Matthew James Brinkman

age ~53

from Frederick, MD

Also known as:
  • Matthew J Brinkman
  • Matthew A Brinkman
  • Matt J Brinkman
  • Mathew Brinkman

Matthew Brinkman Phones & Addresses

  • Frederick, MD
  • Stephens City, VA
  • 614 Braeburn Dr, Martinsburg, WV 25401 • 3042638504
  • Hedgesville, WV
  • 114 High St, Hartford, WI 53027 • 4146730339
  • Black Creek, WI
  • Inwood, WV
  • Suamico, WI
  • Green Bay, WI

Work

  • Position:
    Clerical/White Collar

Education

  • Degree:
    Associate degree or higher

Us Patents

  • System And Method For Interleaving Information Into Slices Of A Data Packet, Differentially Encrypting The Slices, And Obfuscating Information In The Data Packet

    view source
  • US Patent:
    20140052979, Feb 20, 2014
  • Filed:
    Aug 16, 2013
  • Appl. No.:
    13/969216
  • Inventors:
    Dominic Zippilli - Martinsburg WV, US
    Matthew Brinkman - Martinsburg WV, US
  • Assignee:
    Lume Systems, Inc. - Frederick MD
  • International Classification:
    H04L 29/06
  • US Classification:
    713150
  • Abstract:
    Approaches for combining different information to be transmitted into different slices of a data packet and/or encrypting the slices using different cryptographic schemes for secure transmission of the information are disclosed. In some implementations, first information and second information may be received. A first data slice representing a portion of the first information may be generated based on a first cryptographic scheme. A second data slice representing a portion of the second information may be generated based on a second cryptographic scheme different than the first cryptographic scheme. A first header may be generated such that the first header may specify the first cryptographic scheme for the first data slice and the second cryptographic scheme for the second data slice. A first data packet may be generated such that the first data packet may include the first header, the first data slice, and the second data slice.
  • System And Method For Limiting Exploitable Or Potentially Exploitable Sub-Components In Software Components

    view source
  • US Patent:
    20140053273, Feb 20, 2014
  • Filed:
    Aug 16, 2013
  • Appl. No.:
    13/969158
  • Inventors:
    Dominic Zippilli - Martinsburg WV, US
    Matthew Brinkman - Martinsburg WV, US
  • Assignee:
    Lume Systems, Inc. - Frederick MD
  • International Classification:
    G06F 21/57
  • US Classification:
    726 25
  • Abstract:
    Approaches for limiting exploitable or potentially exploitable sub-components in software components are disclosed. In certain implementations, a first software component in the component creation environment may be identified. The first software component may include a first sub-component that provides a function that is exploitable or potentially exploitable to compromise the first software component. The first sub-component may be disabled such that the function provided by the first sub-component is not available via the first software component when the first software component is executed. The first software component may be placed in the component repository after the first sub-component is disabled such that the first software component is placed in the component repository without availability of the function provided by the first sub-component. In some implementations, disabling the first sub-component may comprise removing the first sub-component from the first software component.
  • System And Method For Replacing Software Components With Corresponding Known-Good Software Components Without Regard To Whether The Software Components Have Been Compromised Or Potentially Compromised

    view source
  • US Patent:
    20140053274, Feb 20, 2014
  • Filed:
    Aug 16, 2013
  • Appl. No.:
    13/969181
  • Inventors:
    Dominic Zippilli - Martinsburg WV, US
    Matthew Brinkman - Martinsburg WV, US
  • Assignee:
    Lume Systems, Inc. - Frederick MD
  • International Classification:
    G06F 21/57
  • US Classification:
    726 25
  • Abstract:
    Approaches for replacing software components executing in a runtime environment with corresponding known-good software components are disclosed. In some implementations, at least a first event indicating that at least a first software component executing in the runtime environment should be replaced may be determined. The first event may be determined without respect to whether the first software component has been compromised or potentially compromised. At least a second software component corresponding to the first software component may be obtained from a component repository that is separate from the runtime environment. The first software component may be replaced with the second software component based on the first event such that the second software component is available for use in the runtime environment after the first event and the first software component is no longer available for use in the runtime environment after the first event.
  • System And Method For Building, Optimizing, And Enforcing Infrastructure On A Cloud Based Computing Environment

