Patents by Inventor MICHAEL BAIRD LEAVITT

MICHAEL BAIRD LEAVITT has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11928233
    Abstract: Techniques are described for transaction-based read and write operations in a distributed system. In an embodiment, an authorization protocol overlaid onto a transaction to control access to each of the data pools. Using the techniques described herein, the DTRS provides authorization mechanism to ensure that the entity, which hosts the data pool, may only access the data set from an originating entity based at least upon the access rules of the originating entity set for the data set. Additionally, the DTRS's read/write transactions keep the data pools of the DTRS in synch with each other, so each data pool stores the same data sets as another data pool of the DTRS. When a data integrity service of an entity generates a new data entry from a user transaction with a client application, a new write request is generated for the DTRS to which the data integrity service belongs.
    Type: Grant
    Filed: July 29, 2021
    Date of Patent: March 12, 2024
    Assignee: RATEGAIN ADARA, INC.
    Inventors: Hongcheng Mi, Michael Baird Leavitt, Shuo Yang, Hien Nguyen
  • Publication number: 20220027495
    Abstract: Techniques are described for pooling data originating from different entities into a data pool managed by a data pool management system for performing accurate and resource-efficient statistical and other data operations by entities. Techniques further include maintaining rule sets that govern access to the data sets of the data pool. The DPMS uses the rule sets to determine whether a particular data set, on which a particular operation is requested to be performed, qualifies as authorized data for the requesting entity. In an embodiment, the DPMS determines, based on one rule set, that the particular data set does not qualify as authorized data for the particular operation. The DPMS further determines that based on another rule set the particular data set does qualify as authorized data for the particular operation. Based on determining that authorizing rule set overrides the non-authorizing rule set, DPMS proceeds to performing the particular operation using the particular data set.
    Type: Application
    Filed: September 28, 2021
    Publication date: January 27, 2022
    Inventors: MICHAEL BAIRD LEAVITT, CHINMAY VIKRAM GANDHI, HONGCHENG MI, YUAN GAO, SHUO YANG, DYLAN TAO-PEI SU, JULIUS QUINOVEVA QUIAOT, JIAN AN, XIAOZHOU FANG, MELISSA BETH STEIN
  • Publication number: 20220019686
    Abstract: Techniques are described for transaction-based read and write operations in a distributed system. In an embodiment, an authorization protocol overlaid onto a transaction to control access to each of the data pools. Using the techniques described herein, the DTRS provides authorization mechanism to ensure that the entity, which hosts the data pool, may only access the data set from an originating entity based at least upon the access rules of the originating entity set for the data set. Additionally, the DTRS's read/write transactions keep the data pools of the DTRS in synch with each other, so each data pool stores the same data sets as another data pool of the DTRS. When a data integrity service of an entity generates a new data entry from a user transaction with a client application, a new write request is generated for the DTRS to which the data integrity service belongs.
    Type: Application
    Filed: July 29, 2021
    Publication date: January 20, 2022
    Inventors: HONGCHENG MI, MICHAEL BAIRD LEAVITT, SHUO YANG, HIEN NGUYEN
  • Patent number: 11132455
    Abstract: Techniques are described for pooling data originating from different entities into a data pool managed by a data pool management system for performing accurate and resource-efficient statistical and other data operations by entities. Techniques further include maintaining rule sets that govern access to the data sets of the data pool. The DPMS uses the rule sets to determine whether a particular data set, on which a particular operation is requested to be performed, qualifies as authorized data for the requesting entity. In an embodiment, the DPMS determines, based on one rule set, that the particular data set does not qualify as authorized data for the particular operation. The DPMS further determines that based on another rule set the particular data set does qualify as authorized data for the particular operation. Based on determining that authorizing rule set overrides the non-authorizing rule set, DPMS proceeds to performing the particular operation using the particular data set.
    Type: Grant
    Filed: June 6, 2018
    Date of Patent: September 28, 2021
    Assignee: ADARA, INC.
    Inventors: Michael Baird Leavitt, Chinmay Vikram Gandhi, Hongcheng Mi, Yuan Gao, Shuo yang, Dylan Tao-Pei Su, Julius Quinoveva Quiaot, Jian An, Xiaozhou Fang, Melissa Beth Stein
  • Patent number: 11080419
    Abstract: Techniques are described for transaction-based read and write operations in a distributed system. In an embodiment, an authorization protocol overlaid onto a transaction to control access to each of the data pools. Using the techniques described herein, the DTRS provides authorization mechanism to ensure that the entity, which hosts the data pool, may only access the data set from an originating entity based at least upon the access rules of the originating entity set for the data set. Additionally, the DTRS's read/write transactions keep the data pools of the DTRS in synch with each other, so each data pool stores the same data sets as another data pool of the DTRS. When a data integrity service of an entity generates a new data entry from a user transaction with a client application, a new write request is generated for the DTRS to which the data integrity service belongs.
    Type: Grant
    Filed: May 28, 2019
    Date of Patent: August 3, 2021
    Assignee: ADARA, INC.
    Inventors: Hongcheng Mi, Michael Baird Leavitt, Shuo Yang, Hien Nguyen
  • Publication number: 20200380153
    Abstract: Techniques are described for transaction-based read and write operations in a distributed system. In an embodiment, an authorization protocol overlaid onto a transaction to control access to each of the data pools. Using the techniques described herein, the DTRS provides authorization mechanism to ensure that the entity, which hosts the data pool, may only access the data set from an originating entity based at least upon the access rules of the originating entity set for the data set. Additionally, the DTRS's read/write transactions keep the data pools of the DTRS in synch with each other, so each data pool stores the same data sets as another data pool of the DTRS. When a data integrity service of an entity generates a new data entry from a user transaction with a client application, a new write request is generated for the DTRS to which the data integrity service belongs.
    Type: Application
    Filed: May 28, 2019
    Publication date: December 3, 2020
    Inventors: HONGCHENG MI, MICHAEL BAIRD LEAVITT, SHUO YANG, HIEN NGUYEN
  • Publication number: 20190377890
    Abstract: Techniques are described for pooling data originating from different entities into a data pool managed by a data pool management system for performing accurate and resource-efficient statistical and other data operations by entities. Techniques further include maintaining rule sets that govern access to the data sets of the data pool. The DPMS uses the rule sets to determine whether a particular data set, on which a particular operation is requested to be performed, qualifies as authorized data for the requesting entity. In an embodiment, the DPMS determines, based on one rule set, that the particular data set does not qualify as authorized data for the particular operation. The DPMS further determines that based on another rule set the particular data set does qualify as authorized data for the particular operation. Based on determining that authorizing rule set overrides the non-authorizing rule set, DPMS proceeds to performing the particular operation using the particular data set.
    Type: Application
    Filed: June 6, 2018
    Publication date: December 12, 2019
    Inventors: MICHAEL BAIRD LEAVITT, CHINMAY VIKRAM GANDHI, HONGCHENG MI, YUAN GAO, SHUO YANG, DYLAN TAO-PEI SU, JULIUS QUINOVEVA QUIAOT, JIAN AN, XIAOZHOU FANG, MELISSA BETH STEIN