Patents by Inventor Matthew A Stillerman

Matthew A Stillerman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8474047
    Abstract: The invention is directed to techniques for allowing a user to remotely interrogate a target computing device in order to collect and analyze computer evidence that may be stored on the target computing device. A forensic device receives input from a remote user that identifies computer evidence to acquire from the target computing device. The forensic device acquires the computer evidence from the target computing device and presents a user interface for the forensic device through which the remote user views the computer evidence acquired from the target computing device. In this manner, forensic device allows the user to interrogate the target computing device to acquire the computer evidence without seizing or otherwise “shutting down” the target device.
    Type: Grant
    Filed: May 7, 2012
    Date of Patent: June 25, 2013
    Assignee: Architecture Technology Corporation
    Inventors: Frank N. Adelstein, Matthew A. Stillerman, Robert A. Joyce
  • Publication number: 20120221633
    Abstract: The invention is directed to techniques for allowing a user to remotely interrogate a target computing device in order to collect and analyze computer evidence that may be stored on the target computing device. A forensic device receives input from a remote user that identifies computer evidence to acquire from the target computing device. The forensic device acquires the computer evidence from the target computing device and presents a user interface for the forensic device through which the remote user views the computer evidence acquired from the target computing device. In this manner, forensic device allows the user to interrogate the target computing device to acquire the computer evidence without seizing or otherwise “shutting down” the target device.
    Type: Application
    Filed: May 7, 2012
    Publication date: August 30, 2012
    Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
    Inventors: Frank N. Adelstein, Matthew A. Stillerman, Robert Joyce
  • Patent number: 8176557
    Abstract: The invention is directed to techniques for allowing a user to remotely interrogate a target computing device in order to collect and analyze computer evidence that may be stored on the target computing device. A forensic device receives input from a remote user that identifies computer evidence to acquire from the target computing device. The forensic device acquires the computer evidence from the target computing device and presents a user interface for the forensic device through which the remote user views the computer evidence acquired from the target computing device. In this manner, forensic device allows the user to interrogate the target computing device to acquire the computer evidence without seizing or otherwise “shutting down” the target device.
    Type: Grant
    Filed: February 12, 2009
    Date of Patent: May 8, 2012
    Assignee: Architecture Technology Corporation
    Inventors: Frank N. Adelstein, Matthew A. Stillerman, Robert Joyce
  • Publication number: 20120109905
    Abstract: This disclosure is directed to techniques for providing comparing first and second XML files to one another. According to these techniques, a computing device (e.g., a version control service executing on the computing device), may be configured generate at least two edit transcripts that each include one or more operational changes that may be applied to data elements of the first XML file to arrive at data elements of the second XML file (or vice versa). The computing device may select at least one optimal edit transcript based on which of the number of operational changes of the at least two edit transcripts.
    Type: Application
    Filed: December 9, 2011
    Publication date: May 3, 2012
    Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
    Inventors: Daniel James Tingstrom, Robert A. Joyce, Matthew A. Stillerman, Stephen Kurt Brueckner, Haim Yehuda Bar
  • Publication number: 20120110093
    Abstract: This disclosure is directed to techniques for providing version control functionality for web services of one or more service oriented architecture (SOA) systems. According to these techniques, a version control service (VCS) may receive an indication of a version update for a first web service. In response to the received request, the VCS determines whether the version update, if executed within the SOA system, will cause a change in operation of a second web service. If the version update will cause a change, VCS provides an indication of the determined change to a user.
    Type: Application
    Filed: November 1, 2010
    Publication date: May 3, 2012
    Applicant: Architecture Technology Corporation
    Inventors: Daniel James Tingstrom, Robert A. Joyce, Matthew A. Stillerman, Stephen Kurt Brueckner, Haim Yehuda Bar
  • Patent number: 8015211
    Abstract: A peer-to-peer (P2P) networking system is disclosed that provides a large, persistent object repository with the ability to easily scale to significant size. Data security is provided using a distributed object data access mechanism to grant access to data objects to authorized users. Data objects stored within the object repository are provided a plurality of security options including plain text data, objects, encrypted data objects, and secure, secret sharing data objects. A data object query processing component permits users to locate requested information within the P2P networking system.
