piper, Gregory B. Pruett