Patents by Inventor John W. Bates
John W. Bates has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11797519Abstract: Techniques for proving authenticity of data files, such as digital photos. An authentication/indexing server content from a client device such as a mobile device, and generates or receives other related data such as a reference to the content object, a fingerprint for the content object, and other metadata indicating for example a timestamp related to the content object. The fingerprint is inserted into a distributed ledger, with the distributed ledger returning a ledger address. A manifest object containing the transaction object, the ledger address, and a list of the content object and, optionally, related edits is then created and stored. The server may index fingerprints. Thus, a fingerprint can be used to authenticate subsequently received object against the stored metadata.Type: GrantFiled: June 19, 2019Date of Patent: October 24, 2023Assignee: Attestiv Inc.Inventors: John W. Bates, Thomas Mark Morley, Emmanuel Parasirakis, Nicos Vekiarides
-
Patent number: 11709823Abstract: A digital asset is represented and verified as a set of related digital asset or other content objects. Related metadata is stored on an immutable distributed ledger separately from the content objects themselves. For example, a transaction object includes metadata such as identifiers for two or more content objects, fingerprints for the content objects. The content objects may be stored in a local or cloud object repository. Validation of a later identified content object may include determining a fingerprint for the later identified content object, mapping that fingerprint to an address within the immutable distributed ledger to retrieve metadata previously mapped, and comparing the two fingerprints. Visual validation may be provided when the first and second fingerprints match, such as by displaying a positive icon adjacent the later identified object.Type: GrantFiled: September 9, 2021Date of Patent: July 25, 2023Assignee: Attestiv Inc.Inventors: John W. Bates, Thomas Mark Morley, Emmanuel Parasirakis, Nicos Vekiarides
-
Patent number: 11328095Abstract: Techniques for authenticating digital media asset, and particularly to verifying the authenticity of digital image or video files which may have been redacted or otherwise altered in some way. The approach, which we call perceptual video fingerprinting, compares media assets based on what humans perceive, rather than exactly which bits match, by using neural network algorithms.Type: GrantFiled: January 7, 2020Date of Patent: May 10, 2022Assignee: Attestiv Inc.Inventor: John W. Bates
-
Publication number: 20220100736Abstract: A digital asset is represented and verified as a set of related digital asset or other content objects. Related metadata is stored on an immutable distributed ledger separately from the content objects themselves. For example, a transaction object includes metadata such as identifiers for two or more content objects, fingerprints for the content objects. The content objects may be stored in a local or cloud object repository. Validation of a later identified content object may include determining a fingerprint for the later identified content object, mapping that fingerprint to an address within the immutable distributed ledger to retrieve metadata previously mapped, and comparing the two fingerprints. Visual validation may be provided when the first and second fingerprints match, such as by displaying a positive icon adjacent the later identified object.Type: ApplicationFiled: September 9, 2021Publication date: March 31, 2022Inventors: John W. Bates, Thomas Mark Morley, Emmanuel Parasirakis, Nicos Vekiarides
-
Patent number: 11120013Abstract: A digital asset is represented and verified as a set of related digital asset or other content objects. Related metadata is stored on an immutable distributed ledger separately from the content objects themselves. For example, a transaction object includes metadata such as identifiers for two or more content objects, fingerprints for the content objects. The content objects may be stored in a local or cloud object repository. Validation of a later identified content object may include determining a fingerprint for the later identified content object, mapping that fingerprint to an address within the immutable distributed ledger to retrieve metadata previously mapped, and comparing the two fingerprints. Visual validation may be provided when the first and second fingerprints match, such as by displaying a positive icon adjacent the later identified object.Type: GrantFiled: June 19, 2019Date of Patent: September 14, 2021Assignee: Attestiv Inc.Inventors: John W. Bates, Thomas Mark Morley, Emmanuel Parasirakis, Nicos Vekiarides
-
Publication number: 20210209256Abstract: Techniques for authenticating digital media asset, and particularly to verifying the authenticity of digital image or video files which may have been redacted or otherwise altered in some way. The approach, which we call perceptual video fingerprinting, compares media assets based on what humans perceive, rather than exactly which bits match, by using neural network algorithms.Type: ApplicationFiled: January 7, 2020Publication date: July 8, 2021Inventor: John W. Bates
-
Publication number: 20200012806Abstract: Techniques for proving authenticity of data files, such as digital photos. An authentication/indexing server content from a client device such as a mobile device, and generates or receives other related data such as a reference to the content object, a fingerprint for the content object, and other metadata indicating for example a timestamp related to the content object. The fingerprint is inserted into a distributed ledger, with the distributed ledger returning a ledger address. A manifest object containing the transaction object, the ledger address, and a list of the content object and, optionally, related edits is then created and stored. The server may index fingerprints. Thus, a fingerprint can be used to authenticate subsequently received object against the stored metadata.Type: ApplicationFiled: June 19, 2019Publication date: January 9, 2020Inventors: John W. Bates, Thomas Mark Morley, Emmanuel Parasirakis, Nicos Vekiarides
