-
公开(公告)号:US11042369B1
公开(公告)日:2021-06-22
申请号:US16780664
申请日:2020-02-03
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Colleen Kimball , Judson Powers
IPC: G06F9/44 , G06F8/72 , G06F8/34 , G06F11/36 , G06F11/34 , G06N20/00 , G06F9/54 , G06F11/30 , G06F8/41
Abstract: Disclosed herein are embodiments of systems, methods, and products for modernizing and optimizing legacy software. A computing device may perform an automated runtime performance profiling process. The performance profiler may automatically profile the legacy software at runtime, monitor the memory usage and module activities of the legacy software, and pinpoint/identify a subset of inefficient functions in the legacy software that scale poorly or otherwise inefficient. The computing device may further perform a source code analysis and refactoring process. The computing device may parse the source code of the subset of inefficient functions and identify code violations within the source code. The computing device may provide one or more refactoring options to optimize the source code. Each refactoring option may comprise a change to the source code configured to correct the code violations. The computing device may refactor the source code based on a selected refactoring option.
-
公开(公告)号:US11022672B1
公开(公告)日:2021-06-01
申请号:US16723980
申请日:2019-12-20
Applicant: Architecture Technology Corporation
Inventor: Eric Chartier , Paul C. Davis , Ryan L Hagelstrom , Ian J. McLinden , Douglas Sweet
Abstract: A computer-implemented method for establishing and controlling a mobile perimeter and for determining a geographic location of an RF emitting source at or within the mobile perimeter includes receiving from RF sensors in a network, processed RF emissions from the source collected at RF sensors. The RF emissions follow a wireless protocol and include frames encoding RF emitting source identification information. The method further includes extracting RF emitting source identification information from one or more of the frames, processing the source identification information to identify the RF emitting source, and classifying the RF emitting source by one or more of UAS type, UAS capabilities, and UAS model. The method also includes receiving from the RF sensors, a geographic location of each RF sensor and a time of arrival (TOA) of the RF emissions at the RF sensor; and executing a multilateration process to estimate a geographic location of the RF emitting source.
-
公开(公告)号:US10990611B1
公开(公告)日:2021-04-27
申请号:US15802570
申请日:2017-11-03
Applicant: Architecture Technology Corporation
Inventor: Mandeep Singh , William Colligan
IPC: G06F16/27 , G06F12/1045 , G06F7/76 , G06F16/2453
Abstract: A method for adaptively providing processed data to elements of a distributed network, includes a processor partitioning data from a plurality of data sources, including big data from a plurality of big data sources based on defined needs of the elements; the processor storing the partitioned data in a central data source and a subset of the partitioned data in one or more cache memories in proximity to the elements; receiving a data request from a network element; determining a time-sensitivity of data responsive to the data request; supplying a response to the data request for non-time-sensitive data; and supplying the response to the data request for time-sensitive data.
-
公开(公告)号:US10979402B1
公开(公告)日:2021-04-13
申请号:US15975580
申请日:2018-05-09
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Timothy Hartley , Deborah Charan , Ranga S. Ramanujan
IPC: H04W12/02 , H04L29/06 , H04W4/06 , H04L12/851 , H04L12/931 , G06F21/60 , H04L12/761
Abstract: Disclosed herein are embodiments of systems, methods, and products comprising a computing device, which provides Efficient Data-In-Transit Protection Techniques for Handheld Devices (EDITH) to protect data-in-transit. An end user device (EUD) may generate a multicast data packet. The EDITH module of the EUD encapsulates the data packet in a GRE packet and directs the GRE packet to a unicast destination address of an EDITH Multicast Router included in an infrastructure. The EDITH module on the EUD double compresses and double encrypts the GRE packet. The EDITH module on the infrastructure decrypts and decompresses the double compressed and double encrypted GRE packet to recreate the GRE packet. The EDITH module on the infrastructure decapsulates the GRE packet to derive the original multicast data packet, and distributes the original multicast data packet to the multiple group member based on the multicast destination address included in the original multicast data packet.
-
公开(公告)号:US10942716B1
公开(公告)日:2021-03-09
申请号:US16526485
申请日:2019-07-30
Applicant: Architecture Technology Corporation
Inventor: Judson Powers , Noel E. Schmidt
Abstract: An example method includes, during execution of a software application in a computing system comprising a plurality of processing units, identifying platform-independent instructions that are configured to perform at least one computational task, wherein the plurality of processing units comprises a heterogeneous group, and wherein the platform-independent instructions have a format that is not specific to any particular processing unit in the plurality of processing units, determining one or more scheduling criteria that are associated with the platform-independent instructions, and selecting, from the heterogeneous group of processing units and based on the scheduling criteria, a processing unit to perform the at least one computational task. The example method further includes converting the platform-independent instructions into platform-dependent instructions, wherein the platform-dependent instructions have a format that is specific to the selected processing unit, and executing, by the selected processing unit, the platform-dependent instructions to perform the at least one computational task.
