Using Checksum Patents (Class 707/697)
-
Patent number: 11956519Abstract: A method, apparatus and computer program product are provided to signal grouping types in an image container file. Relative to the construction of an image container file, the method, apparatus and computer program product construct an image container file having a group box with a grouping type associated with burst-captured images, time-synchronized images captured by a plurality of image capture devices or an image item associated with an audio track. With respect to the processing of an image container file, the method, apparatus and computer program product permit an image container file having a group box with a grouping type associated with one of burst-captured images, time-synchronized images captured by a plurality of image capture devices or an image item associated with an audio track to be processed to cause one or more image items from the image container file to be rendered in accordance with the grouping type.Type: GrantFiled: April 8, 2019Date of Patent: April 9, 2024Assignee: Nokia Technologies OyInventors: Emre Aksu, Miska Hannuksela, Olli Kilpelainen, Jonne Juhani Mäkinen, Juha-Pekka Hippeläinen, Jani Kattelus
-
Patent number: 11822808Abstract: Data may be replicated from a host storage system to a target storage system. It may be determined to replicate a first logical storage element on the source storage system to a second logical storage element on the target storage system, wherein the first logical storage element defines a first data portion having a first value. It may be determined that a third logical storage element on the target storage system defines a second data portion having the first value. The first logical storage element may be replicated to the second logical storage element by establishing a deduplication relationship between the second logical storage element and the third logical storage element on the target storage system without transmitting the first data portion from the source storage system to the target storage system.Type: GrantFiled: November 10, 2022Date of Patent: November 21, 2023Assignee: EMC IP Holding Company LLCInventors: Benjamin Yoder, William R. Stronge
-
Patent number: 11809725Abstract: In a computer system that includes a set of cross repositories for data storage, a document is broken into portions, and each portion is stored in at least one repository (and preferably many or all of the cross repositories). In this way, when a portion of the document requires an update, the communication of updated data can be limited to the relevant portion(s) of the document. Also, if a user requires only certain portion(s) of the saved document, then the data transfer from a cross repository to the user can be limited to those certain portion(s) of the document.Type: GrantFiled: October 13, 2021Date of Patent: November 7, 2023Assignee: International Business Machines CorporationInventors: Wei U Wang, Jie Zhang, Hong Lin G Guo
-
Patent number: 11526292Abstract: Data may be replicated from a host storage system to a target storage system. It may be determined to replicate a first logical storage element on the source storage system to a second logical storage element on the target storage system, wherein the first logical storage element defines a first data portion having a first value. It may be determined that a third logical storage element on the target storage system defines a second data portion having the first value. The first logical storage element may be replicated to the second logical storage element by establishing a deduplication relationship between the second logical storage element and the third logical storage element on the target storage system without transmitting the first data portion from the source storage system to the target storage system.Type: GrantFiled: May 28, 2020Date of Patent: December 13, 2022Assignee: EMC IP Holding Company LLCInventors: Benjamin Yoder, William R. Stronge
-
Patent number: 11461836Abstract: Systems and methods are provided describing interface selector techniques as implemented in a user interface of a computing device. The techniques include receiving a set of interface configuration instructions including an item unit of measure describing a quantity of an item in terms of a dimensional unit, generating a user interface based at least in part on the set of interface configuration instructions, generating a result value using the quantity value and the item unit of measure, and transmitting the user interface and the result value to a user device.Type: GrantFiled: January 21, 2020Date of Patent: October 4, 2022Assignee: Amazon Technologies, Inc.Inventor: Abhisheyk Gaur
-
Patent number: 11436032Abstract: Methods and systems for storing and retrieving container images are provided. In one embodiment, a method is provided including receiving a container image, which may include executable code, and dividing the container image into a plurality of image parts. One or more image upload transactions may then be generated, and each of the image upload transactions may include at least one of the plurality of image parts. The image upload transactions may be stored on the blockchain. The image upload transactions may also include a unique identifier generated to link the plurality of image upload transactions.Type: GrantFiled: September 10, 2019Date of Patent: September 6, 2022Assignee: Red Hat, Inc.Inventor: Dylan Murray
-
Patent number: 11372566Abstract: Embodiments of the present disclosure provide a method and device for storing data. The method comprises: generating a data block corresponding to data to be stored; aligning the data block to a boundary of a tracking unit of a predefined size for validating the data; and storing the aligned data block in at least one storage unit of a storage space, the at least one storage unit having an identical size. The method according to embodiments of the present disclosure can align the data block so as to minimize the waste of storage space and avoid the situation where the rest data cannot be validated due to disappearance of partial data.Type: GrantFiled: September 10, 2019Date of Patent: June 28, 2022Assignee: EMC IP Holding Company, LLCInventors: Lu Lei, Chen Wang, Gary Jialei Wu, Ronnie Yu Cai, Ao Sun
