Data Integrity Patents (Class 707/687)
  • Patent number: 11030050
    Abstract: Provided is a database archiving method. According to the exemplary embodiment of the present invention, a database archiving method includes: selecting at least one record group including a plurality of records from an original table from which data is archived, based on selection information on at least one of a time and a field value; storing group compression data compressed to be created for every record group and the selection information corresponding to the group compression data in a compression table, with respect to each of at least one selected record group; and deleting a plurality of records included in at least one selected record group from the original table.
    Type: Grant
    Filed: October 13, 2016
    Date of Patent: June 8, 2021
    Assignee: ARMIQ Co., Ltd.
    Inventor: Oxoo Kim
  • Patent number: 11023367
    Abstract: Systems, methods, and computer-readable media are disclosed for testing a software application. An exemplary method includes storing a control file identifying a test case for testing a software application. A first expected result may be extracted from a device storing expected results of the software application, the first expected result being identified by the control file. A first actual result may be extracted from a device storing actual results output by the software application, the first actual result being identified by the control file. The first expected result may be compared with the first actual result to determine whether the first actual result matches the first expected result. A result file indicating whether the test case passed or failed is generated, and the test case has passed when the first actual result matches the first expected result. The result file may be stored in a storage device.
    Type: Grant
    Filed: December 30, 2019
    Date of Patent: June 1, 2021
    Assignee: FEDERAL HOME LOAN MORTGAGE CORPORATION (FREDDIE MAC)
    Inventors: Philip Dunn, Yi Liu
  • Patent number: 10997148
    Abstract: The subject technology receives one or more requests to execute one or more requested transactions on a journal table of a database, the journal table comprising a snapshot and a log table. The subject technology, based on the one or more requests, inserts a new row into the log table for each requested transaction, each new row reflecting a corresponding requested transaction. The subject technology receives, after the one or more requested transactions have been executed, a second request to execute a second requested transaction on the journal table. The subject technology generates, prior to executing the second requested transaction, a second snapshot, the second snapshot comprising a second representation of data in the journal table after the one or more requested transactions have been executed, the second snapshot stored in a third micro-partition different than the first micro-partition and the second micro-partition.
    Type: Grant
    Filed: October 23, 2020
    Date of Patent: May 4, 2021
    Assignee: Snowflake Inc.
    Inventors: Istvan Cseri, Torsten Grabs, Thierry Cruanes, Subramanian Muralidhar, Benoit Dageville
  • Patent number: 10990576
    Abstract: The subject technology defines a journal table of a database, the journal table comprising a snapshot and a log table, the snapshot comprising a representation of data in the journal table at a particular time, the log table comprising a listing of requested changes to the journal table since the particular time, the snapshot stored in a first micro-partition, the log table stored in a second micro-partition. The subject technology receives, after at least one first requested transaction has been executed, a request to execute a second requested transaction on the journal table. The subject technology generates, prior to executing the second requested transaction, a second snapshot, the second snapshot comprising a second representation of data in the journal table after the at least one first requested transaction has been executed, the second snapshot stored in a third micro-partition different than the first micro-partition and the second micro-partition.
    Type: Grant
    Filed: October 23, 2020
    Date of Patent: April 27, 2021
    Assignee: Snowflake Inc.
    Inventors: Istvan Cseri, Torsten Grabs, Thierry Cruanes, Subramanian Muralidhar, Benoit Dageville
  • Patent number: 10992519
    Abstract: Techniques are disclosed relating to storage of network event information for multiple tenants. In some embodiments, one or more host computer systems are configured to maintain a plurality of containers operable to isolate network event information of a plurality of tenants from others of the plurality of tenants. The plurality of containers includes a first container that includes a first database executable to store network event information for a first of the plurality of tenants, and a second container that includes a second database executable to store network event information for a second of the plurality of tenants. In some embodiments, a management computer system is configured to receive, from the first tenant, a request to access network event information of the first tenant and route the request to a host computer system maintaining the first container to cause the first database to service the request.
    Type: Grant
    Filed: March 26, 2018
    Date of Patent: April 27, 2021
    Assignee: Alien Vault, Inc.
    Inventors: Alex Lisle, Roger Thornton, Russell Spitler, Jaime Blasco, Srivathsan Srinivasagoplan
  • Patent number: 10970486
    Abstract: Approaches to using unstructured input to update heterogeneous data stores include receiving unstructured text input, receiving a template for interpreting the unstructured text input, identifying, using an entity classifier, entities in the unstructured text input, identifying one or more potential parent entities from the identified entities based on the template, receiving a selection of a parent entity from the one or more potential parent entities, identifying one or more potential child entities from the identified entities based on the template and the selected parent entity, receiving a selection of a child entity from the one or more potential child entities, identifying an action item in the unstructured text input based on the identified entities and the template, determining, using an intent classifier, an intent of the action item, and updating a data store based on the determined intent, the identified entities, and the selected child entity.
