Patents by Inventor Frank N. Adelstein

Frank N. Adelstein has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10777093
    Abstract: This disclosure generally relates to automated execution and evaluation of computer network training exercises, such as in a virtual machine environment. An example environment includes a control and monitoring system, an attack system, and a target system. The control and monitoring system initiates a training scenario to cause the attack system to engage in an attack against the target system. The target system then performs an action in response to the attack. Monitor information associated with the attack against the target system is collected by continuously monitoring the training scenario. The attack system is then capable of sending dynamic response data to the target system, wherein the dynamic response data is generated according to the collected monitor information to adapt the training scenario to the action performed by the target system. The control and monitoring system then generates an automated evaluation based upon the collected monitor information.
    Type: Grant
    Filed: August 9, 2018
    Date of Patent: September 15, 2020
    Assignee: ARCHITECTURE TECHNOLOGY CORPORATION
    Inventors: Stephen K. Brueckner, Frank N. Adelstein, Haim Yehuda Bar, Matthew P. Donovan
  • Patent number: 10068493
    Abstract: This disclosure generally relates to automated execution and evaluation of computer network training exercises, such as in a virtual machine environment. An example environment includes a control and monitoring system, an attack system, and a target system. The control and monitoring system initiates a training scenario to cause the attack system to engage in an attack against the target system. The target system then performs an action in response to the attack. Monitor information associated with the attack against the target system is collected by continuously monitoring the training scenario. The attack system is then capable of sending dynamic response data to the target system, wherein the dynamic response data is generated according to the collected monitor information to adapt the training scenario to the action performed by the target system. The control and monitoring system then generates an automated evaluation based upon the collected monitor information.
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: September 4, 2018
    Assignee: Architecture Technology Corporation
    Inventors: Stephen K. Brueckner, Frank N. Adelstein, Haim Yehuda Bar, Matthew P. Donovan
  • Publication number: 20170032695
    Abstract: This disclosure generally relates to automated execution and evaluation of computer network training exercises, such as in a virtual machine environment. An example environment includes a control and monitoring system, an attack system, and a target system. The control and monitoring system initiates a training scenario to cause the attack system to engage in an attack against the target system. The target system then performs an action in response to the attack. Monitor information associated with the attack against the target system is collected by continuously monitoring the training scenario. The attack system is then capable of sending dynamic response data to the target system, wherein the dynamic response data is generated according to the collected monitor information to adapt the training scenario to the action performed by the target system. The control and monitoring system then generates an automated evaluation based upon the collected monitor information.
    Type: Application
    Filed: June 30, 2016
    Publication date: February 2, 2017
    Inventors: Stephen K. Brueckner, Frank N. Adelstein, Haim Yehuda Bar, Matthew P. Donovan
  • Patent number: 9384677
    Abstract: This disclosure generally relates to automated execution and evaluation of computer network training exercises, such as in a virtual machine environment. An example environment includes a control and monitoring system, an attack system, and a target system. The control and monitoring system initiates a training scenario to cause the attack system to engage in an attack against the target system. The target system then performs an action in response to the attack. Monitor information associated with the attack against the target system is collected by continuously monitoring the training scenario. The attack system is then capable of sending dynamic response data to the target system, wherein the dynamic response data is generated according to the collected monitor information to adapt the training scenario to the action performed by the target system. The control and monitoring system then generates an automated evaluation based upon the collected monitor information.
    Type: Grant
    Filed: April 10, 2015
    Date of Patent: July 5, 2016
    Assignee: Architecture Technology Corporation
    Inventors: Stephen K. Brueckner, Frank N. Adelstein, Haim Yehuda Bar, Matthew P. Donovan
  • Publication number: 20150213730
    Abstract: This disclosure generally relates to automated execution and evaluation of computer network training exercises, such as in a virtual machine environment. An example environment includes a control and monitoring system, an attack system, and a target system. The control and monitoring system initiates a training scenario to cause the attack system to engage in an attack against the target system. The target system then performs an action in response to the attack. Monitor information associated with the attack against the target system is collected by continuously monitoring the training scenario. The attack system is then capable of sending dynamic response data to the target system, wherein the dynamic response data is generated according to the collected monitor information to adapt the training scenario to the action performed by the target system. The control and monitoring system then generates an automated evaluation based upon the collected monitor information.