-
Patent number: 11195217Abstract: Systems and methods of evaluating a third-party participant for inclusion in a networked environment are disclosed. A plurality of features representative of a third-party participant are received and at least one pairwise feature score is calculated for a first feature and a second feature selected from the plurality of features. The third-party participant is classified into one of a plurality of predetermined categories by a trained model based on the at least one pairwise feature score.Type: GrantFiled: January 30, 2020Date of Patent: December 7, 2021Assignee: Walmart Apollo, LLCInventors: Vidhya Rohini Raman, Paria Ghorbani
-
Patent number: 11132128Abstract: The disclosed computer-implemented method for data placement in container-based storage systems may include (i) identifying a file stored within a container-based storage system, where the container-based storage system stores the file as data segments within containers, (ii) receiving, in response to a write operation directed to the file, a request to store within the container-based storage system a new data segment generated by the write operation, (iii) describing the file in terms of a plurality of consecutive slabs, (iv) determining that the new data segment falls within a specified slab, and (v) fulfilling the request to store the new data segment within the container-based storage system by storing the new data segment in a designated container that corresponds to the specified slab in response to determining that the new data segment falls within the specified slab. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: March 24, 2017Date of Patent: September 28, 2021Assignee: Veritas Technologies LLCInventors: Xianbo Zhang, Weibao Wu, Jeffrey Van Voorst, Haigang Wang, Yong Yang, Shuangmin Zhang
-
Patent number: 11080672Abstract: Systems and associated methods for recycling and performing other processes with consumer electronic devices are described herein. In various embodiments, the present technology includes systems and methods for identifying and evaluating a used or pre-owned consumer electronic device, such as a mobile phone, laptop, etc. to facilitate purchasing the device. In some embodiments, the present technology includes a counter-top evaluation terminal that evaluates a device and facilitates purchase and recycling of the device. Various other aspects of the present technology are described herein.Type: GrantFiled: December 11, 2015Date of Patent: August 3, 2021Assignee: ecoATM, LLCInventor: Mark Vincent Bowles
-
Patent number: 11036714Abstract: A system and a method for locating application-specific data that has been previously deleted and located in an address of the data storage device marked as being available for storing new data. The method includes accessing unidentified data from at least one data storage device; examining the unidentified data to detect at least one application-specific data pattern associated with at least one application; for each detected application-specific data pattern, executing an application-specific validation process to determine whether the unidentified data includes valid data associated with a corresponding application; and if it is determined that the unidentified data includes valid data associated with the corresponding application, then recovering the valid data.Type: GrantFiled: October 30, 2015Date of Patent: June 15, 2021Assignee: Magnet Forensics Investco Inc.Inventor: Jad John Saliba
-
Patent number: 10983961Abstract: Techniques to provide a de-duplicating distributed file system using a cloud-based object store are disclosed. In various embodiments, a request to store a file comprising a plurality of chunks of file data is received. A determination to store at least a subset of the plurality of chunks is made. The request is responded to at least in part by providing an indication to store two or more chunks comprising the at least a subset of the plurality of chunks comprising the file as a single stored object that includes the combined chunk data of said two or more chunks.Type: GrantFiled: October 4, 2018Date of Patent: April 20, 2021Assignee: EMC IP Holding Company LLCInventors: Thomas Manville, Julio Lopez, Rajiv Desai, Nathan Rosenblum
-
Patent number: 10693827Abstract: A method for checking against transmitting a message to an unintended recipient, includes developing, using a processor on a computer, a training model of a linguistic profile of messages previously transmitted electronically by a user to a recipient, by iteratively computing a composite feature vector over a set of all messages previously transmitted electronically to the recipient, the iterations for developing the training model continuing until summed proportional changes across all features falls below a first preset threshold value.Type: GrantFiled: October 29, 2018Date of Patent: June 23, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Maryam Ashoori, Justin David Weisz
-
Patent number: 10616330Abstract: A method for execution by a dispersed storage and task (DST) execution unit includes receiving a slice write request via a network that includes a data slice and extracting metadata from the data slice. The metadata is stored in a metadata storage tree in a first memory device of the DST execution unit and the data slice is stored in a slice storage tree in a second memory device of the DST execution unit based on tree utilization parameters.Type: GrantFiled: January 3, 2017Date of Patent: April 7, 2020Assignee: PURE STORAGE, INC.Inventor: Renars W. Narubin
