STANAG 4586 communication enhancement module

    公开(公告)号:US11051227B1

    公开(公告)日:2021-06-29

    申请号:US16781725

    申请日:2020-02-04

    Abstract: Embodiments for a method for enhancing communication for operating along with a plurality of cooperating communication enhancement modules are disclosed. The communication enhancement module receives a STANAG 4586 message from an upstream module and determine whether a point-to-point wireless connection is available to the destination. If a point-to-point wireless connection is available, the module sends a message over the point-to-point wireless connection to the destination. If a point-to-point wireless connection is not available, the module identifies a multi-hop path to the destination via at least one other communication enhancement module, modifies the STANAG 4586 message to create a modified message having a format corresponding to the communication enhancement modules, and send the modified message to a next hop communication enhancement module on the multi-hop path for directing toward the destination.

    Sleep/wake based on coverage
    142.
    发明授权

    公开(公告)号:US11032767B1

    公开(公告)日:2021-06-08

    申请号:US15929923

    申请日:2020-05-29

    Inventor: Barry A. Trent

    Abstract: Embodiments for a module for scheduling sleep/wake intervals for a first one or more communication devices are disclosed. The module includes a computer readable medium having instructions thereon. The instructions, when executed by one or more processing devices, cause the one or more processing devices to obtain a coverage prediction for the first one or more communication devices. The coverage prediction indicates intervals during which a second one or more communication devices are predicted to be within range of the first one or more communication devices. The instructions also cause the one or more processing devices to generate sleep intervals and wake intervals for the first one or more communication devices based on the coverage predictions.

    Community-based reporting and analysis system and method

    公开(公告)号:US11030410B2

    公开(公告)日:2021-06-08

    申请号:US16740603

    申请日:2020-01-13

    Abstract: A computer-implemented method for training a neural network system to classify data items as true mentions of relevant data objects includes, based on a domain of interest, a processor controlling an input component and a data store to receive and store a document related to the domain of interest, control a natural language processor to extract data items related to the domain of interest from the document, create a first training data set of selected ones of the data items, using the first training data set, train the neural network to identify true mentions of data objects relevant to the domain of interest, apply tweaks to one or more of the data items to create a list of tweaked data items, creating a second training data set including the tweaked data items, and using the first and second training data sets, further train the neural network to identify true mentions of relevant data objects.

    Automated system maintenance capabilities for a computing system

    公开(公告)号:US10970159B1

    公开(公告)日:2021-04-06

    申请号:US16574697

    申请日:2019-09-18

    Abstract: An example method includes receiving one or more cross-platform system maintenance rules that are generated by and sent from a central server computing system, determining a type of software operating system currently being executed by a client computing system, determining, based on the one or more cross-platform system maintenance rules and further based on the type of software operating system, one or more platform-specific system maintenance rules that specify one or more platform-specific system maintenance operations and scheduling information, and determining, based on scheduling information identified by the one or more platform-specific system maintenance rules, a schedule indicating when to perform the one or more platform-specific system maintenance operations. The example method includes initiating performance of the one or more platform-specific system maintenance operations in accordance with the schedule, collecting one or more results, and generating and sending at least one summary report.

    SYSTEMS AND METHODS FOR DATA EXCHANGE AMONG NETWORK DEVICES

    公开(公告)号:US20210099538A1

    公开(公告)日:2021-04-01

    申请号:US17120177

    申请日:2020-12-13

    Abstract: In a network, a common agnostic data exchange method between two devices native to the network, the devices using different formats and transmission protocols, includes invoking a proxy at each device, and a first proxy receiving a first data record from a first device, the first data record having a first format. The first proxy identifies the first format by comparing a first pattern of the first data record to reference patterns of one or more reference data records and determines if a sufficient pattern match exists between the first pattern and the reference pattern. The first proxy translates the first data record's format into an inter-proxy data record having an inter-proxy format and transmits the inter-proxy data record to a second proxy coupled to a second device. The second proxy translates the inter-proxy data record to a second data record having a format employed at the second device.

