-
公开(公告)号:US20210209366A1
公开(公告)日:2021-07-08
申请号:US16733835
申请日:2020-01-03
Applicant: Booz Allen Hamilton Inc.
Inventor: James J. TER BEEST, III , Evan MONTGOMERY-RECHT , Mary PALMER , Alexander TEJADA , Sanjana THIRUMALAI , Jeremiah WHITE
Abstract: An exemplary system for monitoring an operational area, includes a processor that receive plural data streams. Each data stream can include a different spatial characteristic of the operational area. The processor also generates a three-dimensional (3D) virtual visualization of the operational area based on observational perspectives associated with the data streams and their associated spatial characteristics and dynamically prioritizes operational sub-regions within the operational area based on the spatial characteristics. The processor generates a signal encoded with data for verifying the 3D virtual visualization of the operational area including the prioritized operational sub-regions.
-
公开(公告)号:US10931706B2
公开(公告)日:2021-02-23
申请号:US16814689
申请日:2020-03-10
Applicant: Booz Allen Hamilton Inc.
Inventor: Aaron Sant-Miller , Andre Tai Nguyen , William Hall Badart , Sarah Olson , Jesse Shanahan
Abstract: A method for detecting and/or identifying a cyber-attack on a network can include segmenting the network using a segmentation method with machine learning to generate one or more network segments; assigning a score to a data point within each network segment based on a presence or absence of an identified anomalous behavior of the data point; analyzing network data flow, via behavioral modeling, to provide a context for characterizing the anomalous behavior; combining, via a reinforcement learning agent, outputs of the segmentation method with behavioral modelling and assigned score to detect and/or identify a cyber-attack; providing one or more alerts to an analyst; receiving an analyst assessment of an effectiveness of the detection and/or identification; and providing the analyst assessment as feedback to the reinforcement learning agent.
-
公开(公告)号:US10902333B2
公开(公告)日:2021-01-26
申请号:US16596188
申请日:2019-10-08
Applicant: Booz Allen Hamilton Inc.
Inventor: Ki Hyun Lee , John David Pisano , Saurin Pankaj Shah , Andre Tai Nguyen , Yuxun Lei , Christopher Brown , Michael Becker
Abstract: A system and method are disclosed for collecting and analyzing data in a cognitive fabric. The system can include a network of intelligent nodes, each node being configured for sharing or receiving data as a function of analytic processing to be performed at the node. Each node having an on-board processor to generate an object from shared data and the analytic processing software
-
公开(公告)号:US10897264B2
公开(公告)日:2021-01-19
申请号:US16450179
申请日:2019-06-24
Applicant: BOOZ ALLEN HAMILTON INC.
Inventor: Keith A. Blanks
Abstract: An analog signal processing module includes a processor and a comparator circuit module having a comparator circuit input and a comparator circuit output, the comparator circuit module being configured to receive a first analog signal at the comparator circuit input and generate a digital output, wherein the comparator circuit output is connected to the processor. A digital-to-analog converter (DAC) module is configured to receive a digital output from the processor and convert the digital output to a second analog signal. An operational amplifier (OpAmp) circuit module has an OpAmp circuit input and an OpAmp circuit output, the OpAmp circuit module being configured to receive the second analog signal at the OpAMp circuit input. A feedback loop is formed by the processor, the DAC module, and the OpAMp circuit module, and is configured to implement an amplification function or attenuation function performed by the OpAmp circuit module.
-
公开(公告)号:US10805343B2
公开(公告)日:2020-10-13
申请号:US16167095
申请日:2018-10-22
Applicant: Booz Allen Hamilton Inc.
Inventor: Aaron Sant-Miller , Greg McCullough , James Blaha , Morris LaGrand , Rachel Allen , Peter Guerra , Patrick Beggs
Abstract: A method for securing a network by applying one or more artificial intelligence (AI) models in a computing environment with a computing speed selected as a function of a bandwidth of the network. The method includes receiving data at a node associated with the network, and identifying a suspected cyber adversarial event at the network. The method includes applying an AI model on the data in real-time to enrich the data with information that indicates behavior associated with an exploitation of the network, and analyzing the enriched data as part of a cyber workflow for an indication of a compromise associated with the exploitation of the network.
