Patents by Inventor Leigh Griffin

Leigh Griffin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240126717
    Abstract: One embodiment includes a method for quantum-mechanically archiving data. The method includes receiving, by a quantum computing device (QD), a request to store the data. The data may be associated with a file identifier (ID). A set of bits encodes the data in a classical encoding and the set of bits has a first cardinality. In response to receiving the request to store the data, generating, the QD may generate, based on a superdense coding protocol, a quantum-mechanical (QM) encoding of the data via a set of qubits that has a second cardinality that is less than the first cardinality. The QD may cause a generation of a data structure that encodes an association between the file ID and the set of qubits. The QD may further cause a storage of the data structure.
    Type: Application
    Filed: October 14, 2022
    Publication date: April 18, 2024
    Inventors: Leigh Griffin, Stephen Coady
  • Publication number: 20240127148
    Abstract: Systems and methods for a delta based task analysis in CI systems are disclosed. The systems and methods analyze a first job, which includes multiple first tasks, and a second job, which includes multiple second tasks. The systems and methods identify a set of different tasks between the first tasks and the second tasks. The systems and methods then create a third job based on the set of different tasks, which includes metadata corresponding to the first job and the second job. The systems and method execute the first job and the third job, which completes the second job based on the metadata included in the third job.
    Type: Application
    Filed: October 12, 2022
    Publication date: April 18, 2024
    Inventors: Laura Barcziova, Leigh Griffin
  • Publication number: 20240111876
    Abstract: K-anonymous vulnerability detection is disclosed. Data descriptive of a container image including at least one container layer having a layer identifier is received. The layer identifier is encoded to produce an encoded layer identifier. A first portion of the layer identifier is transmitted to a vulnerability registry server. One or more vulnerability identifiers are received from the vulnerability server. The vulnerability identifiers are associated with the first portion of the encoded layer identifier. It is determined that the layer identifier matches a matching vulnerability identifier of the one or more vulnerability identifiers.
    Type: Application
    Filed: September 29, 2022
    Publication date: April 4, 2024
    Inventors: Leigh Griffin, Paolo Antinori
  • Publication number: 20240112064
    Abstract: A system and method including calculating a plurality of risk scores associated with a pool of quantum computers, and selectively distributing, based on the plurality of risk scores, each of the plurality of blocks to a single quantum computer of the pool of quantum computers to cause the single quantum computer to generate a block output by processing the block.
    Type: Application
    Filed: December 8, 2023
    Publication date: April 4, 2024
    Inventors: Leigh Griffin, Stephen Coady
  • Patent number: 11948046
    Abstract: Embodiments of the present disclosure provide techniques for seamlessly switching between a classical controller and a quantum controller that both implement an application, based on which controller is better suited for processing a received request for functionality of the application. The classical controller and the quantum controller both implement the same logic for the application, and the classical controller interfaces with a model and a view as part of a model, view and controller (MVC) framework. A Quantum Model View Controller (QMVC) service determines whether the request is to be processed by the classical or quantum controller. In response to determining that the request is to be processed by the quantum controller, the QMVC service diverts the request to the quantum controller and provide a first application program interface (API) gateway between the quantum controller and the model and a second API gateway between the quantum controller and the view.
    Type: Grant
    Filed: May 25, 2022
    Date of Patent: April 2, 2024
    Assignee: Red Hat, Inc.
    Inventors: Leigh Griffin, Stephen Coady
  • Publication number: 20240106827
    Abstract: A first computing device of a plurality of computing devices in communication with one another via a communications channel receives, from a requesting computing device, an access request that identifies a subject, a resource identifier that identifies a resource, and an action, the first computing device having a set of access policies, each access policy corresponding to a particular resource of a plurality of resources. The first computing device determines that the resource identifier identifies a resource that is not governed by an access policy in the set of access policies. The first computing device sends, to the communications channel, the access request. The first computing device receives an access request decision from a second computing device of the plurality of computing devices, and the first computing device grants or denies access to the resource by the user based on the access request decision.
    Type: Application
    Filed: September 26, 2022
    Publication date: March 28, 2024
    Inventors: Leigh Griffin, Aoife E. Moloney
  • Publication number: 20240103933
    Abstract: Container image tooling storage migration is generally described. In some examples, a first pull operation for a first container image may be performed. The first container image may be generated using a first container management tool. In various cases, a first binary representation of the first container image may be read. The first binary representation may be associated with the first container management tool. In some examples, a second binary representation of the first container image that corresponds to a second container management tool may be received. In various cases, a first container may be executed by the second container management tool using the second binary representation.
