Patents by Inventor Juscelino Candido De Lima Junior
Juscelino Candido De Lima Junior has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11823449Abstract: Embodiments of the invention are directed to detecting changes to a firebreak line in an environment. Aspects include obtaining a reference aerial image of an area of interest and a current aerial image of the area of interest and identifying, based on the reference aerial image, one or more firebreak lines in the area of interest. Aspects also include identifying, based on a comparison of the reference aerial image and the current aerial image, an anomaly in at least one of the one or more firebreak lines. Aspects further include transmitting an alert, based on detecting the anomaly, the alert including an indication of the detected anomaly.Type: GrantFiled: October 5, 2021Date of Patent: November 21, 2023Assignee: International Business Machines CorporationInventors: Paulo Henrique Graf Fernandes, Juscelino Candido De Lima Junior, Deborah Bruna Berto, Erich Casagrande Perusso, Paulo Henrique Almeida Cavoto
-
Publication number: 20230108318Abstract: Embodiments of the invention are directed to detecting changes to a firebreak line in an environment. Aspects include obtaining a reference aerial image of an area of interest and a current aerial image of the area of interest and identifying, based on the reference aerial image, one or more firebreak lines in the area of interest. Aspects also include identifying, based on a comparison of the reference aerial image and the current aerial image, an anomaly in at least one of the one or more firebreak lines. Aspects further include transmitting an alert, based on detecting the anomaly, the alert including an indication of the detected anomaly.Type: ApplicationFiled: October 5, 2021Publication date: April 6, 2023Inventors: Paulo Henrique Graf Fernandes, Juscelino Candido De Lima Junior, Deborah Bruna Berto, Erich Casagrande Perusso, PAULO HENRIQUE ALMEIDA CAVOTO
-
Patent number: 11573929Abstract: Deduplication of encrypted data using multiple keys includes responding to a request to store a predetermined set of data in an electronic data store by receiving a hash corresponding to the predetermined set of data, receiving encrypted data generated by encrypting the predetermined set of data using an encryption key, and receiving a key index corresponding to the encryption key. The hash may be determined to match a previously stored hash, the previously stored hash indicating that a previously encrypted version of the predetermined set of data is stored at a physical location in the electronic data store. Based on determining that the hash matches a previously stored hash, the hash, encrypted data, and key index are discarded.Type: GrantFiled: April 9, 2020Date of Patent: February 7, 2023Assignee: KYNDRYL, INC.Inventors: Jose Gilberto Biondo Junior, Juscelino Candido De Lima Junior, Marcelo Lopes De Moraes, Rosana Rueda Elias
-
Patent number: 11513970Abstract: Virtual memory address space is divided according to areas of the virtual memory address and allocating some areas to low-cost volatile memory (such as RAM) when the memory areas are not required by an application to be stored in non-volatile memory, such as NVDIMM. A loader mechanism creates and maintains a layout address table in non-volatile memory for recovery from an unexpected reset.Type: GrantFiled: November 1, 2019Date of Patent: November 29, 2022Assignee: International Business Machines CorporationInventors: Juscelino Candido De Lima Junior, Breno H. Leitao, Carlos Eduardo Seo
-
Patent number: 11341241Abstract: A technique for mitigating against return-oriented programming (ROP) attacks that occur during execution of an application includes receiving source code to compile into an executable application. During a compilation of the source code, one or more functions within the source code that are associated with gadgets in an ROP attack are determined, each of the one or more functions is assigned to one or more protected pages of memory for the executable application, and a tag is assigned to each of the one or more functions. The tag for each function maps to the protected page of memory to which the function is assigned.Type: GrantFiled: November 8, 2019Date of Patent: May 24, 2022Assignee: International Business Machines CorporationInventors: Juscelino Candido De Lima Junior, Carlos Eduardo Seo
-
Patent number: 11222490Abstract: A service request for an automobile is detected. The service request includes a service version number. A first integrated circuit of the automobile is verified. The verification of the first integrated circuit is in response to detecting the service request. A component version number of the first integrated circuit is determined in response to verifying the first integrated circuit. The service version number is compared to the component version number of the first integrated circuit. The comparison is based on the determining the component version number. A service operation regarding the automobile is performed. The service operation is performed based on the comparing the service version number to the component version number.Type: GrantFiled: June 14, 2019Date of Patent: January 11, 2022Assignee: International Business Machines CorporationInventors: Juscelino Candido De Lima Junior, Breno H. Leitao, Carlos Eduardo Seo, Antonio Joao Schwartz Soares
-
Patent number: 11195618Abstract: Techniques for detecting a possible health issue in a user are described. Data related to social media activity for a user is received over a communications network from one or more computing devices. A user analysis profile is generated for the user using a first machine learning model. The user analysis profile includes a personality profile and a mood score. A weighted score associated with potential health issues for the user is determined by classifying the user analysis profile using a second machine learning model. The weighted score exceeds a pre-determined threshold, and electronic notification is provided to a pre-designated person regarding the potential health issue.Type: GrantFiled: July 12, 2018Date of Patent: December 7, 2021Assignee: International Business Machines CorporationInventors: Tiago Dias Generoso, Ayron Dal Pont, Juscelino Candido De Lima Junior, Marcos Vinicius L Paraiso
