-
181.
公开(公告)号:US12078732B1
公开(公告)日:2024-09-03
申请号:US17688444
申请日:2022-03-07
Applicant: Architecture Technology Corporation
Inventor: Joseph Sirianni , Judson Powers
CPC classification number: G01S19/215 , G01S5/02213 , G01S5/06 , G01S19/258 , G01S19/27
Abstract: A system having a distributed node hardware and software product is disclosed. The distributed topology allows for multiple GPS receiver node positions. The multiple GPS receiver node positions enable an accurate location estimation of a GPS spoofing signal emitter source of an incoming malicious GPS signal. The system detects the presence of a GPS spoofing signal emitter with high confidence against any spoofing geometry or strategy while the GPS receiver nodes are on the move.
-
公开(公告)号:US12058262B2
公开(公告)日:2024-08-06
申请号:US18145841
申请日:2022-12-22
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Ranga S. Ramanujan , Deborah K. Charan , Barry A. Trent , Jordan C. Bonney
CPC classification number: H04L9/3213 , H04L9/3228 , H04L9/3234 , H04L9/3263 , H04L63/083
Abstract: Embodiments for a computer readable medium including a software module are provided. The software module causes one or more processing devices to obtain a biometric identifier from a user. Access to a resource is requested by providing a software credential token and the biometric identifier. The software credential token corresponds to a hardware credential token, and the hardware credential token is one of a set of hardware credential tokens that are used to access the resource. An indication that access to the resource has been granted is received and after receiving the indication an indication that the access to the resource has been revoked is received. After receiving the indication that access to the resource has been revoked, a biometric identifier is re-obtained from a user and access to the resource is re-requested by providing a software credential token and the re-obtained biometric identifier.
-
公开(公告)号:US12047285B2
公开(公告)日:2024-07-23
申请号:US16812917
申请日:2020-03-09
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Ranga S. Ramanujan , Benjamin L. Burnett , Barry A. Trent , Jafar Al-Gharaibeh
IPC: H04L45/74 , H04L45/02 , H04L45/125 , H04L45/24 , H04W40/00
CPC classification number: H04L45/74 , H04L45/02 , H04L45/125 , H04L45/24 , H04W40/00
Abstract: A method of routing an Internet Protocol (IP) packet from a routing device is provided. The method includes receiving a first IP packet having a first IP header and a first IP data field, the first IP packet having a final destination corresponding to a destination device communicatively coupled to the routing device via a network route including at least two hops between the routing device and the final destination. A second IP packet having a second IP header and a second IP data field is generated. The second IP data field is a copy of the first IP data field, and a destination IP address field in the second IP header includes an IP address of a next hop on the network route. The second IP packet does not include an IP address of the final destination in the second IP header.
-
公开(公告)号:US12032681B1
公开(公告)日:2024-07-09
申请号:US17896974
申请日:2022-08-26
Applicant: Architecture Technology Corporation
Inventor: Matthew Donovan , Paul Nicotera , Dahyun Hollister , Robert Joyce , Judson Powers
CPC classification number: G06F21/53 , G06F21/552 , G06N3/04 , H04L63/1458
Abstract: The methods and systems disclosed herein generally relate to automated execution and evaluation of computer network training exercises, such as in a virtual environment. A server executes a first attack action by a virtual attack machine against a virtual target machine based on a cyber-attack scenario, wherein the virtual target machine is configured to be controlled by the user computer. The server receives a user response to the first attack action, determines, using a decision tree, a first proposed attack action based on the user response, and executes an artificial intelligence model to determine a second proposed attack action based on the user response. The server selects a subsequent attack action from the first proposed attack action and the second proposed attack action and executes the subsequent attack action by the virtual attack machine against the virtual target machine.
-
公开(公告)号:US11887505B1
公开(公告)日:2024-01-30
申请号:US16393276
申请日:2019-04-24
Applicant: Architecture Technology Corporation
Inventor: Scott Aloisio , Robert A. Joyce
CPC classification number: G09B5/12 , G02B27/017 , G06T19/003 , G06T19/006
Abstract: Techniques are described for implementing a system that deploys and monitors training simulations and exercises across a network, and that enables the development and execution of virtual training. An example system outputs, for display in a web browser of a trainee computing system, a graphical user interface that includes one or more training exercises, and initiates execution of software agent(s) associated with skill(s) to be demonstrated by a trainee. The example system outputs, at the trainee computing system, content corresponding to scene(s) of an at least partially virtual environment for a training exercise, where the content is rendered for display at least in the web browser of the trainee computing system. After receiving interaction data collected by the software agent(s) during the training exercise, the example system determines, based on the interaction data, that the skill(s) associated with the training exercise have been demonstrated.
-
186.
