Patents by Inventor Matthew Carver

Matthew Carver has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180041538
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for analyzing threat intelligence information. One of the methods includes receiving by a threat information server, threat intelligence information from one or more intelligence feeds and generating one or more identified security threats, identifying a compromise by a management process orchestration server and retrieving information from the threat information server and identifying one or more actions to be performed, determining by an indicator analytics processor, a composite credibility based on the actions, and determining one or more components for profiling and determining indicators of compromise for each component, and communicating the indicators of compromise to the management process orchestration server.
    Type: Application
    Filed: October 12, 2017
    Publication date: February 8, 2018
    Inventors: Louis William DiValentin, Matthew Carver, Michael L. Lefebvre
  • Patent number: 9886582
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining threat data contextualization.
    Type: Grant
    Filed: August 31, 2015
    Date of Patent: February 6, 2018
    Assignee: Accenture Global Sevices Limited
    Inventors: Elvis Hovor, David William Rozmiarek, Robin Lynn Burkett, Matthew Carver, Mohamed H. El-Sharkawi
  • Publication number: 20180013777
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for identifying network security risks. One of the methods includes receiving organizational hierarchy data and receiving access privilege data for a network, generating an adjacency matrix that represents connections between individuals within the organizational hierarchy and various groups, and that represents connections between the individuals and various access privileges, selecting an analytic technique for analyzing the adjacency matrix, determining, for each individual, an individual score that represents a security risk associated with the individual's network account, and in response to determining that the individual score meets a threshold, applying security controls.
    Type: Application
    Filed: July 8, 2016
    Publication date: January 11, 2018
    Inventors: Louis William DiValentin, Matthew Carver
  • Patent number: 9807120
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for implementing a response to one or more security incidents in a computing network. One of the methods includes identifying a security incident based on detecting one or more indicators of compromise associated with the security incident, comparing the security incident with a predefined ontology that maps the security incident to one or more courses of action, selecting a response strategy that includes one or more of the courses of action, and implementing the response strategy as an automated response.
    Type: Grant
    Filed: June 29, 2016
    Date of Patent: October 31, 2017
    Assignee: Accenture Global Services Limited
    Inventors: Matthew Carver, Louis William DiValentin, Michael L. Lefebvre, Elvis Hovor, David William Rozmiarek
  • Publication number: 20170310697
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining network related anomaly scores. One of the methods includes generating a network map including at least a plurality of network nodes and a plurality of edges that indicate communications paths between the plurality of network nodes, obtaining first data indicating network activity over the edges and between the plurality of network nodes for a first time period, generating a model of expected network activity over the edges and between the plurality of network nodes for a future time period using the network map and the first data, obtaining second data indicating network activity over the edges and between the plurality of network nodes for a second time period, and determining an anomaly score using a comparison between the second data and the model of expected network activity.
    Type: Application
    Filed: July 12, 2017
    Publication date: October 26, 2017
    Inventors: Michael L. Lefebvre, Matthew Carver, Eric Ellett, Walid Negm, Louis William DiValentin, James J. Solderitsch
  • Patent number: 9794279
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for analyzing threat intelligence information. One of the methods includes receiving by a threat information server, threat intelligence information from one or more intelligence feeds and generating one or more identified security threats, identifying a compromise by a management process orchestration server and retrieving information from the threat information server and identifying one or more actions to be performed, determining by an indicator analytics processor, a composite credibility based on the actions, and determining one or more components for profiling and determining indicators of compromise for each component, and communicating the indicators of compromise to the management process orchestration server.
    Type: Grant
    Filed: August 29, 2014
    Date of Patent: October 17, 2017
    Assignee: Accenture Global Services Limited
    Inventors: Louis William DiValentin, Matthew Carver, Michael L. Lefebvre
  • Patent number: 9729568
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining network related anomaly scores. One of the methods includes generating a network map including at least a plurality of network nodes and a plurality of edges that indicate communications paths between the plurality of network nodes, obtaining first data indicating network activity over the edges and between the plurality of network nodes for a first time period, generating a model of expected network activity over the edges and between the plurality of network nodes for a future time period using the network map and the first data, obtaining second data indicating network activity over the edges and between the plurality of network nodes for a second time period, and determining an anomaly score using a comparison between the second data and the model of expected network activity.
    Type: Grant
    Filed: August 12, 2016
    Date of Patent: August 8, 2017
    Assignee: Accenture Global Services Limited
    Inventors: Michael L. Lefebvre, Matthew Carver, Eric Ellett, Walid Negm, Louis William DiValentin, James J. Solderitsch
  • Publication number: 20170061132
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining threat data contextualization.
