-
公开(公告)号:US10452466B1
公开(公告)日:2019-10-22
申请号:US15826527
申请日:2017-11-29
Applicant: Architecture Technology Corporation
Inventor: Tyler J. Mitchell , Kenneth McVearry
Abstract: An example method includes receiving one or more cross-platform system maintenance rules that are generated by and sent from a central server computing system, determining a type of software operating system currently being executed by a client computing system, determining, based on the one or more cross-platform system maintenance rules and further based on the type of software operating system, one or more platform-specific system maintenance rules that specify one or more platform-specific system maintenance operations and scheduling information, and determining, based on scheduling information identified by the one or more platform-specific system maintenance rules, a schedule indicating when to perform the one or more platform-specific system maintenance operations. The example method includes initiating performance of the one or more platform-specific system maintenance operations in accordance with the schedule, collecting one or more results, and generating and sending at least one summary report.
-
公开(公告)号:US10235357B2
公开(公告)日:2019-03-19
申请号:US15478550
申请日:2017-04-04
Applicant: Architecture Technology Corporation
Inventor: Andrew Murphy , Eric Chartier , Evan Eaves , William Colligan
Abstract: A computer-implemented method for analyzing documents includes a processor receiving one or more documents, from a community-based document delivery system, related to a domain of interest; the processor identifying and extracting one or more data items from the one or more documents; determining if an identified and extracted data item comprises a true mention of a named entity; analyzing a context of the true mention of the named entity in the document; and determining, based on the analyzed context, if the document is a true document.
-
公开(公告)号:US20180285340A1
公开(公告)日:2018-10-04
申请号:US15478550
申请日:2017-04-04
Applicant: Architecture Technology Corporation
Inventor: Andrew Murphy , Eric Chartier , Evan Eaves , William Colligan
CPC classification number: G06F17/278 , G06F17/2785 , G06F17/30011 , G06F17/30707
Abstract: A computer-implemented method for analyzing documents includes a processor receiving one or more documents, from a community-based document delivery system, related to a domain of interest; the processor identifying and extracting one or more data items from the one or more documents; determining if an identified and extracted data item comprises a true mention of a named entity; analyzing a context of the true mention of the named entity in the document; and determining, based on the analyzed context, if the document is a true document.
-
公开(公告)号:US10068493B2
公开(公告)日:2018-09-04
申请号:US15199279
申请日:2016-06-30
Applicant: Architecture Technology Corporation
Inventor: Stephen K. Brueckner , Frank N. Adelstein , Haim Yehuda Bar , Matthew P. Donovan
Abstract: This disclosure generally relates to automated execution and evaluation of computer network training exercises, such as in a virtual machine environment. An example environment includes a control and monitoring system, an attack system, and a target system. The control and monitoring system initiates a training scenario to cause the attack system to engage in an attack against the target system. The target system then performs an action in response to the attack. Monitor information associated with the attack against the target system is collected by continuously monitoring the training scenario. The attack system is then capable of sending dynamic response data to the target system, wherein the dynamic response data is generated according to the collected monitor information to adapt the training scenario to the action performed by the target system. The control and monitoring system then generates an automated evaluation based upon the collected monitor information.
-
公开(公告)号:US10043405B1
公开(公告)日:2018-08-07
申请号:US15458052
申请日:2017-03-14
Applicant: Architecture Technology Corporation
Inventor: Eric R. Chartier , Evan Eaves , William Colligan , Andrew Sullivan
Abstract: An advisor system includes a computer-readable storage medium having encoded thereon a program of instructions. Execution of the instructions causes a processor to determine a current state of a first aircraft operating on a movement area of an airport including determining a path vector for the first aircraft. The path vector includes a speed and direction of travel of the first aircraft and identification of a runway intersection the first aircraft is projected to enter. The processor processes a surveillance signal transmitted from a second aircraft operating on the movement area, including determining a quality of the surveillance signal. The processor further determines a movement vector of the second aircraft, and compares the path vector and the movement vector to identify possible interference. Finally, the processor provides an advisory at the first aircraft based on the compared path vector and the movement vector.
-
公开(公告)号:US09887974B2
公开(公告)日:2018-02-06
申请号:US14931620
申请日:2015-11-03
Applicant: Architecture Technology Corporation
Inventor: Deborah K. Charan , Ranga Ramanujan
IPC: H04L29/06
CPC classification number: H04L63/0471 , H04L63/0485 , H04L63/18
Abstract: This disclosure is directed to techniques for providing communication between devices in different networks wherein the communication must first pass through an encryption mechanism and the devices do not have the stand-alone capability to encrypt or decrypt the communication. According to these techniques, an adapter may determine certain fields in a data packet that remain unencrypted when the data packet passes through the encryption mechanism. The adapter may then process those fields in such a way that, when the data packets are received by a second adapter, the second adapter may read those fields and obtain information.