    Type: Grant
    Filed: September 18, 2018
    Date of Patent: April 6, 2021
    Assignee: salesforce.com, inc.
    Inventors: Michael Machado, John Ball, Thomas Archie Cook, Jr., Shashank Harinath, Roojuta Lalani, Zineb Laraki, Qingqing Liu, Mike Rosenbaum, Karl Ryszard Skucha, Jean-Marc Soumet, Manju Vijayakumar
  • Patent number: 10963179
    Abstract: A method to prevent the inadvertent removal of volumes on a storage system is disclosed. In one embodiment, such a method includes receiving a request to remove (e.g., delete, detach, unmask, etc.) a volume on a storage system. In response to receiving the request, the method initiates at least one process to monitor the volume for I/O activity over a specified period of time. In the event the at least one process does not detect I/O activity to the volume during the specified period of time, the method executes the request by removing the volume. In the event the at least one process detects I/O activity to the volume during the specified period of time, the method denies the request to remove the volume. A corresponding system and computer program product are also disclosed.
    Type: Grant
    Filed: January 29, 2019
    Date of Patent: March 30, 2021
    Assignee: International Business Machines Corporation
    Inventors: John J. Auvenshine, Dave Kodjo, Nicolas Andre Druet, Marcel Pop, Paul Cloutier
  • Patent number: 10963578
    Abstract: A technique for preventing selected sets of data words from unauthorized transmission out of the secure perimeter of a computer system is disclosed. A set of security rules is applied to an outgoing data message and if one of the set of rules is triggered, scanning by another set of security rules. The server then executes the security command before transmitting the outgoing message out of the secure perimeter of the computer system or blocking transmission.
    Type: Grant
    Filed: February 1, 2018
    Date of Patent: March 30, 2021
    Assignee: Workshare Technology, Inc.
    Inventors: Scott More, Ilya Beyer
  • Patent number: 10949611
    Abstract: Current plagiarism checkers can determine if a document has extensively copied from another but these checkers fail when a document is filled with synonyms. The present invention offers a means of detecting plagiarism involving the use of synonyms or heaving paraphrasing. A source passage from a pertinent corpus is modified by generating augmented tokens which include synonyms for the various terms in the passage. Text analysis may be required to confirm the semantic meaning of a term. The modified passage may be a regular expression. The modified passage can then be compared to a suspect passage using a trigram scorer. If possible plagiarism is detected, an alert message is sent to a reviewer with the passage of interest, the source passage, and an identification of the related corpus.
    Type: Grant
    Filed: January 15, 2019
    Date of Patent: March 16, 2021
    Assignee: International Business Machines Corporation
    Inventors: Kyle M. Brake, Stephen A. Boxwell, Keith G. Frost, Stanley J. Vernier
  • Patent number: 10951713
    Abstract: IoT devices within a commercial real-estate or residential building environment may be connected through networks, such as a Building Automation and Control network (BACnet). Systems and methods according to this disclosure provide automatic discovery of IoT devices and relationships in commercial real-estate and residential buildings and integration of the BACnet devices into the digital twin of the building. In some implementations, an IoT gateway is configured to translate the communication received from the BACnet to an IoT cloud platform and configured to normalize the data across the different security platforms into a consistent format which enables integration and interoperability of the different building system platforms that may otherwise be operating in isolation from each other.
    Type: Grant
    Filed: June 28, 2019
    Date of Patent: March 16, 2021
    Assignee: CohesionIB
    Inventors: Robert Knight, Nikunj Patel, Rick Szcodronski
  • Patent number: 10944641
    Abstract: Application performance can be simulated based on captured application-specific traffic flows through a managed network. Traffic flows may be captured across the managed network and associated with a particular application. The captured flows can be used to generate trend lines and models. The generated trend lines and models may be used to simulate application performance responsive to changes in network characteristics and provided to a user through a graphical user interface as a graph. The user may then adjust simulated network characteristics through the graphical user interface to perform various hypothetical network simulations.
    Type: Grant
    Filed: November 1, 2019
    Date of Patent: March 9, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: David John Zacks, Thomas Szigeti, Tzahi Peleg, David Tedaldi, Vikram Vikas Pendhar
  • Patent number: 10929348
    Abstract: An end-to-end data curation system and the various methods used in linking, matching, and cleaning large-scale data sources. The goal of this system is to provide scalable and efficient record deduplication. The system uses a crowd of experts to train the system. The system operator can optionally provide a set of hints to reduce the number of questions sent to the experts. The system solves the problem of schema mapping and record deduplication in a holistic way by unifying these problems into a unified linkage problem.
    Type: Grant
    Filed: November 23, 2016
    Date of Patent: February 23, 2021
    Assignee: TAMR, INC.