公开(公告)号:US11868519B2
公开(公告)日:2024-01-09
申请号:US17965654
申请日:2022-10-13
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Scott Aloisio , Dahyun Hollister , Robert A. Joyce
CPC classification number: G06F3/012 , G02B27/017 , G06F3/017 , G06F11/3003 , G06N20/00 , G06T19/006
Abstract: Disclosed herein are embodiments for managing a task including one or more skills. A server stores a virtual environment, software agents configured to collect data generated when a user interacts with the virtual environment to perform the task, and a predictive machine learning model. The server generates virtual entities during the performance of the task, and executes the predictive machine learning model to configure the virtual entities based upon data generated when the user interacts with the virtual environment. The server generates the virtual environment and the virtual entities configured for interaction with the user during display by the client device, and receives the data collected by the software agents. The system displays a user interface at the client device to indicate a measurement of each of the skills during performance of the task. The server trains the predictive machine learning model using this measurement of skills during task performance.
-
公开(公告)号:US11863411B2
公开(公告)日:2024-01-02
申请号:US17963095
申请日:2022-10-10
Applicant: Architecture Technology Corporation
Inventor: Maher Kaddoura
IPC: H04L43/045 , H04L41/12 , H04L45/00 , H04L43/026 , H04L47/11 , H04L41/22
CPC classification number: H04L43/045 , H04L41/12 , H04L41/22 , H04L43/026 , H04L45/20 , H04L47/11
Abstract: Disclosed herein are embodiments of a network monitoring device for a supercomputer system having a plurality of supercomputer nodes. The network monitoring device may utilize plug-in software modules to provide network monitoring capabilities related to discovering the network topologies of the supercomputer system, determining network and computing resources that are available for new applications in the supercomputer system, collecting network and computing resources that are being used by running software applications in the supercomputer system, and monitoring running software applications on the supercomputer system.
-
公开(公告)号:US11822674B1
公开(公告)日:2023-11-21
申请号:US17075580
申请日:2020-10-20
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Ryan C. Marotz , Barry A. Trent
CPC classification number: G06F21/602 , G06F16/22 , G06F21/6218
Abstract: Embodiments for a method of tracking provenance information for data in a database are disclosed. The method includes storing data in a first one or more cells of a database, translating provenance information for the data into a new block for a provenance blockchain corresponding to the first one or more cells, and storing the new block in the database.
-
公开(公告)号:US11792160B1
公开(公告)日:2023-10-17
申请号:US17032871
申请日:2020-09-25
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Clint Sanders , Ranga S. Ramanujan , Timothy Hartley
CPC classification number: H04L63/0218 , H04L9/40 , H04L12/18 , H04L45/16 , H04L63/0485 , H04L63/0853 , H04L63/162
Abstract: Disclosed is a high assurance unified switching device corresponding to a modular, standards-compliant extensible network switch supporting multiple security domains with data isolation of multiple data packets obtained from the multiple security domains. The device may comprise an inner layer router and an outer layer security wrapper (outer layer router). The ports on the outer layer router are configured for different security domains and assigned corresponding key pairs. The ports use the assigned key pairs for encrypting data packets prior to routing and decrypt the data after routing such that there is an isolation of data packets of different security domains. A routed packet arriving at the wrong port cannot be decrypted and therefore is dropped.
-
公开(公告)号:US11785080B1
公开(公告)日:2023-10-10
申请号:US17584448
申请日:2022-01-26
Applicant: Architecture Technology Corporation
Inventor: Maher N. Kaddoura
IPC: H04L67/1074 , H04L43/04 , H04L69/329 , A61F2/44 , A61F2/30 , G06F16/28
CPC classification number: H04L67/1076 , A61F2/44 , A61F2/447 , A61F2/4455 , A61F2/4465 , H04L43/04 , H04L67/1078 , H04L69/329 , A61F2002/30593 , A61F2230/0082 , A61F2230/0086 , A61F2250/0026 , G06F16/28 , H04T2001/107
Abstract: A method for improving data flow and data security in an existing wireless communications network comprising a central node and a plurality of remote nodes, during band-width-limiting conditions, the method including generating, by a processor at the central node, a hybrid network overlay to the existing wireless communications network, the hybrid network overlay including a remote overlay node for each remote node and a central overly node for the central node. The method further includes maintaining a distributed ledger having a blockchain architecture, the distributed ledger storing data transmitted among the central node and the remote nodes, including designating remote nodes as super nodes comprising using a link sensing mechanism and remote node processing characteristics to identify remote nodes having links with sufficient bandwidth and sufficient processing capacity to aggregate transactions and validate blocks, each super node participating in a block validation process using the hybrid network overlay.
-
-
-
-
-
-
-
-
-