Patents by Inventor Matthew A. Appelbaum

Matthew A. Appelbaum has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 6169992
    Abstract: A system is disclosed for remotely accessing database management systems (5130) and performing guided iterative queries of knowledge bases (110) over a communication circuit such as the Internet (5124). The system includes a Web browser (5120) having a Java™ runtime environment (4015), and executable content client (5121) that may be downloaded from a remote location (103). A Krakatoa proxy server (5128), socket (5021), and tunnel (5129) establish a mechanism for remote procedure calls through firewalls (5126) via an HTTP server (5127). Guardrail counts (750) are preferably displayed to the remote searcher to facilitate guided iterative queries of the remote knowledge base (110). A configurable graphical action region (700) is preferably provided to the remote searcher via a graphical user interface to provide powerful navigation and linking of diverse useful information which varies based upon contexts selected by the remote searcher.
    Type: Grant
    Filed: November 8, 1996
    Date of Patent: January 2, 2001
    Assignee: Cadis Inc.
    Inventors: Christopher W. Beall, John D. Motycka, Samuel S. Pendleton, Brooke E. Terpening, Matthew A. Appelbaum, Michael R. Neal
  • Patent number: 4683968
    Abstract: A system which enables a protected program to run only a selected plurality of computers includes a respective unique key Ki for each computer of the plurality, the key being triple encrypted in the form E.sub.FK [E.sub.Ki [E.sub.FK [Ki]]]. A respective module is coupled to each computer of the plurality. A checker program in each computer responds to a request to use the protected program by performing a single decryption procedure E.sub.FK.sup.-1 on the triple encrypted key and sends the result to the module as a message. The module performs a single decryption procedure E.sub.Ki.sup.-1 on the message and sends that result back to the computer. The checker program receives the module's result and performs another single decryption procedure E.sub.FK.sup.-1 on it to obtain key Ki. Then the checker program uses key Ki to decrypt an identifier, and proceeds with the execution of the protected program only if it is identified by the decrypted identifier.
    Type: Grant
    Filed: September 3, 1985
    Date of Patent: August 4, 1987
    Assignee: Burroughs Corporation
    Inventors: Matthew A. Appelbaum, David B. Lehman, Donald J. Nieglos, Stanley C. Nolte, Michael P. Oehler