    Inventors: Nikolaus Bates-Haus, George Beskales, Daniel Meir Bruckner, Ihab F. Ilyas, Alexander Richter Pagan, Michael Ralph Stonebraker
  • Patent number: 10833871
    Abstract: A method for signing a message, comprising performing a first Multi-Party Computation (MPC) process by multiple parties to compute a pseudorandom function, an input of the first MPC process comprises shares of a private signing key, each share is held by each party, the message is an input value to the pseudorandom function. The output of the first MPC process comprises multiple pairs of shares, each party holding a pair of shares, wherein each pair comprises a first value used for the MPC signing process and a second verifying value used for verifying correctness of the values provided by the multiple parties for the MPC signing process, and computing the signature on the message by performing an MPC signing protocol on the message, the MPC signing protocol receives as input shares of the output of the pseudorandom function from the multiple parties, and the message to be signed.
    Type: Grant
    Filed: December 26, 2019
    Date of Patent: November 10, 2020
    Assignees: UNBOUND TECH LTD., BAR-ILAN UNIVERSITY
    Inventors: Samuel Ranellucci, Yehuda Lindell
  • Patent number: 10805360
    Abstract: A method for performing initial registration is provided. The method includes receiving a server timeout message, the server timeout message including at least a field set to a value equal to a value received during a first registration. The method further includes initiating restoration procedures by performing an initial registration.
    Type: Grant
    Filed: May 12, 2017
    Date of Patent: October 13, 2020
    Assignee: BlackBerry Limited
    Inventor: Jan Hendrik Lucas Bakker
  • Patent number: 10789146
    Abstract: Example embodiments relate to forecast resource utilization. The example disclosed herein receives the first actual resource utilization, detects its pattern and trend, and determines the first forecasted resource utilization. Furthermore, a second actual resource utilization is received and its pattern is detected. Moreover, it is determined whether to forecast a new resource utilization.
    Type: Grant
    Filed: August 24, 2017
    Date of Patent: September 29, 2020
    Assignee: Hewlett Packard Enterprise Development LP
    Inventor: Kumar Raj
  • Patent number: 10790961
    Abstract: A computer-implemented method includes: obtaining, by a data party, a piece of plaintext to be encrypted; generating a ciphertext file including multiple pieces of ciphertext, each piece of ciphertext being derived from a homomorphic encryption algorithm executed on the piece of plaintext; adding a first file identifier of the ciphertext file to a file identifier set corresponding to the piece of plaintext; and in response to a piece of ciphertext derived from the piece of plaintext being needed for a cooperative calculation in which the data party is participating: obtaining the first file identifier from the file identifier set corresponding to the piece of plaintext, reading a first piece of ciphertext from the ciphertext file identified by the first file identifier, and sending the first piece of ciphertext to a partner participating in the cooperative calculation.
    Type: Grant
    Filed: January 30, 2020
    Date of Patent: September 29, 2020
    Assignee: Alibaba Group Holding Limited
    Inventor: Wenzhen Lin
  • Patent number: 10776342
    Abstract: Techniques for recovering lost clusters are described herein. In particular, this disclosure describes techniques for generating an allocation bitmap. The allocation bitmap may be used to recover lost clusters on a mounted volume.
    Type: Grant
    Filed: November 16, 2017
    Date of Patent: September 15, 2020
    Assignee: Tuxena, Inc.
    Inventors: Anton Ivanov Altaparmakov, Sougata Santra
  • Patent number: 10769307
    Abstract: Aspects of the disclosure relate to processing systems using natural language processing with improved dataset filtering and sanitization techniques. A computing platform may receive a dataset file and commands directing the computing platform to sanitize the dataset file. In response to the commands, the computing platform may identify confidential information contained in the dataset file using named entity recognition and one or more dynamic entity profiles, extract the confidential information, and replace the confidential information with non-confidential information to produce a sanitized dataset file. Based on identifying the confidential information contained in the dataset file, the computing platform may update the dynamic entity profiles. The computing platform may send the sanitized dataset file to the target environment host server, causing the target environment host server to use the sanitized dataset file in a testing environment that is prohibited from containing confidential information.
    Type: Grant
    Filed: May 30, 2018
    Date of Patent: September 8, 2020
    Assignee: Bank of America Corporation
    Inventors: Manu Kurian, Shashikant Sadashiv Jadhav
  • Patent number: 10764310
    Abstract: In one embodiment, a device in a network receives anomaly data regarding an anomaly detected by a machine learning-based anomaly detection mechanism of a first node in the network. The device matches the anomaly data to threat intelligence feed data from one or more threat intelligence services. The device determines whether to provide threat intelligence feedback to the first node based on the matched threat intelligence feed data and one or more policy rules. The device provides threat intelligence feedback to the first node regarding the matched threat intelligence feed data, in response to determining that the device should provide threat intelligence feedback to the first node.