-
公开(公告)号:US09766986B2
公开(公告)日:2017-09-19
申请号:US14011642
申请日:2013-08-27
Applicant: Architecture Technology Corporation
Inventor: Stephen K. Brueckner , Robert A. Joyce , Carl Manson , Hajime Inoue , Kenneth J. Thurber
CPC classification number: G06F11/1469 , G06F9/45533 , G06F9/466 , G06F21/606 , H04L63/145
Abstract: A server system receives messages from client computing devices. Each of the messages corresponds to a transaction. The server system assigns each respective transaction to a respective fresh virtual machine. Furthermore, the server system performs, as part of a respective virtual machine processing a respective transaction, a modification associated with the respective transaction to a shared database. The shared database is persisted independently of the plurality of virtual machines. In response to determining that processing of the respective transaction is complete, the server system discards the respective virtual machine. In response to determining that the respective transaction is associated with a cyber-attack, the server system uses checkpoint data associated with the respective transaction to roll back the modifications associated with the respective transaction to the shared database.
-
公开(公告)号:US20170177892A1
公开(公告)日:2017-06-22
申请号:US15164673
申请日:2016-05-25
Applicant: Architecture Technology Corporation
Inventor: Daniel James Tingstrom , Judson Powers , Matthew P. Donovan
CPC classification number: G06F21/6218 , G06F16/22 , G06F21/53 , G06F2221/2113 , H04W12/08 , H04W12/0806
Abstract: An example method includes selecting, based at least on first and second policies, first and second containers in which to execute first and second applications, respectively. The example method further includes isolating execution of the first application in the first container, and isolating execution of the second application in the second container. The example method also includes applying, based at least on the first policy, a first group of security controls to the first application executing in the first container, wherein the first container defines a first domain in which the first application is executed, and applying, based at least on the second policy, a second group of security controls to the second application executing in the second container, wherein the second container defines a second domain in which the second application is executed.
-
109.
公开(公告)号:US20170032694A1
公开(公告)日:2017-02-02
申请号:US14811403
申请日:2015-07-28
Applicant: Architecture Technology Corporation
Inventor: Stephen K. Brueckner , Matthew P. Donovan
CPC classification number: G09B19/0053 , G09B5/02
Abstract: An example method includes outputting a graphical dashboard that includes one or more learning objective nodes and one or more skill nodes, selecting one or more software agents that are associated with the one or more skill nodes, providing, to at least one host computing system, an indication of the one or more software agents that are configured to collect parameter data from the at least one host computing system while a trainee performs actions, receiving the parameter data collected by the one or more software agents during execution, determining, based on the parameter data, that the one or more skills represented by the one or more skill nodes have been demonstrated by the trainee, and updating the one or more skill nodes to graphically indicate that one or more represented skills have been demonstrated.
Abstract translation: 示例性方法包括输出包括一个或多个学习目标节点和一个或多个技能节点的图形仪表板,选择与所述一个或多个技能节点相关联的一个或多个软件代理,向至少一个主计算系统, 所述一个或多个软件代理的指示被配置为在所述受训者执行动作时收集来自所述至少一个主计算系统的参数数据,在执行期间接收由所述一个或多个软件代理收集的参数数据,基于 参数数据,所述一个或多个技能节点所表示的一个或多个技能已由受训者证明,并且更新一个或多个技能节点以图形地表示已经证明了一个或多个表示的技能。
-
110.
公开(公告)号:US09081911B2
公开(公告)日:2015-07-14
申请号:US14339390
申请日:2014-07-23
Applicant: Architecture Technology Corporation
Inventor: Judson Powers , Matthew P. Donovan
CPC classification number: G06F13/4072 , G06F9/45558 , G06F13/42 , G06F13/4252 , G06F21/57 , G06F21/85 , G06F2009/45579
Abstract: In an example, an apparatus includes a memory storing a hypervisor, where the hypervisor is configured to determine whether one or more universal serial bus (USB) devices in communication with the hypervisor are authorized to communicate with a guest operating system of the hypervisor and, after determining that the one or more USB devices are authorized to communicate with the guest, virtualize the one or more USB devices at the guest operating system and transfer messages between the one or more USB devices and the virtualized USB device.
Abstract translation: 在一个示例中,设备包括存储管理程序的存储器,其中管理程序被配置为确定与管理程序通信的一个或多个通用串行总线(USB)设备是否被授权与管理程序的客户操作系统通信, 在确定一个或多个USB设备被授权与访客通信之后,虚拟化客户操作系统处的一个或多个USB设备,并在一个或多个USB设备与虚拟化USB设备之间传送消息。
-
-
-
-
-
-
-
-
-