Patents by Inventor Matthew P. Donovan

Matthew P. Donovan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11057438
    Abstract: This disclosure provides example techniques to invoke one or more tools, with an investigative tool. The investigative tool provides a common framework that allows investigators to invoke their own trusted tools or third-party generated tools. The investigative tool described herein seamlessly and transparently invokes the tools in accordance with an investigative profile created by the investigator.
    Type: Grant
    Filed: August 20, 2018
    Date of Patent: July 6, 2021
    Assignee: ARCHITECTURE TECHNOLOGY CORPORATION
    Inventors: Derek P. Bronner, Robert A. Joyce, Matthew P. Donovan, Julia A. Baker
  • Patent number: 11042647
    Abstract: An example method includes monitoring execution of one or more applications on a runtime computing system that includes a plurality of processing units, receiving, from the runtime computing system during execution of the applications, monitoring information that includes at least one of function call data or application programming interface call data associated with operations performed by the plurality of processing units during execution of the applications, importing the monitoring information into a risk model, analyzing the monitoring information within the risk model to determine one or more potential vulnerabilities and one or more impacts of the one or more vulnerabilities in the runtime computing system, and outputting, for display in a graphical user interface, a graphical representation of the one or more potential vulnerabilities and the one or more impacts within the risk model.
    Type: Grant
    Filed: December 20, 2019
    Date of Patent: June 22, 2021
    Assignee: ARCHITECTURE TECHNOLOGY CORPORATION
    Inventors: Robert A. Joyce, Matthew P. Donovan
  • Patent number: 10909244
    Abstract: An example method includes storing a scenario event list that defines one or more events associated with a training exercise, and configuring, based on the events defined in the scenario event list, one or more software agents to emulate one or more cyber-attacks against a host computing system during the training exercise, which includes configuring the software agents to save a state of one or more resources of the host computing system prior to emulating the cyber-attacks and to restore the state of the resources upon conclusion of the cyber-attacks. The example method further includes deploying the software agents for execution on the host computing system during the training exercise to emulate the cyber-attacks against the host computing system using one or more operational networks.
    Type: Grant
    Filed: July 3, 2019
    Date of Patent: February 2, 2021
    Assignee: ARCHITECTURE TECHNOLOGY CORPORATION
    Inventors: Matthew P. Donovan, Robert A. Joyce, Judson Powers, Dahyun Hollister
  • Patent number: 10909257
    Abstract: An example method includes selecting, based at least on first and second policies, first and second containers in which to execute first and second applications, respectively. The example method further includes isolating execution of the first application in the first container, and isolating execution of the second application in the second container. The example method also includes applying, based at least on the first policy, a first group of security controls to the first application executing in the first container, wherein the first container defines a first domain in which the first application is executed, and applying, based at least on the second policy, a second group of security controls to the second application executing in the second container, wherein the second container defines a second domain in which the second application is executed.
    Type: Grant
    Filed: July 2, 2019
    Date of Patent: February 2, 2021
    Assignee: ARCHITECTURE TECHNOLOGY CORPORATION
    Inventors: Daniel James Tingstrom, Judson Powers, Matthew P. Donovan
  • Patent number: 10872539
    Abstract: An example method includes outputting a graphical dashboard that includes one or more learning objective nodes and one or more skill nodes, selecting one or more software agents that are associated with the one or more skill nodes, providing, to at least one host computing system, an indication of the one or more software agents that are configured to collect parameter data from the at least one host computing system while a trainee performs actions, receiving the parameter data collected by the one or more software agents during execution, determining, based on the parameter data, that the one or more skills represented by the one or more skill nodes have been demonstrated by the trainee, and updating the one or more skill nodes to graphically indicate that one or more represented skills have been demonstrated.
