Patents by Inventor Matthew Campagna
Matthew Campagna has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240350073Abstract: The present invention provides for a panel for receiving neurocognitive data having a collapsible and portable user interface touch screen display bounded by a frame, the touch screen display having a width that extends into a user's peripheral vision by having the touch screen display extending from 60 to 120 degrees from a center of the user's gaze. The invention provides the touch screen display mounted on a support stand at the user's eye level and a computer electronically connected to the touch screen display via a control unit, the touch screen display comprising a tactile area having touch sensing capacity. The touch screen display for receiving at least one stimulus via the electronic connection to the control unit.Type: ApplicationFiled: March 4, 2024Publication date: October 24, 2024Applicant: REFLEXION INTERACTIVE TECHNOLOGIES, INC.Inventors: Matthew Campagna, Matthew Roda, Patrick Walsh, T Keith Ward
-
Patent number: 11918369Abstract: The present invention provides for a panel for receiving neurocognitive data having a collapsible and portable user interface touch screen display bounded by a frame, the touch screen display having a width that extends into a user's peripheral vision by having the touch screen display extending from 60 to 120 degrees from a center of the user's gaze. The invention provides the touch screen display mounted on a support stand at the user's eye level and a computer electronically connected to the touch screen display via a control unit, the touch screen display comprising a tactile area having touch sensing capacity. The touch screen display for receiving at least one stimulus via the electronic connection to the control unit.Type: GrantFiled: January 27, 2021Date of Patent: March 5, 2024Assignee: REFLEXION INTERACTIVE TECHNOLOGIES LLCInventors: Matthew Campagna, Matthew Roda, Patrick Walsh, T Keith Ward
-
Publication number: 20210244342Abstract: The present invention provides for a panel for receiving neurocognitive data having a collapsible and portable user interface touch screen display bounded by a frame, the touch screen display having a width that extends into a user's peripheral vision by having the touch screen display extending from 60 to 120 degrees from a center of the user's gaze. The invention provides the touch screen display mounted on a support stand at the user's eye level and a computer electronically connected to the touch screen display via a control unit, the touch screen display comprising a tactile area having touch sensing capacity. The touch screen display for receiving at least one stimulus via the electronic connection to the control unit.Type: ApplicationFiled: January 27, 2021Publication date: August 12, 2021Inventors: Matthew Campagna, Matthew Roda, Patrick Walsh, T Keith Ward
-
Publication number: 20180070843Abstract: In an aspect, a neurological data collecting apparatus is described. A plurality of electronically interconnected interface panels configured to selectively display stimuli and accept input is provided. An interface panel frame supports the plurality of interface panels and aggregates the plurality of interface panels into a user interface screen 6 that extends into the user's peripheral vision when the user is standing within a predetermined distance from the user interface screen. A supporting stand is connected to the user interface screen. The supporting stand includes a height adjustment mechanism for adjusting the height of the user interface screen to eye level of the user. A control unit electronically connects the user interface screen to a computer.Type: ApplicationFiled: June 13, 2017Publication date: March 15, 2018Inventors: Matthew Campagna, Matthew Roda, Patrick Walsh, T. Keith Ward
-
Patent number: 9497688Abstract: Methods, systems, and computer programs for managing mobile device applications are described. In some aspects, a mobile device application is prevented from accessing resources of a wireless network. For example, a wireless network operator system can determine that one or more mobile device applications are disapproved for use in the wireless network. In some implementations, the wireless network operator denies the disapproved mobile device applications access to the wireless network resources. In some implementations, mobile devices disable access to the wireless network by the disapproved mobile device applications.Type: GrantFiled: September 23, 2011Date of Patent: November 15, 2016Assignees: Certicom Corp., BlackBerry LimitedInventors: Mark Pecen, Niels Peter Skov Andersen, Shalini Suresh Periyalwar, Matthew Campagna
-
Patent number: 9161225Abstract: Methods, systems, and computer programs for managing mobile device applications are described. In some aspects, a mobile device application is prevented from accessing resources of a wireless network. For example, a wireless network operator system can determine that one or more mobile device applications are disapproved for use in the wireless network. In some implementations, the wireless network operator denies the disapproved mobile device applications access to the wireless network resources. In some implementations, mobile devices disable access to the wireless network by the disapproved mobile device applications.Type: GrantFiled: September 23, 2011Date of Patent: October 13, 2015Assignees: BlackBerry Limited, Certicom Corp.Inventors: Mark Pecen, Niels Peter Skov Andersen, Shalini Suresh Periyalwar, Matthew Campagna
-
Patent number: 8554175Abstract: Methods, systems, and computer programs for managing mobile device applications are described. In some aspects, a mobile device application is prevented from accessing resources of a wireless network. For example, a wireless network operator system can determine that one or more mobile device applications are disapproved for use in the wireless network. In some implementations, the wireless network operator denies the disapproved mobile device applications access to the wireless network resources. In some implementations, mobile devices disable access to the wireless network by the disapproved mobile device applications.Type: GrantFiled: September 23, 2011Date of Patent: October 8, 2013Assignees: BlackBerry Limited, Certicom Corp.Inventors: Mark Pecen, Niels Peter Skov Andersen, Shalini Suresh Periyalwar, Matthew Campagna
