Matthew A Stillerman

age ~70

from Ithaca, NY

Also known as:
  • Matt A Stillerman
  • Mathew A Stillerman
Phone and address:
167 Calkins Rd, Ithaca, NY 14850
6072772960

Matthew Stillerman Phones & Addresses

  • 167 Calkins Rd, Ithaca, NY 14850 • 6072772960
  • Sioux Falls, SD
  • Andover, MA
  • Warrenton, VA

Us Patents

  • Remote Collection Of Computer Forensic Evidence

    view source
  • US Patent:
    7496959, Feb 24, 2009
  • Filed:
    Jun 23, 2003
  • Appl. No.:
    10/608767
  • Inventors:
    Frank N. Adelstein - Ithaca NY, US
    Matthew A. Stillerman - Ithaca NY, US
    Robert Joyce - Ithaca NY, US
  • Assignee:
    Architecture Technology Corporation - Minneapolis MN
  • International Classification:
    H04L 9/32
  • US Classification:
    726 21, 726 30, 713187
  • Abstract:
    The invention is directed to techniques for allowing a user to remotely interrogate a target computing device in order to collect and analyze computer evidence that may be stored on the target computing device. A forensic device receives input from a remote user that identifies computer evidence to acquire from the target computing device. The forensic device acquires the computer evidence from the target computing device and presents a user interface for the forensic device through which the remote user views the computer evidence acquired from the target computing device. In this manner, forensic device allows the user to interrogate the target computing device to acquire the computer evidence without seizing or otherwise “shutting down” the target device.
  • Active Verification Of Boot Firmware

    view source
  • US Patent:
    7716470, May 11, 2010
  • Filed:
    Dec 16, 2008
  • Appl. No.:
    12/336222
  • Inventors:
    Matthew A. Stillerman - Ithaca NY, US
    Dexter Kozen - Ithaca NY, US
    Thomas J. Merritt - Pleasanton CA, US
  • Assignee:
    Architecture Technology Corporation - Minneapolis MN
  • International Classification:
    H04L 29/00
    H04L 9/32
  • US Classification:
    713156, 713175, 713187, 713190, 726 21, 726 30
  • Abstract:
    Techniques are described for generating and actively verifying a boot code associated with a peripheral device of a computer system to prevent potential security threats the boot code may introduce into the computer system. The techniques for generating boot code entail generating the boot code from a high-level programming language using a verification application program interface (API). The API aids in generating a certificate, which is associated with the boot code in that the certificate describes operation of the boot code. After generating the boot code and associated certificate, the two are loaded onto a memory module of the peripheral device. Once the peripheral device is connected to the computer system, the computer system may retrieve the boot code and certificate. The computer system utilizes techniques to actively verify the boot code by performing a security check on the boot code in accordance with the associated certificate. Finally, the computer system executes the boot code based on a result of the security check.
  • Dynamic Assembly Of Information Pedigrees

    view source
  • US Patent:
    7908281, Mar 15, 2011
  • Filed:
    Nov 20, 2007
  • Appl. No.:
    11/943374
  • Inventors:
    Carla Marceau - Ithaca NY, US
    Matthew A. Stillerman - Ithaca NY, US
    David Rosenthal - Ithaca NY, US
    Marisa Gioioso - Ithaca NY, US
  • Assignee:
    Architecture Technology Corporation - Minneapolis MN
  • International Classification:
    G06F 17/30
    G06F 7/00
  • US Classification:
    707751, 707770, 707773, 707775
  • Abstract:
    This disclosure describes techniques of dynamically assembling and utilizing a pedigree of a resource. A pedigree of a resource is a set of statements that describe a provenance of the resource. As described herein, a set of one or more servers may host context objects that contain the statements that make up the pedigree of the resource. In order to obtain the pedigree of the resource, a context assembly device may send queries to the servers for context objects that are likely to contain statements in the pedigree of the resource. After receiving context objects from the servers in response to the queries, the context assembly device may query the statements in the received context objects in order to identify, among the statements in the context objects, the statements that constitute the pedigree of the resource. The dynamically assembled pedigree may then be used in a variety of ways.
  • Secure Peer-To-Peer Object Storage System

    view source
  • US Patent:
    8015211, Sep 6, 2011
  • Filed:
    Oct 1, 2004
  • Appl. No.:
    10/957235
  • Inventors:
    Carla Marceau - Ithaca NY, US
    Matthew A. Stillerman - Ithaca NY, US
  • Assignee:
    Architecture Technology Corporation - Minneapolis MN
  • International Classification:
    G06F 17/30
    H04L 9/00
  • US Classification:
    707802, 707781, 380277
  • Abstract:
    A peer-to-peer (P2P) networking system is disclosed that provides a large, persistent object repository with the ability to easily scale to significant size. Data security is provided using a distributed object data access mechanism to grant access to data objects to authorized users. Data objects stored within the object repository are provided a plurality of security options including plain text data, objects, encrypted data objects, and secure, secret sharing data objects. A data object query processing component permits users to locate requested information within the P2P networking system.
  • Remote Collection Of Computer Forensic Evidence

