Patents by Inventor Matthew Bunkley Trevathan
Matthew Bunkley Trevathan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8713703Abstract: A CAPTCHA challenge tool for determining if a user of a computer is a human or an automated program. The tool presents a set of images. At least a portion of the set of images suggests a chronological sequence when organized correctly. The tool receives a suggested order from the user of the computer. If the suggested order matches the correct order, the tool assumes that the user is a human, if the suggested order does not match the correct order, the tool assumes the user is an automated program.Type: GrantFiled: July 31, 2011Date of Patent: April 29, 2014Assignee: International Business Machines CorporationInventors: Frank Clay Fisk, Sri Ramanathan, Matthew Adam Terry, Matthew Bunkley Trevathan
-
Patent number: 8607238Abstract: Aspects of the present invention reduce a lock wait time in a distributed processing environment. A plurality of wait-for dependencies between a first plurality of transactions and a second plurality of transactions in a distributed processing environment is identified. The first plurality of transactions waits for the second plurality of transactions to release a plurality of locks on a plurality of shared resources. An amount of time the first plurality of transactions will wait for the second plurality of transactions in the distributed processing environment is determined based on the plurality of wait-for dependencies between the first plurality of transactions and the second plurality of transactions. Historical transaction data related to the plurality of wait-for dependencies between the first plurality of transactions and the second plurality of transactions is analyzed.Type: GrantFiled: July 8, 2011Date of Patent: December 10, 2013Assignee: International Business Machines CorporationInventors: Abhinay Ravinder Nagpal, Sri Ramanathan, Sandeep Ramesh Patil, Matthew Bunkley Trevathan
-
Patent number: 8590050Abstract: An embodiment of the invention is a program for dynamically managing files to comply with security requirements. In one embodiment, changing security requirements require that the computer system identifies the current storage locations of files along with the files' respective security levels. Files containing changed security levels due to the changed security requirements are relocated to storage locations clustered with storage locations containing files of the same security level. In another embodiment, the computer system receives a file having a certain security level, identifies current storage locations of files with the files' respective security levels, and finally allocates the new file to a storage location clustered with storage locations containing files of the same security level.Type: GrantFiled: May 11, 2011Date of Patent: November 19, 2013Assignee: International Business Machines CorporationInventors: Abhinay Ravinder Nagpal, Sri Ramanathan, Sandeep Ramesh Patil, Matthew Bunkley Trevathan
-
Patent number: 8590058Abstract: A CAPTCHA challenge tool for determining if a user of a computer is a human or an automated program. The tool presents to the user a set of audio clips. At least a portion of the set of audio clips suggests a chronological sequence when organized correctly. The tool receives a suggested order from the user of the computer. If the suggested order matches the correct order, the tool assumes that the user is a human, if the suggested order does not match the correct order, the tool assumes the user is an automated program.Type: GrantFiled: July 31, 2011Date of Patent: November 19, 2013Assignee: International Business Machines CorporationInventors: Frank Clay Fisk, Sri Ramanathan, Matthew Adam Terry, Matthew Bunkley Trevathan
-
Publication number: 20130031641Abstract: A CAPTCHA challenge tool for determining if a user of a computer is a human or an automated program. The tool presents to the user a set of audio clips. At least a portion of the set of audio clips suggests a chronological sequence when organized correctly. The tool receives a suggested order from the user of the computer. If the suggested order matches the correct order, the tool assumes that the user is a human, if the suggested order does not match the correct order, the tool assumes the user is an automated program.Type: ApplicationFiled: July 31, 2011Publication date: January 31, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Frank Clay Fisk, Sri Ramanathan, Matthew Adam Terry, Matthew Bunkley Trevathan
-
Publication number: 20130031640Abstract: A CAPTCHA challenge tool for determining if a user of a computer is a human or an automated program. The tool presents a set of images. At least a portion of the set of images suggests a chronological sequence when organized correctly. The tool receives a suggested order from the user of the computer. If the suggested order matches the correct order, the tool assumes that the user is a human, if the suggested order does not match the correct order, the tool assumes the user is an automated program.Type: ApplicationFiled: July 31, 2011Publication date: January 31, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Frank Clay Fisk, Sri Ramanathan, Matthew Adam Terry, Matthew Bunkley Trevathan
-
Publication number: 20130013833Abstract: Aspects of the present invention reduce a lock wait time in a distributed processing environment. A plurality of wait-for dependencies between a first plurality of transactions and a second plurality of transactions in a distributed processing environment is identified. The first plurality of transactions waits for the second plurality of transactions to release a plurality of locks on a plurality of shared resources. An amount of time the first plurality of transactions will wait for the second plurality of transactions in the distributed processing environment is determined based on the plurality of wait-for dependencies between the first plurality of transactions and the second plurality of transactions. Historical transaction data related to the plurality of wait-for dependencies between the first plurality of transactions and the second plurality of transactions is analyzed.Type: ApplicationFiled: July 8, 2011Publication date: January 10, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Abhinay Ravinder Nagpal, Sri Ramanathan, Sandeep Ramesh Patil, Matthew Bunkley Trevathan
-
