Patents by Inventor Jonathan Jorge Nadal

Jonathan Jorge Nadal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11949735
    Abstract: Techniques for managing network-accessible infrastructure metadata are provided. A method includes receiving a resource request comprising resource metadata corresponding to a network-accessible infrastructure resource, determining whether to commit the resource request based at least in part on a constraint associated with the network-accessible infrastructure resource, and, in accordance with a determination to commit the resource request: generating, by the computer system, a resource identifier describing resource metadata in accordance with the resource request, storing, by the computer system, the resource metadata in a data store in communication with the computer system, receiving, by the computer system, a data request to provide the resource metadata described by the resource identifier, and providing, by the computer system, the resource metadata described by the resource identifier in accordance with the data request.
    Type: Grant
    Filed: December 13, 2021
    Date of Patent: April 2, 2024
    Assignee: Oracle International Corporation
    Inventors: Mohamed Saber Abdelfattah Hassan, Jonathan Jorge Nadal, Nathaniel Martin Glass, Yu Wu, Daniel M. Vogel, Geoff Hopcraft
  • Publication number: 20230328114
    Abstract: A cloud-based security solution that provides a robust and secure framework for managing and enforcing security policies related to various resources managed in the cloud is disclosed. The cloud-based security solution is implemented by a security zone policy enforcement system in a cloud service provider infrastructure. The system receives a request to perform an operation on a resource and determines a compartment associated with the resource. The system determines that the compartment is associated with a security zone and determines a set of one or more security zone policies applicable to the resource. The system then determines that the operation on the resource is permitted based on the set of one or more security zone policies and responsive to determining that the operation on the resource is permitted, allows the operation to be performed on the resource.
    Type: Application
    Filed: June 5, 2023
    Publication date: October 12, 2023
    Applicant: Oracle International Corporation
    Inventors: Igor Dozorets, Thoulfekar Alrahem, Jun Tong, Leonid Kuperman, Nachiketh Potlapally, Bala Ganesh Chandran, Brian Pratt, Nathaniel Martin Glass, Girish Nagaraja, Jonathan Jorge Nadal
  • Patent number: 11706260
    Abstract: A cloud-based security solution that provides a robust and secure framework for managing and enforcing security policies related to various resources managed in the cloud is disclosed. The cloud-based security solution is implemented by a security zone policy enforcement system in a cloud service provider infrastructure. The system receives a request to perform an operation on a resource and determines a compartment associated with the resource. The system determines that the compartment is associated with a security zone and determines a set of one or more security zone policies applicable to the resource. The system then determines that the operation on the resource is permitted based on the set of one or more security zone policies and responsive to determining that the operation on the resource is permitted, allows the operation to be performed on the resource.
    Type: Grant
    Filed: August 3, 2021
    Date of Patent: July 18, 2023
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventors: Igor Dozorets, Thoulfekar Alrahem, Jun Tong, Leonid Kuperman, Nachiketh Rao Potlapally, Bala Ganesh Chandran, Brian Pratt, Nathaniel Martin Glass, Girish Nagaraja, Jonathan Jorge Nadal
  • Patent number: 11563628
    Abstract: Techniques discussed herein monitoring for and identifying failures in a cloud-computing environment. Proxy devices can be communicatively disposed between services of the cloud-computing environment. The proxy devices can capture call stack data corresponding to function calls between services. A directional graph can be generated based on that call stack data that represents the communication paths between cloud-computing resources (e.g., the services). Ingress paths to a service can be evaluated by calculating various metrics for each path. Using these metrics, failures can be isolated to a particular communication path and/or a particular, and potentially relatively distant, upstream service.
    Type: Grant
    Filed: August 23, 2021
    Date of Patent: January 24, 2023
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventors: Mohamed Saber Abdelfattah Hassan, Jonathan Jorge Nadal, Iliya Roitburg
  • Patent number: 11531658
    Abstract: A method and apparatus for criterion-based retention of data object versions are disclosed. In the method and apparatus, a plurality of keys are sorted in accordance with an ordering scheme, whereby a key of the plurality of keys has an associated version of a data object and a timestamp. The key is inspected in accordance with the ordering scheme to determine based at least in part on the timestamp whether a criterion for performing an action on the associated version of the data object is satisfied. If the criterion is satisfied, a marker key is added to the plurality of keys, whereby the marker key precedes the inspected key according to the ordering scheme and indicates that the criterion is satisfied.
    Type: Grant
    Filed: December 9, 2019
    Date of Patent: December 20, 2022
    Assignee: Amazon Technologies, Inc.
