Patents by Inventor Shah Mohammad R. Islam

Shah Mohammad R. Islam has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11281691
    Abstract: Mechanisms are provided for performing a data replication operation to replicate data from a first data processing system to a second data processing system. The mechanisms store a compression ratio history in association with data to be replicated. The compression ratio history stores one or more compression ratios for one or more previously executed data replication operations. The mechanisms determine whether a data compression operation should be applied to the data for a current data replication operation based on the compression ratio(s) in the compression ratio history. In response to determining that data compression should be applied to the data, the data compression operation is performed and the compressed data is replicated to the second data processing system. In response to determining that data compression should not be applied, the data is replicated without compression.
    Type: Grant
    Filed: December 7, 2015
    Date of Patent: March 22, 2022
    Assignee: International Business Machines Corporation
    Inventors: Hiroshi Araki, Shah Mohammad R. Islam, Hiroyuki Miyoshi
  • Patent number: 11036676
    Abstract: The method includes identifying, by one or more computer processors, a live file. The method further includes identifying, by one or more computer processors, a snapshot that corresponds to the live file. The method further includes amending, by one or more computer processors, data corresponding to the identified live file to include tracking data for the identified snapshot. The method further includes amending, by one or more computer processors, data corresponding to the identified snapshot of the live file to include tracking data for the identified live file. The method further includes determining, by one or more computer processors, a difference in the data between the identified live file and the identified snapshot. The method further includes amending, by one or more computer processors, the identified snapshot to include only the determined difference in data between the identified live file and the identified snapshot.
    Type: Grant
    Filed: March 4, 2016
    Date of Patent: June 15, 2021
    Assignee: International Business Machines Corporation
    Inventors: Hiroshi Araki, Shah Mohammad R. Islam, Hiroyuki Miyoshi
  • Patent number: 10657150
    Abstract: Methods, systems, and computer program products are provided for performing a secure delete operation in a wide area network (WAN) including a cache site and a home site. A method includes identifying a file for deletion at the cache site, determining whether the file has a copy stored at the home site, detecting a location of the copy at the home site prior to a disconnection event of the cache site from the home site, deleting the file from the cache site during the disconnection event, and in response to the secure deletion of the file not being complete during the disconnection event, indicating on a table a remote inode number assigned to the copy associated with the file at the home site, a name under which the copy is saved, and a list of data chunk tuples specifying selected data of the copy to undergo secure deletion.
    Type: Grant
    Filed: October 25, 2017
    Date of Patent: May 19, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Lawrence C. Blount, Deepak R. Ghuge, Shah Mohammad R. Islam, Sandeep R. Patil, Riyazahamad M. Shiraguppi, Renu Tewari
  • Patent number: 10452858
    Abstract: In an approach to encryption key management, a computing device, responsive to a key storage condition, stores, in a cache memory, a first e/d key. The computing device receives a request to read a first file. The computing device, responsive to the request, accesses the first file, with the accessing of the first file including: accessing, from the cache memory, the first e/d key, decrypting the first file using the first e/d key and a second e/d key, and accessing the decrypted version of the first file.
    Type: Grant
    Filed: March 31, 2016
    Date of Patent: October 22, 2019
    Assignee: International Business Machines Corporation
    Inventors: Hiroshi Araki, Shah Mohammad R. Islam, Hiroyuki Miyoshi
  • Publication number: 20180046692
    Abstract: Methods, systems, and computer program products are provided for performing a secure delete operation in a wide area network (WAN) including a cache site and a home site. A method includes identifying a file for deletion at the cache site, determining whether the file has a copy stored at the home site, detecting a location of the copy at the home site prior to a disconnection event of the cache site from the home site, deleting the file from the cache site during the disconnection event, and in response to the secure deletion of the file not being complete during the disconnection event, indicating on a table a remote inode number assigned to the copy associated with the file at the home site, a name under which the copy is saved, and a list of data chunk tuples specifying selected data of the copy to undergo secure deletion.
