Patents by Inventor Matthew Quincy Riley
Matthew Quincy Riley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240054216Abstract: A system and method for computer security of a protected device that has a processor and an operating system software running on the processor includes security software that runs on the protected device and has local data for control of the security software. Upon initialization of the security software, the security software loads the local data and periodically reads file-type associations from the operating system software. For each file-type association, the security software determines if that file type is permitted by the local data and if that file type is not permitted by the local data, the security software removes that file-type association from the operating system software.Type: ApplicationFiled: August 15, 2022Publication date: February 15, 2024Inventors: Robert J. Cheng, Matthew Quincy Riley
-
Patent number: 11636219Abstract: A computer security system with enhanced whitelisting includes administrative interfaces that accept user inputs to create and modify entries in a whitelist that define which programs are allowed to execute on one or more target computer systems. Upon an attempt to run a program, the entries in the whitelist are used to determine if the program is allowed to run. If an entry in the whitelist indicates that the program is allowed to run, the program is run. Otherwise, at a later time, an administrative interface is used to either block future execution of the program or to create an entry in the whitelist that allows execution of a class of programs or only that the program in the future until revoked. The whitelist is for a single target computer or many computers.Type: GrantFiled: May 3, 2021Date of Patent: April 25, 2023Assignee: PC MATIC, INC.Inventors: Matthew Quincy Riley, Robert J. Cheng, Robert J. Woodworth, Jr., Andrew Tuch
-
Publication number: 20230038774Abstract: A system for intelligent managing whitelists and blacklist provides options and/or suggestions to the administrators and/or information technology team to allow administration of whitelists and/or blacklists based upon history and rules. For example, if permission to run a certain program is requested by several people in a group or organization and the program is not believed to have a virus, then, the administrator if presented with an option to enable (e.g., add to the whitelist) that program for the entire group or organization.Type: ApplicationFiled: October 21, 2022Publication date: February 9, 2023Applicant: PC Matic, Inc.Inventors: Robert J. Cheng, Robert J. Woodworth, JR., Andrew Tuch, Matthew Quincy Riley, Devin R. Bergin
-
Patent number: 11507675Abstract: A computer security system with enhanced whitelisting includes user interfaces that accept user inputs to create and modify a set of rules that define which programs are allowed to execute on one or more target systems. Upon an attempt to run a program, the set of rules are used to determine if the program is allowed to run. If any rule indicates that the program is allowed to run, the program is run. Otherwise, a user interface is presented to either block execution of the program or to create a new rule that would allow execution of the program this time and in the future.Type: GrantFiled: December 28, 2020Date of Patent: November 22, 2022Assignee: PC MATIC, INC.Inventors: Matthew Quincy Riley, Robert J. Cheng, Robert J. Woodworth, Jr., Andrew Tuch
-
Publication number: 20220188409Abstract: A computer security system with enhanced blacklisting includes administrative interfaces that accept user inputs to create and modify entries in a blacklist and a whitelist that define which programs are allowed to execute on one or more target computer systems. Upon an attempt to run a program, if the program is in the blacklist and not in the white list, the program is prevented from running. If the program is prevented from running, at a later time, an administrative interface is used to either block future execution of the program or to create an entry in the whitelist that allows future execution of a class of programs or only that the program until revoked. The whitelists and blacklists are for a single target computer or many computers.Type: ApplicationFiled: March 8, 2022Publication date: June 16, 2022Applicant: PC Matic, Inc.Inventors: Matthew Quincy Riley, Robert J. Cheng, Robert J. Woodworth, Jr., Andrew Tuch
-
Publication number: 20220083672Abstract: A computer security system with enhanced whitelisting includes user interfaces that accept user inputs to create and modify a set of rules that define which programs are allowed to execute on one or more target systems. Upon an attempt to run a program, the set of rules are used to determine if the program is allowed to run. If any rule indicates that the program is allowed to run, the program is run. Otherwise, a user interface is presented to either block execution of the program or to create a new rule that would allow execution of the program this time and in the future.Type: ApplicationFiled: December 28, 2020Publication date: March 17, 2022Applicant: PC Matic, Inc.Inventors: Matthew Quincy Riley, Robert J. Cheng, Robert J. Woodworth, JR., Andrew Tuch
-
Publication number: 20220083650Abstract: A system and method of protecting a computer includes providing a whitelist of known applications and a set of rules for determining if a program is benign. Upon an attempt to initiate a program, determining if the program is in the whitelist and if the program is in the whitelist, allowing the program to run. If the program is not in the whitelist, determining if the program is benign based upon the set of rules or strategy and presenting the rule/strategy to the user. If the user accepts the rule/strategy, running the program and updating the whitelist for allowing future attempts to run the program and any other program that conforms to the one rule. If the program is not determined to be benign, the program is not allowed to execution unless a specific override is made.Type: ApplicationFiled: September 11, 2020Publication date: March 17, 2022Applicant: PC Matic, Inc.Inventors: Matthew Quincy Riley, Robert J. Cheng, Robert J. Woodworth, JR.
