Patents by Inventor Nicos Vekiarides

Nicos Vekiarides has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11797519
    Abstract: Techniques for proving authenticity of data files, such as digital photos. An authentication/indexing server content from a client device such as a mobile device, and generates or receives other related data such as a reference to the content object, a fingerprint for the content object, and other metadata indicating for example a timestamp related to the content object. The fingerprint is inserted into a distributed ledger, with the distributed ledger returning a ledger address. A manifest object containing the transaction object, the ledger address, and a list of the content object and, optionally, related edits is then created and stored. The server may index fingerprints. Thus, a fingerprint can be used to authenticate subsequently received object against the stored metadata.
    Type: Grant
    Filed: June 19, 2019
    Date of Patent: October 24, 2023
    Assignee: Attestiv Inc.
    Inventors: John W. Bates, Thomas Mark Morley, Emmanuel Parasirakis, Nicos Vekiarides
  • Patent number: 11709823
    Abstract: A digital asset is represented and verified as a set of related digital asset or other content objects. Related metadata is stored on an immutable distributed ledger separately from the content objects themselves. For example, a transaction object includes metadata such as identifiers for two or more content objects, fingerprints for the content objects. The content objects may be stored in a local or cloud object repository. Validation of a later identified content object may include determining a fingerprint for the later identified content object, mapping that fingerprint to an address within the immutable distributed ledger to retrieve metadata previously mapped, and comparing the two fingerprints. Visual validation may be provided when the first and second fingerprints match, such as by displaying a positive icon adjacent the later identified object.
    Type: Grant
    Filed: September 9, 2021
    Date of Patent: July 25, 2023
    Assignee: Attestiv Inc.
    Inventors: John W. Bates, Thomas Mark Morley, Emmanuel Parasirakis, Nicos Vekiarides
  • Publication number: 20220100736
    Abstract: A digital asset is represented and verified as a set of related digital asset or other content objects. Related metadata is stored on an immutable distributed ledger separately from the content objects themselves. For example, a transaction object includes metadata such as identifiers for two or more content objects, fingerprints for the content objects. The content objects may be stored in a local or cloud object repository. Validation of a later identified content object may include determining a fingerprint for the later identified content object, mapping that fingerprint to an address within the immutable distributed ledger to retrieve metadata previously mapped, and comparing the two fingerprints. Visual validation may be provided when the first and second fingerprints match, such as by displaying a positive icon adjacent the later identified object.
    Type: Application
    Filed: September 9, 2021
    Publication date: March 31, 2022
    Inventors: John W. Bates, Thomas Mark Morley, Emmanuel Parasirakis, Nicos Vekiarides
  • Patent number: 11120013
    Abstract: A digital asset is represented and verified as a set of related digital asset or other content objects. Related metadata is stored on an immutable distributed ledger separately from the content objects themselves. For example, a transaction object includes metadata such as identifiers for two or more content objects, fingerprints for the content objects. The content objects may be stored in a local or cloud object repository. Validation of a later identified content object may include determining a fingerprint for the later identified content object, mapping that fingerprint to an address within the immutable distributed ledger to retrieve metadata previously mapped, and comparing the two fingerprints. Visual validation may be provided when the first and second fingerprints match, such as by displaying a positive icon adjacent the later identified object.
    Type: Grant
    Filed: June 19, 2019
    Date of Patent: September 14, 2021
    Assignee: Attestiv Inc.
    Inventors: John W. Bates, Thomas Mark Morley, Emmanuel Parasirakis, Nicos Vekiarides
  • Publication number: 20200012806
    Abstract: Techniques for proving authenticity of data files, such as digital photos. An authentication/indexing server content from a client device such as a mobile device, and generates or receives other related data such as a reference to the content object, a fingerprint for the content object, and other metadata indicating for example a timestamp related to the content object. The fingerprint is inserted into a distributed ledger, with the distributed ledger returning a ledger address. A manifest object containing the transaction object, the ledger address, and a list of the content object and, optionally, related edits is then created and stored. The server may index fingerprints. Thus, a fingerprint can be used to authenticate subsequently received object against the stored metadata.
