Using Checksum Patents (Class 707/697)
  • Patent number: 11956519
    Abstract: A method, apparatus and computer program product are provided to signal grouping types in an image container file. Relative to the construction of an image container file, the method, apparatus and computer program product construct an image container file having a group box with a grouping type associated with burst-captured images, time-synchronized images captured by a plurality of image capture devices or an image item associated with an audio track. With respect to the processing of an image container file, the method, apparatus and computer program product permit an image container file having a group box with a grouping type associated with one of burst-captured images, time-synchronized images captured by a plurality of image capture devices or an image item associated with an audio track to be processed to cause one or more image items from the image container file to be rendered in accordance with the grouping type.
    Type: Grant
    Filed: April 8, 2019
    Date of Patent: April 9, 2024
    Assignee: Nokia Technologies Oy
    Inventors: Emre Aksu, Miska Hannuksela, Olli Kilpelainen, Jonne Juhani Mäkinen, Juha-Pekka Hippeläinen, Jani Kattelus
  • Patent number: 11822808
    Abstract: Data may be replicated from a host storage system to a target storage system. It may be determined to replicate a first logical storage element on the source storage system to a second logical storage element on the target storage system, wherein the first logical storage element defines a first data portion having a first value. It may be determined that a third logical storage element on the target storage system defines a second data portion having the first value. The first logical storage element may be replicated to the second logical storage element by establishing a deduplication relationship between the second logical storage element and the third logical storage element on the target storage system without transmitting the first data portion from the source storage system to the target storage system.
    Type: Grant
    Filed: November 10, 2022
    Date of Patent: November 21, 2023
    Assignee: EMC IP Holding Company LLC
    Inventors: Benjamin Yoder, William R. Stronge
  • Patent number: 11809725
    Abstract: In a computer system that includes a set of cross repositories for data storage, a document is broken into portions, and each portion is stored in at least one repository (and preferably many or all of the cross repositories). In this way, when a portion of the document requires an update, the communication of updated data can be limited to the relevant portion(s) of the document. Also, if a user requires only certain portion(s) of the saved document, then the data transfer from a cross repository to the user can be limited to those certain portion(s) of the document.
    Type: Grant
    Filed: October 13, 2021
    Date of Patent: November 7, 2023
    Assignee: International Business Machines Corporation
    Inventors: Wei U Wang, Jie Zhang, Hong Lin G Guo
  • Patent number: 11526292
    Abstract: Data may be replicated from a host storage system to a target storage system. It may be determined to replicate a first logical storage element on the source storage system to a second logical storage element on the target storage system, wherein the first logical storage element defines a first data portion having a first value. It may be determined that a third logical storage element on the target storage system defines a second data portion having the first value. The first logical storage element may be replicated to the second logical storage element by establishing a deduplication relationship between the second logical storage element and the third logical storage element on the target storage system without transmitting the first data portion from the source storage system to the target storage system.
    Type: Grant
    Filed: May 28, 2020
    Date of Patent: December 13, 2022
    Assignee: EMC IP Holding Company LLC
    Inventors: Benjamin Yoder, William R. Stronge
  • Patent number: 11461836
    Abstract: Systems and methods are provided describing interface selector techniques as implemented in a user interface of a computing device. The techniques include receiving a set of interface configuration instructions including an item unit of measure describing a quantity of an item in terms of a dimensional unit, generating a user interface based at least in part on the set of interface configuration instructions, generating a result value using the quantity value and the item unit of measure, and transmitting the user interface and the result value to a user device.
    Type: Grant
    Filed: January 21, 2020
    Date of Patent: October 4, 2022
    Assignee: Amazon Technologies, Inc.
    Inventor: Abhisheyk Gaur
  • Patent number: 11436032
    Abstract: Methods and systems for storing and retrieving container images are provided. In one embodiment, a method is provided including receiving a container image, which may include executable code, and dividing the container image into a plurality of image parts. One or more image upload transactions may then be generated, and each of the image upload transactions may include at least one of the plurality of image parts. The image upload transactions may be stored on the blockchain. The image upload transactions may also include a unique identifier generated to link the plurality of image upload transactions.
    Type: Grant
    Filed: September 10, 2019
    Date of Patent: September 6, 2022
    Assignee: Red Hat, Inc.
    Inventor: Dylan Murray
  • Patent number: 11372566
    Abstract: Embodiments of the present disclosure provide a method and device for storing data. The method comprises: generating a data block corresponding to data to be stored; aligning the data block to a boundary of a tracking unit of a predefined size for validating the data; and storing the aligned data block in at least one storage unit of a storage space, the at least one storage unit having an identical size. The method according to embodiments of the present disclosure can align the data block so as to minimize the waste of storage space and avoid the situation where the rest data cannot be validated due to disappearance of partial data.
