Patents by Inventor Shah Mohammad R. Islam
Shah Mohammad R. Islam has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11281691Abstract: Mechanisms are provided for performing a data replication operation to replicate data from a first data processing system to a second data processing system. The mechanisms store a compression ratio history in association with data to be replicated. The compression ratio history stores one or more compression ratios for one or more previously executed data replication operations. The mechanisms determine whether a data compression operation should be applied to the data for a current data replication operation based on the compression ratio(s) in the compression ratio history. In response to determining that data compression should be applied to the data, the data compression operation is performed and the compressed data is replicated to the second data processing system. In response to determining that data compression should not be applied, the data is replicated without compression.Type: GrantFiled: December 7, 2015Date of Patent: March 22, 2022Assignee: International Business Machines CorporationInventors: Hiroshi Araki, Shah Mohammad R. Islam, Hiroyuki Miyoshi
-
Patent number: 11036676Abstract: The method includes identifying, by one or more computer processors, a live file. The method further includes identifying, by one or more computer processors, a snapshot that corresponds to the live file. The method further includes amending, by one or more computer processors, data corresponding to the identified live file to include tracking data for the identified snapshot. The method further includes amending, by one or more computer processors, data corresponding to the identified snapshot of the live file to include tracking data for the identified live file. The method further includes determining, by one or more computer processors, a difference in the data between the identified live file and the identified snapshot. The method further includes amending, by one or more computer processors, the identified snapshot to include only the determined difference in data between the identified live file and the identified snapshot.Type: GrantFiled: March 4, 2016Date of Patent: June 15, 2021Assignee: International Business Machines CorporationInventors: Hiroshi Araki, Shah Mohammad R. Islam, Hiroyuki Miyoshi
-
Patent number: 10657150Abstract: Methods, systems, and computer program products are provided for performing a secure delete operation in a wide area network (WAN) including a cache site and a home site. A method includes identifying a file for deletion at the cache site, determining whether the file has a copy stored at the home site, detecting a location of the copy at the home site prior to a disconnection event of the cache site from the home site, deleting the file from the cache site during the disconnection event, and in response to the secure deletion of the file not being complete during the disconnection event, indicating on a table a remote inode number assigned to the copy associated with the file at the home site, a name under which the copy is saved, and a list of data chunk tuples specifying selected data of the copy to undergo secure deletion.Type: GrantFiled: October 25, 2017Date of Patent: May 19, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lawrence C. Blount, Deepak R. Ghuge, Shah Mohammad R. Islam, Sandeep R. Patil, Riyazahamad M. Shiraguppi, Renu Tewari
-
Patent number: 10452858Abstract: In an approach to encryption key management, a computing device, responsive to a key storage condition, stores, in a cache memory, a first e/d key. The computing device receives a request to read a first file. The computing device, responsive to the request, accesses the first file, with the accessing of the first file including: accessing, from the cache memory, the first e/d key, decrypting the first file using the first e/d key and a second e/d key, and accessing the decrypted version of the first file.Type: GrantFiled: March 31, 2016Date of Patent: October 22, 2019Assignee: International Business Machines CorporationInventors: Hiroshi Araki, Shah Mohammad R. Islam, Hiroyuki Miyoshi
-
Publication number: 20180046692Abstract: Methods, systems, and computer program products are provided for performing a secure delete operation in a wide area network (WAN) including a cache site and a home site. A method includes identifying a file for deletion at the cache site, determining whether the file has a copy stored at the home site, detecting a location of the copy at the home site prior to a disconnection event of the cache site from the home site, deleting the file from the cache site during the disconnection event, and in response to the secure deletion of the file not being complete during the disconnection event, indicating on a table a remote inode number assigned to the copy associated with the file at the home site, a name under which the copy is saved, and a list of data chunk tuples specifying selected data of the copy to undergo secure deletion.Type: ApplicationFiled: October 25, 2017Publication date: February 15, 2018Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lawrence C. BLOUNT, Deepak R. GHUGE, Shah Mohammad R. ISLAM, Sandeep R. PATIL, Riyazahamad M. SHIRAGUPPI, Renu TEWARI
