Patents by Inventor Pablo Michelis
Pablo Michelis has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11556649Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to facilitate malware detection using compressed data. An example apparatus includes an input processor to obtain a model, the model identifying a first sequence associated with a first trace of data known to be repetitive, a sequence identifier to identify a second sequence associated with a second trace of data, a comparator to compare the first sequence with the second sequence, and an output processor to when the first sequence matches the second sequence, transmit an encoded representation of the second sequence to the central processing facility using a first channel of communication, and when the first sequence fails to match the second sequence, transmit the second sequence to the central processing facility using a second channel of communication, the second sequence to be analyzed by the central processing facility to identify whether the second sequence is indicative of malware.Type: GrantFiled: December 23, 2019Date of Patent: January 17, 2023Assignee: MCAFEE, LLCInventors: German Lancioni, Pablo A. Michelis
-
Publication number: 20220019601Abstract: Methods, apparatus, systems and articles of manufacture are disclosed. An example system to aggregate partitioned data includes a plurality of nodes, queriers associated with respective ones of the plurality of nodes, and a coordinator associated with a querier, the coordinator to identify a set of nodes, decompose the a to query the database data into a plurality of sub-queries, provide the plurality of sub-queries to the queriers of the identified set of nodes for execution, store, in response to a determination that a timeout has occurred, a hinted handoff notice for a node associated with the timeout, and combine results of execution of the respective ones of the plurality of sub-queries from the queriers of the identified set of nodes not associated with the timeout to generate a response to the request to query the database data.Type: ApplicationFiled: September 30, 2021Publication date: January 20, 2022Inventors: Pablo A. Michelis, Brian H. Stewart
-
Patent number: 11138230Abstract: Methods, apparatus, systems and articles of manufacture are disclosed. An example partitioned computer database system includes a plurality of nodes, a data director to distribute a plurality of portions of database data across the plurality of nodes, queriers associated with respective ones of the plurality of nodes, the queriers to execute respective sub-queries of respective portions of the database data, and a coordinator to receive a request to query the database data, and merge results of the plurality of sub-queries to form a response to the request.Type: GrantFiled: March 26, 2018Date of Patent: October 5, 2021Assignee: McAfee, LLCInventors: Pablo A. Michelis, Brian H. Stewart
-
Publication number: 20210192048Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to facilitate malware detection using compressed data. An example apparatus includes an input processor to obtain a model, the model identifying a first sequence associated with a first trace of data known to be repetitive, a sequence identifier to identify a second sequence associated with a second trace of data, a comparator to compare the first sequence with the second sequence, and an output processor to when the first sequence matches the second sequence, transmit an encoded representation of the second sequence to the central processing facility using a first channel of communication, and when the first sequence fails to match the second sequence, transmit the second sequence to the central processing facility using a second channel of communication, the second sequence to be analyzed by the central processing facility to identify whether the second sequence is indicative of malware.Type: ApplicationFiled: December 23, 2019Publication date: June 24, 2021Inventors: German Lancioni, Pablo A. Michelis
-
Patent number: 11036707Abstract: According to some embodiments, so-called “NS-Tree” indexes may be used to calculate whether all (or a portion) of two independent tables are consistent. The NS-Tree indexes may be comprised of various elements, e.g., a synchronization time, a primary key, a hash of the complete record itself, and an aggregate value associated with each index entry (e.g., an accumulated XOR value). At any point in the index, an entry may possess the accumulated aggregate value of all key entries in the table up to that point. That aggregate value may be used to validate data consistency with another table(s) maintaining the same index. Due to the unique composition of the NS-Tree index, users can also validate two data sets within a ‘sub-range’ of the entire data set. According to other embodiments, NS-Tree indexes may also be applied to two different clusters of nodes by applying the NS-Trees at a ‘federated’ level.Type: GrantFiled: March 5, 2018Date of Patent: June 15, 2021Assignee: McAfee, LLCInventors: Brian Stewart, Howard D. Stewart, Seth Grover, Brian Rhees, Pablo Michelis
-
Patent number: 10824644Abstract: A method includes receiving a first index of records in a first table and a second index of records in a second table. Each index entry of the indexes includes an aggregate value associated with the data in its respective record. The method further includes determining that the first table is inconsistent with the second table by comparing the aggregate values of a pair of indicator index entries of the indexes. The method further includes identifying a first pair of corresponding index entries from the indexes for which the aggregate values of the corresponding index entries are inconsistent and synchronizing records corresponding to the first pair of corresponding index entries. The method further includes updating the aggregate values of the index entries of the indexes and comparing the updated aggregate values of the pair of indicator index entries to determine whether the first table and the second table are consistent.Type: GrantFiled: January 11, 2018Date of Patent: November 3, 2020Assignee: Mcafee, LLCInventors: Brian Stewart, Howard D. Stewart, Brian Roland Rhees, Seth D Grover, Pablo Michelis
-
Publication number: 20190294724Abstract: Methods, apparatus, systems and articles of manufacture are disclosed. An example partitioned computer database system includes a plurality of nodes, a data director to distribute a plurality of portions of database data across the plurality of nodes, queriers associated with respective ones of the plurality of nodes, the queriers to execute respective sub-queries of respective portions of the database data, and a coordinator to receive a request to query the database data, and merge results of the plurality of sub-queries to form a response to the request.Type: ApplicationFiled: March 26, 2018Publication date: September 26, 2019Inventors: Pablo A. Michelis, Brian H. Stewart
-
