Data Integrity Patents (Class 707/687)
  • Patent number: 10262024
    Abstract: Consistent access to data objects transcending storage limitations in a non-relational data store may be provided. A data object may be stored in data chunks across separately accessible data items in a non-relational data store. Consistency indications may also be stored along with the data chunks in the data items that may be used to provide consistent access to the data object. When update to the data object is received, the data chunks and consistency indications of the data object may be retrieved and evaluated to determine if the data object is in a consistent state. If the data object is consistent, then the new versions of the data chunks and consistency indications may be generated. Authorization to update the data object may be obtained, and then the new versions stored in the data items in the non-relational data store.
    Type: Grant
    Filed: May 19, 2015
    Date of Patent: April 16, 2019
    Assignee: Amazon Technologies, Inc.
    Inventor: Venkataramanan Subramanian
  • Patent number: 10256979
    Abstract: Authenticity of a new application being installed on a mobile device is evaluated to provide a result. The evaluation uses a plurality of inputs. In response to the result, an action is performed (e.g., on the mobile device itself and/or a server performing or assisting with the evaluation). For example, the evaluating may be done for an application that a user of the mobile device desires to install from an application marketplace. In another example, the action is sending of a notification to the mobile device, and the notification includes an assessment of authenticity of the new application.
    Type: Grant
    Filed: December 13, 2013
    Date of Patent: April 9, 2019
    Assignee: LOOKOUT, INC.
    Inventors: Kevin Patrick Mahaffey, Timothy Micheal Wyatt, Daniel Lee Evans, Emil Barker Ong, Timothy Strazzere, Matthew John Joseph LaMantia, Brian James Buck
  • Patent number: 10229174
    Abstract: Techniques for optimizing result presentation for a database query. A database query is received. The database query is performed with a clause indicating one or more offset values to be used in displaying results from the database query. The one or more offset values indicate a subset within the results from the database query to be presented. An order is imposed on the results from the database query. The subset is presented as determined by the one or more offset values.
    Type: Grant
    Filed: February 10, 2017
    Date of Patent: March 12, 2019
    Assignee: salesforce.com, inc.
    Inventor: Seth John White
  • Patent number: 10146618
    Abstract: A system that implements a near-optimal, reduced-dependency erasure code construction to redundantly distribute computer data across multiple storage nodes includes a memory that stores machine instructions and a processor that executes the machine instructions to group storage segments into discrete groups, each of which corresponds to an individual storage node. The processor further executes the machine instructions to represent regeneration constraints and associate the constraints with storage segments in multiple storage nodes. The processor also executes the machine instructions to generate a parity check matrix based on the regeneration constraints, the associations and the storage segments. The processor additionally executes the machine instructions to construct a generator matrix based on the parity check matrix.
    Type: Grant
    Filed: January 4, 2016
    Date of Patent: December 4, 2018
    Assignee: Western Digital Technologies, Inc.
    Inventors: Lluis Pamies-Juarez, Cyril Guyot, Robert Eugeniu Mateescu
  • Patent number: 10148689
    Abstract: A method for monitoring malicious link injection into website source code, may include: monitoring a modification operation on a website source code file and obtaining a changed code segment; analyzing the changed code segment to extract an external link; determining whether the external link is a suspicious or malicious link; and sending an alarm message if it is determined that the external link is a suspicious or malicious link. According to the method for monitoring malicious link injection into website source code, changed content of source code can be monitored in real time, so as to effectively prevent a common type of virus transmission manner in which a malicious redirection website address is injected into page code of a legal website after a system write permission is obtained by using a vulnerability of an operating system or a third-party application. In addition, the present disclosure further provides a related apparatus.
    Type: Grant
    Filed: May 12, 2015
    Date of Patent: December 4, 2018
    Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventor: Sixi Lu
  • Patent number: 10095879
    Abstract: The present technology pertains to a organization directory hosted by a synchronized content management system. The corporate directory can provide access to user accounts for all members of the organization to all content items in the organization directory on the respective file systems of the members' client devices. Members can reach any content item at the same path as other members relative to the organization directory root on their respective client device. In some embodiments novel access permissions are granted to maintain path consistency.
    Type: Grant
    Filed: December 29, 2017
    Date of Patent: October 9, 2018
    Assignee: DROPBOX, INC.
