Patents by Inventor Matthew L. Wirges

Matthew L. Wirges has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10986135
    Abstract: A security management system may be remotely deployed (e.g., using a cloud-based architecture) to add security to an enterprise network. For example, the security management system may scan assets within the enterprise network for vulnerabilities and may receive data from these scans. The security management system may also receive data from other sources, and, as a result, the system may handle data having many different formats and attributes. When the security management system tries to associate data to assets, there may not be a globally unique identifier that is applicable for all received data. Provided in the present disclosure are exemplary techniques for tracking assets across a network using an asset correlation engine that can flexibly correlate data with assets based on attribute information.
    Type: Grant
    Filed: December 30, 2019
    Date of Patent: April 20, 2021
    Assignee: Qualys, Inc.
    Inventors: Sean M. Molloy, Matthew L. Wirges, Amol S. Sonawane
  • Publication number: 20200137122
    Abstract: A security management system may be remotely deployed (e.g., using a cloud-based architecture) to add security to an enterprise network. For example, the security management system may scan assets within the enterprise network for vulnerabilities and may receive data from these scans. The security management system may also receive data from other sources, and, as a result, the system may handle data having many different formats and attributes. When the security management system tries to associate data to assets, there may not be a globally unique identifier that is applicable for all received data. Provided in the present disclosure are exemplary techniques for tracking assets across a network using an asset correlation engine that can flexibly correlate data with assets based on attribute information.
    Type: Application
    Filed: December 30, 2019
    Publication date: April 30, 2020
    Inventors: Sean M. Molloy, Matthew L. Wirges, Amol S. Sonawane
  • Patent number: 10523713
    Abstract: A security management system may be remotely deployed (e.g., using a cloud-based architecture) to add security to an enterprise network. For example, the security management system may scan assets within the enterprise network for vulnerabilities and may receive data chunks from these scans. The security management system may also receive data chunks from other sources, and, as a result, the system may handle data chunks having many different formats and attributes. When the security management system tries to associate data chunks to assets, there may not be a globally unique identifier that is applicable for all received data chunks. Provided in the present disclosure are exemplary techniques for tracking assets across a network using an asset correlation engine that can flexibly match data chunks to assets based on the attribute or attributes that are available within the data chunks.
    Type: Grant
    Filed: July 9, 2018
    Date of Patent: December 31, 2019
    Assignee: Qualys, Inc.
    Inventors: Sean M. Molloy, Matthew L. Wirges, Amol S. Sonawane
  • Publication number: 20180324221
    Abstract: A security management system may be remotely deployed (e.g., using a cloud-based architecture) to add security to an enterprise network. For example, the security management system may scan assets within the enterprise network for vulnerabilities and may receive data chunks from these scans. The security management system may also receive data chunks from other sources, and, as a result, the system may handle data chunks having many different formats and attributes. When the security management system tries to associate data chunks to assets, there may not be a globally unique identifier that is applicable for all received data chunks. Provided in the present disclosure are exemplary techniques for tracking assets across a network using an asset correlation engine that can flexibly match data chunks to assets based on the attribute or attributes that are available within the data chunks.
    Type: Application
    Filed: July 9, 2018
    Publication date: November 8, 2018
    Inventors: Sean M. Molloy, Matthew L. Wirges, Amol S. Sonawane
  • Patent number: 10021140
    Abstract: A security management system may be remotely deployed (e.g., using a cloud-based architecture) to add security to an enterprise network. For example, the security management system may scan assets within the enterprise network for vulnerabilities and may receive data chunks from these scans. The security management system may also receive data chunks from other sources, and, as a result, the system may handle data chunks having many different formats and attributes. When the security management system tries to associate data chunks to assets, there may not be a globally unique identifier that is applicable for all received data chunks. Provided in the present disclosure are exemplary techniques for tracking assets across a network using an asset correlation engine that can flexibly match data chunks to assets based on the attribute or attributes that are available within the data chunks.
    Type: Grant
    Filed: March 6, 2017
    Date of Patent: July 10, 2018
    Assignee: Qualys, Inc.
