Patents by Inventor Robert Graham Clark

Robert Graham Clark has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11962599
    Abstract: A computer system may receive one or more requests for access to one or more cloud services and may store the one or more requests in a request log. The computer system may receive one or more access rules applicable to cloud service access rights. The computer system may aggregate the one or more requests of the request log to determine access requirements for a container, the container being configured to store one or more applications. The computer system may generate and store container access policies that define access of a container and the one or more cloud services, the container access policies based at least in part on the aggregated one or more requests and the one or more access rules. The computer system may send the container access policies to a request forwarder of a compute instance in a production environment.
    Type: Grant
    Filed: May 9, 2023
    Date of Patent: April 16, 2024
    Assignee: Oracle International Corporation
    Inventors: Olgierd Stanislaw Pieczul, Hubert Alexander Foskett, Robert Graham Clark
  • Publication number: 20230388302
    Abstract: A system and technique for a Request Forwarder as for a computer network architecture is disclosed to provide selective access to one or more cloud services. In some implementations, a computer system may receive a request for access to a cloud service, the request including a container credential. The computer system may determine an identification of the container using the container credential. The computer system may verify that the container requesting access to the cloud service is authorized based at least in part on stored policies. Based at least in part on the determination that the container requesting access to the cloud service is authorized: receiving instance credential from a metadata service. The computer system may include the instance credential with the request. The computer system may send the request to the cloud service. In various examples, the Request Forwarder can be provided as a service.
    Type: Application
    Filed: May 9, 2023
    Publication date: November 30, 2023
    Applicant: Oracle International Corporation
    Inventors: Olgierd Stanislaw Pieczul, Shrey Arora, Robert Graham Clark
  • Publication number: 20230336561
    Abstract: A computer system may receive one or more requests for access to one or more cloud services and may store the one or more requests in a request log. The computer system may receive one or more access rules applicable to cloud service access rights. The computer system may aggregate the one or more requests of the request log to determine access requirements for a container, the container being configured to store one or more applications. The computer system may generate and store container access policies that define access of a container and the one or more cloud services, the container access policies based at least in part on the aggregated one or more requests and the one or more access rules. The computer system may send the container access policies to a request forwarder of a compute instance in a production environment.
    Type: Application
    Filed: May 9, 2023
    Publication date: October 19, 2023
    Applicant: Oracle International Corporation
    Inventors: Olgierd Stanislaw Pieczul, Hubert Alexander Foskett, Robert Graham Clark
  • Patent number: 11695776
    Abstract: A computer system may receive one or more requests for access to one or more cloud services and may store the one or more requests in a request log. The computer system may receive one or more access rules applicable to cloud service access rights. The computer system may aggregate the one or more requests of the request log to determine access requirements for a container, the container being configured to store one or more applications. The computer system may generate and store container access policies that define access of a container and the one or more cloud services, the container access policies based at least in part on the aggregated one or more requests and the one or more access rules. The computer system may send the container access policies to a request forwarder of a compute instance in a production environment.
    Type: Grant
    Filed: February 16, 2021
    Date of Patent: July 4, 2023
    Assignee: Oracle International Corporation
    Inventors: Olgierd Stanislaw Pieczul, Hubert Alexander Foskett, Robert Graham Clark
  • Patent number: 11695765
    Abstract: A system and technique for a Request Forwarder as for a computer network architecture is disclosed to provide selective access to one or more cloud services. In some implementations, a computer system may receive a request for access to a cloud service, the request including a container credential. The computer system may determine an identification of the container using the container credential. The computer system may verify that the container requesting access to the cloud service is authorized based at least in part on stored policies. Based at least in part on the determination that the container requesting access to the cloud service is authorized: receiving instance credential from a metadata service. The computer system may include the instance credential with the request. The computer system may send the request to the cloud service. In various examples, the Request Forwarder can be provided as a service.
