Patents by Inventor Ezekiel Kruglick

Ezekiel Kruglick has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150362969
    Abstract: Technologies are generally described for systems, devices and methods effective to generate a message that may be sent to a social network. Power information from an electronic device may be detected by a power detector and received by a processor. For example, a power consumption profile of an appliance may be detected. The processor may classify the power information to produce descriptive data. For example, the processor may determine that an oven has been turned on for a period of time. The processor may generate the message by applying one or more rules to the descriptive data. For example, the processor may generate a message relating to consumption of dinner based on the determination that the oven has been turned on.
    Type: Application
    Filed: March 18, 2014
    Publication date: December 17, 2015
    Inventor: EZEKIEL KRUGLICK
  • Publication number: 20150365300
    Abstract: Technologies are generally described to send distributed user interface elements to a customer. In some examples, a virtualization server may receive an application to be provided to a customer. The virtualization server may separate the application into multiple user interface elements and encapsulate each user interface element with virtualization components for individual delivery to the customer. Subsequently, the virtualization server may then forward the encapsulated element(s) to one or more customer devices.
    Type: Application
    Filed: October 7, 2013
    Publication date: December 17, 2015
    Inventor: Ezekiel Kruglick
  • Patent number: 9215085
    Abstract: Technologies are presented for a method and a system that is configured to receive a topology description of an existing customer deployment and a set of achieved performance metrics at a current datacenter and iterate simulations using policy settings across available service levels to find settings that match or exceed the achieved performance levels. Customer specifications may be received in a standardized format along with measured performance so that settings can be derived from fundamental simulation. The resulting simulations may be used to generate a menu of options and their performance automatically for a customer and that information may be provided to a configuration manager when the customer chooses a setup.
    Type: Grant
    Filed: January 19, 2012
    Date of Patent: December 15, 2015
    Assignee: Empire Technology Development LLC
    Inventor: Ezekiel Kruglick
  • Patent number: 9213844
    Abstract: Technologies are generally described for providing a system that allows data use clients direct access to perform complex analysis on data assets without compromising the assets by sharing the data contained may set up the data assets in virtual datacenters (VDCs) within a physical datacenter and open additional resources within the VDCs to data use clients. The data use clients may be enabled to upload and execute analysis applications with access to valuable data. Data traffic exiting the VDCs through such applications, however, may be controlled by a supervisor that analysis an output and enforces limitations on content and/or volume based on a level of purchased access.
    Type: Grant
    Filed: August 25, 2011
    Date of Patent: December 15, 2015
    Assignee: EMPIRE TECHNOLOGY DEVELOPMENT LLC
    Inventor: Ezekiel Kruglick
  • Publication number: 20150358411
    Abstract: Technologies are generally described to redirect data from application sandboxes to datacenters. In some examples, an application operating in an application sandbox may exchange data with an application data store, such as a file or a directory, also located in the sandbox. The data store may then exchange data with a datacenter at a particular geographic locale over a network connection established by a sandbox data servicer module. The network connection may be periodically updated to connect the data store with different datacenters at different geographic locales based on geographic information associated with the application, a device on which the application executes, the datacenters, and/or the exchanged data.
    Type: Application
    Filed: October 22, 2013
    Publication date: December 10, 2015
    Inventor: Ezekiel Kruglick
  • Publication number: 20150358190
    Abstract: In some examples, data to be transmitted by a transmit node to at least one receive node may be compressed according to one or more sets of compression parameters. One or more estimated peak to average power ratios (PAPRs) to transmit one or more resulting versions of compressed data may be calculated based on precoder data associated with the at least one receive node. A version of the compressed data that has an estimated PAPR that is less than a PAPR threshold value may be sent to the transmit node to transmit to the at least one receive node. Alternately, a version of the compressed data that has an estimated PAPR that is a lowest estimated PAPR relative to at least some other estimated PAPRs corresponding to other versions of the compressed data may be sent to the transmit node to transmit to the at least one receive node.
    Type: Application
    Filed: June 5, 2014
    Publication date: December 10, 2015
    Applicant: Empire Technology Development LLC
    Inventors: Ezekiel Kruglick, Kevin S. Fine
  • Patent number: 9207963
    Abstract: Technologies are presented for a network/hypervisor approach to maintain a stable and separate network address for the hypervisor on a multi-tenant system and changeable network addresses for the virtual machines (VMs). In some examples, the VM addresses may be decoupled from the domain address for the hypervisor so they can be changed arbitrarily and independently without impacting command messaging, and the domain address for the hypervisor may not form a part of the delivery chain for messages to the VMs. The system may also consume only the same number of IP addresses as currently used.
