Patents by Inventor Leigh Griffin

Leigh Griffin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230418681
    Abstract: Systems and methods for intelligently scheduling containers are described. A set of different layers that is locally available on each of a set of compute nodes may be determined. In response to receiving a request to deploy a container, a specification file of the container may be decomposed to determine a set of layers required for execution of the container. The set of required layers may be compared to the set of different layers that is locally available on each of the set of compute nodes to determine which of the set of compute nodes has a largest number of the set of required layers locally available. The container may be assigned to one of the set of compute nodes based on a number of required layers locally available on each of the set of compute nodes and resource information of each of the set of compute nodes.
    Type: Application
    Filed: June 27, 2022
    Publication date: December 28, 2023
    Inventors: Stephen Coady, Leigh Griffin
  • Publication number: 20230418964
    Abstract: Customized policy decision point (PDP) services for policy-based access control systems can be generated according to some examples. In one example, a system can select an access control policy to apply to an access request received from a client that is attempting to access a computing resource. In response to selecting the access control policy, the system can select a code block from among a group of code blocks based on the access control policy. The system can then generate a customized PDP service by incorporating the code block into a PDP template, the customized PDP service being configured to execute the code block for applying the access control policy to the access request.
    Type: Application
    Filed: June 28, 2022
    Publication date: December 28, 2023
    Inventors: Leigh Griffin, Aoife Moloney
  • Patent number: 11848857
    Abstract: An application programming interface (API) gateway device receives an API request from a client device, the API gateway to provide access to a plurality of services provided by a plurality of compute nodes. A cluster manifest is created based on metadata associated with the API request and characteristics of the plurality of services, the cluster manifest identifying a logical view of a subset of the plurality of services provided by a subset of the plurality of compute nodes. The API request is routed to one of the subset of the plurality of services based on the cluster manifest.
    Type: Grant
    Filed: July 11, 2022
    Date of Patent: December 19, 2023
    Assignee: Red Hat, Inc.
    Inventors: Leigh Griffin, Pierre-Yves Chibon
  • Patent number: 11836108
    Abstract: Performing file difference operations on quantum files in a state of superposition is disclosed herein. In one example, a quantum computing device accesses a first plurality of data values of a first plurality of qubits for a first quantum file, as well as a second plurality of data values of a second plurality of qubits for a second quantum file, wherein the first plurality of qubits and the second plurality of qubits are in a state of superposition. A plurality of read operations are performed on each qubit of the first plurality of qubits and the second plurality of qubits to determine a corresponding first plurality of data values and a second plurality of data values. A file difference operation is then performed using the first plurality of data values and the second plurality of data values, and a result is generated based on the file difference operation.
    Type: Grant
    Filed: January 25, 2021
    Date of Patent: December 5, 2023
    Assignee: Red Hat, Inc.
    Inventors: Leigh Griffin, Stephen Coady
  • Patent number: 11836529
    Abstract: Iterative workload processing having a mandatory processing task and a preferred processing task. A processor device iteratively performs a processing workload that comprises a mandatory processing task and a preferred processing task. The mandatory processing task includes accessing a plurality of input messages that have not yet been processed, and the preferred processing task has a target timeframe within which to be performed. For each iteration, a maximum preferred processing task amount of time to perform the preferred processing task is determined based on a moving average of mandatory processing task times of previous iterations and based on the target timeframe. The preferred processing task is performed for a period of time no greater than the maximum preferred processing task amount of time.
    Type: Grant
    Filed: December 17, 2019
    Date of Patent: December 5, 2023
    Assignee: Red Hat, Inc.
    Inventors: Ali Ok, Leigh Griffin
  • Publication number: 20230388186
    Abstract: A system and method of protecting communication in a mesh network of nodes. The method including receiving a request from a joiner node of the mesh network to join the mesh network. The method including validating permissions for the joiner node responsive to receiving the request. The method including acquiring one or more dictionary objects based on the permissions. The method including granting, by a control node of a mesh network, access rights for the joiner node to join the mesh network by transmitting an access rights message comprising the one or more dictionary objects to the joiner node, wherein the access rights message causes the joiner node to locally store the one or more dictionary objects and use the one or more dictionary objects when communicating with one or more nodes of the mesh network.