    Type: Application
    Filed: June 19, 2019
    Publication date: January 9, 2020
    Inventors: John W. Bates, Thomas Mark Morley, Emmanuel Parasirakis, Nicos Vekiarides
  • Publication number: 20190391972
    Abstract: A digital asset is represented and verified as a set of related digital asset or other content objects. Related metadata is stored on an immutable distributed ledger separately from the content objects themselves. For example, a transaction object includes metadata such as identifiers for two or more content objects, fingerprints for the content objects. The content objects may be stored in a local or cloud object repository. Validation of a later identified content object may include determining a fingerprint for the later identified content object, mapping that fingerprint to an address within the immutable distributed ledger to retrieve metadata previously mapped, and comparing the two fingerprints. Visual validation may be provided when the first and second fingerprints match, such as by displaying a positive icon adjacent the later identified object.
    Type: Application
    Filed: June 19, 2019
    Publication date: December 26, 2019
    Inventors: John W. Bates, Thomas Mark Morley, Emmanuel Parasirakis, Nicos Vekiarides
  • Patent number: 10481962
    Abstract: A method for assessing the risk and cost for data loss and disaster recovery (DR) plans includes providing an application having a graphical user interface (GUI) comprising first and second windows arranged adjacent to each other. The first window comprises a catalog of components used to generate data disaster recovery (DR) configurations and the second window displays the generated DR configurations. A first DR configuration is generated in the second window and components are added to the first DR configuration by dragging and dropping components from the catalog into appropriate locations of the second window. Metrics for the first DR configuration are calculated and reported in the second window. A second configuration is also similarly generated in the second window and the metrics results are graphically compared to each other.
    Type: Grant
    Filed: May 28, 2009
    Date of Patent: November 19, 2019
    Assignee: EMC IP Holding Company LLC
    Inventors: John W. Bates, Nicos Vekiarides, Brian Geisel
  • Publication number: 20190347313
    Abstract: A note enrichment engine for applying context and structure to unstructured data, such as sales notes, through intelligent metadata tags. Metadata tags are associated with note records manually, or by automatic detection of keywords, or by other language understanding methods. Metadata tags may be configured to initiate events in other systems, such as to populate a database table in a related application such as a Customer Relationship Management (CRM) application, or to create an event in a calendar application, or to provide a taxonomy for note search and later retrieval.
    Type: Application
    Filed: May 7, 2019
    Publication date: November 14, 2019
    Inventors: Matthew M. Walsh, Nicos Vekiarides, Edgar Velazquez, Bryan Chambers
  • Patent number: 10154112
    Abstract: A cloud storage gateway is used to migrate a volume from a source cloud storage provider to a target cloud storage provider. If necessary, the gateway reconfigures the size of a logical cache associated with local storage devices so that the entire volume can be stored locally. Flushing is disabled and all of the locally stored volume pages are marked as dirty. After compression and encryption policies associated with the source and target are verified to be compatible, flushing is enabled and metadata is updated.
    Type: Grant
    Filed: February 11, 2015
    Date of Patent: December 11, 2018
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Michael D. Anthony, John W. Bates, Nicos A. Vekiarides, David King
  • Patent number: 8024426
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for non-disruptive data path modification using target mobility. A management server is in communication with a switching fabric. The switching fabric is in communication with a host and a data storage element. The management server creates a takeover target based on a primary target, where the primary target is part of a virtual data path between the host and the data storage. The switching fabric, through the direction of the server, modifies metadata associated with the virtual data path to expose the takeover target so that the takeover target becomes part of the virtual data path. The management server unexposes the primary target so that the primary target is no longer part of the virtual data path. The delay between exposing the takeover target and unexposing the primary target is sufficiently small to prevent an error condition from occurring at the host.
    Type: Grant
    Filed: May 9, 2008
    Date of Patent: September 20, 2011
    Assignee: Texas Memory Systems, Inc.
