Patents by Inventor Matthew Holt

Matthew Holt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10417015
    Abstract: A method and system for operating a modified Java Virtual Machine (JVM) which is able to simultaneously host multiple Java application programs is disclosed. In a first modification the JVM is modified to permit multiple class definitions of some of the Java Application Programming Interface (API) classes, so called non-sensitive classes, to be loaded multiple times but restrict other Java API classes, so called sensitive classes, to be loaded only once, preferably onto a bootstrap class loader. In a second modification the Java API classes are also modified. Preferably in a further modification, some or all of the sensitive API classes are modified not to use synchronization.
    Type: Grant
    Filed: September 26, 2017
    Date of Patent: September 17, 2019
    Assignee: Waratek Limited
    Inventor: John Matthew Holt
  • Patent number: 10332354
    Abstract: Some embodiments include a fantasy sports wagering game. A gaming operator may assign real life sporting players into brackets based on their expected performance so that players with similar expected performance are in a same bracket as each other. Participants in a fantasy sports wagering game may be required to select a player from each of a plurality of brackets to form a fantasy sports team for the fantasy sports wagering game.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: June 25, 2019
    Assignee: CFPH, LLC
    Inventors: Lee Amaitis, Matthew Holt, Mike Colbert, Reed Stephens
  • Publication number: 20180353861
    Abstract: Some embodiments include a fantasy sports game. In some embodiments, an expected performance value may be determined that may affect the outcomes of a fantasy game. In some embodiments, player location may affect available opponents for a game. Groups may play against one another in a fantasy competition. Various examples of fantasy gaming options are given.
    Type: Application
    Filed: August 21, 2018
    Publication date: December 13, 2018
    Inventors: Lee Amaitis, Matthew Holt, Quinton Singleton, Ian Epstein
  • Publication number: 20180139234
    Abstract: A method of enhancing secure operation of a computer is disclosed. The computer receives input data from one us to source and also operates an application program which can utilize the input data. The method involves creating a tainted value cache and storing the input data in that cache. In the event that the application program invokes a method which utilizes data from the cache, then that data is intercepted before it is utilized by the application program. The intercepted data is subjected to a data content test. If the intercepted data passes the data content test, then the intercepted data is forwarded to the application program to be utilized thereby. However, if the intercepted data fails the data content test, a security action is implemented.
    Type: Application
    Filed: December 21, 2017
    Publication date: May 17, 2018
    Inventor: John Matthew Holt
  • Patent number: 9929921
    Abstract: Techniques for toxic workload mapping are provided. A state of a target workload is recorded along with a configuration and state of an environment that is processing the workload. Micro valuations are taken, via statistical sampling, for metrics associated with the workload and for different combinations of resources within the environment. The sampling taken at micro second intervals. The valuations are aggregated to form an index representing a toxic mapping for the workload within the environment. The toxic mapping is mined, in view of policy, to provide conditions and scenarios that may be deemed problematic within the workload and/or environment.
    Type: Grant
    Filed: January 8, 2015
    Date of Patent: March 27, 2018
    Assignee: Micro Focus Software Inc.
    Inventors: Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch, Matthew Holt, Michael John Jorgensen, Michael Fairbanks, Chad Buttars
  • Patent number: 9882930
    Abstract: A method of enhancing secure operation of a computer is disclosed. The computer receives input data from an untrusted source and also operates an application program which can utilize the input data. The method involves creating a tainted value cache and storing the input data in that cache. In the event that the application program invokes a method which utilizes data from the cache, then that data is intercepted before it is utilized by the application program. The intercepted data is subjected to a data content test. If the intercepted data passes the data content test, then the intercepted data is forwarded to the application program to be utilized thereby. However, if the intercepted data fails the data content test, a security action is implemented.
    Type: Grant
    Filed: June 30, 2015
    Date of Patent: January 30, 2018
    Assignee: Waratek Limited
    Inventor: John Matthew Holt
  • Publication number: 20180018188
    Abstract: A method and system for operating a modified Java Virtual Machine (JVM) which is able to simultaneously host multiple Java application programs is disclosed. In a first modification the JVM is modified to permit multiple class definitions of some of the Java Application Programming Interface (API) classes, so called non-sensitive classes, to be loaded multiple times but restrict other Java API classes, so called sensitive classes, to be loaded only once, preferably onto a bootstrap class loader. In a second modification the Java API classes are also modified. Preferably in a further modification, some or all of the sensitive API classes are modified not to use synchronisation.