    Type: Application
    Filed: August 31, 2015
    Publication date: March 2, 2017
    Inventors: Elvis Hovor, David William Rozmiarek, Robin Lynn Burkett, Matthew Carver, Mohamed H. El-Sharkawi
  • Publication number: 20170048266
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining a network path between computer assets. One of the methods includes receiving an asset topology that includes an identifier for each computer-related asset that may be an entry point for an attack simulation, receiving threat data that identifies vulnerabilities of computer-related assets, determining a first computer-related asset that may be an entry point for an attack simulation, identifying one or more first vulnerabilities of the first computer-related asset, determining a path from the first computer-related asset to a second computer-related asset, determining one or more second vulnerabilities of the second computer-related asset, determining a probability that the second computer-related asset will be compromised by an adversary, and determining a change to the asset topology to reduce the probability that the second computer-related asset will be compromised by an adversary.
    Type: Application
    Filed: August 31, 2015
    Publication date: February 16, 2017
    Inventors: Elvis Hovor, Shaan Mulchandani, Matthew Carver
  • Publication number: 20160352768
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining network related anomaly scores. One of the methods includes generating a network map including at least a plurality of network nodes and a plurality of edges that indicate communications paths between the plurality of network nodes, obtaining first data indicating network activity over the edges and between the plurality of network nodes for a first time period, generating a model of expected network activity over the edges and between the plurality of network nodes for a future time period using the network map and the first data, obtaining second data indicating network activity over the edges and between the plurality of network nodes for a second time period, and determining an anomaly score using a comparison between the second data and the model of expected network activity.
    Type: Application
    Filed: August 12, 2016
    Publication date: December 1, 2016
    Inventors: Michael L. Lefebvre, Matthew Carver, Eric Ellett, Walid Negm, Louis William DiValentin, James J. Solderitsch
  • Patent number: 9503467
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining network related anomaly scores. One of the methods includes generating a network map including at least a plurality of network nodes and a plurality of edges that indicate communications paths between the plurality of network nodes, obtaining first data indicating network activity over the edges and between the plurality of network nodes for a first time period, generating a model of expected network activity over the edges and between the plurality of network nodes for a future time period using the network map and the first data, obtaining second data indicating network activity over the edges and between the plurality of network nodes for a second time period, and determining an anomaly score using a comparison between the second data and the model of expected network activity.
    Type: Grant
    Filed: May 22, 2014
    Date of Patent: November 22, 2016
    Assignee: Accenture Global Services Limited
    Inventors: Michael J. Lefebvre, Matthew Carver, Eric Ellett, Walid Negm, Louis William DiValentin, James J. Solderitsch
  • Publication number: 20160308910
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for implementing a response to one or more security incidents in a computing network. One of the methods includes identifying a security incident based on detecting one or more indicators of compromise associated with the security incident, comparing the security incident with a predefined ontology that maps the security incident to one or more courses of action, selecting a response strategy that includes one or more of the courses of action, and implementing the response strategy as an automated response.
    Type: Application
    Filed: June 29, 2016
    Publication date: October 20, 2016
    Inventors: Matthew Carver, Louis William DiValentin, Michael L. Lefebvre, Elvis Hovor, David William Rozmiarek
  • Publication number: 20160269434
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for analyzing threat intelligence information. One of the methods includes receiving by a threat information server, threat intelligence information from one or more intelligence feeds and generating one or more identified security threats, identifying a compromise by a management process orchestration server and retrieving information from the threat information server and identifying one or more actions to be performed, determining by an indicator analytics processor, a composite credibility based on the actions, and determining one or more components for profiling and determining indicators of compromise for each component, and communicating the indicators of compromise to the management process orchestration server.
    Type: Application
    Filed: August 29, 2014
    Publication date: September 15, 2016
    Applicant: Accenture Global Services Limited
    Inventors: Louis William DiValentin, Matthew Carver, Michael L. Lefebvre
  • Patent number: 9386041
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for implementing a response to one or more security incidents in a computing network. One of the methods includes identifying a security incident based on detecting one or more indicators of compromise associated with the security incident, comparing the security incident with a predefined ontology that maps the security incident to one or more courses of action, selecting a response strategy that includes one or more of the courses of action, and implementing the response strategy as an automated response.
    Type: Grant
    Filed: August 29, 2014
    Date of Patent: July 5, 2016
    Assignee: Accenture Global Services Limited
    Inventors: Matthew Carver, Louis William DiValentin, Michael L. Lefebvre, Elvis Hovor, David William Rozmiarek
  • Patent number: 9369481
    Abstract: An incident triage engine performs incident triage in a system by prioritizing responses to incidents within the system. One prioritization method may include receiving attributes of incidents and assets in the system, generating cumulative loss forecasts for the incidents, and prioritizing the responses to the incidents based on the cumulative loss forecasts for the incidents. Another prioritization method may include determining different arrangements of incidents within a response queue, calculating cumulative queue loss forecasts for the different arrangements of incidents within the response queue, and arranging the incidents in the response queue based on the arrangement of incidents that minimizes the total loss to the system over the resolution of all of the incidents present in the response queue.