Publication number: 20120291133Abstract: An embodiment of the invention is a program for dynamically managing files to comply with security requirements. In one embodiment, changing security requirements require that the computer system identifies the current storage locations of files along with the files' respective security levels. Files containing changed security levels due to the changed security requirements are relocated to storage locations clustered with storage locations containing files of the same security level. In another embodiment, the computer system receives a file having a certain security level, identifies current storage locations of files with the files' respective security levels, and finally allocates the new file to a storage location clustered with storage locations containing files of the same security level.Type: ApplicationFiled: May 11, 2011Publication date: November 15, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Abhinay Ravinder Nagpal, Sri Ramanathan, Sandeep Ramesh Patil, Matthew Bunkley Trevathan
-
Publication number: 20120221415Abstract: A method for enhancing the privacy of recipients of personalizing text messages such as advertisements delivered to communication terminals such as cellular telephones. A common carrier such as a cellular telephone service provider gathers personal information from a subscriber at the time the subscriber signs on for service and receives a communication terminal. The carrier loads the terminal with a table that assigns variables to elements of personal information. The carrier accepts messages such as advertisements for distribution to subscribers. These messages use the variables that the carrier has loaded into the subscribers' terminals. When such a message is received, a subscriber's terminal replaces the variables with the elements of personal information by referring to the table.Type: ApplicationFiled: May 9, 2012Publication date: August 30, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Matthew Bunkley Trevathan
-
Publication number: 20120222100Abstract: An embodiment of the invention is a CAPTCHA program to determine if a user of a computer is a human or a computer program. The program sends to the computer an image and a portion of the image for display. The program receives from the user an indication of where the portion is located within the image. The portion, as displayed, may be altered in various ways. In response to the user properly indicating the location, the program determines that the user of the computer is a human. In response to the user not properly indicating the location, the program determines that the user of the computer is a computer program. In response to determining that the user of the computer is a human, the program grants the user access to information (database, application, program). In response to determining that the user is a computer program, the program denies access.Type: ApplicationFiled: February 24, 2011Publication date: August 30, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Frank Clay Fisk, Sri Ramanathan, Matthew Adam Terry, Matthew Bunkley Trevathan
-
Patent number: 8238946Abstract: A method for enhancing the privacy of recipients of personalizing text messages such as advertisements delivered to communication terminals such as cellular telephones. A common carrier such as a cellular telephone service provider gathers personal information from a subscriber at the time the subscriber signs on for service and receives a communication terminal. The carrier loads the terminal with a table that assigns variables to elements of personal information. The carrier accepts messages such as advertisements for distribution to subscribers. These messages use the variables that the carrier has loaded into the subscribers' terminals. When such a message is received, a subscriber's terminal replaces the variables with the elements of personal information by referring to the table.Type: GrantFiled: March 7, 2003Date of Patent: August 7, 2012Assignee: International Business Machines CorporationInventor: Matthew Bunkley Trevathan
-
Patent number: 7975042Abstract: Servlets within a web server maintain state information concerning requests made by users of the server. The servlets associate each user with an HTTP session object. The session object is configured to include information that identifies the last-N web pages requested by the user. Periodically, or in response to a triggering event, the server analyzes the contents of the session objects, for example by tabulating the frequency with which each web page has been requested in the recent past. From the results of the analysis, web-page caching priorities are determined, and the contents of the server's cache are altered accordingly.Type: GrantFiled: May 1, 2001Date of Patent: July 5, 2011Assignee: International Business Machines CorporationInventors: Michael Christopher Martin, Patrick James Richards, Jr., Matthew Bunkley Trevathan
-
Patent number: 7930720Abstract: A distribution system and method. The distribution system comprises a computing apparatus and a plurality of projection systems connected to the computing apparatus. The computing apparatus comprises a scheduler software tool and a plurality of audio/video data files stored on a computer readable medium. Each projection system of the plurality of projection systems comprises a cache storage device connected to an associated projection apparatus. Each cache storage device is adapted to dynamically receive and store an associated audio/video data file from the plurality of audio/video data files for transmission to each associated projection apparatus according to a schedule generated by the scheduler software tool.Type: GrantFiled: July 8, 2005Date of Patent: April 19, 2011Assignee: International Business Machines CorporationInventors: Eythan Christopher Holladay, Stephen Eric Jaffe, Michael Patrick Outlaw, Patrick James Richards, Jr., Matthew Bunkley Trevathan
-
Patent number: 7797754Abstract: A system for managing authorization to access Internet services. A session object is created when a user logs onto a web site. The session object includes authorization-privilege information for N services. The user selects the service desired from the web site, at which point the server checks the session object. If the session object does not include authorization to access the selected service, the server consults a directory service. If the user is authorized according to the directory service, authorization-to-access information is incorporated into the session object. When authorization is conditional, a listener object is created within the session object. The listener object registers with a broadcast object and receives information germane to conditions of authorization. The listener object analyzes the information according to conditions of authorization, and terminates access to the selected service when conditions of authorization are not satisfied.Type: GrantFiled: March 31, 2008Date of Patent: September 14, 2010Assignee: International Business Machines CorporationInventors: Patrick Colum Carroll, Judd Adam Schorr, Matthew Bunkley Trevathan, Angela Jo Yochem, Daniel Joseph Yochem