    Inventors: Thomas Kleinpeter, Tony Xu, Alex Sydell, Nils Bunger, Sam Jau, Aaron Staley, Sara Lin
  • Patent number: 10083194
    Abstract: The invention presents a process for obtaining candidate reference data to compare to a data to be identified, implemented in a system comprising a client unit and a storage server comprising two databases, in which: —the first database comprises indexed memory blocks each comprising a corresponding encrypted indexed reference data, and —the second database comprises memory blocks indexed by all possible hash values obtained by a plurality of k indexed hash functions, and wherein each block contains a list of the indexes of the reference data which hashing by one of said hash function results in the hash value corresponding to said block, said process comprising the steps during which: —the client unit hashes the data to be identified with each of the plurality of hash functions, and reads the k memory blocks of the second database corresponding to the hash values thus obtained, the client unit identifies indexes contained in at least t out of k read memory blocks, and —the client unit reads the memory blocks
    Type: Grant
    Filed: March 11, 2014
    Date of Patent: September 25, 2018
    Assignee: MORPHO
    Inventors: Alain Patey, Herve Chabanne, Julien Bringer
  • Patent number: 10055509
    Abstract: Techniques for efficiently loading graph data into memory are provided. A plurality of node ID lists are retrieved from storage. Each node ID list is ordered based on one or more order criteria, such as node ID, and is read into memory. A new list of node IDs is created in memory and is initially empty. From among the plurality of node ID lists, a particular node ID is selected based on the one or more order criteria, removed from the node ID list where the particular node ID originates, and added to the new list. This process of selecting, removing, and adding continues until no more than one node ID list exists, other than the new list. In this way, the retrieval of the plurality of node ID lists from storage may be performed in parallel while the selecting and adding are performed sequentially.
    Type: Grant
    Filed: April 7, 2015
    Date of Patent: August 21, 2018
    Assignee: Oracle International Corporation
    Inventors: Sungpack Hong, Zhe Wu, Korbinian Schmid, Felix Kaser, Martin Sevenich, Hassan Chafi, Jayanta Banerjee
  • Patent number: 10031931
    Abstract: An automation system is provided to automate any administrative task in a distributed database, such that the end user can input a goal state (e.g., create database with a five node architecture) and the automation system generates and executes a plan to achieve the goal state without further user input. According to another aspect, bringing existing database systems into automated management can be as complex as designing the database itself. According to some embodiments, the automation system is configured to analyze existing database systems, capture and/or install monitoring components within the existing database, and generate execution pathways to integrate existing database systems into automation control systems. Based on the current state information, the automation system is configured to generate an installation pathway of one or more intermediate states to transition the existing system from no automation to a goal state having active automation agents distributed throughout the database.
    Type: Grant
    Filed: July 19, 2017
    Date of Patent: July 24, 2018
    Assignee: MongoDB, Inc.
    Inventors: Eliot Horowitz, Cailin Anne Nelson, Louisa Berger
  • Patent number: 10019592
    Abstract: Methods, systems, and computer-readable media for granting application permissions and providing notifications of API activity are provided. An example method may include processing a request to install an application that requires API calls by the application. The method may further include determining an authoring entity of the application, and determining whether the authoring entity is certified by one or more trusted entities. In addition, the method may include allowing an installation of the application when the authoring entity is certified by at least one trusted entity.
    Type: Grant
    Filed: January 4, 2016
    Date of Patent: July 10, 2018
    Assignee: Google LLC
    Inventor: Alexander Nicolaou
  • Patent number: 10019569
    Abstract: Methods, devices, and non-transitory storage media for dynamic patching of diversity-based software executing on a computing device. One of many variations of various module utilized by software may be selected from a list of available module variations to be used when software is executed. An embodiment method for updating software may include obtaining or receiving a notification indicating a particular module variation that should not be used as a module for the software, and removing the module variation from the list of available module variations for the module in response to the notification. In some embodiments, the notification may be received by the mobile device from a remote server, and further the notification does not include data capable of being used as a module by the software during runtime. In some embodiments, the module variation may be one of flawed, outdated, and identified as exploited by malware.
    Type: Grant
    Filed: June 27, 2014
    Date of Patent: July 10, 2018
    Assignee: QUALCOMM Incorporated
    Inventors: Nayeem Islam, Rajarshi Gupta
  • Patent number: 10013449
    Abstract: A non-relational data store may implement validating and non-validating secondary indexes for a table. Operations at a table for a given item may be performed when indexing the item to create a secondary index or when updates to the given item are received. Attribute values of a given item may be validated with respect to an indexing schema for the secondary index. For a non-validating secondary index, validation errors detected for the attribute values may be ignored so that the operation at the table may be performed. For a validating secondary index, validation errors detected for the attribute values may result in denying performance of the operation. In some embodiments, a secondary index from may be changed from validating to non-validating, or non-validating to validating.
    Type: Grant
    Filed: September 18, 2015
    Date of Patent: July 3, 2018
    Assignee: Amazon Technologies, Inc.
    Inventors: Wei Xiao, Kiran Kumar Muniswamy Reddy, Pejus Manoj Das, Adam Douglas Morley, Shirley Xue Yi Ly
  • Patent number: 9979606
    Abstract: The disclosure generally relates to behavioral analysis to automate monitoring Internet of Things (IoT) device health in a direct and/or indirect manner. In particular, normal behavior associated with an IoT device in a local IoT network may be modeled such that behaviors observed at the IoT device may be compared to the modeled normal behavior to determine whether the behaviors observed at the IoT device are normal or anomalous. Accordingly, in a distributed IoT environment, more powerful “analyzer” devices can collect behaviors locally observed at other (e.g., simpler) “observer” devices and conduct behavioral analysis across the distributed IoT environment to detect anomalies potentially indicating malicious attacks, malfunctions, or other issues that require customer service and/or further attention.
