Patents by Inventor Jason A. Shepherd

Jason A. Shepherd has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11741211
    Abstract: One example method includes receiving authorization from a human user to collect data concerning an interaction of the human user with a computing element, interacting with the human user, collecting data concerning the interaction, analyzing the collected data, generating trust and confidence information, concerning the human user, based on analysis of the collected data, and storing the trust and confidence information.
    Type: Grant
    Filed: October 25, 2019
    Date of Patent: August 29, 2023
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Stephen James Todd, Jason A. Shepherd
  • Patent number: 11599522
    Abstract: Hardware trust boundaries in a data confidence fabric are provided. Nodes in a data confidence fabric are provisioned with identifies and confidence scores. Hardware-based trust insertion technologies are applied to data in the data confidence fabric. Protocols allow nodes to join the data confidence fabric and be aware of other nodes. Paths of data can be graphed and audited.
    Type: Grant
    Filed: October 29, 2019
    Date of Patent: March 7, 2023
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Stephen James Todd, Jason A. Shepherd, Gaurav Chawla, Aurelian Dumitru, Jimmy Doyle Pike
  • Patent number: 11516243
    Abstract: A trust broker is disclosed for a data confidence fabric. The trust broker evaluates the trustworthiness of data flowing through a network that includes a data confidence fabric. The trust broker evaluates a baseline confidence score and generates a workorder to improve the baseline confidence score in a measurable way. The trust broker may implement the workorder and ensure that the trust improves in the data confidence fabric.
    Type: Grant
    Filed: January 31, 2020
    Date of Patent: November 29, 2022
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Stephen J. Todd, Jason A. Shepherd
  • Patent number: 11438359
    Abstract: One example method includes deploying a group of bots in a computing environment that includes a group of nodes, each of the bots having an associated attack vector with respect to one or more of the nodes, receiving, from each of the bots, a report that identifies a node attacked by that bot, and a result of the attack, and adjusting, based on the bot reports, a confidence score of one or more of the attacked nodes.
    Type: Grant
    Filed: October 25, 2019
    Date of Patent: September 6, 2022
    Assignee: EMC IP Holding Comapny LLC
    Inventors: Stephen James Todd, Jason A. Shepherd
  • Patent number: 11388147
    Abstract: A method for managing data includes obtaining, by an indirection logic service, a data request for data, wherein the data request specifies a ledger entry, identifying an indirection logic entry stored in the indirection logic service based on the ledger entry, obtaining a selection of trust data from a client, wherein the ledger entry comprises metadata of the trust data, and initiating communication between the client and a local trust manager based on the selection of trust data, wherein the trust data was generated by the local trust manager.
    Type: Grant
    Filed: January 31, 2020
    Date of Patent: July 12, 2022
    Assignee: EMC IP Holding Company LLC
    Inventors: Stephen James Todd, Jason A. Shepherd, Jimmy Doyle Pike, Aurelian Dumitru, Gaurav Chawla
  • Patent number: 11310272
    Abstract: In general, in one aspect, the invention relates to a method for managing data, the method includes performing, by a data confidence fabric (DCF) node, a trust operation with a remote DCF node, updating, based on the trust operation, a trust level associated with the remote DCF node to obtain an updated trust level, integrating, based on the updated trust level, the remote DCF node into a DCF processing path to obtain a second DCF processing path, wherein the DCF processing path comprises the DCF node, and processing data using the second DCF processing path.
    Type: Grant
    Filed: October 28, 2019
    Date of Patent: April 19, 2022
    Assignee: EMC IP Holding Company LLC
    Inventors: Stephen James Todd, Jason A. Shepherd
  • Patent number: 11294734
    Abstract: In general, in one aspect, the invention relates to a method for managing data, the method includes obtaining, by a data management system, a first resource usage of a local data system associated with a first data confidence fabric (DCF) pipeline, wherein the first DCF pipeline is associated with a first workload, obtaining second resource usage of the local data system associated with a second DCF pipeline, wherein the second DCF pipeline is associated with a second workload, analyzing the first resource usage and the second resource usage to obtain a workload ranking, and performing an action set based on the workload ranking.