    Inventors: Praveen Kumar Gattu, Aykud Gonen, Jonathan Jorge Nadal, Abhilasha Seth, Joseph Thomas Selman
  • Patent number: 11386041
    Abstract: Data tags, such as may be used to classify data, can be automatically applied at appropriate times in a resource environment. A customer can provide an auto-tagging configuration file that can be used to determine tags to be applied to specific data objects based upon properties of those objects. The customer can also provide policies that indicate which actions can be performed for those objects based at least in part upon the applied tags. The tags can be automatically applied at any appropriate time, such as upon storage into the environment, upon modification of the auto-tagging configuration, or upon modification or the data object. In some embodiments, an auto-tagging process can also be performed in response to a request for access to the data object in order to ensure that the correct tags are applied before determining the permitted actions.
    Type: Grant
    Filed: December 8, 2015
    Date of Patent: July 12, 2022
    Assignee: AMAZON TECHNOLOGIES, INC.
    Inventors: Syed Omair Zafar Gillani, Carl Wesley Summers, Jonathan Jorge Nadal
  • Publication number: 20220103616
    Abstract: Techniques for managing network-accessible infrastructure metadata are provided. A method includes receiving a resource request comprising resource metadata corresponding to a network-accessible infrastructure resource, determining whether to commit the resource request based at least in part on a constraint associated with the network-accessible infrastructure resource, and, in accordance with a determination to commit the resource request: generating, by the computer system, a resource identifier describing resource metadata in accordance with the resource request, storing, by the computer system, the resource metadata in a data store in communication with the computer system, receiving, by the computer system, a data request to provide the resource metadata described by the resource identifier, and providing, by the computer system, the resource metadata described by the resource identifier in accordance with the data request.
    Type: Application
    Filed: December 13, 2021
    Publication date: March 31, 2022
    Applicant: Oracle International Corporation
    Inventors: Mohamed Saber Abdelfattah Hassan, Jonathan Jorge Nadal, Nathaniel Martin Glass, Yu Wu, Daniel M. Vogel, Geoff Hopcraft
  • Publication number: 20220060513
    Abstract: A cloud-based security solution that provides a robust and secure framework for managing and enforcing security policies related to various resources managed in the cloud is disclosed. The cloud-based security solution is implemented by a centralized application programming Interface (API) system and a security zone policy enforcement system in a cloud service provider infrastructure. The centralized API system receives an API request that identifies an operation to be performed on a resource in the CSPI. The system determines, from the API request, compartment information and context information associated with the resource. Responsive to determining the compartment information and the context information associated with the resource, the system determines that the resource resides in a compartment that is associated with a security zone. The system then processes the API request and transmits a result of processing of the API request to a user of the centralized API processing system.
    Type: Application
    Filed: August 3, 2021
    Publication date: February 24, 2022
    Applicant: Oracle Intenational Corporation
    Inventors: Sreenivas Gattu, Qian Wei, Jonathan Jorge Nadal, Jun Tong, Thoulfekar Alrahem
  • Publication number: 20220060517
    Abstract: A cloud-based security solution that provides a robust and secure framework for managing and enforcing security policies related to various resources managed in the cloud is disclosed. The cloud-based security solution is implemented by a security zone policy enforcement system in a cloud service provider infrastructure. The system receives a request to perform an operation on a resource and determines a compartment associated with the resource. The system determines that the compartment is associated with a security zone and determines a set of one or more security zone policies applicable to the resource. The system then determines that the operation on the resource is permitted based on the set of one or more security zone policies and responsive to determining that the operation on the resource is permitted, allows the operation to be performed on the resource.
    Type: Application
    Filed: August 3, 2021
    Publication date: February 24, 2022
    Applicant: Oracle International Corporation
    Inventors: Igor Dozorets, Thoulfekar Alrahem, Jun Tong, Leonid Kuperman, Nachiketh Rao Potlapally, Bala Ganesh Chandran, Brian Pratt, Nathaniel Martin Glass, Girish Nagaraja, Jonathan Jorge Nadal
  • Patent number: 11233845
    Abstract: Techniques for managing network-accessible infrastructure metadata are provided. A method includes receiving a resource request comprising resource metadata corresponding to a network-accessible infrastructure resource, determining whether to commit the resource request based at least in part on a constraint associated with the network-accessible infrastructure resource, and, in accordance with a determination to commit the resource request: generating, by the computer system, a resource identifier describing resource metadata in accordance with the resource request, storing, by the computer system, the resource metadata in a data store in communication with the computer system, receiving, by the computer system, a data request to provide the resource metadata described by the resource identifier, and providing, by the computer system, the resource metadata described by the resource identifier in accordance with the data request.