    Type: Grant
    Filed: March 4, 2015
    Date of Patent: May 22, 2018
    Assignee: QUALCOMM Incorporated
    Inventors: Rajarshi Gupta, Mastooreh Salajegheh, Mihai Christodorescu, Vinay Sridhara, Govindarajan Krishnamurthi
  • Patent number: 9979746
    Abstract: According to an example, a web page is loaded and description information of the web page and layout information of the web page are generated, the description information of the web page is compared with the layout information of the web page, whether all tag nodes comprised in the description information of the web page are comprised in the layout information of the web page is determined, and it is determined at least one tag node, which being comprised in the description information of the web page and not contained in the layout information of the web page, as hidden content.
    Type: Grant
    Filed: April 16, 2015
    Date of Patent: May 22, 2018
    Assignee: Tencent Technology (Shenzhen) Company Limited
    Inventors: Yongjian Li, Jiwen Zhou, Yang Yu
  • Patent number: 9940059
    Abstract: An information management system provides a data deduplication system that uses a primary table, a deduplication chunk table, and a chunk integrity table to ensure that a referenced deduplicated data block is only verified once during the data verification of a backup or other replication operation. The data deduplication system may reduce the computational and storage overhead associated with traditional data verification processes. The primary table, the deduplication chunk table, and the chunk integrity table, all of which are stored in a deduplication database, can also ensure synchronization between the deduplication database and secondary storage devices.
    Type: Grant
    Filed: June 29, 2016
    Date of Patent: April 10, 2018
    Assignee: COMMVAULT SYSTEMS, INC.
    Inventors: Saurabh Agrawal, Manoj Kumar Vijayan
  • Patent number: 9934213
    Abstract: A method and system for generation of a customized financial document template in a financial management system, according to one embodiment. The method and system includes receiving a financial document that includes a plurality of data entries, according to one embodiment. The method and system includes mapping the plurality of data entries to a plurality of data fields of the financial management system, according to one embodiment. Mapping the plurality of data entries includes identifying characteristics of each of the plurality of data entries, and determining a relevance of the plurality of the data fields to the plurality of the data entries, at least partially based on the characteristics of the plurality of data entries, according to one embodiment. The method and system includes populating a custom financial document template, at least partially based on the mapping of the plurality of data entries to the plurality of data fields.
    Type: Grant
    Filed: April 28, 2015
    Date of Patent: April 3, 2018
    Assignee: Intuit Inc.
    Inventors: Bala Dutt, Rahul Vankudothu, Prabhat Hegde, Anurag Tyagi
  • Patent number: 9928270
    Abstract: Sequences of hierarchical records are aggregated and summarized. A capture log that includes a plurality of operations of a workload is received. A first data structure that models transaction types as sequences of nodes is created. The nodes identify operations in the workload. A present operation and a transaction identifier are read from the capture log. The transaction identifier is dissociated from a first node that identifies a prior operation. The transaction identifier is associated with a second node that identifies the present operation. In a second data structure that associates nodes with transaction identifiers, the first node is dissociated from the transaction identifier and the second node is associated with the transaction identifier. A summary of the workload is generated based, at least in part, on the first and second data structures. The summary includes signatures of transaction types and counts of instances of the transaction types.
    Type: Grant
    Filed: June 25, 2015
    Date of Patent: March 27, 2018
    Assignee: International Business Machines Corporation
    Inventors: Manoj K. Agarwal, Amitava Kundu, Rajesh Sambandhan, Mangesh V. Shanbhag
  • Patent number: 9928271
    Abstract: Sequences of hierarchical records are aggregated and summarized. A capture log that includes a plurality of operations of a workload is received. A first data structure that models transaction types as sequences of nodes is created. The nodes identify operations in the workload. A present operation and a transaction identifier are read from the capture log. The transaction identifier is dissociated from a first node that identifies a prior operation. The transaction identifier is associated with a second node that identifies the present operation. In a second data structure that associates nodes with transaction identifiers, the first node is dissociated from the transaction identifier and the second node is associated with the transaction identifier. A summary of the workload is generated based, at least in part, on the first and second data structures. The summary includes signatures of transaction types and counts of instances of the transaction types.
    Type: Grant
    Filed: June 28, 2016
    Date of Patent: March 27, 2018
    Assignee: International Business Machines Corporation
    Inventors: Manoj K. Agarwal, Amitava Kundu, Rajesh Sambandhan, Mangesh V. Shanbhag
  • Patent number: 9898516
    Abstract: A computer manages methods for determining accurate document transformation by rendering the source document into a non-rasterized format, where the non-rasterized format is a rendered source document. The computer rendering the target document into a non-rasterized format, where the non-rasterized format is a rendered target document. The computer comparing one or more aspects of the rendered source document to corresponding one or more aspects of the rendered target document. The computer determining, based, at least in part, on the compared one or more aspects, whether or not the source document was accurately transformed to the target document.