    Type: Grant
    Filed: October 1, 2004
    Date of Patent: September 6, 2011
    Assignee: Architecture Technology Corporation
    Inventors: Carla Marceau, Matthew A. Stillerman
  • Patent number: 7908281
    Abstract: This disclosure describes techniques of dynamically assembling and utilizing a pedigree of a resource. A pedigree of a resource is a set of statements that describe a provenance of the resource. As described herein, a set of one or more servers may host context objects that contain the statements that make up the pedigree of the resource. In order to obtain the pedigree of the resource, a context assembly device may send queries to the servers for context objects that are likely to contain statements in the pedigree of the resource. After receiving context objects from the servers in response to the queries, the context assembly device may query the statements in the received context objects in order to identify, among the statements in the context objects, the statements that constitute the pedigree of the resource. The dynamically assembled pedigree may then be used in a variety of ways.
    Type: Grant
    Filed: November 20, 2007
    Date of Patent: March 15, 2011
    Assignee: Architecture Technology Corporation
    Inventors: Carla Marceau, Matthew A. Stillerman, David Rosenthal, Marisa Gioioso
  • Patent number: 7716470
    Abstract: Techniques are described for generating and actively verifying a boot code associated with a peripheral device of a computer system to prevent potential security threats the boot code may introduce into the computer system. The techniques for generating boot code entail generating the boot code from a high-level programming language using a verification application program interface (API). The API aids in generating a certificate, which is associated with the boot code in that the certificate describes operation of the boot code. After generating the boot code and associated certificate, the two are loaded onto a memory module of the peripheral device. Once the peripheral device is connected to the computer system, the computer system may retrieve the boot code and certificate. The computer system utilizes techniques to actively verify the boot code by performing a security check on the boot code in accordance with the associated certificate.
    Type: Grant
    Filed: December 16, 2008
    Date of Patent: May 11, 2010
    Assignee: Architecture Technology Corporation
    Inventors: Matthew A. Stillerman, Dexter Kozen, Thomas J. Merritt
  • Publication number: 20090217373
    Abstract: Techniques are described for generating and actively verifying a boot code associated with a peripheral device of a computer system to prevent potential security threats the boot code may introduce into the computer system. The techniques for generating boot code entail generating the boot code from a high-level programming language using a verification application program interface (API). The API aids in generating a certificate, which is associated with the boot code in that the certificate describes operation of the boot code. After generating the boot code and associated certificate, the two are loaded onto a memory module of the peripheral device. Once the peripheral device is connected to the computer system, the computer system may retrieve the boot code and certificate. The computer system utilizes techniques to actively verify the boot code by performing a security check on the boot code in accordance with the associated certificate.
    Type: Application
    Filed: December 16, 2008
    Publication date: August 27, 2009
    Applicant: Architecture Technology Corporation
    Inventors: Matthew A. Stillerman, Dexter Kozen, Thomas J. Merritt
  • Publication number: 20090150998
    Abstract: The invention is directed to techniques for allowing a user to remotely interrogate a target computing device in order to collect and analyze computer evidence that may be stored on the target computing device. A forensic device receives input from a remote user that identifies computer evidence to acquire from the target computing device. The forensic device acquires the computer evidence from the target computing device and presents a user interface for the forensic device through which the remote user views the computer evidence acquired from the target computing device. In this manner, forensic device allows the user to interrogate the target computing device to acquire the computer evidence without seizing or otherwise “shutting down” the target device.
    Type: Application
    Filed: February 12, 2009
    Publication date: June 11, 2009
    Applicant: Architecture Technology Corporation
    Inventors: Frank N. Adelstein, Matthew A. Stillerman, Robert Joyce
  • Patent number: 7496959
    Abstract: The invention is directed to techniques for allowing a user to remotely interrogate a target computing device in order to collect and analyze computer evidence that may be stored on the target computing device. A forensic device receives input from a remote user that identifies computer evidence to acquire from the target computing device. The forensic device acquires the computer evidence from the target computing device and presents a user interface for the forensic device through which the remote user views the computer evidence acquired from the target computing device. In this manner, forensic device allows the user to interrogate the target computing device to acquire the computer evidence without seizing or otherwise “shutting down” the target device.