-
Patent number: 11163680Abstract: Embodiments of the present invention include receiving, by an operating system, a request from an application to reserve a subset of a memory allocated to the application for mirroring. The request specifies a size of the subset. A first portion of the specified size and a second portion of the specified size of the memory are reserved by the operating system for the mirroring. Data to write to the first portion of the memory is received from the application. The operating system writes the data to the first portion of the memory and initiates a background write-back process of the data to the second portion of the memory.Type: GrantFiled: November 28, 2018Date of Patent: November 2, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Breno H. Leitao, Juscelino Candido De Lima Junior, Camilla da Graca Portes Ogurtsova, Yuri Henrique Sierakowski
-
Patent number: 11151847Abstract: Embodiments of the present invention provide a computer system, a computer program product, and a method that comprises identifying at least a first physical sensor and a second physical sensor within a computing device, wherein each physical sensor is associated with a respective count; performing a predetermined operation within the computing device; authenticating the received command of at least the first physical sensor and the second physical sensor identified within the computing device; and automatically halting the operation of the computing device.Type: GrantFiled: March 12, 2020Date of Patent: October 19, 2021Assignee: International Business Machines CorporationInventors: Juscelino Candido De Lima Junior, Antonio Joao Schwartz Soares, Carlos Eduardo Seo, Camilla da Graca Portes Ogurtsova
-
Publication number: 20210318993Abstract: Deduplication of encrypted data using multiple keys includes responding to a request to store a predetermined set of data in an electronic data store by receiving a hash corresponding to the predetermined set of data, receiving encrypted data generated by encrypting the predetermined set of data using an encryption key, and receiving a key index corresponding to the encryption key. The hash may be determined to match a previously stored hash, the previously stored hash indicating that a previously encrypted version of the predetermined set of data is stored at a physical location in the electronic data store. Based on determining that the hash matches a previously stored hash, the hash, encrypted data, and key index are discarded.Type: ApplicationFiled: April 9, 2020Publication date: October 14, 2021Inventors: Jose Gilberto Biondo Junior, Juscelino Candido De Lima Junior, Marcelo Lopes de Moraes, Rosana Rueda Elias
-
Patent number: 11126459Abstract: A computer-implemented method comprises receiving a request to write to a file and, in response to the request, determining that the file exists in a storage device. In response to the determination that the file exists, the method further comprises mapping the file into a region of a non-volatile dual in-line memory module (NVDIMM); initiating a transaction to write to the mapped file in the NVDIMM without acquiring a speculative lock on the mapped file; and determining whether a conflict occurred in writing to the mapped file in the NVDIMM. In response to a determination that a conflict occurred, the method comprises restarting the transaction to write to the mapped file in the NVDIMM without acquiring the speculative lock on the mapped file. In response to a determination that no conflict occurred, the method comprises committing changes made to the mapped file to the file in the storage device.Type: GrantFiled: October 17, 2018Date of Patent: September 21, 2021Assignee: International Business Machines CorporationInventors: Breno H. Leitao, Juscelino Candido De Lima Junior, Camilla da Graca Portes Ogurtsova, Alexander Aguina
-
Publication number: 20210287496Abstract: Embodiments of the present invention provide a computer system, a computer program product, and a method that comprises identifying at least a first physical sensor and a second physical sensor within a computing device, wherein each physical sensor is associated with a respective count; performing a predetermined operation within the computing device; authenticating the received command of at least the first physical sensor and the second physical sensor identified within the computing device; and automatically halting the operation of the computing device.Type: ApplicationFiled: March 12, 2020Publication date: September 16, 2021Inventors: Juscelino Candido De Lima Junior, ANTONIO JOAO Schwartz Soares, Carlos Eduardo Seo, Camilla da Graca Portes Ogurtsova
-
Patent number: 11117794Abstract: In an approach for pouring control, a processor recognizes that a user requests material from a dispenser with a container. A processor evaluates the container via one or more sensors. A processor determines that the user is allowed to receive the material. A processor, in response to determining that the user is allowed to receive the material, triggers the dispenser to pour the material into the container. A processor monitors the dispenser pouring the material. A processor determines that an anomaly is detected during pouring the material. A processor, in response to determining that the anomaly is detected during pouring the material, signals the dispenser to stop the pouring.Type: GrantFiled: November 18, 2019Date of Patent: September 14, 2021Assignee: International Business Machines CorporationInventors: Juscelino Candido De Lima Junior, Jose Gilberto Biondo Junior, Leoni Murilo Lima, Ivan Francisco Franco, Igor Monteiro Vieira