    Type: Application
    Filed: April 10, 2015
    Publication date: July 30, 2015
    Inventors: Stephen K. Brueckner, Frank N. Adelstein, Haim Yehuda Bar, Matthew P. Donovan
  • Patent number: 9076342
    Abstract: This disclosure generally relates to automated execution and evaluation of computer network training exercises, such as in a virtual machine environment. An example environment includes a control and monitoring system, an attack system, and a target system. The control and monitoring system initiates a training scenario to cause the attack system to engage in an attack against the target system. The target system then performs an action in response to the attack. Monitor information associated with the attack against the target system is collected by continuously monitoring the training scenario. The attack system is then capable of sending dynamic response data to the target system, wherein the dynamic response data is generated according to the collected monitor information to adapt the training scenario to the action performed by the target system. The control and monitoring system then generates an automated evaluation based upon the collected monitor information.
    Type: Grant
    Filed: February 18, 2009
    Date of Patent: July 7, 2015
    Assignee: Architecture Technology Corporation
    Inventors: Stephen Brueckner, Frank N. Adelstein, Haim Bar, Matthew Donovan
  • Patent number: 8862803
    Abstract: An apparatus for mediating communication between a universal serial bus (USB) device and a host computing device is described. In an example, the apparatus includes a USB host interface configured to be connected to a downstream USB device, and a USB device interface configured to be connected to an upstream host computing device. The apparatus also includes a mediation module positioned between the USB host interface and the USB device interface and configured to determine whether the USB device is authorized to communicate with the host computing device.
    Type: Grant
    Filed: May 31, 2011
    Date of Patent: October 14, 2014
    Assignee: Architecture Technology Corporation
    Inventors: Judson Powers, Matthew P. Donovan, Frank N. Adelstein, Michael Kentley, Stephen K. Brueckner
  • Patent number: 8474047
    Abstract: The invention is directed to techniques for allowing a user to remotely interrogate a target computing device in order to collect and analyze computer evidence that may be stored on the target computing device. A forensic device receives input from a remote user that identifies computer evidence to acquire from the target computing device. The forensic device acquires the computer evidence from the target computing device and presents a user interface for the forensic device through which the remote user views the computer evidence acquired from the target computing device. In this manner, forensic device allows the user to interrogate the target computing device to acquire the computer evidence without seizing or otherwise “shutting down” the target device.
    Type: Grant
    Filed: May 7, 2012
    Date of Patent: June 25, 2013
    Assignee: Architecture Technology Corporation
    Inventors: Frank N. Adelstein, Matthew A. Stillerman, Robert A. Joyce
  • Publication number: 20120311207
    Abstract: An apparatus for mediating communication between a universal serial bus (USB) device and a host computing device is described. In an example, the apparatus includes a USB host interface configured to be connected to a downstream USB device, and a USB device interface configured to be connected to an upstream host computing device. The apparatus also includes a mediation module positioned between the USB host interface and the USB device interface and configured to determine whether the USB device is authorized to communicate with the host computing device.
    Type: Application
    Filed: May 31, 2011
    Publication date: December 6, 2012
    Applicant: Architecture Technology Corporation
    Inventors: Judson Powers, Matthew P. Donovan, Frank N. Adelstein, Michael Kentley, Stephen K. Brueckner
  • Patent number: 8286249
    Abstract: Techniques are described for providing security to a protected network. Techniques are described for thwarting attempted network attacks using marked information. The attack correlation system provides marked information to computing devices that probe for sensitive information, and monitors subsequent communications for use of the marked information. In one example, the attack correlation system reroutes communications containing the marked information to a dedicated vulnerable device that logs the communications to monitor the attackers' methods. The attack correlation system may also include functionality to exchange information regarding attempted attacks with other attack correlation systems to gain broader knowledge of attacks throughout one or more networks.