    Type: Grant
    Filed: July 6, 2020
    Date of Patent: January 25, 2022
    Assignee: Oracle International Corporation
    Inventors: Mohamed Saber Abdelfattah Hassan, Jonathan Jorge Nadal, Nathaniel Martin Glass, Yu Wu, Daniel M. Vogel, Geoff Hopcraft
  • Publication number: 20220006855
    Abstract: Techniques for managing network-accessible infrastructure metadata are provided. A method includes receiving a resource request comprising resource metadata corresponding to a network-accessible infrastructure resource, determining whether to commit the resource request based at least in part on a constraint associated with the network-accessible infrastructure resource, and, in accordance with a determination to commit the resource request: generating, by the computer system, a resource identifier describing resource metadata in accordance with the resource request, storing, by the computer system, the resource metadata in a data store in communication with the computer system, receiving, by the computer system, a data request to provide the resource metadata described by the resource identifier, and providing, by the computer system, the resource metadata described by the resource identifier in accordance with the data request.
    Type: Application
    Filed: July 6, 2020
    Publication date: January 6, 2022
    Applicant: Oracle International Corporation
    Inventors: Mohamed Saber Abdelfattah Hassan, Jonathan Jorge Nadal, Nathaniel Martin Glass, Yu Wu, Daniel M. Vogel, Geoff Hopcraft
  • Patent number: 10826844
    Abstract: Information for a data object can be prevented from loss for import and export operations across a trust boundary, such as may exist between environments under control of different legal entities. A set of dependencies, including information such as data tags and identifiers for applicable policies, can be embedded in a data object, such as directly in a header or in a digest or token of the data object. When the data object is transmitted across a trust boundary, such as to a destination bucket, the destination bucket can ensure that all dependencies are available and able to be enforced in the destination environment. If not, the request can be denied or the destination environment can contact the source environment to attempt to obtain and enforce the missing dependencies. At least some of the dependencies may also need to be transformed in the second environment.
    Type: Grant
    Filed: September 30, 2015
    Date of Patent: November 3, 2020
    Assignee: AMAZON TECHNOLOGIES, INC.
    Inventors: Carl Wesley Summers, Syed Omair Zafar Gillani, Jonathan Jorge Nadal
  • Publication number: 20200228574
    Abstract: A customer of a resource provider environment can apply policies at the data object level that will live with a data object during its lifecycle, even as the object moves across trusted boundaries. A customer can classify data, causing tags and/or predicates to be applied to the corresponding data object. Each tag corresponds to a policy, with predicates relating to various actions that can be performed on the data. A chain of custody is maintained for each data object, such that any changes to the object, tags, or policies for the data can be determined, as may be required for various audit processes. The support of such policies also enables the resource provider environment to function as an intermediary, whereby a third party can receive the data along with the tags, policies, and chain of custody as long as the environment trusts the third party to receive the data object.
    Type: Application
    Filed: March 31, 2020
    Publication date: July 16, 2020
    Inventors: Carl Wesley Summers, Jonathan Jorge Nadal, Praveen Kumar Gattu, Syed Omair Zafar Gillani
  • Patent number: 10645120
    Abstract: A customer of a resource provider environment can apply policies at the data object level that will live with a data object during its lifecycle, even as the object moves across trusted boundaries. A customer can classify data, causing tags and/or predicates to be applied to the corresponding data object. Each tag corresponds to a policy, with predicates relating to various actions that can be performed on the data. A chain of custody is maintained for each data object, such that any changes to the object, tags, or policies for the data can be determined, as may be required for various audit processes. The support of such policies also enables the resource provider environment to function as an intermediary, whereby a third party can receive the data along with the tags, policies, and chain of custody as long as the environment trusts the third party to receive the data object.
    Type: Grant
    Filed: September 24, 2015
    Date of Patent: May 5, 2020
    Assignee: AMAZON TECHNOLOGIES, INC.
    Inventors: Carl Wesley Summers, Jonathan Jorge Nadal, Praveen Kumar Gattu, Syed Omair Zafar Gillani
  • Publication number: 20200110733
    Abstract: A method and apparatus for criterion-based retention of data object versions are disclosed. In the method and apparatus, a plurality of keys are sorted in accordance with an ordering scheme, whereby a key of the plurality of keys has an associated version of a data object and a timestamp. The key is inspected in accordance with the ordering scheme to determine based at least in part on the timestamp whether a criterion for performing an action on the associated version of the data object is satisfied. If the criterion is satisfied, a marker key is added to the plurality of keys, whereby the marker key precedes the inspected key according to the ordering scheme and indicates that the criterion is satisfied.
