Patents by Inventor Brian N. Bershad

Brian N. Bershad has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9762670
    Abstract: In aspect an application may be configured to issue a request to store an object, with the request including an object reference. A delegate may be configured to receive the request to store the object, determine a hosted storage service, from among multiple hosted storage services, and a corresponding access protocol based on the object reference, and store the object in the hosted storage service using the corresponding protocol.
    Type: Grant
    Filed: November 17, 2014
    Date of Patent: September 12, 2017
    Assignee: Google Inc.
    Inventors: Daniel D. Grove, Brian N. Bershad, David Erb
  • Patent number: 9148332
    Abstract: A request to store a data object is received at a hosted storage service. The request includes the data object and an associated object reference. The object reference configured to enable retrieval of the data object from the hosted storage service. The data object is stored at the hosted storage service in association with the object reference. The data object is sent from the hosted storage service to a content delivery network node such that the data object is cached in and retrievable from the content delivery network node using the object reference.
    Type: Grant
    Filed: November 30, 2010
    Date of Patent: September 29, 2015
    Assignee: Google Inc.
    Inventors: Erkki Ville Juhani Aikas, Amit Agarwal, Brian N. Bershad
  • Patent number: 9148283
    Abstract: An encrypted resource is stored in association with an access control list. A request to retrieve the resource is received. The wrapped key and the authentication credentials are sent, from the application server system, to a key server system. An unencrypted version of the resource encryption key is received from the key server system if the key server system determines that the authentication credentials correspond to a user in the group of users identified by the group identifier. The stored encrypted resource is decrypted using the received unencrypted version of the resource encryption key to generate an unencrypted version of the resource. The unencrypted version of the resource is sent, from the application server system, to the client application.
    Type: Grant
    Filed: October 30, 2013
    Date of Patent: September 29, 2015
    Assignee: Google Inc.
    Inventors: Umesh Shankar, Andrei Kulik, Bodo Moller, Sarvar Patel, Brian N. Bershad, David Erb
  • Patent number: 8886907
    Abstract: A first access control list method is stored in a hosted storage system and in association with a storage structure. The first access control list is designed to grant permission to write data objects to the storage structure but not designed to grant permission to read objects from the storage structure. The first access control list grants a first user permission to write data objects to the storage structure. A second access control list is stored in the hosted storage system and in association with a first data object stored in the storage structure. The second access control list is designed to grant permission to read the first data object. The second access control list grants a second user permission to read the first data object.
    Type: Grant
    Filed: May 18, 2011
    Date of Patent: November 11, 2014
    Assignee: Google Inc.
    Inventors: Michael F. Schwartz, David R. Hanson, Brian N. Bershad, David Erb
  • Patent number: 8601263
    Abstract: An encrypted resource is stored in association with an access control list. A request to retrieve the resource is received. The wrapped key and the authentication credentials are sent, from the application server system, to a key server system. An unencrypted version of the resource encryption key is received from the key server system if the key server system determines that the authentication credentials correspond to a user in the group of users identified by the group identifier. The stored encrypted resource is decrypted using the received unencrypted version of the resource encryption key to generate an unencrypted version of the resource. The unencrypted version of the resource is sent, from the application server system, to the client application.
    Type: Grant
    Filed: May 18, 2011
    Date of Patent: December 3, 2013
    Assignee: Google Inc.
    Inventors: Umesh Shankar, Andrei Kulik, Bodo Moller, Sarvar Patel, Brian N. Bershad, David Erb
  • Publication number: 20110289126
    Abstract: A request to store a data object is received at a hosted storage service. The request includes the data object and an associated object reference. The object reference configured to enable retrieval of the data object from the hosted storage service. The data object is stored at the hosted storage service in association with the object reference. The data object is sent from the hosted storage service to a content delivery network node such that the data object is cached in and retrievable from the content delivery network node using the object reference.
    Type: Application
    Filed: November 30, 2010
    Publication date: November 24, 2011
    Applicant: Google Inc.
