Patents by Inventor Matthew P. Moynahan

Matthew P. Moynahan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190251267
    Abstract: Security analysis and vulnerability testing results are “packaged” or “bound to” the actual software it describes. By linking the results to the software itself, downstream users of the software can access information about the software, make informed decisions about implementation of the software, and analyze the security risk across an entire system by accessing all (or most) of the reports associated with the executables running on the system and summarizing the risks identified in the reports.
    Type: Application
    Filed: April 29, 2019
    Publication date: August 15, 2019
    Inventors: Christopher J. Wysopal, Christopher J. Eng, Matthew P. Moynahan
  • Patent number: 10275600
    Abstract: Security analysis and vulnerability testing results are “packaged” or “bound to” the actual software it describes. By linking the results to the software itself, downstream users of the software can access information about the software, make informed decisions about implementation of the software, and analyze the security risk across an entire system by accessing all (or most) of the reports associated with the executables running on the system and summarizing the risks identified in the reports.
    Type: Grant
    Filed: May 26, 2015
    Date of Patent: April 30, 2019
    Assignee: Veracode, Inc.
    Inventors: Christopher J. Wysopal, Christopher J. Eng, Matthew P. Moynahan
  • Patent number: 10264012
    Abstract: A method, system and computer-usable medium are disclosed for generating a cyber behavior profile comprising monitoring user interactions between a user and an information handling system; converting the user interactions into electronic information representing the user interactions, the electronic information representing the user interactions comprising multi-layered electronic information, each layer of the multi-layered electronic information corresponding to a respective layer of user interaction; and generating a unique multi-dimensional cyber behavior profile based upon the multi-layered electronic information representing the user interactions.
    Type: Grant
    Filed: April 20, 2018
    Date of Patent: April 16, 2019
    Assignee: Forcepoint, LLC
    Inventors: Matthew P. Moynahan, Richard Anthony Ford, Christopher Brian Shirey, Brandon L. Swafford, Richard Heath Thompson
  • Publication number: 20190007424
    Abstract: A method, system and computer-usable medium are disclosed for generating a cyber behavior profile, comprising: monitoring user interactions between a user and an information handling system; converting the user interactions and the information about the user into electronic information representing the user interactions; generating a unique cyber behavior profile based upon the electronic information representing the user interactions and the information about the user; and, storing information relating to the unique cyber behavior profile in a behavior blockchain.
    Type: Application
    Filed: August 13, 2018
    Publication date: January 3, 2019
    Inventors: Richard Anthony Ford, Brandon L. Swafford, Christopher Brian Shirey, Matthew P. Moynahan, Richard Heath Thompson
  • Patent number: 10171488
    Abstract: A method, system and computer-usable medium are disclosed for generating a cyber behavior profile comprising monitoring user interactions between a user and an information handling system; converting the user interactions into electronic information representing the user interactions, the electronic information representing the user interactions comprising multi-layered electronic information, each layer of the multi-layered electronic information corresponding to a respective layer of user interaction; and generating a unique multi-dimensional cyber behavior profile based upon the multi-layered electronic information representing the user interactions.
    Type: Grant
    Filed: January 11, 2018
    Date of Patent: January 1, 2019
    Assignee: Forcepoint, LLC
    Inventors: Matthew P. Moynahan, Richard Anthony Ford, Christopher Brian Shirey, Brandon L. Swafford, Richard Heath Thompson
  • Publication number: 20180332068
    Abstract: A method, system and computer-usable medium are disclosed for generating a cyber behavior profile comprising monitoring user interactions between a user and an information handling system; converting the user interactions into electronic information representing the user interactions, the electronic information representing the user interactions comprising multi-layered electronic information, each layer of the multi-layered electronic information corresponding to a respective layer of user interaction; and generating a unique multi-dimensional cyber behavior profile based upon the multi-layered electronic information representing the user interactions.
    Type: Application
    Filed: April 20, 2018
    Publication date: November 15, 2018
    Inventors: Matthew P. Moynahan, Richard Anthony Ford, Christopher Brian Shirey, Brandon L. Swafford, Richard Heath Thompson
  • Publication number: 20180332066
    Abstract: A method, system and computer-usable medium are disclosed for generating a cyber behavior profile comprising monitoring user interactions between a user and an information handling system; converting the user interactions into electronic information representing the user interactions, the electronic information representing the user interactions comprising multi-layered electronic information, each layer of the multi-layered electronic information corresponding to a respective layer of user interaction; and generating a unique multi-dimensional cyber behavior profile based upon the multi-layered electronic information representing the user interactions.
    Type: Application
    Filed: January 11, 2018
    Publication date: November 15, 2018
    Inventors: Matthew P. Moynahan, Richard Anthony Ford, Christopher Brian Shirey, Brandon L. Swafford, Richard Heath Thompson
  • Patent number: 10063568
    Abstract: A method, system and computer-usable medium are disclosed for generating a cyber behavior profile, comprising: monitoring user interactions between a user and an information handling system; converting the user interactions and the information about the user into electronic information representing the user interactions; generating a unique cyber behavior profile based upon the electronic information representing the user interactions and the information about the user; and, storing information relating to the unique cyber behavior profile in a behavior blockchain.