    Type: Grant
    Filed: July 15, 2016
    Date of Patent: September 1, 2020
    Assignee: Cisco Technology, Inc.
    Inventors: Jean-Philippe Vasseur, Sukrit Dasgupta, Grégory Mermoud
  • Patent number: 10754847
    Abstract: Various embodiments relate to a method and apparatus automated production management, the system including a storage device configured to store data and program instructions; and a processor configured to receive data from a production asset and process the data, detect an event from the data, add a record to an edge blockchain, determine whether an action is required based on the event, communicate the action to the production asset, add a record to the edge blockchain and transmit edge blockchain to an enterprise information system to be stored in a core blockchain.
    Type: Grant
    Filed: June 19, 2018
    Date of Patent: August 25, 2020
    Assignee: CANNAGRI BLOCKCHAIN, INC.
    Inventors: Patrick R. Esposito, II, Matthew J. Milan, Jon H.C. Tirmandi, Mark T. Wise, Zenovy S. Wowczuk
  • Patent number: 10754736
    Abstract: A storage system in one embodiment comprises a plurality of storage devices and a storage controller. The storage controller is configured to scan data pages and associated metadata structures of the storage system, the metadata structures comprising at least a first metadata structure associating unique hash identifiers with physical locations of respective data pages in the storage system and a second metadata structure associating the physical locations of respective data pages with hash digests of the data pages and the unique hash identifiers. The storage controller is further configured to detect an error in one of the first and second metadata structures. Responsive to the detected error, the storage controller recovers a corresponding portion of the metadata based at least in part on one or more entries of the other one of the first and second metadata structures.
    Type: Grant
    Filed: October 25, 2018
    Date of Patent: August 25, 2020
    Assignee: EMC IP Holding Company LLC
    Inventors: Nimrod Shani, Leron Fliess, Tal Zohar
  • Patent number: 10747590
    Abstract: Embodiments for managing, serving, and applying logging adapters for applications are described. An administrator for an application can establish mappings between the application and adapters that handle log events from the application. When the application executes, it can get these mappings and use them to obtain the corresponding adapters. The adapters can have a configuration function and a logging function. The configuration function can be executed once per-execution of the application to establish a global state for the logging function of that adapter. The configuration function can receive configuration data provided with the mappings. Thereafter, as the application generates log events, they can be passed to the logging functions of the mapped adapters, which execute to perform logging such as analytics functions, on the events, whether locally or by sending the events to third parties.
    Type: Grant
    Filed: July 7, 2017
    Date of Patent: August 18, 2020
    Assignee: Facebook, Inc.
    Inventor: Jonjo Twist
  • Patent number: 10740084
    Abstract: Systems, apparatuses and methods may provide for technology that assumes, by a root of trust located in a trusted region of a system on chip (SOC), control over a reset of the SOC and conducting, by the root of trust, an authentication of an update package in response to an update condition. The root of trust technology may also apply the update package to firmware located in non-volatile memory (NVM) associated with a microcontroller of the SOC if the authentication is successful.
    Type: Grant
    Filed: August 16, 2018
    Date of Patent: August 11, 2020
    Assignee: Intel Corporation
    Inventors: Karunakara Kotary, Michael Kubacki, Sean Dardis
  • Patent number: 10740298
    Abstract: Techniques for limiting synchronization conflicts during file synchronization in a computing system are described herein. In one embodiment, a method includes detecting a change to a local copy a computer file on a client device. The local copy is associated with a local token. The method also includes obtaining a server token associated with a server copy of the same computer file on a file server and determining whether the local token matches the server token. If the local and server tokens match each other, the method includes uploading the local copy to the file server to overwrite the server copy even though the server copy contains a change to the computer file that is different than a change to the local copy of the same computer file.
    Type: Grant
    Filed: January 13, 2017
    Date of Patent: August 11, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Andrew Sean Watson, Steve Rayson, Yigithan Dedeoglu, George Armah
  • Patent number: 10733763
    Abstract: A mura detection device includes an XYZ coordinate system conversion unit which receives a photographed image of a display device and converts the photographed image into XYZ image data according to XYZ chromatic coordinates, a background image generation unit which generates background image data obtained by removing a part of the XYZ image data, a color difference calculation unit which generates color difference image data by comparing the photographed image and the background image data, and a mura data generation unit which calculates a color mura index value using the color difference image data.
    Type: Grant
    Filed: April 17, 2018
    Date of Patent: August 4, 2020
    Assignee: SAMSUNG DISPLAY CO., LTD.