    Type: Application
    Filed: September 26, 2017
    Publication date: January 18, 2018
    Inventor: John Matthew Holt
  • Patent number: 9830448
    Abstract: A computer architecture providing enhanced JVM security and a method of providing enhanced security for a JVM are disclosed. The host computer runs a single, first, trusted JAVA API library above which is located a hypervisor software layer, and then at least one untrusted JAVA API library. The code of each second, upper, untrusted JAVA API library is modified at, or before runtime to call the hypervisor software layer instead of the JVM to thereby create a silo corresponding to each of the second, upper, untrusted JAVA API libraries. Each silo extends between the host computer and the corresponding second, upper, untrusted JAVA API library. The hypervisor software layer is operated to only permit communication between each of the second, upper, untrusted JAVA API libraries and a corresponding portion of the memory and functional assets of the host computer.
    Type: Grant
    Filed: June 23, 2015
    Date of Patent: November 28, 2017
    Assignee: Waratek Limited
    Inventor: John Matthew Holt
  • Patent number: 9798558
    Abstract: A method and system for operating a modified Java Virtual Machine (JVM) which is able to simultaneously host multiple Java application programs is disclosed. In a first modification the JVM is modified to permit multiple class definitions of some of the Java Application Programming Interface (API) classes, so called non-sensitive classes, to be loaded multiple times but restrict other Java API classes, so called sensitive classes, to be loaded only once, preferably onto a bootstrap class loader. In a second modification the Java API classes are also modified. Preferably in a further modification, some or all of the sensitive API classes are modified not to use synchronization.
    Type: Grant
    Filed: February 25, 2016
    Date of Patent: October 24, 2017
    Assignee: Waratek Limited
    Inventor: John Matthew Holt
  • Patent number: 9752995
    Abstract: The present invention encompasses methods, apparati, and computer-readable media for correcting spatial artifacts in composite radiographic images of an object (1). A method embodiment of the present invention comprises the steps of generating the composite image from a plurality of views of the object (1); estimating a shift profile; and re-generating the image by shifting the views using the shift profile.
    Type: Grant
    Filed: June 7, 2012
    Date of Patent: September 5, 2017
    Assignee: Varex Imaging Corporation
    Inventor: Kevin Matthew Holt
  • Publication number: 20170193237
    Abstract: Techniques for security auditing of cloud resources are provided. A virtual machine (VM) is captured and isolated when a session indicates that a session with the VM has terminated. Security checks are executed against the VM in the isolated environment. Results from the security checks are then reported.
    Type: Application
    Filed: March 15, 2017
    Publication date: July 6, 2017
    Inventors: Jason Allen Sabin, Michael John Jorgensen, Lloyd Leon Burch, Jeremy Ray Brown, Nathaniel Brent Kranendonk, Kal A. Larsen, Michael Fairbanks, Matthew Holt
  • Patent number: 9619262
    Abstract: Techniques for security auditing of cloud resources are provided. A virtual machine (VM) is captured and isolated when a session indicates that a session with the VM has terminated. Security checks are executed against the VM in the isolated environment. Results from the security checks are then reported.
    Type: Grant
    Filed: May 31, 2011
    Date of Patent: April 11, 2017
    Assignee: Micro Focus Software Inc.
    Inventors: Jason Allen Sabin, Michael John Jorgensen, Lloyd Leon Burch, Jeremy Ray Brown, Nathaniel Brent Kranendonk, Kal A. Larsen, Michael Fairbanks, Matthew Holt
  • Publication number: 20160239343
    Abstract: The present invention discloses an alternative arrangement to wake-on-LAN and which is designed specifically for multi-tenant cloud computing and virtualized server environments. This new arrangement identifies which tenants or applications of a multi-tenant server are idle, and when a tenant or application is identified as idle, it transparently reduces the reserved computational capacity footprint of the application or tenant without shutting down the tenancy or exiting the application. Furthermore, the near-instantaneous resumption of the idle tenant or application is achieved when some external event is detected which relates to the passivated tenant or application.
    Type: Application
    Filed: October 2, 2014
    Publication date: August 18, 2016
    Applicant: Waratek Limited
    Inventor: John Matthew Holt
  • Publication number: 20160210815
    Abstract: Various systems and methods enable users to submit bets via a betting matrix comprising a plurality of rows and columns. Each row corresponds to a potential outcome in a first category such as a possible score of a first team, and each column corresponds to a potential outcome in a second category such as a possible score of a second team. A user may enter a bet, e.g., by selecting one or more events and then selecting one or more elements of one or more betting matrices corresponding to the one or more events. The bets may be confirmed substantially when entered, e.g., without regard for any other bet made by any other user.