-
Patent number: 10339048Abstract: An apparatus, according to one embodiment, includes non-volatile memory configured to store data, and a controller and logic integrated with and/or executable by the controller, the logic being configured to: determine, by the controller, that at least one block of the non-volatile memory and/or portion of a block of the non-volatile memory meets a retirement condition, re-evaluate, by the controller, the at least one block and/or the portion of a block to determine whether to retire the at least one block and/or the portion of a block, indicate, by the controller, that the at least one block and/or the portion of a block remains usable when a result of the re-evaluation is not to retire the block, and indicate, by the controller, that the at least one block and/or the portion of a block is retired when the result of the re-evaluation is to retire the block.Type: GrantFiled: December 23, 2014Date of Patent: July 2, 2019Assignee: International Business Machines CorporationInventors: Charles J. Camp, Timothy J. Fisher, Aaron D. Fry, Nikolas Ioannou, Ioannis Koltsidas, Roman Pletka, Sasa Tomic
-
Patent number: 10229272Abstract: During booting of a computing device, multiple security boundaries are generated. A security boundary refers to a manner of operation of a computing device or a portion of the computing device, with a program executing in one security boundary being prohibited from accessing data and programs in another security boundary. As part of booting the computing device measurements of (e.g., hash values or other identifications of) various modules loaded and executed as part of booting the computing device are maintained by a boot measurement system of the computing device. Additionally, as part of booting the computing device, public/private key pairs of one of the security boundaries is generated or otherwise obtained. Private keys of the public/private key pairs are provided to the one security boundary, and the public keys of the public/private key pairs are provided to the boot measurement system.Type: GrantFiled: January 31, 2017Date of Patent: March 12, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Yevgeniy A. Samsonov, Kinshumann Kinshumann
-
Patent number: 9781224Abstract: A content transmission system includes: a central control device to receive a content packet to be provided to a client device from a content server, store chunks divided from the received content packet together with corresponding chunk identifiers, check duplication of the divided chunks, and transmit the chunk identifier and flow information of a duplicate chunk to a local caching device instead of transmitting the content packet corresponding to the duplicate chunk; and the local caching device to: receive the chunk identifier and the flow information of the duplicate chunk from the central control device, and transmit the content packet corresponding to the received chunk identifier and previously stored to the client device.Type: GrantFiled: June 25, 2014Date of Patent: October 3, 2017Assignees: SK Telecom Co., Ltd., KOREA ADVANCED INSTITUTE OF SCIENCE AND TECHNOLOGYInventors: Jongmin Lee, Kyungjun Lee, Youngjae Shim, Shinae Woo, Kyoungsoo Park
-
Patent number: 9773123Abstract: Systems and methods that regulate range of access to personal information of a mobile unit's owner. The access control component can designate granularity for access levels and/or a spectrum of access modes—(as opposed to a binary choice of full access or no access at all). Such access can be based on a spectrum and/or discrete trust relationship between the owner and user of the mobile unit. A profile definition component can exploit an owner's trust relationships to designate levels of security. The profile definition component can further define a profile based on a set of applications, such as entertainment mode, browser mode, and the like.Type: GrantFiled: June 22, 2015Date of Patent: September 26, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Amy Karlson, Alice Jane Bernheim Brush, Stuart Edward Schechter
-
Patent number: 9747447Abstract: A processing device (10) includes a processor (12), an interface (14) and a memory (100). The memory (100) is formed from system Random Access Memory (RAM) and one or more other storage devices. The memory (100) can be considered as comprising working memory (110) and persistent storage (120). The working memory includes the system RAM but may also use memory from one or more other storage devices and when certain suspicious program detection modules are operating also stores a comparison table (112) discussed below. Contained within the persistent storage are several executable program files as follows: an Absolute Memory Address Calculator executable program (121) which is responsible for causing the system (10) to inspect a copy of a persistently stored (and compiled) executable program (e.g. an executable program (125, 126, 127, . . .Type: GrantFiled: March 24, 2014Date of Patent: August 29, 2017Assignee: BRITISH TELECOMMUNICATIONS public limited companyInventor: Fadi El-Moussa
-
Patent number: 9690279Abstract: An automation interface is provided for interacting with industrial controllers. The automation interface provides for programming, editing, monitoring and maintenance of industrial controllers programmatically from a local or remote location. The automation interface component is adapted to communicate with industrial controllers by integrating a computer process interface library into the automation interface component. The computer process interface library exposes the automation interface component to client application processes, so that the client application processes can communicate with the at least one industrial controller programmatically. The automation interface is provided with functionality for downloading, uploading and programming of control programs to the processors of the industrial controllers.Type: GrantFiled: June 16, 2016Date of Patent: June 27, 2017Assignee: ROCKWELL AUTOMATION, INC.Inventors: Jeffrey A. McKelvey, Mike D'Amico