    Inventors: Min Tak Lee, Kyu Seok Kim, Soo Young Kim, Young Nam Yun, Hyun Koo Lee
  • Patent number: 10726930
    Abstract: Systems and methods for solid-state storage drive-level failure prediction and health metric are described. A plurality of host-write commands are received at a solid-state storage device. A number of drive-writes per day based on the on the plurality of host-write commands is determined. An aggregated amount of degradation to one or more internal non-volatile memory components based on the number of drive-writes per day is determined. Using a machine-learned model, a probability of failure value based on a set of parameter data and the aggregated amount of degradation to the non-volatile memory component is generated. An alert is generated, based on the probability of failure value or degradation threshold.
    Type: Grant
    Filed: May 14, 2018
    Date of Patent: July 28, 2020
    Assignee: Western Digital Technologies, Inc.
    Inventors: Jay Sarkar, Cory Peterson, Amir Sanayei, Vidyabhushan Mohan, Yao Zhang
  • Patent number: 10705929
    Abstract: The present invention provides computer implemented method, system, and computer program product of switching servers without interrupting a client command-response queue.
    Type: Grant
    Filed: December 27, 2017
    Date of Patent: July 7, 2020
    Assignee: International Business Machines Corporation
    Inventors: Colin R. Devilbiss, Charles S. Graham, James B. Cunningham
  • Patent number: 10698921
    Abstract: A computer implemented method for initializing a secondary database system includes receiving table state information from a primary database system at a secondary database system. The table state information includes information identifying which tables had an open operation during a savepoint event. Metadata associated with the tables is parsed to identify table state information from the metadata and a lock is created for each table identified as having an open operation during the savepoint event. Afterwards, log transaction information is sequentially parsed. Related apparatus, systems, techniques and articles are also described.
    Type: Grant
    Filed: February 28, 2017
    Date of Patent: June 30, 2020
    Assignee: SAP SE
    Inventors: Colin Florendo, Michael Muehle, Thorsten Glebe, Rolando Blanco, Chaitanya Gottipati, Nirvik Basak, Günter Radestock
  • Patent number: 10693643
    Abstract: Methods and systems for cryptographically secured data validation. The system includes a first validator. The first validator is designed and configured to receive a first instance of an immutable sequential data structure containing at least a first digitally signed textual element containing at least a first physical asset transfer field populated with a at least a first physical asset transfer datum and at least a second digitally signed textual element generated by a second validator. The first validator authenticates the first instance of the immutable sequential data structure. The first validator generates at least a second validity indicating a determination by the first validator as to the accuracy of the at least a first physical asset transfer field. The first validator detects a conflict between the at least a first validity flag and the at least a second validity flag. The first validator transmits to the at least a second validator an indication of the conflict.
    Type: Grant
    Filed: May 31, 2019
    Date of Patent: June 23, 2020
    Inventors: Tom Serres, Bettina Warburg, Chuck Hammel, IV
  • Patent number: 10685176
    Abstract: A computer system and a computer-implemented method is provided for authoring a requirements document for a product or service. The requirements document includes one or more components for the product or service. Each component is described using one or more requirements statements. An online tool is used to provide electronic templates to view and/or modify features of the requirement statements. A common data structure is used to store attributes associated with portions of the requirements statements. The common data structure is accessible by the online tool to author the requirements document.
    Type: Grant
    Filed: August 8, 2018
    Date of Patent: June 16, 2020
    Assignee: THE BOEING COMPANY
    Inventors: William Scott Wardlaw, Paul Murray, Michael E. Crow
  • Patent number: 10673882
    Abstract: A method, apparatus and computer program product for use in monitoring and controlling network behavior of Internet of Things (IoT) devices connected to a network. According to this approach, a set of network characteristics of an IoT device (e.g., as published by the device manufacturer) are assigned various risk values and then monitored over an initial time period to generate a “fingerprint” of the device's network flow. This flow is then transformed into one or more flow control rules representing “normal” or abnormal behavior of the IoT device. Preferably, the rules are instantiated into a network boundary control system (NBCS), such as an enterprise router, gateway, or the like, and then enforced, e.g., to generate alerts or others actions when the rules are triggered. The approach enables dynamic and automated threat detection and prevention based on anomalous and/or known-bad behavior.
    Type: Grant
    Filed: January 15, 2018
    Date of Patent: June 2, 2020
    Assignee: International Business Machines Corporation
    Inventors: Charles K. Davis, III, Chris Dotson, Steven Lingafelt
  • Patent number: 10657167
    Abstract: Techniques described herein relate to systems and methods of data storage, and more particularly to providing layering of file system functionality on an object interface. In certain embodiments, file system functionality may be layered on cloud object interfaces to provide cloud-based storage while allowing for functionality expected from a legacy applications. For instance, POSIX interfaces and semantics may be layered on cloud-based storage, while providing access to data in a manner consistent with file-based access with data organization in name hierarchies. Various embodiments also may provide for memory mapping of data so that memory map changes are reflected in persistent storage while ensuring consistency between memory map changes and writes. For example, by transforming a ZFS file system disk-based storage into ZFS cloud-based storage, the ZFS file system gains the elastic nature of cloud storage.
