Patents by Inventor Michael A. Garcia

Michael A. Garcia has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11657159
    Abstract: Aspects of the invention include systems and methods for to detecting security vulnerabilities using modeled attribute propagation. A non-limited example of a computer-implemented method includes generating a model of a device under test, the model comprising a data path similar to the device under test and an attribute network. The method further includes detecting protected data that is introduced into the model and marking the protected data with an attribute. An end point of the marked protected data is detected along the data path. In response to the end point being indicative of a vulnerability, an alert is issued.
    Type: Grant
    Filed: October 16, 2020
    Date of Patent: May 23, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Matthew Michael Garcia Pardini, Bodo Hoppe, Zoltan Tibor Hidvegi, Michael P Mullen
  • Patent number: 11645282
    Abstract: A system comprising one or more computers implements a data retrieval interface. The data retrieval interface provides a unified schema definition language for data queries. Also the data retrieval interface implements a routing layer that applies default or custom prioritization parameters to select a data source from which to obtain data requested in a query from an application. The data retrieval interface may take into consideration connectivity, latency, costs, or other user specified parameters when selecting a data source and/or when selecting connection path to a selected data source to be used to obtain data in response to a query.
    Type: Grant
    Filed: September 29, 2020
    Date of Patent: May 9, 2023
    Assignee: Amazon Technologies, Inc.
    Inventors: Michael Garcia, David Joseph Mifsud, Edwin Ricardo Mendez Rodriguez, David Wayne Lasley, Pratibha Rawat
  • Publication number: 20230072064
    Abstract: In one implementation, a method for scheduling beams of an antenna on a satellite during a defined time period includes calculating a beam score for each beam based on the expected gain of the beam and determining that the number of beams having non-zero beam scores during the defined time period is less than a threshold value. In addition, the method also includes accessing a set of beam weights for each of multiple different candidate beam patterns, and, for each set of weights, multiplying individual beam weights by corresponding beam scores, and generating a candidate beam pattern score by calculating a sum of the products of the beam weights and corresponding beam scores. The method further includes comparing the candidate beam pattern scores, selecting a particular one of the candidate beam patterns, and scheduling the selected beam pattern for the defined time period.
    Type: Application
    Filed: July 6, 2022
    Publication date: March 9, 2023
    Applicant: Aireon LLC
    Inventors: Michael A. GARCIA, Boris VEYTSMAN
  • Publication number: 20230047349
    Abstract: A computer-implemented method, according to one embodiment, includes: storing records in an input data buffer, where each of the records include a key which is appended to payload data in the respective record. Moreover, for each of the records: shearing the key associated with the record from the payload data, normalizing the sheared key, and storing the normalized sheared key in a first target area of memory. A determination is made as to whether a size of the payload data in the record is outside a predetermine range, and in response to determining that the size of the payload data in the record is outside the predetermine range, the payload data is stored in a second target area of memory. A data locator is also appended to the normalized sheared key in the first target area of memory to form a sheared record.
    Type: Application
    Filed: August 16, 2021
    Publication date: February 16, 2023
    Inventors: Scott B. Compton, Jeffrey Richard Suarez, Matthew Michael Garcia Pardini, Christian Jacobi, Dominik Steenken, Sri Hari Kolusu, Vicky Vezinaw
  • Patent number: 11567214
    Abstract: In one implementation, first and second messages are received that include encoded position information for a transmitter. It is determined that both were received within some time of a previous message and that the second message was received within some time of the first message. A first location of the transmitter is determined based on the encoded position in the first message and the previously determined location. A second location of the transmitter is determined based on the encoded position in the second message and the previously determined location. It also is determined that the first and second locations are within a threshold distance. An updated second location of the transmitter is determined based on the encoded position information in the second message and the first location. A determination is made that the second location and the updated second location are within a threshold distance.
