Patents by Inventor Mark Leroy Shellenbaum
Mark Leroy Shellenbaum has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12332840Abstract: Techniques described herein relate to systems and methods of data storage, and more particularly to automatic file site clone generation. In certain embodiments, a computing device may include receiving a selection indicating that a clone directory is visible in a head node. In response to the selection indicating that the clone directory to be visible in the head node, the computing device may include generating a snapshot of a target file system. Also, the computing device may include duplicating a directory of the target file system into the clone directory. Further, the computing device may include mapping an address of the target file system into the clone directory. The computing device may include linking the clone directory to the head node.Type: GrantFiled: April 27, 2023Date of Patent: June 17, 2025Assignee: Oracle International CorporationInventors: John Michael Harres, Mark Leroy Shellenbaum, Bhaskar Sarkar
-
Patent number: 12189796Abstract: An instruction is received to define or modify a permission constraint corresponding to one or more file. A period of time is determined, where the period is one during which the defined or modified permission constraint is to apply to the one or more files. It is determined that the one or more files are to be deleted following completion of the period of time. A permission-instruction data set representing the permission constraint and a flag indicating that the one or more files are to be deleted following completion of the period of time are stored in a data store. It is detected that the period of time has ended. The one or more files are deleted in response to the detection.Type: GrantFiled: September 12, 2022Date of Patent: January 7, 2025Assignee: Oracle International CorporationInventors: John Michael Harres, Darren James Moffat, Mark Leroy Shellenbaum
-
Patent number: 12182278Abstract: Using a computer system, an instruction is received to define or modify a permission constraint corresponding to one or more files. A permission-instruction data set representing the permission constraint is stored in a data store. Subsequent to storing the permission-instruction data, a user request to access a particular file is intercepted. The data store is queried to determine whether any pending permission-instruction data set corresponds to the particular file. In response to the query, it is determined that the permission-instruction data set corresponds to the particular file. A permission constraint of the particular file is added or modified based on the permission-instruction data set. Based on the modified or added permission constraint, it is determined whether and/or an extent to which the user request is authorized. A response to the user request based on the determination as to whether and/or an extent to which the user request is authorized.Type: GrantFiled: January 5, 2022Date of Patent: December 31, 2024Assignee: Oracle International CorporationInventors: John Michael Harres, Darren James Moffat, Mark Leroy Shellenbaum
-
Publication number: 20240362184Abstract: Techniques described herein relate to systems and methods of data storage, and more particularly to automatic file site clone generation. In certain embodiments, a computing device may include receiving a selection indicating that a clone directory is visible in a head node. In response to the selection indicating that the clone directory to be visible in the head node, the computing device may include generating a snapshot of a target file system. Also, the computing device may include duplicating a directory of the target file system into the clone directory. Further, the computing device may include mapping an address of the target file system into the clone directory. The computing device may include linking the clone directory to the head node.Type: ApplicationFiled: April 27, 2023Publication date: October 31, 2024Applicant: Oracle International CorporationInventors: John Michael Harres, Mark Leroy Shellenbaum, Bhaskar Sarkar
-
Patent number: 12067132Abstract: Using a computer system, an instruction is received to define or modify a permission constraint corresponding to one or more files. A permission-instruction data set representing the permission constraint is stored in a data store. Subsequent to storing the permission-instruction data, a user request to access a particular file is intercepted. The data store is queried to determine whether any pending permission-instruction data set corresponds to the particular file. In response to the query, it is determined that the permission-instruction data set corresponds to the particular file. A permission constraint of the particular file is added or modified based on the permission-instruction data set. Based on the modified or added permission constraint, it is determined whether and/or an extent to which the user request is authorized. A response to the user request based on the determination as to whether and/or an extent to which the user request is authorized.Type: GrantFiled: December 23, 2021Date of Patent: August 20, 2024Assignee: Oracle International CorporationInventors: John Michael Harres, Darren James Moffat, Mark Leroy Shellenbaum
-
Publication number: 20230205899Abstract: Using a computer system, an instruction is received to define or modify a permission constraint corresponding to one or more files. A permission-instruction data set representing the permission constraint is stored in a data store. Subsequent to storing the permission-instruction data, a user request to access a particular file is intercepted. The data store is queried to determine whether any pending permission-instruction data set corresponds to the particular file. In response to the query, it is determined that the permission-instruction data set corresponds to the particular file. A permission constraint of the particular file is added or modified based on the permission-instruction data set. Based on the modified or added permission constraint, it is determined whether and/or an extent to which the user request is authorized. A response to the user request based on the determination as to whether and/or an extent to which the user request is authorized.Type: ApplicationFiled: January 5, 2022Publication date: June 29, 2023Applicant: Oracle International CorporationInventors: John Michael Harres, Darren James Moffat, Mark Leroy Shellenbaum
-
Publication number: 20230205900Abstract: An instruction is received to define or modify a permission constraint corresponding to one or more file. A period of time is determined, where the period is one during which the defined or modified permission constraint is to apply to the one or more files. It is determined that the one or more files are to be deleted following completion of the period of time. A permission-instruction data set representing the permission constraint and a flag indicating that the one or more files are to be deleted following completion of the period of time are stored in a data store. It is detected that the period of time has ended. The one or more files are deleted in response to the detection.Type: ApplicationFiled: September 12, 2022Publication date: June 29, 2023Applicant: Oracle International CorporationInventors: John Michael Harres, Darren James Moffat, Mark Leroy Shellenbaum
-
Publication number: 20230205903Abstract: Using a computer system, an instruction is received to define or modify a permission constraint corresponding to one or more files. A permission-instruction data set representing the permission constraint is stored in a data store. Subsequent to storing the permission-instruction data, a user request to access a particular file is intercepted. The data store is queried to determine whether any pending permission-instruction data set corresponds to the particular file. In response to the query, it is determined that the permission-instruction data set corresponds to the particular file. A permission constraint of the particular file is added or modified based on the permission-instruction data set. Based on the modified or added permission constraint, it is determined whether and/or an extent to which the user request is authorized. A response to the user request based on the determination as to whether and/or an extent to which the user request is authorized.Type: ApplicationFiled: December 23, 2021Publication date: June 29, 2023Applicant: Oracle International CorporationInventors: John Michael Harres, Darren James Moffat, Mark Leroy Shellenbaum