Patent application number | Description | Published |
20130086383 | VIRTUAL MACHINE IMAGES ENCRYPTION USING TRUSTED COMPUTING GROUP SEALING - A host machine provisions a virtual machine from a catalog of stock virtual machines. The host machine instantiates the virtual machine. The host machine configures the virtual machine, based on customer inputs, to form a customer's configured virtual machine. The host machine creates an image from the customer's configured virtual machine. The host machine unwraps a sealed customer's symmetric key to form a customer's symmetric key. The host machine encrypts the customer's configured virtual machine with the customer's symmetric key to form an encrypted configured virtual machine. The host machine stores the encrypted configured virtual machine to non-volatile storage. | 04-04-2013 |
20140098101 | NODE CLUSTER RELATIONSHIPS IN A GRAPH DATABASE - A processor-implemented method, system, and/or computer program product manages nodes in a graph database. Graph nodes in a graph database are organized into graph node clusters. A cluster edge, which describes a relationship between two of the graph node clusters, is generated to logically associate those two graph node clusters with one another. | 04-10-2014 |
20140143891 | CONTEXT-BASED SECURITY SCREENING FOR ACCESSING DATA - A processor-implemented method, system, and/or computer program product securely accesses a specific data store. A non-contextual data object is associated with a context object to define a first synthetic context-based object. The non-contextual data object ambiguously describes multiple types of persons, and the context object provides a circumstantial context that identifies a specific type of person from the multiple types of persons. The first synthetic context-based object is associated with at least one specific data store in a data structure. A string of binary data that describes a requester of data is received by a security module for generating a new synthetic context-based object. If there is a match between the new synthetic context-based object and the first synthetic context-based object, then the data is returned to the requester. | 05-22-2014 |
20140184500 | POPULATING NODES IN A DATA MODEL WITH OBJECTS FROM CONTEXT-BASED CONFORMED DIMENSIONAL DATA GRAVITY WELLS - A processor-implemented method, system, and/or computer program product defines multiple context-based conformed dimensional data gravity wells on a context-based conformed dimensional data gravity wells membrane. Conformed dimensional objects and synthetic context-based objects are parsed into n-tuples. A virtual mass of each parsed object is calculated, in order to define a shape of multiple context-based conformed dimensional data gravity wells that are created when data objects that are pulled into each of the context-based conformed dimensional data gravity well frameworks on a context-based conformed dimensional gravity wells membrane. Data from the multiple context-based conformed dimensional data gravity wells then populates nodes in a data model. | 07-03-2014 |
20140188887 | CONTEXT-BASED DATA GRAVITY WELLS - A processor-implemented method, system, and/or computer program product defines multiple context-based data gravity wells on a context-based data gravity wells membrane. Non-contextual data objects are associated with context objects to define synthetic context-based objects. The synthetic context-based objects are parsed into an n-tuple that includes a pointer to one of the non-contextual data objects, a probability that a non-contextual data object has been associated with a correct context object, and a weighting factor of importance of the synthetic context-based object. A virtual mass of each parsed synthetic context-based object is calculated, in order to define a shape of multiple context-based data gravity wells that are created when synthetic context-based objects are pulled into each of the context-based data gravity well frameworks on a context-based data gravity wells membrane. | 07-03-2014 |
20140188915 | CONFORMED DIMENSIONAL AND CONTEXT-BASED DATA GRAVITY WELLS - A processor-implemented method, system, and/or computer program product defines multiple context-based conformed dimensional data gravity wells on a context-based conformed dimensional data gravity wells membrane. Conformed dimensional objects and synthetic context-based objects are parsed into n-tuples. A virtual mass of each parsed object is calculated, in order to define a shape of the multiple context-based conformed dimensional data gravity wells that are created when data objects that are pulled into each of the context-based conformed dimensional data gravity well frameworks on a context-based conformed dimensional gravity wells membrane. | 07-03-2014 |
20140188960 | CONFORMED DIMENSIONAL DATA GRAVITY WELLS - A processor-implemented method, system, and/or computer program product defines multiple dimensional data gravity wells on a conformed dimensional data gravity wells membrane. Non-dimensional data objects are associated with dimension objects to define conformed dimensional objects. The conformed dimensional objects are parsed into an n-tuple that includes a pointer to one of the non-dimensional data objects, a probability that a non-dimensional data object has been associated with a correct dimension object, and a weighting factor of importance of the conformed dimensional object. A virtual mass of each parsed conformed dimensional object is calculated, in order to define a shape of multiple dimensional data gravity wells that are created when conformed dimensional objects are pulled into each of the dimensional data gravity well frameworks on a conformed dimensional data gravity wells membrane. | 07-03-2014 |
20140214865 | MEASURING AND DISPLAYING FACETS IN CONTEXT-BASED CONFORMED DIMENSIONAL DATA GRAVITY WELLS - A processor-implemented method, system, and/or computer program product measures and displays facets in context-based conformed dimensional data gravity wells. Conformed dimensional objects and synthetic context-based objects are parsed into n-tuples. A virtual mass of each parsed object is calculated, in order to define a shape of multiple context-based conformed dimensional data gravity wells that are created when data objects that are pulled into each of the context-based conformed dimensional data gravity well frameworks on a context-based conformed dimensional gravity wells membrane. Data from the multiple context-based conformed dimensional data gravity wells then populates nodes in a data model. A displayed appearance of the particular context-based conformed dimensional data gravity well is dynamically adjusted according to the how closely each of the multiple parsed synthetic context-based objects matches said at least one context object and/or at least one dimension object. | 07-31-2014 |