-
Patent number: 9690498Abstract: Methods and systems are disclosed for testing and/or validating that an untrusted device is operating according to an expected state or configuration. The methods and systems may be designed such that the volatile memory of the untrusted device is brought to a known state for validation, for example upon ingress to or egress from a protected mode of operation. The device may execute a first operating system when operating outside of the protected mode. Upon determining to transition to protected mode, an operational image of a second operating system may be loaded into the device. The device may write a pattern to unused memory for validation. The device may receive a first challenge request from a trusted monitor (TM). In order to be successfully validated, the device may answer the challenge correctly within a given response window based on the current state of its volatile memory.Type: GrantFiled: March 31, 2015Date of Patent: June 27, 2017Assignee: L3 TECHNOLOGIES, INC.Inventors: Jerry Hutchison, Robert Coia
-
Patent number: 9513842Abstract: A smart card compares an object identification parameter associated with a write command with an object identification parameter stored in the non-volatile memory of the smart card. If the comparison is positive, the data embedded in the write command is written at a at a predefined address whose value is stored in the non-volatile memory, an address corresponding to the sum of the stored predefined address and the size of the written data is calculated, and the calculated address is stored in the non-volatile memory in place of the predefined address. If the comparison is negative, the data is written at a default address, an address corresponding to the sum of the default address and the size of the written data is calculated, and the calculated address is stored in the non-volatile memory as the predefined address.Type: GrantFiled: November 30, 2012Date of Patent: December 6, 2016Assignee: MORPHOInventors: Michael Barthe, Geoffrey Spinau
-
Patent number: 9405684Abstract: A method, computer program product, and computing system for processing, on a host, a read request for a portion of a data file stored on a backend storage system. The portion of the data file is obtained from the backend storage system. The portion of the data file is divided into a plurality of file chunks based, at least in part, upon a file type. Each of the plurality of file chunks is compared to other file chunks stored within a frontend cache system associated with the host to identify unique file chunks within the plurality of file chunks. The unique file chunks are stored within the frontend cache system.Type: GrantFiled: September 28, 2012Date of Patent: August 2, 2016Assignee: EMC CorporationInventors: Philip Derbeko, Assaf Natanzon, Anat Eyal
-
Patent number: 9026507Abstract: Various embodiments of the invention provide methods, systems and software for analyzing data. In particular embodiments, for example, a set of data about a web site may be analyzed to determine whether the web site is likely to be illegitimate (e.g., to be involved in a fraudulent scheme, such as a phishing scheme, the sale of gray market goods, etc.). In an exemplary embodiment, a set of data may be divided into a plurality of components (each of which, in some cases, may be considered a separate data set). Merely by way of example, a set of data may comprise data gathered from a plurality of data sources, and/or each component may comprise data gathered from one of the plurality of data sources. As another example, a set of data may comprise a document with a plurality of sections, and each component may comprise one of the plurality of sections.Type: GrantFiled: November 3, 2008Date of Patent: May 5, 2015Assignee: Thomson Reuters Global ResourcesInventors: Ihab Shraim, Mark Shull
-
Patent number: 9002806Abstract: A system, method, and apparatus are directed towards identifying adaptive length segments of redundant data for encoding a data structure. Initial boundaries are identified for an input matching segment within input data and for a candidate store matching segment in a synchronized store. The data prior to and after the boundaries are compared to identify matching data. As matching data is identified, at least one of the boundaries of the matching segments is revised. An encoded representation of the resulting input matching segment is then generated based in part on pointers and offsets into the synchronized store. A data structure is generated based on the encoded representation and unmatched portion, which is sent to a receiver. The receiver uses the data structure to extract matching data from the synchronized store, and together with the unmatched input data in the data structure, reconstruct the input data.Type: GrantFiled: December 8, 2010Date of Patent: April 7, 2015Assignee: F5 Networks, Inc.Inventor: Saxon C. Amdahl
-
Patent number: 9002812Abstract: A resilient hashing system leverages a fast, non-cryptographic hash/checksum function that has good diffusion properties while remaining reasonably efficient on modern central processing units (CPUs). The hash function uses random secret data so that hash keys for particular data are difficult to predict. Due to its internal structure, well-chosen random secret data is difficult for an attacker to counter without having access to the direct output of the hash function. At every stage of the block function, there are at least two operations that can be performed in parallel, increasing performance on modern superscalar CPUs. Thus, the resilient hashing system provides a hash table and checksum that can be used in Internet-facing or other vulnerable sources of input data to manage performance in the face of malicious attacks.Type: GrantFiled: November 19, 2012Date of Patent: April 7, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Niels Ferguson, Reid Borsuk, Jeffrey Cooperstein, Matthew Ellis
