Patents by Inventor Suksant SAE LOR

Suksant SAE LOR has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10701152
    Abstract: A memory system that is an example of the present disclosure comprises a memory fabric and an overlay. The memory fabric comprises: a network of memory components interconnected by optical interconnects, and memory address spaces of the memory components are aggregated and exposed as if the network were a single memory resource. The memory fabric further comprises router modules to implement steps of a fabric routing protocol to route memory-addressing requests along paths to destination memory components in the memory fabric. The overlay increases resiliency of the memory system and comprises overlay nodes to receive and forward memory-addressing requests from client programs and to implement steps of an overlay routing protocol to selectively control routing of received memory-addressing requests, to destination memory components, either along paths determined according to the fabric routing protocol or along alternative paths via overlay nodes.
    Type: Grant
    Filed: September 24, 2015
    Date of Patent: June 30, 2020
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Luis Miguel Vaquero Gonzalez, Suksant Sae Lor
  • Patent number: 10192066
    Abstract: In one implementation, a data sharing system can comprise a trust engine to identify an environment that satisfies a level of trust, an access engine to request access to a set of data, a procedure engine to receive a procedure, a restriction engine to receive a semantic restriction associated with a semantic term of the environment, a tracker engine to track the procedure during execution, and a control engine to maintain execution of the procedure based on the restriction and trace information. In another implementation, a method for sharing a set of data can comprise validating an environment satisfies a level of trust, receiving a procedure to access the set of data, receiving a semantic restriction associated with a semantic term of the environment, tracing the procedure during execution, and providing a view of the set of data based on the restriction and a semantic mapping of trace information.
    Type: Grant
    Filed: March 14, 2014
    Date of Patent: January 29, 2019
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Patrick Goldsack, Marco Casassa Mont, Suksant Sae Lor, Simon Kai-Ying Shiu
  • Patent number: 10193892
    Abstract: In one implementation, a data sharing system can comprise a trust engine to identify an environment that satisfies a level of trust, an access engine to request access to a set of data, a procedure engine to receive a procedure, a restriction engine to receive a restriction associated with a resource of the environment, a monitor engine to maintain resource utilization information, and a control engine to limit execution of the procedure based on the restriction and the resource utilization information. In another implementation, a method for sharing a set of data can comprise validating an environment satisfies a level of trust, receiving a restriction associated with a resource of the environment, receiving a procedure to access the set of data, ascertaining resource utilization information, and providing a view of the set of data based on the restriction and the resource utilization information.
    Type: Grant
    Filed: March 14, 2014
    Date of Patent: January 29, 2019
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Patrick Goldsack, Marco Casassa Mont, Simon Kai-Ying Shiu, Suksant Sae Lor
  • Patent number: 10027632
    Abstract: In an implementation, a view of a set of data may be based on a context. The context may include an attribute associated with an attribute list. A set of symbols may be associated with the attribute list and the set of data. A key may be associated with the attribute list and a function list.
    Type: Grant
    Filed: July 26, 2013
    Date of Patent: July 17, 2018
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Luis Miguel Vaquero Gonzalez, Suksant Sae Lor, Marco Casassa Mont
  • Publication number: 20180165165
    Abstract: A group of memory modules in a memory system receives a memory operation instruction comprising instructions on a memory operation and sends votes on the possibility to perform the memory operation to a memory coordinator module. The memory coordinator module receives votes and establishes a list of memory modules which have voted positively. The memory coordinator module verifies that the list of memory modules comprises all the memory modules in the group and that there is not another memory coordinator module detected by the memory coordinator module, instructs all the memory modules in the group to commit to the memory operation.
    Type: Application
    Filed: July 31, 2015
    Publication date: June 14, 2018
    Inventors: Luis Miguel Vaquero Gonzalez, Suksant Sae Lor
  • Publication number: 20180143769
    Abstract: The present disclosure discloses a method comprising: determining a root router memory module of a memory system comprising a plurality of router memory module, each router memory module comprising at least one port to connect the router memory module to at least another router memory module, for each router memory module apart from the root router memory module, identifying a loop-free path from the router memory module to the root router memory module, creating a logical tree using the loop-free paths determined.
    Type: Application
    Filed: July 31, 2015
    Publication date: May 24, 2018
    Inventors: Luis Miguel Vaquero Gonzalez, Suksant Sae Lor
  • Publication number: 20180121099
    Abstract: The present disclosure discloses memory systems that comprise a network of logically-connected, routable memory modules each comprising an individual memory-address space, in which the memory-address spaces of the individual memory modules are aggregated and exposed as a single memory component to components external to the memory system seeking to write or read data objects in the memory system, and the memory systems are configured to perform data replication according to a lazy data replication protocol to hold plural replicas of data objects in the memory system.
