Patents by Inventor Jacob A. Rothschild
Jacob A. Rothschild has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12182285Abstract: A data encryption, decryption, and storage method includes: receiving a first query request to retrieve a production data; obtaining a constructed data and encrypting the constructed data using the production data to obtain an encrypted constructed data where the encrypted constructed data is generated without including metadata specifying an access list specifying one or more users and types of users that are able to access the encrypted constructed data; and generating decryption instructions using the production data and storing the decryption instructions with the encrypted constructed data.Type: GrantFiled: June 21, 2022Date of Patent: December 31, 2024Assignee: Dell Products L.P.Inventors: Seth Jacob Rothschild, Michael Thomas Krużewski
-
Publication number: 20240305638Abstract: A method for managing access to a web-based service includes obtaining, by an intermediate service manager and from a managing client, credentials for a managing account associated with the web-based service and an access condition of accessing the web-based service by a second account to the intermediate service manager, obtaining a request, by an accessing client associated with the second account, for accessing the web-based service using the managing account, and based on the request and the access condition, communicating with the web-based service to create a session with the web-based service, and providing access to site data of the session via a user interface and based on the access condition.Type: ApplicationFiled: March 7, 2023Publication date: September 12, 2024Inventors: Seth Jacob Rothschild, Radia Joy Perlman
-
Publication number: 20240303225Abstract: Techniques described herein relate to a method for managing user device users. The method includes, in response to obtaining a subuser account creation request: obtaining subuser arguments from a user of a user device specifying: a folder of a user file system, and a subuser; generating a subuser account for the subuser and setting subuser permissions based on the subuser arguments; generating a snapshot of the folder; updating a version control directory in the folder with the snapshot; removing the version control directory from the folder; associating user configuration files to the subuser account; and initiating subuser access of the folder based on the subuser permissions and the user configuration files, wherein the subuser is allowed to make modifications to at least one file included in the folder using the subuser account.Type: ApplicationFiled: March 9, 2023Publication date: September 12, 2024Inventors: Seth Jacob Rothschild, Benjamin Edward Santaus
-
Publication number: 20240256681Abstract: One example method includes receiving, by a policy layer from a webapp, user information and a database request that identifies a database, obtaining, by the policy layer, information identifying database access rights for a user who transmitted the database request to the webapp, generating, by the policy layer, a credential for the user, and returning, by the policy layer, the credential to either the user or to the webapp. The user may then use the credential to access the database.Type: ApplicationFiled: January 26, 2023Publication date: August 1, 2024Inventors: Seth Jacob Rothschild, Rana Afifi
-
Publication number: 20240248803Abstract: One example method includes detecting a file access process, such as a write operation performed by a ransomware process, directed to a file, based on the detecting, incrementing a counter, checking to determine if the counter exceeds a defined threshold, and when the counter exceeds the defined threshold, creating a backup of the file. The backup file may be a read-only file, and may expire, and be deleted, at a particular time, or after the passage of a period of time.Type: ApplicationFiled: January 25, 2023Publication date: July 25, 2024Inventors: Seth Jacob Rothschild, Farida Shafik
-
Patent number: 12026139Abstract: One example method includes identifying a column of a table, and the column includes multiple entries, setting a proposed uniqueness for the column, setting a confidence tolerance for the proposed uniqueness, estimating a sub-sample size for the column based on the proposed uniqueness and the confidence tolerance, based on the sub-sample size, sampling a subset of the entries in the column and, based on the sampling, determining whether or not the column is a primary key for the table.Type: GrantFiled: June 13, 2022Date of Patent: July 2, 2024Assignee: DELL PRODUCTS L.P.Inventors: Seth Jacob Rothschild, Brendan Burns Healy, Akshaya Khare, Kranti Uppala
-
Patent number: 11971954Abstract: One example method includes identifying dissimilar items in a data set. A data set may be walked one or more times and the nodes or vertices of the data set may be scored based on the number of times the nodes are touched during the walks. Scores below a threshold score are determined to be dissimilar nodes in the data set. This allows a diverse set of nodes to be identified. A dissimilar data set may be used to prevent unintentional bias in algorithmic training.Type: GrantFiled: March 12, 2021Date of Patent: April 30, 2024Assignee: EMC IP HOLDING COMPANY LLCInventors: Seth Jacob Rothschild, Alex Robbins, Nicole Reineke
-
