Patents by Inventor Matthew P. Moynahan
Matthew P. Moynahan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11783053Abstract: A system, method, and computer-readable medium are disclosed for performing an entity behavior cataloging operation. The entity behavior cataloging operation includes: identifying a security related activity, the security related activity being based upon an observable from an electronic data source; analyzing the security related activity, the analyzing identifying an event of analytic utility associated with the security related activity; generating entity behavior catalog data based upon the event of analytic utility associated with the security related activity; and, storing the entity behavior catalog data within an entity behavior catalog, the entity behavior catalog providing an inventory of entity behaviors for use when performing a security operation.Type: GrantFiled: March 31, 2022Date of Patent: October 10, 2023Assignee: Forcepoint LLCInventors: Raffael Marty, Alan Ross, Nicolas Christian Fischbach, Matthew P. Moynahan, Chad Anson
-
Patent number: 11675910Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing at least one electronically-observable data source; deriving an observable based upon the monitoring of the electronically-observable data source; identifying a security related activity of the entity, the security related activity being based upon the observable derived from the electronic data source, the security related activity being of analytic utility; converting the security related activity to entity behavior catalog data, the entity behavior catalog providing an inventory of entity behaviors; and, accessing an entity behavior catalog based upon the entity behavior catalog data; and performing a security operation via a security system, the security operation using the entity behavior catalog data stored within the entity behavior catalog based upon the security related activity.Type: GrantFiled: February 14, 2020Date of Patent: June 13, 2023Assignee: Forcepoint LLCInventors: Alan Ross, Raffael Marty, Nicolas Christian Fischbach, Matthew P. Moynahan, Chad Anson
-
Patent number: 11487883Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation.Type: GrantFiled: February 14, 2020Date of Patent: November 1, 2022Assignee: Forcepoint LLCInventors: Raffael Marty, Alan Ross, Nicolas Christian Fischbach, Matthew P. Moynahan, Chad Anson
-
Publication number: 20220222355Abstract: A system, method, and computer-readable medium are disclosed for performing an entity behavior cataloging operation. The entity behavior cataloging operation includes: identifying a security related activity, the security related activity being based upon an observable from an electronic data source; analyzing the security related activity, the analyzing identifying an event of analytic utility associated with the security related activity; generating entity behavior catalog data based upon the event of analytic utility associated with the security related activity; and, storing the entity behavior catalog data within an entity behavior catalog, the entity behavior catalog providing an inventory of entity behaviors for use when performing a security operation.Type: ApplicationFiled: March 31, 2022Publication date: July 14, 2022Inventors: Raffael Marty, Alan Ross, Nicolas Christian Fischbach, Matthew P. Moynahan, Chad Anson
-
Patent number: 11295022Abstract: A system, method, and computer-readable medium are disclosed for performing an entity behavior cataloging operation. The entity behavior cataloging operation includes: identifying a security related activity, the security related activity being based upon an observable from an electronic data source; analyzing the security related activity, the analyzing identifying an event of analytic utility associated with the security related activity; generating entity behavior catalog data based upon the event of analytic utility associated with the security related activity; and, storing the entity behavior catalog data within an entity behavior catalog, the entity behavior catalog providing an inventory of entity behaviors for use when performing a security operation.Type: GrantFiled: February 14, 2020Date of Patent: April 5, 2022Assignee: Forcepoint, LLCInventors: Raffael Marty, Alan Ross, Nicolas Christian Fischbach, Matthew P. Moynahan, Chad Anson
-
Publication number: 20210224394Abstract: A system, method, and computer-readable medium are disclosed for performing an entity behavior cataloging operation. The entity behavior cataloging operation includes: identifying a security related activity, the security related activity being based upon an observable from an electronic data source; analyzing the security related activity, the analyzing identifying an event of analytic utility associated with the security related activity; generating entity behavior catalog data based upon the event of analytic utility associated with the security related activity; and, storing the entity behavior catalog data within an entity behavior catalog, the entity behavior catalog providing an inventory of entity behaviors for use when performing a security operation.Type: ApplicationFiled: February 14, 2020Publication date: July 22, 2021Inventors: Raffael Marty, Alan Ross, Nicolas Christian Fischbach, Matthew P. Moynahan, Chad Anson
-