    Type: Grant
    Filed: September 10, 2019
    Date of Patent: June 28, 2022
    Assignee: EMC IP Holding Company, LLC
    Inventors: Lu Lei, Chen Wang, Gary Jialei Wu, Ronnie Yu Cai, Ao Sun
  • Patent number: 11195217
    Abstract: Systems and methods of evaluating a third-party participant for inclusion in a networked environment are disclosed. A plurality of features representative of a third-party participant are received and at least one pairwise feature score is calculated for a first feature and a second feature selected from the plurality of features. The third-party participant is classified into one of a plurality of predetermined categories by a trained model based on the at least one pairwise feature score.
    Type: Grant
    Filed: January 30, 2020
    Date of Patent: December 7, 2021
    Assignee: Walmart Apollo, LLC
    Inventors: Vidhya Rohini Raman, Paria Ghorbani
  • Patent number: 11132128
    Abstract: The disclosed computer-implemented method for data placement in container-based storage systems may include (i) identifying a file stored within a container-based storage system, where the container-based storage system stores the file as data segments within containers, (ii) receiving, in response to a write operation directed to the file, a request to store within the container-based storage system a new data segment generated by the write operation, (iii) describing the file in terms of a plurality of consecutive slabs, (iv) determining that the new data segment falls within a specified slab, and (v) fulfilling the request to store the new data segment within the container-based storage system by storing the new data segment in a designated container that corresponds to the specified slab in response to determining that the new data segment falls within the specified slab. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 24, 2017
    Date of Patent: September 28, 2021
    Assignee: Veritas Technologies LLC
    Inventors: Xianbo Zhang, Weibao Wu, Jeffrey Van Voorst, Haigang Wang, Yong Yang, Shuangmin Zhang
  • Patent number: 11080672
    Abstract: Systems and associated methods for recycling and performing other processes with consumer electronic devices are described herein. In various embodiments, the present technology includes systems and methods for identifying and evaluating a used or pre-owned consumer electronic device, such as a mobile phone, laptop, etc. to facilitate purchasing the device. In some embodiments, the present technology includes a counter-top evaluation terminal that evaluates a device and facilitates purchase and recycling of the device. Various other aspects of the present technology are described herein.
    Type: Grant
    Filed: December 11, 2015
    Date of Patent: August 3, 2021
    Assignee: ecoATM, LLC
    Inventor: Mark Vincent Bowles
  • Patent number: 11036714
    Abstract: A system and a method for locating application-specific data that has been previously deleted and located in an address of the data storage device marked as being available for storing new data. The method includes accessing unidentified data from at least one data storage device; examining the unidentified data to detect at least one application-specific data pattern associated with at least one application; for each detected application-specific data pattern, executing an application-specific validation process to determine whether the unidentified data includes valid data associated with a corresponding application; and if it is determined that the unidentified data includes valid data associated with the corresponding application, then recovering the valid data.
    Type: Grant
    Filed: October 30, 2015
    Date of Patent: June 15, 2021
    Assignee: Magnet Forensics Investco Inc.
    Inventor: Jad John Saliba
  • Patent number: 10983961
    Abstract: Techniques to provide a de-duplicating distributed file system using a cloud-based object store are disclosed. In various embodiments, a request to store a file comprising a plurality of chunks of file data is received. A determination to store at least a subset of the plurality of chunks is made. The request is responded to at least in part by providing an indication to store two or more chunks comprising the at least a subset of the plurality of chunks comprising the file as a single stored object that includes the combined chunk data of said two or more chunks.
    Type: Grant
    Filed: October 4, 2018
    Date of Patent: April 20, 2021
    Assignee: EMC IP Holding Company LLC
    Inventors: Thomas Manville, Julio Lopez, Rajiv Desai, Nathan Rosenblum
  • Patent number: 10693827
    Abstract: A method for checking against transmitting a message to an unintended recipient, includes developing, using a processor on a computer, a training model of a linguistic profile of messages previously transmitted electronically by a user to a recipient, by iteratively computing a composite feature vector over a set of all messages previously transmitted electronically to the recipient, the iterations for developing the training model continuing until summed proportional changes across all features falls below a first preset threshold value.
    Type: Grant
    Filed: October 29, 2018
    Date of Patent: June 23, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Maryam Ashoori, Justin David Weisz
  • Patent number: 10616330
    Abstract: A method for execution by a dispersed storage and task (DST) execution unit includes receiving a slice write request via a network that includes a data slice and extracting metadata from the data slice. The metadata is stored in a metadata storage tree in a first memory device of the DST execution unit and the data slice is stored in a slice storage tree in a second memory device of the DST execution unit based on tree utilization parameters.
