Patents by Inventor Matthew A Stillerman
Matthew A Stillerman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8474047Abstract: The invention is directed to techniques for allowing a user to remotely interrogate a target computing device in order to collect and analyze computer evidence that may be stored on the target computing device. A forensic device receives input from a remote user that identifies computer evidence to acquire from the target computing device. The forensic device acquires the computer evidence from the target computing device and presents a user interface for the forensic device through which the remote user views the computer evidence acquired from the target computing device. In this manner, forensic device allows the user to interrogate the target computing device to acquire the computer evidence without seizing or otherwise “shutting down” the target device.Type: GrantFiled: May 7, 2012Date of Patent: June 25, 2013Assignee: Architecture Technology CorporationInventors: Frank N. Adelstein, Matthew A. Stillerman, Robert A. Joyce
-
Publication number: 20120221633Abstract: The invention is directed to techniques for allowing a user to remotely interrogate a target computing device in order to collect and analyze computer evidence that may be stored on the target computing device. A forensic device receives input from a remote user that identifies computer evidence to acquire from the target computing device. The forensic device acquires the computer evidence from the target computing device and presents a user interface for the forensic device through which the remote user views the computer evidence acquired from the target computing device. In this manner, forensic device allows the user to interrogate the target computing device to acquire the computer evidence without seizing or otherwise “shutting down” the target device.Type: ApplicationFiled: May 7, 2012Publication date: August 30, 2012Applicant: ARCHITECTURE TECHNOLOGY CORPORATIONInventors: Frank N. Adelstein, Matthew A. Stillerman, Robert Joyce
-
Patent number: 8176557Abstract: The invention is directed to techniques for allowing a user to remotely interrogate a target computing device in order to collect and analyze computer evidence that may be stored on the target computing device. A forensic device receives input from a remote user that identifies computer evidence to acquire from the target computing device. The forensic device acquires the computer evidence from the target computing device and presents a user interface for the forensic device through which the remote user views the computer evidence acquired from the target computing device. In this manner, forensic device allows the user to interrogate the target computing device to acquire the computer evidence without seizing or otherwise “shutting down” the target device.Type: GrantFiled: February 12, 2009Date of Patent: May 8, 2012Assignee: Architecture Technology CorporationInventors: Frank N. Adelstein, Matthew A. Stillerman, Robert Joyce
-
Publication number: 20120109905Abstract: This disclosure is directed to techniques for providing comparing first and second XML files to one another. According to these techniques, a computing device (e.g., a version control service executing on the computing device), may be configured generate at least two edit transcripts that each include one or more operational changes that may be applied to data elements of the first XML file to arrive at data elements of the second XML file (or vice versa). The computing device may select at least one optimal edit transcript based on which of the number of operational changes of the at least two edit transcripts.Type: ApplicationFiled: December 9, 2011Publication date: May 3, 2012Applicant: ARCHITECTURE TECHNOLOGY CORPORATIONInventors: Daniel James Tingstrom, Robert A. Joyce, Matthew A. Stillerman, Stephen Kurt Brueckner, Haim Yehuda Bar
-
Publication number: 20120110093Abstract: This disclosure is directed to techniques for providing version control functionality for web services of one or more service oriented architecture (SOA) systems. According to these techniques, a version control service (VCS) may receive an indication of a version update for a first web service. In response to the received request, the VCS determines whether the version update, if executed within the SOA system, will cause a change in operation of a second web service. If the version update will cause a change, VCS provides an indication of the determined change to a user.Type: ApplicationFiled: November 1, 2010Publication date: May 3, 2012Applicant: Architecture Technology CorporationInventors: Daniel James Tingstrom, Robert A. Joyce, Matthew A. Stillerman, Stephen Kurt Brueckner, Haim Yehuda Bar
-
Patent number: 8015211Abstract: A peer-to-peer (P2P) networking system is disclosed that provides a large, persistent object repository with the ability to easily scale to significant size. Data security is provided using a distributed object data access mechanism to grant access to data objects to authorized users. Data objects stored within the object repository are provided a plurality of security options including plain text data, objects, encrypted data objects, and secure, secret sharing data objects. A data object query processing component permits users to locate requested information within the P2P networking system.Type: GrantFiled: October 1, 2004Date of Patent: September 6, 2011Assignee: Architecture Technology CorporationInventors: Carla Marceau, Matthew A. Stillerman