-
Patent number: 8996804Abstract: A mechanism is provided for optimizing and enhancing performance for parity based storage, particularly redundant array of independent disk (RAID) storage. The mechanism optimizes a repetitive pattern write command for performance for storage configurations that require parity calculations. The mechanism eliminates the need for laborious parity calculations that are resource intensive and add to IO latency. For repetitive write commands that span across the full stripe of a RAID5 or similar volume, the mechanism calculates parity by looking at the pattern and the number of columns in the volume. The mechanism may avoid the XOR operation altogether for repetitive pattern write commands. The mechanism may enhance secure delete operations that use repetitive pattern write commands by eliminating data reliability operations like parity generation and writing altogether.Type: GrantFiled: September 12, 2011Date of Patent: March 31, 2015Assignee: International Business Machines CorporationInventors: Rahul M. Fiske, Kalyan C. Gunda, Carl E. Jones, Sandeep R. Patil, Subhojit Roy
-
Patent number: 8983920Abstract: Systems, methods, and computer program products for enabling assessment of the quality of a search index. In one embodiment, objects are processed to produce corresponding text that is stored and indexed. The objects are also processed to identify and store corresponding metadata values for indexing. Error conditions that are detected during the processing of objects to generate corresponding text are tracked and compared to determine the most severe of the error conditions. An indication of the most severe error condition is stored in a first consolidated error field. Errors that are encountered in the identification and storage of metadata values are counted and this count is stored in a second consolidated error field. Both of the consolidated error fields are indexed in the same manner as the text and metadata for the objects, so that the stored error information can be used in queries of the search index.Type: GrantFiled: August 22, 2012Date of Patent: March 17, 2015Assignee: Open Text S.A.Inventor: Patrick Thomas Sidney Pidduck
-
Patent number: 8983921Abstract: A computer-implemented method and computer program product comprising optimal, systematic q-ary codes for correcting all asymmetric and symmetric errors of limited magnitude are provided.Type: GrantFiled: October 23, 2013Date of Patent: March 17, 2015Assignee: State of OregonInventors: Bella Bose, Noha Elarief
-
Patent number: 8954793Abstract: A method and a storage server for backing up data, involves mass storage devices of users of the service that connect to the storage server of the service provider over a public data network. The customers store the data with their terminals. The data is stored to the file system of the mass storage device which encrypts the stored data and transfers the data in encrypted form over the public data network to the storage server. The storage server calculates error correction data from the encrypted data. The error correction data is stored in the mass memory of the storage server. When recovering the stored data of the users, the storage server requests the stored data of all the users whose data was used for the error correction data calculation over the public data network to be used for the recovery calculation.Type: GrantFiled: September 15, 2010Date of Patent: February 10, 2015Assignee: Varaani Works OyInventor: Kimmo Lahdensivu
-
Patent number: 8943031Abstract: A server processing device acquires a lock on a region of a file which has stale data. The server processing device self-heals the stale data in the locked region using current data and receives a write request to modify another region of the file during the self-healing of the locked region of the file. The server processing device provides write access to the requested region during the self-healing of the locked region of the file.Type: GrantFiled: August 20, 2012Date of Patent: January 27, 2015Assignee: Red Hat, Inc.Inventors: Pranith Kumar Karampuri, Anand Vishweswaran Avati
-
Patent number: 8930329Abstract: Methods and systems for transforming a logical data object for storage in a storage device configured to operate with at least one storage protocol. One method comprises creating in the storage device a transformed logical data object comprising a one or more allocated storage sections with a predefined size and receiving one or more data chunks corresponding to the transformed logical data object. The method further comprises determining if each received data chunk comprises a predefined criterion, transforming each data chunk that comprises the predefined criterion, maintaining each data chuck in raw form that does not comprise the predefined criterion, and sequentially storing each transformed data chuck and data chunk in raw form into said one or more allocated storage sections in accordance with an order said transformed data chunks and data chunks in raw form are received. One system comprises a processor configured to perform the above method.Type: GrantFiled: August 21, 2013Date of Patent: January 6, 2015Assignee: International Business Machines CorporationInventors: Chaim Koifman, Nadav Kedem, Avi Zohar
-
