Patents by Inventor Leigh Griffin

Leigh Griffin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200128063
    Abstract: A quantum payload service for facilitating communications between a quantum computing system and classical computing systems is provided. A payload service in a quantum computing system that offers a plurality of different quantum services receives a message from a classical computing system that is destined for a first quantum service. The message includes a header and a payload. The payload service determines, from the header, an originator address and a destination quantum service identifier that identifies the first quantum service. The payload service extracts, from the message, the payload, and sends the payload, the originator address and the destination quantum service identifier to a quantum channel router of the quantum computing system for delivery of the payload to the first quantum service.
    Type: Application
    Filed: October 22, 2018
    Publication date: April 23, 2020
    Inventors: Leigh Griffin, Luigi Zuccarelli
  • Publication number: 20200117764
    Abstract: The disclosed techniques relate to validating and optimizing a quantum computing simulator. A quantum computing simulator executes a quantum executable file to obtain a first result. A second result is received from a quantum computer which also computes the quantum executable file. The hardware metadata associated with the quantum computer, and defining hardware conditions during a time in which the quantum executable file was executed to create the second result, is also received. In response to determining a difference between the first result and the second result, updated hardware metadata is created based on the received hardware metadata associated with the quantum computer. The quantum computing simulator performs a second execution of the quantum executable file based at least in part on the updated hardware metadata to obtain a third result.
    Type: Application
    Filed: October 16, 2018
    Publication date: April 16, 2020
    Inventors: Luigi Zuccarelli, Leigh Griffin
  • Publication number: 20200119987
    Abstract: Aspects of the disclosure provide for mechanisms for networking optimization using quantum computing. A method of the disclosure includes: receiving profile information of software defined network, wherein the profile information comprises information about a current configuration of the software defined network; generating, in view of the profile information, an optimization algorithm for optimizing the software defined network; and generating, by a processing device, a plurality of quantum instructions for implementing the optimization algorithm.
    Type: Application
    Filed: October 15, 2018
    Publication date: April 16, 2020
    Inventors: Leigh Griffin, Luigi Zuccarelli
  • Publication number: 20200074346
    Abstract: Aspects of the disclosure provide for mechanisms for providing optimization recommends for quantum computing. A method of the disclosure includes: receiving a first file including a first plurality of quantum instructions for implementing an algorithm; receiving hardware information of a plurality of quantum computer systems, wherein the hardware information comprises information about hardware capacities of the quantum computer systems; and generating, by a processing device, one or more optimization recommendations for implementing the algorithm in view of the first plurality of instructions and the hardware information. In some embodiments, the one or more optimization recommendations include an estimated qubit size required to implement the algorithm in at least one of the plurality of quantum computer systems.
    Type: Application
    Filed: August 30, 2018
    Publication date: March 5, 2020
    Inventors: Leigh Griffin, Luigi Zuccarelli
  • Publication number: 20190347127
    Abstract: Technology is disclosed for analyzing a virtual machine running multiple processes of services to provision and orchestrate the services within one or more containers. An example method may include: receiving data of a virtual machine, the data indicating a set of processes executed by the virtual machine; analyzing the set of processes to determine a set of candidate processes for building a plurality of container images; building the plurality of container images in view of the set of candidate processes and the data of the virtual machine; determining that computer code of a first process of the set of candidate processes is executable within a container supported by a first container image of the plurality of container images; and terminating the first process of the set of processes executed by the virtual machine.
    Type: Application
    Filed: May 9, 2018
    Publication date: November 14, 2019
    Inventors: Stephen Coady, Leigh Griffin
  • Publication number: 20190310872
    Abstract: Technology for analyzing a target machine (e.g., virtual machine or physical machine) and converting the services of the target machine to one or more container images that can be run using operating system level virtualization. An example method may include: receiving, by a processing device, data of a virtual machine, the data indicating a configuration of the virtual machine and a set of processes executed by the virtual machine; identifying, by the processing device, computer code of a first process of the set of processes executed by the virtual machine; analyzing the computer code to detect a link between the first process and a second process of the set of processes; and building a container image in view of the data of the virtual machine and the identified link, wherein the container image comprises the computer code of the first process and computer code of the second process.
    Type: Application
    Filed: April 6, 2018
    Publication date: October 10, 2019
    Inventors: Leigh Griffin, Stephen Coady
  • Publication number: 20190268164
    Abstract: Secure, platform-independent code signing is disclosed. For example, a project file is associated with metadata, and a memory is communicatively coupled with one or more processors that execute to retrieve the metadata. A guest associated with a hosting platform of the project file is instantiated. A toolchain and a signature associated with the project file are loaded to the guest, where the toolchain is determined based on the metadata. The project file is built into an executable file. The executable file is signed with the signature, resulting in a certified executable.
    Type: Application
    Filed: February 26, 2018
    Publication date: August 29, 2019
    Inventors: Leonardo Rossetti, Leigh Griffin
  • Patent number: 10380367
    Abstract: Dynamic access control of resources in a computing environment is disclosed. A policy retrieval point continuously monitors at least one new policy creation location for a new policy rule. It is detected that a first new policy rule has been added to the at least one new policy creation location. The first new policy rule is stored in a core policy rule structure that comprises a plurality of policy rules. A request for new policy rules is received, and the first new policy rule is communicated toward a policy decision point in response to the request.
    Type: Grant
    Filed: July 27, 2017
    Date of Patent: August 13, 2019
    Assignee: Red Hat, Inc.
    Inventor: Leigh Griffin
  • Patent number: 10324708
    Abstract: Updates to container images can be managed. For example, a processing device can detect that a first container-image is updated by monitoring a repository associated with the first container-image. The first container-image can be updated subsequent to a second container-image being built. The processing device can determine that the second container-image depends on the first container-image by analyzing a database that indicates a dependency relationship between the second container-image and the first container-image. The processing device can then automatically rebuild the second container-image using an updated version of the first container-image in response to (i) detecting that the first container-image was updated, and (ii) determining that the second container-image depends on the first container-image.
    Type: Grant
    Filed: November 14, 2017
    Date of Patent: June 18, 2019
    Assignee: Red Hat, Inc.
    Inventors: Leigh Griffin, Stephen Coady
  • Publication number: 20190146772
    Abstract: Updates to container images can be managed. For example, a processing device can detect that a first container-image is updated by monitoring a repository associated with the first container-image. The first container-image can be updated subsequent to a second container-image being built. The processing device can determine that the second container-image depends on the first container-image by analyzing a database that indicates a dependency relationship between the second container-image and the first container-image. The processing device can then automatically rebuild the second container-image using an updated version of the first container-image in response to (i) detecting that the first container-image was updated, and (ii) determining that the second container-image depends on the first container-image.
    Type: Application
    Filed: November 14, 2017
    Publication date: May 16, 2019
    Inventors: Leigh Griffin, Stephen Coady
  • Publication number: 20190034651
    Abstract: Dynamic access control of resources in a computing environment is disclosed. A policy retrieval point continuously monitors at least one new policy creation location for a new policy rule. It is detected that a first new policy rule has been added to the at least one new policy creation location. The first new policy rule is stored in a core policy rule structure that comprises a plurality of policy rules. A request for new policy rules is received, and the first new policy rule is communicated toward a policy decision point in response to the request.
    Type: Application
    Filed: July 27, 2017
    Publication date: January 31, 2019
    Inventor: Leigh Griffin