-
公开(公告)号:US10560351B1
公开(公告)日:2020-02-11
申请号:US15857363
申请日:2017-12-28
Applicant: Architecture Technology Corporation
Inventor: Maher Kaddoura
IPC: H04L12/26 , H04L12/24 , H04L12/733 , H04L12/801
Abstract: Disclosed herein are embodiments of a network monitoring device for a supercomputer system having a plurality of supercomputer nodes. The network monitoring device may utilize plug-in software modules to provide network monitoring capabilities related to discovering the network topologies of the supercomputer system, determining network and computing resources that are available for new applications in the supercomputer system, collecting network and computing resources that are being used by running software applications in the supercomputer system, and monitoring running software applications on the supercomputer system.
-
公开(公告)号:US10547679B1
公开(公告)日:2020-01-28
申请号:US15860431
申请日:2018-01-02
Applicant: Architecture Technology Corporation
Inventor: Benjamin L. Burnett , Ranga S. Ramanujan
Abstract: Disclosed herein are embodiments of a cloud data synchronization system enabling an user operating a mobile client device to download mission-specific data sets from a fixed cloud-based server system to a database of the mobile client device, and then use the downloaded data sets independently on the mobile client device when the mobile client device is disconnected from a network connecting to the fixed cloud-based server system. When connectivity to the fixed cloud-based server system is re-established by the mobile client device in an intermittent and bandwidth-limited communication network environment, the fixed cloud-based server system may provide bi-directional data synchronization between records of the fixed cloud-based server system and the mobile client device to update the data sets on the fixed cloud-based server system and the mobile client device while operating in the intermittent and bandwidth-limited communication network environment.
-
公开(公告)号:US10540502B1
公开(公告)日:2020-01-21
申请号:US15622434
申请日:2017-06-14
Applicant: Architecture Technology Corporation
Inventor: Robert A. Joyce , Scott Aloisio , Judson Powers , Christopher Dominessy
Abstract: A risk model for a distributed computing system comprises a plurality of tree nodes organized as a tree. For each tree node of the risk model, the tree node corresponds to a respective event that may befall a distributed computing system. An analysis computing system generates data associating a test agent with a target and also generates data associating the test agent with a tree node in the risk model. The test agent performs a data gathering routine that gathers data from the target associated with the test agent. The gathered data may indicate whether the event corresponding to the tree node is occurring. Furthermore, the analysis computing system may perform the data gathering routine according to a recurrence pattern of the data gathering routine. The analysis computing system may output a graphical representation of the data indicating whether the event corresponding to the tree node is occurring.
-
公开(公告)号:US10346628B2
公开(公告)日:2019-07-09
申请号:US15164673
申请日:2016-05-25
Applicant: Architecture Technology Corporation
Inventor: Daniel James Tingstrom , Judson Powers , Matthew P. Donovan
Abstract: An example method includes selecting, based at least on first and second policies, first and second containers in which to execute first and second applications, respectively. The example method further includes isolating execution of the first application in the first container, and isolating execution of the second application in the second container. The example method also includes applying, based at least on the first policy, a first group of security controls to the first application executing in the first container, wherein the first container defines a first domain in which the first application is executed, and applying, based at least on the second policy, a second group of security controls to the second application executing in the second container, wherein the second container defines a second domain in which the second application is executed.
-
公开(公告)号:US10284592B1
公开(公告)日:2019-05-07
申请号:US15604875
申请日:2017-05-25
Applicant: Architecture Technology Corporation
Inventor: Judson Powers , Robert A. Joyce , Daniel McArdle
Abstract: An example method includes providing, by a computing system, first randomized configuration information, generating, by the computing system and based on the first randomized configuration information, a first unique instance of a software component, providing second randomized configuration information, wherein the second randomized configuration information is different from the first randomized configuration information, and generating, based on the second randomized configuration information, a second unique instance of the software component that is executable on the runtime computing system. The first and second unique instances of the software component comprise different instances of the same software component that each are configured to have uniquely different operating characteristics during execution on the runtime computing system, and the first and second unique instances of the software component are each further configured, during execution on the runtime computing system, to output false information to an external computing system.