    Type: Application
    Filed: October 25, 2017
    Publication date: February 15, 2018
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Lawrence C. BLOUNT, Deepak R. GHUGE, Shah Mohammad R. ISLAM, Sandeep R. PATIL, Riyazahamad M. SHIRAGUPPI, Renu TEWARI
  • Patent number: 9870414
    Abstract: Methods, systems, and computer program products are provided for performing a secure delete operation in a wide area network (WAN) including a cache site and a home site. A method includes identifying a file for deletion at the cache site, determining whether the file has a copy stored at the home site, detecting a location of the copy at the home site prior to a disconnection event of the cache site from the home site, deleting the file from the cache site during the disconnection event, and in response to the secure deletion of the file not being complete during the disconnection event, indicating on a table a remote inode number assigned to the copy associated with the file at the home site, a name under which the copy is saved, and a list of data chunk tuples specifying selected data of the copy to undergo secure deletion.
    Type: Grant
    Filed: October 14, 2016
    Date of Patent: January 16, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Lawrence C. Blount, Deepak R. Ghuge, Shah Mohammad R. Islam, Sandeep R. Patil, Riyazahamad M. Shiraguppi, Renu Tewari
  • Publication number: 20170286709
    Abstract: In an approach to encryption key management, a computing device, responsive to a key storage condition, stores, in a cache memory, a first e/d key. The computing device receives a request to read a first file. The computing device, responsive to the request, accesses the first file, with the accessing of the first file including: accessing, from the cache memory, the first e/d key, decrypting the first file using the first e/d key and a second e/d key, and accessing the decrypted version of the first file.
    Type: Application
    Filed: March 31, 2016
    Publication date: October 5, 2017
    Inventors: Hiroshi Araki, Shah Mohammad R. Islam, Hiroyuki Miyoshi
  • Publication number: 20170255638
    Abstract: The method includes identifying, by one or more computer processors, a live file. The method further includes identifying, by one or more computer processors, a snapshot that corresponds to the live file. The method further includes amending, by one or more computer processors, data corresponding to the identified live file to include tracking data for the identified snapshot. The method further includes amending, by one or more computer processors, data corresponding to the identified snapshot of the live file to include tracking data for the identified live file. The method further includes determining, by one or more computer processors, a difference in the data between the identified live file and the identified snapshot. The method further includes amending, by one or more computer processors, the identified snapshot to include only the determined difference in data between the identified live file and the identified snapshot.
    Type: Application
    Filed: March 4, 2016
    Publication date: September 7, 2017
    Inventors: Hiroshi Araki, Shah Mohammad R. Islam, Hiroyuki Miyoshi
  • Publication number: 20170161348
    Abstract: Mechanisms are provided for performing a data replication operation to replicate data from a first data processing system to a second data processing system. The mechanisms store a compression ratio history in association with data to be replicated. The compression ratio history stores one or more compression ratios for one or more previously executed data replication operations. The mechanisms determine whether a data compression operation should be applied to the data for a current data replication operation based on the compression ratio(s) in the compression ratio history. In response to determining that data compression should be applied to the data, the data compression operation is performed and the compressed data is replicated to the second data processing system. In response to determining that data compression should not be applied, the data is replicated without compression.
    Type: Application
    Filed: December 7, 2015
    Publication date: June 8, 2017
    Inventors: Hiroshi Araki, Shah Mohammad R. Islam, Hiroyuki Miyoshi
  • Publication number: 20170032008
    Abstract: Methods, systems, and computer program products are provided for performing a secure delete operation in a wide area network (WAN) including a cache site and a home site. A method includes identifying a file for deletion at the cache site, determining whether the file has a copy stored at the home site, detecting a location of the copy at the home site prior to a disconnection event of the cache site from the home site, deleting the file from the cache site during the disconnection event, and in response to the secure deletion of the file not being complete during the disconnection event, indicating on a table a remote inode number assigned to the copy associated with the file at the home site, a name under which the copy is saved, and a list of data chunk tuples specifying selected data of the copy to undergo secure deletion.