    Type: Grant
    Filed: September 21, 2018
    Date of Patent: December 22, 2020
    Assignee: ARCHITECTURE TECHNOLOGY CORPORATION
    Inventors: Stephen K. Brueckner, Matthew P. Donovan
  • Patent number: 10803766
    Abstract: An example method includes deploying, by a modular training system and on one or more virtual machines in a network, one or more training environments that are configured to execute one or more training exercises; deploying, by the modular training system and for execution by one or more remote host computing systems that are communicatively coupled to the network, one or more software agents that are executed during the one or more training exercises, wherein the one or more software agents are configured to collect parameter data from the one or more remote host computing systems while the one or more trainees perform actions during the training exercise; and receiving, by the modular training system and from the one or more remote host computing system via the network, the parameter data collected by the one or more software agents during execution of the one or more training exercises.
    Type: Grant
    Filed: September 21, 2017
    Date of Patent: October 13, 2020
    Assignee: ARCHITECTURE TECHNOLOGY CORPORATION
    Inventors: Matthew P. Donovan, Tyler J. Mitchell, Dahyun Hollister
  • Patent number: 10777093
    Abstract: This disclosure generally relates to automated execution and evaluation of computer network training exercises, such as in a virtual machine environment. An example environment includes a control and monitoring system, an attack system, and a target system. The control and monitoring system initiates a training scenario to cause the attack system to engage in an attack against the target system. The target system then performs an action in response to the attack. Monitor information associated with the attack against the target system is collected by continuously monitoring the training scenario. The attack system is then capable of sending dynamic response data to the target system, wherein the dynamic response data is generated according to the collected monitor information to adapt the training scenario to the action performed by the target system. The control and monitoring system then generates an automated evaluation based upon the collected monitor information.
    Type: Grant
    Filed: August 9, 2018
    Date of Patent: September 15, 2020
    Assignee: ARCHITECTURE TECHNOLOGY CORPORATION
    Inventors: Stephen K. Brueckner, Frank N. Adelstein, Haim Yehuda Bar, Matthew P. Donovan
  • Patent number: 10558809
    Abstract: An example method includes monitoring execution of one or more applications on a runtime computing system that includes a plurality of processing units, receiving, from the runtime computing system during execution of the applications, monitoring information that includes at least one of function call data or application programming interface call data associated with operations performed by the plurality of processing units during execution of the applications, importing the monitoring information into a risk model, analyzing the monitoring information within the risk model to determine one or more potential vulnerabilities and one or more impacts of the one or more vulnerabilities in the runtime computing system, and outputting, for display in a graphical user interface, a graphical representation of the one or more potential vulnerabilities and the one or more impacts within the risk model.
    Type: Grant
    Filed: April 12, 2017
    Date of Patent: February 11, 2020
    Assignee: ARCHITECTURE TECHNOLOGY CORPORATION
    Inventors: Robert A. Joyce, Matthew P. Donovan
  • Patent number: 10346628
    Abstract: An example method includes selecting, based at least on first and second policies, first and second containers in which to execute first and second applications, respectively. The example method further includes isolating execution of the first application in the first container, and isolating execution of the second application in the second container. The example method also includes applying, based at least on the first policy, a first group of security controls to the first application executing in the first container, wherein the first container defines a first domain in which the first application is executed, and applying, based at least on the second policy, a second group of security controls to the second application executing in the second container, wherein the second container defines a second domain in which the second application is executed.
    Type: Grant
    Filed: May 25, 2016
    Date of Patent: July 9, 2019
    Assignee: Architecture Technology Corporation
    Inventors: Daniel James Tingstrom, Judson Powers, Matthew P. Donovan
  • Patent number: 10346612
    Abstract: An example method includes storing a scenario event list that defines one or more events associated with a training exercise, and configuring, based on the events defined in the scenario event list, one or more software agents to emulate one or more cyber-attacks against a host computing system during the training exercise, which includes configuring the software agents to save a state of one or more resources of the host computing system prior to emulating the cyber-attacks and to restore the state of the resources upon conclusion of the cyber-attacks. The example method further includes deploying the software agents for execution on the host computing system during the training exercise to emulate the cyber-attacks against the host computing system using one or more operational networks.