Publication number: 20210226982Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation.Type: ApplicationFiled: February 14, 2020Publication date: July 22, 2021Inventors: Raffael Marty, Alan Ross, Nicolas Christian Fischbach, Matthew P. Moynahan, Chad Anson
-
Publication number: 20210224382Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing at least one electronically-observable data source; deriving an observable based upon the monitoring of the electronically-observable data source; identifying a security related activity of the entity, the security related activity being based upon the observable derived from the electronic data source, the security related activity being of analytic utility; converting the security related activity to entity behavior catalog data, the entity behavior catalog providing an inventory of entity behaviors; and, accessing an entity behavior catalog based upon the entity behavior catalog data; and performing a security operation via a security system, the security operation using the entity behavior catalog data stored within the entity behavior catalog based upon the security related activity.Type: ApplicationFiled: February 14, 2020Publication date: July 22, 2021Inventors: Alan Ross, Raffael Marty, Nicolas Christian Fischbach, Matthew P. Moynahan, Chad Anson
-
Patent number: 10776497Abstract: Security analysis and vulnerability testing results are “packaged” or “bound to” the actual software it describes. By linking the results to the software itself, downstream users of the software can access information about the software, make informed decisions about implementation of the software, and analyze the security risk across an entire system by accessing all (or most) of the reports associated with the executables running on the system and summarizing the risks identified in the reports.Type: GrantFiled: April 29, 2019Date of Patent: September 15, 2020Assignee: Veracode, Inc.Inventors: Christopher J. Wysopal, Christopher J. Eng, Matthew P. Moynahan
-
Patent number: 10542013Abstract: A method, system and computer-usable medium are disclosed for generating a cyber behavior profile, comprising: monitoring user interactions between a user and an information handling system; converting the user interactions and the information about the user into electronic information representing the user interactions; generating a unique cyber behavior profile based upon the electronic information representing the user interactions and the information about the user; and, storing information relating to the unique cyber behavior profile in a behavior blockchain.Type: GrantFiled: August 13, 2018Date of Patent: January 21, 2020Assignee: Forcepoint LLCInventors: Richard Anthony Ford, Brandon L. Swafford, Christopher Brian Shirey, Matthew P. Moynahan, Richard Heath Thompson
-
Publication number: 20190251267Abstract: Security analysis and vulnerability testing results are “packaged” or “bound to” the actual software it describes. By linking the results to the software itself, downstream users of the software can access information about the software, make informed decisions about implementation of the software, and analyze the security risk across an entire system by accessing all (or most) of the reports associated with the executables running on the system and summarizing the risks identified in the reports.Type: ApplicationFiled: April 29, 2019Publication date: August 15, 2019Inventors: Christopher J. Wysopal, Christopher J. Eng, Matthew P. Moynahan
-
Patent number: 10275600Abstract: Security analysis and vulnerability testing results are “packaged” or “bound to” the actual software it describes. By linking the results to the software itself, downstream users of the software can access information about the software, make informed decisions about implementation of the software, and analyze the security risk across an entire system by accessing all (or most) of the reports associated with the executables running on the system and summarizing the risks identified in the reports.Type: GrantFiled: May 26, 2015Date of Patent: April 30, 2019Assignee: Veracode, Inc.Inventors: Christopher J. Wysopal, Christopher J. Eng, Matthew P. Moynahan
-
Patent number: 10264012Abstract: A method, system and computer-usable medium are disclosed for generating a cyber behavior profile comprising monitoring user interactions between a user and an information handling system; converting the user interactions into electronic information representing the user interactions, the electronic information representing the user interactions comprising multi-layered electronic information, each layer of the multi-layered electronic information corresponding to a respective layer of user interaction; and generating a unique multi-dimensional cyber behavior profile based upon the multi-layered electronic information representing the user interactions.Type: GrantFiled: April 20, 2018Date of Patent: April 16, 2019Assignee: Forcepoint, LLCInventors: Matthew P. Moynahan, Richard Anthony Ford, Christopher Brian Shirey, Brandon L. Swafford, Richard Heath Thompson
-