    Type: Grant
    Filed: January 6, 2021
    Date of Patent: July 4, 2023
    Assignee: Oracle International Corporation
    Inventors: Olgierd Stanislaw Pieczul, Shrey Arora, Robert Graham Clark
  • Patent number: 11539754
    Abstract: Techniques are disclosed for generating network security policies for different versions of a component of an application deployed in a computing environment where the different versions have potentially different network requirements and the different versions operate together at the same time in the computing environment. The disclosed techniques include capabilities for enabling different versions of a component of a containerized application to co-exist at the same time on different computing nodes in a cluster of nodes in a containerized environment that deploys and executes the application. The techniques additionally include capabilities for enabling different network policies to be generated for the different versions of the component, where each component has potentially different network requirements. The techniques provide a mechanism to create precise, per-component network policies, while respecting the overall coarse-grained policies of the containerized application.
    Type: Grant
    Filed: December 16, 2020
    Date of Patent: December 27, 2022
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventors: Olgierd Stanislaw Pieczul, Robert Graham Clark, Nitin Srinivasa Rao Jami
  • Patent number: 11444837
    Abstract: Techniques are disclosed for network policy verification system that can obtain a set of connectivity paths of a containerized environment that individually indicate connections between pairs of containers. Identify a first container and a second container of a pair based at least in part on a connectivity path. Determine a network policy corresponding to the connectivity path that indicates an expected result of that particular connection. A connection can be initiated between the two containers. The result may be presented at a user device based at least in part on identifying that the result is different from the expected result indicated by the network policy corresponding to the connectivity path.
    Type: Grant
    Filed: February 26, 2021
    Date of Patent: September 13, 2022
    Assignee: Oracle International Corporation
    Inventors: Olgierd Stanislaw Pieczul, Subaru Arthur Ueno, Robert Graham Clark
  • Patent number: 11444838
    Abstract: Techniques are disclosed for query processing system that can, when queried, generate a result related to one or more connectivity paths and/or one or more network security rules. Network security rules and connectivity paths may be stored in corresponding data structures (e.g., sets of attributes) that may be utilized with a number of set operations. The user may issue a query requesting the system to apply a rule to a path, a set of rules to a set of paths, to identify if one set of rule(s) are equivalent to another set of rule(s), and the like. Utilizing this query processing system can enable a user to identify effects of one or more network rules with respect to traffic being allowed or restricted along particular connectivity paths between components of the system.
    Type: Grant
    Filed: July 19, 2021
    Date of Patent: September 13, 2022
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventors: Olgierd Stanislaw Pieczul, Robert Graham Clark
  • Publication number: 20220278900
    Abstract: Techniques are disclosed for network policy verification system that can obtain a set of connectivity paths of a containerized environment that individually indicate connections between pairs of containers. Identify a first container and a second container of a pair based at least in part on a connectivity path. Determine a network policy corresponding to the connectivity path that indicates an expected result of that particular connection. A connection can be initiated between the two containers. The result may be presented at a user device based at least in part on identifying that the result is different from the expected result indicated by the network policy corresponding to the connectivity path.
    Type: Application
    Filed: February 26, 2021
    Publication date: September 1, 2022
    Applicant: Oracle International Corporation
    Inventors: Olgierd Stanislaw Pieczul, Subaru Arthur Ueno, Robert Graham Clark
  • Publication number: 20220263835
    Abstract: A computer system may receive one or more requests for access to one or more cloud services and may store the one or more requests in a request log. The computer system may receive one or more access rules applicable to cloud service access rights. The computer system may aggregate the one or more requests of the request log to determine access requirements for a container, the container being configured to store one or more applications. The computer system may generate and store container access policies that define access of a container and the one or more cloud services, the container access policies based at least in part on the aggregated one or more requests and the one or more access rules. The computer system may send the container access policies to a request forwarder of a compute instance in a production environment.
