Patents by Inventor Matthew Trevathan

Matthew Trevathan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10033763
    Abstract: An application launcher is disclosed for retrieving and permitting launch of multiple mobile applications through a single, secure authentication process, and a method of use. The method includes receiving a request to launch one or more applications through a single authentication process. The method further includes authenticating a user through an application launcher. The method further includes appending a security token to one or more applications upon authentication of the user to enable the user to launch the one or more applications through the single authentication process provided by the application launcher.
    Type: Grant
    Filed: May 3, 2013
    Date of Patent: July 24, 2018
    Assignee: Kony INC.
    Inventors: Raj Kumar Koneru, Pattabhi Rama Rao Dasari, Prajakt Deshpande, Rajendra Komandur, Sriram Ramanathan, Matthew Terry, Matthew Trevathan, Sathyanarayana Vennapusala
  • Publication number: 20140331273
    Abstract: An application launcher is disclosed for retrieving and permitting launch of multiple mobile applications through a single, secure authentication process, and a method of use. The method includes receiving a request to launch one or more applications through a single authentication process. The method further includes authenticating a user through an application launcher. The method further includes appending a security token to one or more applications upon authentication of the user to enable the user to launch the one or more applications through the single authentication process provided by the application launcher.
    Type: Application
    Filed: May 3, 2013
    Publication date: November 6, 2014
    Applicant: Kony Solutions, Inc.
    Inventors: RAJ KUMAR KONERU, PATTABHI RAMA RAO DASARI, PRAJAKT DESHPANDE, RAJENDRA KOMANDUR, SRIRAM RAMANATHAN, MATTHEW TERRY, MATTHEW TREVATHAN, SATHYANARAYANA VENNAPUSALA
  • Publication number: 20080092127
    Abstract: A grid-enabled ANT system that includes ANT XML task files that can run on both grid-enabled machines or stand-alone computers is disclosed. A network file server is used to store files accessed during the build process, and ANT's standard XML tagging and parameters are used, thus enabling the user to use a standardized format for entering XML information. This grid-enabled ANT is transparent to the user since ANT parses the tasks and automatically sends jobs to the grid, when appropriate, instead of the user deciding which tasks to implement as grid tasks.
    Type: Application
    Filed: December 7, 2007
    Publication date: April 17, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Patrick Richards, Matthew Trevathan
  • Publication number: 20070111182
    Abstract: A method and system comprises tagging correct answers to each of a plurality of questions in order to associate the each of the correct answers to a respective one of the plurality of questions. The system and method further comprises providing an objective criteria for distributing the correct answers for each of the plurality of questions amongst the plurality of questions and distributing the correct answers with relation to one another and the plurality of questions using the objective criteria.
    Type: Application
    Filed: October 26, 2005
    Publication date: May 17, 2007
    Applicant: International Business Machines Corporation
    Inventors: Michael Outlaw, Matthew Trevathan
  • Publication number: 20070022302
    Abstract: A method for providing secure access to information held in a shared repository, for example to electronic business cards stored on a server. A data owner registers with the server and provides information to be shared with selected data users. The server returns public-key cryptography keys. To access the information, a data user sends its public key to the data owner. The data owner encrypts the public key using the data owner private key, and sends the result to the server, along with permission to transfer information to the data user. The server decrypts the received result using the data owner public key, and compares the outcome with the data user public key. If they match, the server records permission on an access list. In response to a request for information the server checks the access list to determine whether the data user has permission. If so, the server encrypts the information using the data user public key, and transfers the result to the data user.
    Type: Application
    Filed: September 26, 2006
    Publication date: January 25, 2007
    Applicant: International Business Machines Corporation
    Inventors: Patrick Richards, Matthew Trevathan
  • Publication number: 20070011707
    Abstract: A distribution system and method. The distribution system comprises a computing apparatus and a plurality of projection systems connected to the computing apparatus. The computing apparatus comprises a scheduler software tool and a plurality of audio/video data files stored on a computer readable medium. Each projection system of the plurality of projection systems comprises a cache storage device connected to an associated projection apparatus. Each cache storage device is adapted to dynamically receive and store an associated audio/video data file from the plurality of audio/video data files for transmission to each associated projection apparatus according to a schedule generated by the scheduler software tool.
    Type: Application
    Filed: July 8, 2005
    Publication date: January 11, 2007
    Applicant: International Business Machines Corporation
    Inventors: Eythan Holladay, Stephen Jaffe, Michael Outlaw, Patrick Richards, Matthew Trevathan
  • Publication number: 20060282519
    Abstract: A system and method for managing licensed and non-licensed resources in a grid network is provided. A license server receives and processes requests for a license and determines whether a license is available and, if necessary, causes a new configuration to be created on a server for satisfying the request. A new grid node may also be created and configured to be added to the grid for creating additional capacity for grid processing. The configuration may be performed at a time prior to an actual need by the grid, perhaps due to a faulted node, and quickly brought on-line with a simple configuration update. The new grid node may also have a virtual IP address reassigned to quickly redirect processing from the faulted node to the newly configured node. Also, an external resource dispatcher may add new resources such as storage or processing capacity to the grid and may coordinate the new resources with the license server.