    Type: Grant
    Filed: May 31, 2017
    Date of Patent: May 19, 2020
    Assignee: Oracle International Corporation
    Inventors: Mark Maybee, James Kremer, Victor Latushkin, Gavin Gibson
  • Patent number: 10650152
    Abstract: A system and method to control access to data are disclosed. A request for a subject to perform an action on an object is received. A determination is made whether a policy for the subject limits the action to an object with integrity protection. The action is performed based on determining the object has integrity protection. The request is rejected based on determining the object does not have integrity protection.
    Type: Grant
    Filed: June 9, 2016
    Date of Patent: May 12, 2020
    Assignee: BlackBerry Limited
    Inventor: Glenn Daniel Wurster
  • Patent number: 10643326
    Abstract: One of the objects of the present invention is to provide a semiconductor measurement apparatus capable of obtaining a measurement result that appropriately reflects the deformation of a pattern even if plural causes for the deformation of the pattern exist together. In order to attain the above object, the semiconductor measurement apparatus is proposed in the following way. The semiconductor measurement apparatus is capable of measuring the dimensions between plural measurement points of different positions of the edge of a reference pattern and plural corresponding points of the circuit pattern of an electronic device, in which the corresponding points correspond to the plural measurement points.
    Type: Grant
    Filed: February 12, 2013
    Date of Patent: May 5, 2020
    Assignee: Hitachi High-Technologies Corporation
    Inventors: Yasutaka Toyoda, Ryoichi Matsuoka
  • Patent number: 10642847
    Abstract: A differentially private security system communicatively coupled to a database storing restricted data receives a database query from a client. The database query includes a relation indicative of data to perform the query upon and at least one privacy parameter indicative of a level of differential privacy with which to perform the query. The differentially private security system determines a noise type for the query. The differentially private security system determines a representation of probabilistic privacy loss for the query based on the determined noise type. The differentially private security system determines a privacy spend for the query using the generated representation of probabilistic privacy loss. The differentially private security system determines whether the determined privacy spend exceeds a privacy budget associated with the client.
    Type: Grant
    Filed: May 9, 2019
    Date of Patent: May 5, 2020
    Assignee: LeapYear Technologies, Inc.
    Inventors: Ishaan Nerurkar, Christopher Hockenbrocht, Alexander Rozenshteyn, Liam Damewood, Mihai Maruseac
  • Patent number: 10635414
    Abstract: Systems, methods, and computer-executable instructions for synthesizing programs using a prefix of an output. A specification of a task to synthesize a program in a domain specific language (DSL) is received. The specification includes an input and a corresponding prefix of the output. Programs for the task are synthesized. The synthesizing includes generating sub-goals based on the specification. Each of the synthesized programs include a solved subset of sub-goals and each sub-goal includes a symbol in the DSL. The symbol is transformed based on the DSL. The sub-goals are solved based on the transforming of the symbol using the input and the corresponding prefix of the output to generate the synthesized programs. The prefix of the output matches a prefix of an output from each of the plurality of synthesized programs.
    Type: Grant
    Filed: April 24, 2018
    Date of Patent: April 28, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Sumit Gulwani, Abhishek Udupa
  • Patent number: 10636293
    Abstract: The disclosure involves a method comprising clustering a plurality of observation samples related to historical travel demands into one or more clusters; for each cluster, constructing an actual probability distribution of the historical travel demands corresponding to the observation samples in the cluster; for each cluster, inputting observation samples in the cluster into a prediction model for predicting future travel demands to produce a result of prediction; for each cluster, computing a predicted probability distribution of the historical travel demands corresponding to the observation samples in the cluster based on the result of prediction; for each cluster, evaluating a difference between the actual probability distribution and the predicted probability distribution of the cluster; and modifying the prediction model so that a statistical sum of the differences for the one or more clusters is decreased.
    Type: Grant
    Filed: June 7, 2017
    Date of Patent: April 28, 2020
    Assignee: International Business Machines Corporation
    Inventors: Wei Shan Dong, Peng Gao, Wei Sun, Jun Chi Yan, Shi Lei Zhang, Xin Zhang, Jun Zhu
  • Patent number: 10630471
    Abstract: The subject matter discloses a system for enforcing correctness of a derivation key, comprising multiple computerized nodes, comprising a storage module configured to store a share of a key used as an input of a function generating the derivation key, a communication module configured to exchange information between the multiple computerized nodes, and a processing module configured to receiving a request to create the derivation key, performing an MPC process between the multiple computerized nodes, said MPC process is performed multiple times, in each time the MPC process comprises receiving the key shares as input, randomly selecting a function, outputting the outputs of the selected function to the multiple computerized nodes, the multiple computerized nodes lack access to the selected function, the multiple computerized nodes perform computations on the received outputs and exchange outputs of the computations to estimate correction of the key shares inputted into the MPC process.
