Patents by Inventor Matthew P. Donovan
Matthew P. Donovan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11057438Abstract: This disclosure provides example techniques to invoke one or more tools, with an investigative tool. The investigative tool provides a common framework that allows investigators to invoke their own trusted tools or third-party generated tools. The investigative tool described herein seamlessly and transparently invokes the tools in accordance with an investigative profile created by the investigator.Type: GrantFiled: August 20, 2018Date of Patent: July 6, 2021Assignee: ARCHITECTURE TECHNOLOGY CORPORATIONInventors: Derek P. Bronner, Robert A. Joyce, Matthew P. Donovan, Julia A. Baker
-
Patent number: 11042647Abstract: An example method includes monitoring execution of one or more applications on a runtime computing system that includes a plurality of processing units, receiving, from the runtime computing system during execution of the applications, monitoring information that includes at least one of function call data or application programming interface call data associated with operations performed by the plurality of processing units during execution of the applications, importing the monitoring information into a risk model, analyzing the monitoring information within the risk model to determine one or more potential vulnerabilities and one or more impacts of the one or more vulnerabilities in the runtime computing system, and outputting, for display in a graphical user interface, a graphical representation of the one or more potential vulnerabilities and the one or more impacts within the risk model.Type: GrantFiled: December 20, 2019Date of Patent: June 22, 2021Assignee: ARCHITECTURE TECHNOLOGY CORPORATIONInventors: Robert A. Joyce, Matthew P. Donovan
-
Patent number: 10909244Abstract: An example method includes storing a scenario event list that defines one or more events associated with a training exercise, and configuring, based on the events defined in the scenario event list, one or more software agents to emulate one or more cyber-attacks against a host computing system during the training exercise, which includes configuring the software agents to save a state of one or more resources of the host computing system prior to emulating the cyber-attacks and to restore the state of the resources upon conclusion of the cyber-attacks. The example method further includes deploying the software agents for execution on the host computing system during the training exercise to emulate the cyber-attacks against the host computing system using one or more operational networks.Type: GrantFiled: July 3, 2019Date of Patent: February 2, 2021Assignee: ARCHITECTURE TECHNOLOGY CORPORATIONInventors: Matthew P. Donovan, Robert A. Joyce, Judson Powers, Dahyun Hollister
-
Patent number: 10909257Abstract: An example method includes selecting, based at least on first and second policies, first and second containers in which to execute first and second applications, respectively. The example method further includes isolating execution of the first application in the first container, and isolating execution of the second application in the second container. The example method also includes applying, based at least on the first policy, a first group of security controls to the first application executing in the first container, wherein the first container defines a first domain in which the first application is executed, and applying, based at least on the second policy, a second group of security controls to the second application executing in the second container, wherein the second container defines a second domain in which the second application is executed.Type: GrantFiled: July 2, 2019Date of Patent: February 2, 2021Assignee: ARCHITECTURE TECHNOLOGY CORPORATIONInventors: Daniel James Tingstrom, Judson Powers, Matthew P. Donovan
-
Patent number: 10872539Abstract: An example method includes outputting a graphical dashboard that includes one or more learning objective nodes and one or more skill nodes, selecting one or more software agents that are associated with the one or more skill nodes, providing, to at least one host computing system, an indication of the one or more software agents that are configured to collect parameter data from the at least one host computing system while a trainee performs actions, receiving the parameter data collected by the one or more software agents during execution, determining, based on the parameter data, that the one or more skills represented by the one or more skill nodes have been demonstrated by the trainee, and updating the one or more skill nodes to graphically indicate that one or more represented skills have been demonstrated.Type: GrantFiled: September 21, 2018Date of Patent: December 22, 2020Assignee: ARCHITECTURE TECHNOLOGY CORPORATIONInventors: Stephen K. Brueckner, Matthew P. Donovan
-
Patent number: 10803766Abstract: An example method includes deploying, by a modular training system and on one or more virtual machines in a network, one or more training environments that are configured to execute one or more training exercises; deploying, by the modular training system and for execution by one or more remote host computing systems that are communicatively coupled to the network, one or more software agents that are executed during the one or more training exercises, wherein the one or more software agents are configured to collect parameter data from the one or more remote host computing systems while the one or more trainees perform actions during the training exercise; and receiving, by the modular training system and from the one or more remote host computing system via the network, the parameter data collected by the one or more software agents during execution of the one or more training exercises.Type: GrantFiled: September 21, 2017Date of Patent: October 13, 2020Assignee: ARCHITECTURE TECHNOLOGY CORPORATIONInventors: Matthew P. Donovan, Tyler J. Mitchell, Dahyun Hollister
-
Patent number: 10777093Abstract: This disclosure generally relates to automated execution and evaluation of computer network training exercises, such as in a virtual machine environment. An example environment includes a control and monitoring system, an attack system, and a target system. The control and monitoring system initiates a training scenario to cause the attack system to engage in an attack against the target system. The target system then performs an action in response to the attack. Monitor information associated with the attack against the target system is collected by continuously monitoring the training scenario. The attack system is then capable of sending dynamic response data to the target system, wherein the dynamic response data is generated according to the collected monitor information to adapt the training scenario to the action performed by the target system. The control and monitoring system then generates an automated evaluation based upon the collected monitor information.Type: GrantFiled: August 9, 2018Date of Patent: September 15, 2020Assignee: ARCHITECTURE TECHNOLOGY CORPORATIONInventors: Stephen K. Brueckner, Frank N. Adelstein, Haim Yehuda Bar, Matthew P. Donovan
