Patents by Inventor Scott J. Noone
Scott J. Noone has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11301548Abstract: A method includes detecting a connection attempt from a device, quarantining the device to prevent the device from substantially interacting with a host system, and determining whether the device requires verification while the device is quarantined. The method also includes, in response to determining that the device requires verification, presenting at least one authorization challenge to a user while the device is quarantined. The at least one authorization challenge requests that the user provide at least one specified response. The method further includes, in response to determining that the device requires verification, determining whether the user correctly provided the at least one specified response while the device is quarantined, granting access to the device in response to determining that the user correctly provided the at least one specified response, and continuing to quarantine the device in response to determining that the user did not correctly provide the at least one specified response.Type: GrantFiled: March 22, 2018Date of Patent: April 12, 2022Assignee: Honeywell International Inc.Inventors: Peter G. Viscarola, Scott J. Noone, Eric D. Knapp, Christopher W. Barr, David Young, Kevin McMurdie, Ganesh P. Gadhe
-
Patent number: 10613982Abstract: The disclosure is related to file-aware caching for data storage devices. In one example, a device may comprise a data storage medium, an interface circuit to communicate with a host, and a driver configured to retrieve file system information related to a structured input/output (I/O) command from the host, and select caching attributes based on the file system information. Further, a system may include a host and at least one driver operating on the host; the driver configured to intercept a I/O request initiated at the host, obtain operating system information from the host about the I/O request, and store the operating system information that it is accessible to a data storage device to allow the data storage device to implement caching attributes based on the operating system information.Type: GrantFiled: April 5, 2012Date of Patent: April 7, 2020Assignee: SEAGATE TECHNOLOGY LLCInventors: Daniel Robert McLeran, Joe David Marley, Scott J Noone, Peter G Viscarola
-
Patent number: 10209768Abstract: The disclosure is related to systems, devices, and methods for file-aware priority drivers in data storage devices. In one example, a device may comprise a data storage medium, an interface circuit to communicate with a host, a driver configured to retrieve file system information related to a structured input/output (I/O) command from the host, select priority attributes based on the file system information, and prioritize execution of the I/O command based on the priority attributes. Another embodiment may be a method comprising inspecting characteristics of an I/O request, choosing priority attributes for the I/O request based on the characteristics, and executing operations in an order based on the priority attributes.Type: GrantFiled: April 5, 2012Date of Patent: February 19, 2019Assignee: SEAGATE TECHNOLOGY LLCInventors: Daniel Robert McLeran, Joe David Marley, Scott J Noone, Peter G Viscarola
-
Publication number: 20180365397Abstract: A method includes detecting a connection attempt from a device, quarantining the device to prevent the device from substantially interacting with a host system, and determining whether the device requires verification while the device is quarantined. The method also includes, in response to determining that the device requires verification, presenting at least one authorization challenge to a user while the device is quarantined. The at least one authorization challenge requests that the user provide at least one specified response. The method further includes, in response to determining that the device requires verification, determining whether the user correctly provided the at least one specified response while the device is quarantined, granting access to the device in response to determining that the user correctly provided the at least one specified response, and continuing to quarantine the device in response to determining that the user did not correctly provide the at least one specified response.Type: ApplicationFiled: March 22, 2018Publication date: December 20, 2018Inventors: Peter G. Viscarola, Scott J. Noone, Eric D. Knapp, Christopher W. Barr, David Young, Kevin McMurdie
-
Patent number: 9600486Abstract: Various embodiments are directed to systems and methods for facilitating file attribute correction. A computer system may receive a request to enumerate a first directory stored on a data storage. For a first file in the first directory, the computer system may determine that the first file has a corresponding first entry in an attribute cache, determine that the first entry for the first file indicates native file attributes that match the first file, and return for the first file at least one logical attribute indicated by the first entry.Type: GrantFiled: December 1, 2014Date of Patent: March 21, 2017Assignee: OSR Open Systems Resources, Inc.Inventors: W. Anthony Mason, Scott J. Noone, Roderick David Wolfe Widdowson
-
Publication number: 20150113011Abstract: Various embodiments are directed to systems and methods for facilitating file attribute correction. A computer system may receive a request to enumerate a first directory stored on a data storage. For a first file in the first directory, the computer system may determine that the first file has a corresponding first entry in an attribute cache, determine that the first entry for the first file indicates native file attributes that match the first file, and return for the first file at least one logical attribute indicated by the first entry.Type: ApplicationFiled: December 1, 2014Publication date: April 23, 2015Inventors: W. Anthony Mason, Scott J. Noone, Roderick David Wolfe Widdowson
-
Patent number: 8990228Abstract: Methods for organizing data. The methods may comprise the step of receiving a write request comprising a data unit. The methods may also comprise the steps of organizing the data unit into a sub-file and incorporating the sub-file into a data file according to a log-structured organization system. In addition, the methods may include the step of writing the data file to a data storage according to a second organization system.Type: GrantFiled: July 22, 2013Date of Patent: March 24, 2015Assignee: OSR Open Systems Resources, Inc.Inventors: W. Anthony Mason, Peter G. Viscarola, Mark J. Cariddi, Scott J. Noone
-
