-
公开(公告)号:US11775992B1
公开(公告)日:2023-10-03
申请号:US17833062
申请日:2022-06-06
Applicant: Architecture Technology Corporation
Inventor: Drew Sullivan , Evan Eaves , William Colligan
IPC: G06Q30/0202 , G06N3/084 , G06N3/047 , G06N7/01
CPC classification number: G06Q30/0202 , G06N3/047 , G06N3/084 , G06N7/01
Abstract: A product obsolescence forecast system includes machine instructions stored in a non-transitory computer readable storage medium, the machine instructions. A processor executes the instructions to receive an identity of a first product and identities of one or more second products similar to the first product, each of the second products having gone obsolete; receive a determinant of obsolescence of one or more of the obsolete second products; generate one or more observations related to the first product by inputting each received determinant to a trained network; and generate a statistical analysis of the one or more observations to provide an expected value of an actual obsolescence date for the first product.
-
公开(公告)号:US11762382B1
公开(公告)日:2023-09-19
申请号:US17532860
申请日:2021-11-22
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Judson Powers
IPC: G05D1/00 , H04B17/318 , G08G5/00 , B64C39/02 , H04W4/029 , G06N20/00 , B64U101/00
CPC classification number: G05D1/0022 , B64C39/024 , G06N20/00 , G08G5/006 , H04B17/318 , H04W4/029 , B64U2101/00 , B64U2201/20
Abstract: A system includes network nodes, such as, multiple computing devices and multiple software defined radios. The network nodes accurately and timely detects, identifies, locates, and responds to an unmanned aircraft system within a predetermined area. The network nodes use a communications control link between the unmanned aircraft system and a controller of the unmanned aircraft system to detect, identify, locate, and respond to the unmanned aircraft system. The network nodes are deployed over the predetermined area to maintain airspace situational awareness of the unmanned aircraft system, and deploy targeted countermeasures to counteract identified threats associated with the presence of the unmanned aircraft system within the predetermined area.
-
公开(公告)号:US20230281322A1
公开(公告)日:2023-09-07
申请号:US18317807
申请日:2023-05-15
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Judson POWERS
CPC classification number: G06F21/577 , G06N20/00 , G06F2221/033
Abstract: A computer-implemented method of securing vulnerabilities in a program, the method including receiving, by a computer, state information generated by an executed application program, training, by the computer, a constraints model based on the state information, generating, by the computer, one or more constraints with the constraints model, each of the one or more constraints describing an execution constraint for executing the application program, wherein the execution constraint enforces an intended operation of the application program, and applying, by the computer, the one or more constraints to the application program.
-
公开(公告)号:US11720728B1
公开(公告)日:2023-08-08
申请号:US17480069
申请日:2021-09-20
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Joseph Cascioli
CPC classification number: G06F30/30 , H04L9/0819
Abstract: An illustrative system may comprise a plurality of distributed network nodes hosting a two-dimensional distributed digital ledger. The distributed digital ledger may have a plurality of chains of digital blocks in the two-dimensions, wherein each chain may be associated with a particular functionality (e.g., a first set of integrated circuit processes) and a corresponding level of security. For example, a first chain in the first direction may contain digital blocks containing code differentials of the hardware description language code forming the integrated circuit design. A second chain in a second direction may contain digital blocks containing simulation data records generated during the simulation of the integrated circuit design. The first chain and the second chain may be based upon different cryptographic protocols and therefore may be cryptographically separate from each other.
-
195.
公开(公告)号:US11675904B1
公开(公告)日:2023-06-13
申请号:US17322498
申请日:2021-05-17
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Judson Powers , Katey Huddleston
CPC classification number: G06F21/566 , G06F9/45558 , G06K9/6282 , G06N20/00 , H04L63/1416 , G06F2009/45591
Abstract: Disclosed herein are embodiments of systems, methods, and products providing real-time anti-malware detection and protection. The computer uses artificial intelligence techniques to learn and detect new exploits in real time and protect the full system from harm. The computer trains a first machine learning model for executable files. The computer trains a second machine learning model for non-executable files. The computer trains a third machine learning model for network traffic. The computer identifies malware using the various machine learning models. The computer restores to a clean, uncorrupted state using virtual machine technology. The computer reports the detected malware to a security server, such as security information and even management (SIEM) systems, by transmitting detection alert message regarding the malware. The computer interacts with an administrative system over an isolated control network to allow the system administrator to correct the corruption caused by the malware.
