Patents by Inventor Matthew Rutkowski

Matthew Rutkowski has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070183597
    Abstract: Provided is a method for providing a home or business security system that relies upon data encryption for both communication and the storage of content. The disclosed technology incorporates all the devices necessary for a comprehensive security system, including, but not limited to, controllers, monitors, alarms and communication media. The system may include an unlimited number of devices and, further, individual devices may be added and removed as needed. Users may define and change the boundaries of a security system or, in other words, decide what devices to include or not include in such a system. A defined boundary does not need to be confined to a single location. In one embodiment, the claimed subject matter incorporates xCP based broadcast encryption technology.
    Type: Application
    Filed: February 7, 2006
    Publication date: August 9, 2007
    Inventors: Thomas Bellwood, Robert Chumbley, Matthew Rutkowski, Alexander Tarpinian
  • Publication number: 20070033224
    Abstract: Constructing and managing Sets of Hierarchical Interest Points. Data associated with content from a content provider is provided to a management system. The management system creates the Set of Hierarchical Interest Points based on the data. The Set of Hierarchical Interest Points is used to modify content presented to a user.
    Type: Application
    Filed: August 4, 2005
    Publication date: February 8, 2007
    Inventors: Richard Allen, Thomas Bellwood, Robert Chumbley, Matthew Rutkowski
  • Publication number: 20070016956
    Abstract: Provided is a method for enabling a device without a secure clock to make a determination on the expiration of encrypted content. When the device receives content, the device also receives the content provider's policy on access. This information provides an ATI in UTI units which is to be associated with the content for the purpose of managing the content's expiration. The ATI is converted to the device's DTI units and the DTI is then used to control the availability of the content for decryption and use. The claimed subject matter permits the existence of tolerance, determined by content policy, in the conversion between UTI and the DTI, as well as in the depletion of the ATI. To move or copy content which has an associated remaining ATI, the device converts the ATI into UTI units and provides converted ATI to the target device in conjunction with the associated content.
    Type: Application
    Filed: July 5, 2005
    Publication date: January 18, 2007
    Inventors: Thomas Bellwood, Robert Chumbley, Matthew Rutkowski, Alexander Tarpinian
  • Publication number: 20060161502
    Abstract: A common mechanism that can be used in content encryption applications for binding content to a specific receiver, container or communication channel to separate application specific work from the cryptographic details, regardless of the binding scheme being used. This mechanism includes the definition of a secure binding state object which holds and manipulates all the keys that comprise the most sensitive information in any such a system. This information is fully encapsulated in the binding state object and is not accessible from outside the object, making the application less vulnerable to external attacks. The present invention allows applications to be changed quickly from one encryption scheme to another because they all use the same mechanism with only a difference in encryption calculation. Also, components implementing the proposed mechanism grow more stable over time as a result of reuse in multiple applications.
    Type: Application
    Filed: January 18, 2005
    Publication date: July 20, 2006
    Inventors: Julian Cerruti, Matthew Rutkowski
  • Publication number: 20060126831
    Abstract: Systems, methods and media for encrypting and decrypting content files are disclosed. More particularly, hardware and/or software for adding an additional level of indirection to a title key encryption scheme are disclosed. Embodiments may include generating by a cryptographic system a binding key based on binding information. Embodiments may also include encrypting by the cryptographic system a secret key with the binding key and generating a title key associated with at least one content file. Embodiments may also include encrypting by the cryptographic system the title key with the secret key and the at least one content file with the title key. Further embodiments may include receiving an indication that the binding information has changed, generating a new binding key based on the new changed binding information, and re-encrypting the secret key with the new binding key.
    Type: Application
    Filed: December 14, 2004
    Publication date: June 15, 2006
    Inventors: Julian Cerruti, Matthew Rutkowski, Amal Shaheen
  • Publication number: 20050203884
    Abstract: Systems and methods for delivering Web content are provided. The systems and methods include a mechanism for providing interest data that may be applied to filter Web content at the provider side. A hierarchical data set of user-identified interests in received from the user's Web client. The hierarchical data set is parsed, and responsive thereto, one or more keyword attribute values are extracted from the hierarchical data set. The extracted keyword values are applied to filter content for delivery to a requesting Web client.
    Type: Application
    Filed: March 11, 2004
    Publication date: September 15, 2005
    Applicant: International Business Machines Corporation
    Inventors: Richard Allen, Thomas Bellwood, Robert Chumbley, Matthew Rutkowski
  • Publication number: 20050137881
    Abstract: A method, an apparatus, and a computer program are provided for embedding enhancement data into lyrics to generate Enhanced Symbolic Phonetic Representation (ESPR) data file that incorporates symbolic representations of actions that are associated with singing, such as sustaining and vibrato. The ESPR includes data for singing by a human voice or chorus of voices. The lyrics can also be inputting into a processing system in a variety of formats, such as plain text or a Symbolic Phonetic Representation (SPR).
    Type: Application
    Filed: December 17, 2003
    Publication date: June 23, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Bellwood, Robert Chumbley, Matthew Rutkowski, Lawrence Weiss
  • Publication number: 20050137880
    Abstract: A method, an apparatus, and a computer program are provided for deriving audio that includes singing by a human voice or chorus of voices. The audio is derived from an Enhanced Symbolic Phonetic Representation (ESPR) that incorporates symbolic representations of actions that are associated with singing, such as sustaining and vibrato. The audio output can also be as a result of operation of two types of programs: formant and concatenative.
    Type: Application
    Filed: December 17, 2003
    Publication date: June 23, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Bellwood, Robert Chumbley, Matthew Rutkowski, Lawrence Weiss
  • Publication number: 20050039137
    Abstract: A set of replacement system window controls is provided that are instantiated as the result of the receipt of create control messages into the system message queue, instead of the built-in system window controls. The replacement window controls result in replacement control instances being created with modified properties based on user preferences. The replacement system window control instances may also include an overlay function. In response to a set focus message, a replacement control instance may create an overlay control that is displayed over the replacement control. The overlay control itself can have modified properties and may be enlarged or relocated. When the overlay control receives a release focus message, the overlay control passes its state back to the replacement control and is destroyed.
    Type: Application
    Filed: August 13, 2003
    Publication date: February 17, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Bellwood, Matthew Rutkowski, Michael Walker