    Type: Application
    Filed: September 27, 2022
    Publication date: March 28, 2024
    Inventors: Paolo Antinori, Rishab Prasad, Leigh Griffin
  • Publication number: 20240094889
    Abstract: Computerized systems and methods are provided for automatically generating an application overflow tool that is dynamically updated and arranged to provide improved access to popular or recently used applications. These systems and methods improve existing technologies by generating an overflow panel different from a task bar, such that the overflow panel provides access to most recently used applications that are not on the task bar. As such, ease of access to applications is improved to increase user efficiency. These systems also improve the way computers operate by leveraging existing GUI layouts to reduce computing resource consumption, such as memory, network latency, I/O, and the like, that would otherwise be required improve access to applications.
    Type: Application
    Filed: November 29, 2023
    Publication date: March 21, 2024
    Inventors: Charles Edward TAYLOR, Jr., Peter E. HAMMERQUIST, Benjamin J. SCHOEPKE, Jessica Leigh DOUMA, Albert Peter YIH, Emilia Marie NOBREGA, Hadley Meryl GRIFFIN, Ashley Nicole FERGUSON, Robert Joseph DISANO
  • Publication number: 20240098070
    Abstract: A method for updating content is disclosed that includes receiving, by a first quantum computing device (QD), a classical encoding of an update for content. The classical encoding is stored in a first set of bits with a first cardinality. The content is stored on a first classical computing device (CD) that is enabled to update the content via a patching protocol. In response to receiving the classical encoding, the first QD causes a transmission of the classical encoding. The transmission of the classical encoding includes transmitting a first set of qubits that have a second cardinality that is less than the first cardinality. Quantum states of the first set of qubits store a quantum-mechanical (QM) encoding of the update. The QM encoding of the update was generated based on a superdense coding protocol.
    Type: Application
    Filed: September 15, 2022
    Publication date: March 21, 2024
    Inventors: Leigh Griffin, Stephen Coady
  • Publication number: 20240095215
    Abstract: Edge nodes in distributed computing environments can be updated according to some aspects described herein. For example, a first node in the distributed computing environment can receive an update request from a management node. The update request can include an update file for updating a second node. In response to receiving the update request, the first node can generate a first partition and a second partition, containing the update file, within the first node. Additionally, the first node can generate a network tunnel between the first node and the second node. The first node can mount a file system for the second node onto the first partition and a copy of the file system onto the second partition of the first node via the network tunnel. The first node also can update the file system in the second partition using the update file to generate an updated file system.
    Type: Application
    Filed: September 15, 2022
    Publication date: March 21, 2024
    Inventors: Leigh Griffin, Pierre-Yves Chibon
  • Publication number: 20240095573
    Abstract: A first set of qubits is allocated to an error correcting process, the error correcting process is configured to utilize the first set of qubits to correct errors identified in a second set of qubits being used by a quantum process. Error correcting information is received from the error correcting process. A quantity of qubits in the first set of qubits is altered based on the error correcting information. Information that identifies an alteration of the quantity of qubits in the first set of qubits is communicated to the error correcting process.
    Type: Application
    Filed: September 21, 2022
    Publication date: March 21, 2024
    Inventors: Leigh Griffin, Stephen Coady
  • Publication number: 20240095574
    Abstract: In one example described herein a system can receive, by a gate analysis service, a quantum assembly language (QASM) file. The QASM file can define a quantum algorithm that can include logic gates that can be executed on a quantum computer system. The system can access, by the gate analysis service, a data repository that can include an estimated amount of quantum decoherence associated with each logic gate of a plurality of logic gates that includes the logic gates. The system can determine, by the gate analysis service, a prediction of an amount of quantum decoherence associated with executing at least one logic gate of the logic gates on the quantum computer system. Additionally, the system can adjust, by the gate analysis service, the QASM file to modify the prediction associated with executing the logic gates on the quantum computer system.
    Type: Application
    Filed: September 15, 2022
    Publication date: March 21, 2024
    Inventors: Leigh Griffin, Stephen Coady
  • Publication number: 20240098116
    Abstract: A cross-domain data access service enables data access across two or more computing domains, such as, for example, transient access by a public device to data held in a private cloud. In particular, the cross-domain data access service can identify a data subset from within a secure datastore of a first computing domain. The cross-domain data access service can replicate the data subset within a transient datastore that is segregated from the secured datastore. The cross-domain data access service can implement a data access policy so as to enable a client device from a second domain to access the transient datastore.