    Type: Grant
    Filed: February 1, 2012
    Date of Patent: December 8, 2015
    Assignee: Empire Technology Development LLC
    Inventor: Ezekiel Kruglick
  • Patent number: 9210051
    Abstract: Technologies are presented for providing compound certificates via a certificate intermediary. In some examples, a certificate intermediary may generate a compound certificate that captures the certified behavior of an application and its underlying sub-services without revealing the identities of the sub-services for providing to a customer. The certificate intermediary may receive individual certificates from a certification authority. In other examples, the certification authority may generate the compound certificate, or the certificate intermediary may act as the certification authority for at least a portion of the sub-services.
    Type: Grant
    Filed: September 12, 2012
    Date of Patent: December 8, 2015
    Assignee: Empire Technology Development LLC
    Inventor: Ezekiel Kruglick
  • Publication number: 20150347286
    Abstract: Technologies are described for health monitoring using snapshot backups through test vectors. In some examples, health of an application deployed at a datacenter may be monitored and key metrics recorded in the metadata of progressive backup snapshots of an instance of the application such that warning metrics can be reviewed retrospectively upon failure of the instance and a snapshot can be automatically selected for restoration of the application instance based on lack of high incidence of suspect metric values. Moreover, an operating state associated with snapshot backups may be assessed as the snapshots are captured and selected ones with operating conditions desired as part of a test suite may be saved for use as test scenarios. In particular, state information from added or existing deployment monitoring may be used by a test logic process to evaluate whether each snapshot is needed for testing scenarios.
    Type: Application
    Filed: June 3, 2013
    Publication date: December 3, 2015
    Inventor: Ezekiel Kruglick
  • Publication number: 20150350239
    Abstract: Technologies are generally provided for a system to enhance security and prevent side channel attacks of targeted functions. Side channel attacks assume that the targeted functions operate at same speed each time, and observe timing data of the targeted functions to glean secure information. According to some examples, an enhanced security system may alter a processing speed of one or more subunits of a processor executing the targeted function(s) to transparently change an instantaneous performance of the processor in an unpredictable manner. The performance time of the targeted function(s) may thereby be randomized. A virtual machine manager (VMM) may identify a security risk for a targeted function, and trigger one or more subunits of the processor to operate at a reduced frequency. After completion of the targeted function, the subunits may be returned to a default performance speed.
    Type: Application
    Filed: December 12, 2013
    Publication date: December 3, 2015
    Inventor: Ezekiel Kruglick
  • Publication number: 20150347760
    Abstract: Technologies are provided to automatically vary a structure of a netlist computation arranged to configure a field programmable gate array (FPGA). In an example scenario, an FPGA netlist may be received from a client to configure the FPGA. A perturbation generator may be activated in response to a detection of one or more security risk factors associated with the netlist. The netlist may be altered through schemes designed to repair one or more FPGAs. The repair schemes may be used to repair the FPGAs to work around failed cells and failed sub-cells. The perturbation generator may produce a false map of failed cells. The false map may be used to generate different timings and different intermediate values associated with the netlist to generate an alternate netlist. The alternate netlist may be used to configure the FPGA to prevent side channel attacks.
    Type: Application
    Filed: June 3, 2014
    Publication date: December 3, 2015
    Applicant: Empire Technology Development LLC
    Inventor: Ezekiel Kruglick
  • Publication number: 20150350227
    Abstract: Technologies are generally described for mitigation of a convergence attack in a network portion that includes multiple nodes interconnected by links in a closed configuration. In some examples, the attack may be detected by a detection module of an attack mitigation system in response to a determination that received average time to live (TTL) values of data packets are substantially decreased over the multiple nodes of the network portion. An identification module of the system may identify one or more potential attack links causing the attack, and generate a list from the potential attack links. The identification module may iterate the list across the potential attack links to gather traffic statistics of the network portion, and determine one or more attack links based on the traffic statistics. User-specific data traffic throttling to the attack links may then be enforced by a throttling module of the system to mitigate the attack.
    Type: Application
    Filed: May 29, 2014
    Publication date: December 3, 2015
    Applicant: EMPIRE TECHNOLOGY DEVELOPMENT LLC
    Inventor: Ezekiel Kruglick
  • Publication number: 20150347051
    Abstract: Technologies are generally described for systems, devices and methods effective to accelerate memory access. A memory unit, including a memory and a programmable circuit, may be in communication with a processor executing a virtual machine. The memory unit may receive from the processor, a request to configure the programmable circuit in accordance with a program. The program may be associated with the virtual machine. The programmable circuit may be configured in accordance with the program. The programmable circuit may then be operated to perform one or more operations on data in the memory.