-
Patent number: 10558809Abstract: An example method includes monitoring execution of one or more applications on a runtime computing system that includes a plurality of processing units, receiving, from the runtime computing system during execution of the applications, monitoring information that includes at least one of function call data or application programming interface call data associated with operations performed by the plurality of processing units during execution of the applications, importing the monitoring information into a risk model, analyzing the monitoring information within the risk model to determine one or more potential vulnerabilities and one or more impacts of the one or more vulnerabilities in the runtime computing system, and outputting, for display in a graphical user interface, a graphical representation of the one or more potential vulnerabilities and the one or more impacts within the risk model.Type: GrantFiled: April 12, 2017Date of Patent: February 11, 2020Assignee: ARCHITECTURE TECHNOLOGY CORPORATIONInventors: Robert A. Joyce, Matthew P. Donovan
-
Patent number: 10346628Abstract: An example method includes selecting, based at least on first and second policies, first and second containers in which to execute first and second applications, respectively. The example method further includes isolating execution of the first application in the first container, and isolating execution of the second application in the second container. The example method also includes applying, based at least on the first policy, a first group of security controls to the first application executing in the first container, wherein the first container defines a first domain in which the first application is executed, and applying, based at least on the second policy, a second group of security controls to the second application executing in the second container, wherein the second container defines a second domain in which the second application is executed.Type: GrantFiled: May 25, 2016Date of Patent: July 9, 2019Assignee: Architecture Technology CorporationInventors: Daniel James Tingstrom, Judson Powers, Matthew P. Donovan
-
Patent number: 10346612Abstract: An example method includes storing a scenario event list that defines one or more events associated with a training exercise, and configuring, based on the events defined in the scenario event list, one or more software agents to emulate one or more cyber-attacks against a host computing system during the training exercise, which includes configuring the software agents to save a state of one or more resources of the host computing system prior to emulating the cyber-attacks and to restore the state of the resources upon conclusion of the cyber-attacks. The example method further includes deploying the software agents for execution on the host computing system during the training exercise to emulate the cyber-attacks against the host computing system using one or more operational networks.Type: GrantFiled: June 19, 2017Date of Patent: July 9, 2019Assignee: Architecture Technology CorporationInventors: Matthew P. Donovan, Robert A. Joyce, Judson Powers, Dahyun Hollister
-
Patent number: 10083624Abstract: An example method includes outputting a graphical dashboard that includes one or more learning objective nodes and one or more skill nodes, selecting one or more software agents that are associated with the one or more skill nodes, providing, to at least one host computing system, an indication of the one or more software agents that are configured to collect parameter data from the at least one host computing system while a trainee performs actions, receiving the parameter data collected by the one or more software agents during execution, determining, based on the parameter data, that the one or more skills represented by the one or more skill nodes have been demonstrated by the trainee, and updating the one or more skill nodes to graphically indicate that one or more represented skills have been demonstrated.Type: GrantFiled: July 28, 2015Date of Patent: September 25, 2018Assignee: Architecture Technology CorporationInventors: Stephen K. Brueckner, Matthew P. Donovan
-
Patent number: 10068493Abstract: This disclosure generally relates to automated execution and evaluation of computer network training exercises, such as in a virtual machine environment. An example environment includes a control and monitoring system, an attack system, and a target system. The control and monitoring system initiates a training scenario to cause the attack system to engage in an attack against the target system. The target system then performs an action in response to the attack. Monitor information associated with the attack against the target system is collected by continuously monitoring the training scenario. The attack system is then capable of sending dynamic response data to the target system, wherein the dynamic response data is generated according to the collected monitor information to adapt the training scenario to the action performed by the target system. The control and monitoring system then generates an automated evaluation based upon the collected monitor information.Type: GrantFiled: June 30, 2016Date of Patent: September 4, 2018Assignee: Architecture Technology CorporationInventors: Stephen K. Brueckner, Frank N. Adelstein, Haim Yehuda Bar, Matthew P. Donovan
-
Patent number: 10067787Abstract: This disclosure provides example techniques to invoke one or more forensic tools, with a forensic investigative tool. The forensic investigative tool provides a common framework that allows investigators to invoke their own trusted forensic tools or third-party generated forensic tools. The forensic investigative tool described herein seamlessly and transparently invokes the forensic tools in accordance with an investigative profile created by the investigator.Type: GrantFiled: February 10, 2011Date of Patent: September 4, 2018Assignee: Architecture Technology CorporationInventors: Derek P. Bronner, Robert A. Joyce, Matthew P. Donovan, Julia A. Baker
-