    Type: Grant
    Filed: June 19, 2017
    Date of Patent: July 9, 2019
    Assignee: Architecture Technology Corporation
    Inventors: Matthew P. Donovan, Robert A. Joyce, Judson Powers, Dahyun Hollister
  • Patent number: 10083624
    Abstract: An example method includes outputting a graphical dashboard that includes one or more learning objective nodes and one or more skill nodes, selecting one or more software agents that are associated with the one or more skill nodes, providing, to at least one host computing system, an indication of the one or more software agents that are configured to collect parameter data from the at least one host computing system while a trainee performs actions, receiving the parameter data collected by the one or more software agents during execution, determining, based on the parameter data, that the one or more skills represented by the one or more skill nodes have been demonstrated by the trainee, and updating the one or more skill nodes to graphically indicate that one or more represented skills have been demonstrated.
    Type: Grant
    Filed: July 28, 2015
    Date of Patent: September 25, 2018
    Assignee: Architecture Technology Corporation
    Inventors: Stephen K. Brueckner, Matthew P. Donovan
  • Patent number: 10068493
    Abstract: This disclosure generally relates to automated execution and evaluation of computer network training exercises, such as in a virtual machine environment. An example environment includes a control and monitoring system, an attack system, and a target system. The control and monitoring system initiates a training scenario to cause the attack system to engage in an attack against the target system. The target system then performs an action in response to the attack. Monitor information associated with the attack against the target system is collected by continuously monitoring the training scenario. The attack system is then capable of sending dynamic response data to the target system, wherein the dynamic response data is generated according to the collected monitor information to adapt the training scenario to the action performed by the target system. The control and monitoring system then generates an automated evaluation based upon the collected monitor information.
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: September 4, 2018
    Assignee: Architecture Technology Corporation
    Inventors: Stephen K. Brueckner, Frank N. Adelstein, Haim Yehuda Bar, Matthew P. Donovan
  • Patent number: 10067787
    Abstract: This disclosure provides example techniques to invoke one or more forensic tools, with a forensic investigative tool. The forensic investigative tool provides a common framework that allows investigators to invoke their own trusted forensic tools or third-party generated forensic tools. The forensic investigative tool described herein seamlessly and transparently invokes the forensic tools in accordance with an investigative profile created by the investigator.
    Type: Grant
    Filed: February 10, 2011
    Date of Patent: September 4, 2018
    Assignee: Architecture Technology Corporation
    Inventors: Derek P. Bronner, Robert A. Joyce, Matthew P. Donovan, Julia A. Baker
  • Patent number: 10057298
    Abstract: This disclosure provides example techniques to invoke one or more tools, with an investigative tool. The investigative tool provides a common framework that allows investigators to invoke their own trusted tools or third-party generated tools. The investigative tool described herein seamlessly and transparently invokes the tools in accordance with an investigative profile created by the investigator.
    Type: Grant
    Filed: February 10, 2011
    Date of Patent: August 21, 2018
    Assignee: Architecture Technology Corporation
    Inventors: Derek P. Bronner, Robert A. Joyce, Matthew P. Donovan, Julia A. Baker
  • Publication number: 20170177892
    Abstract: An example method includes selecting, based at least on first and second policies, first and second containers in which to execute first and second applications, respectively. The example method further includes isolating execution of the first application in the first container, and isolating execution of the second application in the second container. The example method also includes applying, based at least on the first policy, a first group of security controls to the first application executing in the first container, wherein the first container defines a first domain in which the first application is executed, and applying, based at least on the second policy, a second group of security controls to the second application executing in the second container, wherein the second container defines a second domain in which the second application is executed.