    Type: Grant
    Filed: September 30, 2016
    Date of Patent: February 20, 2018
    Assignee: International Business Machines Corporation
    Inventors: Michael Baessler, Thomas A. P. Hampp-Bahnmueller, Philipp Hoffmann, Markus Lorch, Juergen Maletz, Daniel Pittner, Werner Schollenberger, Dirk Seider
  • Patent number: 9881034
    Abstract: An automation system is provided to automate any administrative task in a distributed database, such that the end user can input a goal state (e.g., create database with a five node architecture) and the automation system generates and executes a plan to achieve the goal state without further user input. According to another aspect, bringing existing database systems into automated management can be as complex as designing the database itself. According to some embodiments, the automation system is configured to analyze existing database systems, capture and/or install monitoring components within the existing database, and generate execution pathways to integrate existing database systems into automation control systems. Based on the current state information, the automation system is configured to generate an installation pathway of one or more intermediate states to transition the existing system from no automation to a goal state having active automation agents distributed throughout the database.
    Type: Grant
    Filed: December 15, 2015
    Date of Patent: January 30, 2018
    Assignee: MongoDB, Inc.
    Inventors: Eliot Horowitz, Cailin Anne Nelson, Louisa Berger
  • Patent number: 9875270
    Abstract: A data storage system may implement locking item ranges for creating a secondary index of an online table. A secondary index may be generated for a table of items stored in a non-relational data store. Different ranges of items in the data store may be locked while a corresponding portion of the secondary index is generated. Upon generating the corresponding portion of the secondary index, a range of items may be unlocked. While generating the secondary index, the table may be made available for servicing access requests. For a request to update the table received during the generation of the secondary index, a determination may be made as to whether the update is included within a locked range of the table. If locked, the request may be delayed until the range is unlocked.
    Type: Grant
    Filed: September 18, 2015
    Date of Patent: January 23, 2018
    Assignee: Amazon Technologies, Inc.
    Inventors: Kiran Kumar Muniswamy Reddy, Wei Xiao, Pejus Manoj Das, Xianglong Huang, Nirmal Mehta
  • Patent number: 9870398
    Abstract: A database system may include a storage device configured to store a plurality of database tables. The database system may further include a processor in communication with the storage device. The processor may determine a first sampling percentage to be used on a column of a database table. The first sampling percentage may be based on a respective frequency of each column value in the column. The processor may determine a second sampling percentage to be used on the column in generation of the plan to respond to the database query. The second sampling percentage may be based on size of the database table. The processor may select the maximum of the first sampling percentage and the second sampling percentage. The selected sampling percentage may be used to collect statistics on the column. The collected statistics may be used to generate at least one database query response plan associated with the column. A method and computer-readable medium may also be implemented.
    Type: Grant
    Filed: July 8, 2013
    Date of Patent: January 16, 2018
    Assignee: Teradata US, Inc.
    Inventors: Sung Jin Kim, Rama Krishna Korlapati
  • Patent number: 9838347
    Abstract: Communication services enable users to communicate electronically using various modes of communication. Conversations between groups of users are common, where emails, other communications, and data are exchanged repeatedly over a period of time. Provision of tags in communication environments may enable the users to organize, search for, and share content of the conversations more efficiently, improving communication and collaboration among the users. For example, a tag module of a communication service may associate a communication with one or more tags such that the tags are persisted with the communication as the communication is exchanged, and transmit the communication to participants of the conversation. The tag module may also provide automatic classification, suggestion, and/or completion of the tags.
    Type: Grant
    Filed: June 12, 2015
    Date of Patent: December 5, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Giselli Panontini DeSouza Sana, Amit Gupta, Sangya Singh, Naresh Sundaram, Tom Laird-McConnell, Johannes Gehrke
  • Patent number: 9825763
    Abstract: Systems for the automated capture of forensic data information are presented. An example system may receive an access/modification request directed to a data item(s), generate an initial data capture record for the data item(s), and send the record to an isolated, secure data preservation module before granting the request. After the access/modification, the system may generate a post-access data capture record and send it to the preservation module. The system may determine the content of the generated records, based on, e.g., content of the data item(s), before generation. For example, the system may determine a first content type for records where data item(s) include critical data, and a second content type for records that do not, to, e.g., efficiently allocate system resources while minimizing any disruption to an accessing user. The system may also utilize different encryption and decryption key techniques based on, e.g., the content of the data item(s).
    Type: Grant
    Filed: November 16, 2015
    Date of Patent: November 21, 2017
    Assignee: Bank of America Corporation
    Inventors: Manu J. Kurian, Sorin N. Cismas, Kalpesh V. Patel, Ray A. Edwards
  • Patent number: 9753944
    Abstract: A computer system receives a plurality of files having respective file sizes. The computer system categorizes the files into different categories according to their respective file sizes. For a file in the first category, the computer system identifies first and second versions of the file and generates a difference between the two versions based on a view of the first version and a view of the second version. For files in the second category, the computer system identifies a file aggregation of the files by combining them into one file such that the combined file have a file size within the first file size range. The computer system identifies first and second versions of the file aggregation and generates a difference between the first and second versions based on a view of the first version and a view of the second version of the file aggregation.
