Systems and methods for modernizing and optimizing legacy source code

    公开(公告)号:US11042369B1

    公开(公告)日:2021-06-22

    申请号:US16780664

    申请日:2020-02-03

    Abstract: Disclosed herein are embodiments of systems, methods, and products for modernizing and optimizing legacy software. A computing device may perform an automated runtime performance profiling process. The performance profiler may automatically profile the legacy software at runtime, monitor the memory usage and module activities of the legacy software, and pinpoint/identify a subset of inefficient functions in the legacy software that scale poorly or otherwise inefficient. The computing device may further perform a source code analysis and refactoring process. The computing device may parse the source code of the subset of inefficient functions and identify code violations within the source code. The computing device may provide one or more refactoring options to optimize the source code. Each refactoring option may comprise a change to the source code configured to correct the code violations. The computing device may refactor the source code based on a selected refactoring option.

    Mobile emergency perimeter system and method

    公开(公告)号:US11022672B1

    公开(公告)日:2021-06-01

    申请号:US16723980

    申请日:2019-12-20

    Abstract: A computer-implemented method for establishing and controlling a mobile perimeter and for determining a geographic location of an RF emitting source at or within the mobile perimeter includes receiving from RF sensors in a network, processed RF emissions from the source collected at RF sensors. The RF emissions follow a wireless protocol and include frames encoding RF emitting source identification information. The method further includes extracting RF emitting source identification information from one or more of the frames, processing the source identification information to identify the RF emitting source, and classifying the RF emitting source by one or more of UAS type, UAS capabilities, and UAS model. The method also includes receiving from the RF sensors, a geographic location of each RF sensor and a time of arrival (TOA) of the RF emissions at the RF sensor; and executing a multilateration process to estimate a geographic location of the RF emitting source.

    Adaptive data processing system and method

    公开(公告)号:US10990611B1

    公开(公告)日:2021-04-27

    申请号:US15802570

    申请日:2017-11-03

    Abstract: A method for adaptively providing processed data to elements of a distributed network, includes a processor partitioning data from a plurality of data sources, including big data from a plurality of big data sources based on defined needs of the elements; the processor storing the partitioned data in a central data source and a subset of the partitioned data in one or more cache memories in proximity to the elements; receiving a data request from a network element; determining a time-sensitivity of data responsive to the data request; supplying a response to the data request for non-time-sensitive data; and supplying the response to the data request for time-sensitive data.

    Systems and methods for data in transit encryption

    公开(公告)号:US10979402B1

    公开(公告)日:2021-04-13

    申请号:US15975580

    申请日:2018-05-09

    Abstract: Disclosed herein are embodiments of systems, methods, and products comprising a computing device, which provides Efficient Data-In-Transit Protection Techniques for Handheld Devices (EDITH) to protect data-in-transit. An end user device (EUD) may generate a multicast data packet. The EDITH module of the EUD encapsulates the data packet in a GRE packet and directs the GRE packet to a unicast destination address of an EDITH Multicast Router included in an infrastructure. The EDITH module on the EUD double compresses and double encrypts the GRE packet. The EDITH module on the infrastructure decrypts and decompresses the double compressed and double encrypted GRE packet to recreate the GRE packet. The EDITH module on the infrastructure decapsulates the GRE packet to derive the original multicast data packet, and distributes the original multicast data packet to the multiple group member based on the multicast destination address included in the original multicast data packet.

    Dynamic computational acceleration using a heterogeneous hardware infrastructure

    公开(公告)号:US10942716B1

    公开(公告)日:2021-03-09

    申请号:US16526485

    申请日:2019-07-30

    Abstract: An example method includes, during execution of a software application in a computing system comprising a plurality of processing units, identifying platform-independent instructions that are configured to perform at least one computational task, wherein the plurality of processing units comprises a heterogeneous group, and wherein the platform-independent instructions have a format that is not specific to any particular processing unit in the plurality of processing units, determining one or more scheduling criteria that are associated with the platform-independent instructions, and selecting, from the heterogeneous group of processing units and based on the scheduling criteria, a processing unit to perform the at least one computational task. The example method further includes converting the platform-independent instructions into platform-dependent instructions, wherein the platform-dependent instructions have a format that is specific to the selected processing unit, and executing, by the selected processing unit, the platform-dependent instructions to perform the at least one computational task.