    Type: Application
    Filed: February 16, 2021
    Publication date: August 18, 2022
    Applicant: Oracle International Corporation
    Inventors: Olgierd Stanislaw Pieczul, Hubert Alexander Foskett, Robert Graham Clark
  • Publication number: 20220247639
    Abstract: Techniques are disclosed for query processing system that can, when queried, generate a result related to one or more connectivity paths and/or one or more network security rules. Network security rules and connectivity paths may be stored in corresponding data structures (e.g., sets of attributes) that may be utilized with a number of set operations. The user may issue a query requesting the system to apply a rule to a path, a set of rules to a set of paths, to identify if one set of rule(s) are equivalent to another set of rule(s), and the like. Utilizing this query processing system can enable a user to identify effects of one or more network rules with respect to traffic being allowed or restricted along particular connectivity paths between components of the system.
    Type: Application
    Filed: July 19, 2021
    Publication date: August 4, 2022
    Applicant: Oracle International Corporation
    Inventors: Olgierd Stanislaw Pieczul, Robert Graham Clark
  • Publication number: 20220217139
    Abstract: A system and technique for a Request Forwarder as for a computer network architecture is disclosed to provide selective access to one or more cloud services. In some implementations, a computer system may receive a request for access to a cloud service, the request including a container credential. The computer system may determine an identification of the container using the container credential. The computer system may verify that the container requesting access to the cloud service is authorized based at least in part on stored policies. Based at least in part on the determination that the container requesting access to the cloud service is authorized: receiving instance credential from a metadata service. The computer system may include the instance credential with the request. The computer system may send the request to the cloud service. In various examples, the Request Forwarder can be provided as a service.
    Type: Application
    Filed: January 6, 2021
    Publication date: July 7, 2022
    Applicant: Oracle International Corporation
    Inventors: Olgierd Stanislaw Pieczul, Shrey Arora, Robert Graham Clark
  • Publication number: 20220191248
    Abstract: Techniques are disclosed for generating network security policies for different versions of a component of an application deployed in a computing environment where the different versions have potentially different network requirements and the different versions operate together at the same time in the computing environment. The disclosed techniques include capabilities for enabling different versions of a component of a containerized application to co-exist at the same time on different computing nodes in a cluster of nodes in a containerized environment that deploys and executes the application. The techniques additionally include capabilities for enabling different network policies to be generated for the different versions of the component, where each component has potentially different network requirements. The techniques provide a mechanism to create precise, per-component network policies, while respecting the overall coarse-grained policies of the containerized application.
    Type: Application
    Filed: December 16, 2020
    Publication date: June 16, 2022
    Applicant: Oracle International Corporation
    Inventors: Olgierd Stanislaw Pieczul, Robert Graham Clark, Nitin Srinivasa Rao Jami
  • Patent number: 11102076
    Abstract: Techniques are disclosed for query processing system that can, when queried, generate a result related to one or more connectivity paths and/or one or more network security rules. Network security rules and connectivity paths may be stored in corresponding data structures (e.g., sets of attributes) that may be utilized with a number of set operations. The user may issue a query requesting the system to apply a rule to a path, a set of rules to a set of paths, to identify if one set of rule(s) are equivalent to another set of rule(s), and the like. Utilizing this query processing system can enable a user to identify effects of one or more network rules with respect to traffic being allowed or restricted along particular connectivity paths between components of the system.
    Type: Grant
    Filed: February 4, 2021
    Date of Patent: August 24, 2021
    Assignee: Oracle International Corporation
    Inventors: Olgierd Stanislaw Pieczul, Robert Graham Clark
  • Patent number: 10951637
    Abstract: Examples relate to distributed detection of malicious cloud actors. In some examples, outgoing cloud packets from the cloud server are intercepted and processed to determine if a preliminary threshold is exceeded, where the outgoing cloud packets are used to identify a customer. At this stage, a potential outgoing intrusion event of a number of potential outgoing intrusion events is generated when the preliminary threshold is exceeded. The potential outgoing intrusions events are used to update an aggregate log, where the aggregate log tracks a customer subset of the cloud servers that is associated with the customer. In response to analyzing the aggregate log to determine that cloud traffic by the customer to the destination address exceeds an intrusion threshold, a notification of malicious activity by the customer is provided, wherein the intrusion threshold is satisfied at a higher cloud activity level than the preliminary threshold.