Patent number: 8903874Abstract: Various embodiments are directed to systems and methods for facilitating file attribute correction. A computer system may receive a request to enumerate a first directory stored on a data storage. For a first file in the first directory, the computer system may determine that the first file has a corresponding first entry in an attribute cache, determine that the first entry for the first file indicates native file attributes that match the first file, and return for the first file at least one logical attribute indicated by the first entry.Type: GrantFiled: November 2, 2012Date of Patent: December 2, 2014Assignee: OSR Open Systems Resources, Inc.Inventors: W. Anthony Mason, Scott J. Noone, Roderick David Wolfe Widdowson
-
Publication number: 20130311493Abstract: Methods for organizing data. The methods may comprise the step of receiving a write request comprising a data unit. The methods may also comprise the steps of organizing the data unit into a sub-file and incorporating the sub-file into a data file according to a log-structured organization system. In addition, the methods may include the step of writing the data file to a data storage according to a second organization system.Type: ApplicationFiled: July 22, 2013Publication date: November 21, 2013Applicant: OSR Open Systems Resources, Inc.Inventors: W. Anthony Mason, Peter G. Viscarola, Mark J. Cariddi, Scott J. Noone
-
Patent number: 8539228Abstract: Methods of managing access to at least one resource in a computer system. The methods may comprise the step of associating access rights with an application resource. The access rights may define a level of access to the resource granted to the application. The methods may also comprise the step of digitally signing the access rights and the application resource. In various embodiments, the associating may comprise incorporating the access rights into a stream of a file including the application resource. Also, in various embodiments, the associating may comprise incorporating the access rights into an extended attribute of a file including the application resource.Type: GrantFiled: August 24, 2006Date of Patent: September 17, 2013Assignee: OSR Open Systems Resources, Inc.Inventors: W. Anthony Mason, Peter G. Viscarola, Mark J. Cariddi, Scott J. Noone
-
Patent number: 8521752Abstract: Methods for organizing data. The methods may comprise the step of receiving a write request comprising a data unit. The methods may also comprise the steps of organizing the data unit into a sub-file and incorporating the sub-file into a data file according to a log-structured organization system. In addition, the methods may include the step of writing the data file to a data storage according to a second organization system.Type: GrantFiled: June 3, 2005Date of Patent: August 27, 2013Assignee: OSR Open Systems Resources, Inc.Inventors: W. Anthony Mason, Peter G. Viscarola, Mark J. Cariddi, Scott J. Noone
-
Patent number: 8024433Abstract: Methods of managing application resources in a computer system. The methods may comprise the steps of determining a configuration of the computer system and receiving a request to access an application resource. The methods may also comprise the step of directing the request to a data file. The data file may include a plurality of streams, and each of the plurality of streams may comprise a configuration-specific version of the application resource. In various embodiments, the methods may also comprise the step of directing the request to a first stream of the plurality of streams. The first stream may comprise version of the application resource specific to the configuration. Various system embodiments are also provided.Type: GrantFiled: April 24, 2007Date of Patent: September 20, 2011Assignee: OSR Open Systems Resources, Inc.Inventors: W. Anthony Mason, Peter G. Viscarola, Mark J. Cariddi, Scott J. Noone
-
Patent number: 7809897Abstract: Methods of monitoring a computer system. The methods may comprise the steps of calculating a first checksum of a data location and receiving a request from an operation running on the computer system for a lock corresponding to the data location. The methods may also comprise the steps of calculating a second checksum of the data location, and generating an indication if the first checksum and the second checksum are not equivalent. Also, methods of detecting a lock ranking violation in a computer system. The methods may comprise the steps of receiving a request from an operation for a first lock associated with a first data storage location and reviewing a list of locks issued to the operation. The methods may also comprise the step of determining whether the operation possesses a lock ranked higher than the first lock.Type: GrantFiled: February 19, 2009Date of Patent: October 5, 2010Assignee: OSR Open Systems Resources, Inc.Inventors: W. Anthony Mason, Peter G. Viscarola, Mark J. Cariddi, Scott J. Noone
-
Patent number: 7512748Abstract: Methods of monitoring a computer system. The methods may comprise the steps of calculating a first checksum of a data location and receiving a request from an operation running on the computer system for a lock corresponding to the data location. The methods may also comprise the steps of calculating a second checksum of the data location, and generating an indication if the first checksum and the second checksum are not equivalent. Also, methods of detecting a lock ranking violation in a computer system. The methods may comprise the steps of receiving a request from an operation for a first lock associated with a first data storage location and reviewing a list of locks issued to the operation. The methods may also comprise the step of determining whether the operation possesses a lock ranked higher than the first lock.Type: GrantFiled: August 17, 2006Date of Patent: March 31, 2009Assignee: OSR Open Systems Resources, Inc.Inventors: W. Anthony Mason, Peter G. Viscarola, Mark J. Cariddi, Scott J. Noone
-
Publication number: 20080270587Abstract: Methods of managing application resources in a computer system. The methods may comprise the steps of determining a configuration of the computer system and receiving a request to access an application resource. The methods may also comprise the step of directing the request to a data file. The data file may include a plurality of streams, and each of the plurality of streams may comprise a configuration-specific version of the application resource. In various embodiments, the methods may also comprise the step of directing the request to a first stream of the plurality of streams. The first stream may comprise version of the application resource specific to the configuration. Various system embodiments are also provided.Type: ApplicationFiled: April 24, 2007Publication date: October 30, 2008Inventors: W. Anthony Mason, Peter G. Viscarola, Mark J. Cariddi, Scott J. Noone