Patents by Inventor David Matt
David Matt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230401214Abstract: The current document is directed to graph databases and, in particular, to improvements in the operational efficiencies of, and the range of functionalities provided by, graph databases. One currently disclosed improvement provides for associating user-defined and developer-defined functions with node and relationship entities stored within the graph database. These entity-associated functions are executed in entity-associated execution environments provided to the entities during query execution. Another currently disclosed improvement provides text-replacement-based preprocessing of graph-database queries for increased clarity and for increasing the speed and accuracy with which the queries can be formulated.Type: ApplicationFiled: August 25, 2023Publication date: December 14, 2023Applicant: VMware, Inc.Inventors: Steve Venema, Paul Dennis Allen, Nandesh Guru, Andrew Armaneous, David Hanson, David Mattes
-
Patent number: 10178133Abstract: Embodiments are directed towards, gateway computers and management platform server computers for managing secure communication over a network. Gateway computer may intercept communications from unauthenticated source node computers directed to target node computers. If the unauthenticated node computer provides its credentials in response to a request for credentials from the gateway computer, the credentials and the intercepted communications may be provided to a management platform server for further processing. The management platform server may authenticate the unauthenticated source node computer based on its credentials and the intercepted communication and the management platform server may determine a target gateway computer that corresponds to the target node computer based on content of the intercepted communication. The management platform server may provide configuration information for generating a secure private network connection between the gateway computer and the target gateway computer.Type: GrantFiled: August 7, 2017Date of Patent: January 8, 2019Assignee: Tempered Networks, Inc.Inventors: David Mattes, Ludwin Fuchs
-
Patent number: 10038725Abstract: A private overlay network is introduced into an existing core network infrastructure to control information flow between private secure environments. Such a scheme can be used to connect a factory automation network linking operations devices to a corporate network linking various business units, with enhanced network security. Such a connection can be facilitated by introducing into the existing infrastructure a set of industrial security appliances (ISAs) that work together to create an encrypted tunnel between the two networks. The set of ISAs can be scalable to overlay differently sized core networks, to create the private overlay network. Connections to the private overlay network can be managed by the ISAs in a distributed fashion, implementing a peer-to-peer dynamic mesh policy. The industrial security system disclosed may be particularly advantageous in environments such as public utility systems, medical facilities, and energy delivery systems.Type: GrantFiled: May 16, 2016Date of Patent: July 31, 2018Assignee: Tempered Networks, Inc.Inventors: David Mattes, Ludwin Fuchs, Eric Artzt
-
Publication number: 20180183834Abstract: Embodiments are directed towards, gateway computers and management platform server computers for managing secure communication over a network. Gateway computer may intercept communications from unauthenticated source node computers directed to target node computers. If the unauthenticated node computer provides its credentials in response to a request for credentials from the gateway computer, the credentials and the intercepted communications may be provided to a management platform server for further processing. The management platform server may authenticate the unauthenticated source node computer based on its credentials and the intercepted communication and the management platform server may determine a target gateway computer that corresponds to the target node computer based on content of the intercepted communication. The management platform server may provide configuration information for generating a secure private network connection between the gateway computer and the target gateway computer.Type: ApplicationFiled: August 7, 2017Publication date: June 28, 2018Inventors: David Mattes, Ludwin Fuchs
-
Patent number: 9729580Abstract: Embodiments are directed towards, gateway computers and management platform server computers for managing secure communication over a network. Gateway computer may intercept communications from unauthenticated source node computers directed to target node computers. If the unauthenticated node computer provides its credentials in response to a request for credentials from the gateway computer, the credentials and the intercepted communications may be provided to a management platform server for further processing. The management platform server may authenticate the unauthenticated source node computer based on its credentials and the intercepted communication and the management platform server may determine a target gateway computer that corresponds to the target node computer based on content of the intercepted communication. The management platform server may provide configuration information for generating a secure private network connection between the gateway computer and the target gateway computer.Type: GrantFiled: July 30, 2015Date of Patent: August 8, 2017Assignee: Tempered Networks, Inc.Inventors: David Mattes, Ludwin Fuchs
-
Publication number: 20160261641Abstract: A private overlay network is introduced into an existing core network infrastructure to control information flow between private secure environments. Such a scheme can be used to connect a factory automation network linking operations devices to a corporate network linking various business units, with enhanced network security. Such a connection can be facilitated by introducing into the existing infrastructure a set of industrial security appliances (ISAs) that work together to create an encrypted tunnel between the two networks. The set of ISAs can be scalable to overlay differently sized core networks, to create the private overlay network. Connections to the private overlay network can be managed by the ISAs in a distributed fashion, implementing a peer-to-peer dynamic mesh policy. The industrial security system disclosed may be particularly advantageous in environments such as public utility systems, medical facilities, and energy delivery systems.Type: ApplicationFiled: May 16, 2016Publication date: September 8, 2016Inventors: David Mattes, Ludwin Fuchs, Eric Artzt
