Patents by Inventor Alex Robbins
Alex Robbins has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11971954Abstract: One example method includes identifying dissimilar items in a data set. A data set may be walked one or more times and the nodes or vertices of the data set may be scored based on the number of times the nodes are touched during the walks. Scores below a threshold score are determined to be dissimilar nodes in the data set. This allows a diverse set of nodes to be identified. A dissimilar data set may be used to prevent unintentional bias in algorithmic training.Type: GrantFiled: March 12, 2021Date of Patent: April 30, 2024Assignee: EMC IP HOLDING COMPANY LLCInventors: Seth Jacob Rothschild, Alex Robbins, Nicole Reineke
-
Patent number: 11748162Abstract: Techniques for function execution environment selection for a decomposed application are provided. In one example, an apparatus comprises at least one processing platform configured to execute a portion of an application program in a first virtual computing element, wherein the application program comprises one or more portions of marked code, receive a request for execution of one of the one or more portions of marked code, decide whether to execute the portion of marked code identified in the request in the first virtual computing element or in a second virtual computing element, determine an execution environment from one or more execution environments specified in the marked code for the second virtual computing element to execute the marked code, when it is decided to execute the portion of the marked code in the second virtual computing element, and cause the portion of marked code identified in the request to be executed.Type: GrantFiled: January 6, 2020Date of Patent: September 5, 2023Assignee: EMC IP Holding Company LLCInventors: Victor Fong, Xuebin He, James R. King, Alex Robbins, Kenneth Durazzo
-
Patent number: 11664988Abstract: A method for securing a secret of a client using an escrow agent operatively connected to the client includes initiating enrollment of the client with the escrow agent, wherein the enrollment results the escrow agent generating a key pair comprising a public key and a private key, obtaining the public key from the escrow agent, wherein the private key is not shared with the client, encrypting the secret with the public key to obtain an encrypted secret, and storing the encrypted secret on the client.Type: GrantFiled: November 30, 2020Date of Patent: May 30, 2023Assignee: EMC IP HOLDING COMPANY LLCInventors: Seth Jacob Rothschild, Radia Joy Perlman, Alex Robbins
-
Publication number: 20230061761Abstract: One example method includes collecting an audio segment that includes audio data generated by a user, analyzing the audio data to identify an emotion expressed by the user, computing start and end indices of a video segment, selecting video data that shows the emotion expressed by the user, using the video data and the start and end indices of the video segment to modify a face of the user as the face appears in the video segment so as to generate modified face frames, and stitching the modified face frames into the video segment to create a modified video segment with the emotion expressed by the user, and the modified video segment includes the audio data generated by the user.Type: ApplicationFiled: August 27, 2021Publication date: March 2, 2023Inventors: Seth Jacob Rothschild, Alex Robbins
-
Publication number: 20230027741Abstract: One example method includes capturing audio data at a client engine while outputting an output video, the output video being based upon an original video stored at the client engine, delivering the captured audio data to a prediction engine upon the captured audio data being captured for a pre-determined time, receiving from the prediction engine substitute frame data used by the client engine to stitch one or more frames into the original video stored at the client engine, and following stitching the one or more frames into the output video to generate an altered output video, outputting the captured audio data and the altered video from the client engine.Type: ApplicationFiled: July 21, 2021Publication date: January 26, 2023Inventors: Seth Jacob Rothschild, Alex Robbins
-
Patent number: 11553159Abstract: One example method includes capturing audio data at a client engine while outputting an output video, the output video being based upon an original video stored at the client engine, delivering the captured audio data to a prediction engine upon the captured audio data being captured for a pre-determined time, receiving from the prediction engine substitute frame data used by the client engine to stitch one or more frames into the original video stored at the client engine, and following stitching the one or more frames into the output video to generate an altered output video, outputting the captured audio data and the altered video from the client engine.Type: GrantFiled: July 21, 2021Date of Patent: January 10, 2023Assignee: EMC IP HOLDING COMPANY LLCInventors: Seth Jacob Rothschild, Alex Robbins
-