    Type: Grant
    Filed: January 3, 2017
    Date of Patent: April 7, 2020
    Assignee: PURE STORAGE, INC.
    Inventor: Renars W. Narubin
  • Patent number: 10339048
    Abstract: An apparatus, according to one embodiment, includes non-volatile memory configured to store data, and a controller and logic integrated with and/or executable by the controller, the logic being configured to: determine, by the controller, that at least one block of the non-volatile memory and/or portion of a block of the non-volatile memory meets a retirement condition, re-evaluate, by the controller, the at least one block and/or the portion of a block to determine whether to retire the at least one block and/or the portion of a block, indicate, by the controller, that the at least one block and/or the portion of a block remains usable when a result of the re-evaluation is not to retire the block, and indicate, by the controller, that the at least one block and/or the portion of a block is retired when the result of the re-evaluation is to retire the block.
    Type: Grant
    Filed: December 23, 2014
    Date of Patent: July 2, 2019
    Assignee: International Business Machines Corporation
    Inventors: Charles J. Camp, Timothy J. Fisher, Aaron D. Fry, Nikolas Ioannou, Ioannis Koltsidas, Roman Pletka, Sasa Tomic
  • Patent number: 10229272
    Abstract: During booting of a computing device, multiple security boundaries are generated. A security boundary refers to a manner of operation of a computing device or a portion of the computing device, with a program executing in one security boundary being prohibited from accessing data and programs in another security boundary. As part of booting the computing device measurements of (e.g., hash values or other identifications of) various modules loaded and executed as part of booting the computing device are maintained by a boot measurement system of the computing device. Additionally, as part of booting the computing device, public/private key pairs of one of the security boundaries is generated or otherwise obtained. Private keys of the public/private key pairs are provided to the one security boundary, and the public keys of the public/private key pairs are provided to the boot measurement system.
    Type: Grant
    Filed: January 31, 2017
    Date of Patent: March 12, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Yevgeniy A. Samsonov, Kinshumann Kinshumann
  • Patent number: 9781224
    Abstract: A content transmission system includes: a central control device to receive a content packet to be provided to a client device from a content server, store chunks divided from the received content packet together with corresponding chunk identifiers, check duplication of the divided chunks, and transmit the chunk identifier and flow information of a duplicate chunk to a local caching device instead of transmitting the content packet corresponding to the duplicate chunk; and the local caching device to: receive the chunk identifier and the flow information of the duplicate chunk from the central control device, and transmit the content packet corresponding to the received chunk identifier and previously stored to the client device.
    Type: Grant
    Filed: June 25, 2014
    Date of Patent: October 3, 2017
    Assignees: SK Telecom Co., Ltd., KOREA ADVANCED INSTITUTE OF SCIENCE AND TECHNOLOGY
    Inventors: Jongmin Lee, Kyungjun Lee, Youngjae Shim, Shinae Woo, Kyoungsoo Park
  • Patent number: 9773123
    Abstract: Systems and methods that regulate range of access to personal information of a mobile unit's owner. The access control component can designate granularity for access levels and/or a spectrum of access modes—(as opposed to a binary choice of full access or no access at all). Such access can be based on a spectrum and/or discrete trust relationship between the owner and user of the mobile unit. A profile definition component can exploit an owner's trust relationships to designate levels of security. The profile definition component can further define a profile based on a set of applications, such as entertainment mode, browser mode, and the like.
    Type: Grant
    Filed: June 22, 2015
    Date of Patent: September 26, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Amy Karlson, Alice Jane Bernheim Brush, Stuart Edward Schechter
  • Patent number: 9747447
    Abstract: A processing device (10) includes a processor (12), an interface (14) and a memory (100). The memory (100) is formed from system Random Access Memory (RAM) and one or more other storage devices. The memory (100) can be considered as comprising working memory (110) and persistent storage (120). The working memory includes the system RAM but may also use memory from one or more other storage devices and when certain suspicious program detection modules are operating also stores a comparison table (112) discussed below. Contained within the persistent storage are several executable program files as follows: an Absolute Memory Address Calculator executable program (121) which is responsible for causing the system (10) to inspect a copy of a persistently stored (and compiled) executable program (e.g. an executable program (125, 126, 127, . . .
    Type: Grant
    Filed: March 24, 2014
    Date of Patent: August 29, 2017
    Assignee: BRITISH TELECOMMUNICATIONS public limited company
    Inventor: Fadi El-Moussa
  • Patent number: 9690279
    Abstract: An automation interface is provided for interacting with industrial controllers. The automation interface provides for programming, editing, monitoring and maintenance of industrial controllers programmatically from a local or remote location. The automation interface component is adapted to communicate with industrial controllers by integrating a computer process interface library into the automation interface component. The computer process interface library exposes the automation interface component to client application processes, so that the client application processes can communicate with the at least one industrial controller programmatically. The automation interface is provided with functionality for downloading, uploading and programming of control programs to the processors of the industrial controllers.