    Type: Grant
    Filed: July 17, 2014
    Date of Patent: September 5, 2017
    Assignee: Cormentis Design Corporation
    Inventors: Bin Xu, Yanggui Chen
  • Patent number: 9747313
    Abstract: Embodiments described herein generally relate to creating a timeline index for executing queries on temporal data. A computer-implemented method is described. The method includes creating a first list of tuples that are invalidated in a temporal table and sorting the first list of the invalidated tuples. The method can further include creating a second list of tuples that are activated in the temporal table and combining the first list and the second list into a third list that includes the activated tuples and the invalidated tuples, wherein the third list contains ROW_IDs of both the activated tuples and the invalidated tuples.
    Type: Grant
    Filed: December 19, 2012
    Date of Patent: August 29, 2017
    Assignee: SAP SE
    Inventors: Martin Kaufmann, Norman May, Amin Amiri Manjili, Donald Kossmann
  • Patent number: 9733994
    Abstract: A method for communicating information between a mobile device and a computer system includes receiving a request from the mobile device to invoke a process of a legacy API of the computer system. The request specifies one or more input values associated with required input parameters of the process. The input values are provided in a first format that is different from a second format utilized by the legacy API for communicating data. The computer system determines required input parameters of the process, generates an input data structure in the second format that includes an entry for each of the required input parameters, determines parameters that are associated with the one or more input values communicated in the request, and sets values of entries in the input data structure associated with the one or more determined parameters to corresponding one or more input values in the request. A message call to the legacy API that includes the input data structure formatted in the second format is generated.
    Type: Grant
    Filed: December 29, 2015
    Date of Patent: August 15, 2017
    Assignee: ACCENTURE GLOBAL SERVICES LIMITED
    Inventors: Rocco Lisi, Benjamin Rodriguez, Sergi Lalaguna, Jordi Perez Riera, Jose Ramon Sanfiz
  • Patent number: 9699676
    Abstract: In order to support generation of network statistics, a policy controller (30) of a mobile network may be provided with a network statistics generator (32) and with an interface (Ni) to a network intelligence function (60). The network statistics generator (32) may use these interfaces of the policy controller (30) for obtaining information needed to generate the network statistics. In addition, the network statistics generator (32) may also use information which is locally available at the policy controller (30). In other words, the policy controller (30) or one or more other nodes may act as sources of information for generating the network statistics. The network statistics generator (32) may select types of information to be used for compiling a certain network statistic and also suitably select nodes to be used as sources of information for obtaining these types of information. This may for example be accomplished on the basis of a request received from the network intelligence function (60).
    Type: Grant
    Filed: November 15, 2011
    Date of Patent: July 4, 2017
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Fabian Castro Castro, Susana Fernandez Alonso, Miguel Angel Muñoz de la Torre Alonso
  • Patent number: 9684562
    Abstract: A method for automatically prioritizing startup of resource groups during a migration event. The method may include monitoring resource usage of a first and a second set of applications associated, respectively, with a first and a second resource group executing on a first computing node. The method may additionally include generating respective first and second resource usage models for the first and second resource groups based on resource usage. The method may then include extrapolating, based on the first and second resource usage models, respective first and second resource group usage scores for the first and second resource groups at a second time in response to a migration event, the second time occurring subsequent to the first time. The method may further include determining, based on the extrapolating, a priority order for serially starting the first and second set of applications on a second computing node at the second time.
    Type: Grant
    Filed: July 21, 2015
    Date of Patent: June 20, 2017
    Assignee: International Business Machines Corporation
    Inventors: Dionysius D. Bell, Li Li, Hari H. Madduri, Ryan D. McNair
  • Patent number: 9659050
    Abstract: A delta store giving row-level versioning semantics to a non-row-level versioning underlying store is described. An example method includes establishing a column-based in-memory database including a main store and a delta store, where the main store does not allow concurrent transactions on a same table and the delta store has a plurality of row-visibility bitmaps implementing a row-level versioning mechanism that allows concurrent transactions on the same table. A transaction associated with the column-based in-memory database is received. For each table read by the transaction, a version of the table in the delta store that represents a transaction-consistent snapshot of the database visible to the transaction is determined. Each table is represented in the main store and the delta store; and each version of the table is represented by one or more bitmaps.
    Type: Grant
    Filed: August 6, 2013
    Date of Patent: May 23, 2017
    Assignee: SYBASE, INC.
    Inventors: Mihnea Andrei, Colin Florendo, Anil Kumar Goel
  • Patent number: 9654538
    Abstract: Software for a distributed streaming platform monitors a first operator instance in a container for an application running on a distributed streaming platform over a networked cluster of servers. The first operator instance includes an input port that receives streaming windows from an upstream instance and an output port that emits streaming windows to a downstream instance. And the monitoring includes determining a window identifier for a streaming window which the first operator instance is processing. The software reports results of the monitoring to a master and receives a dynamic adjustment from the master. The dynamic adjustment includes launching a second operator instance of the same operator in the container. The software resumes a flow of streaming windows into the input port and the output port according to first recovery policy for the first operator instance and a second recovery policy for the second operator instance.
    Type: Grant
    Filed: June 26, 2013
    Date of Patent: May 16, 2017
    Assignee: DataTorrent, Inc.