    Type: Application
    Filed: May 26, 2022
    Publication date: November 30, 2023
    Inventors: Leigh Griffin, Pierre-Yves Chibon
  • Publication number: 20230385671
    Abstract: Embodiments of the present disclosure provide techniques for seamlessly switching between a classical controller and a quantum controller that both implement an application, based on which controller is better suited for processing a received request for functionality of the application. The classical controller and the quantum controller both implement the same logic for the application, and the classical controller interfaces with a model and a view as part of a model, view and controller (MVC) framework. A Quantum Model View Controller (QMVC) service determines whether the request is to be processed by the classical or quantum controller. In response to determining that the request is to be processed by the quantum controller, the QMVC service diverts the request to the quantum controller and provide a first application program interface (API) gateway between the quantum controller and the model and a second API gateway between the quantum controller and the view.
    Type: Application
    Filed: May 25, 2022
    Publication date: November 30, 2023
    Inventors: Leigh Griffin, Stephen Coady
  • Publication number: 20230385090
    Abstract: Processing logic may provide a first container having a first software version. Processing logic may create a second container having a second software version within the first container. Processing logic may replace the first container with the second container, in response to testing of the second container satisfying one or more criteria.
    Type: Application
    Filed: May 24, 2022
    Publication date: November 30, 2023
    Inventors: Leigh Griffin, Pierre-Yves Chibon
  • Patent number: 11829771
    Abstract: During a boot process of a computing device, a boot loader loads a kernel and an initial RAM disk image from a persistent storage device into RAM. The initial RAM disk image includes a file system that includes a camera application. The kernel is invoked, and the kernel mounts a RAM disk from the initial RAM disk image as a root file system. The kernel causes an initiation of the camera application into a user space. The camera application obtains an image frame from a camera. The camera application processes the image frame to generate a processed image frame, and provides the processed image frame to a frame buffer for presentation of the processed image frame on a display device.
    Type: Grant
    Filed: April 29, 2022
    Date of Patent: November 28, 2023
    Assignee: Red Hat, Inc.
    Inventors: Eric Curtin, Leigh Griffin
  • Publication number: 20230376360
    Abstract: A system can instantiate a first container and a sidecar container on a first node. The system can transmit configuration data from the first container to the sidecar container. The system can then initiate a migration of the sidecar container from the first node to a second node, where the second node has a different computer architecture than the first node. The second node can provide the configuration data from the sidecar container to a second container, for example after the migration is complete.
    Type: Application
    Filed: May 23, 2022
    Publication date: November 23, 2023
    Inventors: Leigh Griffin, Pierre-Yves Chibon
  • Patent number: 11823011
    Abstract: Analyzing execution of quantum services using quantum computing devices and quantum simulators is disclosed. In one example, a classical computing device receives an operating parameter representing an operating condition of a quantum computing device. Upon determining that the operating parameter satisfies an operating environment threshold, the classical computing device initiates execution of a first instance of a quantum service on the quantum computing device. The classical computing device also simulates, using a quantum simulator, the operating condition of the quantum computing device based on the operating parameter, and executes a second instance of the quantum service using the quantum simulator under the simulated operating condition, in parallel with execution of the first instance of the quantum service. The classical computing device obtains and records a first performance characteristic of the quantum computing device and a second performance characteristic of the quantum simulator.
    Type: Grant
    Filed: July 28, 2021
    Date of Patent: November 21, 2023
    Assignee: Red Hat, Inc.
    Inventors: Leigh Griffin, Stephen Coady
  • Publication number: 20230367657
    Abstract: One example described herein include a system that can detect an event associated with executing a software operation using a quantum service of a quantum computing system. Based on detecting the event, the system can identify a classical service (of a classical computing system) that corresponds to the quantum service. The system can then cause the software operation to be executed using the classical service.
    Type: Application
    Filed: May 12, 2022
    Publication date: November 16, 2023
    Inventors: Leigh Griffin, Stephen Coady
  • Patent number: 11816534
    Abstract: Hotswapping qubits for resource-limited quantum computing devices is disclosed. In one example, a processor device of a quantum computing device executes a first quantum service that comprises one or more qubits. The processor device receives a first request from a quantum service scheduler to allow a second quantum service to access the one or more qubits. In response to receiving the first request, the processor device suspends execution of the first quantum service. The processor device exports first metadata representing a first state of each qubit of the one or more qubits to a classical computing device. After exporting the first metadata, the processor device allocates the one or more qubits to the second quantum service, and executes the second quantum service.
    Type: Grant
    Filed: May 27, 2021
    Date of Patent: November 14, 2023
    Assignee: Red Hat, Inc.
    Inventors: Leigh Griffin, Stephen Coady
  • Patent number: 11818256
    Abstract: Providing cascading quantum encryption services is disclosed. In one example, a first quantum computing device provides a plurality of encryption services that include one or more quantum encryption services and one or more classical encryption services. To encrypt a payload for transmission, the first quantum computing device selects a first encryption service from among the plurality of encryption services. The first quantum computing device then detects that the first encryption service is compromised. In response to detecting that the first encryption service is compromised, the first quantum computing device selects a second encryption service from among the plurality of encryption services, and encrypts the payload using the second encryption service. By automatically “cascading” from the first encryption service to the second encryption service in this manner, the first quantum computing device may ensure the secure communication of the payload to the second quantum computing device.