    Type: Application
    Filed: December 9, 2019
    Publication date: April 9, 2020
    Inventors: Praveen Kumar Gattu, Aykud Gonen, Jonathan Jorge Nadal, Abhilasha Seth, Joseph Thomas Selman
  • Patent number: 10594730
    Abstract: Data tags, such as may be used to classify data, can be automatically applied at appropriate times in a resource environment. A customer can provide an auto-tagging configuration file that can be used to determine tags to be applied to specific data objects based upon properties of those objects. The customer can also provide policies that indicate which actions can be performed for those objects based at least in part upon the applied tags. The tags can be automatically applied at any appropriate time, such as upon storage into the environment, upon modification of the auto-tagging configuration, or upon modification or the data object. In some embodiments, an auto-tagging process can also be performed in response to a request for access to the data object in order to ensure that the correct tags are applied before determining the permitted actions.
    Type: Grant
    Filed: December 8, 2015
    Date of Patent: March 17, 2020
    Assignee: AMAZON TECHNOLOGIES, INC.
    Inventors: Carl Wesley Summers, Syed Omair Zafar Gillani, Jonathan Jorge Nadal
  • Patent number: 10528536
    Abstract: A method and apparatus for managing keys pertaining to data objects are disclosed. In the method and apparatus, a plurality of keys that are associated with a plurality of data objects are retained, whereby the plurality of keys are capable of being listed in accordance with an ordering scheme. The ordering scheme is used to inspect the plurality of keys to determine whether a data object associated with a key of the plurality of keys satisfies a criterion. One or more actions are taken on the key or associated data object based at least in part on determining that the criterion is satisfied, whereby an order of taking the one or more actions is a reverse of an order by which the key is listed in accordance with the ordering scheme.
    Type: Grant
    Filed: May 19, 2014
    Date of Patent: January 7, 2020
    Assignee: Amazon Technologies, Inc.
    Inventors: Praveen Kumar Gattu, Aykud Gonen, Jonathan Jorge Nadal, Abhilasha Seth, Huan Sun, Derek Ernest Denny-Brown, II
  • Patent number: 10503713
    Abstract: A method and apparatus for criterion-based retention of data object versions are disclosed. In the method and apparatus, a plurality of keys are sorted in accordance with an ordering scheme, whereby a key of the plurality of keys has an associated version of a data object and a timestamp. The key is inspected in accordance with the ordering scheme to determine based at least in part on the timestamp whether a criterion for performing an action on the associated version of the data object is satisfied. If the criterion is satisfied, a marker key is added to the plurality of keys, whereby the marker key precedes the inspected key according to the ordering scheme and indicates that the criterion is satisfied.
    Type: Grant
    Filed: May 19, 2014
    Date of Patent: December 10, 2019
    Assignee: Amazon Technologies, Inc.
    Inventors: Praveen Kumar Gattu, Aykud Gonen, Jonathan Jorge Nadal, Abhilasha Seth, Joseph Thomas Selman
  • Publication number: 20170093753
    Abstract: Information for a data object can be prevented from loss for import and export operations across a trust boundary, such as may exist between environments under control of different legal entities. A set of dependencies, including information such as data tags and identifiers for applicable policies, can be embedded in a data object, such as directly in a header or in a digest or token of the data object. When the data object is transmitted across a trust boundary, such as to a destination bucket, the destination bucket can ensure that all dependencies are available and able to be enforced in the destination environment. If not, the request can be denied or the destination environment can contact the source environment to attempt to obtain and enforce the missing dependencies. At least some of the dependencies may also need to be transformed in the second environment.
    Type: Application
    Filed: September 30, 2015
    Publication date: March 30, 2017
    Inventors: Carl Wesley Summers, Syed Omair Zafar Gillani, Jonathan Jorge Nadal
  • Publication number: 20170093913
    Abstract: A customer of a resource provider environment can apply policies at the data object level that will live with a data object during its lifecycle, even as the object moves across trusted boundaries. A customer can classify data, causing tags and/or predicates to be applied to the corresponding data object. Each tag corresponds to a policy, with predicates relating to various actions that can be performed on the data. A chain of custody is maintained for each data object, such that any changes to the object, tags, or policies for the data can be determined, as may be required for various audit processes. The support of such policies also enables the resource provider environment to function as an intermediary, whereby a third party can receive the data along with the tags, policies, and chain of custody as long as the environment trusts the third party to receive the data object.
    Type: Application
    Filed: September 24, 2015
    Publication date: March 30, 2017
    Inventors: Carl Wesley Summers, Jonathan Jorge Nadal, Praveen Kumar Gattu, Syed Omair Zafar Gillani