Patent number: 8898123Abstract: A technique is provided for configuring an interface device. The interface device includes a plurality of device elements, such as objects configured in accordance with object-oriented programming concepts. A query from a general purpose viewer is received by the interface device, such as originating from a configuration station where the general purpose viewer is operative. The query is interpreted by server-side scripting executed in the interface device to identify the device elements and to display visual representations of the device elements in a design-time environment. The design-time environment and the visual representations are then transmitted to a configuration station. The device elements, their properties and functionalities may be altered by means of the design-time environment and the server-side scripting to create interface screens, alter device elements and their properties and functions, and so forth.Type: GrantFiled: June 7, 2005Date of Patent: November 25, 2014Assignee: Rockwell Automation Technologies, Inc.Inventors: Clinton Duane Britt, Joseph Francis Mann
-
Patent number: 8856090Abstract: A client device is configured to generate checksums for attributes of product records to be transmitted to a marketplace operator system that provides an e-commerce marketplace. On subsequent transmissions of the product records, the client device can utilize the checksums to determine if the attributes of the product records have been modified since a previous transmission. If the attributes have not been modified, the client device does not re-transmit the unchanged attributes to the e-commerce marketplace. The client device may also be configured to retrieve a checksum configuration file from the marketplace operator system that includes data defining the manner in which the client device should compute the checksums.Type: GrantFiled: March 20, 2012Date of Patent: October 7, 2014Assignee: Amazon Technologies, Inc.Inventor: Nicholas Honner
-
Patent number: 8838531Abstract: Systems and methods for verifying data in a distributed database using different automated check operations at different times during the database read and update cycles. Various functions may be performed including executing a first check during update operations of the database. A second check may also be executed during the update operation of the database, and be implemented as an execution thread of an update daemon. A third check may be executed at a time interval between update functions of the update daemon. A fourth check may be executed during a time that the database is not being updated. Integrity of data in the database may be verified by a computer processor based on the first, second, third, and fourth checks.Type: GrantFiled: November 13, 2012Date of Patent: September 16, 2014Assignee: Verisign, Inc.Inventors: Michael Bentkofsky, Patrick Quaid, Bradley McMillen
-
Patent number: 8838525Abstract: In one embodiment, a method for communicating data is provided. The method includes defining a data transmission unit (DTU) to be sent in an xDSL data stream, defining a retransmit container as a time slot that corresponds to the DTU, maintaining, in a retransmit container, a copy of the DTU and an index corresponding to the retransmit container, the retransmit container being maintained at the second device independently of the first device, transmitting the DTU in the xDSL data stream, determining whether the DTU should be retransmitted, and if the DTU should be retransmitted: identifying the DTU by the retransmit container and retransmitting a copy of the DTU as identified by the retransmit container when the DTU reaches a predetermined position in the retransmission buffer.Type: GrantFiled: June 21, 2012Date of Patent: September 16, 2014Assignee: Broadcom CorporationInventors: Benoit Christiaens, Miguel Peeters, Raphael Cassiers
-
Patent number: 8832539Abstract: Old user data, old metadata, and old error correction parity information are received. New metadata corresponding to the old user data is generated. The old metadata and the new metadata are combined to obtain combined metadata. New error correction parity information is generated using the combined metadata. The old error correction parity information and new error correction parity information are combined to obtain combined error correction parity information. The old user data, new metadata, and combined error correction parity information are stored in solid state storage.Type: GrantFiled: January 11, 2013Date of Patent: September 9, 2014Assignee: SK hynix memory solutions inc.Inventors: Nishant Patil, Meng-Kun Lee, Yingquan Wu
-
Patent number: 8825609Abstract: A method and system comprises a duplication identifier module to analyze data input information to automatically identify duplicate expected inputs associated with a process. The system includes logical process model information defining a logically structured series of process activities and data input information representing a plurality of expected inputs associated with respective process activities, with each expected input being indicative of expected collection of a corresponding data element during execution of the associated process activity. Each duplicate expected input comprises one of the plurality of expected inputs for which there is at least one other expected input with respect to a common corresponding data element.Type: GrantFiled: June 10, 2011Date of Patent: September 2, 2014Assignee: HCL America, Inc.Inventors: Vikram Duvvoori, Satish Venkatesan Srinivasan, Prasad A Chodavarapu, Ravindra S. Gajulapalli, Rajesh Agrawal Ramesh
-