-
Patent number: 9870414Abstract: Methods, systems, and computer program products are provided for performing a secure delete operation in a wide area network (WAN) including a cache site and a home site. A method includes identifying a file for deletion at the cache site, determining whether the file has a copy stored at the home site, detecting a location of the copy at the home site prior to a disconnection event of the cache site from the home site, deleting the file from the cache site during the disconnection event, and in response to the secure deletion of the file not being complete during the disconnection event, indicating on a table a remote inode number assigned to the copy associated with the file at the home site, a name under which the copy is saved, and a list of data chunk tuples specifying selected data of the copy to undergo secure deletion.Type: GrantFiled: October 14, 2016Date of Patent: January 16, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lawrence C. Blount, Deepak R. Ghuge, Shah Mohammad R. Islam, Sandeep R. Patil, Riyazahamad M. Shiraguppi, Renu Tewari
-
Publication number: 20170286709Abstract: In an approach to encryption key management, a computing device, responsive to a key storage condition, stores, in a cache memory, a first e/d key. The computing device receives a request to read a first file. The computing device, responsive to the request, accesses the first file, with the accessing of the first file including: accessing, from the cache memory, the first e/d key, decrypting the first file using the first e/d key and a second e/d key, and accessing the decrypted version of the first file.Type: ApplicationFiled: March 31, 2016Publication date: October 5, 2017Inventors: Hiroshi Araki, Shah Mohammad R. Islam, Hiroyuki Miyoshi
-
Publication number: 20170255638Abstract: The method includes identifying, by one or more computer processors, a live file. The method further includes identifying, by one or more computer processors, a snapshot that corresponds to the live file. The method further includes amending, by one or more computer processors, data corresponding to the identified live file to include tracking data for the identified snapshot. The method further includes amending, by one or more computer processors, data corresponding to the identified snapshot of the live file to include tracking data for the identified live file. The method further includes determining, by one or more computer processors, a difference in the data between the identified live file and the identified snapshot. The method further includes amending, by one or more computer processors, the identified snapshot to include only the determined difference in data between the identified live file and the identified snapshot.Type: ApplicationFiled: March 4, 2016Publication date: September 7, 2017Inventors: Hiroshi Araki, Shah Mohammad R. Islam, Hiroyuki Miyoshi
-
Publication number: 20170161348Abstract: Mechanisms are provided for performing a data replication operation to replicate data from a first data processing system to a second data processing system. The mechanisms store a compression ratio history in association with data to be replicated. The compression ratio history stores one or more compression ratios for one or more previously executed data replication operations. The mechanisms determine whether a data compression operation should be applied to the data for a current data replication operation based on the compression ratio(s) in the compression ratio history. In response to determining that data compression should be applied to the data, the data compression operation is performed and the compressed data is replicated to the second data processing system. In response to determining that data compression should not be applied, the data is replicated without compression.Type: ApplicationFiled: December 7, 2015Publication date: June 8, 2017Inventors: Hiroshi Araki, Shah Mohammad R. Islam, Hiroyuki Miyoshi
-
Publication number: 20170032008Abstract: Methods, systems, and computer program products are provided for performing a secure delete operation in a wide area network (WAN) including a cache site and a home site. A method includes identifying a file for deletion at the cache site, determining whether the file has a copy stored at the home site, detecting a location of the copy at the home site prior to a disconnection event of the cache site from the home site, deleting the file from the cache site during the disconnection event, and in response to the secure deletion of the file not being complete during the disconnection event, indicating on a table a remote inode number assigned to the copy associated with the file at the home site, a name under which the copy is saved, and a list of data chunk tuples specifying selected data of the copy to undergo secure deletion.Type: ApplicationFiled: October 14, 2016Publication date: February 2, 2017Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lawrence C. BLOUNT, Deepak R. GHUGE, Shah Mohammad R. ISLAM, Sandeep R. PATIL, Riyazahamad M. SHIRAGUPPI, Renu TEWARI