    Computer network defense training on operational networks using software agents

    公开(公告)号:US10909244B1

    公开(公告)日:2021-02-02

    申请号:US16502629

    申请日:2019-07-03

    Abstract: An example method includes storing a scenario event list that defines one or more events associated with a training exercise, and configuring, based on the events defined in the scenario event list, one or more software agents to emulate one or more cyber-attacks against a host computing system during the training exercise, which includes configuring the software agents to save a state of one or more resources of the host computing system prior to emulating the cyber-attacks and to restore the state of the resources upon conclusion of the cyber-attacks. The example method further includes deploying the software agents for execution on the host computing system during the training exercise to emulate the cyber-attacks against the host computing system using one or more operational networks.

    Common agnostic data exchange systems and methods

    公开(公告)号:US10887415B1

    公开(公告)日:2021-01-05

    申请号:US15975091

    申请日:2018-05-09

    Abstract: In a network, a common agnostic data exchange method between two devices native to the network, the devices using different formats and transmission protocols, includes invoking a proxy at each device, and a first proxy receiving a first data record from a first device, the first data record having a first format. The first proxy identifies the first format by comparing a first pattern of the first data record to reference patterns of one or more reference data records and determines if a sufficient pattern match exists between the first pattern and the reference pattern. The first proxy translates the first data record's format into an inter-proxy data record having an inter-proxy format and transmits the inter-proxy data record to a second proxy coupled to a second device. The second proxy translates the inter-proxy data record to a second data record having a format employed at the second device.

    SYSTEM AND METHOD FOR IMPROVING TRAINING PROGRAM EFFICIENCY

    公开(公告)号:US20200382548A1

    公开(公告)日:2020-12-03

    申请号:US16996148

    申请日:2020-08-18

    Abstract: A method for improving efficiency of a training program begins with a processor monitoring and adapting execution of a training exercise of the training program. The processor determines a training program effectiveness measure including determining trainee skill improvement demonstrated during the training exercise, and monitoring and determining correctness and timeliness of trainee actions during the training exercise. The processor then determines a training program cost measure by determining a first monetary cost for the execution of the at least one training exercise, determining a second monetary cost associated with trainee manhours for the training exercise, and generating the training program cost measure based on the first and second monetary costs. The processor then computes a ratio of the training program effectiveness measure to the training program cost measure.

    Software refactoring systems and methods

    公开(公告)号:US10853060B2

    公开(公告)日:2020-12-01

    申请号:US16740619

    申请日:2020-01-13

    Abstract: A computer-implemented method includes creating, by a computing device, an abstract syntax tree based on a source code file of a software application, the source code file including source code defining operations of the software application. The method also includes traversing, by the computing device, the abstract syntax tree. The method further includes identifying, by the computing device and based on the traversing of the abstract syntax tree, one or more code violations present in the source code. The method also includes generating, by the computing device, at least one refactoring option for the one or more code violations, each refactoring option of the at least one refactoring option representing a change to the source code file that is configured to remediate the associated code violation.

    Systems and methods for implementing multiple personas in a computing system

    公开(公告)号:US10831877B1

    公开(公告)日:2020-11-10

    申请号:US15912411

    申请日:2018-03-05

    Abstract: Disclosed herein are embodiments of systems, methods, and products comprise a computing device, which allows a device to be used in different classification levels by powering the device down and booting to a different classified level without the need to switch hard drives. The disclosed software shield and persona switcher (Shielder) module provides independent application environments (personas) for separate security domains while allowing fast transition between personas. Shielder module supports multiple security classification via a minimal system storage partitioning. Shielder module allows efficient collection and reallocation of memory and persistent storage according to need and priority. Shielder module provides secure management of communication media by directing the system communication according to the security profile of the active persona.

Patent Agency Ranking