-
公开(公告)号:US20230179420A1
公开(公告)日:2023-06-08
申请号:US18145841
申请日:2022-12-22
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Ranga S. Ramanujan , Deborah K. Charan , Barry A. Trent , Jordan C. Bonney
CPC classification number: H04L9/3213 , H04L9/3228 , H04L63/083 , H04L9/3263 , H04L9/3234
Abstract: Embodiments for a computer readable medium including a software module are provided. The software module causes one or more processing devices to obtain a biometric identifier from a user. Access to a resource is requested by providing a software credential token and the biometric identifier. The software credential token corresponds to a hardware credential token, and the hardware credential token is one of a set of hardware credential tokens that are used to access the resource. An indication that access to the resource has been granted is received and after receiving the indication an indication that the access to the resource has been revoked is received. After receiving the indication that access to the resource has been revoked, a biometric identifier is re-obtained from a user and access to the resource is re-requested by providing a software credential token and the re-obtained biometric identifier.
-
公开(公告)号:US11539524B1
公开(公告)日:2022-12-27
申请号:US16946940
申请日:2020-07-13
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Ranga S. Ramanujan , Deborah K. Charan , Barry A. Trent , Jordan C. Bonney
Abstract: Embodiments for a computer readable medium including a software module are provided. The software module causes one or more processing devices to obtain a biometric identifier from a user. Access to a resource is requested by providing a software credential token and the biometric identifier. The software credential token corresponds to a hardware credential token, and the hardware credential token is one of a set of hardware credential tokens that are used to access the resource. An indication that access to the resource has been granted is received and after receiving the indication an indication that the access to the resource has been revoked is received. After receiving the indication that access to the resource has been revoked, a biometric identifier is re-obtained from a user and access to the resource is re-requested by providing a software credential token and the re-obtained biometric identifier.
-
公开(公告)号:US10810314B1
公开(公告)日:2020-10-20
申请号:US15851850
申请日:2017-12-22
Applicant: Architecture Technology Corporation
Inventor: Ryan C. Marotz , Barry A. Trent
Abstract: Embodiments for a database connector are disclosed. The database connector can encrypt data from an application before storing the data in the database using attribute-based encryption (ABE). The database connector can also decrypt data retrieved from the database using an ABE private key before sending the data to the application. The database connector can generate a logical attribute statement for encryption of data from the application based on attributes, logical relations, and/or relational operators received from the application, directly from a user, or imbedded within rules governing logical attribute statement genesis.
-
公开(公告)号:US20200328972A1
公开(公告)日:2020-10-15
申请号:US16812917
申请日:2020-03-09
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Ranga S. Ramanujan , Benjamin L. Burnett , Barry A. Trent , Jafar Al-Gharaibeh
IPC: H04L12/741 , H04L12/751 , H04L12/729 , H04W40/00 , H04L12/707
Abstract: A method of routing an Internet Protocol (IP) packet from a routing device is provided. The method includes receiving a first IP packet having a first IP header and a first IP data field, the first IP packet having a final destination corresponding to a destination device communicatively coupled to the routing device via a network route including at least two hops between the routing device and the final destination. A second IP packet having a second IP header and a second IP data field is generated. The second IP data field is a copy of the first IP data field, and a destination IP address field in the second IP header includes an IP address of a next hop on the network route. The second IP packet does not include an IP address of the final destination in the second IP header.
-
公开(公告)号:US20200218831A1
公开(公告)日:2020-07-09
申请号:US16825548
申请日:2020-03-20
Applicant: Architecture Technology Corporation
Inventor: Barry A. Trent , Edward R. Mandy
Abstract: A distributed file integrity checking system is described. The described peer integrity checking system (PICS) may negate an attack by storing a properties database amongst nodes of a peer-to-peer network of hosts, some or all of which co-operate to protect and watch over each other.