-
Patent number: 7908281Abstract: This disclosure describes techniques of dynamically assembling and utilizing a pedigree of a resource. A pedigree of a resource is a set of statements that describe a provenance of the resource. As described herein, a set of one or more servers may host context objects that contain the statements that make up the pedigree of the resource. In order to obtain the pedigree of the resource, a context assembly device may send queries to the servers for context objects that are likely to contain statements in the pedigree of the resource. After receiving context objects from the servers in response to the queries, the context assembly device may query the statements in the received context objects in order to identify, among the statements in the context objects, the statements that constitute the pedigree of the resource. The dynamically assembled pedigree may then be used in a variety of ways.Type: GrantFiled: November 20, 2007Date of Patent: March 15, 2011Assignee: Architecture Technology CorporationInventors: Carla Marceau, Matthew A. Stillerman, David Rosenthal, Marisa Gioioso
-
Patent number: 7716470Abstract: Techniques are described for generating and actively verifying a boot code associated with a peripheral device of a computer system to prevent potential security threats the boot code may introduce into the computer system. The techniques for generating boot code entail generating the boot code from a high-level programming language using a verification application program interface (API). The API aids in generating a certificate, which is associated with the boot code in that the certificate describes operation of the boot code. After generating the boot code and associated certificate, the two are loaded onto a memory module of the peripheral device. Once the peripheral device is connected to the computer system, the computer system may retrieve the boot code and certificate. The computer system utilizes techniques to actively verify the boot code by performing a security check on the boot code in accordance with the associated certificate.Type: GrantFiled: December 16, 2008Date of Patent: May 11, 2010Assignee: Architecture Technology CorporationInventors: Matthew A. Stillerman, Dexter Kozen, Thomas J. Merritt
-
Publication number: 20090217373Abstract: Techniques are described for generating and actively verifying a boot code associated with a peripheral device of a computer system to prevent potential security threats the boot code may introduce into the computer system. The techniques for generating boot code entail generating the boot code from a high-level programming language using a verification application program interface (API). The API aids in generating a certificate, which is associated with the boot code in that the certificate describes operation of the boot code. After generating the boot code and associated certificate, the two are loaded onto a memory module of the peripheral device. Once the peripheral device is connected to the computer system, the computer system may retrieve the boot code and certificate. The computer system utilizes techniques to actively verify the boot code by performing a security check on the boot code in accordance with the associated certificate.Type: ApplicationFiled: December 16, 2008Publication date: August 27, 2009Applicant: Architecture Technology CorporationInventors: Matthew A. Stillerman, Dexter Kozen, Thomas J. Merritt
-
Publication number: 20090150998Abstract: The invention is directed to techniques for allowing a user to remotely interrogate a target computing device in order to collect and analyze computer evidence that may be stored on the target computing device. A forensic device receives input from a remote user that identifies computer evidence to acquire from the target computing device. The forensic device acquires the computer evidence from the target computing device and presents a user interface for the forensic device through which the remote user views the computer evidence acquired from the target computing device. In this manner, forensic device allows the user to interrogate the target computing device to acquire the computer evidence without seizing or otherwise “shutting down” the target device.Type: ApplicationFiled: February 12, 2009Publication date: June 11, 2009Applicant: Architecture Technology CorporationInventors: Frank N. Adelstein, Matthew A. Stillerman, Robert Joyce
-
Patent number: 7496959Abstract: The invention is directed to techniques for allowing a user to remotely interrogate a target computing device in order to collect and analyze computer evidence that may be stored on the target computing device. A forensic device receives input from a remote user that identifies computer evidence to acquire from the target computing device. The forensic device acquires the computer evidence from the target computing device and presents a user interface for the forensic device through which the remote user views the computer evidence acquired from the target computing device. In this manner, forensic device allows the user to interrogate the target computing device to acquire the computer evidence without seizing or otherwise “shutting down” the target device.Type: GrantFiled: June 23, 2003Date of Patent: February 24, 2009Assignee: Architecture Technology CorporationInventors: Frank N. Adelstein, Matthew A. Stillerman, Robert Joyce