    view source
  • US Patent:
    20170099191, Apr 6, 2017
  • Filed:
    Jul 20, 2016
  • Appl. No.:
    15/215409
  • Inventors:
    - Frederick MD, US
    Dominic ZIPPILLI - Frederick MD, US
    Denison WRIGHT - Frederick MD, US
    Wayne CRISSMAN - Frederick MD, US
    Matthew BRINKMAN - Martinsburg WV, US
    Nathan MCCOURTNEY - Frederick MD, US
    Alexander E. SCHOOF - Herndon VA, US
    Daniel KERRIGAN - Frederick MD, US
    Jared TOBIN - Auckland, NZ
    Jasper VAN DER JEUGT - Zurich, CH
    Maciej WOS - Hong Kong, CN
    Christopher KAMINSKI - Philadelphia PA, US
    Tyler DROMBOSKY - Washington DC, US
  • Assignee:
    FUGUE, INC. - Frederick MD
  • International Classification:
    H04L 12/24
    H04L 29/08
  • Abstract:
    A method for building, optimizing, and maintaining a computing infrastructure on a cloud computing environment is provided. A user provides a high-level declaration to a cloud environment operating system, specifying the details of the infrastructure that is intended to be built on the cloud. A cloud environment operating system converts the high level declaration to a lower level declaration and then to a series of instructions that can be executed by the cloud to build the desired infrastructure. The cloud environment operating system can also continuously monitor the infrastructure once it is built on the cloud. If the cloud environment operating system notices any discrepancies between the user's original specification and the infrastructure as built on the cloud, the operating system can work to modify the existing infrastructure on the cloud to conform to the infrastructure specified by a user.
  • System And Method For Optimizing The Selection Of Cloud Services Based On Price And Performance

    view source
  • US Patent:
    20150363851, Dec 17, 2015
  • Filed:
    Jun 11, 2014
  • Appl. No.:
    14/302220
  • Inventors:
    - Frederick MD, US
    Dominic Zippilli - Martinsburg WV, US
    Matthew Brinkman - Martinsburg WV, US
    Andrew Wright - Washington DC, US
    Tyler Drombosky - Washington DC, US
  • Assignee:
    Luminal, Inc. - Frederick MD
  • International Classification:
    G06Q 30/06
  • Abstract:
    A system and method is provided for generating and using purchase strategies based on the price, performance, and/or other information related to cloud services to optimize the selection of such services. The purchase strategies may comprehensively describe various cloud services in real-time so that customers may purchase cloud services using up-to-date, real-time information. The purchase strategies may, for example, describe pricing, performance, availability, and/or other attributes of various cloud services. A purchase agent may use the purchase strategies, one or more purchase rules, and/or other information to generate a purchase specification that specifies one or more cloud service instances that should be purchased. The purchase agent may leverage unique properties of spot instances to make favorable purchase decisions. For example, the system may determine bid prices that should be made to obtain certain spot instances.
  • System And Method For Interleaving Information Into Slices Of A Data Packet, Differentially Encrypting The Slices, And Obfuscating Information In The Data Packet

    view source
  • US Patent:
    20150229474, Aug 13, 2015
  • Filed:
    Apr 20, 2015
  • Appl. No.:
    14/691436
  • Inventors:
    - FREDERICK MD, US
    DOMINIC ZIPPILLI - MARTINSBURG WV, US
    MATTHEW BRINKMAN - MARTINSBURG WV, US
  • Assignee:
    LUMINAL, INC. - FREDERICK MD
  • International Classification:
    H04L 9/14
    H04L 29/06
  • Abstract:
    Approaches for combining different information to be transmitted into different slices of a data packet and/or encrypting the slices using different cryptographic schemes for secure transmission of the information are disclosed. In some implementations, first information and second information may be received. A first data slice representing a portion of the first information may be generated based on a first cryptographic scheme. A second data slice representing a portion of the second information may be generated based on a second cryptographic scheme different than the first cryptographic scheme. A first header may be generated such that the first header may specify the first cryptographic scheme for the first data slice and the second cryptographic scheme for the second data slice. A first data packet may be generated such that the first data packet may include the first header, the first data slice, and the second data slice.
  • System And Method For Replacing Software Components With Corresponding Known-Good Software Components Without Regard To Whether The Software Components Have Been Compromised Or Potentially Compromised

    view source
  • US Patent:
    20150213270, Jul 30, 2015
  • Filed:
    Apr 6, 2015
  • Appl. No.:
    14/679811
  • Inventors:
    - Frederick MD, US
    Dominic ZIPPILLI - Martinsburg WV, US
    Matthew BRINKMAN - Martinsburg WV, US
  • International Classification:
    G06F 21/57
    H04L 29/06
  • Abstract:
    Approaches for replacing software components executing in a runtime environment with corresponding known-good software components are disclosed. In some implementations, at least a first event indicating that at least a first software component executing in the runtime environment should be replaced may be determined. The first event may be determined without respect to whether the first software component has been compromised or potentially compromised. At least a second software component corresponding to the first software component may be obtained from a component repository that is separate from the runtime environment. The first software component may be replaced with the second software component based on the first event such that the second software component is available for use in the runtime environment after the first event and the first software component is no longer available for use in the runtime environment after the first event.
  • System And Method For Limiting Exploitable Or Potentially Exploitable Sub-Components In Software Components

    view source
  • US Patent:
    20150213271, Jul 30, 2015
  • Filed:
    Apr 6, 2015
  • Appl. No.:
    14/679831
  • Inventors:
    - Frederick MD, US
    Dominic ZIPPILLI - Martinsburg WV, US
    Matthew BRINKMAN - Martinsburg WV, US
  • International Classification:
    G06F 21/57
    H04L 29/06
  • Abstract:
    Approaches for limiting exploitable or potentially exploitable sub-components in software components are disclosed. In certain implementations, a first software component in the component creation environment may be identified. The first software component may include a first sub-component that provides a function that is exploitable or potentially exploitable to compromise the first software component. The first sub-component may be disabled such that the function provided by the first sub-component is not available via the first software component when the first software component is executed. The first software component may be placed in the component repository after the first sub-component is disabled such that the first software component is placed in the component repository without availability of the function provided by the first sub-component. In some implementations, disabling the first sub-component may comprise removing the first sub-component from the first software component.