-
Publication number: 20220083673Abstract: A computer security system with enhanced whitelisting includes administrative interfaces that accept user inputs to create and modify entries in a whitelist that define which programs are allowed to execute on one or more target computer systems. Upon an attempt to run a program, the entries in the whitelist are used to determine if the program is allowed to run. If an entry in the whitelist indicates that the program is allowed to run, the program is run. Otherwise, at a later time, an administrative interface is used to either block future execution of the program or to create an entry in the whitelist that allows execution of a class of programs or only that the program in the future until revoked. The whitelist is for a single target computer or many computers.Type: ApplicationFiled: May 3, 2021Publication date: March 17, 2022Applicant: PC Matic, Inc.Inventors: Matthew Quincy Riley, Robert J. Cheng, Robert J. Woodworth, JR., Andrew Tuch
-
Patent number: 11275828Abstract: A system and method of protecting a computer includes providing a whitelist of known applications and a set of rules for determining if a program is benign. Upon an attempt to initiate a program, determining if the program is in the whitelist and if the program is in the whitelist, allowing the program to run. If the program is not in the whitelist, determining if the program is benign based upon the set of rules or strategy and presenting the rule/strategy to the user. If the user accepts the rule/strategy, running the program and updating the whitelist for allowing future attempts to run the program and any other program that conforms to the one rule. If the program is not determined to be benign, the program is not allowed to execution unless a specific override is made.Type: GrantFiled: September 11, 2020Date of Patent: March 15, 2022Assignee: PC MATIC, INC.Inventors: Matthew Quincy Riley, Robert J. Cheng, Robert J. Woodworth, Jr.
-
Patent number: 11227034Abstract: A system for providing a password hint authenticates a username and password against a stored username and stored password. Upon failure of the authentication, the system determines a password formation rule that was in force when the user created the stored password then compares the password to the password formation rule and if the password violated any part of the password formation rule, the system reports each part of the password that violated the any part of the password formation rule.Type: GrantFiled: January 27, 2020Date of Patent: January 18, 2022Assignee: PC MATIC, INC.Inventor: Matthew Quincy Riley
-
Publication number: 20210232663Abstract: A system for providing a password hint authenticates a username and password against a stored username and stored password. Upon failure of the authentication, the system determines a password formation rule that was in force when the user created the stored password then compares the password to the password formation rule and if the password violated any part of the password formation rule, the system reports each part of the password that violated the any part of the password formation rule.Type: ApplicationFiled: January 27, 2020Publication date: July 29, 2021Applicant: PC Matic, Inc.Inventor: Matthew Quincy Riley
-
Publication number: 20210049268Abstract: A system for computer security includes a device protected by the system for computer security having software running on the device that detects an attempt to run a script in a browser. Responsive to the attempt to run the script in the browser or a pattern of function calls made by the script, the software running on the device scans the script and/or monitors the function calls to determine if the script is an infinite alert. If the script is an infinite alert, the software running on the device prevents execution of the script or kills the script if it is already running. If the script is not an infinite alert, the software running on the device allows execution/completion of the script. Determining if the script includes an infinite alert includes, for example, a certain length of script or finding certain 800 numbers and/or specific keywords in the script.Type: ApplicationFiled: August 15, 2019Publication date: February 18, 2021Applicant: PC Matic IncInventors: Robert J. Cheng, Matthew Quincy Riley
-
Publication number: 20190260740Abstract: Protecting a computer by installing, on the computer software, software running before providing general access of the computer by a user. The software validates access by the user by way of a primary authorization (for example, by username and password, fingerprint recognition, facial recognition, voice recognition, retinal scan). Responsive to passing of the validating access by the user by way of the primary authorization, the software validates access by the user by way of a secondary authorization, the secondary authorization comprising validating by one or more of a location of the computer, a serial number of the computer, and a MAC address of a communications adapter of the computer.Type: ApplicationFiled: February 16, 2018Publication date: August 22, 2019Applicant: P.C. Pitstop, Inc.Inventor: Matthew Quincy Riley