Patents by Inventor Aaron Torres
Aaron Torres has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230179414Abstract: A method implemented in a computing system hosting a three-dimensional virtual reality world. The computer system stores a set of searchable records, each having: a searchable hash of at least a portion of personally identifiable information; and an encrypted identity, decryptable using an encryption key generated based at least in part on the searchable hash and a global key. In response to a search request identifying at least a portion of personally identifiable information as a search criterion, the computer system generates a hash of the search criterion, and finds a matching searchable record that has a searchable hash equal to the hash computed from the search criterion. An encryption key is computed based on the global key and the matched searchable record to decrypt an encrypted identity of a user having at least the portion of personally identifiable information that is the search criterion in the search request.Type: ApplicationFiled: January 31, 2023Publication date: June 8, 2023Inventors: Nicolas J. Scheiblauer, Aaron Torres, Christopher Allen Nowell
-
Patent number: 11582038Abstract: A method implemented in a computing system hosting a three-dimensional virtual reality world. The computer system stores a set of searchable records, each having: a searchable hash of at least a portion of personally identifiable information; and an encrypted identity, decryptable using an encryption key generated based at least in part on the searchable hash and a global key. In response to a search request identifying at least a portion of personally identifiable information as a search criterion, the computer system generates a hash of the search criterion, and finds a matching searchable record that has a searchable hash equal to the hash computed from the search criterion. An encryption key is computed based on the global key and the matched searchable record to decrypt an encrypted identity of a user having at least the portion of personally identifiable information that is the search criterion in the search request.Type: GrantFiled: March 26, 2021Date of Patent: February 14, 2023Assignee: Tilia LLCInventors: Nicolas J. Scheiblauer, Aaron Torres, Christopher Allen Nowell
-
Patent number: 11080196Abstract: Techniques are provided for pattern-aware prefetching using a parallel log-structured file system. At least a portion of one or more files is accessed by detecting at least one pattern in a non-sequential access of the one or more files; and obtaining at least a portion of the one or more files based on the detected at least one pattern. The obtaining step comprises, for example, a prefetching or pre-allocation of the at least the portion of the one or more files. A prefetch cache can store the portion of the one or more obtained files. The cached portion of the one or more files can be provided from the prefetch cache to an application requesting the at least a portion of the one or more files.Type: GrantFiled: December 17, 2019Date of Patent: August 3, 2021Assignees: EMC IP Holding Company LLC, Triad National Security, LLCInventors: John M. Bent, Sorin Faibish, Gary Grider, Aaron Torres, Jun He
-
Publication number: 20210224421Abstract: A method implemented in a computing system hosting a three-dimensional virtual reality world. The computer system collects personally identifiable information of users of accounts, where each account in the accounts is identified by an account identifier and each data field of personally identifiable information of each account is identified by a data field identifier. The system uses a script function to generate an encryption key from the global key, the account identifier, and the data field identifier specifically for the content of the data field of the personally identifiable information of the respective account. Different encryption keys are used for different data fields and different accounts. Encrypted content of a data field is stored at a random location; and the identification of the random location is stored in a device, database or system, separate from where the encrypted contents of the data fields of the accounts are stored.Type: ApplicationFiled: April 5, 2021Publication date: July 22, 2021Inventors: Nicolas J. Scheiblauer, Aaron Torres, Landon Oakes McDowell, Christopher Allen Nowell
-
Publication number: 20210218569Abstract: A method implemented in a computing system hosting a three-dimensional virtual reality world. The computer system stores a set of searchable records, each having: a searchable hash of at least a portion of personally identifiable information; and an encrypted identity, decryptable using an encryption key generated based at least in part on the searchable hash and a global key. In response to a search request identifying at least a portion of personally identifiable information as a search criterion, the computer system generates a hash of the search criterion, and finds a matching searchable record that has a searchable hash equal to the hash computed from the search criterion. An encryption key is computed based on the global key and the matched searchable record to decrypt an encrypted identity of a user having at least the portion of personally identifiable information that is the search criterion in the search request.Type: ApplicationFiled: March 26, 2021Publication date: July 15, 2021Inventors: Nicolas J. Scheiblauer, Aaron Torres, Christopher Allen Nowell
-
