Systems and methods for data flow integrity according to a controlled environment

    公开(公告)号:US11669642B1

    公开(公告)日:2023-06-06

    申请号:US17322524

    申请日:2021-05-17

    CPC classification number: G06F21/64 G06F8/52 G06F21/52

    Abstract: Disclosed herein are embodiments of systems, methods, and products comprise a processor, which provides runtime enforcement of data flow integrity. The processor accesses the application binary file from the disk to execute an application and translates the application binary into intermediate representation. The processor applies the logic of data flow integrity controls to the intermediate representation. Specifically, the processor identifies the vulnerable code in the intermediate representation. The processor applies data flow integrity controls to the vulnerable code. The processor adds simple instrumentation that only changes the application's behavior when unauthorized data tampering occurs while preserving the application's normal behavior. When certain operations may cause unauthorized data tampering, the processor takes proper measures to stop the operations. The processor translates the intermediate representation back to a machine code and replaces the original binary with the machine code.

    NETWORK MONITORING TOOL FOR ALLOCATING NODES OF SUPERCOMPUTERS

    公开(公告)号:US20230037170A1

    公开(公告)日:2023-02-02

    申请号:US17963095

    申请日:2022-10-10

    Inventor: Maher Kaddoura

    Abstract: Disclosed herein are embodiments of a network monitoring device for a supercomputer system having a plurality of supercomputer nodes. The network monitoring device may utilize plug-in software modules to provide network monitoring capabilities related to discovering the network topologies of the supercomputer system, determining network and computing resources that are available for new applications in the supercomputer system, collecting network and computing resources that are being used by running software applications in the supercomputer system, and monitoring running software applications on the supercomputer system.

    Transmission of medical information in disrupted communication networks

    公开(公告)号:US11538562B1

    公开(公告)日:2022-12-27

    申请号:US16781850

    申请日:2020-02-04

    Abstract: Described herein are methods and systems to send/receive medical data from one or more electronic devices to a secondary medical unit in delayed, intermittently-connected, low-bandwidth (DIL) environments. An application executing on the electronic devices may, in response to detecting a disruption within a communication network, execute an offline communication protocol to transmit medical data among a predetermined number of other electronic devices, wherein the offline communication protocol does not use the communication network. The application may then receive a request from a server of the secondary medical unit to transmit at least a part of the medical data. In response to authenticating the request, the application then transmits the medical data using an online communication protocol that uses the communication network or using an offline communication protocol.

    Systems and methods for multi-user virtual training

    公开(公告)号:US11474596B1

    公开(公告)日:2022-10-18

    申请号:US16892911

    申请日:2020-06-04

    Abstract: Disclosed herein are embodiments for managing a task including one or more skills. A server stores a virtual environment, software agents configured to collect data generated when a user interacts with the virtual environment to perform the task, and a predictive machine learning model. The server generates virtual entities during the performance of the task, and executes the predictive machine learning model to configure the virtual entities based upon data generated when the user interacts with the virtual environment. The server generates the virtual environment and the virtual entities configured for interaction with the user during display by the client device, and receives the data collected by the software agents. The system displays a user interface at the client device to indicate a measurement of each of the skills during performance of the task. The server trains the predictive machine learning model using this measurement of skills during task performance.

    Artificial intelligence modeling for cyber-attack simulation protocols

    公开(公告)号:US11429713B1

    公开(公告)日:2022-08-30

    申请号:US16256810

    申请日:2019-01-24

    Abstract: The methods and systems disclosed herein generally relate to automated execution and evaluation of computer network training exercises, such as in a virtual environment. A server generates a training system having a virtual attack machine and a virtual target machine where the virtual target machine is operatively controlled by a trainee computer. The server then executes a simulated cyber-attack and monitors/collects actions and responses by the trainee. The server then executes an artificial intelligence model to evaluate the trainee's action and to identify a subsequent simulated cyber-attack (e.g., a next step to the simulated cyber-attack). The server may then train the artificial intelligence model using various machine-learning techniques using the collected data during the exercise.

    Hybrid communications based upon aerial networks

    公开(公告)号:US11277203B1

    公开(公告)日:2022-03-15

    申请号:US16749779

    申请日:2020-01-22

    Abstract: Disclosed herein are embodiments of an aerial network system including a first transceiver configured to transmit and receive free space optical (FSO) signals and a second transceiver configured to transmit and receive radio frequency (RF) signals. A processor provides modulated data signals to the first and second transceivers for transmission and receives demodulated signals from the first and second transceiver. The processor is configured for policy-based multipath admission of requests for access to an IP-routing enabled overlay network. The processor includes an inverse mission planning system configured for predictive traffic load balancing of transmitted FSO signals and RF signals. The inverse mission planning system includes radio behavior models and aerial platform models, and is configured for geographic simulation and optimization of mission planning data based upon user-inputted mission-specific data. Forward error correction (FEC) coding of transmitted communications via packet erasure coding provides resiliency with a low bit error rate.

    Decentralized ledger system and method for enterprises

    公开(公告)号:US11240301B2

    公开(公告)日:2022-02-01

    申请号:US16834247

    申请日:2020-03-30

    Inventor: Maher N Kaddoura

    Abstract: A computer-implemented method for managing enterprise transactions includes creating an overlay to a physical communications network, adding one or more nodes to the overlay, designating one or more nodes of the overlay as super nodes, generating a distributed ledger to store the transactions, and replicating the distributed ledger to all nodes of the overlay. Generating the distributed ledger includes receiving, at the super nodes, transactions from the one or more nodes, assigning, by the super nodes, the transactions to a variable size block, validating, by the super nodes, the variable size block, and linking the validated variable size block to the distributed ledger.

    System and method for migrating legacy software to a system common architecture

    公开(公告)号:US11194550B2

    公开(公告)日:2021-12-07

    申请号:US17003201

    申请日:2020-08-26

    Abstract: A computer-implemented method for migrating a monolithic legacy software system to a well-defined modular target software architecture includes selecting a method, based on predefined patterns, for transforming the software legacy software system; creating an abstract syntax tree from the legacy software system's source code; from the abstract syntax tree, determining a flow of the source code and any coding violations and coding smells in the legacy software system's source code; using the flow and the coding violations, identifying architecture issues in the legacy software system; scheduling tasks for transforming the legacy software system into the target software architecture; automatically generating new source code according to the target software architecture; and automatically and autonomously refactoring the new source code.

Patent Agency Ranking