    Type: Grant
    Filed: December 17, 2019
    Date of Patent: January 31, 2023
    Assignee: AIREON LLC
    Inventors: John Dolan, Michael A. Garcia
  • Patent number: 11513704
    Abstract: A computer-implemented method, according to one embodiment, includes: processing records by, for each of the records: shearing the key associated with the record from the payload data, normalizing the sheared key, and storing the normalized sheared key in a first target area of memory. A determination is made whether a size of the payload data is outside a first predetermined range. In response to determining that the size of the payload data is outside the first predetermined range, the payload data is stored in a second target area of memory, and a data locator is appended to the normalized sheared key. Furthermore, in response to determining that a storage capacity of the memory is outside a second predetermined range, some of the payload data is transferred to external physical storage. Moreover, an external list is integrated with each of the data locators that correspond to the transferred payload data.
    Type: Grant
    Filed: August 16, 2021
    Date of Patent: November 29, 2022
    Assignee: International Business Machines Corporation
    Inventors: Scott B. Compton, Jeffrey Richard Suarez, Matthew Michael Garcia Pardini, Christian Jacobi
  • Publication number: 20220321655
    Abstract: A system comprising one or more computers implements a synthetic sensor service configured to deploy synthetic sensors to in-vehicle computing devices implementing an in-vehicle distributed computing environment. A synthetic sensor may be placed monolithically at a single computing device (e.g. ECU) in the vehicle, or may be modularly placed on multiple computing devices (e.g. multiple ECUs) of the vehicle that each have resources or inputs that the synthetic sensor requires. The modular components of the synthetic sensor may execute in a runtime environment of the in-vehicle distributed computing environment, such that the modular components function as a unified synthetic sensor even though they are placed on different computing devices of the vehicle (e.g. different ECUs).
    Type: Application
    Filed: March 31, 2021
    Publication date: October 6, 2022
    Applicant: Amazon Technologies, Inc.
    Inventors: Edwin Ricardo Mendez Rodriguez, Brett Francis, David Joseph Mifsud, Michael Garcia
  • Patent number: 11443044
    Abstract: A computer-implemented method for advancing speculative execution in microarchitectures is disclosed. A non-limiting example of the computer-implemented method includes receiving, by a processor, a test scenario including a first load instruction from a first memory location flagged with a delay notification and a speculative memory access instruction from a second memory following the first load instruction. The method executes, by the processor, the first load instruction from the first memory location and delays a return of data from the first memory location for a number of processor cycles. The method executes, by the processor, the speculative storage access instruction from the second memory location during the delay in returning the data from the first memory location.
    Type: Grant
    Filed: September 23, 2019
    Date of Patent: September 13, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Olaf Knute Hendrickson, Michael P Mullen, Matthew Michael Garcia Pardini
  • Publication number: 20220218101
    Abstract: A hand held mobile studio and booth system includes a stick coupled with a universal mount to hold one or more components through one or more connectors. For example, the one or more components include one or more computing devices, a microphone, a noise protection filter to reduce popping sounds caused by fast moving air on the microphone, one or more electronic devices to allow dual transmission, and one or more reflection filters to reduce background noise by preventing sound waves reflection.
    Type: Application
    Filed: January 10, 2022
    Publication date: July 14, 2022
    Inventor: Steven Michael Garcia
  • Publication number: 20220214714
    Abstract: A digital wall calendar apparatus for digital schedule tracking includes a housing having a front side, a back side, a left side, a right side, a top side, and a bottom side. The housing is rectangular and the back side has a plurality of mounting apertures to receive wall-mounted hardware to hang the housing vertically against a wall. A display is coupled to the front side of the housing. The display is a touchscreen. A microprocessor is coupled within the housing and is in operational communication with the display. A transceiver is coupled within the housing and is in operational communication with the microprocessor. A battery is coupled within the housing and is in operational communication with the microprocessor. A charging port is coupled to the housing and is in operational communication with the battery.
