-
公开(公告)号:US11563679B1
公开(公告)日:2023-01-24
申请号:US16946230
申请日:2020-06-11
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Maher N. Kaddoura
IPC: G06F15/173 , H04L45/64 , G06F16/23 , H04L67/1097 , H04L67/104
Abstract: Software implementing a distributed ledger that adjusts in response disconnected peers is provided. The software implements an overlay routing protocol to monitor one or more overlay links between a first peer and one or more second peers that are maintaining a distributed ledger. The software adjusts how blocks for the distributed ledger are formed in response to detecting the one or more second peers becoming disconnected from the peer.
-
公开(公告)号:US20230004422A1
公开(公告)日:2023-01-05
申请号:US17943896
申请日:2022-09-13
Applicant: Architecture Technology Corporation
Inventor: Nathan Bahr , Robert A. Joyce
IPC: G06F9/455 , H04L67/568 , G06F9/50 , H04L9/40
Abstract: Disclosed herein are embodiments of systems, methods, and products that provide adversary detection and threat hunting. A server may comprise a user side virtual machine facing the cyber protection users, a collection virtual machine facing the at-risk network, and a data repository. The server may receive user requests requesting status data from the at-risk network via the user side virtual machine. The server may collect status data from the at-risk network via the collection virtual machine and store the collected data into the data repository. Different users may request duplicate information from the at-risk network. The server may retrieve the requested information from the data repository for duplicate requests and return the responses immediately for such requests. Because the server does not query the at-risk network for duplicate requests, the server may reduce the amount of bandwidth needed to acquire and distribute the requested information.
-
公开(公告)号:US11481359B2
公开(公告)日:2022-10-25
申请号:US17039323
申请日:2020-09-30
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Maher N. Kaddoura
IPC: G06F16/00 , G06F16/182
Abstract: Software generates a ledger fragment by generating a first block having first data in a first record data field, a nonce value in a first previous block pointer field, and a first hash in a first hash field. Generating the ledger fragment also includes generating a second block having second data in a second record data field, the first hash in a second previous block pointer field, and a second hash in a second hash field. The ledger fragment is appended to a main ledger with a linking block. The linking block is positioned between the first block of the ledger fragment and an end block of the main ledger. The linking block includes a third hash from the end block in a fourth previous block pointer field and the nonce value in a fourth hash field. The linking block is signed by a plurality of voting peers.
-
公开(公告)号:US11463366B1
公开(公告)日:2022-10-04
申请号:US17028664
申请日:2020-09-22
Applicant: Architecture Technology Corporation
Inventor: Benjamin L. Burnett , Deborah K. Charan , Ian J. McLinden , Jordan C. Bonney
IPC: H04L47/2441 , H04L47/762 , H04L41/084 , H04L41/0816 , H04L41/08 , H04L47/78 , H04W16/28 , H04B7/06 , H04W76/19 , H04L45/02 , H04W8/04
Abstract: This disclosure is directed to network optimization in a complex joint network for increasing the network utility of the complex joint network. A computing device in the complex joint network may receive a data flow via a complex joint network. The computing device may determine, based on a network template, a mission utility associated with the data flow and a traffic class associated with the data flow. The computing device may control one or more quality of service decisions based at least in part on the mission utility associated with the data flow and the traffic class associated with the data flow.
-
公开(公告)号:US11451581B2
公开(公告)日:2022-09-20
申请号:US16417531
申请日:2019-05-20
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Joseph Sirianni , Judson Powers , Robert Joyce
Abstract: Disclosed herein are embodiments of systems, methods, and products comprise an analytic server, which detects and defends against malware in-flight regardless of the specific nature and methodology of the underlying attack. The analytic server learns the system's normal behavior during testing and evaluation phase and trains a machine-learning model based on the normal behavior. The analytic server monitors the system behavior during runtime comprising the runtime behavior of each sub-system of the system. The analytic server executes the machine-learning model and compares the system runtime behavior with the normal behavior to identify anomalous behavior. The analytic server executes one or more mitigation instructions to mitigate malware. Based on multiple available options for mitigating malware, the analytic server makes an intelligent decision and takes the least impactful action that have the least impact on the system to maintain mission assurance.
