Patents Examined by Andrew C Georgandellis
-
Patent number: 10462252Abstract: A content delivery network has at least a first tier of servers. A content delivery method includes, at a first server in the first tier of servers, obtaining a request from a client for a resource. If the resource is available at the first server or at a peer of the first server, then the resource is served to the client from the first server. Otherwise, it is determined whether the resource is popular, and if the resource is determined to be popular, then the first server obtains the resource and the first server serves the resource to the client. If the resource is determined not to be popular, the server contacts a second server to obtain the resource, not in the first tier of servers, and the second server provides the resource to the first server. The first server is instructed not to cache the unpopular content.Type: GrantFiled: November 16, 2017Date of Patent: October 29, 2019Assignee: Level 3 Communications, LLCInventors: Christopher Newton, Kevin Johns, William Power
-
Patent number: 10432533Abstract: A controller node in a network implementing software defined networking (SDN) proactively detects network overload conditions in a target node and subsequently prevents the conditions from developing by launching a new virtual network node. The detection and prevention are based on the determination of a probability of failure of the target node as a weighted function of information from the target node and probabilities of failure of related nodes.Type: GrantFiled: April 25, 2017Date of Patent: October 1, 2019Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Sun-Uk Park, Minh Huynh, Ashima Mangla
-
Patent number: 10389758Abstract: Systems and methods to rotate security assets used for secure communication are described. The system retrieves security assets from a security asset repository, the security assets including a first version of the certificate and a second version of the certificate. Further, the system receives, over a network, a third certificate, at a client machine, the third certificate being received from the first remote server machine of the plurality of remote server machines. Further, the system identifies, at the client machine, whether a first remote server machine associated with the first subject name is trusted by identifying whether the third certificate matches any one of the first version of the certificate and the second version of the certificate. Finally, the system establishes a secure communication session with the first remote server machine based on identifying that the first remote server is trusted.Type: GrantFiled: December 13, 2017Date of Patent: August 20, 2019Assignee: eBay Inc.Inventors: Michael Dean Kleinpeter, Raju Venkata Kolluru
-
Patent number: 10382388Abstract: A method comprising: A. forming a consortium blockchain network using domain network nodes and selecting committee members from top-level domain nodes; B. the committee member who received most votes packs the genesis block and generates a random number; C. the housekeeper having the same number as the random number packs the current block and generates a random number for selecting a next housekeeper to pack the next block, each block is approved by more than half of the committee members; D. during the duty cycle, each housekeeper takes turns packing blocks and generating random numbers and the process is repeated. If a block is not approved, the housekeeper with the next number is requested to repack the block; and E. the last random number generated by a housekeeper before the duty cycle ends is used to select the housekeeper to pack the first block of the next duty cycle.Type: GrantFiled: June 5, 2018Date of Patent: August 13, 2019Inventors: Hui Li, Jiangxing Wu, Kejiao Li, Peng Yi, Fusheng Zhu, Ke Xu, Xinchun Zhang, Mengchang Chen, Han Wang, Shisheng Chen, Yiqin Lu, Yunyong Zhang, Jinwu Wei, Shengfei Li, Kedan Li, Huiyao An, Junfeng Ma, Wei Li, Minqian Pu, Kaixuan Xing
-
Patent number: 10366254Abstract: In a transient storage device (TSD) with multiple authentication silos, a host computing device connected to the TSD is configured by the TSD to discover and act upon various types of authentication information in the silos. One or more logical combinations of authentication silos are switched to the authenticated state to grant access to an associated storage area. A particular ordering of authentication silos may be required to achieve a valid combination of authenticated silos. Ordering may be suggested by configuration information in the TSD. Ordering may also be based upon whether or not user input is required for authenticating a given authentication silo, the environment of use of the TSD, or a hierarchy from most trusted to least trusted authentication silo. With this information, the host proceeds with the most efficient authentication sequence leading to a grant of access to the storage area.Type: GrantFiled: July 28, 2015Date of Patent: July 30, 2019Assignee: Microsoft Technology Licensing, LLCInventor: James Bovee
-
Patent number: 10361940Abstract: A system comprises a first computing device including a processor programmed to define a plurality of download slots during a download session, each of the download slots being a predetermined period of time. The processor further selects download slots from the plurality of download slots during which a first amount of data in the download buffer remained greater than or equal to a first predetermined threshold. For each of the selected download slots, the processor determines a first download throughput rate. The processor calculates a session download throughput rate based on the first download throughput rates, and reports the session download throughput rates to a second computing device.Type: GrantFiled: October 2, 2015Date of Patent: July 23, 2019Assignee: Hughes Network Systems, LLCInventors: Vivek Gupta, Zili Qian, Szuyuan Huang
-
Utilizing signatures to discover and manage derelict assets of an information technology environment
