-
公开(公告)号:US11669642B1
公开(公告)日:2023-06-06
申请号:US17322524
申请日:2021-05-17
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Daniel Mcardle , Judson Powers
Abstract: Disclosed herein are embodiments of systems, methods, and products comprise a processor, which provides runtime enforcement of data flow integrity. The processor accesses the application binary file from the disk to execute an application and translates the application binary into intermediate representation. The processor applies the logic of data flow integrity controls to the intermediate representation. Specifically, the processor identifies the vulnerable code in the intermediate representation. The processor applies data flow integrity controls to the vulnerable code. The processor adds simple instrumentation that only changes the application's behavior when unauthorized data tampering occurs while preserving the application's normal behavior. When certain operations may cause unauthorized data tampering, the processor takes proper measures to stop the operations. The processor translates the intermediate representation back to a machine code and replaces the original binary with the machine code.
-
公开(公告)号:US11645388B1
公开(公告)日:2023-05-09
申请号:US17080359
申请日:2020-10-26
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Colleen Kimball , Robert A. Joyce , Judson Powers , Matthew Donovan
CPC classification number: G06F21/563 , G06F8/73 , G06F21/577 , G06N20/00 , G06F2221/033
Abstract: Disclosed herein are embodiments of systems, methods, and products that execute tools to identify non-malicious faults in source codes introduced by engineers and programmers. The tools may execute a machine learning model on the source codes to perform sentiment analysis and pattern analysis on information associated with the source codes to generate annotated source code files identifying anomalies based on the sentiment analysis and the pattern analysis. One or more threat levels are then identified and ranked based on the one or more anomalies and a ranked list of the one or more threat levels is displayed on a graphical user interface of a computer.
-
公开(公告)号:US11592518B1
公开(公告)日:2023-02-28
申请号:US17334727
申请日:2021-05-29
Applicant: Architecture Technology Corporation
Inventor: Eric R. Chartier , Paul C. Davis , Douglas Sweet , Ryan L. Hagelstrom , Ian J. McLinden
Abstract: A computer-implemented method for establishing and controlling a mobile perimeter and for determining a geographic location of an RF emitting source at or within the mobile perimeter includes receiving from RF sensors in a network, processed RF emissions from the source collected at RF sensors. The RF emissions follow a wireless protocol and include frames encoding RF emitting source identification information. The method further includes extracting RF emitting source identification information from the frames, processing the source identification information to identify the RF emitting source, and classifying the RF emitting source by one or more of UAS type, UAS capabilities, and UAS model. The method also includes receiving from the RF sensors, a geographic location of each RF sensor and a time of arrival (TOA) of the RF emissions at the RF sensor; and executing a multilateration process to estimate a geographic location of the RF emitting source.
-
公开(公告)号:US20230037170A1
公开(公告)日:2023-02-02
申请号:US17963095
申请日:2022-10-10
Applicant: Architecture Technology Corporation
Inventor: Maher Kaddoura
IPC: H04L43/045 , H04L41/12 , H04L45/00 , H04L43/026 , H04L47/11 , H04L41/22
Abstract: Disclosed herein are embodiments of a network monitoring device for a supercomputer system having a plurality of supercomputer nodes. The network monitoring device may utilize plug-in software modules to provide network monitoring capabilities related to discovering the network topologies of the supercomputer system, determining network and computing resources that are available for new applications in the supercomputer system, collecting network and computing resources that are being used by running software applications in the supercomputer system, and monitoring running software applications on the supercomputer system.
-
公开(公告)号:US11538562B1
公开(公告)日:2022-12-27
申请号:US16781850
申请日:2020-02-04
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Barry Trent , Jafar Al-Gharaibeh
IPC: H04L67/60 , H04W4/80 , G16H10/60 , H04L67/141
Abstract: Described herein are methods and systems to send/receive medical data from one or more electronic devices to a secondary medical unit in delayed, intermittently-connected, low-bandwidth (DIL) environments. An application executing on the electronic devices may, in response to detecting a disruption within a communication network, execute an offline communication protocol to transmit medical data among a predetermined number of other electronic devices, wherein the offline communication protocol does not use the communication network. The application may then receive a request from a server of the secondary medical unit to transmit at least a part of the medical data. In response to authenticating the request, the application then transmits the medical data using an online communication protocol that uses the communication network or using an offline communication protocol.