-
公开(公告)号:US11670190B1
公开(公告)日:2023-06-06
申请号:US16780582
申请日:2020-02-03
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Dahyun Hollister
CPC classification number: G09B19/003 , G06V20/20 , G09B9/003
Abstract: Various embodiments described herein relate to a server-based virtual training environment monitor, which may configure and customize an exercise and fitness program accessible through augmented and virtual reality applications running on an electronic device of a user, based on a current state and events associated with the user. The current state and events are determined through reactive agents (for example, intelligent agents) and monitoring devices (for example, sensors), which are directly or indirectly associated with the electronic device.
-
197.
公开(公告)号:US11669688B1
公开(公告)日:2023-06-06
申请号:US17340374
申请日:2021-06-07
Applicant: Architecture Technology Corporation
Inventor: Eric R. Chartier , Andrew Murphy , William Colligan , Paul C. Davis
IPC: G06F40/30 , G06F40/295 , G06F16/93 , G06F16/35 , G06F40/226
CPC classification number: G06F40/295 , G06F16/353 , G06F16/93 , G06F40/226 , G06F40/30
Abstract: A system and a corresponding computer-implemented method identifies and classifies community-sourced documents as true documents. The community-sourced documents include one or more data objects such as data items, including text, strings, phrases, and words; image items, including still image items, video image items, and icons; and drawing items. The system and corresponding method then report the analysis results.
-
公开(公告)号:US11631340B2
公开(公告)日:2023-04-18
申请号:US17710631
申请日:2022-03-31
Applicant: Architecture Technology Corporation
Inventor: Matthew Donovan , Colleen Kimball
Abstract: A computer-implemented adaptive group training method a computer accessing a virtual system and initiating a group training exercise for training a trainee group comprising one or more trainees, the group training exercise including one or more challenges to the virtual system, each of the one or more challenges including a pre-defined sequence of one or more injectable events; the computer controlling subsequent execution of the group training exercise comprising injecting the injectable events; and the computer evaluating performance of the trainee group during the subsequent execution of the group training exercise, including analyzing actions taken by the trainee group in response to each of the injections, and attributing one or more of the actions taken to a trainee.
-
公开(公告)号:US11599626B1
公开(公告)日:2023-03-07
申请号:US16815295
申请日:2020-03-11
Applicant: Architecture Technology Corporation
Inventor: Timothy Hartley , Ranga Ramanujan , Jafar Al-Gharaibeh
IPC: H04L29/06 , G06F21/53 , H04W12/033 , G06F3/06 , H04L9/40 , H04L67/00 , G06F21/74 , H04L43/0829 , H04L43/0864 , H04L43/0882
Abstract: An example method includes receiving an indication of a selection of a first application environment that includes a first virtual environment associated with a first security domain and is configured to isolate execution of software applications within the first application environment, suspending execution of a second application environment that includes a second virtual environment associated with a second security domain different from the first security domain, initiating execution of the first application environment, identifying information associated with the first security domain and provided by the first application environment that is to be sent to an external computing device associated with the first security domain, selecting communication network(s) from one or more communication networks that are each available to the mobile computing device for data communication, encrypting, based on the first security domain and network(s), the information, and sending, to the external computing device via the network(s), the encrypted information.
-
公开(公告)号:US11599356B1
公开(公告)日:2023-03-07
申请号:US17353501
申请日:2021-06-21
Applicant: Architecture Technology Corporation
Inventor: Colleen Kimball , Judson Powers
Abstract: Disclosed herein are embodiments of systems, methods, and products for modernizing and optimizing legacy software. A computing device may perform an automated runtime performance profiling process. The performance profiler may automatically profile the legacy software at runtime, monitor the memory usage and module activities of the legacy software, and pinpoint/identify a subset of inefficient functions in the legacy software that scale poorly or otherwise inefficient. The computing device may further perform a source code analysis and refactoring process. The computing device may parse the source code of the subset of inefficient functions and identify code violations within the source code. The computing device may provide one or more refactoring options to optimize the source code. Each refactoring option may comprise a change to the source code configured to correct the code violations. The computing device may refactor the source code based on a selected refactoring option.
-
-
-
-
-
-
-
-
-