    Inventors: Dmitry Trikoz, Tom Middleton, Robert Mulcahy, Ric Calvillo, Jr., Nicos Vekiarides
  • Publication number: 20090300409
    Abstract: A method for assessing the risk and cost for data loss and disaster recovery (DR) plans includes providing an application having a graphical user interface (GUI) comprising first and second windows arranged adjacent to each other. The first window comprises a catalog of components used to generate data disaster recovery (DR) configurations and the second window displays the generated DR configurations. A first DR configuration is generated in the second window and components are added to the first DR configuration by dragging and dropping components from the catalog into appropriate locations of the second window. Metrics for the first DR configuration are calculated and reported in the second window. A second configuration is also similarly generated in the second window and the metrics results are graphically compared to each other.
    Type: Application
    Filed: May 28, 2009
    Publication date: December 3, 2009
    Applicant: TWINSTRATA, INC
    Inventors: John W. Bates, Nicos Vekiarides, Brian Geisel
  • Publication number: 20090103432
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for non-disruptive data path modification using target mobility. A management server is in communication with a switching fabric. The switching fabric is in communication with a host and a data storage element. The management server creates a takeover target based on a primary target, where the primary target is part of a virtual data path between the host and the data storage. The switching fabric, through the direction of the server, modifies metadata associated with the virtual data path to expose the takeover target so that the takeover target becomes part of the virtual data path. The management server unexposes the primary target so that the primary target is no longer part of the virtual data path. The delay between exposing the takeover target and unexposing the primary target is sufficiently small to prevent an error condition from occurring at the host.
    Type: Application
    Filed: May 9, 2008
    Publication date: April 23, 2009
    Applicant: Incipient, Inc.
    Inventors: Dmitry Trikoz, Tom Middleton, Robert Mulcahy, Ric Calvillo, JR., Nicos Vekiarides
  • Patent number: 7386610
    Abstract: A method, system, and computer program product for mirroring data in a computer network is described. At least one connection is established between a local storage server and a mirror storage server. A primary storage request is received from a network host at the local storage server. A mirror storage request is sent across the established at least one connection from the local storage server, wherein the mirror storage request corresponds to the received primary storage request. The mirror storage request is processed at the mirror storage server. A first heartbeat signal is sent from the local storage server to the mirror storage server. A second heartbeat signal is sent from the mirror storage server to the local storage server. Data of the received mirror storage request is stored in a mirror storage device corresponding to a primary storage device.
    Type: Grant
    Filed: September 18, 2000
    Date of Patent: June 10, 2008
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: Nicos A. Vekiarides
  • Patent number: 6977927
    Abstract: A system for allocating storage resources in a storage area network is described. A logical unit number (LUN) mapper receives at least one storage request parameter and maps the storage request parameters to at least one physical LUN. The LUN mapper includes at least one LUN map. The storage request parameters include a host id parameter, a target LUN parameter, and a target host bus adaptor (HBA) parameter. The LUN mapper uses the host id parameter to select the one of the LUN maps that corresponds to the host id parameter. The LUN mapper applies the target LUN parameter and the target HBA parameter to the selected LUN map to locate the physical LUN(s) stored in the selected LUN map. The LUN mapper issues the received read/write storage request to at least one storage device that houses the physical LUN(s). The one or more storage devices are located in the storage area network.
    Type: Grant
    Filed: September 18, 2000
    Date of Patent: December 20, 2005
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: John W. Bates, Nicos A. Vekiarides
  • Patent number: 6804819
    Abstract: A method, system, and computer program product for a data propagation platform and applications of same is described. The data propagation platform provides various storage functions. According to an embodiment, the factories of the data propagation platform create and implement device modules. Device modules perform operations on encapsulated messages formed from data and commands, such as device operation commands and data from storage device read/write operations. Device modules are formed into device chains. Device chains are able to perform various tasks as a sum of device modules. In embodiments, device chains are layered and built on each other.
    Type: Grant
    Filed: September 18, 2000
    Date of Patent: October 12, 2004
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: John W. Bates, Nicos A. Vekiarides