Publication number: 20190272337Abstract: According to some embodiments, so-called “NS-Tree” indexes may be used to calculate whether all (or a portion) of two independent tables are consistent. The NS-Tree indexes may be comprised of various elements, e.g., a synchronization time, a primary key, a hash of the complete record itself, and an aggregate value associated with each index entry (e.g., an accumulated XOR value). At any point in the index, an entry may possess the accumulated aggregate value of all key entries in the table up to that point. That aggregate value may be used to validate data consistency with another table(s) maintaining the same index. Due to the unique composition of the NS-Tree index, users can also validate two data sets within a ‘sub-range’ of the entire data set. According to other embodiments, NS-Tree indexes may also be applied to two different clusters of nodes by applying the NS-Trees at a ‘federated’ level.Type: ApplicationFiled: March 5, 2018Publication date: September 5, 2019Inventors: BRIAN STEWART, HOWARD D. STEWART, SETH GROVER, BRIAN RHEES, PABLO MICHELIS
-
Publication number: 20190080098Abstract: A system and method for protecting user privacy in multimedia uploaded to Internet sites. Briefly stated, the method includes receiving, by a server hosting an Internet privacy protection service, a media item of a subscriber of the service from a social networking service. The media item is encrypted using Digital Rights Management techniques. Policy determining who can view the media item is generated. The encrypted media item is securely stored in a cloud storage network. Storage information, including a URL of the secure storage location for the encrypted media item, is received by the Internet privacy protection service from the cloud storage network. The Internet privacy protection service generates a proxy image by encoding the URL into the proxy image using a bar code. The Internet privacy protection service uploads the proxy image to the subscriber's social networking service account on the social networking service.Type: ApplicationFiled: November 13, 2018Publication date: March 14, 2019Inventors: Pablo Garralda, Pablo Passera, Dan F. Hirsch, Pablo Michelis, Francisco Cuenca-Acuna, Leandro Cino, German Bruno
-
Publication number: 20180260467Abstract: A method includes receiving a first index of records in a first table and a second index of records in a second table. Each index entry of the indexes includes an aggregate value associated with the data in its respective record. The method further includes determining that the first table is inconsistent with the second table by comparing the aggregate values of a pair of indicator index entries of the indexes. The method further includes identifying a first pair of corresponding index entries from the indexes for which the aggregate values of the corresponding index entries are inconsistent and synchronizing records corresponding to the first pair of corresponding index entries. The method further includes updating the aggregate values of the index entries of the indexes and comparing the updated aggregate values of the pair of indicator index entries to determine whether the first table and the second table are consistent.Type: ApplicationFiled: January 11, 2018Publication date: September 13, 2018Inventors: Brian Stewart, Howard D. Stewart, Brian Roland Rhees, Seth D. Grover, Pablo Michelis
-
Patent number: 9832172Abstract: The present disclosure is directed to content protection for Data as a Service (DaaS). A device may receive encrypted data from a content provider via DaaS, the encrypted data comprising at least content for presentation on the device. For example, the content provider may utilize a secure multiplex transform (SMT) module in a trusted execution environment (TEE) module to generate encoded data from the content and digital rights management (DRM) data and to generate the encrypted data from the encoded data. The device may also comprise a TEE module including a secure demultiplex transform (SDT) module to decrypt the encoded data from the encrypted data and to decode the content and DRM data from the encoded data. The SMT and SDT modules may interact via a secure communication session to validate security, distribute decryption key(s), etc. In one embodiment, a trust broker may perform TEE module validation and key distribution.Type: GrantFiled: December 24, 2013Date of Patent: November 28, 2017Assignee: INTEL CORPORATIONInventors: Ned M. Smith, Nathan Heldt-Sheller, Pablo A. Michelis, Vincent J. Zimmer, Matthew D. Wood, Richard T. Beckwith, Michael A. Rothman
-
Publication number: 20150281186Abstract: The present disclosure is directed to content protection for Data as a Service (DaaS). A device may receive encrypted data from a content provider via DaaS, the encrypted data comprising at least content for presentation on the device. For example, the content provider may utilize a secure multiplex transform (SMT) module in a trusted execution environment (TEE) module to generate encoded data from the content and digital rights management (DRM) data and to generate the encrypted data from the encoded data. The device may also comprise a TEE module including a secure demultiplex transform (SDT) module to decrypt the encoded data from the encrypted data and to decode the content and DRM data from the encoded data. The SMT and SDT modules may interact via a secure communication session to validate security, distribute decryption key(s), etc. In one embodiment, a trust broker may perform TEE module validation and key distribution.Type: ApplicationFiled: December 24, 2013Publication date: October 1, 2015Inventors: Ned M. Smith, Nathan Heldt-Sheller, Pablo A. Michelis, Vincent J. Zimmer, Matthew D. Wood, Richard T. Beckwith, Michael A. Rothman
-
Publication number: 20130305383Abstract: A system and method for protecting user privacy in multimedia uploaded to Internet sites. Briefly stated, the method includes receiving, by a server hosting an Internet privacy protection service, a media item of a subscriber of the service from a social networking service. The media item is encrypted using Digital Rights Management techniques. Policy determining who can view the media item is generated. The encrypted media item is securely stored in a cloud storage network. Storage information, including a URL of the secure storage location for the encrypted media item, is received by the Internet privacy protection service from the cloud storage network. The Internet privacy protection service generates a proxy image by encoding the URL into the proxy image using a bar code. The Internet privacy protection service uploads the proxy image to the subscriber's social networking service account on the social networking service.Type: ApplicationFiled: December 12, 2011Publication date: November 14, 2013Applicant: INTEL CORPORATIONInventors: Pablo Garralda, Pablo Passera, Dan Hirch, Pablo Michelis, Francisco Cuenca-Acuna, Leandro Cino, German Bruno