    Type: Grant
    Filed: June 23, 2003
    Date of Patent: February 24, 2009
    Assignee: Architecture Technology Corporation
    Inventors: Frank N. Adelstein, Matthew A. Stillerman, Robert Joyce
  • Patent number: 7467417
    Abstract: Techniques are described for generating and actively verifying a boot code associated with a peripheral device of a computer system to prevent potential security threats the boot code may introduce into the computer system. The techniques for generating boot code entail generating the boot code from a high-level programming language using a verification application program interface (API). The API aids in generating a certificate, which is associated with the boot ode in that the certificate describes operation of the boot code. After generating the boot code and associated certificate, the two are loaded onto a memory module of the peripheral device. Once the peripheral device ie connected to the computer system, the computer system may retrieve the boot code and certificate. The computer system utilizes techniques to actively verify the boot code by performing a security check on the boot code in accordance with the associated certificate.
    Type: Grant
    Filed: September 4, 2003
    Date of Patent: December 16, 2008
    Assignee: Architecture Technology Corporation
    Inventors: Matthew A Stillerman, Dexter Kozen, Thomas J Merritt
  • Publication number: 20080271163
    Abstract: Techniques are described for generating and actively verifying a boot code associated with a peripheral device of a computer system to prevent potential security threats the boot code may introduce into the computer system. The techniques for generating boot code entail generating the boot code from a high-level programming language using a verification application program interface (API). The API aids in generating a certificate, which is associated with the boot code in that the certificate describes operation of the boot code. After generating the boot code and associated certificate, the two are loaded onto a memory module of the peripheral device. Once the peripheral device is connected to the computer system, the computer system may retrieve the boot code and certificate. The computer system utilizes techniques to actively verify the boot code by performing a security check on the boot code in accordance with the associated certificate.
    Type: Application
    Filed: September 4, 2003
    Publication date: October 30, 2008
    Inventors: Matthew A. Stillerman, Dexter Kozen, Thomas J. Merritt
  • Publication number: 20080120281
    Abstract: This disclosure describes techniques of dynamically assembling and utilizing a pedigree of a resource. A pedigree of a resource is a set of statements that describe a provenance of the resource. As described herein, a set of one or more servers may host context objects that contain the statements that make up the pedigree of the resource. In order to obtain the pedigree of the resource, a context assembly device may send queries to the servers for context objects that are likely to contain statements in the pedigree of the resource. After receiving context objects from the servers in response to the queries, the context assembly device may query the statements in the received context objects in order to identify, among the statements in the context objects, the statements that constitute the pedigree of the resource. The dynamically assembled pedigree may then be used in a variety of ways.
    Type: Application
    Filed: November 20, 2007
    Publication date: May 22, 2008
    Applicant: Architecture Technology Corporation
    Inventors: Carla Marceau, Matthew A. Stillerman, David Rosenthal, Marisa Gioioso
  • Publication number: 20050240591
    Abstract: A peer-to-peer (P2P) networking system is disclosed that provides a large, persistent object repository with the ability to easily scale to significant size. Data security is provided using a distributed object data access mechanism to grant access to data objects to authorized users. Data objects stored within the object repository are provided a plurality of security options including plain text data, objects, encrypted data objects, and secure, secret sharing data objects. A data object query processing component permits users to locate requested information within the P2P networking system.
    Type: Application
    Filed: October 1, 2004
    Publication date: October 27, 2005
    Inventors: Carla Marceau, Matthew Stillerman
  • Publication number: 20040260733
    Abstract: The invention is directed to techniques for allowing a user to remotely interrogate a target computing device in order to collect and analyze computer evidence that may be stored on the target computing device. A forensic device receives input from a remote user that identifies computer evidence to acquire from the target computing device. The forensic device acquires the computer evidence from the target computing device and presents a user interface for the forensic device through which the remote user views the computer evidence acquired from the target computing device. In this manner, forensic device allows the user to interrogate the target computing device to acquire the computer evidence without seizing or otherwise “shutting down” the target device.
    Type: Application
    Filed: June 23, 2003
    Publication date: December 23, 2004
    Inventors: Frank N. Adelstein, Matthew A. Stillerman, Robert Joyce