-
公开(公告)号:US11450214B1
公开(公告)日:2022-09-20
申请号:US16681242
申请日:2019-11-12
Applicant: Architecture Technology Corporation
Inventor: Barry A. Trent , Ranga S. Ramanujan , Fabio F. Pozzo
Abstract: A method of generating a flight path for an aircraft is provided. The method includes modeling geographic space and time that includes a plurality of mobile communication nodes. The model includes locations of each of the plurality of mobile communication nodes as those nodes move over time. The model also provides an indication of wireless connectivity between a radio on each of the plurality of communication nodes and a radio of the aircraft at their respective location. The method further includes running a plurality of flight paths through the model in order to identify a selected flight path that provides a desired level of connectivity between the aircraft and the plurality of communication nodes.
-
公开(公告)号:US11449553B2
公开(公告)日:2022-09-20
申请号:US17113165
申请日:2020-12-07
Applicant: Architecture Technology Corporation
Inventor: Richard Chandler , Douglas Sweet , Paul Davis
IPC: G06F7/00 , G06F16/901 , G06K9/62 , G06F16/31 , G06F16/9537
Abstract: A real-time recommendation system includes a non-transitory, computer-readable storage medium having encoded thereon instructions that a processor executes to receive data from data sources that includes one or more data records. The processor then identifies features in data of a data record, extracts and buffers the features, and applies the features to a feature detect mechanism. The feature detect mechanism includes feature detect algorithm and more recommender algorithms that are encapsulated in a feature detection object. The feature detection object may be a Strategy/Composite feature detection object that includes Strategy design patterns. The processor further executes to reject a feature in response to failures of the feature to match at least one of the Strategy design patterns, and in real time, select and install features that match one or more of the Strategy design patterns into one or more recommender algorithms.
-
公开(公告)号:US20220294808A1
公开(公告)日:2022-09-15
申请号:US17663597
申请日:2022-05-16
Applicant: Architecture Technology Corporation
Inventor: Ranga Ramanujan , Benjamin L. Burnett
Abstract: This disclosure is directed to monitoring a crypto-partitioned, or cipher-text, wide-area network (WAN). A first computing device may be situated in a plain-text portion of a first enclave behind a first inline network encryptor (INE). A second device may be positioned in a plain-text portion of a second enclave behind a second INE. The two enclaves may be separated by a cipher-text WAN, over which the two enclaved may communicate. The first computing device may receive a data packet from the second computing device. The first computing device may then determine contents of a header of the data packet. The first computing device may, based at least in part on the contents of the header of the data packet, determine a status of the cipher-text WAN.
-
公开(公告)号:US11442766B1
公开(公告)日:2022-09-13
申请号:US16780547
申请日:2020-02-03
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Nathan Bahr , Robert A. Joyce
IPC: G06F15/16 , G06F9/455 , H04L9/40 , G06F9/50 , H04L67/568
Abstract: Disclosed herein are embodiments of systems, methods, and products that provide adversary detection and threat hunting. A server may comprise a user side virtual machine facing the cyber protection users, a collection virtual machine facing the at-risk network, and a data repository. The server may receive user requests requesting status data from the at-risk network via the user side virtual machine. The server may collect status data from the at-risk network via the collection virtual machine and store the collected data into the data repository. Different users may request duplicate information from the at-risk network. The server may retrieve the requested information from the data repository for duplicate requests and return the responses immediately for such requests. Because the server does not query the at-risk network for duplicate requests, the server may reduce the amount of bandwidth needed to acquire and distribute the requested information.
-
公开(公告)号:US11354446B2
公开(公告)日:2022-06-07
申请号:US16825548
申请日:2020-03-20
Applicant: Architecture Technology Corporation
Inventor: Barry A. Trent , Edward R. Mandy
IPC: H04L29/06 , G06F21/64 , G06F21/56 , H04L67/104
Abstract: A distributed file integrity checking system is described. The described peer integrity checking system (PICS) may negate an attack by storing a properties database amongst nodes of a peer-to-peer network of hosts, some or all of which co-operate to protect and watch over each other.
-
-
-
-
-
-
-
-
-