-
公开(公告)号:US11474596B1
公开(公告)日:2022-10-18
申请号:US16892911
申请日:2020-06-04
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Scott Aloisio , Dahyun Hollister , Robert A. Joyce
Abstract: Disclosed herein are embodiments for managing a task including one or more skills. A server stores a virtual environment, software agents configured to collect data generated when a user interacts with the virtual environment to perform the task, and a predictive machine learning model. The server generates virtual entities during the performance of the task, and executes the predictive machine learning model to configure the virtual entities based upon data generated when the user interacts with the virtual environment. The server generates the virtual environment and the virtual entities configured for interaction with the user during display by the client device, and receives the data collected by the software agents. The system displays a user interface at the client device to indicate a measurement of each of the skills during performance of the task. The server trains the predictive machine learning model using this measurement of skills during task performance.
-
公开(公告)号:US11429713B1
公开(公告)日:2022-08-30
申请号:US16256810
申请日:2019-01-24
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Matthew Donovan , Paul Nicotera , Dahyun Hollister , Robert Joyce , Judson Powers
Abstract: The methods and systems disclosed herein generally relate to automated execution and evaluation of computer network training exercises, such as in a virtual environment. A server generates a training system having a virtual attack machine and a virtual target machine where the virtual target machine is operatively controlled by a trainee computer. The server then executes a simulated cyber-attack and monitors/collects actions and responses by the trainee. The server then executes an artificial intelligence model to evaluate the trainee's action and to identify a subsequent simulated cyber-attack (e.g., a next step to the simulated cyber-attack). The server may then train the artificial intelligence model using various machine-learning techniques using the collected data during the exercise.
-
公开(公告)号:US11277203B1
公开(公告)日:2022-03-15
申请号:US16749779
申请日:2020-01-22
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Ian McLinden , Jordan Bonney
IPC: H04B10/114 , H04L1/00 , H04B10/66 , H04B10/516
Abstract: Disclosed herein are embodiments of an aerial network system including a first transceiver configured to transmit and receive free space optical (FSO) signals and a second transceiver configured to transmit and receive radio frequency (RF) signals. A processor provides modulated data signals to the first and second transceivers for transmission and receives demodulated signals from the first and second transceiver. The processor is configured for policy-based multipath admission of requests for access to an IP-routing enabled overlay network. The processor includes an inverse mission planning system configured for predictive traffic load balancing of transmitted FSO signals and RF signals. The inverse mission planning system includes radio behavior models and aerial platform models, and is configured for geographic simulation and optimization of mission planning data based upon user-inputted mission-specific data. Forward error correction (FEC) coding of transmitted communications via packet erasure coding provides resiliency with a low bit error rate.
-
公开(公告)号:US11240301B2
公开(公告)日:2022-02-01
申请号:US16834247
申请日:2020-03-30
Applicant: Architecture Technology Corporation
Inventor: Maher N Kaddoura
Abstract: A computer-implemented method for managing enterprise transactions includes creating an overlay to a physical communications network, adding one or more nodes to the overlay, designating one or more nodes of the overlay as super nodes, generating a distributed ledger to store the transactions, and replicating the distributed ledger to all nodes of the overlay. Generating the distributed ledger includes receiving, at the super nodes, transactions from the one or more nodes, assigning, by the super nodes, the transactions to a variable size block, validating, by the super nodes, the variable size block, and linking the validated variable size block to the distributed ledger.
-
公开(公告)号:US11194550B2
公开(公告)日:2021-12-07
申请号:US17003201
申请日:2020-08-26
Applicant: Architecture Technology Corporation
Inventor: Paul C. Davis , Douglas Sweet , Erin Gambucci
Abstract: A computer-implemented method for migrating a monolithic legacy software system to a well-defined modular target software architecture includes selecting a method, based on predefined patterns, for transforming the software legacy software system; creating an abstract syntax tree from the legacy software system's source code; from the abstract syntax tree, determining a flow of the source code and any coding violations and coding smells in the legacy software system's source code; using the flow and the coding violations, identifying architecture issues in the legacy software system; scheduling tasks for transforming the legacy software system into the target software architecture; automatically generating new source code according to the target software architecture; and automatically and autonomously refactoring the new source code.
-
-
-
-
-
-
-
-
-