-
公开(公告)号:US11968621B1
公开(公告)日:2024-04-23
申请号:US17339658
申请日:2021-06-04
Applicant: Architecture Technology Corporation
Inventor: Barry A. Trent
CPC classification number: H04W52/0225 , H04W4/02
Abstract: Embodiments for a module for scheduling sleep/wake intervals for a first one or more communication devices are disclosed. The module includes a computer readable medium having instructions thereon. The instructions, when executed by one or more processing devices, cause the one or more processing devices to obtain a coverage prediction for the one or more mobile communication devices. The coverage prediction indicates a start and an end of at least one future interval during which one or more orbiting communication platforms are predicted to be within range of the one or more mobile communication devices. The instructions also cause the one or more processing devices to generate at least one future sleep interval having a start and an end and at least one future wake interval having a start and an end to control the one or more mobile communication devices based on the coverage prediction.
-
公开(公告)号:US10482773B1
公开(公告)日:2019-11-19
申请号:US15622142
申请日:2017-06-14
Applicant: Architecture Technology Corporation
Inventor: Barry A. Trent , Ranga S. Ramanujan , Fabio F. Pozzo
Abstract: A method of generating a path for a vehicle is disclosed. The method includes receiving information indicating a location of each of a plurality of communication nodes. The vehicle is configured to send wireless signals to and receive wireless signals from the plurality of communication nodes. A path of motion for the vehicle is determined based on coverage of the plurality of communication nodes along the path. Coverage corresponds to connectivity between the vehicle and the plurality of communication nodes.
-
公开(公告)号:US20170364708A1
公开(公告)日:2017-12-21
申请号:US15692737
申请日:2017-08-31
Applicant: Architecture Technology Corporation
Inventor: Barry A. Trent , Edward R. Mandy
CPC classification number: G06F21/64 , G06F21/568 , H04L67/104
Abstract: A distributed file integrity checking system is described. The described peer integrity checking system (PICS) may negate an attack by storing a properties database amongst nodes of a peer-to-peer network of hosts, some or all of which co-operate to protect and watch over each other.
-
9.
公开(公告)号:US09191377B2
公开(公告)日:2015-11-17
申请号:US14165192
申请日:2014-01-27
Applicant: Architecture Technology Corporation
Inventor: Deborah K. Charan , Taylor Bouvin , Ranga Ramanujan , Barry A. Trent
IPC: H04L29/06
CPC classification number: H04L63/0471 , H04L63/0428 , H04L63/164 , H04L63/166 , H04L63/18
Abstract: This disclosure is directed to techniques for providing communication between devices in different networks wherein the communication must first pass through an encryption mechanism and the devices do not have the stand-alone capability to encrypt or decrypt the communication. According to these techniques, an adapter may determine certain fields in a data packet that remain unencrypted when the data packet passes through the encryption mechanism. The adapter may then process those fields in such a way that, when the data packets are received by a second adapter, the second adapter may read those fields and obtain information.
Abstract translation: 本公开涉及用于在不同网络中的设备之间提供通信的技术,其中通信必须首先通过加密机制,并且该设备不具有加密或解密通信的独立能力。 根据这些技术,当数据分组通过加密机制时,适配器可以确定在数据分组中保持未加密的某些字段。 然后,适配器可以以这样的方式处理这些字段,即当数据分组被第二适配器接收时,第二适配器可以读取这些字段并获得信息。
-
公开(公告)号:US12058262B2
公开(公告)日:2024-08-06
申请号:US18145841
申请日:2022-12-22
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Ranga S. Ramanujan , Deborah K. Charan , Barry A. Trent , Jordan C. Bonney
CPC classification number: H04L9/3213 , H04L9/3228 , H04L9/3234 , H04L9/3263 , H04L63/083
Abstract: Embodiments for a computer readable medium including a software module are provided. The software module causes one or more processing devices to obtain a biometric identifier from a user. Access to a resource is requested by providing a software credential token and the biometric identifier. The software credential token corresponds to a hardware credential token, and the hardware credential token is one of a set of hardware credential tokens that are used to access the resource. An indication that access to the resource has been granted is received and after receiving the indication an indication that the access to the resource has been revoked is received. After receiving the indication that access to the resource has been revoked, a biometric identifier is re-obtained from a user and access to the resource is re-requested by providing a software credential token and the re-obtained biometric identifier.
-
-
-
-
-
-
-
-
-