Patents by Inventor Matt Topper

Matt Topper has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8285748
    Abstract: A method and apparatus for proactive information security management is described. In one embodiment, for example, a computer-implemented method for controlling access to sensitive information, the method comprising: maintaining access constraint data that can be used to control access to the sensitive information, wherein the access constraint data includes match pattern data and apply pattern data; receiving a semantic query from a querier requesting access to the sensitive information; based on the match pattern data, determining whether the semantic query should be constrained according to the apply pattern data; where said semantic query should be constrained according to the apply pattern data, rewriting the semantic query according to the apply pattern data to produce a rewritten query; executing the rewritten query against a database that contains the sensitive information; and returning any results of executing the rewritten query.
    Type: Grant
    Filed: May 26, 2009
    Date of Patent: October 9, 2012
    Assignee: Oracle International Corporation
    Inventors: John S. Thomas, Aravind Yalamanchi, Idriss Mekrez, Matt Topper
  • Publication number: 20090300002
    Abstract: A method and apparatus for proactive information security management is described. In one embodiment, for example, a computer-implemented method for controlling access to sensitive information, the method comprising: maintaining access constraint data that can be used to control access to the sensitive information, wherein the access constraint data includes match pattern data and apply pattern data; receiving a semantic query from a querier requesting access to the sensitive information; based on the match pattern data, determining whether the semantic query should be constrained according to the apply pattern data; where said semantic query should be constrained according to the apply pattern data, rewriting the semantic query according to the apply pattern data to produce a rewritten query; executing the rewritten query against a database that contains the sensitive information; and returning any results of executing the rewritten query.
    Type: Application
    Filed: May 26, 2009
    Publication date: December 3, 2009
    Applicant: ORACLE INTERNATIONAL CORPORATION
    Inventors: John S. Thomas, Aravind Yalamanchi, Idriss Mekrez, Matt Topper