    Type: Grant
    Filed: January 24, 2018
    Date of Patent: August 28, 2018
    Assignee: Forcepoint LLC
    Inventors: Richard Anthony Ford, Brandon L. Swafford, Christopher Brian Shirey, Matthew P. Moynahan, Richard Heath Thompson
  • Patent number: 9882918
    Abstract: A method, system and computer-usable medium are disclosed for generating a cyber behavior profile, comprising: monitoring user interactions between a user and an information handling system; converting the user interactions and the information about the user into electronic information representing the user interactions; generating a unique cyber behavior profile based upon the electronic information representing the user interactions and the information about the user; and, storing information relating to the unique cyber behavior profile in a behavior blockchain.
    Type: Grant
    Filed: September 29, 2017
    Date of Patent: January 30, 2018
    Assignee: Forcepoint, LLC
    Inventors: Richard Anthony Ford, Brandon L. Swafford, Christopher Brian Shirey, Matthew P. Moynahan, Richard Heath Thompson
  • Publication number: 20160098564
    Abstract: Security analysis and vulnerability testing results are “packaged” or “bound to” the actual software it describes. By linking the results to the software itself, downstream users of the software can access information about the software, make informed decisions about implementation of the software, and analyze the security risk across an entire system by accessing all (or most) of the reports associated with the executables running on the system and summarizing the risks identified in the reports.
    Type: Application
    Filed: May 26, 2015
    Publication date: April 7, 2016
    Inventors: Christopher J. Wysopal, Christopher J. Eng, Matthew P. Moynahan
  • Patent number: 9069967
    Abstract: Security analysis and vulnerability testing results are “packaged” or “bound to” the actual software it describes. By linking the results to the software itself, downstream users of the software can access information about the software, make informed decisions about implementation of the software, and analyze the security risk across an entire system by accessing all (or most) of the reports associated with the executables running on the system and summarizing the risks identified in the reports.
    Type: Grant
    Filed: September 17, 2010
    Date of Patent: June 30, 2015
    Assignee: Veracode, Inc.
    Inventors: Christopher J. Wysopal, Christopher J. Eng, Matthew P. Moynahan
  • Patent number: 8613080
    Abstract: Security analysis and vulnerability testing results are “packaged” or “bound to” the actual software it describes. By linking the results to the software itself, downstream users of the software can access information about the software, make informed decisions about implementation of the software, and analyze the security risk across an entire system by accessing all (or most) of the reports associated with the executables running on the system and summarizing the risks identified in the reports.
    Type: Grant
    Filed: June 7, 2011
    Date of Patent: December 17, 2013
    Assignee: Veracode, Inc.
    Inventors: Christopher J. Wysopal, Matthew P. Moynahan, Jon R. Stevenson
  • Patent number: 8499353
    Abstract: Security assessment and vulnerability testing of software applications is performed based at least in part on application metadata in order to determine an appropriate assurance level and associated test plan that includes multiple types of analysis. Steps from each test are combined into a “custom” or “application-specific” workflow, and the results of each test may then be correlated with other results to identify potential vulnerabilities and/or faults.
    Type: Grant
    Filed: February 15, 2008
    Date of Patent: July 30, 2013
    Assignee: Veracode, Inc.
    Inventors: Malcolm W. Lockhart, Christopher J. Wysopal, Christopher J. Eng, Matthew P. Moynahan, Simeon Simeonov
  • Publication number: 20120072968
    Abstract: Security analysis and vulnerability testing results are “packaged” or “bound to” the actual software it describes. By linking the results to the software itself, downstream users of the software can access information about the software, make informed decisions about implementation of the software, and analyze the security risk across an entire system by accessing all (or most) of the reports associated with the executables running on the system and summarizing the risks identified in the reports.
    Type: Application
    Filed: June 7, 2011
    Publication date: March 22, 2012
    Inventors: Christopher J. Wysopal, Matthew P. Moynahan, Jon R. Stevenson
  • Publication number: 20110173693
    Abstract: Security analysis and vulnerability testing results are “packaged” or “bound to” the actual software it describes. By linking the results to the software itself, downstream users of the software can access information about the software, make informed decisions about implementation of the software, and analyze the security risk across an entire system by accessing all (or most) of the reports associated with the executables running on the system and summarizing the risks identified in the reports.
    Type: Application
    Filed: September 17, 2010
    Publication date: July 14, 2011
    Inventors: Christopher J. Wysopal, Christopher J. Eng, Matthew P. Moynahan
  • Publication number: 20100281248
    Abstract: Security assessment and vulnerability testing of software applications is performed based at least in part on application metadata in order to determine an appropriate assurance level and associated test plan that includes multiple types of analysis. Steps from each test are combined into a “custom” or “application-specific” workflow, and the results of each test may then be correlated with other results to identify potential vulnerabilities and/or faults.
    Type: Application
    Filed: June 21, 2010
    Publication date: November 4, 2010
    Inventors: Malcolm W. Lockhart, Christopher J. Wysopal, Christopher J. Eng, Matthew P. Moynahan, Simeon Simeonov
  • Publication number: 20080209567
    Abstract: Security assessment and vulnerability testing of software applications is performed based at least in part on application metadata in order to determine an appropriate assurance level and associated test plan that includes multiple types of analysis. Steps from each test are combined into a “custom” or “application-specific” workflow, and the results of each test may then be correlated with other results to identify potential vulnerabilities and/or faults.
    Type: Application
    Filed: February 15, 2008
    Publication date: August 28, 2008
    Inventors: Malcolm W. Lockhart, Christopher J. Wysopal, Christopher J. Eng, Matthew P. Moynahan, Simeon Simeonov