    Type: Grant
    Filed: June 16, 2016
    Date of Patent: June 27, 2017
    Assignee: ROCKWELL AUTOMATION, INC.
    Inventors: Jeffrey A. McKelvey, Mike D'Amico
  • Patent number: 9690498
    Abstract: Methods and systems are disclosed for testing and/or validating that an untrusted device is operating according to an expected state or configuration. The methods and systems may be designed such that the volatile memory of the untrusted device is brought to a known state for validation, for example upon ingress to or egress from a protected mode of operation. The device may execute a first operating system when operating outside of the protected mode. Upon determining to transition to protected mode, an operational image of a second operating system may be loaded into the device. The device may write a pattern to unused memory for validation. The device may receive a first challenge request from a trusted monitor (TM). In order to be successfully validated, the device may answer the challenge correctly within a given response window based on the current state of its volatile memory.
    Type: Grant
    Filed: March 31, 2015
    Date of Patent: June 27, 2017
    Assignee: L3 TECHNOLOGIES, INC.
    Inventors: Jerry Hutchison, Robert Coia
  • Patent number: 9513842
    Abstract: A smart card compares an object identification parameter associated with a write command with an object identification parameter stored in the non-volatile memory of the smart card. If the comparison is positive, the data embedded in the write command is written at a at a predefined address whose value is stored in the non-volatile memory, an address corresponding to the sum of the stored predefined address and the size of the written data is calculated, and the calculated address is stored in the non-volatile memory in place of the predefined address. If the comparison is negative, the data is written at a default address, an address corresponding to the sum of the default address and the size of the written data is calculated, and the calculated address is stored in the non-volatile memory as the predefined address.
    Type: Grant
    Filed: November 30, 2012
    Date of Patent: December 6, 2016
    Assignee: MORPHO
    Inventors: Michael Barthe, Geoffrey Spinau
  • Patent number: 9405684
    Abstract: A method, computer program product, and computing system for processing, on a host, a read request for a portion of a data file stored on a backend storage system. The portion of the data file is obtained from the backend storage system. The portion of the data file is divided into a plurality of file chunks based, at least in part, upon a file type. Each of the plurality of file chunks is compared to other file chunks stored within a frontend cache system associated with the host to identify unique file chunks within the plurality of file chunks. The unique file chunks are stored within the frontend cache system.
    Type: Grant
    Filed: September 28, 2012
    Date of Patent: August 2, 2016
    Assignee: EMC Corporation
    Inventors: Philip Derbeko, Assaf Natanzon, Anat Eyal
  • Patent number: 9026507
    Abstract: Various embodiments of the invention provide methods, systems and software for analyzing data. In particular embodiments, for example, a set of data about a web site may be analyzed to determine whether the web site is likely to be illegitimate (e.g., to be involved in a fraudulent scheme, such as a phishing scheme, the sale of gray market goods, etc.). In an exemplary embodiment, a set of data may be divided into a plurality of components (each of which, in some cases, may be considered a separate data set). Merely by way of example, a set of data may comprise data gathered from a plurality of data sources, and/or each component may comprise data gathered from one of the plurality of data sources. As another example, a set of data may comprise a document with a plurality of sections, and each component may comprise one of the plurality of sections.
    Type: Grant
    Filed: November 3, 2008
    Date of Patent: May 5, 2015
    Assignee: Thomson Reuters Global Resources
    Inventors: Ihab Shraim, Mark Shull
  • Patent number: 9002806
    Abstract: A system, method, and apparatus are directed towards identifying adaptive length segments of redundant data for encoding a data structure. Initial boundaries are identified for an input matching segment within input data and for a candidate store matching segment in a synchronized store. The data prior to and after the boundaries are compared to identify matching data. As matching data is identified, at least one of the boundaries of the matching segments is revised. An encoded representation of the resulting input matching segment is then generated based in part on pointers and offsets into the synchronized store. A data structure is generated based on the encoded representation and unmatched portion, which is sent to a receiver. The receiver uses the data structure to extract matching data from the synchronized store, and together with the unmatched input data in the data structure, reconstruct the input data.
    Type: Grant
    Filed: December 8, 2010
    Date of Patent: April 7, 2015
    Assignee: F5 Networks, Inc.