    Inventors: Amol J. Kekre, Phu D. Hoang, Chetan Narsude, Thomas Weise
  • Patent number: 9641617
    Abstract: The present invention provides a method and system for verifying integrity of cloud data using unconnected trusted device. The method involves requesting encrypted data though a terminal from a metadata offsite location on a cloud storage then entering encrypted data into an unconnected trusted device thereafter obtaining sentinel data from one or more predefined sentinel locations in encrypted data then requesting original data from the cloud storage through the terminal from the unconnected trusted device thereafter comparing sentinel data and original data for integrity and finally displaying the results.
    Type: Grant
    Filed: December 5, 2014
    Date of Patent: May 2, 2017
    Assignee: Infosys Limited
    Inventors: Ashutosh Saxena, Nitin Singh Chauhan, Sravan Kumar Rondla
  • Patent number: 9626179
    Abstract: A method and system for using a ROM patch are provided. In one embodiment, a computing device obtains an original assembly code and a modified assembly code which is a modified version of the original assembly code, the original assembly code being used for an executable code which is stored in a ROM of a device. The computing device compares the original assembly code and the modified assembly code to identify difference(s) in the modified assembly code with respect to the original assembly code. The computing device then compiles the difference(s) (sometimes, after adjusting the differences) and generates a ROM patch by converting the compiled difference(s) into a replacement executable code for some of the executable code stored in the ROM of the device. In another embodiment, a method and system for using a ROM patch are disclosed.
    Type: Grant
    Filed: July 21, 2014
    Date of Patent: April 18, 2017
    Assignee: SanDisk Technologies LLC
    Inventor: Shahar Bar-Or
  • Patent number: 9607062
    Abstract: A computer-implemented method includes identifying a logical node. The logical node is associated with one or more source stages. The computer-implemented method further includes identifying one or more file block components. The one or more file block components include a retrieval target for at least one of the one or more source stages. The computer-implemented method further includes identifying one or more physical nodes and determining, for each of the one or more physical nodes, a degree value. A corresponding computer program product and computer system are also disclosed.
    Type: Grant
    Filed: November 19, 2015
    Date of Patent: March 28, 2017
    Assignee: International Business Machines Corporation
    Inventors: Krishna K. Bonagiri, Eric A. Jacobson
  • Patent number: 9607021
    Abstract: Data to be loaded into a target system includes entities having corresponding unique primary data value and secondary data values. The secondary data values have associated foreign key relationships, which links the secondary data value to the primary data value of another entity. In loading the data, the entities are split into insertion leaf groups by execution of an iteration process, each iteration involving generation of a respective set of insertion leaf groups containing entities whose secondary data values have no foreign key relationships or only foreign key relationships with the primary data values of entities of the insertion leaf groups generated during any prior iteration. The iteration process is executed until there are no such entities are left. A sequence of generation of the sets of insertion leaf groups is recorded, and the sets of insertion leaf groups are consecutively loaded into the target system according to the sequence.
    Type: Grant
    Filed: October 9, 2014
    Date of Patent: March 28, 2017
    Assignee: International Business Machines Corporation
    Inventors: Peter Gerstl, Mike Grasselt, Albert Maier, Thomas Schwarz, Oliver Suhre
  • Patent number: 9600405
    Abstract: Systems, methods, and computer-readable media are disclosed for testing a software application. An exemplary method includes storing a control file identifying a test case for testing a software application. A first expected result may be extracted from a device storing expected results of the software application, the first expected result being identified by the control file. A first actual result may be extracted from a device storing actual results output by the software application, the first actual result being identified by the control file. The first expected result may be compared with the first actual result to determine whether the first actual result matches the first expected result. A result file indicating whether the test case passed or failed is generated, and the test case has passed when the first actual result matches the first expected result. The result file may be stored in a storage device.
    Type: Grant
    Filed: July 13, 2016
    Date of Patent: March 21, 2017
    Assignee: FEDERAL HOME LOAN MORTGAGE CORPORATION (FREDDIE MAC)
    Inventors: Philip Dunn, Yi Liu
  • Patent number: 9582522
    Abstract: A method and computer-readable storage media are provided for reorganizing a database. The method may monitor the database to determine whether the database reorganization is required. The method may also include determining the database reorganization is required. The method may further include determining a first and second amount of space to add to the database for additional entries of a category of data according to a first and second predictive sizing calculation. The method may further include the selecting of either the first or second amount of space to add to the database for additional entries of the category of data during the reorganization. The method may further include performing the reorganization of the database including allocating the selected amount of space to add to the database for additional entries in the database of the category of data by using the computer system operatively coupled to the storage device.
    Type: Grant
    Filed: March 12, 2013
    Date of Patent: February 28, 2017
    Assignee: International Business Machines Corporation
    Inventors: Rafal P. Konik, Roger A. Mittelstadt, Brian R. Muras, Mark W. Theuer
  • Patent number: 9582521
    Abstract: A method and computer-readable storage media are provided for reorganizing a database. The method may monitor the database to determine whether the database reorganization is required. The method may also include determining the database reorganization is required. The method may further include determining a first and second amount of space to add to the database for additional entries of a category of data according to a first and second predictive sizing calculation. The method may further include the selecting of either the first or second amount of space to add to the database for additional entries of the category of data during the reorganization. The method may further include performing the reorganization of the database including allocating the selected amount of space to add to the database for additional entries in the database of the category of data by using the computer system operatively coupled to the storage device.