    Type: Application
    Filed: January 7, 2021
    Publication date: July 7, 2022
    Inventor: Michael Garcia
  • Publication number: 20220121752
    Abstract: Aspects of the invention include systems and methods for to detecting security vulnerabilities using modeled attribute propagation. A non-limited example of a computer-implemented method includes generating a model of a device under test, the model comprising a data path similar to the device under test and an attribute network. The method further includes detecting protected data that is introduced into the model and marking the protected data with an attribute. An end point of the marked protected data is detected along the data path. In response to the end point being indicative of a vulnerability, an alert is issued.
    Type: Application
    Filed: October 16, 2020
    Publication date: April 21, 2022
    Inventors: Matthew Michael Garcia Pardini, Bodo Hoppe, Zoltan Tibor Hidvegi, Michael P. Mullen
  • Patent number: 11296721
    Abstract: An apparatus is disclosed. The apparatus includes a first controller including a plurality of contactors, each of the plurality of contactors configured to be selectively connected to a connector of a user interface, a plurality of electrical relays that are connected to the plurality of contactors, a second controller that is connected to the plurality of electrical relays, the plurality of electrical relays connected between the first controller and the second controller, and a user device or a network component that transfers control data to the second controller. The second controller controls the plurality of electrical relays to provide input to the first controller via the plurality of contactors based on the control data.
    Type: Grant
    Filed: June 16, 2021
    Date of Patent: April 5, 2022
    Assignee: AAEON Electronics, Inc.
    Inventors: Bernard C. Yang, Michael Garcia
  • Publication number: 20220078077
    Abstract: A system comprising one or more computers implements a virtual domain control unit/virtual electronic control unit service configured to deploy vehicle code packages to one or more of a plurality of supported virtual domain control unit/electronic control unit orchestration environments, which include both a local orchestration environment and one or more remote orchestration environments. In such orchestration environments, virtual domain control units and/or virtual electronic control units are implemented that execute code included in the vehicle code packages. In some embodiments, such virtual domain control units or virtual electronic control units allow computing capacity and/or data storage capacity of a vehicle to be augmented via remotely implemented virtual domain control units and/or remotely implemented virtual electronic control units.
    Type: Application
    Filed: September 8, 2020
    Publication date: March 10, 2022
    Applicant: Amazon Technologies, Inc.
    Inventors: David Joseph Mifsud, Edwin Ricardo Mendez Rodriguez, Michael Garcia, Brett Francis, Matthew Jonathan Narksusook, Abhijit Dayakar
  • Publication number: 20220045748
    Abstract: In one implementation, a method for scheduling beams of an antenna on a satellite during a defined time period includes calculating a beam score for each beam based on the expected gain of the beam and determining that the number of beams having non-zero beam scores during the defined time period is less than a threshold value. In addition, the method also includes accessing a set of beam weights for each of multiple different candidate beam patterns, and, for each set of weights, multiplying individual beam weights by corresponding beam scores, and generating a candidate beam pattern score by calculating a sum of the products of the beam weights and corresponding beam scores. The method further includes comparing the candidate beam pattern scores, selecting a particular one of the candidate beam patterns, and scheduling the selected beam pattern for the defined time period.
    Type: Application
    Filed: March 25, 2021
    Publication date: February 10, 2022
    Inventors: Michael A. GARCIA, Boris VEYTSMAN
  • Patent number: 11205005
    Abstract: A computer-implemented method for detecting vulnerabilities in microarchitectures. A non-limiting example of the computer-implemented method includes creating a simulation for execution on a model of a microarchitecture, the simulation including a set of instructions and a placeholder for holding a piece of secret data. The computer-implemented method executes the simulation a first time on the model of the microarchitecture with a first piece of secret data stored in the placeholder and stores a first output of the first executed simulation. The computer-implemented method executes the simulation a second time on the model of the microarchitecture with a second piece of secret data stored in the placeholder and stores a second output of the second executed simulation. The computer-implemented method compares the first output with the second output and provides an indication of a microarchitecture vulnerability when there is a difference between the first output and the second output.