    Type: Grant
    Filed: April 8, 2014
    Date of Patent: June 14, 2016
    Assignee: Accenture Global Services Limited
    Inventors: Joshua Z. Howes, Walid Negm, James J. Solderitsch, Ashish Jotwani, Matthew Carver
  • Publication number: 20150365438
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for implementing a response to one or more security incidents in a computing network. One of the methods includes identifying a security incident based on detecting one or more indicators of compromise associated with the security incident, comparing the security incident with a predefined ontology that maps the security incident to one or more courses of action, selecting a response strategy that includes one or more of the courses of action, and implementing the response strategy as an automated response.
    Type: Application
    Filed: August 29, 2014
    Publication date: December 17, 2015
    Applicant: ACCENTURE GLOBAL SERVICES LIMITED
    Inventors: Matthew Carver, Louis William DiValentin, Michael L. Lefebvre, Elvis Hovor, David William Rozmiarek
  • Publication number: 20150341379
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining network related anomaly scores. One of the methods includes generating a network map including at least a plurality of network nodes and a plurality of edges that indicate communications paths between the plurality of network nodes, obtaining first data indicating network activity over the edges and between the plurality of network nodes for a first time period, generating a model of expected network activity over the edges and between the plurality of network nodes for a future time period using the network map and the first data, obtaining second data indicating network activity over the edges and between the plurality of network nodes for a second time period, and determining an anomaly score using a comparison between the second data and the model of expected network activity.
    Type: Application
    Filed: May 22, 2014
    Publication date: November 26, 2015
    Applicant: Accenture Global Services Limited
    Inventors: Michael L. Lefebvre, Matthew Carver, Eric Ellett, Walid Negm, Louis William DiValentin, James J. Solderitsch
  • Publication number: 20140223567
    Abstract: An incident triage engine performs incident triage in a system by prioritizing responses to incidents within the system. One prioritization method may include receiving attributes of incidents and assets in the system, generating cumulative loss forecasts for the incidents, and prioritizing the responses to the incidents based on the cumulative loss forecasts for the incidents. Another prioritization method may include determining different arrangements of incidents within a response queue, calculating cumulative queue loss forecasts for the different arrangements of incidents within the response queue, and arranging the incidents in the response queue based on the arrangement of incidents that minimizes the total loss to the system over the resolution of all of the incidents present in the response queue.
    Type: Application
    Filed: April 8, 2014
    Publication date: August 7, 2014
    Applicant: Accenture Global Services Limited
    Inventors: Joshua Z. HOWES, Walid NEGM, James J. SOLDERITSCH, Ashish JOTWANI, Matthew CARVER
  • Patent number: 8732840
    Abstract: An incident triage engine performs incident triage in a system by prioritizing responses to incidents within the system. One prioritization method may include receiving attributes of incidents and assets in the system, generating cumulative loss forecasts for the incidents, and prioritizing the responses to the incidents based on the cumulative loss forecasts for the incidents. Another prioritization method may include determining different arrangements of incidents within a response queue, calculating cumulative queue loss forecasts for the different arrangements of incidents within the response queue, and arranging the incidents in the response queue based on the arrangement of incidents that minimizes the total loss to the system over the resolution of all of the incidents present in the response queue.
    Type: Grant
    Filed: October 7, 2011
    Date of Patent: May 20, 2014
    Assignee: Accenture Global Services Limited
    Inventors: Joshua Z. Howes, Walid Negm, James J. Solderitsch, Ashish Jotwani, Matthew Carver
  • Publication number: 20130091574
    Abstract: An incident triage engine performs incident triage in a system by prioritizing responses to incidents within the system. One prioritization method may include receiving attributes of incidents and assets in the system, generating cumulative loss forecasts for the incidents, and prioritizing the responses to the incidents based on the cumulative loss forecasts for the incidents. Another prioritization method may include determining different arrangements of incidents within a response queue, calculating cumulative queue loss forecasts for the different arrangements of incidents within the response queue, and arranging the incidents in the response queue based on the arrangement of incidents that minimizes the total loss to the system over the resolution of all of the incidents present in the response queue.
    Type: Application
    Filed: October 7, 2011
    Publication date: April 11, 2013
    Inventors: Joshua Z. Howes, Walid Negm, James J. Solderitsch, Ashish Jotwani, Matthew Carver