    Type: Application
    Filed: August 14, 2015
    Publication date: May 3, 2018
    Inventors: Luis Miguel Vaquero Gonzalez, Suksant Sae Lor
  • Publication number: 20180121300
    Abstract: Examples of a resilient memory fabric comprise a network of memory components, each memory component comprising a respective address space, wherein the memory fabric comprises the aggregated respective memory as a single addressable memory space. A first memory component of the network of memory components may comprise a first memory local non-transitory machine readable storage medium that stores a set of labeled routes to other memory components in the memory fabric; and a first memory processor that executes machine-readable instructions that cause the first memory component to route data along a selected labeled route.
    Type: Application
    Filed: September 24, 2015
    Publication date: May 3, 2018
    Inventors: Luis Miguel Vaquero Gonzalez, Suksant Sae Lor
  • Publication number: 20170220683
    Abstract: Shadow elements can in an example embodiment include determining a base similarity of an element included in a graph, selecting an anonymous characteristic of a shadow element satisfying the base similarity, substituting a characteristic of the element with the anonymous characteristic, and returning the anonymous characteristic instead of the substituted characteristic in response to a query of the element included in the graph.
    Type: Application
    Filed: July 31, 2014
    Publication date: August 3, 2017
    Inventors: Luis Miguel VAQUERO GONZALEZ, Suksant SAE LOR
  • Publication number: 20170185696
    Abstract: Data items are aggregated based on information relating to a display capability of a display device, to produce aggregated data. The aggregated data is for display in a visualization presented by the display device. Responsive to user selection in the visualization, dynamically created data at a second hierarchical level different from a first hierarchical level of the aggregated data is for display in the visualization.
    Type: Application
    Filed: May 23, 2014
    Publication date: June 29, 2017
    Inventors: Rycharde HAWKES, Luis Miguel Vaquero GONZALEZ, Suksant Sae LOR, Romaric PASCAL, Liv FRANZEN
  • Publication number: 20170004319
    Abstract: In one implementation, a data sharing system can comprise a trust engine to identify an environment that satisfies a level of trust, an access engine to request access to a set of data, a procedure engine to receive a procedure, a restriction engine to receive a semantic restriction associated with a semantic term of the environment, a tracker engine to track the procedure during execution, and a control engine to maintain execution of the procedure based on the restriction and trace information. In another implementation, a method for sharing a set of data can comprise validating an environment satisfies a level of trust, receiving a procedure to access the set of data, receiving a semantic restriction associated with a semantic term of the environment, tracing the procedure during execution, and providing a view of the set of data based on the restriction and a semantic mapping of trace information.
    Type: Application
    Filed: March 14, 2014
    Publication date: January 5, 2017
    Inventors: Patrick GOLDSACK, Marco CASASSA MONT, Suksant SAE LOR, Simon Kai-Ying SHIU
  • Publication number: 20160381036
    Abstract: In one implementation, a data sharing system can comprise a trust engine to identify an environment that satisfies a level of trust, an access engine to request access to a set of data, a procedure engine to receive a procedure, a restriction engine to receive a restriction associated with a resource of the environment, a monitor engine to maintain resource utilization information, and a control engine to limit execution of the procedure based on the restriction and the resource utilization information. In another implementation, a method for sharing a set of data can comprise validating an environment satisfies a level of trust, receiving a restriction associated with a resource of the environment, receiving a procedure to access the set of data, ascertaining resource utilization information, and providing a view of the set of data based on the restriction and the resource utilization information.
    Type: Application
    Filed: March 14, 2014
    Publication date: December 29, 2016
    Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Patrick Goldsack, Marco CASASSA MONT, Simon Kai-Ying SHIU, Suksant SAE LOR
  • Publication number: 20160217295
    Abstract: According to an example, trusted function based data access security control may include determining a restriction set by a first entity and related to access to and/or analysis related to data under the control of the first entity. A trusted function including meta-data that describes a transformation of the data may be ascertained. A determination may be made as to whether the meta-data of the trusted function matches the restriction related to the access to and/or analysis related to the data. In response to a determination that the meta-data of the trusted function matches the restriction, the trusted function may be executed to allow controlled access to the data by a second entity. In response to a determination that the meta-data of the trusted function does not match the restriction, execution of the trusted function may be prevented to prevent access to the data by the second entity.
    Type: Application
    Filed: October 31, 2013
    Publication date: July 28, 2016
    Inventors: Patrick Goldsack, Marco Casassa Mont, Suksant Sae Lor, Simon Kai-Ying Shiu
  • Publication number: 20160182462
    Abstract: In an implementation, a view of a set of data may be based on a context. The context may include an attribute associated with an attribute list. A set of symbols may be associated with the attribute list and the set of data. A key may be associated with the attribute list and a function list.
    Type: Application
    Filed: July 26, 2013
    Publication date: June 23, 2016
    Inventors: Luis Miguel VAQUERO GONZALEZ, Suksant SAE LOR, Marco CASASSA MONT