    Type: Grant
    Filed: September 23, 2019
    Date of Patent: December 21, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Matthew Michael Garcia Pardini, Gregory William Alexander, Jonathan Ting Hsieh, Michael P Mullen, Olaf Knute Hendrickson
  • Patent number: 11136967
    Abstract: An articulating joint for a wind turbine having a tower defining a shaft and a deck provided in the shaft includes a bracket extending from a first end having a fixed connection with the deck to a second end including an opening. A fastener includes a head pivotably connected to the tower and a shaft extending through the opening. A washer connected to the bracket is aligned with the opening for receiving the shaft such that the fastener is pivotable with the washer relative to the opening to allow for relative movement between the tower and the deck.
    Type: Grant
    Filed: July 2, 2018
    Date of Patent: October 5, 2021
    Assignee: INVENTUS HOLDINGS, LLC
    Inventors: Gary Michael Garcia, Robert W. Gallaher, Michael C. Wertz
  • Patent number: 11106602
    Abstract: A computer-implemented method includes generating a plurality of test cases to test exploitation of speculative execution in a design of a computer processor, where the plurality of test cases include a first test case. Generating the first test case includes identifying a branch responsive to an attempted access to secure data and, responsive to the branch, marking each memory address of each memory access dependent on the attempted access to the secure data. The computer-implemented method further includes executing the first test case. Executing the first test case includes detecting an attempt to access a memory address that has been marked and, responsive to the attempt to access the memory address that has been marked, alerting of a security violation.
    Type: Grant
    Filed: September 4, 2019
    Date of Patent: August 31, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Olaf Hendrickson, Matthew Michael Garcia Pardini, Michael P. Mullen
  • Publication number: 20210181355
    Abstract: In one implementation, first and second messages are received that include encoded position information for a transmitter. It is determined that both were received within some time of a previous message and that the second message was received within some time of the first message. A first location of the transmitter is determined based on the encoded position in the first message and the previously determined location. A second location of the transmitter is determined based on the encoded position in the second message and the previously determined location. It also is determined that the first and second locations are within a threshold distance. An updated second location of the transmitter is determined based on the encoded position information in the second message and the first location. A determination is made that the second location and the updated second location are within a threshold distance.
    Type: Application
    Filed: December 17, 2019
    Publication date: June 17, 2021
    Inventors: John DOLAN, Michael A. GARCIA
  • Publication number: 20210089659
    Abstract: A computer-implemented method for detecting vulnerabilities in microarchitectures. A non-limiting example of the computer-implemented method includes creating a simulation for execution on a model of a microarchitecture, the simulation including a set of instructions and a placeholder for holding a piece of secret data. The computer-implemented method executes the simulation a first time on the model of the microarchitecture with a first piece of secret data stored in the placeholder and stores a first output of the first executed simulation. The computer-implemented method executes the simulation a second time on the model of the microarchitecture with a second piece of secret data stored in the placeholder and stores a second output of the second executed simulation. The computer-implemented method compares the first output with the second output and provides an indication of a microarchitecture vulnerability when there is a difference between the first output and the second output.
    Type: Application
    Filed: September 23, 2019
    Publication date: March 25, 2021
    Inventors: Matthew Michael Garcia Pardini, Gregory William Alexander, Jonathan Ting Hsieh, Michael P. Mullen, Olaf Knute Hendrickson
  • Publication number: 20210089660
    Abstract: A computer-implemented method for advancing speculative execution in microarchitectures is disclosed. A non-limiting example of the computer-implemented method includes receiving, by a processor, a test scenario including a first load instruction from a first memory location flagged with a delay notification and a speculative memory access instruction from a second memory following the first load instruction. The method executes, by the processor, the first load instruction from the first memory location and delays a return of data from the first memory location for a number of processor cycles. The method executes, by the processor, the speculative storage access instruction from the second memory location during the delay in returning the data from the first memory location.
    Type: Application
    Filed: September 23, 2019
    Publication date: March 25, 2021
    Inventors: Olaf Knute Hendrickson, Michael P Mullen, Matthew Michael Garcia Pardini