Patents by Inventor Matthew John Green

Matthew John Green has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9449197
    Abstract: A mobile device operating system pools any available entropy. The resulting entropy pool is stored in device memory. When storing entropy in memory, preferably memory addresses are randomly allocated to prevent an attacker from capturing entropy that might have already been used to create a random number. The stored entropy pool provides a readily-available entropy source for any entropy required by the operating system or device applications. Then, when a cryptographic application requests a true random number, the operating system checks to determine whether the pool has available entropy and, if so, a portion of the entropy is provided to enable generation (e.g., by a TRNG) of a true random number that, in turn, may then be used for some cryptographic operation. After providing the entropy, the operating system clears the address locations that were used to provide it so that another entity cannot re-use the entropy.
    Type: Grant
    Filed: June 13, 2013
    Date of Patent: September 20, 2016
    Assignee: GLOBAL FOUNDRIES INC.
    Inventors: Matthew John Green, Leigh Stuart McLean, Peter Theodore Waltenberg
  • Patent number: 8949814
    Abstract: An approach is provided that receives and processes a software change package. The software change package includes changes to an installed software product. Change metadata corresponding to the changes included in the software change package is also received. Support data corresponding to the software change package is also received with the support data includes evaluation data that corresponds to the software change package. The evaluation data being data that was gathered from other customer installations of an upgraded software product that previously installed the software change package. Customer configuration data items are retrieved and the customer configuration data items are analyzed along with the received change metadata and the received support data in order to generating an upgrade risk map.
    Type: Grant
    Filed: June 22, 2012
    Date of Patent: February 3, 2015
    Assignee: International Business Machines Corporation
    Inventors: Matthew John Green, Christopher John Hockings, Trevor Scott Norvill, Richard A. Speter
  • Publication number: 20140372767
    Abstract: A mobile device operating system pools any available entropy. The resulting entropy pool is stored in device memory. When storing entropy in memory, preferably memory addresses are randomly allocated to prevent an attacker from capturing entropy that might have already been used to create a random number. The stored entropy pool provides a readily-available entropy source for any entropy required by the operating system or device applications. Then, when a cryptographic application requests a true random number, the operating system checks to determine whether the pool has available entropy and, if so, a portion of the entropy is provided to enable generation (e.g., by a TRNG) of a true random number that, in turn, may then be used for some cryptographic operation. After providing the entropy, the operating system clears the address locations that were used to provide it so that another entity cannot re-use the entropy.
    Type: Application
    Filed: June 13, 2013
    Publication date: December 18, 2014
    Inventors: Matthew John Green, Leigh Stuart McLean, Peter Theodore Waltenberg
  • Publication number: 20130346956
    Abstract: An approach is provided that receives and processes a software change package. The software change package includes changes to an installed software product. Change metadata corresponding to the changes included in the software change package is also received. Support data corresponding to the software change package is also received with the support data includes evaluation data that corresponds to the software change package. The evaluation data being data that was gathered from other customer installations of an upgraded software product that previously installed the software change package. Customer configuration data items are retrieved and the customer configuration data items are analyzed along with the received change metadata and the received support data in order to generating an upgrade risk map.
    Type: Application
    Filed: June 22, 2012
    Publication date: December 26, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Matthew John Green, Christopher John Hockings, Trevor Scott Norvill, Richard A. Speter
  • Publication number: 20110161868
    Abstract: An approach is provided that receives a user action directed at a first windowed application that is executing in a windowing operating system. The first windowed application is displayed on a display using a first set of display attributes. In response to receiving the user action, user preferences are retrieved that correspond to the first windowed application. The user preferences reference a second windowed application that runs in the windowed operating system. The second windowed application is displayed on the display using a second set of display attributes. One or more actions corresponding to the second windowed application are identified based on the retrieved user preferences. These identified actions are executed on the second windowed application and result in a change to the second set of display attributes which causes in a change in an appearance of the second windowed application.
    Type: Application
    Filed: December 30, 2009
    Publication date: June 30, 2011
    Applicant: International Business Machines Corporation
    Inventors: Matthew John Green, Grant Charles Murphy