Publication number: 20240020359Abstract: A user-trusted executable execution environment is disclosed. Using a trusted application, an executable that is generally untrusted by a computing environment, can be verified and executed. A signed executable is signed by a sending trust engine and transmitted to a receiving trust engine. The receiving trust engine can verify the executable when a public key of a sending user decrypts the signed executable and when a hash generated by the receiving trust engine matches a hash of the executable included in the signed executable. The verification is finalized when the receiving user knows the sending user and confirms that the sending user sent the signed executable by using the sending user's public key to decrypt the signed executable.Type: ApplicationFiled: July 15, 2022Publication date: January 18, 2024Inventors: Benjamin Santaus, Seth Jacob Rothschild
-
Publication number: 20230409722Abstract: A data encryption, decryption, and storage method includes: receiving a first query request to retrieve a production data; obtaining a constructed data and encrypting the constructed data using the production data to obtain an encrypted constructed data where the encrypted constructed data is generated without including metadata specifying an access list specifying one or more users and types of users that are able to access the encrypted constructed data; and generating decryption instructions using the production data and storing the decryption instructions with the encrypted constructed data.Type: ApplicationFiled: June 21, 2022Publication date: December 21, 2023Inventors: Seth Jacob Rothschild, Michael Thomas Kruzewski
-
Publication number: 20230401188Abstract: One example method includes identifying a column of a table, and the column includes multiple entries, setting a proposed uniqueness for the column, setting a confidence tolerance for the proposed uniqueness, estimating a sub-sample size for the column based on the proposed uniqueness and the confidence tolerance, based on the sub-sample size, sampling a subset of the entries in the column and, based on the sampling, determining whether or not the column is a primary key for the table.Type: ApplicationFiled: June 13, 2022Publication date: December 14, 2023Inventors: Seth Jacob Rothschild, Brendan Burns Healy, Akshaya Khare, Kranti Uppala
-
Patent number: 11770412Abstract: One example method includes logging into websites through devices including insecure devices. A logon device may store credentials. The logon device is configured to connect with an insecure device and then communicate with a website for authentication purposes without exposing a user's credentials to the insecure device. After the user is authenticated, the session is transferred to the insecure device.Type: GrantFiled: January 28, 2021Date of Patent: September 26, 2023Assignee: EMC IP HOLDING COMPANY LLCInventors: Seth Jacob Rothschild, Benjamin Santaus, Orlando Xavier Nieves, Radia J. Perlman
-
Patent number: 11664988Abstract: A method for securing a secret of a client using an escrow agent operatively connected to the client includes initiating enrollment of the client with the escrow agent, wherein the enrollment results the escrow agent generating a key pair comprising a public key and a private key, obtaining the public key from the escrow agent, wherein the private key is not shared with the client, encrypting the secret with the public key to obtain an encrypted secret, and storing the encrypted secret on the client.Type: GrantFiled: November 30, 2020Date of Patent: May 30, 2023Assignee: EMC IP HOLDING COMPANY LLCInventors: Seth Jacob Rothschild, Radia Joy Perlman, Alex Robbins
-
Publication number: 20230061761Abstract: One example method includes collecting an audio segment that includes audio data generated by a user, analyzing the audio data to identify an emotion expressed by the user, computing start and end indices of a video segment, selecting video data that shows the emotion expressed by the user, using the video data and the start and end indices of the video segment to modify a face of the user as the face appears in the video segment so as to generate modified face frames, and stitching the modified face frames into the video segment to create a modified video segment with the emotion expressed by the user, and the modified video segment includes the audio data generated by the user.Type: ApplicationFiled: August 27, 2021Publication date: March 2, 2023Inventors: Seth Jacob Rothschild, Alex Robbins
-
Publication number: 20230027741Abstract: One example method includes capturing audio data at a client engine while outputting an output video, the output video being based upon an original video stored at the client engine, delivering the captured audio data to a prediction engine upon the captured audio data being captured for a pre-determined time, receiving from the prediction engine substitute frame data used by the client engine to stitch one or more frames into the original video stored at the client engine, and following stitching the one or more frames into the output video to generate an altered output video, outputting the captured audio data and the altered video from the client engine.Type: ApplicationFiled: July 21, 2021Publication date: January 26, 2023Inventors: Seth Jacob Rothschild, Alex Robbins
-