Patent number: 10353712Abstract: A set of asset signatures can be analyzed. Each asset signature can be associated with an asset. Derelict assets can be discovered based on the asset signatures. The asset can represent a fundamental structural unit of an information technology (IT) environment. A multi-stage screening process can be performed to discover derelict assets. In a first stage, assets having a normal state are able to be changed to a suspect state based on results of analyzing the corresponding asset signature. In a second stage, assets having a suspect state are able to be selectively changed in state to a normal state or to a derelict state. An asset management system record can be maintained for each of the set of assets. Each record of the asset management system can be a configuration item (CI), which indicates whether each of the set of assets is in a normal state, a suspect state, or a derelict state. The asset management system can periodically reclaim resources consumed by derelict assets.Type: GrantFiled: May 6, 2013Date of Patent: July 16, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Romelia H. Flores, Joseph E. Hackett, Leonard S. Hand -
Patent number: 10348848Abstract: A content delivery network has at least a first tier of servers. A content delivery method includes, at a first server in the first tier of servers, obtaining a request from a client for a resource. If the resource is available at the first server or at a peer of the first server, then the resource is served to the client from the first server. Otherwise, it is determined whether the resource is popular, and if the resource is determined to be popular, then the first server obtains the resource and the first server serves the resource to the client. If the resource is determined not to be popular, the server contacts a second server to obtain the resource, not in the first tier of servers, and the second server provides the resource to the first server. The first server is instructed not to cache the unpopular content.Type: GrantFiled: September 30, 2015Date of Patent: July 9, 2019Assignee: Level 3 Communications, LLCInventors: Christopher Newton, Kevin Johns, William Power
-
Patent number: 10348567Abstract: Techniques and technologies for mapping user identifiers between different device ecosystems are described. In at least some embodiments, a system includes a processing component, a memory, and a mapping engine configured to map a first identifier associated with a user with a second identifier, at least one of the first or second identifiers being associated with a first device ecosystem; and map a third identifier associated with a second device ecosystem with at least one of the first identifier or the second identifier, the second device ecosystem different from the first device ecosystem, based at least partially on (i) a plurality of first co-location occurrences of the third identifier with the first identifier, and (ii) a plurality of second co-location occurrences of the third identifier with the second identifier. The mapping engine may provide an indication of an association of the third identifier with the user.Type: GrantFiled: October 15, 2015Date of Patent: July 9, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Shaoyu Zhou, Tao Di, Shaojian He, Jason Zhu
-
Patent number: 10339298Abstract: Embodiments of the present invention provide a method, system and computer program product for supporting weak password authentication in a multi-user application environment. In an embodiment of the invention, a method for supporting weak password authentication in a multi-user application environment can be provided. The method can include acquiring log in data for a log in attempt by an end user amongst end users in a multi-user application. The method also can include messaging the log in data to others of the end users for subjective analysis by the others of the end users in detecting an unauthorized log in attempt.Type: GrantFiled: August 14, 2016Date of Patent: July 2, 2019Assignee: International Business Machines CorporationInventor: Mary Ellen Zurko
-
Patent number: 10298392Abstract: An entitlement system includes at least two computing devices and a management controller which all include a trusted platform module. Each of the trusted platform modules include a non-volatile storage for storing entitlement records. A management unit of each computing device includes configuration means to enable and disable computing resources of the respective computing device based on entitlement records. The management controller receives ensemble entitlement records in encrypted form and distributes sub-entitlement records in a second encrypted form to the management units of the computing devices.Type: GrantFiled: October 28, 2014Date of Patent: May 21, 2019Assignee: International Business Machines CorporationInventors: Christine Axnix, Jakob C. Lang
-
Patent number: 10268806Abstract: Techniques for ensuring that media playback proceeds sequentially through media content of a digital media asset are disclosed. In one embodiment, distinct portions (e.g., segments) of a digital media asset can be separately encrypted such that on playback decoded data being output from at least one prior portion can be used to derive a cryptographic key that is used in decrypting a subsequent portion of the digital media asset.Type: GrantFiled: July 6, 2015Date of Patent: April 23, 2019Assignee: Apple Inc.Inventors: Aram Lindahl, Bryan J. James
-
Patent number: 10270857Abstract: A computer-implemented method for asynchronous duplexing between two computing devices includes obtaining a task for execution by a first computing device and executing the task. A first computing task completion identifier is assigned upon execution of the task. The task with the assigned first computing task completion identifier is transferred to a second computing device and executed. A second computing task completion identifier is assigned upon execution of the task. The first computing task completion identifier and the second computing task identifier are logged into a task management log for facilitating the recovery of the first computing device by comparing the first computing task completion identifier and the second computing task identifier for identifying tasks executed by the first computing device and requiring execution by the second computing device.Type: GrantFiled: September 30, 2016Date of Patent: April 23, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Neil A. Johnson, Georgette Kurdt, William C. Neiman, Kenneth G. Rothwell, David H. Surman, Jessie Yu
-