Publication number: 20220414165Abstract: One example method includes crawling data included in a dataset, based on the crawling of the data, creating and/or obtaining metadata concerning the data, crawling the metadata and obtaining information about a data change event involving the data, based on the crawling of the metadata, creating a meta label that documents occurrence of the data change event, and associating the meta label with the metadata. An analysis of the data, metadata, and meta label, may be performed and a trigger generated based on the analysis.Type: ApplicationFiled: June 29, 2021Publication date: December 29, 2022Inventors: Alex Robbins, Akshaya Khare, Nicole Reineke
-
Patent number: 11509468Abstract: A method for verifying a secret decryption of an escrow agent by a client operatively connected to the escrow agent includes initiating enrollment of the client with the escrow agent, wherein the enrollment results the escrow agent generating a key pair comprising a public key and a private key, obtaining the public key from the escrow agent, wherein the private key is not shared with the client, encrypting the secret with the public key to obtain an encrypted secret, after encrypting the secret, encrypting, based on a verification trigger, a verification value using the public key to obtain an encrypted verification value, sending the encrypted verification value to the escrow agent, obtaining a secret decryption response from the escrow agent, making a determination, based on the secret decryption response, that the escrow agent is not capable of decrypting the secret, and based on the determination, performing a remediation action.Type: GrantFiled: January 28, 2021Date of Patent: November 22, 2022Assignee: EMC IP HOLDING COMPANY LLCInventors: Seth Jacob Rothschild, Radia Joy Perlman, Alex Robbins
-
Publication number: 20220292305Abstract: One example method includes identifying dissimilar items in a data set. A data set may be walked one or more times and the nodes or vertices of the data set may be scored based on the number of times the nodes are touched during the walks. Scores below a threshold score are determined to be dissimilar nodes in the data set. This allows a diverse set of nodes to be identified. A dissimilar data set may be used to prevent unintentional bias in algorithmic training.Type: ApplicationFiled: March 12, 2021Publication date: September 15, 2022Inventors: Seth Jacob Rothschild, Alex Robbins, Nicole Reineke
-
Publication number: 20220239504Abstract: A method for verifying a secret decryption of an escrow agent by a client operatively connected to the escrow agent includes initiating enrollment of the client with the escrow agent, wherein the enrollment results the escrow agent generating a key pair comprising a public key and a private key, obtaining the public key from the escrow agent, wherein the private key is not shared with the client, encrypting the secret with the public key to obtain an encrypted secret, after encrypting the secret, encrypting, based on a verification trigger, a verification value using the public key to obtain an encrypted verification value, sending the encrypted verification value to the escrow agent, obtaining a secret decryption response from the escrow agent, making a determination, based on the secret decryption response, that the escrow agent is not capable of decrypting the secret, and based on the determination, performing a remediation action.Type: ApplicationFiled: January 28, 2021Publication date: July 28, 2022Inventors: Seth Jacob Rothschild, Radia Joy Perlman, Alex Robbins
-
Publication number: 20220173903Abstract: A method for securing a secret of a client using an escrow agent operatively connected to the client includes initiating enrollment of the client with the escrow agent, wherein the enrollment results the escrow agent generating a key pair comprising a public key and a private key, obtaining the public key from the escrow agent, wherein the private key is not shared with the client, encrypting the secret with the public key to obtain an encrypted secret, and storing the encrypted secret on the client.Type: ApplicationFiled: November 30, 2020Publication date: June 2, 2022Inventors: Seth Jacob Rothschild, Radia Joy Perlman, Alex Robbins
-
Publication number: 20220123919Abstract: A system in one embodiment comprises a first endpoint device that is configured to communicate with a second endpoint device using a given communication protocol. The first endpoint device is configured to monitor a communication session under the given communication protocol and to generate monitoring data associated with the communication session. The first endpoint device is configured to determine that a designated network condition has occurred based at least in part on the monitoring data. The first endpoint device is configured to activate a performance monitoring component based at least in part on the determination that the designated network condition has occurred and to generate performance data utilizing the activated performance monitoring component. The first endpoint device is configured to anonymize and store the performance data.Type: ApplicationFiled: December 29, 2021Publication date: April 21, 2022Inventors: Kathleen Moriarty, Amy Seibel, Alex Robbins, Benjamin Santaus
-