License Records

Matthew Brinkman

License #:
37802 - Active
Category:
Professional
Issued Date:
Jul 1, 2002
Expiration Date:
Sep 30, 2017

Resumes

Matthew Brinkman Photo 1

Peoplesoft Hcm Functional And Technical Consultant

view source
Location:
United States
Industry:
Information Services
Matthew Brinkman Photo 2

Matthew Brinkman

view source
Matthew Brinkman Photo 3

Matthew Matt Brinkman

view source
Matthew Brinkman Photo 4

Matthew Brinkman

view source
Matthew Brinkman Photo 5

Matthew Brinkman

view source

Flickr

Youtube

Calling, Prayer, Hearing From God, Obedience,...

The Spirit-Taught Podcast includes reflections and teachings on Script...

  • Duration:
    32m 45s

How legends are made (Matthew Brinkman QB) fu...

  • Duration:
    2m 55s

Matthew Brinkman Vs Jacob Farris 2

Jacob Vs Matthew.

  • Duration:
    1m 16s

Matthew Brinkman Vs Jacob Farris 1

Knock down.

  • Duration:
    42s

Meet Our People | Matt Brinkman

Matt Brinkman, manager of our Energy Group in Phoenix, explains what h...

  • Duration:
    53s

Fishing for panfish at a local park!

Fishing for panfish from shore at a local park in Central Wisconsin! T...

  • Duration:
    11m 29s

Classmates

Matthew Brinkman Photo 14

Matthew Brinkman

view source
Schools:
St. Mary's High School Cheyenne WY 1976-1980
Community:
Mike Mcdonnell, Thomas Cole, James Lewis, Vickey Foster
Matthew Brinkman Photo 15

Matthew Brinkman

view source
Schools:
Northmor High School Galion OH 1991-1995
Community:
Ana Pedersen
Matthew Brinkman Photo 16

St. Mary's High School, ...

view source
Graduates:
Matthew Brinkman (1976-1980),
Katrina Hoeper (1973-1976),
Mary Rudkin (1977-1979),
Jay Vialpando (1972-1976)
Matthew Brinkman Photo 17

Northmor High School, Gal...

view source
Graduates:
Matthew Brinkman (1991-1995),
Richard Peterman (1978-1982),
Natilie Gullett (1991-1995),
Dana Keen (2002-2006),
Kim Keene (1979-1983)

Facebook

Matthew Brinkman Photo 18

Matthew Brinkman

view source
Matthew Brinkman Photo 19

Matthew Brinkman

view source
Matthew Brinkman Photo 20

Matthew Brinkman

view source
Matthew Brinkman Photo 21

Matthew Brinkman

view source
Matthew Brinkman Photo 22

Matthew Brinkman

view source
Matthew Brinkman Photo 23

Matthew Brinkman

view source
Matthew Brinkman Photo 24

Matthew Brinkman

view source
Matthew Brinkman Photo 25

Matthew Brinkman

view source

Googleplus

Matthew Brinkman Photo 26

Matthew Brinkman

Work:
TMW Systems
Education:
Simon Fraser University - Ergonomics and Human Factors
Matthew Brinkman Photo 27

Matthew Brinkman

Matthew Brinkman Photo 28

Matthew Brinkman

Matthew Brinkman Photo 29

Matthew Brinkman

Matthew Brinkman Photo 30

Matthew Brinkman

Myspace

Matthew Brinkman Photo 31

Matthew Brinkman

view source
Locality:
Houston, Texas
Gender:
Male
Birthday:
1950
Matthew Brinkman Photo 32

Matthew Brinkman

view source
Locality:
Meisau, Germany
Gender:
Male
Birthday:
1949
Matthew Brinkman Photo 33

Matthew Brinkman

view source
Locality:
WANN
Gender:
Male
Birthday:
1948
Matthew Brinkman Photo 34

Matthew Brinkman

view source
Locality:
MERMENTAU, Louisiana
Gender:
Male
Birthday:
1947
Matthew Brinkman Photo 35

Matthew Brinkman

view source
Locality:
dallas, Texas
Gender:
Male
Birthday:
1950
Matthew Brinkman Photo 36

Matthew Brinkman

view source
Locality:
EDEN PRAIRIE, Minnesota
Gender:
Male
Birthday:
1949

Get Report for Matthew James Brinkman from Frederick, MD, age ~53
Control profile