-
136.
公开(公告)号:US20200302157A1
公开(公告)日:2020-09-24
申请号:US16791740
申请日:2020-02-14
Applicant: BOOZ ALLEN HAMILTON INC.
Inventor: Nathaniel Jackson SHORT , Srinivasan RAJARAMAN , Jonathan M. LEVITT
Abstract: A computer-implemented method for classifying an input data set within a data category using multiple data representation modes. The method includes identifying at least a first data representation source mode and a second data representation source mode; classifying the at least first data representation source mode via at least a first data recognition tool and the at least second data representation source mode via at least a second data recognition tool, the classifying including allocating a confidence factor for each data representation source mode in the data category; and combining outputs of the classifying into a single output confidence score by using a weighted fusion of the allocated confidence factors.
-
137.
公开(公告)号:US10650023B2
公开(公告)日:2020-05-12
申请号:US16044129
申请日:2018-07-24
Applicant: BOOZ ALLEN HAMILTON INC.
Inventor: Evan Montgomery-Recht , James J. Ter Beest
Abstract: A computer-automated method for securing unidirectional communication within a network. The method includes orchestrating an automated arrangement and/or coordination of at least one portion of a message using a top-level orchestration server, transmitting a first data packet from the top-level orchestration server to a first top-level backbone server, wherein the first data packet is a first portion of the message, and authenticating the first data packet using the first top-level backbone server. The method can include transmitting a second data packet from the first top-level backbone server to a second top-level backbone server, wherein the second data packet is a second portion of the message and/or the second data packet includes a modified first data packet and authenticating the second data packet using the second top-level backbone server.
-
公开(公告)号:US20200128025A1
公开(公告)日:2020-04-23
申请号:US16167095
申请日:2018-10-22
Applicant: Booz Allen Hamilton Inc.
Inventor: Aaron Sant-Miller , Greg McCullough , James Blaha , Morris LaGrand , Rachel Allen , Peter Guerra , Patrick Beggs
Abstract: A method for securing a network by applying one or more artificial intelligence (AI) models in a computing environment with a computing speed selected as a function of a bandwidth of the network. The method includes receiving data at a node associated with the network, and identifying a suspected cyber adversarial event at the network. The method includes applying an AI model on the data in real-time to enrich the data with information that indicates behavior associated with an exploitation of the network, and analyzing the enriched data as part of a cyber workflow for an indication of a compromise associated with the exploitation of the network.
-
公开(公告)号:US20200072585A1
公开(公告)日:2020-03-05
申请号:US16558924
申请日:2019-09-03
Applicant: Booz Allen Hamilton Inc.
Inventor: Devereaux MILBURN
Abstract: A projectile device for establishing a wireless network and transmitting data within the network. The projectile device includes a motion sensor configured to measure at least one of an acceleration, angular velocity, or an orientation of the projectile device; an antenna configured for communication within a wireless network between the projectile device and at least one external device. The projectile device includes a processor configured to establish communication in the wireless network for receiving and/or transmitting a message between the projectile device and the at least one external device via the antenna and a wireless protocol that is determined by at least one of the acceleration, angular velocity, or orientation of the projectile device. The projectile device includes a damping agent arranged to impact movement of components of the projectile device, wherein a form factor of the projectile device is complimentary with a launching mechanism of the projectile device.
-
公开(公告)号:US10372923B2
公开(公告)日:2019-08-06
申请号:US16112100
申请日:2018-08-24
Applicant: BOOZ ALLEN HAMILTON INC.
Inventor: Gary Jason Myers , Matthias Welsh , Robert Wayne Knight , Timothy Schaefer
IPC: G06F21/00 , G06F21/62 , G06F1/3203 , G06K19/07 , G06F21/57 , G06F21/60 , G06F17/00 , H04L29/06 , G06F12/14 , G06F1/00
Abstract: An exemplary mobile computing device, including a memory device for storing a control policy defining a functional configuration of the mobile computing device; and a processor configured to place the mobile computing device in one of one of plural states based on a validation result of the control policy.
-
-
-
-
-
-
-
-
-