Patent number: 11550696Abstract: One example method includes evaluating code of a quantum circuit, estimating one or more runtime statistics concerning the code, generating a recommendation based on the one or more runtime statistics, and the recommendation identifies one or more resources recommended to be used to execute the quantum circuit, checking availability of the resources for executing the quantum circuit, allocating resources, when available, sufficient to execute the quantum circuit, and using the allocated resources to execute the quantum circuit.Type: GrantFiled: June 30, 2020Date of Patent: January 10, 2023Assignee: EMC IP Holding Company LLCInventors: Kenneth Durazzo, Seth Jacob Rothschild, Victor Fong
-
Patent number: 11553159Abstract: One example method includes capturing audio data at a client engine while outputting an output video, the output video being based upon an original video stored at the client engine, delivering the captured audio data to a prediction engine upon the captured audio data being captured for a pre-determined time, receiving from the prediction engine substitute frame data used by the client engine to stitch one or more frames into the original video stored at the client engine, and following stitching the one or more frames into the output video to generate an altered output video, outputting the captured audio data and the altered video from the client engine.Type: GrantFiled: July 21, 2021Date of Patent: January 10, 2023Assignee: EMC IP HOLDING COMPANY LLCInventors: Seth Jacob Rothschild, Alex Robbins
-
Patent number: 11509468Abstract: A method for verifying a secret decryption of an escrow agent by a client operatively connected to the escrow agent includes initiating enrollment of the client with the escrow agent, wherein the enrollment results the escrow agent generating a key pair comprising a public key and a private key, obtaining the public key from the escrow agent, wherein the private key is not shared with the client, encrypting the secret with the public key to obtain an encrypted secret, after encrypting the secret, encrypting, based on a verification trigger, a verification value using the public key to obtain an encrypted verification value, sending the encrypted verification value to the escrow agent, obtaining a secret decryption response from the escrow agent, making a determination, based on the secret decryption response, that the escrow agent is not capable of decrypting the secret, and based on the determination, performing a remediation action.Type: GrantFiled: January 28, 2021Date of Patent: November 22, 2022Assignee: EMC IP HOLDING COMPANY LLCInventors: Seth Jacob Rothschild, Radia Joy Perlman, Alex Robbins
-
Patent number: 11489824Abstract: Techniques are provided for automated key management for accessing remote devices using single sign-on techniques. One method comprises maintaining a data record identifying target user devices that a given source user device is authorized to access; and initiating storage of a public key of the given source user device in a file of at least one target user device, wherein the given source user device accesses the at least one target user device using a secure remote connection protocol based on the public key of the given source user device stored in the file of the at least one target user device. The data record may further comprise a fingerprint of a key of the at least one target user device, and the method may further comprise comparing a fingerprint of the key returned by the at least one target user device to the fingerprint of the key obtained from the data record.Type: GrantFiled: May 29, 2020Date of Patent: November 1, 2022Assignee: EMC IP Holding Company LLCInventors: Alex John Robbins, Seth Jacob Rothschild
-
Publication number: 20220292305Abstract: One example method includes identifying dissimilar items in a data set. A data set may be walked one or more times and the nodes or vertices of the data set may be scored based on the number of times the nodes are touched during the walks. Scores below a threshold score are determined to be dissimilar nodes in the data set. This allows a diverse set of nodes to be identified. A dissimilar data set may be used to prevent unintentional bias in algorithmic training.Type: ApplicationFiled: March 12, 2021Publication date: September 15, 2022Inventors: Seth Jacob Rothschild, Alex Robbins, Nicole Reineke
-
Publication number: 20220272267Abstract: System and methods for live signal adjustment of a moveable camera are provided. In one embodiment, a method includes receiving a raw image associated with the moveable camera associated with a vehicle mirror. The method includes receiving a rotation input to change a position of a reflective surface of the vehicle mirror. The method includes identifying a first component of the second position of the reflective surface based on a first component sensor. The method includes identifying a second component of the second position of the reflective surface based on a second component sensor. The method includes determining cropping parameters based on a shape of the reflective surface, the first component, and the second component. The method includes generating an adjusted cropped image by cropping the raw image based on the cropping parameters. The method includes displaying the adjusted cropped image on a display in response to the rotation input.Type: ApplicationFiled: February 19, 2021Publication date: August 25, 2022Inventors: Oscar A. Caraan, Troy A. Thompson, Jacob A. Rothschild