    Type: Application
    Filed: September 26, 2014
    Publication date: July 21, 2016
    Applicant: CG Technology, L.P.
    Inventors: Matthew Holt, Quinton Singleton, Ken Perrie, Todd Fishon
  • Publication number: 20160170777
    Abstract: A method and system for operating a modified Java Virtual Machine (JVM) which is able to simultaneously host multiple Java application programs is disclosed. In a first modification the JVM is modified to permit multiple class definitions of some of the Java Application Programming Interface (API) classes, so called non-sensitive classes, to be loaded multiple times but restrict other Java API classes, so called sensitive classes, to be loaded only once, preferably onto a bootstrap class loader. In a second modification the Java API classes are also modified. Preferably in a further modification, some or all of the sensitive API classes are modified not to use synchronisation.
    Type: Application
    Filed: February 25, 2016
    Publication date: June 16, 2016
    Inventor: John Matthew Holt
  • Publication number: 20160019385
    Abstract: A computer architecture providing enhanced JVM security and a method of providing enhanced security for a JVM are disclosed. The host computer runs a single, first, trusted JAVA API library above which is located a hypervisor software layer, and then at least one untrusted JAVA API library. The code of each second, upper, untrusted JAVA API library is modified at, or before runtime to call the hypervisor software layer instead of the JVM to thereby create a silo corresponding to each of the second, upper, untrusted JAVA API libraries. Each silo extends between the host computer and the corresponding second, upper, untrusted JAVA API library. The hypervisor software layer is operated to only permit communication between each of the second, upper, untrusted JAVA API libraries and a corresponding portion of the memory and functional assets of the host computer.
    Type: Application
    Filed: June 23, 2015
    Publication date: January 21, 2016
    Inventor: John Matthew Holt
  • Publication number: 20160006758
    Abstract: A method of enhancing secure operation of a computer is disclosed. The computer receives input data from one us to source and also operates an application program which can utilise the input data. The method involves creating a tainted value cache and storing the input data in that cache. In the event that the application program invokes a method which utilises data from the cache, then that data is intercepted before it is utilised by the application program. The intercepted data is subjected to a data content test. If the intercepted data passes the data content test, then the intercepted data is forwarded to the application program to be utilised thereby. However, if the intercepted data fails the data content test, a security action is implemented.
    Type: Application
    Filed: June 30, 2015
    Publication date: January 7, 2016
    Inventor: John Matthew Holt
  • Publication number: 20150128147
    Abstract: A method and system for operating a modified JAVA Virtual Machine (JVM) which is able to simultaneously host multiple JAVA application programs, are disclosed. The JVM is modified to maintain a computer record of one or more application domains, each having one or more classes. For each application domain a first utilization count of the total memory volume in bytes occupied by all allocated instances of the application class, is maintained.
    Type: Application
    Filed: April 30, 2013
    Publication date: May 7, 2015
    Inventor: John Matthew Holt
  • Publication number: 20150120921
    Abstract: Techniques for toxic workload mapping are provided. A state of a target workload is recorded along with a configuration and state of an environment that is processing the workload. Micro valuations are taken, via statistical sampling, for metrics associated with the workload and for different combinations of resources within the environment. The sampling taken at micro second intervals. The valuations are aggregated to form an index representing a toxic mapping for the workload within the environment. The toxic mapping is mined, in view of policy, to provide conditions and scenarios that may be deemed problematic within the workload and/or environment.
    Type: Application
    Filed: January 8, 2015
    Publication date: April 30, 2015
    Inventors: Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch, Matthew Holt, Michael John Jorgensen, Michael Fairbanks, Chad Buttars
  • Publication number: 20150113545
    Abstract: A method and system for operating a modified JAVA Virtual Machine (JVM) which is able to simultaneously host multiple JAVA application programs is disclosed. In a first modification the JVM is modified to permit multiple class definitions of some of the JAVA Application Programming Interface (API) classes, so called non-sensitive classes, to be loaded multiple times but ea) restrict other JAVA API classes, so called sensitive classes, to be loaded only once, preferably onto a bootstrap class loader. In a second modification the JAVA API classes are so modified. Preferably in a third modification, some or all of the sensitive classes are modified not to use synchronisation.
    Type: Application
    Filed: April 30, 2013
    Publication date: April 23, 2015
    Inventor: John Matthew Holt