    Type: Grant
    Filed: February 11, 2013
    Date of Patent: February 28, 2017
    Assignee: International Business Machines Corporation
    Inventors: Rafal P. Konik, Roger A. Mittelstadt, Brian R. Muras, Mark W. Theuer
  • Patent number: 9569199
    Abstract: Methods and systems that facilitate efficient and effective application program maintenance and patch distribution are described. A device comprises: a memory that stores application source code files and instructions for creating a hot patch file, wherein the application source code files include an update source code file and initial source code files before an application update; and a processor operable to create the hot patch file, wherein the hot patch file is created based upon differences between a pair of optimized source code file sets that result from optimization of a first set of the initial source code files and separate optimization of a second set of source code files; wherein the second set includes an update source code file and associated files selected from the first set based on results from a graph indicating manners in which said source code files related to one another.
    Type: Grant
    Filed: January 22, 2015
    Date of Patent: February 14, 2017
    Assignee: Futurewei Technologies, Inc.
    Inventors: Haichuan Wang, Handong Ye, Peng Wu
  • Patent number: 9513997
    Abstract: A method for managing test data includes receiving a request indicative of a testing application from a requesting user and identifying a plurality of test data in a source database matching the request. Further, the method includes determining a reserved status of the plurality of test data, and, when the reserved status indicates that the plurality of test data is not reserved by the user other than the requesting user, reserving the plurality of test data for the requesting user. Still further, the method includes transferring a copy of the plurality of test data to a test database, wherein a testing application executes based on the copy of the plurality of test data stored in the test database.
    Type: Grant
    Filed: June 26, 2014
    Date of Patent: December 6, 2016
    Assignee: STATE FARM MUTUAL AUTOMOBILE INSURANCE COMPANY
    Inventors: Mark Moncelle, Steven Beatty, Walter Krafft, John Horrocks
  • Patent number: 9465550
    Abstract: Described are techniques for achieving service level objectives. A first service level objective for a first tenant of a data storage system may be received. The first tenant may have data stored in a first set of devices of the data storage system. The first service level objective may include a first value for a first metric. The first tenant may be located on a first host and may issue I/O operations directed to the first set of devices. A first calculated value for the first metric may be determined using one or more measured values obtained at the first host. It may be determined, using the first calculated value for the first metric, whether the first service level objective for the first tenant is violated. Responsive to determining the first service level objective for the first tenant is violated, first processing may be performed to selects a remediation action.
    Type: Grant
    Filed: June 25, 2014
    Date of Patent: October 11, 2016
    Assignee: EMC Corporation
    Inventors: Mark Lippitt, Erik P. Smith, Helen S. Raizen, Arieh Don, Ajith Balakrishnan
  • Patent number: 9459799
    Abstract: Described are techniques that identify problematic workloads. Measured response times for workloads associated applications are received. Each of the applications has one of the workloads resulting in one of the measured response times for the application. The applications share a set of one or more resources. In accordance with a first set of one or more criteria, it is determined whether there is an occurrence of abnormal performance with respect to performance of the applications. Responsive to determining the occurrence of abnormal performance with respect to performance of the applications, second processing is performed that includes determining, using the measured response times and in accordance with a second set of one or more criteria, an application set of one or more of the applications having an associated workload causing the occurrence of abnormal performance. A remediation may also be taken to address or alleviate the abnormal performance.
    Type: Grant
    Filed: June 25, 2014
    Date of Patent: October 4, 2016
    Assignee: EMC Corporation
    Inventor: Amnon Naamad
  • Patent number: 9444831
    Abstract: One embodiment relates to a computer-implemented process for detecting malicious scripts at a client computer using a malicious script detector. A web page interceptor intercepts an access of web page data at a universal resource locator address. A script preprocessor determines script fragments embedded in the web page data and extracts variable and function names from the script fragments. A context analyzer determines whether the script fragments reference known-good scripts. The context analyzer may check variable and function names in the script fragment against a database of known-good contexts. Those script fragments which were determined to reference known-good scripts may be categorized as non-malicious. An emulator may perform emulation on remaining script fragments which were not determined to reference known-good scripts and not perform emulation on the script fragments which were determined to reference known-good scripts. Other embodiments, aspects and features are also disclosed.
    Type: Grant
    Filed: October 22, 2015
    Date of Patent: September 13, 2016
    Assignee: Trend Micro Incorporated
    Inventors: Charlie Lee, Xiaochuan Wan, Xuewen Zhu, Hua Ye
  • Patent number: 9436713
    Abstract: A database analyzer includes a data sorting unit sorting a data group acquired from an analysis target database based on data values in a table column and storing it as analysis target data in a storage unit; a data pattern creation processing unit creating a group for each data value based on differences between the data values and storing a data pattern in the storage unit; a data pattern judgment processing unit for judging validity of the data pattern; and a data pattern transformation processing unit for reconstructing the data pattern with respect to constituent elements of each group included in the data pattern by transforming each group in accordance with a specified conversion rule for converting the constituent elements, which are conceptually similar to each other, into the same constituent element, and storing it in the storage unit if a negative result is obtained for the validity judgment.
