Patents by Inventor Pablo Michelis

Pablo Michelis has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11556649
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to facilitate malware detection using compressed data. An example apparatus includes an input processor to obtain a model, the model identifying a first sequence associated with a first trace of data known to be repetitive, a sequence identifier to identify a second sequence associated with a second trace of data, a comparator to compare the first sequence with the second sequence, and an output processor to when the first sequence matches the second sequence, transmit an encoded representation of the second sequence to the central processing facility using a first channel of communication, and when the first sequence fails to match the second sequence, transmit the second sequence to the central processing facility using a second channel of communication, the second sequence to be analyzed by the central processing facility to identify whether the second sequence is indicative of malware.
    Type: Grant
    Filed: December 23, 2019
    Date of Patent: January 17, 2023
    Assignee: MCAFEE, LLC
    Inventors: German Lancioni, Pablo A. Michelis
  • Publication number: 20220019601
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed. An example system to aggregate partitioned data includes a plurality of nodes, queriers associated with respective ones of the plurality of nodes, and a coordinator associated with a querier, the coordinator to identify a set of nodes, decompose the a to query the database data into a plurality of sub-queries, provide the plurality of sub-queries to the queriers of the identified set of nodes for execution, store, in response to a determination that a timeout has occurred, a hinted handoff notice for a node associated with the timeout, and combine results of execution of the respective ones of the plurality of sub-queries from the queriers of the identified set of nodes not associated with the timeout to generate a response to the request to query the database data.
    Type: Application
    Filed: September 30, 2021
    Publication date: January 20, 2022
    Inventors: Pablo A. Michelis, Brian H. Stewart
  • Patent number: 11138230
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed. An example partitioned computer database system includes a plurality of nodes, a data director to distribute a plurality of portions of database data across the plurality of nodes, queriers associated with respective ones of the plurality of nodes, the queriers to execute respective sub-queries of respective portions of the database data, and a coordinator to receive a request to query the database data, and merge results of the plurality of sub-queries to form a response to the request.
    Type: Grant
    Filed: March 26, 2018
    Date of Patent: October 5, 2021
    Assignee: McAfee, LLC
    Inventors: Pablo A. Michelis, Brian H. Stewart
  • Publication number: 20210192048
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to facilitate malware detection using compressed data. An example apparatus includes an input processor to obtain a model, the model identifying a first sequence associated with a first trace of data known to be repetitive, a sequence identifier to identify a second sequence associated with a second trace of data, a comparator to compare the first sequence with the second sequence, and an output processor to when the first sequence matches the second sequence, transmit an encoded representation of the second sequence to the central processing facility using a first channel of communication, and when the first sequence fails to match the second sequence, transmit the second sequence to the central processing facility using a second channel of communication, the second sequence to be analyzed by the central processing facility to identify whether the second sequence is indicative of malware.
    Type: Application
    Filed: December 23, 2019
    Publication date: June 24, 2021
    Inventors: German Lancioni, Pablo A. Michelis
  • Patent number: 11036707
    Abstract: According to some embodiments, so-called “NS-Tree” indexes may be used to calculate whether all (or a portion) of two independent tables are consistent. The NS-Tree indexes may be comprised of various elements, e.g., a synchronization time, a primary key, a hash of the complete record itself, and an aggregate value associated with each index entry (e.g., an accumulated XOR value). At any point in the index, an entry may possess the accumulated aggregate value of all key entries in the table up to that point. That aggregate value may be used to validate data consistency with another table(s) maintaining the same index. Due to the unique composition of the NS-Tree index, users can also validate two data sets within a ‘sub-range’ of the entire data set. According to other embodiments, NS-Tree indexes may also be applied to two different clusters of nodes by applying the NS-Trees at a ‘federated’ level.
    Type: Grant
    Filed: March 5, 2018
    Date of Patent: June 15, 2021
    Assignee: McAfee, LLC
    Inventors: Brian Stewart, Howard D. Stewart, Seth Grover, Brian Rhees, Pablo Michelis
  • Patent number: 10824644
    Abstract: A method includes receiving a first index of records in a first table and a second index of records in a second table. Each index entry of the indexes includes an aggregate value associated with the data in its respective record. The method further includes determining that the first table is inconsistent with the second table by comparing the aggregate values of a pair of indicator index entries of the indexes. The method further includes identifying a first pair of corresponding index entries from the indexes for which the aggregate values of the corresponding index entries are inconsistent and synchronizing records corresponding to the first pair of corresponding index entries. The method further includes updating the aggregate values of the index entries of the indexes and comparing the updated aggregate values of the pair of indicator index entries to determine whether the first table and the second table are consistent.
    Type: Grant
    Filed: January 11, 2018
    Date of Patent: November 3, 2020
    Assignee: Mcafee, LLC
    Inventors: Brian Stewart, Howard D. Stewart, Brian Roland Rhees, Seth D Grover, Pablo Michelis
  • Publication number: 20190294724
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed. An example partitioned computer database system includes a plurality of nodes, a data director to distribute a plurality of portions of database data across the plurality of nodes, queriers associated with respective ones of the plurality of nodes, the queriers to execute respective sub-queries of respective portions of the database data, and a coordinator to receive a request to query the database data, and merge results of the plurality of sub-queries to form a response to the request.