    Inventors: Sean M. Molloy, Matthew L. Wirges, Amol S. Sonawane
  • Patent number: 9900333
    Abstract: Described herein is a system and method for detecting vulnerability state deltas, the method comprising the steps of: receiving data related to a network connected device; determining a vulnerability state of the network connected device based upon the data; storing the vulnerability state in a vulnerability state database; receiving additional data related to the network connected device; determining an updated vulnerability state of the network connected device based upon the additional data; determining one or more deltas based upon differences between the vulnerability stare and the updated vulnerability state; and updating the stored vulnerability state with the updated vulnerability state.
    Type: Grant
    Filed: February 5, 2015
    Date of Patent: February 20, 2018
    Assignee: Qualys, Inc.
    Inventors: Sumedh Thakar, Bharat Patel, Balaji Venkatesan, Tristan Burch, Sean M. Molloy, Matthew L. Wirges
  • Publication number: 20170230424
    Abstract: A security management system may be remotely deployed (e.g., using a cloud-based architecture) to add security to an enterprise network. For example, the security management system may scan assets within the enterprise network for vulnerabilities and may receive data chunks from these scans. The security management system may also receive data chunks from other sources, and, as a result, the system may handle data chunks having many different formats and attributes. When the security management system tries to associate data chunks to assets, there may not be a globally unique identifier that is applicable for all received data chunks. Provided in the present disclosure are exemplary techniques for tracking assets across a network using an asset correlation engine that can flexibly match data chunks to assets based on the attribute or attributes that are available within the data chunks.
    Type: Application
    Filed: March 6, 2017
    Publication date: August 10, 2017
    Inventors: Sean M. Molloy, Matthew L. Wirges, Amol S. Sonawane
  • Patent number: 9591027
    Abstract: A security management system may be remotely deployed (e.g., using a cloud-based architecture) to add security to an enterprise network. For example, the security management system may scan assets within the enterprise network for vulnerabilities and may receive data chunks from these scans. The security management system may also receive data chunks from other sources, and, as a result, the system may handle data chunks having many different formats and attributes. When the security management system tries to associate data chunks to assets, there may not be a globally unique identifier that is applicable for all received data chunks. Provided in the present disclosure are exemplary techniques for tracking assets across a network using an asset correlation engine that can flexibly match data chunks to assets based on the attribute or attributes that are available within the data chunks.
    Type: Grant
    Filed: February 17, 2015
    Date of Patent: March 7, 2017
    Assignee: Qualys, Inc.
    Inventors: Sean M. Molloy, Matthew L. Wirges, Amol S. Sonawane
  • Publication number: 20160241595
    Abstract: A security management system may be remotely deployed (e.g., using a cloud-based architecture) to add security to an enterprise network. For example, the security management system may scan assets within the enterprise network for vulnerabilities and may receive data chunks from these scans. The security management system may also receive data chunks from other sources, and, as a result, the system may handle data chunks having many different formats and attributes. When the security management system tries to associate data chunks to assets, there may not be a globally unique identifier that is applicable for all received data chunks. Provided in the present disclosure are exemplary techniques for tracking assets across a network using an asset correlation engine that can flexibly match data chunks to assets based on the attribute or attributes that are available within the data chunks.
    Type: Application
    Filed: February 17, 2015
    Publication date: August 18, 2016
    Inventors: Sean M. Molloy, Matthew L. Wirges, Amol S. Sonawane
  • Publication number: 20160234237
    Abstract: Described herein is a system and method for detecting vulnerability state deltas, the method comprising the steps of: receiving data related to a network connected device; determining a vulnerability state of the network connected device based upon the data; storing the vulnerability state in a vulnerability state database; receiving additional data related to the network connected device; determining an updated vulnerability state of the network connected device based upon the additional data; determining one or more deltas based upon differences between the vulnerability stare and the updated vulnerability state; and updating the stored vulnerability state with the updated vulnerability state.
    Type: Application
    Filed: February 5, 2015
    Publication date: August 11, 2016
    Inventors: Sumedh Thakar, Bharat Patel, Balaji Venkatesan, Tristan Burch, Sean M. Molloy, Matthew L. Wirges