    Type: Application
    Filed: September 21, 2022
    Publication date: March 21, 2024
    Inventors: Leigh Griffin, Andrea Cosentino, Paolo Antinori
  • Publication number: 20240086755
    Abstract: Examples relating to transfer of quantum services among quantum computing devices in a quantum computing system are provided. In one example, a request to transfer a quantum service in a quantum computing system is received at a first quantum computing device. A second quantum computing device to which to transfer the quantum service is determined. The quantum service is paused at the first quantum computing device. A service replication for the quantum service is communicated from a first task manager service associated with the first quantum computing device to a second task manager service associated with the second quantum computing device.
    Type: Application
    Filed: September 9, 2022
    Publication date: March 14, 2024
    Inventors: Leigh Griffin, Stephen Coady
  • Publication number: 20240086203
    Abstract: A computing device receives data related to operation of a cloud computing environment having an application comprising several services. The data related to operation of the cloud computing environment can include time-based data related to computing resource use in the cloud computing environment, such as I/O rate, processor utilization, and others. In some implementations the services that compose the application can be orchestrated through an orchestrator, and in those implementations data regarding the orchestration can also be provided to the computing device. The computing device can also request service-related information from the cloud computing environment, where the service-related information can include financial related information for operations in the cloud.
    Type: Application
    Filed: September 8, 2022
    Publication date: March 14, 2024
    Inventors: Leigh Griffin, Andrea Cosentino, Paolo Antinori
  • Publication number: 20240086753
    Abstract: Examples relating to qubit layers for containerized like execution are provided. In one example, a method may include obtaining a quantum service definition file. The method may include parsing the quantum service definition file to identify one or more instructions sets associated with qubit physical configuration. The method may include generating a qubit layer specification file based at least in part on the one or more instructions sets. The method may include storing the qubit layer specification file.
    Type: Application
    Filed: September 13, 2022
    Publication date: March 14, 2024
    Inventors: Stephen Coady, Leigh Griffin
  • Publication number: 20240086181
    Abstract: Systems and methods for automated targeted patching of a target system. In one embodiment the present disclosure includes a method for compiling binary files from a source code package; running a diff tool to determine differences between the binary files and an application already installed on a target system; generating, based on the determined differences, a patch that includes at least one file to be installed on the target system; generating, a mapping file, the mapping file including information on where the at least one file will be installed on the target system; combining, the mapping file and the patch into a patch package; and installing the patch package on the target system.
    Type: Application
    Filed: September 9, 2022
    Publication date: March 14, 2024
    Inventors: Pierre-Yves Chibon, Leigh Griffin
  • Publication number: 20240069883
    Abstract: Deriving a container from a package set is disclosed. Package set metadata that identifies a plurality of packages to be included in a container image based on a package set is accessed. A container configuration file referencing the plurality of packages is generated based at least in part on the package set metadata. The container configuration file includes one or more commands complying with a container builder syntax that are implementable by a container builder to generate a container image including the plurality of packages. The container configuration file is stored in a memory of a computer system.
    Type: Application
    Filed: August 31, 2022
    Publication date: February 29, 2024
    Inventors: Leigh Griffin, Pierre-Yves Chibon
  • Publication number: 20240072994
    Abstract: An identifier for a public unikernel of a plurality of public unikernels is provided to a client computing system, the public unikernel storing a first key paired to a second key stored within a private unikernel of a plurality of private unikernels accessible to a server computing system that serves the client computing system. An encoding based on the identifier for the public unikernel is generated, the encoding being configured to identify, to the server computing system, the private unikernel that stores the second key. The encoding is provided to the server computing system.
    Type: Application
    Filed: August 30, 2022
    Publication date: February 29, 2024
    Inventors: Leigh Griffin, Luigi Mario Zuccarelli
  • Publication number: 20240070511
    Abstract: Qubit predictability services for a quantum computing system are disclosed. In one example, a processor device of a computing system receives qubit utilization data that encodes a utilization history for each qubit in a set of qubits of a QCS. The processor device further performs one or more hypothesis tests for each qubit of the set of qubits based on the utilization history for the qubit and a set of quantum algorithms. The processor device further generates one or more predictability scores for each qubit of the set of qubits based on the one or more hypothesis tests for the set of qubits. The processor device further provides an indication of the one or more predictability scores for each qubit of the set of qubits to the QCS.
    Type: Application
    Filed: August 23, 2022
    Publication date: February 29, 2024
    Inventors: Leigh Griffin, Stephen Coady