Patent number: 10218739Abstract: Methods and apparatus to perform string matching for network packet inspection are disclosed. In some embodiments there is a set of string matching slice circuits, each slice circuit of the set being configured to perform string matching steps in parallel with other slice circuits. Each slice circuit may include an input window storing some number of bytes of data from an input data steam. The input window of data may be padded if necessary, and then multiplied by a polynomial modulo an irreducible Galois-field polynomial to generate a hash index. A storage location of a memory corresponding to the hash index may be accessed to generate a slice-hit signal of a set of H slice-hit signals. The slice-hit signal may be provided to an AND-OR logic array where the set of H slice-hit signals is logically combined into a match result.Type: GrantFiled: February 22, 2016Date of Patent: February 26, 2019Assignee: Intel CorporationInventors: Vinodh Gopal, Christopher F. Clark, Gilbert M. Wolrich, Wajdi K. Feghali
-
Patent number: 10210465Abstract: Equivalent concepts expressed across multiple domains are matched and associated with a metapage generated by a social networking system. User preferences expressed on multiple domains, represented as pages in a social networking system, may be organized by concept and shared with advertisers, third-party developers, and other users using the metapages generated for the concepts. Aggregated social information may be presented to users viewing a page associated with a metapage. Information presented on external websites may be used to link pages across multiple domains with a metapage generated on the social networking system. Information on other external websites associated with the metapage may be presented as links on the pages associated with the metapage. Feedback from users may be used to include or exclude pages from being associated with a generated metapage. A best page for a concept embodied in multiple pages may be determined using a hierarchy of rules.Type: GrantFiled: November 11, 2011Date of Patent: February 19, 2019Assignee: Facebook, Inc.Inventors: Robert William Cathcart, Rafael Linden Sagula, Cameron Alexander Marlow, Jonathan Chang, Siddharth Kar, Eric Sun
-
Patent number: 10205630Abstract: A fault tolerance method is provided for a distributed stream processing system. The method includes: obtaining, by a working node, information of a failed node, and receiving retransmission data sent by an upstream node, where the retransmission data is originally sent by a source node to the failed node; determining, according to the information of the failed node, whether the failed node is related to the working node; and if the failed node is related to the working node, processing the received retransmission data, and sending the processed retransmission data to a downstream node. In the present application, retransmission data sent by an upstream node is received by a working node, and after it is determined that a failed node is related to the working node, the received retransmission data is processed, so that the retransmission data sent by the upstream node is processed only when the failed node is related to the working node.Type: GrantFiled: February 15, 2016Date of Patent: February 12, 2019Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Lujia Pan, Cheng He
-
Patent number: 10187351Abstract: A maintenance method for network connection and a computer system are provided. The method is adapted to a computer system having a timer. The timer is configured to regularly wake up the computer system to check whether a network connection is working normally. In the method, the computer system is waked up at intervals of a first time interval within a predetermined period and a current IP address of the computer system is extracted. The predetermined period is divided into a plurality of periods by the first time interval. Whether a change occurs on the IP address is determined withing each of the periods, and accordingly the computer system is waked up to check the network connection.Type: GrantFiled: June 22, 2017Date of Patent: January 22, 2019Assignee: Acer IncorporatedInventors: Siang-Sheng Jheng, Ching-Ho Tsai, Shu-Chun Liao, Chao-Shih Huang, Yu-Ren Yang
-
Patent number: 10187428Abstract: Disclosed are various embodiments for active data that tracks usage. The active data includes instructions that are executable by a computing device. The computing device is scanned to identify characteristics of the computing device. The characteristics of the computing device are utilized to determine whether the usage of the active data is authorized. Data is transmitted to a network service, including identifying information for the particular computing device and data that identifies a deployment of the active data.Type: GrantFiled: June 9, 2017Date of Patent: January 22, 2019Assignee: Amazon Technologies, Inc.Inventors: Harsha Ramalingam, Dominique Imjya Brezinski, Jesper Mikael Johansson, Jon Arron McClintock, James Connelly Petts
-
Patent number: 10148530Abstract: Aspects of the present invention relate to techniques for providing a user with access to a service provided by a cloud infrastructure system based on an existing service. A user may be provided with a clone subscription based on a base subscription to an existing service provided by the cloud infrastructure system. A clone subscription can provide the user with an environment (e.g., a service) that is designated for one use (e.g., development and testing) different from another use (e.g., production) designed for a base subscription. Changes made to a base subscription may be propagated to the clone subscription based on rules. A clone subscription can be modified to vary the clone configuration independently from the base configuration.Type: GrantFiled: February 17, 2015Date of Patent: December 4, 2018Assignee: Oracle International CorporationInventors: Ramkrishna Chatterjee, Gopalan Arun, Ramesh Vasudevan
-
Patent number: 10116508Abstract: Methods, systems, and computer-readable media with executable instructions stored thereon are provided for applying server profile templates. A method includes providing a user interface (UI) to define a template. The template includes a template identifier, a common configuration, and a list of server profiles which share the common configuration. The method further includes using the UI to create a number of server profiles. The template is applied to server profiles such that changes to the common configuration are replicated across all associated server profiles, including associated server profiles with different physical connections.Type: GrantFiled: May 30, 2012Date of Patent: October 30, 2018Assignee: Hewlett Packard Enterprise Development, LPInventors: Caren Moraes Nichele, Luis Otavio Da Silva Martins, Michelle C. Huang, Julio Cesar Fernandes Correa