    Type: Grant
    Filed: May 18, 2010
    Date of Patent: October 9, 2012
    Assignee: Architecture Technology Corporation
    Inventors: Frank N. Adelstein, Haim Bar, Prasanth Alla, Nikita Proskourine
  • Publication number: 20120221633
    Abstract: The invention is directed to techniques for allowing a user to remotely interrogate a target computing device in order to collect and analyze computer evidence that may be stored on the target computing device. A forensic device receives input from a remote user that identifies computer evidence to acquire from the target computing device. The forensic device acquires the computer evidence from the target computing device and presents a user interface for the forensic device through which the remote user views the computer evidence acquired from the target computing device. In this manner, forensic device allows the user to interrogate the target computing device to acquire the computer evidence without seizing or otherwise “shutting down” the target device.
    Type: Application
    Filed: May 7, 2012
    Publication date: August 30, 2012
    Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
    Inventors: Frank N. Adelstein, Matthew A. Stillerman, Robert Joyce
  • Patent number: 8176557
    Abstract: The invention is directed to techniques for allowing a user to remotely interrogate a target computing device in order to collect and analyze computer evidence that may be stored on the target computing device. A forensic device receives input from a remote user that identifies computer evidence to acquire from the target computing device. The forensic device acquires the computer evidence from the target computing device and presents a user interface for the forensic device through which the remote user views the computer evidence acquired from the target computing device. In this manner, forensic device allows the user to interrogate the target computing device to acquire the computer evidence without seizing or otherwise “shutting down” the target device.
    Type: Grant
    Filed: February 12, 2009
    Date of Patent: May 8, 2012
    Assignee: Architecture Technology Corporation
    Inventors: Frank N. Adelstein, Matthew A. Stillerman, Robert Joyce
  • Patent number: 7886049
    Abstract: In general, the invention provides for analyzing a target computer for computer crimes such as illegal sharing of files or sharing of illegal files on peer-to-peer clients. The target computer may have software for a plurality of peer-to-peer clients. Only one extensible forensic device may be necessary to analyze the plurality of peer-to-peer clients for downloaded or shared files. For example, the invention may provide for a method comprising determining whether one or more peer-to-peer clients are or have been installed on a target device by identifying information associated with one or more peer-to-peer modules, wherein each module is associated with a different one of the one or more peer-to-peer clients. The method further includes, gathering usage information for the one or more peer-to-peer clients that had been determined to be installed on the target computer, analyzing the usage information, and automatically generating a report of the analyzed usage information.
    Type: Grant
    Filed: August 12, 2008
    Date of Patent: February 8, 2011
    Assignee: Architecture Technology Corporation
    Inventors: Frank N. Adelstein, Judson Powers, Robert A. Joyce, Derek Bronner
  • Publication number: 20100235919
    Abstract: Techniques are described for providing security to a protected network. Techniques are described for thwarting attempted network attacks using marked information. The attack correlation system provides marked information to computing devices that probe for sensitive information, and monitors subsequent communications for use of the marked information. In one example, the attack correlation system reroutes communications containing the marked information to a dedicated vulnerable device that logs the communications to monitor the attackers' methods. The attack correlation system may also include functionality to exchange information regarding attempted attacks with other attack correlation systems to gain broader knowledge of attacks throughout one or more networks.
    Type: Application
    Filed: May 18, 2010
    Publication date: September 16, 2010
    Applicant: Architecture Technology Corporation
    Inventors: Frank N. Adelstein, Haim Bar, Prasanth Alla, Nikita Proskourine
  • Patent number: 7748040
    Abstract: Techniques are described for providing security to a protected network. Techniques are described for thwarting attempted network attacks using marked information. The attack correlation system provides marked information to computing devices that probe for sensitive information, and monitors subsequent communications for use of the marked information. In one example, the attack correlation system reroutes communications containing the marked information to a dedicated vulnerable device that logs the communications to monitor the attackers' methods. The attack correlation system may also include functionality to exchange information regarding attempted attacks with other attack correlation systems to gain broader knowledge of attacks throughout one or more networks.