-
Patent number: 7739747Abstract: Programmable storage media including programmable software for managing authorization to access Internet services. A session object is created when a user logs onto a web site. The session object includes authorization-privilege information for N services. The user selects the service desired from the web site, at which point the server checks the session object. If the session object does not include authorization to access the selected service, the server consults a directory service. If the user is authorized according to the directory service, authorization-to-access information is incorporated into the session object. When authorization is conditional, a listener object is created within the session object. The listener object registers with a broadcast object and receives information germane to conditions of authorization.Type: GrantFiled: March 31, 2008Date of Patent: June 15, 2010Assignee: International Business Machines CorporationInventors: Patrick Colum Carroll, Judd Adam Schorr, Matthew Bunkley Trevathan, Angela Jo Yochem, Daniel Joseph Yochem
-
Patent number: 7735013Abstract: Adapting information to a user of an application program is provided. An arbiter receives a request object from the application program. The request object contains profile elements that convey characteristics of the user. The profile elements are analyzed by the arbiter, and, based on the outcome of the analysis, the arbiter selects a personalization engine from a plurality of personalization engines. The request object is passed to the selected personalization engine, which accesses a content database to retrieve a personalized content object comprising information tailored to the user. The personalized content object is sent to the application program, which interprets it for the user. Various embodiments include an expert-system arbiter, and an arbiter comprising computer code that is provided according to conventional object-oriented analysis and design methods executing on a programmable processor.Type: GrantFiled: March 16, 2001Date of Patent: June 8, 2010Assignee: International Business Machines CorporationInventors: William Philip Shaouy, Matthew Bunkley Trevathan
-
Patent number: 7698746Abstract: A method for providing secure access to information held in a shared repository, for example to electronic business cards stored on a server. A data owner registers with the server and provides information to be shared with selected data users. The server returns public-key cryptography keys. To access the information, a data user sends its public key to the data owner. The data owner encrypts the public key using the data owner private key, and sends the result to the server, along with permission to transfer information to the data user. The server decrypts the received result using the data owner public key, and compares the outcome with the data user public key. If they match, the server records permission on an access list. In response to a request for information the server checks the access list to determine whether the data user has permission. If so, the server encrypts the information using the data user public key, and transfers the result to the data user.Type: GrantFiled: September 26, 2006Date of Patent: April 13, 2010Assignee: International Business Machines CorporationInventors: Patrick James Richards, Jr., Matthew Bunkley Trevathan
-
Patent number: 7529808Abstract: Disclosed are systems and methods of automatic navigation on the world wide web. A server receives an anonymous signal from a browser, and selectively determines a resource identifier corresponding to one of the plurality of Internet domains, by accessing data structures that are stored apart from the browser. The server generates a signal corresponding to the resource identifier, and sends the signal, to allow the browser to access a signal associated with the resource identifier.Type: GrantFiled: March 5, 2008Date of Patent: May 5, 2009Assignee: International Business Machines CorporationInventors: Matthew Bunkley Trevathan, John R. Dingler, Clinton James McCallum, Robert Wayne Ross
-
Publication number: 20080184342Abstract: Programmable storage media including programmable software for managing authorization to access Internet services. A session object is created when a user logs onto a web site. The session object includes authorization-privilege information for N services. The user selects the service desired from the web site, at which point the server checks the session object. If the session object does not include authorization to access the selected service, the server consults a directory service. If the user is authorized according to the directory service, authorization-to-access information is incorporated into the session object. When authorization is conditional, a listener object is created within the session object. The listener object registers with a broadcast object and receives information germane to conditions of authorization.Type: ApplicationFiled: March 31, 2008Publication date: July 31, 2008Inventors: Patrick Colum Carroll, Judd Adam Schorr, Matthew Bunkley Trevathan, Angela Jo Yochem, Daniel Joseph Yochem
-
Publication number: 20080184353Abstract: A system for managing authorization to access Internet services. A session object is created when a user logs onto a web site. The session object includes authorization-privilege information for N services. The user selects the service desired from the web site, at which point the server checks the session object. If the session object does not include authorization to access the selected service, the server consults a directory service. If the user is authorized according to the directory service, authorization-to-access information is incorporated into the session object. When authorization is conditional, a listener object is created within the session object. The listener object registers with a broadcast object and receives information germane to conditions of authorization. The listener object analyzes the information according to conditions of authorization, and terminates access to the selected service when conditions of authorization are not satisfied.Type: ApplicationFiled: March 31, 2008Publication date: July 31, 2008Inventors: Patrick Colum Carroll, Judd Adam Schorr, Matthew Bunkley Trevathan, Angela Jo Yochem, Daniel Joseph Yochem