Patents by Inventor Matthew A Stillerman

Matthew A Stillerman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7716470
    Abstract: Techniques are described for generating and actively verifying a boot code associated with a peripheral device of a computer system to prevent potential security threats the boot code may introduce into the computer system. The techniques for generating boot code entail generating the boot code from a high-level programming language using a verification application program interface (API). The API aids in generating a certificate, which is associated with the boot code in that the certificate describes operation of the boot code. After generating the boot code and associated certificate, the two are loaded onto a memory module of the peripheral device. Once the peripheral device is connected to the computer system, the computer system may retrieve the boot code and certificate. The computer system utilizes techniques to actively verify the boot code by performing a security check on the boot code in accordance with the associated certificate.
    Type: Grant
    Filed: December 16, 2008
    Date of Patent: May 11, 2010
    Assignee: Architecture Technology Corporation
    Inventors: Matthew A. Stillerman, Dexter Kozen, Thomas J. Merritt
  • Publication number: 20090217373
    Abstract: Techniques are described for generating and actively verifying a boot code associated with a peripheral device of a computer system to prevent potential security threats the boot code may introduce into the computer system. The techniques for generating boot code entail generating the boot code from a high-level programming language using a verification application program interface (API). The API aids in generating a certificate, which is associated with the boot code in that the certificate describes operation of the boot code. After generating the boot code and associated certificate, the two are loaded onto a memory module of the peripheral device. Once the peripheral device is connected to the computer system, the computer system may retrieve the boot code and certificate. The computer system utilizes techniques to actively verify the boot code by performing a security check on the boot code in accordance with the associated certificate.
    Type: Application
    Filed: December 16, 2008
    Publication date: August 27, 2009
    Applicant: Architecture Technology Corporation
    Inventors: Matthew A. Stillerman, Dexter Kozen, Thomas J. Merritt
  • Publication number: 20090150998
    Abstract: The invention is directed to techniques for allowing a user to remotely interrogate a target computing device in order to collect and analyze computer evidence that may be stored on the target computing device. A forensic device receives input from a remote user that identifies computer evidence to acquire from the target computing device. The forensic device acquires the computer evidence from the target computing device and presents a user interface for the forensic device through which the remote user views the computer evidence acquired from the target computing device. In this manner, forensic device allows the user to interrogate the target computing device to acquire the computer evidence without seizing or otherwise “shutting down” the target device.
    Type: Application
    Filed: February 12, 2009
    Publication date: June 11, 2009
    Applicant: Architecture Technology Corporation
    Inventors: Frank N. Adelstein, Matthew A. Stillerman, Robert Joyce
  • Patent number: 7496959
    Abstract: The invention is directed to techniques for allowing a user to remotely interrogate a target computing device in order to collect and analyze computer evidence that may be stored on the target computing device. A forensic device receives input from a remote user that identifies computer evidence to acquire from the target computing device. The forensic device acquires the computer evidence from the target computing device and presents a user interface for the forensic device through which the remote user views the computer evidence acquired from the target computing device. In this manner, forensic device allows the user to interrogate the target computing device to acquire the computer evidence without seizing or otherwise “shutting down” the target device.
    Type: Grant
    Filed: June 23, 2003
    Date of Patent: February 24, 2009
    Assignee: Architecture Technology Corporation
    Inventors: Frank N. Adelstein, Matthew A. Stillerman, Robert Joyce
  • Patent number: 7467417
    Abstract: Techniques are described for generating and actively verifying a boot code associated with a peripheral device of a computer system to prevent potential security threats the boot code may introduce into the computer system. The techniques for generating boot code entail generating the boot code from a high-level programming language using a verification application program interface (API). The API aids in generating a certificate, which is associated with the boot ode in that the certificate describes operation of the boot code. After generating the boot code and associated certificate, the two are loaded onto a memory module of the peripheral device. Once the peripheral device ie connected to the computer system, the computer system may retrieve the boot code and certificate. The computer system utilizes techniques to actively verify the boot code by performing a security check on the boot code in accordance with the associated certificate.
    Type: Grant
    Filed: September 4, 2003
    Date of Patent: December 16, 2008
    Assignee: Architecture Technology Corporation
    Inventors: Matthew A Stillerman, Dexter Kozen, Thomas J Merritt
  • Publication number: 20080271163
    Abstract: Techniques are described for generating and actively verifying a boot code associated with a peripheral device of a computer system to prevent potential security threats the boot code may introduce into the computer system. The techniques for generating boot code entail generating the boot code from a high-level programming language using a verification application program interface (API). The API aids in generating a certificate, which is associated with the boot code in that the certificate describes operation of the boot code. After generating the boot code and associated certificate, the two are loaded onto a memory module of the peripheral device. Once the peripheral device is connected to the computer system, the computer system may retrieve the boot code and certificate. The computer system utilizes techniques to actively verify the boot code by performing a security check on the boot code in accordance with the associated certificate.
    Type: Application
    Filed: September 4, 2003
    Publication date: October 30, 2008
    Inventors: Matthew A. Stillerman, Dexter Kozen, Thomas J. Merritt
  • Publication number: 20080120281
    Abstract: This disclosure describes techniques of dynamically assembling and utilizing a pedigree of a resource. A pedigree of a resource is a set of statements that describe a provenance of the resource. As described herein, a set of one or more servers may host context objects that contain the statements that make up the pedigree of the resource. In order to obtain the pedigree of the resource, a context assembly device may send queries to the servers for context objects that are likely to contain statements in the pedigree of the resource. After receiving context objects from the servers in response to the queries, the context assembly device may query the statements in the received context objects in order to identify, among the statements in the context objects, the statements that constitute the pedigree of the resource. The dynamically assembled pedigree may then be used in a variety of ways.
    Type: Application
    Filed: November 20, 2007
    Publication date: May 22, 2008
    Applicant: Architecture Technology Corporation
    Inventors: Carla Marceau, Matthew A. Stillerman, David Rosenthal, Marisa Gioioso
  • Publication number: 20050240591
    Abstract: A peer-to-peer (P2P) networking system is disclosed that provides a large, persistent object repository with the ability to easily scale to significant size. Data security is provided using a distributed object data access mechanism to grant access to data objects to authorized users. Data objects stored within the object repository are provided a plurality of security options including plain text data, objects, encrypted data objects, and secure, secret sharing data objects. A data object query processing component permits users to locate requested information within the P2P networking system.
    Type: Application
    Filed: October 1, 2004
    Publication date: October 27, 2005
    Inventors: Carla Marceau, Matthew Stillerman
  • Publication number: 20040260733
    Abstract: The invention is directed to techniques for allowing a user to remotely interrogate a target computing device in order to collect and analyze computer evidence that may be stored on the target computing device. A forensic device receives input from a remote user that identifies computer evidence to acquire from the target computing device. The forensic device acquires the computer evidence from the target computing device and presents a user interface for the forensic device through which the remote user views the computer evidence acquired from the target computing device. In this manner, forensic device allows the user to interrogate the target computing device to acquire the computer evidence without seizing or otherwise “shutting down” the target device.
    Type: Application
    Filed: June 23, 2003
    Publication date: December 23, 2004
    Inventors: Frank N. Adelstein, Matthew A. Stillerman, Robert Joyce