Patent number: 8825626Abstract: Techniques for detecting unwanted data are described herein. In one embodiment, a request is received for storing a data object in a storage system from a client over a network, where the request includes first representative data representing the data object without including actual content of the data object. It is detected whether the data object contains unwanted content by comparing the first representative data with second representative data without accessing the actual content of the data object, where the second representative data represents the unwanted content. A response is transmitted to the client over the network indicating whether the data object is likely to contain the unwanted object based on comparison of the first and second representative data.Type: GrantFiled: August 23, 2011Date of Patent: September 2, 2014Assignee: EMC CorporationInventors: Grant Wallace, Philip N. Shilane, Frederick Douglis
-
Publication number: 20140229456Abstract: According to one embodiment of the present invention, a system assesses the quality of column data. The system assigns a pre-defined domain to one or more columns of the data based on a validity condition for the domain, applies the validity condition for the domain assigned to a column to data values in the column to compute a data quality metric for the column, and computes and displays a metric for a group of columns based on the computed data quality metric of at least one column in the group. Embodiments of the present invention further include a method and computer program product for assessing the quality of column data in substantially the same manners described above.Type: ApplicationFiled: February 12, 2013Publication date: August 14, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: INTERNATIONAL BUSINESS MACHINES CORPORATION
-
Patent number: 8799234Abstract: Semantic entity manipulation technique embodiments are presented that generate a probabilistic program capable of manipulating character strings representing semantic entities based on input-output examples. The program can then be used to produce a desired output consistent with the input-output examples from inputs of a type included in the examples. The probabilistic program is generated based on the output of parsing, transform and formatting modules. The parsing module employs a probabilistic approach to parsing the input-output examples. The transform module identifies a weighted set of transforms that are capable of producing the output item from the input items of an input-output example to a likelihood specified by their assigned weight. The formatting module generates formatting instructions that transform selected output parts into a form specified by the output items in the input-output examples.Type: GrantFiled: February 3, 2011Date of Patent: August 5, 2014Assignee: Microsoft CorporationInventors: Sumit Gulwani, Rishabh Singh
-
Publication number: 20140201173Abstract: Example embodiments relate to file-based social recommendations. In example embodiments, a system may search a social network to identify uploaded files that are similar to a file from a user and then identify unconnected users that uploaded the uploaded files, where the unconnected users are not connected to the user in the social network. In response to identifying the unconnected users, the system may then communicate a user recommendation that at least one unconnected users be added to the social context.Type: ApplicationFiled: January 15, 2013Publication date: July 17, 2014Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: Eyal Roth, Olga Tubman, Boris Korenfeld
-
Publication number: 20140188827Abstract: Exemplary embodiments provide various techniques for detecting and correcting corrupted or dangling data object handles. In one example, a method is provided for correcting corrupted data object handles. In this method, a redirector file stored on a first logical data container is accessed. This redirector file includes a forward object handle pointing to a first data object stored on a second logical data container and includes a first checksum of the forward object handle. A second checksum of the forward object handle is determined and a comparison is made between the first and second checksums. If a mismatch is detected, the data objects stored on the second logical data container are scanned to extract backward object handles. A backward object handle can be identified to point back to the redirector file. The forward object handle can then be restored to point to the second data object based on the identification.Type: ApplicationFiled: February 21, 2014Publication date: July 3, 2014Applicant: NetApp, Inc.Inventor: Sundeep Singh
-
Patent number: 8768901Abstract: A method and apparatus for selectively storing data on a server. The method operates by accessing a computer file and defining a data block as a current block of data. The current block is subsequently checksummed using a rolling error identification code. The method then determines if the calculated checksum for the current block has been previously stored in a database. If a matching checksum for the data is found in the database, then a duplicate of the current block already exists and the process repeats by selecting a new block of data. Alternatively, if the calculated checksum is absent from the checksum and the process has advanced one block length, the process moves back one block length and stores the current block in an archive. Otherwise, the checksum advances one byte forward to form a new current block of data and the process repeats.Type: GrantFiled: May 1, 2012Date of Patent: July 1, 2014Assignee: Symantec Operating CorporationInventor: Robert Somerville
-
Publication number: 20140181056Abstract: Systems, methods, and computer program products for enabling assessment of the quality of a search index. In one embodiment, objects are processed to produce corresponding text that is stored and indexed. The objects are also processed to identify and store corresponding metadata values for indexing. Error conditions that are detected during the processing of objects to generate corresponding text are tracked and compared to determine the most severe of the error conditions. An indication of the most severe error condition is stored in a first consolidated error field. Errors that are encountered in the identification and storage of metadata values are counted and this count is stored in a second consolidated error field. Both of the consolidated error fields are indexed in the same manner as the text and metadata for the objects, so that the stored error information can be used in queries of the search index.Type: ApplicationFiled: August 22, 2012Publication date: June 26, 2014Inventor: Patrick Thomas Sidney Pidduck