    Type: Grant
    Filed: March 2, 2020
    Date of Patent: November 14, 2023
    Assignee: Red Hat, Inc.
    Inventors: Stephen Coady, Leigh Griffin
  • Publication number: 20230359534
    Abstract: Described is a system and method that includes executing, by a processing device, a data risk mitigation service (DRMS), to monitor, for each node of a plurality of nodes in a mesh network, at least one of metadata indicating a health state of a node or a call for help from the node. The method includes determining, by the DRMS, whether the node is in an unstable state in view of the metadata or the call for help from the node. The method includes in response to determining that the node is in the unstable state, rerouting incoming data of the node and evacuating data stored in the node.
    Type: Application
    Filed: May 4, 2022
    Publication date: November 9, 2023
    Inventors: Leigh Griffin, Pierre-Yves Chibon
  • Publication number: 20230353630
    Abstract: A system can receive a request for establishing a communication channel between a first node executing a first operating system and a second node executing a second operating system, the second operating system being different from the first operating system. The system can obtain specification data configured for deploying a container that includes the first operating system and communication software. The system can, in response to receiving the request, transmit the specification data to the second node. The second node can deploy the container with the first operating system and the communication software based on the specification data. The communication software can establish the communication channel between a first instance of the first operating system executing on the first node and a second instance of the first operating system executing in the container.
    Type: Application
    Filed: April 28, 2022
    Publication date: November 2, 2023
    Inventors: Leigh Griffin, Pierre-Yves Chibon
  • Publication number: 20230351239
    Abstract: Biases on quantum bits can be dynamically adjusted based on events. For example, a system can detect an event related to a service executing in a computing environment. The service can rely on a state of a quantum bit of a quantum computing subsystem in performing a computing operation. The system can determine an amount of bias to apply to the quantum bit based on the event. The amount of bias can be configured to modify a result of the computing operation. The system can transmit a control signal configured to cause the quantum computing subsystem to apply the amount of bias to the quantum bit (e.g., while the service is executing).
    Type: Application
    Filed: April 27, 2022
    Publication date: November 2, 2023
    Inventors: LEIGH GRIFFIN, Stephen Coady
  • Publication number: 20230350690
    Abstract: During a boot process of a computing device, a boot loader loads a kernel and an initial RAM disk image from a persistent storage device into RAM. The initial RAM disk image includes a file system that includes a camera application. The kernel is invoked, and the kernel mounts a RAM disk from the initial RAM disk image as a root file system. The kernel causes an initiation of the camera application into a user space. The camera application obtains an image frame from a camera. The camera application processes the image frame to generate a processed image frame, and provides the processed image frame to a frame buffer for presentation of the processed image frame on a display device.
    Type: Application
    Filed: April 29, 2022
    Publication date: November 2, 2023
    Inventors: Eric Curtin, Leigh Griffin
  • Publication number: 20230351240
    Abstract: Performing Just-In-Time (JIT) error correction optimization for quantum services using quantum simulators is disclosed herein. In one example, a processor device of a classical computing device receives an error correction optimization request from a quantum computing device, the error correction optimization request comprising one or more instructions of a service definition file of the quantum service including a location of an error, and also comprising a corrective action. Upon receiving the error correction optimization request, the processor device instantiates a plurality of quantum simulator instances associated with corresponding plurality of error correction profiles. The processor device then initiates execution of the one or more instructions in each of the plurality of quantum simulator instances to generate a corresponding plurality of execution results.
    Type: Application
    Filed: April 29, 2022
    Publication date: November 2, 2023
    Inventors: Leigh Griffin, Stephen Coady
  • Publication number: 20230353572
    Abstract: Access requests for policy-based access control systems can be managed according to some examples. In one example, a system can receive, from a client device, a first access request for accessing a particular resource. The system can determine a first response approving or denying the first access request based on an access control policy. The system can store a data entry indicating the first response to the first access request. The system can set a flag to indicate that a future access request for the particular resource is to be handled using the data entry. Subsequent to setting the flag, the system can receive a second access request from the client device for accessing the particular resource. Based on determining that the flag is set, the system can determine a second response to the second access request based on the data entry rather than the access control policy.
    Type: Application
    Filed: April 28, 2022
    Publication date: November 2, 2023
    Inventors: Leigh Griffin, Pierre-Yves Chibon