-
Patent number: 8554179Abstract: Methods, systems, and computer programs for managing mobile device applications are described. In some aspects, a mobile device application is prevented from accessing resources of a wireless network. For example, a wireless network operator system can determine that one or more mobile device applications are disapproved for use in the wireless network. In some implementations, the wireless network operator denies the disapproved mobile device applications access to the wireless network resources. In some implementations, mobile devices disable access to the wireless network by the disapproved mobile device applications.Type: GrantFiled: September 23, 2011Date of Patent: October 8, 2013Assignees: BlackBerry Limited, Certicom Corp.Inventors: Mark Pecen, Niels Peter Skov Andersen, Shalini Suresh Periyalwar, Matthew Campagna
-
Publication number: 20130078946Abstract: Methods, systems, and computer programs for managing mobile device applications are described. In some aspects, a mobile device application is prevented from accessing resources of a wireless network. For example, a wireless network operator system can determine that one or more mobile device applications are disapproved for use in the wireless network. In some implementations, the wireless network operator denies the disapproved mobile device applications access to the wireless network resources. In some implementations, mobile devices disable access to the wireless network by the disapproved mobile device applications.Type: ApplicationFiled: September 23, 2011Publication date: March 28, 2013Inventors: Mark Pecen, Niels Peter Skov Andersen, Shalini Suresh Periyalwar, Matthew Campagna
-
Publication number: 20130078948Abstract: Methods, systems, and computer programs for managing mobile device applications are described. In some aspects, a mobile device application is prevented from accessing resources of a wireless network. For example, a wireless network operator system can determine that one or more mobile device applications are disapproved for use in the wireless network. In some implementations, the wireless network operator denies the disapproved mobile device applications access to the wireless network resources. In some implementations, mobile devices disable access to the wireless network by the disapproved mobile device applications.Type: ApplicationFiled: September 23, 2011Publication date: March 28, 2013Inventors: Mark Pecen, Niels Peter Skov Andersen, Shalini Suresh Periyalwar, Matthew Campagna
-
Publication number: 20130078949Abstract: Methods, systems, and computer programs for managing mobile device applications are described. In some aspects, a mobile device application is prevented from accessing resources of a wireless network. For example, a wireless network operator system can determine that one or more mobile device applications are disapproved for use in the wireless network. In some implementations, the wireless network operator denies the disapproved mobile device applications access to the wireless network resources. In some implementations, mobile devices disable access to the wireless network by the disapproved mobile device applications.Type: ApplicationFiled: September 23, 2011Publication date: March 28, 2013Inventors: Mark Pecen, Niels Peter Skov Andersen, Shalini Suresh Periyalwar, Matthew Campagna
-
Publication number: 20130064363Abstract: During generation of a signature on a message to create a signed message, a signer determines one of the signature components such that particular information can be extracted from the signature component. The particular information may be related to one or more of the signer and the message to be signed. After receiving a signed message purported to be signed by the signer, a verifier can extract the particular information from the signature component.Type: ApplicationFiled: March 23, 2011Publication date: March 14, 2013Applicants: RESEARCH IN MOTION LIMITED, CERTICOM CORP.Inventors: Herbert Little, Scott Vanstone, Daniel Brown, Matthew Campagna
-
Publication number: 20130067218Abstract: During generation of an implicit certificate for a requestor, a certificate authority incorporates information in the public-key reconstruction data, where the public-key reconstruction data is to be used to compute the public key of the requestor. The information may be related to one or more of the requestor, the certificate authority, and the implicit certificate. The certificate authority reversibly encodes the public-key reconstruction data in the implicit certificate and sends it to the requestor. After receiving the implicit certificate from the certificate authority, the requestor can extract the incorporated information from the public-key reconstruction data. The implicit certificate can be made available to a recipient, and the recipient can also extract the incorporated information.Type: ApplicationFiled: March 23, 2011Publication date: March 14, 2013Applicants: RESEARCH IN MOTION LIMITED, CERTICOM CORP.Inventors: Herbert Little, Matthew Campagna, Scott Vanstone, Daniel Brown
-
Publication number: 20070262135Abstract: Methods and systems that prevent completion of postdated financial transactions until the specified future date is provided. A portion of the information necessary to complete a financial transaction is encrypted utilizing an identity-based encryption (IBE) scheme. The encryption key used to encrypt the information is associated with the date on which the transaction is authorized to be completed. The encrypted information is provided to the payee. The issuing bank provides a daily decryption key that allows decryption of information encrypted using the key associated with the corresponding date. Thus, only when the maturity date of the transaction has arrived will the payee or depositing bank be able to obtain the decryption key that will decrypt the encrypted information necessary to complete the transaction. Since the encrypted information can not be decrypted until the date associated with the encryption key, the financial transaction can not be completed until such date.Type: ApplicationFiled: May 15, 2006Publication date: November 15, 2007Applicant: Pitney Bowes IncorporatedInventors: Bradley Hammell, Matthew Campagna, Robert Cordery, Bertrand Haas, Leon Pintsov
