Patents by Inventor Matt Wolff

Matt Wolff has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220131883
    Abstract: A method, a system, and an article are provided for identification of security-related activities based on usage of a plurality of independent cloud-based, hosted application platforms. An example method includes: receiving, from the application platforms, activity data and state data for a plurality of users of the application platforms; generating one or more predictive models configured to detect deviations from normal user behavior across the application platforms; providing, as input to the one or more predictive models, the activity data and the state data for at least one of the users; receiving, from the one or more predictive models, an indication that an activity of the at least one of the users deviates from the normal user behavior; and facilitating a remedial action to address the indicated deviation.
    Type: Application
    Filed: February 12, 2020
    Publication date: April 28, 2022
    Inventors: Matt Wolff, Alexander Vandenberg-Rodes, Naresh Chebolu, Marcus Mccurdy, Matthew Maisel, Jody Forness, Jedidiah Mitten, Noah Corradin, Samantha Staszak, David Newhall, Christopher Galbraith, Christopher Fuller, Brian Lau, Benjamin Johnson
  • Patent number: 10931699
    Abstract: A method, a system, and an article are provided for identification of security-related activities based on usage of a plurality of independent cloud-based, hosted application platforms. An example method includes: receiving, from the application platforms, activity data and state data for a plurality of users of the application platforms; generating one or more predictive models configured to detect deviations from normal user behavior across the application platforms; providing, as input to the one or more predictive models, the activity data and the state data for at least one of the users; receiving, from the one or more predictive models, an indication that an activity of the at least one of the users deviates from the normal user behavior; and facilitating a remedial action to address the indicated deviation.
    Type: Grant
    Filed: February 12, 2020
    Date of Patent: February 23, 2021
    Assignee: Obsidian Security, Inc.
    Inventors: Matt Wolff, Alexander Vandenberg-Rodes, Naresh Chebolu, Marcus Mccurdy, Matthew Maisel, Jody Forness, Jedidiah Mitten, Noah Corradin, Samantha Staszak, David Newhall, Christopher Galbraith, Christopher Fuller, Brian Lau, Benjamin Johnson
  • Publication number: 20200259852
    Abstract: A method, a system, and an article are provided for identification of security-related activities based on usage of a plurality of independent cloud-based, hosted application platforms. An example method includes: receiving, from the application platforms, activity data and state data for a plurality of users of the application platforms; generating one or more predictive models configured to detect deviations from normal user behavior across the application platforms; providing, as input to the one or more predictive models, the activity data and the state data for at least one of the users; receiving, from the one or more predictive models, an indication that an activity of the at least one of the users deviates from the normal user behavior; and facilitating a remedial action to address the indicated deviation.
    Type: Application
    Filed: February 12, 2020
    Publication date: August 13, 2020
    Inventors: Matt Wolff, Alexander Vandenberg-Rodes, Naresh Chebolu, Marcus Mccurdy, Matthew Maisel, Jody Forness, Jedidiah Mitten, Noah Corradin, Samantha Staszak, David Newhall, Christopher Galbraith, Christopher Fuller, Brian Lau, Benjamin Johnson
  • Patent number: 9921830
    Abstract: Data is received that includes at least a portion of a program. Thereafter, entry point locations and execution-relevant metadata of the program are identified and retrieved. Regions of code within the program are then identified using static disassembly and based on the identified entry point locations and metadata. In addition, entry points are determined for each of a plurality of functions. Thereafter, a set of possible call sequences are generated for each function based on the identified regions of code and the determined entry points for each of the plurality of functions. Related apparatus, systems, techniques and articles are also described.
    Type: Grant
    Filed: May 27, 2016
    Date of Patent: March 20, 2018
    Assignee: Cylance Inc.
    Inventors: Derek A. Soeder, Matt Wolff
  • Publication number: 20160274909
    Abstract: Data is received that includes at least a portion of a program. Thereafter, entry point locations and execution-relevant metadata of the program are identified and retrieved. Regions of code within the program are then identified using static disassembly and based on the identified entry point locations and metadata. In addition, entry points are determined for each of a plurality of functions. Thereafter, a set of possible call sequences are generated for each function based on the identified regions of code and the determined entry points for each of the plurality of functions. Related apparatus, systems, techniques and articles are also described.
    Type: Application
    Filed: May 27, 2016
    Publication date: September 22, 2016
    Inventors: Derek A. Soeder, Matt Wolff
  • Patent number: 9378012
    Abstract: Data is received that includes at least a portion of a program. Thereafter, entry point locations and execution-relevant metadata of the program are identified and retrieved. Regions of code within the program are then identified using static disassembly and based on the identified entry point locations and metadata. In addition, entry points are determined for each of a plurality of functions. Thereafter, a set of possible call sequences are generated for each function based on the identified regions of code and the determined entry points for each of the plurality of functions. Related apparatus, systems, techniques and articles are also described.
    Type: Grant
    Filed: January 6, 2015
    Date of Patent: June 28, 2016
    Assignee: Cylance Inc.
    Inventors: Derek A. Soeder, Matt Wolff
  • Publication number: 20150220333
    Abstract: Data is received that includes at least a portion of a program. Thereafter, entry point locations and execution-relevant metadata of the program are identified and retrieved. Regions of code within the program are then identified using static disassembly and based on the identified entry point locations and metadata. In addition, entry points are determined for each of a plurality of functions. Thereafter, a set of possible call sequences are generated for each function based on the identified regions of code and the determined entry points for each of the plurality of functions. Related apparatus, systems, techniques and articles are also described.
    Type: Application
    Filed: January 6, 2015
    Publication date: August 6, 2015
    Inventors: Derek A. Soeder, Matt Wolff
  • Patent number: 8930916
    Abstract: Data is received that includes at least a portion of a program. Thereafter, entry point locations and execution-relevant metadata of the program are identified and retrieved. Regions of code within the program are then identified using static disassembly and based on the identified entry point locations and metadata. In addition, entry points are determined for each of a plurality of functions. Thereafter, a set of possible call sequences are generated for each function based on the identified regions of code and the determined entry points for each of the plurality of functions. Related apparatus, systems, techniques and articles are also described.
    Type: Grant
    Filed: January 31, 2014
    Date of Patent: January 6, 2015
    Assignee: Cylance Inc.
    Inventors: Derek A. Soeder, Matt Wolff