    Type: Grant
    Filed: March 22, 2005
    Date of Patent: June 29, 2010
    Assignee: Architecture Technology Corporation
    Inventors: Frank N. Adelstein, Haim Bar, Prasanth Alla, Nikita Proskourine
  • Publication number: 20090208910
    Abstract: This disclosure generally relates to automated execution and evaluation of computer network training exercises, such as in a virtual machine environment. An example environment includes a control and monitoring system, an attack system, and a target system. The control and monitoring system initiates a training scenario to cause the attack system to engage in an attack against the target system. The target system then performs an action in response to the attack. Monitor information associated with the attack against the target system is collected by continuously monitoring the training scenario. The attack system is then capable of sending dynamic response data to the target system, wherein the dynamic response data is generated according to the collected monitor information to adapt the training scenario to the action performed by the target system. The control and monitoring system then generates an automated evaluation based upon the collected monitor information.
    Type: Application
    Filed: February 18, 2009
    Publication date: August 20, 2009
    Applicant: Architecture Technology Corporation
    Inventors: Stephen Brueckner, Frank N. Adelstein, Haim Bar, Matthew Donovan
  • Publication number: 20090165142
    Abstract: In general, the invention provides for analyzing a target computer for computer crimes such as illegal sharing of files or sharing of illegal files on peer-to-peer clients. The target computer may have software for a plurality of peer-to-peer clients. Only one extensible forensic device may be necessary to analyze the plurality of peer-to-peer clients for downloaded or shared files. For example, the invention may provide for a method comprising determining whether one or more peer-to-peer clients are or have been installed on a target device by identifying information associated with one or more peer-to-peer modules, wherein each module is associated with a different one of the one or more peer-to-peer clients. The method further includes, gathering usage information for the one or more peer-to-peer clients that had been determined to be installed on the target computer, analyzing the usage information, and automatically generating a report of the analyzed usage information.
    Type: Application
    Filed: August 12, 2008
    Publication date: June 25, 2009
    Inventors: Frank N. Adelstein, Judson Powers, Robert A. Joyce, Derek Bronner
  • Publication number: 20090150998
    Abstract: The invention is directed to techniques for allowing a user to remotely interrogate a target computing device in order to collect and analyze computer evidence that may be stored on the target computing device. A forensic device receives input from a remote user that identifies computer evidence to acquire from the target computing device. The forensic device acquires the computer evidence from the target computing device and presents a user interface for the forensic device through which the remote user views the computer evidence acquired from the target computing device. In this manner, forensic device allows the user to interrogate the target computing device to acquire the computer evidence without seizing or otherwise “shutting down” the target device.
    Type: Application
    Filed: February 12, 2009
    Publication date: June 11, 2009
    Applicant: Architecture Technology Corporation
    Inventors: Frank N. Adelstein, Matthew A. Stillerman, Robert Joyce
  • Patent number: 7496959
    Abstract: The invention is directed to techniques for allowing a user to remotely interrogate a target computing device in order to collect and analyze computer evidence that may be stored on the target computing device. A forensic device receives input from a remote user that identifies computer evidence to acquire from the target computing device. The forensic device acquires the computer evidence from the target computing device and presents a user interface for the forensic device through which the remote user views the computer evidence acquired from the target computing device. In this manner, forensic device allows the user to interrogate the target computing device to acquire the computer evidence without seizing or otherwise “shutting down” the target device.
    Type: Grant
    Filed: June 23, 2003
    Date of Patent: February 24, 2009
    Assignee: Architecture Technology Corporation
    Inventors: Frank N. Adelstein, Matthew A. Stillerman, Robert Joyce
  • Publication number: 20040260733
    Abstract: The invention is directed to techniques for allowing a user to remotely interrogate a target computing device in order to collect and analyze computer evidence that may be stored on the target computing device. A forensic device receives input from a remote user that identifies computer evidence to acquire from the target computing device. The forensic device acquires the computer evidence from the target computing device and presents a user interface for the forensic device through which the remote user views the computer evidence acquired from the target computing device. In this manner, forensic device allows the user to interrogate the target computing device to acquire the computer evidence without seizing or otherwise “shutting down” the target device.
    Type: Application
    Filed: June 23, 2003
    Publication date: December 23, 2004
    Inventors: Frank N. Adelstein, Matthew A. Stillerman, Robert Joyce