-
Patent number: 9444905Abstract: Provided are a computer program product, system, and method for allocating network bandwidth to prefetch requests to prefetch data from a remote storage to cache in a local storage. A determination is made of access rates for applications accessing a plurality of files, wherein the access rate is based on a rate of application access of the file over a period of time. A determination is made of an access rate weight for each of the files based on the access rates of the plurality of files. The determined access rate weight for each of the files is used to determine network bandwidth to assign to access the files from the remote storage to store in the local storage.Type: GrantFiled: March 20, 2014Date of Patent: September 13, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Shah Mohammad R. Islam, John T. Olson, Sandeep R. Patil, Riyazahamad M. Shiraguppi
-
Patent number: 9311501Abstract: Provided are a computer program product, system, and method for using different secure erase algorithms to erase chunks from a file associated with different security levels. A request is received to secure erase a file having a plurality of chunks stored in at least one storage device. A determination is made of a first secure erase algorithm to apply to a first chunk in the file in response to the request and of a second secure erase algorithm to apply to a second chunk in the file in response to the request. The first secure erase algorithm is applied to erase the first chunk and the second secure erase algorithm is applied to erase the second chunk. The first and second secure erase algorithms use different processes to erase the chunks to which they are applied.Type: GrantFiled: March 26, 2012Date of Patent: April 12, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Shah Mohammad R. Islam, Sandeep R. Patil, Riyazahamad M. Shiraguppi, Divyank Shukla
-
Publication number: 20150271287Abstract: Provided are a computer program product, system, and method for allocating network bandwidth to prefetch requests to prefetch data from a remote storage to cache in a local storage. A determination is made of access rates for applications accessing a plurality of files, wherein the access rate is based on a rate of application access of the file over a period of time. A determination is made of an access rate weight for each of the files based on the access rates of the plurality of files. The determined access rate weight for each of the files is used to determine network bandwidth to assign to access the files from the remote storage to store in the local storage.Type: ApplicationFiled: March 20, 2014Publication date: September 24, 2015Applicant: International Business Machines CorporationInventors: Shah Mohammad R. Islam, John T. Olson, Sandeep R. Patil, Riyazahamad M. Shiraguppi
-
Patent number: 9111109Abstract: Provided are a computer program product, system, and method for using different secure erase algorithms to erase chunks from a file associated with different security levels. A request is received to secure erase a file having a plurality of chunks stored in at least one storage device. A determination is made of a first secure erase algorithm to apply to a first chunk in the file in response to the request and of a second secure erase algorithm to apply to a second chunk in the file in response to the request. The first secure erase algorithm is applied to erase the first chunk and the second secure erase algorithm is applied to erase the second chunk. The first and second secure erase algorithms use different processes to erase the chunks to which they are applied.Type: GrantFiled: May 22, 2012Date of Patent: August 18, 2015Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Shah Mohammad R. Islam, Sandeep R. Patil, Riyazahamad M. Shiraguppi, Divyank Shukla
-
Patent number: 8935756Abstract: Provided are a method, system, and computer program product for providing multiple authentications to authenticate users with respect to a system and file systems offered through the system. A request is received from a user to access a system, wherein the system provides access to a plurality of file systems. A first authentication of the user with respect to the system is performed. In response to success of the first authentication with respect to the system, a request by the user is received to access a selected one of the file systems. A second authentication is performed of the user with respect to the selected file system. The user is allowed access to the selected file system in response to success of the second authentication.Type: GrantFiled: May 18, 2012Date of Patent: January 13, 2015Assignee: International Business Machines CorporationInventors: Shah Mohammad R. Islam, Sandeep R. Patil, Sachin C. Punadikar, Vipin Rathor
-