20140214871 | GENERATION OF SYNTHETIC CONTEXT FRAMEWORKS FOR DIMENSIONALLY CONSTRAINED HIERARCHICAL SYNTHETIC CONTEXT-BASED OBJECTS - A processor-implemented method, system, and/or computer program product derives and utilizes a context object to generate a synthetic context-based object. A context object for a non-contextual data object is derived by contextually searching a document that contains multiple instances of the non-contextual data object. The non-contextual data object is associated with the derived context object to define a synthetic context-based object, where the non-contextual data object ambiguously relates to multiple subject-matters, and where the context object provides a context that identifies a specific subject-matter, from the multiple subject-matters, of the non-contextual data object. The synthetic context-based object is then associated with at least one specific data store, which includes data that is associated with data contained in the non-contextual data object and the context object. A dimensionally constrained hierarchical synthetic context-based object library for multiple synthetic context-based objects is then constructed for handling requests for data stores. | 07-31-2014 |
20140215633 | SECURITY FILTER FOR CONTEXT-BASED DATA GRAVITY WELLS - A processor-implemented method, system, and/or computer program product defines multiple security-enabled context-based data gravity wells on a security-enabled context-based data gravity wells membrane. Non-contextual data objects are associated with context objects to define synthetic context-based objects. The synthetic context-based objects are associated with one or more security objects to generate security-enabled synthetic context-based objects, which are parsed into an n-tuple that includes a pointer to one of the non-contextual data objects, a probability that a non-contextual data object has been associated with a correct context object, probability that the security object has been associated with a correct synthetic context-based object, and a weighting factor of importance of the security-enabled synthetic context-based object. A virtual mass of each parsed security-enabled synthetic context-based object is calculated, in order to define a shape of multiple security-enabled context-based data gravity wells that are created when security-enabled synthetic context-based objects are pulled in. | 07-31-2014 |
20140245318 | DATA PROCESSING WORK ALLOCATION - A processor-implemented method, system, and/or computer program product allocates computer processing work. Input data, which has been deemed to be in need of processing, is stored in a first computer. A virtual machine that is capable of processing the input data is stored on a second computer. A first set of constraint rules contains constraint rules against moving the input data from the first computer, and a second set of constraint rules contains constraint rules against moving the virtual machine from the second computer. Based on the first and second constraint rules, either the virtual machine is moved to the first computer or the input data is moved to the second computer. | 08-28-2014 |
20140358948 | DISCOVERY OF UNUSUAL, UNEXPECTED, OR ANOMALOUS INFORMATION AND TRENDS IN HIGH THROUGHPUT DATA STREAMS AND DATABASES USING PROBABILITSTIC SURPRISAL CONTEXT FILTERS - A method, system, and computer program product for detecting anomalous events from a data input comprising a plurality of events. The method comprising the steps of: selecting at least one filter selecting for context data determined to be probabilistically present within a specified degree of certainty in the data input; comparing the data input to the selected at least one filter; discarding the events from the data input that are the same as the context data for which the at least one filter selects; and storing in a repository the events remaining in the data input as anomalous events. | 12-04-2014 |
20140358952 | GENERATION AND MAINTENANCE OF SYNTHETIC EVENTS FROM SYNTHETIC CONTEXT OBJECTS - A method, computer program product and system for generating and maintaining synthetic context events. The steps include searching a data structure of synthetic context-based objects and associated data for a pattern of context exhibited at a first specified frequency within a first specified time period; combining the synthetic context-based objects and associated data exhibiting the pattern of context exhibited at the first specified frequency within the first specified time period into a synthetic context event; and optimizing and maintaining the synthetic context event by searching the data structure for additional synthetic context-based objects and associated data exhibiting a same pattern of context at a second specified time period different than the first specified time period and adding the additional synthetic context-based objects and associated data to the synthetic context event. | 12-04-2014 |
20150047057 | CONTEXT-BASED SECURITY SCREENING FOR ACCESSING DATA - A processor-implemented method, system, and/or computer program product securely accesses a specific data store. A non-contextual data object is associated with a context object to define a first synthetic context-based object. The non-contextual data object ambiguously describes multiple types of persons, and the context object provides a circumstantial context that identifies a specific type of person from the multiple types of persons. The first synthetic context-based object is associated with at least one specific data store in a data structure. A string of binary data that describes a requester of data, including a time window for receipt and security level of the requester, is received by a security module for generating a new synthetic context-based object. If there is a match between the new synthetic context-based object, the first synthetic context-based object, and the security level of the requester, then the data is returned to the requester. | 02-12-2015 |