-
Patent number: 9344403Abstract: A private overlay network is introduced into an existing core network infrastructure to control information flow between private secure environments. Such a scheme can be used to connect a factory automation network linking operations devices to a corporate network linking various business units, with enhanced network security. Such a connection can be facilitated by introducing into the existing infrastructure a set of industrial security appliances (ISAs) that work together to create an encrypted tunnel between the two networks. The set of ISAs can be scalable to overlay differently sized core networks, to create the private overlay network. Connections to the private overlay network can be managed by the ISAs in a distributed fashion, implementing a peer-to-peer dynamic mesh policy. The industrial security system disclosed may be particularly advantageous in environments such as public utility systems, medical facilities, and energy delivery systems.Type: GrantFiled: March 11, 2014Date of Patent: May 17, 2016Assignee: Tempered Networks, Inc.Inventors: David Mattes, Ludwin Fuchs, Eric Artzt
-
Publication number: 20160036861Abstract: Embodiments are directed towards, gateway computers and management platform server computers for managing secure communication over a network. Gateway computer may intercept communications from unauthenticated source node computers directed to target node computers. If the unauthenticated node computer provides its credentials in response to a request for credentials from the gateway computer, the credentials and the intercepted communications may be provided to a management platform server for further processing. The management platform server may authenticate the unauthenticated source node computer based on its credentials and the intercepted communication and the management platform server may determine a target gateway computer that corresponds to the target node computer based on content of the intercepted communication. The management platform server may provide configuration information for generating a secure private network connection between the gateway computer and the target gateway computer.Type: ApplicationFiled: July 30, 2015Publication date: February 4, 2016Inventors: David Mattes, Ludwin Fuchs
-
Publication number: 20150169914Abstract: An active radio frequency identification (RFID) tag is provided that can include an input power connector, an output power connector and a wireless transceiver. The input power connector can be configured to receive an input electrical power signal from an external power source. The output power connector can be configured to supply an output electrical power signal to an external host device. The wireless transceiver can be configured to transmit or receive a location beacon signal.Type: ApplicationFiled: November 3, 2014Publication date: June 18, 2015Inventors: Marc Petre, David Matt
-
Publication number: 20150169915Abstract: An active radio frequency identification (RFID) tag is provided that can include an input power connector, an output power connector and a wireless transceiver. The input power connector can be configured to receive an input electrical power signal from an external power source. The output power connector can be configured to supply an output electrical power signal to an external host device. The wireless transceiver can be configured to transmit or receive a location beacon signal.Type: ApplicationFiled: November 13, 2014Publication date: June 18, 2015Inventors: Marc Petre, David Matt
-
Publication number: 20140282850Abstract: A private overlay network is introduced into an existing core network infrastructure to control information flow between private secure environments. Such a scheme can be used to connect a factory automation network linking operations devices to a corporate network linking various business units, with enhanced network security. Such a connection can be facilitated by introducing into the existing infrastructure a set of industrial security appliances (ISAs) that work together to create an encrypted tunnel between the two networks. The set of ISAs can be scalable to overlay differently sized core networks, to create the private overlay network. Connections to the private overlay network can be managed by the ISAs in a distributed fashion, implementing a peer-to-peer dynamic mesh policy. The industrial security system disclosed may be particularly advantageous in environments such as public utility systems, medical facilities, and energy delivery systems.Type: ApplicationFiled: March 11, 2014Publication date: September 18, 2014Applicant: ASGUARD NETWORKS, INC.Inventors: David Mattes, Ludwin Fuchs, Eric Artzt
-
Publication number: 20060070166Abstract: A garment including a base member with a collar area adapted to be disposed adjacent the wearer's neck. The collar area includes a back side adapted to be disposed adjacent the back of the neck of the wearer. The garment also includes a tape member coupled to the base member and extending across substantially the entire length of the back side of the collar area. The tape member includes information chosen from a group consisting of size information of the garment, recommended care instructions for the garment, geographic area where the garment was manufactured, material content of the garment, and a combination thereof. A method of manufacturing the garment is also disclosed.Type: ApplicationFiled: September 14, 2005Publication date: April 6, 2006Inventors: David Matt, Kenneth Roath
-
Patent number: 6510507Abstract: A Page Address Look-up Range RAM is disclosed which allows for individual comparisons to be made on a number of consecutive addresses. The upper bits of the bus address 410 (often representing a “page”) are compared against one or more reference registers 430-437 to yield one or more “match_high”s. The lower bits of the same bus address 420 are used to look-up the value of “match_low” in a Page Look-Up RAM 440, the bit of interest corresponding to the particular “match-high” reference register i.e. 430. If both the “match_high” and “match_low” events are true, or=1, then the bus address has matched and should cause the event, otherwise not. The most cost effective implementations will have a Look-up RAM 440 with a width of a multiple of 8. This will allow comparison of the bus address against a multiple of individual pages.Type: GrantFiled: March 3, 2000Date of Patent: January 21, 2003Assignee: Texas Instruments IncorporatedInventors: David Matt, Marulkar Rajendra Sadanand