-
Publication number: 20190391972Abstract: A digital asset is represented and verified as a set of related digital asset or other content objects. Related metadata is stored on an immutable distributed ledger separately from the content objects themselves. For example, a transaction object includes metadata such as identifiers for two or more content objects, fingerprints for the content objects. The content objects may be stored in a local or cloud object repository. Validation of a later identified content object may include determining a fingerprint for the later identified content object, mapping that fingerprint to an address within the immutable distributed ledger to retrieve metadata previously mapped, and comparing the two fingerprints. Visual validation may be provided when the first and second fingerprints match, such as by displaying a positive icon adjacent the later identified object.Type: ApplicationFiled: June 19, 2019Publication date: December 26, 2019Inventors: John W. Bates, Thomas Mark Morley, Emmanuel Parasirakis, Nicos Vekiarides
-
Patent number: 10481962Abstract: A method for assessing the risk and cost for data loss and disaster recovery (DR) plans includes providing an application having a graphical user interface (GUI) comprising first and second windows arranged adjacent to each other. The first window comprises a catalog of components used to generate data disaster recovery (DR) configurations and the second window displays the generated DR configurations. A first DR configuration is generated in the second window and components are added to the first DR configuration by dragging and dropping components from the catalog into appropriate locations of the second window. Metrics for the first DR configuration are calculated and reported in the second window. A second configuration is also similarly generated in the second window and the metrics results are graphically compared to each other.Type: GrantFiled: May 28, 2009Date of Patent: November 19, 2019Assignee: EMC IP Holding Company LLCInventors: John W. Bates, Nicos Vekiarides, Brian Geisel
-
Patent number: 10459806Abstract: A cloud storage replica of a production device is created and asynchronously updated. A snap, clone or portion of the replica is copied to a cloud gateway in a failover situation. Access to replica images may be obtained via other cloud gateways.Type: GrantFiled: April 19, 2017Date of Patent: October 29, 2019Assignee: EMC IP HOLDING COMPANY LLCInventors: Xiali He, John W. Bates, Slavik Neymer, Arieh Don
-
Patent number: 10154112Abstract: A cloud storage gateway is used to migrate a volume from a source cloud storage provider to a target cloud storage provider. If necessary, the gateway reconfigures the size of a logical cache associated with local storage devices so that the entire volume can be stored locally. Flushing is disabled and all of the locally stored volume pages are marked as dirty. After compression and encryption policies associated with the source and target are verified to be compatible, flushing is enabled and metadata is updated.Type: GrantFiled: February 11, 2015Date of Patent: December 11, 2018Assignee: EMC IP HOLDING COMPANY LLCInventors: Michael D. Anthony, John W. Bates, Nicos A. Vekiarides, David King
-
Patent number: 9836244Abstract: A system for resource sharing across multi-cloud storage arrays includes a plurality of storage arrays and a cloud array storage (CAS) application. The plurality of storage resources are distributed in one or more cloud storage arrays, and each storage resource comprises a unique object identifier that identifies location and structure of the corresponding storage resource at a given point-in-time. The cloud array storage (CAS) application manages the resource sharing process by first taking an instantaneous copy of initial data stored in a first location of a first storage resource at a given point-in-time and then distributing copies of the instantaneous copy to other storage resources in the one or more cloud storage arrays.Type: GrantFiled: May 5, 2014Date of Patent: December 5, 2017Assignee: EMC IP Holding Company LLCInventor: John W. Bates
-
Patent number: 9678688Abstract: A method for data deduplication includes the following steps. First, segmenting an original data set into a plurality of data segments. Next, transforming the data in each data segment into a transformed data representation that has a band-type structure for each data segment. The band-type structure includes a plurality of bands. Next, selecting a first set of bands, grouping them together and storing them with the original data set. The first set of bands includes non-identical transformed data for each data segment. Next, selecting a second set of bands and grouping them together. The second set of bands includes identical transformed data for each data segment. Next, applying a hash function onto the transformed data of the second set of bands and thereby generating transformed data segments indexed by hash function indices. Finally, storing the hash function indices and the transformed data representation of one representative data segment in a deduplication database.Type: GrantFiled: July 14, 2011Date of Patent: June 13, 2017Assignee: EMC IP Holding Company LLCInventor: John W. Bates
-