    Type: Grant
    Filed: August 28, 2014
    Date of Patent: March 16, 2021
    Assignee: Suse LLC
    Inventor: Robert Graham Clark
  • Patent number: 10389693
    Abstract: Examples described herein include receiving a key request from a requestor, determining a validity of the key request, and sending the key to the requestor based on the determination of the validity of the key request. In some examples, the key request is for a key to an encrypted disk partition of a protected computing device and comprises a unique identifier associated with the encrypted disk partition.
    Type: Grant
    Filed: August 23, 2016
    Date of Patent: August 20, 2019
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Robert Graham Clark, Timothy John Kelsey, Bryan Stephenson, Douglas Chivers
  • Publication number: 20180063101
    Abstract: Examples described herein include receiving a key request from a requestor, determining a validity of the key request, and sending the key to the requestor based on the determination of the validity of the key request. In some examples, the key request is for a key to an encrypted disk partition of a protected computing device and comprises a unique identifier associated with the encrypted disk partition.
    Type: Application
    Filed: August 23, 2016
    Publication date: March 1, 2018
    Inventors: Robert Graham Clark, Timothy John Kelsey, Bryan Stephenson, Douglas Chivers
  • Publication number: 20170244738
    Abstract: Examples relate to distributed detection of malicious cloud actors. In some examples, outgoing cloud packets from the cloud server are intercepted and processed to determine if a preliminary threshold is exceeded, where the outgoing cloud packets are used to identify a customer. At this stage, a potential outgoing intrusion event of a number of potential outgoing intrusion events is generated when the preliminary threshold is exceeded. The potential outgoing intrusions events are used to update an aggregate log, where the aggregate log tracks a customer subset of the cloud servers that is associated with the customer. In response to analyzing the aggregate log to determine that cloud traffic by the customer to the destination address exceeds an intrusion threshold, a notification of malicious activity by the customer is provided, wherein the intrusion threshold is satisfied at a higher cloud activity level than the preliminary threshold.
    Type: Application
    Filed: August 28, 2014
    Publication date: August 24, 2017
    Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventor: Robert Graham CLARK
  • Publication number: 20170033935
    Abstract: Examples disclosed herein relate to security certificate instructions to receive a request for a security certificate, determine whether the request is valid according to at least one authentication rule, and in response to determining that the request is valid, issue the security certificate comprising a short-term lifetime.
    Type: Application
    Filed: July 31, 2015
    Publication date: February 2, 2017
    Inventors: Robert Graham Clark, Timothy John Kelsey, Douglas Chivers, Stanislaw Izaak Pitucha
  • Patent number: 8507894
    Abstract: This invention concerns an electronic device for the control and readout of the electron or hole spin of a single dopant in silicon. The device comprises a silicon substrate in which there are one or more ohmic contact regions. An insulating region on top of the substrate. First and second barrier gates spaced apart to isolate a small region of charges to form an island of a Single Electron Transistor (SET). A third gate over-lying both the first and second barrier gates, but insulated from them, the third gate being able to generate a gate-induced charge layer (GICL) in the beneath it. A fourth gate in close proximity to a single dopant atom, the dopant atom being encapsulated in the substrate outside the region of the GICL but close enough to allow spin-dependent charge tunnelling between the dopant atom and the SET island under the control of gate potentials, mainly the fourth gate.
    Type: Grant
    Filed: February 11, 2009
    Date of Patent: August 13, 2013
    Assignee: Qucor Pty Limited
    Inventors: Andrea Morello, Andrew Dzurak, Hans-Gregor Huebl, Robert Graham Clark, Laurens Henry Willems Van Beveren, Lloyd Christopher Leonard Hollenberg, David Normal Jamieson, Christopher Escott