    Type: Application
    Filed: May 10, 2013
    Publication date: December 3, 2015
    Applicant: EMPIRE TECHNOLOGY DEVELOPMENT, LLC
    Inventor: EZEKIEL KRUGLICK
  • Publication number: 20150350716
    Abstract: Technologies are generally described for a system to process a collection of video recordings of a scene to extract and localize audio sources for the audio data. According to some examples, video recordings captured by mobile devices from different perspectives may be uploaded to a central database. Video segments capturing an overlapping portion of the scene at an overlapping time may be identified, and a relative location of each of the video capturing devices may be determined. Audio data for the video segments may be indexed with a sub-frame time reference and relative locations as a function of overlapping time. Using the indices that include the sub-frame time references and relative locations, audio sources for the audio data may be extracted and localized. The extracted audio sources may be transcribed and indexed to enable searching, and may be added back to each video recording as a separate audio channel.
    Type: Application
    Filed: December 9, 2013
    Publication date: December 3, 2015
    Inventor: Ezekiel Kruglick
  • Publication number: 20150347386
    Abstract: In some examples, a computing system may receive a plurality of string matching requests with respect to a plurality of data streams, and determine one or more opportunities for aggregation of string matching.
    Type: Application
    Filed: June 2, 2014
    Publication date: December 3, 2015
    Applicant: Empire Technology Development LLC
    Inventor: Ezekiel KRUGLICK
  • Publication number: 20150349953
    Abstract: Technologies are provided for shared secret generation between a server and a client using cached data. In some examples, a server may send a number of encrypted secrets to a client that caches a number of data blocks previously provided by the server. Each of the encrypted secrets may be encrypted using a data block that may or may not be cached at the client. The client may then identify the encrypted secrets that correspond to data blocks in its cache and use those data blocks to recover those secrets. The client may then encrypt a message for the server using the recovered secrets. Upon reception of the message, the server may then recover the message using its knowledge of the data blocks cached at the client.
    Type: Application
    Filed: February 6, 2014
    Publication date: December 3, 2015
    Inventor: Ezekiel Kruglick
  • Publication number: 20150350900
    Abstract: Technologies are generally described for a system to establish a secure connection between a wireless device and another device or a recognized service using device network records. According to some examples, the wireless device may send an authentication request to initiate a communication session with another wireless or a recognized service. The authentication request may be encrypted with a first secret, or a hash, synthesized by the device based on the network records associated with the device. The device may be authenticated using the network's copy of the network records. The network may similarly authenticate the identity of the recognized service or other device. The network may synthesize a second secret based on the network records, and may provide the second secret to the recognized service or other device to enable a communication session secured by the second secret.
    Type: Application
    Filed: October 25, 2013
    Publication date: December 3, 2015
    Applicant: Empire Technology Development LLC
    Inventor: Ezekiel Kruglick
  • Patent number: 9201970
    Abstract: Techniques described herein generally relate to real time inference based systems. Example embodiments may set forth devices, methods, and computer programs related to search engine inference based virtual assistance. One example method may include a computing device adapted to receive text as input and a computer processor arranged to determine at least one inference regarding subject matter of the text based on one or more web searches of one or more terms within the text. The inference(s) may then be automatically displayed upon the inference(s) being determined. The text may be automatically received as input from a voice-to-text converter as voice-to-text conversion producing the text is occurring.
    Type: Grant
    Filed: June 17, 2013
    Date of Patent: December 1, 2015
    Assignee: EMPIRE TECHNOLOGY DEVELOPMENT LLC
    Inventor: Ezekiel Kruglick
  • Patent number: 9204362
    Abstract: Implementations and techniques for routing communications in wireless communication networks via mains-connected relay nodes are generally disclosed.
    Type: Grant
    Filed: November 3, 2010
    Date of Patent: December 1, 2015
    Assignee: Empire Technology Development LLC
    Inventor: Ezekiel Kruglick
  • Patent number: 9200271
    Abstract: Methods, systems, and articles for selective three dimensional (3D) biopatterning are disclosed. A biological target may be imaged and a selected area of the image may define a desired pattern for guiding the emission of EM radiation into the biological target. Two or more groups of photosensitive elements responsive to different activation wavelengths may be provided. The photosensitive elements may be selectively activated on or within the biological target based on location and activation wavelength in order to guide cell differentiation, adhesion of growth factors to a scaffold, release of growth factors, and/or deletion of cells.
    Type: Grant
    Filed: February 3, 2011
    Date of Patent: December 1, 2015
    Assignee: EMPIRE TECHNOLOGY DEVELOPMENT LLC
    Inventor: Ezekiel Kruglick