    Type: Grant
    Filed: November 8, 2018
    Date of Patent: April 21, 2020
    Assignees: BAR ILAN UNIVERSITY, UNBOUND TECH LTD.
    Inventors: Yehuda Lindell, Guy Pe'er
  • Patent number: 10628806
    Abstract: Systems and methods of improving the operation of a test data provisioning network and test data provisioning network devices is disclosed. A data hub layer comprising an interstitial logic boundary at a periphery of a consumption environment and configured to interact with a production environment whereby test data may be provisioned without direct access by a user to the production environment. In this manner, the efficiency and resiliency of the production environment may be enhanced and the test data may be improved, so that the network more properly functions according to approved parameters.
    Type: Grant
    Filed: December 16, 2015
    Date of Patent: April 21, 2020
    Assignee: AMERICAN EXPRESS TRAVEL RELATED SERVICES COMPANY, INC
    Inventors: Lee A. Barnett, Satish K. Jayaraman
  • Patent number: 10621032
    Abstract: A data management system verifies the accuracy of data retrieved from a primary data store using a checksum tree stored by a secondary data store. A checksum tree is a tree graph that represents a hierarchy of checksums. Leaf nodes of the checksum tree can store checksums for data blocks stored by the primary data store and secondary data store, and parent nodes can represent checksums of their respective child nodes. The data management system can compare reference subtrees within the checksum tree to comparison subtrees that are generated from data retrieved from the primary data store to determine whether the retrieved data is accurate. The data management system can also use the checksum tree to identify which, if any, of the retrieved data blocks are inaccurate.
    Type: Grant
    Filed: June 22, 2017
    Date of Patent: April 14, 2020
    Assignee: Uber Technologies, Inc.
    Inventor: Chia-Hao Yu
  • Patent number: 10623375
    Abstract: This disclosure describes an automated process of discovering characteristics needed to integrate a web-based application to a web portal, such as a reverse proxy. This process eliminates the need for application owners and security analysts to manually discover the information needed for the on-boarding process. To this end, application-specific information is determined by monitoring network traffic flows in and out of the application, user authentication and authorization event data, and the like. An application discovery engine analyzes the discovered data, preferably against a set of patterns and heuristic-based rules, to discover or identify the one or more application characteristics. A set of configuration data is then generated, and this configuration data is then used to integrate the application into the web reverse proxy and, in particular, by specifying the configuration needed to “board” the application.
    Type: Grant
    Filed: September 16, 2014
    Date of Patent: April 14, 2020
    Assignee: International Business Machines Corporation
    Inventors: Richard Jay Cohen, Anne Louise Bolgert, Randolph Michael Forlenza, Miguel Sang, Krishna Kishore Yellepeddy
  • Patent number: 10623298
    Abstract: A system for performing an integrated data quality control is disclosed. The system determines a dataflow path for one or more input data elements. The, the system performs a lineage control check, a timeliness control check, and a variation control check on the dataflow path. If the dataflow path integrated scoring of the three controls is sufficient, the system determines that data related to the dataflow path is fit for use. If the dataflow path fails any one of the three checks, the system determines that data related to the dataflow path is not fit for use.
    Type: Grant
    Filed: October 10, 2018
    Date of Patent: April 14, 2020
    Assignee: Bank of America Corporation
    Inventors: Amitava Deb, Sandip Gopal Bhatwadekar, Chih-Chin Yang, Jovan Cenev
  • Patent number: 10614088
    Abstract: Methods, systems, and computer program products for assessing value of one or more data sets in the context of a set of applications are provided herein. A computer-implemented method includes selecting analytic applications of interest based on a characterization of data attributes of each of the available data sets; automatically determining an impact of each of the data attributes of each of the available data sets on an end value of each of the analytic applications of interest; automatically computing an amount of improvement to the end value of each of the analytic applications of interest based on inclusion of an additional data set; and automatically determining a value attributed to the additional data set based on a comparison of (i) the cost of adding the additional data set to the available data sets to (ii) the computed amount of improvement based on the inclusion of the additional data set.
    Type: Grant
    Filed: April 11, 2016
    Date of Patent: April 7, 2020
    Assignee: International Business Machines Corporation
    Inventors: Rema Ananthanarayanan, Kalapriya Kannan, Sameep Mehta
  • Patent number: 10599427
    Abstract: A novel software updating method is provided. A target file is divided into segments, where some segments are updated by patching, while other segments are updated by archiving. The segmentation of the update allows very large files such as DYLD shared caches to be patched in-place, i.e., by using free space available within the file to perform patching rather than requiring enough free space on disk to store both the new version and the old version of the file. The segmentation of the update also allows each segment to be updated individually by the most optimal update method (copy, patch, or archive) so that the size of the update file can be minimized.