-
Publication number: 20070143072Abstract: Systems and methods for probabilistic determination of real world events in a sensory environment such as a predicting location in a responsive environment are described. A responsive environment system includes a set of sensors for making probabilistic observations of RFID sensor tags. The system also includes a control system employing a set of possible real world events and statistical processing system for predicting a particular real world event state based upon the sensor observations. In one configuration, a Hidden Markov Model is used for the statistical processing system and may be updated based upon the prediction of the model. The responsive environment will then launch a response based upon the predicted real world event state.Type: ApplicationFiled: December 20, 2005Publication date: June 21, 2007Inventor: Matthew Campagna
-
Publication number: 20070130091Abstract: A method for producing a metered tape and an indicium on a meter tape comprising determining a location on the meter tape where the indicium is to be printed, generating the indicium with information related to the location incorporated therein, and printing the indicium on the meter tape at the location. A method of authenticating an indicium printed on a meter tape comprising retrieving information stored within the indicium, the information identifying a first location where the indicium is supposed to be positioned relative to the meter tape, detecting a spatial indicator identifying a second location where the indicium is actually positioned relative to the meter tape, and comparing the first location to the second location. Mail metering and authenticating systems for implementing the methods are also disclosed.Type: ApplicationFiled: December 7, 2005Publication date: June 7, 2007Applicant: Pitney Bowes IncorporatedInventors: Robert Cordery, Erik Monsen, Claude Zeller, Matthew Campagna
-
Publication number: 20070122024Abstract: A method of processing a check prior to submitting it for deposit in which the depositor's intent at the time of submitting the check is linked with an image of the check. The method includes receiving from the depositor intended amount information for the check, generating a first image of a front of the check, and generating an image of the intended amount. The method further includes generating a second image of the front of the check using the first image of the front of the check, wherein the second image of the front of the check includes the image of the intended amount and wherein the first image of the front of the check may be obtained from the second image of the front of the check. Finally, the method includes submitting at least the second image of the front of the check to a depository bank.Type: ApplicationFiled: November 29, 2005Publication date: May 31, 2007Applicant: Pitney Bowes IncorporatedInventors: Bertrand Haas, Matthew Campagna
-
Publication number: 20070116349Abstract: A method for detecting whether perforations are present on the edge of an image of a form, such as a check, includes obtaining a bitmap of the image, identifying a selected portion of the bitmap that corresponds to at least the edge and that includes a matrix of a plurality of rows and columns of brightness values, and selecting a particular one of the rows of brightness values. The method further includes performing a Fourier transform of the brightness values included in the particular selected row to generate a Fourier transform output, and determining whether a series of perforations is present based on the Fourier transform output.Type: ApplicationFiled: November 23, 2005Publication date: May 24, 2007Applicant: Pitney Bowes IncorporatedInventors: Robert Cordery, Matthew Campagna, Thomas Foth, Bertrand Haas, Douglas Quine
-
Publication number: 20070104323Abstract: Methods and systems for keeping information related to the sender of a mail piece private, while still allowing authorized parties to easily obtain the sender information if desired, is provided. Sender information for a mail piece is encrypted utilizing an identity-based encryption (IBE) scheme. The encryption key used to encrypt the sender information can be computed using recipient information. The corresponding decryption key can only be obtained from a trusted third party acting as a Private Key Generator (PKG). Only those parties authorized to have access to the sender information will be provided with the corresponding decryption key. The corresponding decryption key can then be used to decrypt the sender information into human readable form.Type: ApplicationFiled: November 4, 2005Publication date: May 10, 2007Applicant: Pitney Bowes IncorporatedInventors: Bradley Hammell, Matthew Campagna, Robert Cordery, Leon Pintsov, Frederick Ryan
-
Publication number: 20060229991Abstract: A voting method includes receiving identity-based information, vote data and a passphrase for a voter, encrypting the vote data using a symmetric key, generating second identity-based information for the voter, and generating an identity-based public key using at least the second identity-based information and a voting system parameter. The symmetric key is encrypted using the identity-based public key and an identity-based asymmetric encryption algorithm. The encrypted symmetric key may be decrypted using a private key corresponding to the identity-based public key and an identity-based asymmetric decryption algorithm, wherein the private key is generated from at least the identity-based public key and a secret master key. The voter is provided with information that includes at least the encrypted vote data and the encrypted symmetric key, and the system retains anonymous identity information, encrypted vote data and the encrypted symmetric key as a paper audit trail.Type: ApplicationFiled: March 18, 2005Publication date: October 12, 2006Applicant: Pitney Bowes IncorporatedInventor: Matthew Campagna