    Inventors: Erkki Ville Juhani Aikas, Amit Agarwal, Brian N. Bershad
  • Patent number: 6865735
    Abstract: A program or program snippet is rewritten to conform to site-specific properties prior to being executed by a target host. The program or program snippet directed to a target host from a known or unknown source is either intercepted by a server before reaching the target host or can be redirected from the target host to the server to effect its rewriting. The program is parsed in its external representation, converting it to an internal representation that is inspected and analyzed with reference to a site-specific properties database. A summary of the program's properties is then compared to the site-specific properties database by a binary rewriting engine, which produces a rewritten program in an internal representation. If appropriate, the program or program snippet is rewritten to convert it to a format suitable for execution on the target host. Furthermore, certifications may be added to the rewritten program to mark that the rewritten program obeys site-specific constraints.
    Type: Grant
    Filed: October 7, 1998
    Date of Patent: March 8, 2005
    Assignee: University of Washington
    Inventors: Emin Gun Sirer, Brian N. Bershad
  • Patent number: 6327700
    Abstract: A method and system for identifying sets of instructions within a computer program, execution of which serve as an indicator for processing of a transaction by the computer program and that together comprise a witness set. The witness set may be employed to monitor execution of the computer program and detect processing of the transaction. Witness sets are constructed by iteratively filtering an initial set of instructions based on profile data collected during execution of the computer program.
    Type: Grant
    Filed: June 8, 1999
    Date of Patent: December 4, 2001
    Assignee: Appliant Corporation
    Inventors: J. Bradley Chen, Brian N. Bershad
  • Patent number: 6317868
    Abstract: An original software component is modified in accordance with a site's security policy provisions prior to being executed by a component system or computer at the site. The original software component is intercepted by an introspection service running on a server or on the component system prior to execution on the component system. The introspection service analyzes the software component by parsing it, and based on the information it determines, a security policy service instructs an interposition service how to modify the software component so that it conforms to the security policy service requirements. The interposition service thus produces a modified software component by inserting code for security initialization and for imposing security operations on the original component operations.
    Type: Grant
    Filed: October 7, 1998
    Date of Patent: November 13, 2001
    Assignee: University of Washington
    Inventors: Robert Grimm, Brian N. Bershad
  • Patent number: 6014513
    Abstract: A computer software tool used for automatically identifying code portions and data portions of a binary executable software program in which the code portions include machine instructions that are of arbitrary length. Software products are typically distributed as binary, executable files, which comprise a string of binary values. In general, an executable file has no structure or meaning, except as determined by its behavior when dynamically executed, one instruction at a time, by a digital computer. The software tool determines a set of addresses for any known code and data portions. The tool is then used to disassemble machine instructions, beginning at a starting address for each known code portion, to identify the target addresses of other code portions and other data portions. Other sections of the binary executable software program that could be either code or data are then analyzed to identify additionAL code and data portions.
    Type: Grant
    Filed: December 23, 1997
    Date of Patent: January 11, 2000
    Assignee: University of Washington
    Inventors: Geoffrey Michael Voelker, Theodore H. Romer, Alastair Wolman, Dennis Chua Lee, Brian N. Bershad, John Bradley Chen, Henry M. Levy, Wayne Anthony Wong
  • Patent number: 5953534
    Abstract: A method and procedure for modifying modules comprising a binary executable software program in such a way that, despite the transformations performed and the creation of new versions of the modules, the transformed program appears (to that program, including all of its components) as if it is running in the identical environment as the original program. The environment includes environment variables, the name of the program, the names of all of the dynamically loaded library (DLL) files that the program references, the directory in which the program resides, and the current directory at the time the program started execution. When the program has been transformed, e.g., for the purposes of monitoring or measurement, the environment also includes the effective addresses of data and instruction references made by the program.
    Type: Grant
    Filed: December 23, 1997
    Date of Patent: September 14, 1999
    Assignee: University of Washington
    Inventors: Theodore H. Romer, Alastair Wolman, Dennis Chua Lee, Geoffrey Michael Voelker, Brian N. Bershad, John Bradley Chen, Henry M. Levy, Wayne Anthony Wong