    Type: Grant
    Filed: October 28, 2019
    Date of Patent: April 5, 2022
    Assignee: EMC IP Holding Company LLC
    Inventors: Stephen James Todd, Jason A. Shepherd
  • Publication number: 20210304065
    Abstract: Aspects of annotating data are disclosed. As data is ingested to a data confidence fabric, analytic values, which includes tags or annotations, are attached to or associated with the data by an analytic insertion mechanism. The analytic values allow the data to be used by applications including machine learning algorithms immediately. Feedback from the applications allow the analytic insertion mechanism to improve and generate more valuable analytic values and to generate higher confidence scores for the analytic values.
    Type: Application
    Filed: March 31, 2020
    Publication date: September 30, 2021
    Inventors: Stephen J. Todd, Aurelian Dumitru, Jason A. Shepherd
  • Publication number: 20210306819
    Abstract: One example method includes determining a spatial distribution of devices in a three dimensional physical environment, determining a polling frequency for each of the devices, receiving data generated by the devices, evaluating the data, and assigning a trust score to the data. The devices may take the form of respective sensors operable to sense a physical attribute of the three dimensional physical environment. A Fourier transform may be employed to determine the polling frequency.
    Type: Application
    Filed: March 30, 2020
    Publication date: September 30, 2021
    Inventors: Stephen J. Todd, Marina Levina, Jason A. Shepherd
  • Patent number: 11108891
    Abstract: A social overlay is provided that allows an application to seek human input when performing high-risk decisions. The overlay allows an application to obtain data confidence scores when performing operations and to obtain human confidence scores that can be used to seek input from users with high confidence scores. This allows applications to improve performance and avoid situations where an automated application may make a wrong decision that does not account for the associated risk.
    Type: Grant
    Filed: March 31, 2020
    Date of Patent: August 31, 2021
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Stephen J. Todd, Jason A. Shepherd
  • Publication number: 20210243218
    Abstract: A trust broker is disclosed for a data confidence fabric. The trust broker evaluates the trustworthiness of data flowing through a network that includes a data confidence fabric. The trust broker evaluates a baseline confidence score and generates a workorder to improve the baseline confidence score in a measurable way. The trust broker may implement the workorder and ensure that the trust improves in the data confidence fabric.
    Type: Application
    Filed: January 31, 2020
    Publication date: August 5, 2021
    Inventors: Stephen J. Todd, Jason A. Shepherd
  • Publication number: 20210243167
    Abstract: A method for managing data includes obtaining, by an indirection logic service, a data request for data, wherein the data request specifies a ledger entry, identifying an indirection logic entry stored in the indirection logic service based on the ledger entry, obtaining a selection of trust data from a client, wherein the ledger entry comprises metadata of the trust data, and initiating communication between the client and a local trust manager based on the selection of trust data, wherein the trust data was generated by the local trust manager.
    Type: Application
    Filed: January 31, 2020
    Publication date: August 5, 2021
    Inventors: Stephen James Todd, Jason A. Shepherd, Jimmy Doyle Pike, Aurelian Dumitru, Gaurav Chawla
  • Patent number: 11044308
    Abstract: Techniques are provided for dynamic communication protocol control in a communication environment. For example, a request is sent by a given processing node of a plurality of processing nodes to a computing system. Each of the plurality of processing nodes is operatively coupled to the computing system. Each of at least a subset of the plurality of processing nodes is configured to communicate via at least a first communication protocol with which each of the subset of the plurality of processing nodes share bandwidth. The request seeks usage of a given amount of additional bandwidth associated with the first communication protocol by the given processing node from one or more of the subset of processing nodes. One or more of the subset of processing nodes can then decide to cede the additional bandwidth to the given processing node and convert to using another communication protocol.