Patent number: 10057298Abstract: This disclosure provides example techniques to invoke one or more tools, with an investigative tool. The investigative tool provides a common framework that allows investigators to invoke their own trusted tools or third-party generated tools. The investigative tool described herein seamlessly and transparently invokes the tools in accordance with an investigative profile created by the investigator.Type: GrantFiled: February 10, 2011Date of Patent: August 21, 2018Assignee: Architecture Technology CorporationInventors: Derek P. Bronner, Robert A. Joyce, Matthew P. Donovan, Julia A. Baker
-
Publication number: 20170177892Abstract: An example method includes selecting, based at least on first and second policies, first and second containers in which to execute first and second applications, respectively. The example method further includes isolating execution of the first application in the first container, and isolating execution of the second application in the second container. The example method also includes applying, based at least on the first policy, a first group of security controls to the first application executing in the first container, wherein the first container defines a first domain in which the first application is executed, and applying, based at least on the second policy, a second group of security controls to the second application executing in the second container, wherein the second container defines a second domain in which the second application is executed.Type: ApplicationFiled: May 25, 2016Publication date: June 22, 2017Inventors: Daniel James Tingstrom, Judson Powers, Matthew P. Donovan
-
Publication number: 20170032694Abstract: An example method includes outputting a graphical dashboard that includes one or more learning objective nodes and one or more skill nodes, selecting one or more software agents that are associated with the one or more skill nodes, providing, to at least one host computing system, an indication of the one or more software agents that are configured to collect parameter data from the at least one host computing system while a trainee performs actions, receiving the parameter data collected by the one or more software agents during execution, determining, based on the parameter data, that the one or more skills represented by the one or more skill nodes have been demonstrated by the trainee, and updating the one or more skill nodes to graphically indicate that one or more represented skills have been demonstrated.Type: ApplicationFiled: July 28, 2015Publication date: February 2, 2017Inventors: Stephen K. Brueckner, Matthew P. Donovan
-
Publication number: 20170032695Abstract: This disclosure generally relates to automated execution and evaluation of computer network training exercises, such as in a virtual machine environment. An example environment includes a control and monitoring system, an attack system, and a target system. The control and monitoring system initiates a training scenario to cause the attack system to engage in an attack against the target system. The target system then performs an action in response to the attack. Monitor information associated with the attack against the target system is collected by continuously monitoring the training scenario. The attack system is then capable of sending dynamic response data to the target system, wherein the dynamic response data is generated according to the collected monitor information to adapt the training scenario to the action performed by the target system. The control and monitoring system then generates an automated evaluation based upon the collected monitor information.Type: ApplicationFiled: June 30, 2016Publication date: February 2, 2017Inventors: Stephen K. Brueckner, Frank N. Adelstein, Haim Yehuda Bar, Matthew P. Donovan
-
Patent number: 9384677Abstract: This disclosure generally relates to automated execution and evaluation of computer network training exercises, such as in a virtual machine environment. An example environment includes a control and monitoring system, an attack system, and a target system. The control and monitoring system initiates a training scenario to cause the attack system to engage in an attack against the target system. The target system then performs an action in response to the attack. Monitor information associated with the attack against the target system is collected by continuously monitoring the training scenario. The attack system is then capable of sending dynamic response data to the target system, wherein the dynamic response data is generated according to the collected monitor information to adapt the training scenario to the action performed by the target system. The control and monitoring system then generates an automated evaluation based upon the collected monitor information.Type: GrantFiled: April 10, 2015Date of Patent: July 5, 2016Assignee: Architecture Technology CorporationInventors: Stephen K. Brueckner, Frank N. Adelstein, Haim Yehuda Bar, Matthew P. Donovan
-
Publication number: 20150213730Abstract: This disclosure generally relates to automated execution and evaluation of computer network training exercises, such as in a virtual machine environment. An example environment includes a control and monitoring system, an attack system, and a target system. The control and monitoring system initiates a training scenario to cause the attack system to engage in an attack against the target system. The target system then performs an action in response to the attack. Monitor information associated with the attack against the target system is collected by continuously monitoring the training scenario. The attack system is then capable of sending dynamic response data to the target system, wherein the dynamic response data is generated according to the collected monitor information to adapt the training scenario to the action performed by the target system. The control and monitoring system then generates an automated evaluation based upon the collected monitor information.Type: ApplicationFiled: April 10, 2015Publication date: July 30, 2015Inventors: Stephen K. Brueckner, Frank N. Adelstein, Haim Yehuda Bar, Matthew P. Donovan
-
Patent number: 9081911Abstract: In an example, an apparatus includes a memory storing a hypervisor, where the hypervisor is configured to determine whether one or more universal serial bus (USB) devices in communication with the hypervisor are authorized to communicate with a guest operating system of the hypervisor and, after determining that the one or more USB devices are authorized to communicate with the guest, virtualize the one or more USB devices at the guest operating system and transfer messages between the one or more USB devices and the virtualized USB device.Type: GrantFiled: July 23, 2014Date of Patent: July 14, 2015Assignee: Architecture Technology CorporationInventors: Judson Powers, Matthew P. Donovan