Patent number: 11218294Abstract: A system in one embodiment comprises a first endpoint device that is configured to communicate with a second endpoint device using a given communication protocol. The first endpoint device is configured to monitor a communication session under the given communication protocol and to generate monitoring data associated with the communication session. The first endpoint device is configured to determine that a designated network condition has occurred based at least in part on the monitoring data. The first endpoint device is configured to activate a performance monitoring component based at least in part on the determination that the designated network condition has occurred and to generate performance data utilizing the activated performance monitoring component. The first endpoint device is configured to anonymize and store the performance data.Type: GrantFiled: January 10, 2020Date of Patent: January 4, 2022Assignee: EMC IP Holding Company LLCInventors: Kathleen Moriarty, Amy Seibel, Alex Robbins, Benjamin Santaus
-
Publication number: 20210218551Abstract: A system in one embodiment comprises a first endpoint device that is configured to communicate with a second endpoint device using a given communication protocol. The first endpoint device is configured to monitor a communication session under the given communication protocol and to generate monitoring data associated with the communication session. The first endpoint device is configured to determine that a designated network condition has occurred based at least in part on the monitoring data. The first endpoint device is configured to activate a performance monitoring component based at least in part on the determination that the designated network condition has occurred and to generate performance data utilizing the activated performance monitoring component. The first endpoint device is configured to anonymize and store the performance data.Type: ApplicationFiled: January 10, 2020Publication date: July 15, 2021Inventors: Kathleen Moriarty, Amy Seibel, Alex Robbins, Benjamin Santaus
-
Publication number: 20210208941Abstract: Techniques for function execution environment selection for a decomposed application are provided. In one example, an apparatus comprises at least one processing platform configured to execute a portion of an application program in a first virtual computing element, wherein the application program comprises one or more portions of marked code, receive a request for execution of one of the one or more portions of marked code, decide whether to execute the portion of marked code identified in the request in the first virtual computing element or in a second virtual computing element, determine an execution environment from one or more execution environments specified in the marked code for the second virtual computing element to execute the marked code, when it is decided to execute the portion of the marked code in the second virtual computing element, and cause the portion of marked code identified in the request to be executed.Type: ApplicationFiled: January 6, 2020Publication date: July 8, 2021Inventors: Victor Fong, Xuebin He, James R. King, Alex Robbins, Kenneth Durazzo
-
Patent number: 11030066Abstract: Techniques for dynamic decomposition of an application executing in a computing environment are provided. For example, an apparatus comprises at least one processing platform comprising one or more processing devices. The at least one processing platform is configured to execute a portion of an application program in a first virtual computing element, wherein the application program comprises one or more portions of marked code, receive a request for execution of one of the one or more portions of marked code, decide whether to execute the portion of marked code identified in the request in the first virtual computing element or in a second virtual computing element, and cause the portion of marked code identified in the request to be executed in the second virtual computing element, when it is decided to execute the portion of the marked code in the second virtual computing element.Type: GrantFiled: October 30, 2019Date of Patent: June 8, 2021Assignee: EMC IP Holding Company LLCInventors: Xuebin He, Alex Robbins, James R. King, Amy Seibel, Victor Fong
-
Publication number: 20210133066Abstract: Techniques for dynamic decomposition of an application executing in a computing environment are provided. For example, an apparatus comprises at least one processing platform comprising one or more processing devices. The at least one processing platform is configured to execute a portion of an application program in a first virtual computing element, wherein the application program comprises one or more portions of marked code, receive a request for execution of one of the one or more portions of marked code, decide whether to execute the portion of marked code identified in the request in the first virtual computing element or in a second virtual computing element, and cause the portion of marked code identified in the request to be executed in the second virtual computing element, when it is decided to execute the portion of the marked code in the second virtual computing element.Type: ApplicationFiled: October 30, 2019Publication date: May 6, 2021Inventors: Xuebin He, Alex Robbins, James R. King, Amy Seibel, Victor Fong