Patent number: 10970416Abstract: A method implemented in a computing system hosting a three-dimensional virtual reality world. The computer system collects personally identifiable information of users of accounts, where each account in the accounts is identified by an account identifier and each data field of personally identifiable information of each account is identified by a data field identifier. The system uses a scrypt function to generate an encryption key from the global key, the account identifier, and the data field identifier specifically for the content of the data field of the personally identifiable information of the respective account. Different encryption keys are used for different data fields and different accounts. Encrypted content of a data field is stored at a random location; and the identification of the random location is stored in a device, database or system, separate from where the encrypted contents of the data fields of the accounts are stored.Type: GrantFiled: August 8, 2019Date of Patent: April 6, 2021Assignee: WOOKEY Search Technologies CorporationInventors: Nicolas J. Scheiblauer, Aaron Torres, Landon Oakes McDowell, Christopher Allen Nowell
-
Patent number: 10965458Abstract: A method implemented in a computing system hosting a three-dimensional virtual reality world. The computer system stores a set of searchable records, each having: a searchable hash of at least a portion of personally identifiable information; and an encrypted identity, decryptable using an encryption key generated based at least in part on the searchable hash and a global key. In response to a search request identifying at least a portion of personally identifiable information as a search criterion, the computer system generates a hash of the search criterion, and finds a matching searchable record that has a searchable hash equal to the hash computed from the search criterion. An encryption key is computed based on the global key and the matched searchable record to decrypt an encrypted identity of a user having at least the portion of personally identifiable information that is the search criterion in the search request.Type: GrantFiled: September 27, 2019Date of Patent: March 30, 2021Assignee: WOOKEY Search Technologies CorporationInventors: Nicolas J. Scheiblauer, Aaron Torres, Christopher Allen Nowell
-
Publication number: 20200125493Abstract: Techniques are provided for pattern-aware prefetching using a parallel log-structured file system. At least a portion of one or more files is accessed by detecting at least one pattern in a non-sequential access of the one or more files; and obtaining at least a portion of the one or more files based on the detected at least one pattern. The obtaining step comprises, for example, a prefetching or pre-allocation of the at least a portion of the one or more files. A prefetch cache can store the portion of the one or more obtained files. The cached portion of the one or more files can be provided from the prefetch cache to an application requesting the at least a portion of the one or more files.Type: ApplicationFiled: December 17, 2019Publication date: April 23, 2020Inventors: John M. Bent, Sorin Faibish, Gary Grider, Aaron Torres, Jun He
-
Patent number: 10558618Abstract: A computer-executable method, system, and computer program product for managing a Parallel-Logged File System (PLFS) on a data storage system, wherein the data storage system is in communication with an application that updates the data storage system with checkpoint data, the computer-executable method, system, and computer program product comprising receiving a first checkpoint including data from the application; analyzing the data in the first checkpoint to determine whether a pattern exists in the checkpoint data; and upon a positive determination, adding the pattern into PLFS.Type: GrantFiled: September 30, 2013Date of Patent: February 11, 2020Assignees: EMC IP Holding Company LLC, Triad National Security, LLCInventors: John M. Bent, Sorin Faibish, Zhenhua Zhang, Jun He, Aaron Torres, Gary Grider
-
Publication number: 20200028680Abstract: A method implemented in a computing system hosting a three-dimensional virtual reality world. The computer system stores a set of searchable records, each having: a searchable hash of at least a portion of personally identifiable information; and an encrypted identity, decryptable using an encryption key generated based at least in part on the searchable hash and a global key. In response to a search request identifying at least a portion of personally identifiable information as a search criterion, the computer system generates a hash of the search criterion, and finds a matching searchable record that has a searchable hash equal to the hash computed from the search criterion. An encryption key is computed based on the global key and the matched searchable record to decrypt an encrypted identity of a user having at least the portion of personally identifiable information that is the search criterion in the search request.Type: ApplicationFiled: September 27, 2019Publication date: January 23, 2020Inventors: Nicolas J. Scheiblauer, Aaron Torres, Christopher Allen Nowell
-
