Patents by Inventor Matthew STEELE

Matthew STEELE has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200235940
    Abstract: In accordance with embodiments, there are provided mechanisms and methods for facilitating dynamic end-to-end integrity for data repositories in an on-demand services environment, where a database system-implemented method includes receiving, by the database system, a content file and metadata to be submitted to a data repository of the database system. The content file may include content, where the metadata may include identifying data associated with at least one of the content and a user associated with the content. The method may include verifying, by the database system, the identifying data of the metadata. The verification of the identifying data represents authentication of at least one of the user and the content. The method may include submitting, by the database system, the content file and the metadata to the data repository, upon authentication of at least one of the user and the content via successful verification of the identifying data.
    Type: Application
    Filed: November 25, 2019
    Publication date: July 23, 2020
    Inventors: SHILOH CORY HEURICH, FRANK SIEBENLIST, TAHER ELGAMAL, CLAYTEN TYLER JOSEPH HAMACHER, MATTHEW STEELE, PATHIK ASHOK SOLANKI, MATTHEW B. SCHECHTMAN
  • Publication number: 20160080368
    Abstract: In accordance with embodiments, there are provided mechanisms and methods for facilitating dynamic end-to-end integrity for data repositories in an on-demand services environment in an on-demand services environment in a multi-tenant environment according to one embodiment. In one embodiment and by way of example, a method includes receiving, by and incorporating into a database system, a content file and metadata to be submitted to a data repository of the database system. The content file may include content, where the metadata includes identifying data associated with at least one of the content and a user associated with the content. The method may further include verifying, by the database system, the identifying data of the metadata. The verification of the identifying data represents authentication of at least one of the user and the content.
    Type: Application
    Filed: September 12, 2014
    Publication date: March 17, 2016
    Inventors: SHILOH CORY HEURICH, FRANK SIEBENLIST, TAHER ELGAMAL, CLAYTEN HAMACHER, MATTHEW STEELE, PATHIK ASHOK SOLANKI, Matthew B. Schechtman
  • Publication number: 20100058431
    Abstract: Application authorization management is provided without installation of an agent at an operating system level. A component runs outside of the operating system, in an AMT environment. AMT is utilized to examine the operating system for applications. Identified applications are checked against a whitelist or a blacklist. Responsive to determining that an identified application is not authorized, AMT is used to redirect input/output requests targeting the application to an alternative image, which can, for example, warn the user that the application is not authorized.
    Type: Application
    Filed: August 26, 2008
    Publication date: March 4, 2010
    Inventors: Bruce McCORKENDALE, Matthew STEELE, William E. SOBEL