    Type: Grant
    Filed: October 23, 2013
    Date of Patent: September 6, 2016
    Assignee: HITACHI, LTD.
    Inventors: Yasunori Hashimoto, Ryota Mibe, Kentaro Yoshimura, Hirofumi Danno, Sadahiro Ishikawa, Kiyoshi Yamaguchi
  • Patent number: 9430149
    Abstract: A write request including payload data is received. The payload data of the write request is stored in a staging area of a storage manager. A transformation pipeline is determined based, at least in part, on an attribute of the write request. The transformation pipeline is queued for execution. Data fragments are generated based, at least in part, on the payload data and the transformation pipeline. The data fragments are transmitted to a plurality of enclosures.
    Type: Grant
    Filed: May 13, 2014
    Date of Patent: August 30, 2016
    Assignee: NetApp, Inc.
    Inventor: David Slik
  • Patent number: 9430321
    Abstract: Techniques for operating a storage system are disclosed. A read request with an object identifier for a data object is received. A synchronous group of data storage devices across a plurality of enclosures is identified. The synchronous group is associated with the object identifier. A request is sent to the plurality of enclosures to synchronously activate the data storage devices in the synchronous group. After sending the request, data fragments associated with the object identifier are retrieved from the synchronous group of data storage devices. The data fragments are erasure decoded into a contiguous data range to reconstruct the data object.
    Type: Grant
    Filed: May 13, 2014
    Date of Patent: August 30, 2016
    Assignee: NetApp, Inc.
    Inventor: David Slik
  • Patent number: 9424301
    Abstract: A system and method of negotiated takeover of storage objects includes one or more processors, a storage controller, and memory coupled to the one or more processors. The memory stores a data structure that includes information about a plurality of storage objects manageable by the storage controller. The storage controller is configured to assume, one by one, current ownership of a first subset of the storage objects and assume, concurrently, current ownership of a second subset of the storage objects. The first subset of storage objects and the second subset of storage objects are currently owned by a second storage server coupled to the storage server. In some embodiments, current ownership of the first subset of storage objects is transferred by iteratively detecting a particular storage object from the first subset of the storage objects whose current ownership can be assumed and bringing the particular storage object online.
    Type: Grant
    Filed: November 22, 2013
    Date of Patent: August 23, 2016
    Assignee: NetApp, Inc.
    Inventors: Poonam Dhavale, Manish Bhuwania, Arun Ramachandran, Herman M. Mutiso
  • Patent number: 9417773
    Abstract: In one embodiment, a current state of an application that is executing may be identified. A plurality of next possible states to which a user can navigate from the current state may be ascertained. A history of user behavior of one or more users may be determined. Data pertaining to at least one of the plurality of next possible states may be fetched based, at least in part, upon the history of user behavior of the one or more users.
    Type: Grant
    Filed: October 16, 2014
    Date of Patent: August 16, 2016
    Assignee: Yahoo! Inc.
    Inventors: Daryl Low, Brian Tunning
  • Patent number: 9405783
    Abstract: In one embodiment, a technique is provided for distributing data and associated metadata within a distributed storage architecture. A set of hash tables that embody mappings of cluster-wide identifiers associated with storage locations are stored for write data of write requests organized into extents. A hash value is generated from a hash function applied to each extent. The hash value is overloaded and used for multiple purposes within the distributed storage architecture, including (i) a remainder computation on the hash value to select a bucket of a plurality of buckets representative of the extents, (ii) a hash table selector of the hash value to select a hash table from the set of hash tables, and (iii) a hash table index computed from the hash value to select an entry from a plurality of entries of the selected hash table having a cluster-wide identifier identifying a storage location for the extent.
    Type: Grant
    Filed: October 2, 2013
    Date of Patent: August 2, 2016
    Assignee: NetApp, Inc.
    Inventors: Jeffrey S. Kimmel, Blake H. Lewis
  • Patent number: 9395975
    Abstract: A method and system for generating a ROM patch are provided. In one embodiment, a computing device obtains an original assembly code and a modified assembly code which is a modified version of the original assembly code, the original assembly code being used for an executable code which is stored in a ROM of a device. The computing device compares the original assembly code and the modified assembly code to identify difference(s) in the modified assembly code with respect to the original assembly code. The computing device then compiles the difference(s) (sometimes, after adjusting the differences) and generates a ROM patch by converting the compiled difference(s) into a replacement executable code for some of the executable code stored in the ROM of the device. In another embodiment, a method and system for using a ROM patch are disclosed.
    Type: Grant
    Filed: July 21, 2014
    Date of Patent: July 19, 2016
    Assignee: SanDisk Technologies LLC
    Inventor: Shahar Bar-Or