    view source
  • US Patent:
    8176557, May 8, 2012
  • Filed:
    Feb 12, 2009
  • Appl. No.:
    12/370447
  • Inventors:
    Frank N. Adelstein - Ithaca NY, US
    Matthew A. Stillerman - Ithaca NY, US
    Robert Joyce - Ithaca NY, US
  • Assignee:
    Architecture Technology Corporation - Minneapolis MN
  • International Classification:
    G06F 12/16
  • US Classification:
    726 23, 726 22, 713187
  • Abstract:
    The invention is directed to techniques for allowing a user to remotely interrogate a target computing device in order to collect and analyze computer evidence that may be stored on the target computing device. A forensic device receives input from a remote user that identifies computer evidence to acquire from the target computing device. The forensic device acquires the computer evidence from the target computing device and presents a user interface for the forensic device through which the remote user views the computer evidence acquired from the target computing device. In this manner, forensic device allows the user to interrogate the target computing device to acquire the computer evidence without seizing or otherwise “shutting down” the target device.
  • Remote Collection Of Computer Forensic Evidence

    view source
  • US Patent:
    8474047, Jun 25, 2013
  • Filed:
    May 7, 2012
  • Appl. No.:
    13/465859
  • Inventors:
    Frank N. Adelstein - Ithaca NY, US
    Matthew A. Stillerman - Ithaca NY, US
    Robert A. Joyce - Ithaca NY, US
  • Assignee:
    Architecture Technology Corporation - Minneapolis MN
  • International Classification:
    G06F 12/14
  • US Classification:
    726 23, 726 24, 726 25, 713187
  • Abstract:
    The invention is directed to techniques for allowing a user to remotely interrogate a target computing device in order to collect and analyze computer evidence that may be stored on the target computing device. A forensic device receives input from a remote user that identifies computer evidence to acquire from the target computing device. The forensic device acquires the computer evidence from the target computing device and presents a user interface for the forensic device through which the remote user views the computer evidence acquired from the target computing device. In this manner, forensic device allows the user to interrogate the target computing device to acquire the computer evidence without seizing or otherwise “shutting down” the target device.
  • Active Verification Of Boot Firmware

    view source
  • US Patent:
    20080271163, Oct 30, 2008
  • Filed:
    Sep 4, 2003
  • Appl. No.:
    10/656751
  • Inventors:
    Matthew A. Stillerman - Ithaca NY, US
    Dexter Kozen - Ithaca NY, US
    Thomas J. Merritt - Pleasanton CA, US
  • International Classification:
    H04L 9/32
  • US Classification:
    726 30
  • Abstract:
    Techniques are described for generating and actively verifying a boot code associated with a peripheral device of a computer system to prevent potential security threats the boot code may introduce into the computer system. The techniques for generating boot code entail generating the boot code from a high-level programming language using a verification application program interface (API). The API aids in generating a certificate, which is associated with the boot code in that the certificate describes operation of the boot code. After generating the boot code and associated certificate, the two are loaded onto a memory module of the peripheral device. Once the peripheral device is connected to the computer system, the computer system may retrieve the boot code and certificate. The computer system utilizes techniques to actively verify the boot code by performing a security check on the boot code in accordance with the associated certificate. Finally, the computer system executes the boot code based on a result of the security check.
  • Identifying And Representing Changes Between Extensible Markup Language (Xml) Files

    view source
  • US Patent:
    20120109905, May 3, 2012
  • Filed:
    Dec 9, 2011
  • Appl. No.:
    13/316258
  • Inventors:
    Daniel James Tingstrom - Ithaca NY, US
    Robert A. Joyce - Ithaca NY, US
    Matthew A. Stillerman - Ithaca NY, US
    Stephen Kurt Brueckner - Ithaca NY, US
    Haim Yehuda Bar - Ithaca NY, US
  • Assignee:
    ARCHITECTURE TECHNOLOGY CORPORATION - Minneapolis MN
  • International Classification:
    G06F 7/00
    G06F 17/30
  • US Classification:
    707690, 707E17127, 707E1701
  • Abstract:
    This disclosure is directed to techniques for providing comparing first and second XML files to one another. According to these techniques, a computing device (e.g., a version control service executing on the computing device), may be configured generate at least two edit transcripts that each include one or more operational changes that may be applied to data elements of the first XML file to arrive at data elements of the second XML file (or vice versa). The computing device may select at least one optimal edit transcript based on which of the number of operational changes of the at least two edit transcripts.

Get Report for Matthew A Stillerman from Ithaca, NY, age ~70
Control profile