-
Patent number: 11086517Abstract: Memory management that includes allocating physical memory having an append-only permission associated therewith to requesting user space applications is described. If a page frame is append-only, then data written to the page frame cannot be overwritten. Rather, any new data written to an append-only page frame must be written beginning at the next available write location within the page frame. An MMU determines whether a write request is requesting an append-only page frame, in which case, the MMU reserves the append-only page frame for the write request and consults a corresponding entry in a page table append to determine whether an offset associated with the write request is larger than a stored value in the entry that indicates the next available write location in the page frame. If so, the write request is executed and the data is written to the page frame beginning at the next available write location.Type: GrantFiled: October 30, 2018Date of Patent: August 10, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Breno H. Leitao, Juscelino Candido De Lima Junior, Carlos Eduardo Seo
-
Patent number: 11048477Abstract: Embodiments include method, systems and computer program products for providing entropy to generate random numbers.Type: GrantFiled: September 25, 2018Date of Patent: June 29, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Breno H. Leitao, Juscelino Candido De Lima Junior, Alexander Aguina, Camilla da Graca Portes Ogurtsova
-
Patent number: 11042374Abstract: Embodiments are disclosed for managing a non-volatile dual in-line memory module (NVDIMM) storage system. The techniques include loading an executable to a volatile random access memory. The techniques also include in response to a store operation attempted by the executable, determining that a target address of the store operation is not mapped from an address in the random access memory to an address in an NVDIMM. The techniques further include mapping the target address from the address in the volatile random access memory to the address in the NVDIMM. Additionally, the techniques include performing the store operation in the address in the NVDIMM based on the mapping.Type: GrantFiled: May 2, 2019Date of Patent: June 22, 2021Assignee: International Business Machines CorporationInventors: Carlos Eduardo Seo, Juscelino Candido De Lima Junior, Breno H. Leitao
-
Patent number: 11016813Abstract: An approach for allocating mainframe resources in a networked computing environment (e.g., a cloud computing environment) is provided. In an embodiment, each workload that executes on a mainframe system is classified into one or a plurality of workload classes. Each workload class has workloads that share a common objective. A historical allocation of initiators for each workload class over time is analyzed. Based on this analysis, a number of allocation selections, which each assign a number of initiators to each workload class, are generated based on the historical utilization data. The allocation selection that is ultimately implemented is selected from these allocation selections based on KPI factors.Type: GrantFiled: November 26, 2018Date of Patent: May 25, 2021Assignee: International Business Machines CorporationInventors: Aldair F. Filho, Juscelino Candido de Lima Junior, Marcos Vinicius L. Paraiso, Rosana Rueda Elias, Ana Silvia Moretto Braga
-
Publication number: 20210147210Abstract: In an approach for pouring control, a processor recognizes that a user requests material from a dispenser with a container. A processor evaluates the container via one or more sensors. A processor determines that the user is allowed to receive the material. A processor, in response to determining that the user is allowed to receive the material, triggers the dispenser to pour the material into the container. A processor monitors the dispenser pouring the material. A processor determines that an anomaly is detected during pouring the material. A processor, in response to determining that the anomaly is detected during pouring the material, signals the dispenser to stop the pouring.Type: ApplicationFiled: November 18, 2019Publication date: May 20, 2021Inventors: Juscelino Candido De Lima Junior, Jose Gilberto Biondo Junior, Leoni Murilo Lima, Ivan Francisco Franco, Igor Monteiro Vieira
-
Publication number: 20210141899Abstract: A technique for mitigating against return-oriented programming (ROP) attacks that occur during execution of an application includes receiving source code to compile into an executable application. During a compilation of the source code, one or more functions within the source code that are associated with gadgets in an ROP attack are determined, each of the one or more functions is assigned to one or more protected pages of memory for the executable application, and a tag is assigned to each of the one or more functions. The tag for each function maps to the protected page of memory to which the function is assigned.Type: ApplicationFiled: November 8, 2019Publication date: May 13, 2021Inventors: Juscelino CANDIDO DE LIMA JUNIOR, Carlos Eduardo SEO
-
Publication number: 20210133113Abstract: Virtual memory address space is divided according to areas of the virtual memory address and allocating some areas to low-cost volatile memory (such as RAM) when the memory areas are not required by an application to be stored in non-volatile memory, such as NVDIMM. A loader mechanism creates and maintains a layout address table in non-volatile memory for recovery from an unexpected reset.Type: ApplicationFiled: November 1, 2019Publication date: May 6, 2021Inventors: Juscelino Candido De Lima Junior, Breno H. Leitao, Carlos Eduardo Seo