Publication number: 20190362098Abstract: A method implemented in a computing system hosting a three-dimensional virtual reality world. The computer system collects personally identifiable information of users of accounts, where each account in the accounts is identified by an account identifier and each data field of personally identifiable information of each account is identified by a data field identifier. The system uses a scrypt function to generate an encryption key from the global key, the account identifier, and the data field identifier specifically for the content of the data field of the personally identifiable information of the respective account. Different encryption keys are used for different data fields and different accounts. Encrypted content of a data field is stored at a random location; and the identification of the random location is stored in a device, database or system, separate from where the encrypted contents of the data fields of the accounts are stored.Type: ApplicationFiled: August 8, 2019Publication date: November 28, 2019Inventors: Nicolas J. Scheiblauer, Aaron Torres, Landon Oakes McDowell, Christopher Allen Nowell
-
Patent number: 10476674Abstract: A method implemented in a computing system hosting a three-dimensional virtual reality world. The computer system stores a set of searchable records, each having: a searchable hash of at least a portion of personally identifiable information; and an encrypted identity, decryptable using an encryption key generated based at least in part on the searchable hash and a global key. In response to a search request identifying at least a portion of personally identifiable information as a search criterion, the computer system generates a hash of the search criterion, and finds a matching searchable record that has a searchable hash equal to the hash computed from the search criterion. An encryption key is computed based on the global key and the matched searchable record to decrypt an encrypted identity of a user having at least the portion of personally identifiable information that is the search criterion in the search request.Type: GrantFiled: May 18, 2017Date of Patent: November 12, 2019Assignee: LINDEN RESEARCH, INC.Inventors: Nicolas J. Scheiblauer, Aaron Torres, Christopher Allen Nowell
-
Patent number: 10410015Abstract: A method implemented in a computing system hosting a three-dimensional virtual reality world. The computer system collects personally identifiable information of users of accounts, where each account in the accounts is identified by an account identifier and each data field of personally identifiable information of each account is identified by a data field identifier. The system uses a scrypt function to generate an encryption key from the global key, the account identifier, and the data field identifier specifically for the content of the data field of the personally identifiable information of the respective account. Different encryption keys are used for different data fields and different accounts. Encrypted content of a data field is stored at a random location; and the identification of the random location is stored in a device, database or system, separate from where the encrypted contents of the data fields of the accounts are stored.Type: GrantFiled: May 18, 2017Date of Patent: September 10, 2019Assignee: LINDEN RESEARCH, INC.Inventors: Nicolas J. Scheiblauer, Aaron Torres, Landon Oakes McDowell, Christopher Allen Nowell
-
Patent number: 10375164Abstract: Parallel storage systems are provided with a burst buffer appliance for storage of a partitioned key-value store across a plurality of storage tiers. The burst buffer appliance is configured to store key-value data on first and second storage tiers comprising respective disjoint subsets of storage. One or more servers in the partitioned key-value store provide (i) an interface between one or more local key-value stores and one or more additional storage architectures, and/or (ii) a key value interface that provides access to at least one hardware key-value store. The local key-values are optionally sorted both locally by the local store and globally by the overall MDHIM framework. The local and global sorting can be leveraged to provide batch input/output (IO) operations that aggregate multiple requests into batch operations on one or more sorted ranges.Type: GrantFiled: December 30, 2013Date of Patent: August 6, 2019Assignees: EMC Corporation, Triad National Security, LLC, UT-Battelle, LLCInventors: John M. Bent, Sorin Faibish, Gary Grider, Aaron Torres, Stephen W. Poole
-
Patent number: 10313438Abstract: Partitioned key-value stores with one-sided communications are provided for secondary global key lookup by range-knowledgeable clients. A secondary global lookups is performed in a partitioned key-value store by receiving a request from an application for a secondary global key; accessing metadata to identify a first server storing the secondary global key; instructing the identified first server to store a first value corresponding to the requested secondary global key into a memory address of the client; and returning program control to the application, wherein the first server identifies a primary key corresponding to the requested secondary global key and instructs a second server storing the corresponding primary key to store a second value corresponding to the primary key into the memory address of the client. The second server stores the second value corresponding to the primary key into the first memory address of the client.Type: GrantFiled: December 30, 2013Date of Patent: June 4, 2019Assignees: EMC Corporation, Triad National Security, LLC, UT-Battelle, LLCInventors: John M. Bent, Sorin Faibish, Gary Grider, Aaron Torres, Stephen W. Poole
-