    Inventor: Saxon C. Amdahl
  • Patent number: 9002812
    Abstract: A resilient hashing system leverages a fast, non-cryptographic hash/checksum function that has good diffusion properties while remaining reasonably efficient on modern central processing units (CPUs). The hash function uses random secret data so that hash keys for particular data are difficult to predict. Due to its internal structure, well-chosen random secret data is difficult for an attacker to counter without having access to the direct output of the hash function. At every stage of the block function, there are at least two operations that can be performed in parallel, increasing performance on modern superscalar CPUs. Thus, the resilient hashing system provides a hash table and checksum that can be used in Internet-facing or other vulnerable sources of input data to manage performance in the face of malicious attacks.
    Type: Grant
    Filed: November 19, 2012
    Date of Patent: April 7, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Niels Ferguson, Reid Borsuk, Jeffrey Cooperstein, Matthew Ellis
  • Patent number: 8996804
    Abstract: A mechanism is provided for optimizing and enhancing performance for parity based storage, particularly redundant array of independent disk (RAID) storage. The mechanism optimizes a repetitive pattern write command for performance for storage configurations that require parity calculations. The mechanism eliminates the need for laborious parity calculations that are resource intensive and add to IO latency. For repetitive write commands that span across the full stripe of a RAID5 or similar volume, the mechanism calculates parity by looking at the pattern and the number of columns in the volume. The mechanism may avoid the XOR operation altogether for repetitive pattern write commands. The mechanism may enhance secure delete operations that use repetitive pattern write commands by eliminating data reliability operations like parity generation and writing altogether.
    Type: Grant
    Filed: September 12, 2011
    Date of Patent: March 31, 2015
    Assignee: International Business Machines Corporation
    Inventors: Rahul M. Fiske, Kalyan C. Gunda, Carl E. Jones, Sandeep R. Patil, Subhojit Roy
  • Patent number: 8983920
    Abstract: Systems, methods, and computer program products for enabling assessment of the quality of a search index. In one embodiment, objects are processed to produce corresponding text that is stored and indexed. The objects are also processed to identify and store corresponding metadata values for indexing. Error conditions that are detected during the processing of objects to generate corresponding text are tracked and compared to determine the most severe of the error conditions. An indication of the most severe error condition is stored in a first consolidated error field. Errors that are encountered in the identification and storage of metadata values are counted and this count is stored in a second consolidated error field. Both of the consolidated error fields are indexed in the same manner as the text and metadata for the objects, so that the stored error information can be used in queries of the search index.
    Type: Grant
    Filed: August 22, 2012
    Date of Patent: March 17, 2015
    Assignee: Open Text S.A.
    Inventor: Patrick Thomas Sidney Pidduck
  • Patent number: 8983921
    Abstract: A computer-implemented method and computer program product comprising optimal, systematic q-ary codes for correcting all asymmetric and symmetric errors of limited magnitude are provided.
    Type: Grant
    Filed: October 23, 2013
    Date of Patent: March 17, 2015
    Assignee: State of Oregon
    Inventors: Bella Bose, Noha Elarief
  • Patent number: 8954793
    Abstract: A method and a storage server for backing up data, involves mass storage devices of users of the service that connect to the storage server of the service provider over a public data network. The customers store the data with their terminals. The data is stored to the file system of the mass storage device which encrypts the stored data and transfers the data in encrypted form over the public data network to the storage server. The storage server calculates error correction data from the encrypted data. The error correction data is stored in the mass memory of the storage server. When recovering the stored data of the users, the storage server requests the stored data of all the users whose data was used for the error correction data calculation over the public data network to be used for the recovery calculation.
    Type: Grant
    Filed: September 15, 2010
    Date of Patent: February 10, 2015
    Assignee: Varaani Works Oy
    Inventor: Kimmo Lahdensivu
  • Patent number: 8943031
    Abstract: A server processing device acquires a lock on a region of a file which has stale data. The server processing device self-heals the stale data in the locked region using current data and receives a write request to modify another region of the file during the self-healing of the locked region of the file. The server processing device provides write access to the requested region during the self-healing of the locked region of the file.
    Type: Grant
    Filed: August 20, 2012
    Date of Patent: January 27, 2015
    Assignee: Red Hat, Inc.
    Inventors: Pranith Kumar Karampuri, Anand Vishweswaran Avati
  • Patent number: 8930329
    Abstract: Methods and systems for transforming a logical data object for storage in a storage device configured to operate with at least one storage protocol. One method comprises creating in the storage device a transformed logical data object comprising a one or more allocated storage sections with a predefined size and receiving one or more data chunks corresponding to the transformed logical data object. The method further comprises determining if each received data chunk comprises a predefined criterion, transforming each data chunk that comprises the predefined criterion, maintaining each data chuck in raw form that does not comprise the predefined criterion, and sequentially storing each transformed data chuck and data chunk in raw form into said one or more allocated storage sections in accordance with an order said transformed data chunks and data chunks in raw form are received. One system comprises a processor configured to perform the above method.