    Automated software bug discovery and assessment

    公开(公告)号:US10949338B1

    公开(公告)日:2021-03-16

    申请号:US16440654

    申请日:2019-06-13

    Abstract: In general, this disclosure describes methods and devices for analyzing source code to detect potential bugs in the code. Specifically, a device retrieves source code of an application. For each distinct execution of a plurality of executions of the application, the device initiates the respective execution at a particular starting point of the source code and inputs, into the source code, a unique set of inputs relative to any other execution. The device stores, into a path log, an indication of each line of source code and stores, into an output log, an indication of each output object encountered during the respective execution. Each output object includes a local variable dependent on the inputs. The device analyzes, using a machine learning model, the path and output logs to identify an abnormality indicative of a potential bug in the source code. The device outputs a graphical representation of the abnormality.

    Network monitoring tool for supercomputers

    公开(公告)号:US10924368B1

    公开(公告)日:2021-02-16

    申请号:US16786705

    申请日:2020-02-10

    Inventor: Maher Kaddoura

    Abstract: Disclosed herein are embodiments of a network monitoring device for a supercomputer system having a plurality of supercomputer nodes. The network monitoring device may utilize plug-in software modules to provide network monitoring capabilities related to discovering the network topologies of the supercomputer system, determining network and computing resources that are available for new applications in the supercomputer system, collecting network and computing resources that are being used by running software applications in the supercomputer system, and monitoring running software applications on the supercomputer system.

    Packet control for a broadcast network

    公开(公告)号:US10917501B1

    公开(公告)日:2021-02-09

    申请号:US16687786

    申请日:2019-11-19

    Abstract: Embodiments for a method of controlling entry of packets into a broadcast network are provided. The method includes providing a plurality of edge devices communicatively disposed on an edge of the broadcast network. Reachability information is exchanged amongst the plurality of edge devices by translating Internet Protocol (IP) packets into ZOOM packets and including the reachability information in the ZOOM packets. A ZOOM packet has a data field that is a copy of a data field of the IP packet and a header that includes the reachability information. A first edge device of the plurality of edge devices maintains a table of forward destinations reachable via the broadcast network based on the reachability information exchanged. The first edge device discards IP packets from endpoint devices if the IP packets do not have a destination that is indicated as reachable in the table of forward destinations for that edge device.

    Scalable incident-response and forensics toolkit

    公开(公告)号:US10885393B1

    公开(公告)日:2021-01-05

    申请号:US15803463

    申请日:2017-11-03

    Abstract: Techniques for performing data analytics using anomaly detection systems and methods are disclosed. The anomaly detection system provides an incident response and monitoring solution, built for distributed processing, that streamlines cyber defense by unifying datasets, via a data translator, from sensors and tools into a uniform schema to provide real-time anomaly detection, via an anomaly detection system that may prevent malware from establishing a foothold on the network. The anomaly detection system may allow for the scalability to provide large-scale data aggregation and anomaly detection without compromising performance. The anomaly detection system may use a distributed architecture to support advanced cyber threat detection across large datasets in real-time for monitoring and rapid incident response. The anomaly detection system may leverage open protocols and interfaces to promote third-party support for development and interoperability.

    Partitioned network routing
    150.
    发明授权

    公开(公告)号:US10813033B1

    公开(公告)日:2020-10-20

    申请号:US15945933

    申请日:2018-04-05

    Abstract: Embodiments for a routing module for a first node are disclosed. The routing module includes a computer readable medium having instructions thereon. The instructions cause one or more processing devices to track former links between the first node and a second node and determine a probability of a future link with the second node based on the former links. If the probability of a future link with a second node is above a threshold, an advertisement is sent to at least one other node indicating that the second node is reachable from the first node. If the probability of a future link with the second node is below the threshold and no other route exists from the first node to the second node, an advertisement is sent to at least one other node indicating that the second node is not reachable from the first node.

Patent Agency Ranking