-
公开(公告)号:US10909244B1
公开(公告)日:2021-02-02
申请号:US16502629
申请日:2019-07-03
Applicant: Architecture Technology Corporation
Inventor: Matthew P. Donovan , Robert A. Joyce , Judson Powers , Dahyun Hollister
Abstract: An example method includes storing a scenario event list that defines one or more events associated with a training exercise, and configuring, based on the events defined in the scenario event list, one or more software agents to emulate one or more cyber-attacks against a host computing system during the training exercise, which includes configuring the software agents to save a state of one or more resources of the host computing system prior to emulating the cyber-attacks and to restore the state of the resources upon conclusion of the cyber-attacks. The example method further includes deploying the software agents for execution on the host computing system during the training exercise to emulate the cyber-attacks against the host computing system using one or more operational networks.
-
公开(公告)号:US10887415B1
公开(公告)日:2021-01-05
申请号:US15975091
申请日:2018-05-09
Applicant: Architecture Technology Corporation
Inventor: Carl Manson , Ryan Marotz
Abstract: In a network, a common agnostic data exchange method between two devices native to the network, the devices using different formats and transmission protocols, includes invoking a proxy at each device, and a first proxy receiving a first data record from a first device, the first data record having a first format. The first proxy identifies the first format by comparing a first pattern of the first data record to reference patterns of one or more reference data records and determines if a sufficient pattern match exists between the first pattern and the reference pattern. The first proxy translates the first data record's format into an inter-proxy data record having an inter-proxy format and transmits the inter-proxy data record to a second proxy coupled to a second device. The second proxy translates the inter-proxy data record to a second data record having a format employed at the second device.
-
公开(公告)号:US20200382548A1
公开(公告)日:2020-12-03
申请号:US16996148
申请日:2020-08-18
Applicant: Architecture Technology Corporation
Inventor: Judson Powers , Matthew Donovan
Abstract: A method for improving efficiency of a training program begins with a processor monitoring and adapting execution of a training exercise of the training program. The processor determines a training program effectiveness measure including determining trainee skill improvement demonstrated during the training exercise, and monitoring and determining correctness and timeliness of trainee actions during the training exercise. The processor then determines a training program cost measure by determining a first monetary cost for the execution of the at least one training exercise, determining a second monetary cost associated with trainee manhours for the training exercise, and generating the training program cost measure based on the first and second monetary costs. The processor then computes a ratio of the training program effectiveness measure to the training program cost measure.
-
公开(公告)号:US10853060B2
公开(公告)日:2020-12-01
申请号:US16740619
申请日:2020-01-13
Applicant: Architecture Technology Corporation
Inventor: Colleen Kimball , Katey Huddleston , Paul Nicotera
Abstract: A computer-implemented method includes creating, by a computing device, an abstract syntax tree based on a source code file of a software application, the source code file including source code defining operations of the software application. The method also includes traversing, by the computing device, the abstract syntax tree. The method further includes identifying, by the computing device and based on the traversing of the abstract syntax tree, one or more code violations present in the source code. The method also includes generating, by the computing device, at least one refactoring option for the one or more code violations, each refactoring option of the at least one refactoring option representing a change to the source code file that is configured to remediate the associated code violation.
-
公开(公告)号:US10831877B1
公开(公告)日:2020-11-10
申请号:US15912411
申请日:2018-03-05
Applicant: Architecture Technology Corporation
Inventor: Jafar Al-Gharaibeh , Timothy Hartley , Ranga S. Ramanujan
Abstract: Disclosed herein are embodiments of systems, methods, and products comprise a computing device, which allows a device to be used in different classification levels by powering the device down and booting to a different classified level without the need to switch hard drives. The disclosed software shield and persona switcher (Shielder) module provides independent application environments (personas) for separate security domains while allowing fast transition between personas. Shielder module supports multiple security classification via a minimal system storage partitioning. Shielder module allows efficient collection and reallocation of memory and persistent storage according to need and priority. Shielder module provides secure management of communication media by directing the system communication according to the security profile of the active persona.
-
-
-
-
-
-
-
-
-