    Type: Grant
    Filed: August 21, 2013
    Date of Patent: January 6, 2015
    Assignee: International Business Machines Corporation
    Inventors: Chaim Koifman, Nadav Kedem, Avi Zohar
  • Patent number: 8898123
    Abstract: A technique is provided for configuring an interface device. The interface device includes a plurality of device elements, such as objects configured in accordance with object-oriented programming concepts. A query from a general purpose viewer is received by the interface device, such as originating from a configuration station where the general purpose viewer is operative. The query is interpreted by server-side scripting executed in the interface device to identify the device elements and to display visual representations of the device elements in a design-time environment. The design-time environment and the visual representations are then transmitted to a configuration station. The device elements, their properties and functionalities may be altered by means of the design-time environment and the server-side scripting to create interface screens, alter device elements and their properties and functions, and so forth.
    Type: Grant
    Filed: June 7, 2005
    Date of Patent: November 25, 2014
    Assignee: Rockwell Automation Technologies, Inc.
    Inventors: Clinton Duane Britt, Joseph Francis Mann
  • Patent number: 8856090
    Abstract: A client device is configured to generate checksums for attributes of product records to be transmitted to a marketplace operator system that provides an e-commerce marketplace. On subsequent transmissions of the product records, the client device can utilize the checksums to determine if the attributes of the product records have been modified since a previous transmission. If the attributes have not been modified, the client device does not re-transmit the unchanged attributes to the e-commerce marketplace. The client device may also be configured to retrieve a checksum configuration file from the marketplace operator system that includes data defining the manner in which the client device should compute the checksums.
    Type: Grant
    Filed: March 20, 2012
    Date of Patent: October 7, 2014
    Assignee: Amazon Technologies, Inc.
    Inventor: Nicholas Honner
  • Patent number: 8838531
    Abstract: Systems and methods for verifying data in a distributed database using different automated check operations at different times during the database read and update cycles. Various functions may be performed including executing a first check during update operations of the database. A second check may also be executed during the update operation of the database, and be implemented as an execution thread of an update daemon. A third check may be executed at a time interval between update functions of the update daemon. A fourth check may be executed during a time that the database is not being updated. Integrity of data in the database may be verified by a computer processor based on the first, second, third, and fourth checks.
    Type: Grant
    Filed: November 13, 2012
    Date of Patent: September 16, 2014
    Assignee: Verisign, Inc.
    Inventors: Michael Bentkofsky, Patrick Quaid, Bradley McMillen
  • Patent number: 8838525
    Abstract: In one embodiment, a method for communicating data is provided. The method includes defining a data transmission unit (DTU) to be sent in an xDSL data stream, defining a retransmit container as a time slot that corresponds to the DTU, maintaining, in a retransmit container, a copy of the DTU and an index corresponding to the retransmit container, the retransmit container being maintained at the second device independently of the first device, transmitting the DTU in the xDSL data stream, determining whether the DTU should be retransmitted, and if the DTU should be retransmitted: identifying the DTU by the retransmit container and retransmitting a copy of the DTU as identified by the retransmit container when the DTU reaches a predetermined position in the retransmission buffer.
    Type: Grant
    Filed: June 21, 2012
    Date of Patent: September 16, 2014
    Assignee: Broadcom Corporation
    Inventors: Benoit Christiaens, Miguel Peeters, Raphael Cassiers
  • Patent number: 8832539
    Abstract: Old user data, old metadata, and old error correction parity information are received. New metadata corresponding to the old user data is generated. The old metadata and the new metadata are combined to obtain combined metadata. New error correction parity information is generated using the combined metadata. The old error correction parity information and new error correction parity information are combined to obtain combined error correction parity information. The old user data, new metadata, and combined error correction parity information are stored in solid state storage.
    Type: Grant
    Filed: January 11, 2013
    Date of Patent: September 9, 2014
    Assignee: SK hynix memory solutions inc.
    Inventors: Nishant Patil, Meng-Kun Lee, Yingquan Wu
  • Patent number: 8825609
    Abstract: A method and system comprises a duplication identifier module to analyze data input information to automatically identify duplicate expected inputs associated with a process. The system includes logical process model information defining a logically structured series of process activities and data input information representing a plurality of expected inputs associated with respective process activities, with each expected input being indicative of expected collection of a corresponding data element during execution of the associated process activity. Each duplicate expected input comprises one of the plurality of expected inputs for which there is at least one other expected input with respect to a common corresponding data element.
    Type: Grant
    Filed: June 10, 2011
    Date of Patent: September 2, 2014
    Assignee: HCL America, Inc.