    Type: Application
    Filed: March 26, 2018
    Publication date: September 26, 2019
    Inventors: Pablo A. Michelis, Brian H. Stewart
  • Publication number: 20190272337
    Abstract: According to some embodiments, so-called “NS-Tree” indexes may be used to calculate whether all (or a portion) of two independent tables are consistent. The NS-Tree indexes may be comprised of various elements, e.g., a synchronization time, a primary key, a hash of the complete record itself, and an aggregate value associated with each index entry (e.g., an accumulated XOR value). At any point in the index, an entry may possess the accumulated aggregate value of all key entries in the table up to that point. That aggregate value may be used to validate data consistency with another table(s) maintaining the same index. Due to the unique composition of the NS-Tree index, users can also validate two data sets within a ‘sub-range’ of the entire data set. According to other embodiments, NS-Tree indexes may also be applied to two different clusters of nodes by applying the NS-Trees at a ‘federated’ level.
    Type: Application
    Filed: March 5, 2018
    Publication date: September 5, 2019
    Inventors: BRIAN STEWART, HOWARD D. STEWART, SETH GROVER, BRIAN RHEES, PABLO MICHELIS
  • Publication number: 20190080098
    Abstract: A system and method for protecting user privacy in multimedia uploaded to Internet sites. Briefly stated, the method includes receiving, by a server hosting an Internet privacy protection service, a media item of a subscriber of the service from a social networking service. The media item is encrypted using Digital Rights Management techniques. Policy determining who can view the media item is generated. The encrypted media item is securely stored in a cloud storage network. Storage information, including a URL of the secure storage location for the encrypted media item, is received by the Internet privacy protection service from the cloud storage network. The Internet privacy protection service generates a proxy image by encoding the URL into the proxy image using a bar code. The Internet privacy protection service uploads the proxy image to the subscriber's social networking service account on the social networking service.
    Type: Application
    Filed: November 13, 2018
    Publication date: March 14, 2019
    Inventors: Pablo Garralda, Pablo Passera, Dan F. Hirsch, Pablo Michelis, Francisco Cuenca-Acuna, Leandro Cino, German Bruno
  • Publication number: 20180260467
    Abstract: A method includes receiving a first index of records in a first table and a second index of records in a second table. Each index entry of the indexes includes an aggregate value associated with the data in its respective record. The method further includes determining that the first table is inconsistent with the second table by comparing the aggregate values of a pair of indicator index entries of the indexes. The method further includes identifying a first pair of corresponding index entries from the indexes for which the aggregate values of the corresponding index entries are inconsistent and synchronizing records corresponding to the first pair of corresponding index entries. The method further includes updating the aggregate values of the index entries of the indexes and comparing the updated aggregate values of the pair of indicator index entries to determine whether the first table and the second table are consistent.
    Type: Application
    Filed: January 11, 2018
    Publication date: September 13, 2018
    Inventors: Brian Stewart, Howard D. Stewart, Brian Roland Rhees, Seth D. Grover, Pablo Michelis
  • Patent number: 9832172
    Abstract: The present disclosure is directed to content protection for Data as a Service (DaaS). A device may receive encrypted data from a content provider via DaaS, the encrypted data comprising at least content for presentation on the device. For example, the content provider may utilize a secure multiplex transform (SMT) module in a trusted execution environment (TEE) module to generate encoded data from the content and digital rights management (DRM) data and to generate the encrypted data from the encoded data. The device may also comprise a TEE module including a secure demultiplex transform (SDT) module to decrypt the encoded data from the encrypted data and to decode the content and DRM data from the encoded data. The SMT and SDT modules may interact via a secure communication session to validate security, distribute decryption key(s), etc. In one embodiment, a trust broker may perform TEE module validation and key distribution.
    Type: Grant
    Filed: December 24, 2013
    Date of Patent: November 28, 2017
    Assignee: INTEL CORPORATION
    Inventors: Ned M. Smith, Nathan Heldt-Sheller, Pablo A. Michelis, Vincent J. Zimmer, Matthew D. Wood, Richard T. Beckwith, Michael A. Rothman
  • Publication number: 20150281186
    Abstract: The present disclosure is directed to content protection for Data as a Service (DaaS). A device may receive encrypted data from a content provider via DaaS, the encrypted data comprising at least content for presentation on the device. For example, the content provider may utilize a secure multiplex transform (SMT) module in a trusted execution environment (TEE) module to generate encoded data from the content and digital rights management (DRM) data and to generate the encrypted data from the encoded data. The device may also comprise a TEE module including a secure demultiplex transform (SDT) module to decrypt the encoded data from the encrypted data and to decode the content and DRM data from the encoded data. The SMT and SDT modules may interact via a secure communication session to validate security, distribute decryption key(s), etc. In one embodiment, a trust broker may perform TEE module validation and key distribution.
    Type: Application
    Filed: December 24, 2013
    Publication date: October 1, 2015
    Inventors: Ned M. Smith, Nathan Heldt-Sheller, Pablo A. Michelis, Vincent J. Zimmer, Matthew D. Wood, Richard T. Beckwith, Michael A. Rothman
  • Publication number: 20130305383
    Abstract: A system and method for protecting user privacy in multimedia uploaded to Internet sites. Briefly stated, the method includes receiving, by a server hosting an Internet privacy protection service, a media item of a subscriber of the service from a social networking service. The media item is encrypted using Digital Rights Management techniques. Policy determining who can view the media item is generated. The encrypted media item is securely stored in a cloud storage network. Storage information, including a URL of the secure storage location for the encrypted media item, is received by the Internet privacy protection service from the cloud storage network. The Internet privacy protection service generates a proxy image by encoding the URL into the proxy image using a bar code. The Internet privacy protection service uploads the proxy image to the subscriber's social networking service account on the social networking service.
    Type: Application
    Filed: December 12, 2011
    Publication date: November 14, 2013
    Applicant: INTEL CORPORATION
    Inventors: Pablo Garralda, Pablo Passera, Dan Hirch, Pablo Michelis, Francisco Cuenca-Acuna, Leandro Cino, German Bruno