Publication number: 20190007424Abstract: A method, system and computer-usable medium are disclosed for generating a cyber behavior profile, comprising: monitoring user interactions between a user and an information handling system; converting the user interactions and the information about the user into electronic information representing the user interactions; generating a unique cyber behavior profile based upon the electronic information representing the user interactions and the information about the user; and, storing information relating to the unique cyber behavior profile in a behavior blockchain.Type: ApplicationFiled: August 13, 2018Publication date: January 3, 2019Inventors: Richard Anthony Ford, Brandon L. Swafford, Christopher Brian Shirey, Matthew P. Moynahan, Richard Heath Thompson
-
Patent number: 10171488Abstract: A method, system and computer-usable medium are disclosed for generating a cyber behavior profile comprising monitoring user interactions between a user and an information handling system; converting the user interactions into electronic information representing the user interactions, the electronic information representing the user interactions comprising multi-layered electronic information, each layer of the multi-layered electronic information corresponding to a respective layer of user interaction; and generating a unique multi-dimensional cyber behavior profile based upon the multi-layered electronic information representing the user interactions.Type: GrantFiled: January 11, 2018Date of Patent: January 1, 2019Assignee: Forcepoint, LLCInventors: Matthew P. Moynahan, Richard Anthony Ford, Christopher Brian Shirey, Brandon L. Swafford, Richard Heath Thompson
-
Publication number: 20180332066Abstract: A method, system and computer-usable medium are disclosed for generating a cyber behavior profile comprising monitoring user interactions between a user and an information handling system; converting the user interactions into electronic information representing the user interactions, the electronic information representing the user interactions comprising multi-layered electronic information, each layer of the multi-layered electronic information corresponding to a respective layer of user interaction; and generating a unique multi-dimensional cyber behavior profile based upon the multi-layered electronic information representing the user interactions.Type: ApplicationFiled: January 11, 2018Publication date: November 15, 2018Inventors: Matthew P. Moynahan, Richard Anthony Ford, Christopher Brian Shirey, Brandon L. Swafford, Richard Heath Thompson
-
Publication number: 20180332068Abstract: A method, system and computer-usable medium are disclosed for generating a cyber behavior profile comprising monitoring user interactions between a user and an information handling system; converting the user interactions into electronic information representing the user interactions, the electronic information representing the user interactions comprising multi-layered electronic information, each layer of the multi-layered electronic information corresponding to a respective layer of user interaction; and generating a unique multi-dimensional cyber behavior profile based upon the multi-layered electronic information representing the user interactions.Type: ApplicationFiled: April 20, 2018Publication date: November 15, 2018Inventors: Matthew P. Moynahan, Richard Anthony Ford, Christopher Brian Shirey, Brandon L. Swafford, Richard Heath Thompson
-
Patent number: 10063568Abstract: A method, system and computer-usable medium are disclosed for generating a cyber behavior profile, comprising: monitoring user interactions between a user and an information handling system; converting the user interactions and the information about the user into electronic information representing the user interactions; generating a unique cyber behavior profile based upon the electronic information representing the user interactions and the information about the user; and, storing information relating to the unique cyber behavior profile in a behavior blockchain.Type: GrantFiled: January 24, 2018Date of Patent: August 28, 2018Assignee: Forcepoint LLCInventors: Richard Anthony Ford, Brandon L. Swafford, Christopher Brian Shirey, Matthew P. Moynahan, Richard Heath Thompson
-
Patent number: 9882918Abstract: A method, system and computer-usable medium are disclosed for generating a cyber behavior profile, comprising: monitoring user interactions between a user and an information handling system; converting the user interactions and the information about the user into electronic information representing the user interactions; generating a unique cyber behavior profile based upon the electronic information representing the user interactions and the information about the user; and, storing information relating to the unique cyber behavior profile in a behavior blockchain.Type: GrantFiled: September 29, 2017Date of Patent: January 30, 2018Assignee: Forcepoint, LLCInventors: Richard Anthony Ford, Brandon L. Swafford, Christopher Brian Shirey, Matthew P. Moynahan, Richard Heath Thompson
-
Publication number: 20160098564Abstract: Security analysis and vulnerability testing results are “packaged” or “bound to” the actual software it describes. By linking the results to the software itself, downstream users of the software can access information about the software, make informed decisions about implementation of the software, and analyze the security risk across an entire system by accessing all (or most) of the reports associated with the executables running on the system and summarizing the risks identified in the reports.Type: ApplicationFiled: May 26, 2015Publication date: April 7, 2016Inventors: Christopher J. Wysopal, Christopher J. Eng, Matthew P. Moynahan