    Inventors: Vikram Duvvoori, Satish Venkatesan Srinivasan, Prasad A Chodavarapu, Ravindra S. Gajulapalli, Rajesh Agrawal Ramesh
  • Patent number: 8825626
    Abstract: Techniques for detecting unwanted data are described herein. In one embodiment, a request is received for storing a data object in a storage system from a client over a network, where the request includes first representative data representing the data object without including actual content of the data object. It is detected whether the data object contains unwanted content by comparing the first representative data with second representative data without accessing the actual content of the data object, where the second representative data represents the unwanted content. A response is transmitted to the client over the network indicating whether the data object is likely to contain the unwanted object based on comparison of the first and second representative data.
    Type: Grant
    Filed: August 23, 2011
    Date of Patent: September 2, 2014
    Assignee: EMC Corporation
    Inventors: Grant Wallace, Philip N. Shilane, Frederick Douglis
  • Publication number: 20140229456
    Abstract: According to one embodiment of the present invention, a system assesses the quality of column data. The system assigns a pre-defined domain to one or more columns of the data based on a validity condition for the domain, applies the validity condition for the domain assigned to a column to data values in the column to compute a data quality metric for the column, and computes and displays a metric for a group of columns based on the computed data quality metric of at least one column in the group. Embodiments of the present invention further include a method and computer program product for assessing the quality of column data in substantially the same manners described above.
    Type: Application
    Filed: February 12, 2013
    Publication date: August 14, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Patent number: 8799234
    Abstract: Semantic entity manipulation technique embodiments are presented that generate a probabilistic program capable of manipulating character strings representing semantic entities based on input-output examples. The program can then be used to produce a desired output consistent with the input-output examples from inputs of a type included in the examples. The probabilistic program is generated based on the output of parsing, transform and formatting modules. The parsing module employs a probabilistic approach to parsing the input-output examples. The transform module identifies a weighted set of transforms that are capable of producing the output item from the input items of an input-output example to a likelihood specified by their assigned weight. The formatting module generates formatting instructions that transform selected output parts into a form specified by the output items in the input-output examples.
    Type: Grant
    Filed: February 3, 2011
    Date of Patent: August 5, 2014
    Assignee: Microsoft Corporation
    Inventors: Sumit Gulwani, Rishabh Singh
  • Publication number: 20140201173
    Abstract: Example embodiments relate to file-based social recommendations. In example embodiments, a system may search a social network to identify uploaded files that are similar to a file from a user and then identify unconnected users that uploaded the uploaded files, where the unconnected users are not connected to the user in the social network. In response to identifying the unconnected users, the system may then communicate a user recommendation that at least one unconnected users be added to the social context.
    Type: Application
    Filed: January 15, 2013
    Publication date: July 17, 2014
    Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
    Inventors: Eyal Roth, Olga Tubman, Boris Korenfeld
  • Publication number: 20140188827
    Abstract: Exemplary embodiments provide various techniques for detecting and correcting corrupted or dangling data object handles. In one example, a method is provided for correcting corrupted data object handles. In this method, a redirector file stored on a first logical data container is accessed. This redirector file includes a forward object handle pointing to a first data object stored on a second logical data container and includes a first checksum of the forward object handle. A second checksum of the forward object handle is determined and a comparison is made between the first and second checksums. If a mismatch is detected, the data objects stored on the second logical data container are scanned to extract backward object handles. A backward object handle can be identified to point back to the redirector file. The forward object handle can then be restored to point to the second data object based on the identification.
    Type: Application
    Filed: February 21, 2014
    Publication date: July 3, 2014
    Applicant: NetApp, Inc.
    Inventor: Sundeep Singh
  • Patent number: 8768901
    Abstract: A method and apparatus for selectively storing data on a server. The method operates by accessing a computer file and defining a data block as a current block of data. The current block is subsequently checksummed using a rolling error identification code. The method then determines if the calculated checksum for the current block has been previously stored in a database. If a matching checksum for the data is found in the database, then a duplicate of the current block already exists and the process repeats by selecting a new block of data. Alternatively, if the calculated checksum is absent from the checksum and the process has advanced one block length, the process moves back one block length and stores the current block in an archive. Otherwise, the checksum advances one byte forward to form a new current block of data and the process repeats.