-
Patent number: 7467417Abstract: Techniques are described for generating and actively verifying a boot code associated with a peripheral device of a computer system to prevent potential security threats the boot code may introduce into the computer system. The techniques for generating boot code entail generating the boot code from a high-level programming language using a verification application program interface (API). The API aids in generating a certificate, which is associated with the boot ode in that the certificate describes operation of the boot code. After generating the boot code and associated certificate, the two are loaded onto a memory module of the peripheral device. Once the peripheral device ie connected to the computer system, the computer system may retrieve the boot code and certificate. The computer system utilizes techniques to actively verify the boot code by performing a security check on the boot code in accordance with the associated certificate.Type: GrantFiled: September 4, 2003Date of Patent: December 16, 2008Assignee: Architecture Technology CorporationInventors: Matthew A Stillerman, Dexter Kozen, Thomas J Merritt
-
Publication number: 20080271163Abstract: Techniques are described for generating and actively verifying a boot code associated with a peripheral device of a computer system to prevent potential security threats the boot code may introduce into the computer system. The techniques for generating boot code entail generating the boot code from a high-level programming language using a verification application program interface (API). The API aids in generating a certificate, which is associated with the boot code in that the certificate describes operation of the boot code. After generating the boot code and associated certificate, the two are loaded onto a memory module of the peripheral device. Once the peripheral device is connected to the computer system, the computer system may retrieve the boot code and certificate. The computer system utilizes techniques to actively verify the boot code by performing a security check on the boot code in accordance with the associated certificate.Type: ApplicationFiled: September 4, 2003Publication date: October 30, 2008Inventors: Matthew A. Stillerman, Dexter Kozen, Thomas J. Merritt
-
Publication number: 20080120281Abstract: This disclosure describes techniques of dynamically assembling and utilizing a pedigree of a resource. A pedigree of a resource is a set of statements that describe a provenance of the resource. As described herein, a set of one or more servers may host context objects that contain the statements that make up the pedigree of the resource. In order to obtain the pedigree of the resource, a context assembly device may send queries to the servers for context objects that are likely to contain statements in the pedigree of the resource. After receiving context objects from the servers in response to the queries, the context assembly device may query the statements in the received context objects in order to identify, among the statements in the context objects, the statements that constitute the pedigree of the resource. The dynamically assembled pedigree may then be used in a variety of ways.Type: ApplicationFiled: November 20, 2007Publication date: May 22, 2008Applicant: Architecture Technology CorporationInventors: Carla Marceau, Matthew A. Stillerman, David Rosenthal, Marisa Gioioso
-
Publication number: 20050240591Abstract: A peer-to-peer (P2P) networking system is disclosed that provides a large, persistent object repository with the ability to easily scale to significant size. Data security is provided using a distributed object data access mechanism to grant access to data objects to authorized users. Data objects stored within the object repository are provided a plurality of security options including plain text data, objects, encrypted data objects, and secure, secret sharing data objects. A data object query processing component permits users to locate requested information within the P2P networking system.Type: ApplicationFiled: October 1, 2004Publication date: October 27, 2005Inventors: Carla Marceau, Matthew Stillerman
-
Publication number: 20040260733Abstract: The invention is directed to techniques for allowing a user to remotely interrogate a target computing device in order to collect and analyze computer evidence that may be stored on the target computing device. A forensic device receives input from a remote user that identifies computer evidence to acquire from the target computing device. The forensic device acquires the computer evidence from the target computing device and presents a user interface for the forensic device through which the remote user views the computer evidence acquired from the target computing device. In this manner, forensic device allows the user to interrogate the target computing device to acquire the computer evidence without seizing or otherwise “shutting down” the target device.Type: ApplicationFiled: June 23, 2003Publication date: December 23, 2004Inventors: Frank N. Adelstein, Matthew A. Stillerman, Robert Joyce