Patent number: 10262000Abstract: Techniques are provided for globally appending data from a group of distributed processes to a shared file using a log-structured file system. Data generated by a plurality of processes in a parallel computing system are appended to a shared file by storing the data to the shared file using a log-structured file system (such as a Parallel Log-Structured File System (PLFS)); and generating an index entry for the data, the index entry comprising a logical offset entry and a timestamp entry indicating a time of the storage, wherein the logical offset entry is resolved at read time. The logical offset entry can be populated with an append placeholder that is resolved when the shared file is read. At read time, a plurality of the index entries associated with the shared file can be sorted using the timestamp entry to deliver the requested shared file to a requesting application.Type: GrantFiled: June 19, 2013Date of Patent: April 16, 2019Assignees: EMC Corporation, Los Alamos National Security, LLCInventors: John M. Bent, Sorin Faibish, Gary Grider, Aaron Torres
-
Publication number: 20180336366Abstract: A method implemented in a computing system hosting a three-dimensional virtual reality world. The computer system collects personally identifiable information of users of accounts, where each account in the accounts is identified by an account identifier and each data field of personally identifiable information of each account is identified by a data field identifier. The system uses a scrypt function to generate an encryption key from the global key, the account identifier, and the data field identifier specifically for the content of the data field of the personally identifiable information of the respective account. Different encryption keys are used for different data fields and different accounts. Encrypted content of a data field is stored at a random location; and the identification of the random location is stored in a device, database or system, separate from where the encrypted contents of the data fields of the accounts are stored.Type: ApplicationFiled: May 18, 2017Publication date: November 22, 2018Inventors: Nicolas J. Scheiblauer, Aaron Torres, Landon Oakes McDowell, Christopher Allen Nowell
-
Publication number: 20180337778Abstract: A method implemented in a computing system hosting a three-dimensional virtual reality world. The computer system stores a set of searchable records, each having: a searchable hash of at least a portion of personally identifiable information; and an encrypted identity, decryptable using an encryption key generated based at least in part on the searchable hash and a global key. In response to a search request identifying at least a portion of personally identifiable information as a search criterion, the computer system generates a hash of the search criterion, and finds a matching searchable record that has a searchable hash equal to the hash computed from the search criterion. An encryption key is computed based on the global key and the matched searchable record to decrypt an encrypted identity of a user having at least the portion of personally identifiable information that is the search criterion in the search request.Type: ApplicationFiled: May 18, 2017Publication date: November 22, 2018Inventors: Nicolas J. Scheiblauer, Aaron Torres, Christopher Allen Nowell
-
Patent number: 9811545Abstract: A sparse file is stored without holes by storing a data portion of the sparse file using a parallel log-structured file system; and generating an index entry for the data portion, the index entry comprising a logical offset, physical offset and length of the data portion. The holes can be restored to the sparse file upon a reading of the sparse file. The data portion can be stored at a logical end of the sparse file. Additional storage efficiency can optionally be achieved by (i) detecting a write pattern for a plurality of the data portions and generating a single patterned index entry for the plurality of the patterned data portions; and/or (ii) storing the patterned index entries for a plurality of the sparse files in a single directory, wherein each entry in the single directory comprises an identifier of a corresponding sparse file.Type: GrantFiled: June 19, 2013Date of Patent: November 7, 2017Assignees: EMC IP Holding Company LLC, Los Alamos National Security, LLCInventors: John M. Bent, Sorin Faibish, Gary Grider, Aaron Torres
-
Patent number: 9767107Abstract: Improved techniques are provided for storing metadata associated with a plurality of sub-files associated with a single shared file in a parallel file system. The shared file is generated by a plurality of applications executing on a plurality of compute nodes. A compute node implements a Parallel Log Structured File System (PLFS) library to store at least one portion of the shared file generated by an application executing on the compute node and metadata for the at least one portion of the shared file on one or more object storage servers. The compute node is also configured to implement a partitioned data store for storing a partition of the metadata for the shared file, wherein the partitioned data store communicates with partitioned data stores on other compute nodes using a message passing interface. The partitioned data store can be implemented, for example, using Multidimensional Data Hashing Indexing Middleware (MDHIM).Type: GrantFiled: June 29, 2013Date of Patent: September 19, 2017Assignees: EMC IP Holding Company LLC, Los Alamos National Security, LLCInventors: John M. Bent, Sorin Faibish, Gary Grider, Aaron Torres