    Type: Application
    Filed: October 14, 2016
    Publication date: February 2, 2017
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Lawrence C. BLOUNT, Deepak R. GHUGE, Shah Mohammad R. ISLAM, Sandeep R. PATIL, Riyazahamad M. SHIRAGUPPI, Renu TEWARI
  • Patent number: 9444905
    Abstract: Provided are a computer program product, system, and method for allocating network bandwidth to prefetch requests to prefetch data from a remote storage to cache in a local storage. A determination is made of access rates for applications accessing a plurality of files, wherein the access rate is based on a rate of application access of the file over a period of time. A determination is made of an access rate weight for each of the files based on the access rates of the plurality of files. The determined access rate weight for each of the files is used to determine network bandwidth to assign to access the files from the remote storage to store in the local storage.
    Type: Grant
    Filed: March 20, 2014
    Date of Patent: September 13, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shah Mohammad R. Islam, John T. Olson, Sandeep R. Patil, Riyazahamad M. Shiraguppi
  • Patent number: 9311501
    Abstract: Provided are a computer program product, system, and method for using different secure erase algorithms to erase chunks from a file associated with different security levels. A request is received to secure erase a file having a plurality of chunks stored in at least one storage device. A determination is made of a first secure erase algorithm to apply to a first chunk in the file in response to the request and of a second secure erase algorithm to apply to a second chunk in the file in response to the request. The first secure erase algorithm is applied to erase the first chunk and the second secure erase algorithm is applied to erase the second chunk. The first and second secure erase algorithms use different processes to erase the chunks to which they are applied.
    Type: Grant
    Filed: March 26, 2012
    Date of Patent: April 12, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shah Mohammad R. Islam, Sandeep R. Patil, Riyazahamad M. Shiraguppi, Divyank Shukla
  • Publication number: 20150271287
    Abstract: Provided are a computer program product, system, and method for allocating network bandwidth to prefetch requests to prefetch data from a remote storage to cache in a local storage. A determination is made of access rates for applications accessing a plurality of files, wherein the access rate is based on a rate of application access of the file over a period of time. A determination is made of an access rate weight for each of the files based on the access rates of the plurality of files. The determined access rate weight for each of the files is used to determine network bandwidth to assign to access the files from the remote storage to store in the local storage.
    Type: Application
    Filed: March 20, 2014
    Publication date: September 24, 2015
    Applicant: International Business Machines Corporation
    Inventors: Shah Mohammad R. Islam, John T. Olson, Sandeep R. Patil, Riyazahamad M. Shiraguppi
  • Patent number: 9111109
    Abstract: Provided are a computer program product, system, and method for using different secure erase algorithms to erase chunks from a file associated with different security levels. A request is received to secure erase a file having a plurality of chunks stored in at least one storage device. A determination is made of a first secure erase algorithm to apply to a first chunk in the file in response to the request and of a second secure erase algorithm to apply to a second chunk in the file in response to the request. The first secure erase algorithm is applied to erase the first chunk and the second secure erase algorithm is applied to erase the second chunk. The first and second secure erase algorithms use different processes to erase the chunks to which they are applied.
    Type: Grant
    Filed: May 22, 2012
    Date of Patent: August 18, 2015
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shah Mohammad R. Islam, Sandeep R. Patil, Riyazahamad M. Shiraguppi, Divyank Shukla
  • Patent number: 8935756
    Abstract: Provided are a method, system, and computer program product for providing multiple authentications to authenticate users with respect to a system and file systems offered through the system. A request is received from a user to access a system, wherein the system provides access to a plurality of file systems. A first authentication of the user with respect to the system is performed. In response to success of the first authentication with respect to the system, a request by the user is received to access a selected one of the file systems. A second authentication is performed of the user with respect to the selected file system. The user is allowed access to the selected file system in response to success of the second authentication.