    Type: Application
    Filed: May 25, 2016
    Publication date: June 22, 2017
    Inventors: Daniel James Tingstrom, Judson Powers, Matthew P. Donovan
  • Publication number: 20170032694
    Abstract: An example method includes outputting a graphical dashboard that includes one or more learning objective nodes and one or more skill nodes, selecting one or more software agents that are associated with the one or more skill nodes, providing, to at least one host computing system, an indication of the one or more software agents that are configured to collect parameter data from the at least one host computing system while a trainee performs actions, receiving the parameter data collected by the one or more software agents during execution, determining, based on the parameter data, that the one or more skills represented by the one or more skill nodes have been demonstrated by the trainee, and updating the one or more skill nodes to graphically indicate that one or more represented skills have been demonstrated.
    Type: Application
    Filed: July 28, 2015
    Publication date: February 2, 2017
    Inventors: Stephen K. Brueckner, Matthew P. Donovan
  • Publication number: 20170032695
    Abstract: This disclosure generally relates to automated execution and evaluation of computer network training exercises, such as in a virtual machine environment. An example environment includes a control and monitoring system, an attack system, and a target system. The control and monitoring system initiates a training scenario to cause the attack system to engage in an attack against the target system. The target system then performs an action in response to the attack. Monitor information associated with the attack against the target system is collected by continuously monitoring the training scenario. The attack system is then capable of sending dynamic response data to the target system, wherein the dynamic response data is generated according to the collected monitor information to adapt the training scenario to the action performed by the target system. The control and monitoring system then generates an automated evaluation based upon the collected monitor information.
    Type: Application
    Filed: June 30, 2016
    Publication date: February 2, 2017
    Inventors: Stephen K. Brueckner, Frank N. Adelstein, Haim Yehuda Bar, Matthew P. Donovan
  • Patent number: 9384677
    Abstract: This disclosure generally relates to automated execution and evaluation of computer network training exercises, such as in a virtual machine environment. An example environment includes a control and monitoring system, an attack system, and a target system. The control and monitoring system initiates a training scenario to cause the attack system to engage in an attack against the target system. The target system then performs an action in response to the attack. Monitor information associated with the attack against the target system is collected by continuously monitoring the training scenario. The attack system is then capable of sending dynamic response data to the target system, wherein the dynamic response data is generated according to the collected monitor information to adapt the training scenario to the action performed by the target system. The control and monitoring system then generates an automated evaluation based upon the collected monitor information.
    Type: Grant
    Filed: April 10, 2015
    Date of Patent: July 5, 2016
    Assignee: Architecture Technology Corporation
    Inventors: Stephen K. Brueckner, Frank N. Adelstein, Haim Yehuda Bar, Matthew P. Donovan
  • Publication number: 20150213730
    Abstract: This disclosure generally relates to automated execution and evaluation of computer network training exercises, such as in a virtual machine environment. An example environment includes a control and monitoring system, an attack system, and a target system. The control and monitoring system initiates a training scenario to cause the attack system to engage in an attack against the target system. The target system then performs an action in response to the attack. Monitor information associated with the attack against the target system is collected by continuously monitoring the training scenario. The attack system is then capable of sending dynamic response data to the target system, wherein the dynamic response data is generated according to the collected monitor information to adapt the training scenario to the action performed by the target system. The control and monitoring system then generates an automated evaluation based upon the collected monitor information.
    Type: Application
    Filed: April 10, 2015
    Publication date: July 30, 2015
    Inventors: Stephen K. Brueckner, Frank N. Adelstein, Haim Yehuda Bar, Matthew P. Donovan
  • Patent number: 9081911
    Abstract: In an example, an apparatus includes a memory storing a hypervisor, where the hypervisor is configured to determine whether one or more universal serial bus (USB) devices in communication with the hypervisor are authorized to communicate with a guest operating system of the hypervisor and, after determining that the one or more USB devices are authorized to communicate with the guest, virtualize the one or more USB devices at the guest operating system and transfer messages between the one or more USB devices and the virtualized USB device.
    Type: Grant
    Filed: July 23, 2014
    Date of Patent: July 14, 2015
    Assignee: Architecture Technology Corporation
    Inventors: Judson Powers, Matthew P. Donovan