-
公开(公告)号:US10235894B2
公开(公告)日:2019-03-19
申请号:US16055557
申请日:2018-08-06
Applicant: Architecture Technology Corporation
Inventor: Eric R. Chartier , Evan Eaves , William Colligan , Andrew Murphy
Abstract: An advisor system includes a computer-readable storage medium having encoded thereon a program of instructions. Execution of the instructions causes a processor to determine a current state of a first aircraft operating on a movement area of an airport including determining a path vector for the first aircraft. The path vector includes a speed and direction of travel of the first aircraft and identification of a runway intersection the first aircraft is projected to enter. The processor processes a surveillance signal transmitted from a second aircraft operating on the movement area, including determining a quality of the surveillance signal. The processor further determines a movement vector of the second aircraft, and compares the path vector and the movement vector to identify possible interference. Finally, the processor provides an advisory at the first aircraft based on the compared path vector and the movement vector.
-
公开(公告)号:US10200406B1
公开(公告)日:2019-02-05
申请号:US15605168
申请日:2017-05-25
Applicant: Architecture Technology Corporation
Inventor: Judson Powers , Robert A. Joyce , Daniel McArdle
Abstract: An example method includes providing, by a computing system, first randomized configuration information, generating, by the computing system and based on the first randomized configuration information, a first unique instance of a software component, providing second randomized configuration information, wherein the second randomized configuration information is different from the first randomized configuration information, and generating, based on the second randomized configuration information, a second unique instance of the software component that is executable on the runtime computing system. The first and second unique instances of the software component comprise different instances of the same software component that each are configured to have uniquely different operating characteristics during execution on the runtime computing system, and the first and second unique instances of the software component are each further configured, during execution on the runtime computing system, to output false information to an external computing system.
-
公开(公告)号:US10078510B1
公开(公告)日:2018-09-18
申请号:US15785940
申请日:2017-10-17
Applicant: Architecture Technology Corporation
Inventor: Judson Powers , Daniel McArdle , Robert A. Joyce
CPC classification number: G06F8/71 , G06F8/4441 , G06F8/62
Abstract: In general, the techniques of this disclosure describe a method that includes receiving, by a computing device, a user interaction for identifying one or more undesired features of a software program to be removed. The software program is provisioned on the computing device as a software binary. The method further including identifying, by the computing device, one or more execution paths of the software binary that implement the one or more undesired features. Identifying the one or more execution paths includes outputting an indication directing the user to interact with the one or more undesired features, generating undesired feature information of an execution log, and determining the one or more execution paths using the execution log. The method further includes removing, by the computing device, the one or more execution paths to generate a modified software binary.
-
公开(公告)号:US20180180709A1
公开(公告)日:2018-06-28
申请号:US15393181
申请日:2016-12-28
Applicant: Architecture Technology Corporation
Inventor: Evan Eaves , Eric Chartier , William Colligan , Paul C. Davis , Andrew Murphy , Douglas Sweet
CPC classification number: G01S5/06 , G01S5/0018 , G01S5/021 , H04L67/12 , H04L67/18 , H04W4/021 , H04W4/40 , H04W84/18
Abstract: A mobile emergency perimeter system includes one or more fixed radio frequency (RF) sensors, and one or more moving RF sensors; a wireless mesh network coupling together each of the sensors; and a central processor system coupled to the wireless mesh network. The central processor system executes machine instructions stored on a computer-readable storage medium to control each of the RF sensors to receive time of arrival data for a RF signal transmitted by an emitter and received at each of the RF sensors, receive location information for each of the RF sensors and determine a three-dimensional (3-D) estimate of the geographical location of the emitter.
-
公开(公告)号:US10007498B2
公开(公告)日:2018-06-26
申请号:US15228698
申请日:2016-08-04
Applicant: Architecture Technology Corporation
Inventor: Judson Powers , Robert A. Joyce
CPC classification number: G06F8/52 , G06F8/30 , G06F8/37 , G06F8/41 , G06F8/71 , G06F9/44568 , G06F9/54 , G06F21/14 , G06F21/57
Abstract: An example method includes generating, by a computing system, first unique configuration information, generating, by the computing system and based on the first unique configuration information, a first unique instance of a software component, generating second unique configuration information, wherein the second unique configuration information is different from the first unique configuration information, and generating, based on the second unique configuration information, a second unique instance of the software component that is executable on the runtime computing system. The first and second unique instances of the software component comprise different instances of the same software component that each are configured to have uniquely different operating characteristics during execution on the runtime computing system.
-
-
-
-
-
-
-
-
-