    Type: Grant
    Filed: May 18, 2012
    Date of Patent: January 13, 2015
    Assignee: International Business Machines Corporation
    Inventors: Shah Mohammad R. Islam, Sandeep R. Patil, Sachin C. Punadikar, Vipin Rathor
  • Patent number: 8918474
    Abstract: Provided are a computer program product, system, and method for determining priorities for cached objects to order the transfer of modifications of cached objects based on measured network bandwidth. Objects are copied from a primary site to a secondary site to cache at the secondary site. The primary site includes a primary server and primary storage and the secondary site includes a secondary server and a secondary storage. Priorities are received from the secondary server for the objects at the secondary site based on determinations made by the secondary server with respect to the objects cached at the secondary storage. A determination is made of modifications to the objects at the primary storage that are cached at the secondary storage. The received priorities for the objects from the secondary server are used to control a transfer of the determined modifications to the objects to the secondary server.
    Type: Grant
    Filed: March 26, 2012
    Date of Patent: December 23, 2014
    Assignee: International Business Machines Corporation
    Inventors: Umesh Bhalerao, Shah Mohammad R. Islam, Rinku M. Kothiya, Sandeep R. Patil
  • Patent number: 8832218
    Abstract: Provided are a computer program product, system, and method for determining priorities for cached objects to order the transfer of modifications of cached objects based on measured network bandwidth. Objects are copied from a primary site to a secondary site to cache at the secondary site. The primary site includes a primary server and primary storage and the secondary site includes a secondary server and a secondary storage. Priorities are received from the secondary server for the objects at the secondary site based on determinations made by the secondary server with respect to the objects cached at the secondary storage. A determination is made of modifications to the objects at the primary storage that are cached at the secondary storage. The received priorities for the objects from the secondary server are used to control a transfer of the determined modifications to the objects to the secondary server.
    Type: Grant
    Filed: May 15, 2012
    Date of Patent: September 9, 2014
    Assignee: International Business Machines Corporation
    Inventors: Umesh Bhalerao, Shah Mohammad R. Islam, Rinku M. Kothiya, Sandeep R. Patil
  • Publication number: 20130254852
    Abstract: Provided are a method, system, and computer program product for providing multiple authentications to authenticate users with respect to a system and file systems offered through the system. A request is received from a user to access a system, wherein the system provides access to a plurality of file systems. A first authentication of the user with respect to the system is performed. In response to success of the first authentication with respect to the system, a request by the user is received to access a selected one of the file systems. A second authentication is performed of the user with respect to the selected file system. The user is allowed access to the selected file system in response to success of the second authentication.
    Type: Application
    Filed: May 18, 2012
    Publication date: September 26, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shah Mohammad R. Islam, Sandeep R. Patil, Sachin C. Punadikar, Vipin Rathor
  • Publication number: 20130254507
    Abstract: Provided are a computer program product, system, and method for using different secure erase algorithms to erase chunks from a file associated with different security levels. A request is received to secure erase a file having a plurality of chunks stored in at least one storage device. A determination is made of a first secure erase algorithm to apply to a first chunk in the file in response to the request and of a second secure erase algorithm to apply to a second chunk in the file in response to the request. The first secure erase algorithm is applied to erase the first chunk and the second secure erase algorithm is applied to erase the second chunk. The first and second secure erase algorithms use different processes to erase the chunks to which they are applied.
    Type: Application
    Filed: March 26, 2012
    Publication date: September 26, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shah Mohammad R. Islam, Sandeep R. Patil, Riyazahamad M. Shiraguppi, Divyank Shukla
  • Publication number: 20130254840
    Abstract: Provided are a method, system, and computer program product for providing multiple authentications to authenticate users with respect to a system and file systems offered through the system. A request is received from a user to access a system, wherein the system provides access to a plurality of file systems. A first authentication of the user with respect to the system is performed. In response to success of the first authentication with respect to the system, a request by the user is received to access a selected one of the file systems. A second authentication is performed of the user with respect to the selected file system. The user is allowed access to the selected file system in response to success of the second authentication.
    Type: Application
    Filed: March 26, 2012
    Publication date: September 26, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shah Mohammad R. Islam, Sandeep R. Patil, Sachin C. Punadikar, Vipin Rathor