    Type: Grant
    Filed: May 1, 2012
    Date of Patent: July 1, 2014
    Assignee: Symantec Operating Corporation
    Inventor: Robert Somerville
  • Publication number: 20140181056
    Abstract: Systems, methods, and computer program products for enabling assessment of the quality of a search index. In one embodiment, objects are processed to produce corresponding text that is stored and indexed. The objects are also processed to identify and store corresponding metadata values for indexing. Error conditions that are detected during the processing of objects to generate corresponding text are tracked and compared to determine the most severe of the error conditions. An indication of the most severe error condition is stored in a first consolidated error field. Errors that are encountered in the identification and storage of metadata values are counted and this count is stored in a second consolidated error field. Both of the consolidated error fields are indexed in the same manner as the text and metadata for the objects, so that the stored error information can be used in queries of the search index.
    Type: Application
    Filed: August 22, 2012
    Publication date: June 26, 2014
    Inventor: Patrick Thomas Sidney Pidduck
  • Patent number: 8744839
    Abstract: Target word recognition includes: obtaining a candidate word set and corresponding characteristic computation data, the candidate word set comprising text data, and characteristic computation data being associated with the candidate word set; performing segmentation of the characteristic computation data to generate a plurality of text segments; combining the plurality of text segments to form a text data combination set; determining an intersection of the candidate word set and the text data combination set, the intersection comprising a plurality of text data combinations; determining a plurality of designated characteristic values for the plurality of text data combinations; based at least in part on the plurality of designated characteristic values and according to at least a criterion, recognizing among the plurality of text data combinations target words whose characteristic values fulfill the criterion.
    Type: Grant
    Filed: September 22, 2011
    Date of Patent: June 3, 2014
    Assignee: Alibaba Group Holding Limited
    Inventors: Haibo Sun, Yang Yang, Yining Chen
  • Patent number: 8725702
    Abstract: A computer-implemented method for repairing system files may include 1) identifying a request to repair a corrupted system file in an operating system, 2) receiving file metadata describing the corrupted system file and system metadata describing the operating system, 3) identifying an uncorrupted version of the corrupted system file by i) identifying a series of matching tests for matching the corrupted system file with the uncorrupted version, the series of matching tests including at least one file metadata item from the file metadata and at least one system metadata item from the system metadata, and ii) applying the series of matching tests in a predetermined order to a database of uncorrupted system files until a matching test matches the corrupted system file with the uncorrupted version of the system file. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 15, 2012
    Date of Patent: May 13, 2014
    Assignee: Symantec Corporation
    Inventors: Nivedhitha Raman, David Kane, Sonia Subramanian, Wilson Meng
  • Patent number: 8694478
    Abstract: Exemplary embodiments provide various techniques for detecting and correcting corrupted or dangling data object handles. In one example, a method is provided for correcting corrupted data object handles. In this method, a redirector file stored on a first logical data container is accessed. This redirector file includes a forward object handle pointing to a first data object stored on a second logical data container and includes a first checksum of the forward object handle. A second checksum of the forward object handle is determined and a comparison is made between the first and second checksums. If a mismatch is detected, the data objects stored on the second logical data container are scanned to extract backward object handles. A backward object handle can be identified to point back to the redirector file. The forward object handle can then be restored to point to the second data object based on the identification.
    Type: Grant
    Filed: February 9, 2012
    Date of Patent: April 8, 2014
    Assignee: NetApp, Inc.
    Inventor: Sundeep Singh
  • Publication number: 20140095457
    Abstract: Technology is disclosed for regulating data storage based on a popularity of data files (“the technology”). Various embodiments of the technology includes maintaining a fixed durability level of data files stored in a storage system by regulating a number of copies of the data files stored in the storage system. One embodiment includes regulating the number of copies of a particular data file based on popularity of the particular data file among various users using the storage system. The number of copies stored in the storage system is increased or decreased, including from/to zero, based on the popularity of the particular data file. The popularity is determined based on at least one of: a number of computing devices of various users having the particular data file, a latency, network bandwidth and/or availability with the computing devices for reading the particular data file, or access pattern of the particular data file.
    Type: Application
    Filed: October 2, 2013
    Publication date: April 3, 2014
    Applicant: NEXTBIT SYSTEMS INC.
    Inventor: Justin Quan
  • Publication number: 20140081935
    Abstract: Exemplary embodiments provide various techniques for detecting and correcting corrupted or dangling data object handles. In one example, a method is provided for correcting corrupted data object handles. In this method, a redirector file stored on a first logical data container is accessed. This redirector file includes a forward object handle pointing to a first data object stored on a second logical data container and includes a first checksum of the forward object handle. A second checksum of the forward object handle is determined and a comparison is made between the first and second checksums. If a mismatch is detected, the data objects stored on the second logical data container are scanned to extract backward object handles. A backward object handle can be identified to point back to the redirector file. The forward object handle can then be restored to point to the second data object based on the identification.
    Type: Application
    Filed: February 9, 2012
    Publication date: March 20, 2014
    Applicant: NetApp, Inc.
    Inventor: Sundeep Singh