Patents by Inventor Leigh Griffin

Leigh Griffin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250045404
    Abstract: Systems and methods include storing, in a first base boot partition, an image of a first base operating system; storing, in a first overlay boot partition, a first overlay file system comprising a first encrypted file; configuring the first overlay boot partition to boot the image of the first base operating system from the first base boot partition and install the first overlay filesystem; and responsive to detecting an attempt to access the first encrypted file, designating the first base boot partition as an active boot partition.
    Type: Application
    Filed: July 31, 2023
    Publication date: February 6, 2025
    Inventors: Leigh Griffin, Pierre-Yves Chibon
  • Publication number: 20250045092
    Abstract: A computing device executes a job from among a plurality of jobs executed by a continuous integration system, the job initiating a task from among a plurality of tasks for the job and the task invoking a first remote system. The computing device determines, based on a notification associated with the first remote system, that the task failed in response to invoking the first remote system. The computing device identifies a first job from among the plurality of jobs, the first job having at least one task that invokes the first remote system. The computing device performs an action based on a priority of the first job.
    Type: Application
    Filed: July 31, 2023
    Publication date: February 6, 2025
    Inventors: Leigh Griffin, Laura Barcziova
  • Publication number: 20250036489
    Abstract: Application programming interfaces (APIs) of a software package can be separated into containers to facilitate safety assurance through isolation. For example, a computing system can receive an application request associated with the software package. The software package can include a first set of APIs that is compliant with a safety threshold and a second set of APIs that is noncompliant with the safety threshold. The computing system can determine that the application request corresponds to the first set of APIs. In response, the computing system can identify a first container that includes a first instance of the software package in which the first set of APIs is enabled and the second set of APIs is disabled. Subsequent to identifying the first container, the computing system can forward the application request to the first container that can handle the application request using the first instance of the software package.
    Type: Application
    Filed: July 25, 2023
    Publication date: January 30, 2025
    Inventors: Leigh Griffin, Pierre-Yves Chibon
  • Patent number: 12212547
    Abstract: Embodiments of the present disclosure provide a method, a system and a non-transitory computer-readable medium to securely pass a message. The method includes executing, by a processing device, a floating persistent volumes service (FPVS) to allocate and attach persistent volume (PV) to a first node in a mesh network to pass a payload in the PV to the first node; and sending a first message to the first node to inform the first node to read data from the payload in the PV.
    Type: Grant
    Filed: January 21, 2022
    Date of Patent: January 28, 2025
    Assignee: Red Hat, Inc.
    Inventors: Leigh Griffin, Pierre-Yves Chibon
  • Patent number: 12204986
    Abstract: Generating quantum service definitions from executing quantum services is disclosed. In one example, a processor device of a quantum computing system executes a quantum service comprise one or more qubits. The processor device (e.g., by executing a quantum analysis service (QAS)) receives a request to profile the quantum service. Based on the request, the processor device obtains service metadata corresponding to the quantum service. A quantum service definition that defines one or more features of the quantum service is then generated based on the service metadata, and the quantum service definition is stored on a persistent data store. In this manner, quantum service definitions may be partially or wholly reverse-engineered for quantum services for which original quantum services definitions are unavailable or inaccessible.
    Type: Grant
    Filed: April 29, 2021
    Date of Patent: January 21, 2025
    Assignee: Red Hat, Inc.
    Inventors: Stephen Coady, Leigh Griffin
  • Patent number: 12197315
    Abstract: In one example described herein a system can receive, by a server, a software test suite comprising a plurality of data files. Each data file of the plurality of data files can correspond to a test of the software test suite. The system can generate, by the server, a mapping that assigns, for each data file, a qubit of a quantum computer system to the data file. The system can generate, by the server, a quantum assembly language (QASM) file that indicates the mapping and one or more properties associated with the qubit for each data file. The system can send, by the server, the QASM file to the quantum computer system for execution by the quantum computer system. The system can cause, by the server, an action based on an output generated by the quantum computer system.
    Type: Grant
    Filed: July 14, 2022
    Date of Patent: January 14, 2025
    Assignee: Red Hat, Inc.
    Inventors: Leigh Griffin, Veera Raghava Beri Reddy, Srinivasa Bharath Kanta
  • Publication number: 20250013455
    Abstract: A system and method of providing one or more predictive models to enhance decision-making capabilities regarding software updates in computing network systems. The method includes receiving a request for information indicating whether to upgrade an application executing on a node. The method includes providing a historical impact profile of the node to a predictive model trained to predict possible impacts on computing resources caused by version upgrades to applications using the computing resources. The method includes predicting, based on the predictive model, a possible impact to a computing resource of the node caused by a theoretical upgrade of the application. The method includes generating a risk score indicating whether to upgrade the application executing on the node of the computing network system based on status data of the computing resource of the node and the possible impact to the computing resource of the node.