Patent number: 8762642Abstract: A multi-cloud data replication method includes providing a data replication cluster comprising at least a first host node and at least a first online storage cloud. The first host node is connected to the first online storage cloud via a network and comprises a server, a cloud array application and a local cache. The local cache comprises a buffer and a first storage volume comprising data cached in one or more buffer blocks of the local cache's buffer. Next, requesting authorization to perform cache flush of the cached first storage volume data to the first online storage cloud. Upon receiving approval of the authorization, encrypting the cached first storage volume data in each of the one or more buffer blocks with a data private key. Next, assigning metadata comprising at lest a unique identifier to each of the one or more buffer blocks and then encrypting the metadata with a metadata private key.Type: GrantFiled: January 28, 2010Date of Patent: June 24, 2014Assignee: Twinstrata IncInventors: John W. Bates, Mark Aldred
-
Patent number: 8073922Abstract: An asynchronous peer-to-peer data replication method implemented within a replication cluster comprising at least one master node and at least a first client node includes entering an update in a data volume of the master node and storing the update in a master node storage. Next, updating a first active session in a master log and then sending a first message from the master node to the first client node. The first message comprises a first message content and first “piggybacked” data indicating that the first active session in the master log was updated. Next, receiving the first message by the first client node, registering that the first active session in the master log was updated and signaling internally that the first active session in the master log was updated. Next, sending an update request from the first client node to the master node, processing the update request by the master node and sending the update to the first client node.Type: GrantFiled: July 23, 2008Date of Patent: December 6, 2011Assignee: Twinstrata, IncInventor: John W. Bates
-
Publication number: 20090300409Abstract: A method for assessing the risk and cost for data loss and disaster recovery (DR) plans includes providing an application having a graphical user interface (GUI) comprising first and second windows arranged adjacent to each other. The first window comprises a catalog of components used to generate data disaster recovery (DR) configurations and the second window displays the generated DR configurations. A first DR configuration is generated in the second window and components are added to the first DR configuration by dragging and dropping components from the catalog into appropriate locations of the second window. Metrics for the first DR configuration are calculated and reported in the second window. A second configuration is also similarly generated in the second window and the metrics results are graphically compared to each other.Type: ApplicationFiled: May 28, 2009Publication date: December 3, 2009Applicant: TWINSTRATA, INCInventors: John W. Bates, Nicos Vekiarides, Brian Geisel
-
Patent number: 6977927Abstract: A system for allocating storage resources in a storage area network is described. A logical unit number (LUN) mapper receives at least one storage request parameter and maps the storage request parameters to at least one physical LUN. The LUN mapper includes at least one LUN map. The storage request parameters include a host id parameter, a target LUN parameter, and a target host bus adaptor (HBA) parameter. The LUN mapper uses the host id parameter to select the one of the LUN maps that corresponds to the host id parameter. The LUN mapper applies the target LUN parameter and the target HBA parameter to the selected LUN map to locate the physical LUN(s) stored in the selected LUN map. The LUN mapper issues the received read/write storage request to at least one storage device that houses the physical LUN(s). The one or more storage devices are located in the storage area network.Type: GrantFiled: September 18, 2000Date of Patent: December 20, 2005Assignee: Hewlett-Packard Development Company, L.P.Inventors: John W. Bates, Nicos A. Vekiarides
-
Patent number: 6804819Abstract: A method, system, and computer program product for a data propagation platform and applications of same is described. The data propagation platform provides various storage functions. According to an embodiment, the factories of the data propagation platform create and implement device modules. Device modules perform operations on encapsulated messages formed from data and commands, such as device operation commands and data from storage device read/write operations. Device modules are formed into device chains. Device chains are able to perform various tasks as a sum of device modules. In embodiments, device chains are layered and built on each other.Type: GrantFiled: September 18, 2000Date of Patent: October 12, 2004Assignee: Hewlett-Packard Development Company, L.P.Inventors: John W. Bates, Nicos A. Vekiarides
-
Publication number: 20020161983Abstract: A virtual storage system, method and computer program product for providing efficient use of storage resources. The system includes a plurality of host systems, an appliance coupled to each of the host systems and at least one physical storage device coupled to the appliance. The appliance manages the allocation of storage space on the physical storage device to the host systems. The appliance allocates virtual storage space to the host systems. The cumulative amount of virtual storage space allocated to the host systems exceeds the actual storage capacity of the physical storage device. The appliance allocates physical space on the physical storage device on an as needed basis.Type: ApplicationFiled: February 21, 2001Publication date: October 31, 2002Applicant: StorageApps Inc.Inventors: Don Milos, John W. Bates