-
Patent number: 8744839Abstract: Target word recognition includes: obtaining a candidate word set and corresponding characteristic computation data, the candidate word set comprising text data, and characteristic computation data being associated with the candidate word set; performing segmentation of the characteristic computation data to generate a plurality of text segments; combining the plurality of text segments to form a text data combination set; determining an intersection of the candidate word set and the text data combination set, the intersection comprising a plurality of text data combinations; determining a plurality of designated characteristic values for the plurality of text data combinations; based at least in part on the plurality of designated characteristic values and according to at least a criterion, recognizing among the plurality of text data combinations target words whose characteristic values fulfill the criterion.Type: GrantFiled: September 22, 2011Date of Patent: June 3, 2014Assignee: Alibaba Group Holding LimitedInventors: Haibo Sun, Yang Yang, Yining Chen
-
Patent number: 8725702Abstract: A computer-implemented method for repairing system files may include 1) identifying a request to repair a corrupted system file in an operating system, 2) receiving file metadata describing the corrupted system file and system metadata describing the operating system, 3) identifying an uncorrupted version of the corrupted system file by i) identifying a series of matching tests for matching the corrupted system file with the uncorrupted version, the series of matching tests including at least one file metadata item from the file metadata and at least one system metadata item from the system metadata, and ii) applying the series of matching tests in a predetermined order to a database of uncorrupted system files until a matching test matches the corrupted system file with the uncorrupted version of the system file. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: March 15, 2012Date of Patent: May 13, 2014Assignee: Symantec CorporationInventors: Nivedhitha Raman, David Kane, Sonia Subramanian, Wilson Meng
-
Patent number: 8694478Abstract: Exemplary embodiments provide various techniques for detecting and correcting corrupted or dangling data object handles. In one example, a method is provided for correcting corrupted data object handles. In this method, a redirector file stored on a first logical data container is accessed. This redirector file includes a forward object handle pointing to a first data object stored on a second logical data container and includes a first checksum of the forward object handle. A second checksum of the forward object handle is determined and a comparison is made between the first and second checksums. If a mismatch is detected, the data objects stored on the second logical data container are scanned to extract backward object handles. A backward object handle can be identified to point back to the redirector file. The forward object handle can then be restored to point to the second data object based on the identification.Type: GrantFiled: February 9, 2012Date of Patent: April 8, 2014Assignee: NetApp, Inc.Inventor: Sundeep Singh
-
Publication number: 20140095457Abstract: Technology is disclosed for regulating data storage based on a popularity of data files (“the technology”). Various embodiments of the technology includes maintaining a fixed durability level of data files stored in a storage system by regulating a number of copies of the data files stored in the storage system. One embodiment includes regulating the number of copies of a particular data file based on popularity of the particular data file among various users using the storage system. The number of copies stored in the storage system is increased or decreased, including from/to zero, based on the popularity of the particular data file. The popularity is determined based on at least one of: a number of computing devices of various users having the particular data file, a latency, network bandwidth and/or availability with the computing devices for reading the particular data file, or access pattern of the particular data file.Type: ApplicationFiled: October 2, 2013Publication date: April 3, 2014Applicant: NEXTBIT SYSTEMS INC.Inventor: Justin Quan
-
Publication number: 20140081935Abstract: Exemplary embodiments provide various techniques for detecting and correcting corrupted or dangling data object handles. In one example, a method is provided for correcting corrupted data object handles. In this method, a redirector file stored on a first logical data container is accessed. This redirector file includes a forward object handle pointing to a first data object stored on a second logical data container and includes a first checksum of the forward object handle. A second checksum of the forward object handle is determined and a comparison is made between the first and second checksums. If a mismatch is detected, the data objects stored on the second logical data container are scanned to extract backward object handles. A backward object handle can be identified to point back to the redirector file. The forward object handle can then be restored to point to the second data object based on the identification.Type: ApplicationFiled: February 9, 2012Publication date: March 20, 2014Applicant: NetApp, Inc.Inventor: Sundeep Singh