    Type: Application
    Filed: July 7, 2023
    Publication date: January 9, 2025
    Inventors: Paolo Antinori, Alessio Soldano, Leigh Griffin
  • Publication number: 20250007725
    Abstract: Techniques for signing a package manager file are disclosed. An example method includes receiving, at a signing client, a package manager file and a signing request to cryptographically sign the package manager file. The package manager file includes a header and a payload. The method also includes inspecting the header of the package manager file to determine whether the header includes a digest comprising a hash of the payload. Responsive to determining that the header does include the digest, the method also includes sending the header from the signing client to a signing server without sending the payload, and receiving a signed header from the signing server.
    Type: Application
    Filed: June 28, 2023
    Publication date: January 2, 2025
    Inventors: Patrick Martijn Andreas Uiterwijk, Pierre-Yves Chibon, Leigh Griffin
  • Publication number: 20250007777
    Abstract: Software modifications can be coordinated for remote node management. For example, a system can detect, at a first time, a code modification made to a first configuration file on a particular node of a plurality of nodes. The first configuration file can be used by a control node to deploy a software entity to each of the nodes. The system can convert the code modification from a first format associated with the control node to a second format associated with the software entity. At a second time, the system can detect the control node executing the first configuration file to deploy the software entity to each node according to a second configuration file for the software entity. The system can apply the code modification to the second configuration file such that the control node can deploy the software entity to the particular node using the applied code modification.
    Type: Application
    Filed: June 30, 2023
    Publication date: January 2, 2025
    Inventors: Pierre-Yves Chibon, Leigh Griffin
  • Patent number: 12182667
    Abstract: A system and method including calculating a plurality of risk scores associated with a pool of quantum computers, and selectively distributing, based on the plurality of risk scores, each of the plurality of blocks to a single quantum computer of the pool of quantum computers to cause the single quantum computer to generate a block output by processing the block.
    Type: Grant
    Filed: December 8, 2023
    Date of Patent: December 31, 2024
    Assignee: Red Hat, Inc.
    Inventors: Leigh Griffin, Stephen Coady
  • Patent number: 12185152
    Abstract: Systems and methods providing mesh network reconfiguration for service reinforcement. In one implementation, a value of a workload metric associated with a first communication device in a first zone of a mesh network is identified. The first communication device is running a first service. Responsive to determining that the value of the workload metric satisfies a defined condition, a second communication device in a second zone of the mesh network is identified. The capacity of the second communication device satisfies a capacity criterion. The first service is started on the second communication device.
    Type: Grant
    Filed: March 9, 2022
    Date of Patent: December 31, 2024
    Assignee: Red Hat, Inc.
    Inventors: Leigh Griffin, Pierre-Yves Chibon
  • Publication number: 20240427592
    Abstract: A delta between a first version of a software application and a second version of the software application is determined, the delta including a plurality of delta binary values that identify a difference between the first version of the software application and the second version of the software application. A first plurality of qubits are encoded with a primary software application version that is one of the first version of the software application or the second version of the software application. Qubit metadata that refers to a second plurality of qubits is generated based on the delta, the second plurality of qubits including at least some of the first plurality of qubits The second version of the software application is generated from the first plurality of qubits, the second plurality of qubits and the qubit metadata.
    Type: Application
    Filed: June 21, 2023
    Publication date: December 26, 2024
    Inventors: Leigh Griffin, Christopher Foley
  • Publication number: 20240430343
    Abstract: Dynamic, client-specific retrieval of data can be performed for edge devices using data services. For example, a system can receive a data request from a client device. The data request can include a type of data and one or more parameters for the type of data. In response to receiving the data request, the system can further detect data services that include the type of data. Additionally, the system can generate application programming interface (API) contracts. Each of the API contracts can define a communication protocol between the client device and each of the data services. The system can also deploy a deployable object, which may include the API contracts, on the client device to cause the client device to receive data satisfying the data request from each of the data services.