    Type: Application
    Filed: June 9, 2005
    Publication date: December 14, 2006
    Inventors: Matthew Trevathan, Seth Chisamore, Christopher Holladay, Michael Outlaw
  • Publication number: 20060159316
    Abstract: Minutiae based fingerprint transactions are validated and authenticated over wireless based communications systems, such as over a Bluetooth wireless based communication system. Minutiae points are unique identification points on a fingerprint where a ridge in the fingerprint joins another ridge or a ridge ends. The combination of any three minutiae points forms a triangle, and the method/algorithm of the present invention uses triangles of minutiae points because triangles are proportional regardless of possible differences in scale of two fingerprints being compared. A first method/algorithm uses a minutiae exchange where triplets of minutiae points are exchanged and form triangles for comparison between an original template of minutiae points and a stored template of minutiae points. A second method/algorithm exchanges three linear equations for three pairs of minutiae points that form triangles for comparison between an original template and a stored template.
    Type: Application
    Filed: January 18, 2005
    Publication date: July 20, 2006
    Applicant: International Business Machines Corporation
    Inventors: Seth Chisamore, Christopher Holladay, Michael Outlaw, Matthew Trevathan
  • Publication number: 20060143468
    Abstract: A method for providing secure access to information held in a shared repository, for example to electronic business cards stored on a server. A data owner registers with the server and provides information to be shared with selected data users. The server returns public-key cryptography keys. To access the information, a data user sends its public key to the data owner. The data owner encrypts the public key using the data owner private key, and sends the result to the server, along with permission to transfer information to the data user. The server decrypts the received result using the data owner public key, and compares the outcome with the data user public key. If they match, the server records permission on an access list. In response to a request for information the server checks the access list to determine whether the data user has permission. If so, the server encrypts the information using the data user public key, and transfers the result to the data user.
    Type: Application
    Filed: February 21, 2006
    Publication date: June 29, 2006
    Inventors: Patrick Richards, Matthew Trevathan
  • Publication number: 20050285731
    Abstract: A method for locating and contacting an owner of a lost wireless device. A first person having a first wireless device finds a lost wireless device belonging to a second person. The first wireless device and the lost wireless device each comprise a same discoverable wireless protocol. The first person enters a lost key code on the lost wireless device. The lost wireless device establishes, a connection between the lost wireless device and the first wireless device. The first person accesses data stored on the first wireless device. The first person selects specified data from the data stored on the first wireless device. The first person downloads to the lost wireless device, the specified data from the first wireless device and sends the specified data to a communication device so that the second person may retrieve the specified data through the communication device.
    Type: Application
    Filed: June 29, 2004
    Publication date: December 29, 2005
    Applicant: International Business Machines Corporation
    Inventors: Michael Outlaw, Matthew Trevathan
  • Publication number: 20050278441
    Abstract: A method, system, and program for coordinating use of independent external resources within requesting grid environments. A external resource dispatcher receives requests for use of external resources. The external resource dispatcher controls the dispatch of a pool of external resources hidden from the grid management systems of requesting grid clients. In particular, the external resource dispatcher coordinates dispatch of a selection of the external resources for temporary registration with a requesting grid client management system. The requesting grid client management system registers the external resources for use within the grid client and monitors whether the external resources are still needed. When a requesting grid client no longer needs a dispatched external resource, the external resource dispatcher controls detachment of the dispatched external resource and returns the external resource to the available pool of external resources.
    Type: Application
    Filed: June 15, 2004
    Publication date: December 15, 2005
    Applicant: International Business Machines Corporation
    Inventors: Robert Bond, Douglas McCulloch, Patrick Richards, Sambasiva Tallam, Matthew Trevathan
  • Publication number: 20050249349
    Abstract: Disclosed are an encryption method and system. The method comprises the steps of providing a message to be encrypted, said message having a string of characters; and providing a matrix having characters in a last row and numbers in all other rows. A string of numbers is formed from said string of characters by selecting the number in the next to last row in said matrix in the column corresponding to a character of said string of characters. The remaining numbers in said column are shifted down one row, and the selected number is placed in a queue. The method comprises the further steps of continuing until upon depletion of numbers from a column, shifting columns in said matrix, refilling the empty column with numbers from said queue, and shifting each row in said matrix.
    Type: Application
    Filed: May 4, 2004
    Publication date: November 10, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Aamir Ghaffar, Matthew Trevathan
  • Publication number: 20050114834
    Abstract: A grid-enabled ANT system that includes ANT XML task files that can run on both grid-enabled machines or stand-alone computers is disclosed. A network file server is used to store files accessed during the build process, and ANT's standard XML tagging and parameters are used, thus enabling the user to use a standardized format for entering XML information. This grid-enabled ANT is transparent to the user since ANT parses the tasks and automatically sends jobs to the grid, when appropriate, instead of the user deciding which tasks to implement as grid tasks.
    Type: Application
    Filed: November 26, 2003
    Publication date: May 26, 2005
    Applicant: International Business Machines Corporation
    Inventors: Patrick Richards, Matthew Trevathan