    Type: Grant
    Filed: April 29, 2019
    Date of Patent: June 22, 2021
    Assignee: EMC IP Holding Company LLC
    Inventors: Stephen J. Todd, Jason A. Shepherd
  • Patent number: 11032399
    Abstract: A compute node currently operating within a given computing environment and currently enabled to support at least a first communication protocol obtains one or more instructions for enabling the compute node to support a second communication protocol. In response to the one or more instructions, one or more configuration parameters associated with the compute node are automatically reconfigured to support the second communication protocol. An automatic determination is made, in the given computing environment within which the compute node currently operates, whether or not to certify the compute node for the second communication protocol.
    Type: Grant
    Filed: December 14, 2018
    Date of Patent: June 8, 2021
    Assignee: EMC IP Holding Company LLC
    Inventors: Stephen J. Todd, Jason A. Shepherd
  • Publication number: 20210126935
    Abstract: One example method includes deploying a group of bots in a computing environment that includes a group of nodes, each of the bots having an associated attack vector with respect to one or more of the nodes, receiving, from each of the bots, a report that identifies a node attacked by that bot, and a result of the attack, and adjusting, based on the bot reports, a confidence score of one or more of the attacked nodes.
    Type: Application
    Filed: October 25, 2019
    Publication date: April 29, 2021
    Inventors: Stephen James Todd, Jason A. Shepherd
  • Publication number: 20210124817
    Abstract: One example method includes receiving authorization from a human user to collect data concerning an interaction of the human user with a computing element, interacting with the human user, collecting data concerning the interaction, analyzing the collected data, generating trust and confidence information, concerning the human user, based on analysis of the collected data, and storing the trust and confidence information.
    Type: Application
    Filed: October 25, 2019
    Publication date: April 29, 2021
    Inventors: Stephen James Todd, Jason A. Shepherd
  • Publication number: 20210124728
    Abstract: Hardware trust boundaries in a data confidence fabric are provided. Nodes in a data confidence fabric are provisioned with identifies and confidence scores. Hardware-based trust insertion technologies are applied to data in the data confidence fabric. Protocols allow nodes to join the data confidence fabric and be aware of other nodes. Paths of data can be graphed and audited.
    Type: Application
    Filed: October 29, 2019
    Publication date: April 29, 2021
    Inventors: Stephen James Todd, Jason A. Shepherd, Gaurav Chawla, Aurelian Dumitru, Jimmy Doyle Pike
  • Patent number: 10977055
    Abstract: In general, in one aspect, the invention relates to a method for managing data. The method includes obtaining, by a local data manager, a first data confidence fabric (DCF) configuration file, where the first DCF configuration file is associated with a first DCF pipeline and a first workload. The method further includes registering the first DCF pipeline in a DCF pipeline registry, obtaining a data set, identifying the first DCF pipeline using the DCF pipeline registry, and processing the data set based on the first DCF pipeline to obtain first processed data.
    Type: Grant
    Filed: October 28, 2019
    Date of Patent: April 13, 2021
    Assignee: EMC IP Holding Company LLC
    Inventors: Stephen James Todd, Jason A. Shepherd
  • Publication number: 20210034382
    Abstract: In general, in one aspect, the invention relates to a method for managing data. The method includes obtaining, by a local data manager, a first data confidence fabric (DCF) configuration file, where the first DCF configuration file is associated with a first DCF pipeline and a first workload. The method further includes registering the first DCF pipeline in a DCF pipeline registry, obtaining a data set, identifying the first DCF pipeline using the DCF pipeline registry, and processing the data set based on the first DCF pipeline to obtain first processed data.
    Type: Application
    Filed: October 28, 2019
    Publication date: February 4, 2021
    Inventors: Stephen James Todd, Jason A. Shepherd
  • Publication number: 20210037056
    Abstract: In general, in one aspect, the invention relates to a method for managing data, the method includes performing, by a data confidence fabric (DCF) node, a trust operation with a remote DCF node, updating, based on the trust operation, a trust level associated with the remote DCF node to obtain an updated trust level, integrating, based on the updated trust level, the remote DCF node into a DCF processing path to obtain a second DCF processing path, wherein the DCF processing path comprises the DCF node, and processing data using the second DCF processing path.
    Type: Application
    Filed: October 28, 2019
    Publication date: February 4, 2021
    Inventors: Stephen James Todd, Jason A. Shepherd