    Type: Application
    Filed: June 22, 2023
    Publication date: December 26, 2024
    Inventors: Leigh Griffin, Aoife Moloney
  • Publication number: 20240430238
    Abstract: A gateway service can be generated by a daemon to facilitate communication for application programming interfaces (APIs) in edge devices. For example, the daemon can monitor a database including one or more configuration files for an API. The daemon can detect an update to a configuration file of the one or more configuration files in the database. In response to detecting the update to the configuration file, the daemon can generate an instance of the gateway service configured to interface between a software application and the API.
    Type: Application
    Filed: June 21, 2023
    Publication date: December 26, 2024
    Inventors: Leonardo Rossetti, Leigh Griffin
  • Publication number: 20240427643
    Abstract: Services can be executed on nodes using initial random access memory disk (initrd) schemes. For example, a system can receive, from an orchestrator node, a request to execute a service at a host node. The request can include data indicative of the service, and the host node can include an initrd scheme. The system can determine that the service is available for execution at the host node based on the service being included in the initrd scheme. In response to determining that the service is available, the system can further transmit a notification to the orchestrator node indicating that the service is available for execution at the host node. Additionally, the system can execute the service on the host node as part of executing the initrd scheme.
    Type: Application
    Filed: June 21, 2023
    Publication date: December 26, 2024
    Inventors: Leigh Griffin, Eric Curtin
  • Patent number: 12171047
    Abstract: Methods, systems, and computer program products of this disclosure provide a staged transmission service (e.g., a data transfer service for downloading or uploading) at a transfer node to a device in motion (DIM) wirelessly paired to the transfer node. When a DIM accepts a download task, the download node paired with the DIM receives a notice from the DIM of the acceptance. The download node retrieves, from a data repository, a dataset specified by the download task. A processing device of the download node may stage the dataset in a staged download service in preparation to transfer the dataset to the DIM. The processing device may initiate a transfer of at least a portion of the dataset to the DIM responsive to one or more data transfer properties satisfying a predefined set of conditions. The data transfer properties are determined based on a location and a movement of the DIM.
    Type: Grant
    Filed: June 27, 2022
    Date of Patent: December 17, 2024
    Assignee: Red Hat, Inc.
    Inventors: Leigh Griffin, Pierre-Yves Chibon
  • Patent number: 12164900
    Abstract: A hybrid cloud package build architecture can be provided for a computer system. For instance, a trigger can be determined for fetching an external package component for integration with a local package component. Based on the trigger, a request can be transmitted to an external package repository to obtain the external package component. The external package component can be received responsive to the request. The external package component can be cached for integration with the local package component.
    Type: Grant
    Filed: July 28, 2022
    Date of Patent: December 10, 2024
    Assignee: Red Hat, Inc.
    Inventors: Leigh Griffin, Leonardo Rossetti
  • Publication number: 20240405978
    Abstract: It is determined that a container image comprising a plurality of container image layers generated by a container build engine is to be transmitted from a container image repository to a target computing device. It is determined that a first container image layer of the plurality of container image layers is a sensitive container image layer to be encrypted prior to transmission to the target computing device. A first key generated by a quantum computing system that uses a quantum key distribution protocol, a plurality of qubits and a quantum communication channel to generate the first key is obtained. The first container image layer is encrypted using the first key to generate a first encrypted container image layer. The first encrypted container image layer is transmitted to the target computing device.
    Type: Application
    Filed: June 1, 2023
    Publication date: December 5, 2024
    Inventors: Leigh Griffin, Stephen Coady
  • Publication number: 20240403068
    Abstract: A computing device receives a filesystem image comprising a filesystem tree, a container runtime, and an on-board container registry including a plurality of container images, the on-board container registry operable to provide a container image to a requesting container runtime. The computing device is booted using the filesystem image. The computing device instructs the container runtime to initiate a first container from a first container image. The computing device requests, by the container runtime from the on-board container registry, the first container image. The computing device receives, by the container runtime, the first container image from the on-board container registry. The computing device initiates, by the container runtime, the first container from the first container image.
    Type: Application
    Filed: May 31, 2023
    Publication date: December 5, 2024
    Inventors: Pierre-Yves Chibon, Leigh Griffin
  • Publication number: 20240394030
    Abstract: Deriving a container from a package set is disclosed. Package set metadata that identifies a plurality of packages to be included in a container image based on a package set is accessed. A container configuration file referencing the plurality of packages is generated based at least in part on the package set metadata. The container configuration file includes one or more commands complying with a container builder syntax that are implementable by a container builder to generate a container image including the plurality of packages. The container configuration file is stored in a memory of a computer system.
    Type: Application
    Filed: August 6, 2024
    Publication date: November 28, 2024
    Inventors: Leigh Griffin, Pierre-Yves Chibon