    Type: Grant
    Filed: April 17, 2018
    Date of Patent: March 24, 2020
    Assignee: Apple Inc.
    Inventors: Eric Bainville, Ali Sazegari
  • Patent number: 10592528
    Abstract: A computer implemented method is provided for capturing and replaying a database workload by obtaining a workload capture file comprising execution context information generated in a database system and replayable to replicate the workload, generating a modified workload capture file by generating modified execution context information, replaying the modified workload capture file by generating at least one read statement based on the modified workload execution information and issuing at least one read statement to a primary database system having an associated secondary database system, determining that the at least one read statement may be routed to the secondary database system for execution, and routing the read statement to the secondary database system for execution. Related apparatus, systems, techniques and articles are also described.
    Type: Grant
    Filed: February 27, 2017
    Date of Patent: March 17, 2020
    Assignee: SAP SE
    Inventors: Chul Won Lee, Juchang Lee, Hyogi Jung
  • Patent number: 10587694
    Abstract: One example method includes discovering an application instance on a host, reporting the existence of the application instance, discovering application components of the application instance, and mapping the application components to information concerning an underlying filesystem and information concerning an underlying physical drive. The example method additionally includes freezing the application instance in response to a first instruction, and then thawing the application instance in response to a second instruction.
    Type: Grant
    Filed: July 20, 2017
    Date of Patent: March 10, 2020
    Assignee: EMC IP HOLDING COMPANY
    Inventor: Sunil Kumar
  • Patent number: 10587647
    Abstract: A testing technique tests and compares malware detection capabilities of network security devices, such as those commercially available from a variety of cyber-security vendors. Testing is conducted on test samples in a “blind” fashion, where the security devices do not know beforehand whether the test samples are “live” malware or benign network traffic. The test samples are received from a remote server and potentially represent malicious attacks against a testing network. Notably, for truly blind testing, embodiments of the testing technique employ a mixture of malware and benign test samples, as well as addressing subterfuge, to prevent the security devices from being able to reliably determine maliciousness of the test samples based on a source of any of the samples.
    Type: Grant
    Filed: November 22, 2016
    Date of Patent: March 10, 2020
    Assignee: FireEye, Inc.
    Inventors: Yasir Khalid, Nadeem Shahbaz
  • Patent number: 10572464
    Abstract: A method, system and computer program product for managing a file system includes a plurality of allocation areas of loaded allocation trees to serve a request per file system drive for a transaction group. The system also includes a module configured to move a loaded allocation tree to an unloading tree in the event the loaded allocation tree will not satisfy the request. The system additionally includes a module configured to select and place in a loading tree queue a most eligible unloaded tree based on a weight of each unloaded tree. The system further includes a module to asynchronously process the loading tree queue and an unloading tree queue threads parallel to a storage pool allocator sync process. Allocation areas are attached in a circular ring of loaded allocation trees. Space map trees are converted into fixed size areas for constant latency loading logs and creating index trees.
    Type: Grant
    Filed: September 7, 2017
    Date of Patent: February 25, 2020
    Assignee: INTELLIFLASH BY DDN, INC.
    Inventor: Shailendra Tripathi
  • Patent number: 10558224
    Abstract: Systems, methods, and apparatuses described herein are directed to sharing vehicle obstacle data between vehicles and/or between vehicles and a central server. Vehicles may include sensors capturing data including, but not limited to, speed, direction, acceleration, deceleration, LIDAR data, RADAR data, SONAR data, camera data, GPS data, etc. In some implementations, acceleration of a vehicle above a threshold, such as braking or swerving, may trigger the transmission of sensor data to other vehicles and/or infrastructure devices. Vehicles that receive the transmitted data may determine a validity of the data, and may incorporate the data into operations of the receiving vehicle based at least in part on the validity of the data. Validity of the data may be based on sensor type, elapsed time or distance between detection of an obstacle or event and reception of data, a number of retransmissions, duplicative data, independent sources of data, etc.
    Type: Grant
    Filed: August 10, 2017
    Date of Patent: February 11, 2020
    Assignee: Zoox, Inc.
    Inventors: Michael Lin, Timothy David Kentley-Klay
  • Patent number: 10552265
    Abstract: In one example method, which may be performed by a data integrity check entity, a request is received to perform a data integrity check with respect to a backup dataset created by the data protection entity. Next, an information set is accessed that was created by a data protection entity concerning the backup dataset. The backup dataset and information contained in the information set are analyzed and, based on the analysis, a data integrity problem is identified that resulted from a data corruption event involving the backup dataset. Finally, results of the analysis of the backup dataset and the information set are reported to the data protection entity.
    Type: Grant
    Filed: September 14, 2017
    Date of Patent: February 4, 2020
    Assignee: EMC IP Holding Company LLC
    Inventors: Man Lv, Assaf Natanzon, Yong Zou