EMC IP Holding Company LLC

United States of America

Back to Profile

1-5 of 5 for EMC IP Holding Company LLC Sort by
Query
Patent
Canada - CIPO
Aggregations Reset Report
Date
2020 1
Before 2019 4
IPC Class
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules 2
G06F 12/14 - Protection against unauthorised use of memory 1
G06F 12/16 - Protection against loss of memory contents 1
G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity 1
G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines 1
See more
Found results for  patents

1.

WORKFLOW OPTIMIZATION

      
Document Number 03106673
Status In Force
Filing Date 2019-08-15
Open to Public Date 2020-02-20
Grant Date 2023-06-13
Owner
  • EMC IP HOLDING COMPANY LLC (USA)
  • LANDMARK GRAPHICS CORPORATION (USA)
Inventor
  • Dias, Jonas F.
  • Ciarlini, Angelo
  • Pinho, Romulo D.
  • Gottin, Vinicius
  • Maximo, Andre
  • Pacheco, Edward
  • Holmes, David
  • Rangarajan, Keshava
  • Senften, Scott David
  • Winston, Joseph Blake
  • Wang, Xi
  • Walker, Clifton Brent
  • Dev, Ashwani
  • Yeleshwarapu, Chandra
  • Srinivasan, Nagaraj

Abstract

Managing execution of a workflow has a set of subworkflows. Optimizing the set of subworkflows using a deep neural network, each subworkflow of the set has a set of tasks. Each task of the sets has a requirement of resources of a set of resources; each task of the sets is enabled to be dependent on another task of the sets of tasks. Training the deep neural network by: executing the set of subworkflows, collecting provenance data from the execution, and collecting monitoring data that represents the state of said set of resources. Training causes the neural network to learn relationships between the states of the set of resources, the sets of tasks, their parameters and the obtained performance. Optimizing an allocation of resources to each task to ensure compliance with a user-defined quality metric based on the deep neural network output.

IPC Classes  ?

  • G06Q 10/0631 - Resource planning, allocation, distributing or scheduling for enterprises or organisations
  • G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06N 3/02 - Neural networks
  • G06N 3/12 - Computing arrangements based on biological models using genetic models

2.

METHOD AND SYSTEM FOR CLOUD BASED STORAGE

      
Document Number 02766731
Status In Force
Filing Date 2012-02-03
Open to Public Date 2012-08-03
Grant Date 2019-12-03
Owner EMC IP HOLDING COMPANY LLC (USA)
Inventor
  • Dumitrescu, Razvan
  • Nossik, Misha
  • Du, Lejin
  • You, Zhengping
  • Berfeld, Yuri

Abstract

A method is disclosed wherein a first virtual machine is provided in execution. A storage area network for storing of data of the first virtual machine is also provided. A second virtual machine is executed for receiving first data from the first virtual machine for storage within the storage area network and for securing the first data to form secured first data and for storing the secured first data within the storage area network.

IPC Classes  ?

  • H04L 12/16 - Arrangements for providing special services to substations
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 12/16 - Protection against loss of memory contents
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

3.

METHOD AND SYSTEM FOR SECURING DATA

      
Document Number 02759612
Status In Force
Filing Date 2011-11-23
Open to Public Date 2012-05-23
Grant Date 2018-10-23
Owner EMC IP HOLDING COMPANY LLC (USA)
Inventor Huapaya, Luis Miguel

Abstract

Disclosed is a method of supporting security policies and security levels associated with processes and applications. A security level is associated with a process independent of a user executing the process. When secure data is to be accessed, the security level of the process is evaluated to determine whether data access is to be granted. Optionally, the security level of a user of the process is also evaluated prior to providing data access.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

4.

SYSTEM AND METHOD FOR DATA DEDUPLICATION FOR DISK STORAGE SUBSYSTEMS

      
Document Number 02808516
Status In Force
Filing Date 2011-07-15
Open to Public Date 2012-01-19
Grant Date 2018-11-06
Owner EMC IP HOLDING COMPANY LLC (USA)
Inventor Bates, John W.

Abstract

A method for data deduplication includes the following steps. First, segmenting an original data set into a plurality of data segments. Next, transforming the data in each data segment into a transformed data representation that has a band-type structure for each data segment. The band-type structure includes a plurality of bands. Next, selecting a first set of bands, grouping them together and storing them with the original data set. The first set of bands includes non-identical transformed data for each data segment. Next, selecting a second set of bands and grouping them together. The second set of bands includes identical transformed data for each data segment. Next, applying a hash function onto the transformed data of the second set of bands and thereby generating transformed data segments indexed by hash function indices. Finally, storing the hash function indices and the transformed data representation of one representative data segment in a deduplication database.

IPC Classes  ?

  • H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

5.

EFFICIENT MANAGEMENT OF CRYPTOGRAPHIC KEY GENERATIONS

      
Document Number 02539879
Status In Force
Filing Date 2004-10-13
Open to Public Date 2005-04-28
Grant Date 2013-09-24
Owner
  • TELEFONAKTIEBOLAGET LM ERICSSON (PUBL) (Sweden)
  • EMC IP HOLDING COMPANY LLC (USA)
Inventor
  • Selander, Goeran
  • Lindholm, Fredrik
  • Nystroem, Magnus

Abstract

The invention generally relates to management of cryptographic key generations in an information environment comprising a key-producing side generating and distributing key information to a key-consuming side. A basic concept of the invention is to define, by means of a predetermined one-way key derivation function, a relationship between generations of keys such that earlier generations of keys efficiently may be derived from later ones but not the other way around. A basic idea according to the invention is therefore to replace, at key update, key information of an older key generation by the key information of the new key generation on the key-consuming side. Whenever necessary, the key-consuming side iteratively applies the predetermined one- way key derivation function to derive key information of at least one older key generation from the key information of the new key generation. In this way, storage requirements on the key-consuming side can be significantly reduced.

IPC Classes  ?