Patent number: 8918474Abstract: Provided are a computer program product, system, and method for determining priorities for cached objects to order the transfer of modifications of cached objects based on measured network bandwidth. Objects are copied from a primary site to a secondary site to cache at the secondary site. The primary site includes a primary server and primary storage and the secondary site includes a secondary server and a secondary storage. Priorities are received from the secondary server for the objects at the secondary site based on determinations made by the secondary server with respect to the objects cached at the secondary storage. A determination is made of modifications to the objects at the primary storage that are cached at the secondary storage. The received priorities for the objects from the secondary server are used to control a transfer of the determined modifications to the objects to the secondary server.Type: GrantFiled: March 26, 2012Date of Patent: December 23, 2014Assignee: International Business Machines CorporationInventors: Umesh Bhalerao, Shah Mohammad R. Islam, Rinku M. Kothiya, Sandeep R. Patil
-
Patent number: 8832218Abstract: Provided are a computer program product, system, and method for determining priorities for cached objects to order the transfer of modifications of cached objects based on measured network bandwidth. Objects are copied from a primary site to a secondary site to cache at the secondary site. The primary site includes a primary server and primary storage and the secondary site includes a secondary server and a secondary storage. Priorities are received from the secondary server for the objects at the secondary site based on determinations made by the secondary server with respect to the objects cached at the secondary storage. A determination is made of modifications to the objects at the primary storage that are cached at the secondary storage. The received priorities for the objects from the secondary server are used to control a transfer of the determined modifications to the objects to the secondary server.Type: GrantFiled: May 15, 2012Date of Patent: September 9, 2014Assignee: International Business Machines CorporationInventors: Umesh Bhalerao, Shah Mohammad R. Islam, Rinku M. Kothiya, Sandeep R. Patil
-
Publication number: 20130254852Abstract: Provided are a method, system, and computer program product for providing multiple authentications to authenticate users with respect to a system and file systems offered through the system. A request is received from a user to access a system, wherein the system provides access to a plurality of file systems. A first authentication of the user with respect to the system is performed. In response to success of the first authentication with respect to the system, a request by the user is received to access a selected one of the file systems. A second authentication is performed of the user with respect to the selected file system. The user is allowed access to the selected file system in response to success of the second authentication.Type: ApplicationFiled: May 18, 2012Publication date: September 26, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Shah Mohammad R. Islam, Sandeep R. Patil, Sachin C. Punadikar, Vipin Rathor
-
Publication number: 20130254507Abstract: Provided are a computer program product, system, and method for using different secure erase algorithms to erase chunks from a file associated with different security levels. A request is received to secure erase a file having a plurality of chunks stored in at least one storage device. A determination is made of a first secure erase algorithm to apply to a first chunk in the file in response to the request and of a second secure erase algorithm to apply to a second chunk in the file in response to the request. The first secure erase algorithm is applied to erase the first chunk and the second secure erase algorithm is applied to erase the second chunk. The first and second secure erase algorithms use different processes to erase the chunks to which they are applied.Type: ApplicationFiled: March 26, 2012Publication date: September 26, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Shah Mohammad R. Islam, Sandeep R. Patil, Riyazahamad M. Shiraguppi, Divyank Shukla
-
Publication number: 20130254840Abstract: Provided are a method, system, and computer program product for providing multiple authentications to authenticate users with respect to a system and file systems offered through the system. A request is received from a user to access a system, wherein the system provides access to a plurality of file systems. A first authentication of the user with respect to the system is performed. In response to success of the first authentication with respect to the system, a request by the user is received to access a selected one of the file systems. A second authentication is performed of the user with respect to the selected file system. The user is allowed access to the selected file system in response to success of the second authentication.Type: ApplicationFiled: March 26, 2012Publication date: September 26, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Shah Mohammad R. Islam, Sandeep R. Patil, Sachin C. Punadikar, Vipin Rathor