-
公开(公告)号:US11652839B1
公开(公告)日:2023-05-16
申请号:US16401592
申请日:2019-05-02
Applicant: Architecture Technology Corporation
Inventor: Scott Aloisio , Robert A. Joyce , Kenneth McVearry , Mark E. Peters
CPC classification number: H04L63/1433 , G06F21/552 , G06F21/577 , H04L63/1408 , H04L63/1416 , H04L63/1441 , G06F2221/034
Abstract: An attack tree model for an aviation system comprises a plurality of tree nodes organized as a tree. For each tree node of the attack tree model model, the tree node corresponds to a respective event that may befall aviation system. An analysis computing system generates one or more attack tree models for the aviation system, wherein the aviation system includes one or more systems, sub-systems, or components. The analysis computing system further performs an assessment of one or more of the system, sub-systems, or components of the aviation system using the one or more attack tree models, and outputs metrics indicative of the assessment.
-
公开(公告)号:US11509694B1
公开(公告)日:2022-11-22
申请号:US17129439
申请日:2020-12-21
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Scott Aloisio , Robert Joyce
IPC: H04L29/06 , H04L9/40 , H04L41/0816 , H04L61/5007
Abstract: Disclosed herein are embodiments of systems and methods that dynamically reconfigure a multi-tiered system of network devices and software applications in response to an ongoing and/or anticipated cyber-attack. The dynamic reconfiguration of the network devices may consist of a wide range of processes, which may include generating new network addresses for individual network devices; reconfiguring the network devices by creating firewalls, changing protocols between the network devices in a multi-tier reconfiguration solution, changing the cloud infrastructure provider of the network devices, even when the underlying network infrastructure ecosystem differs across cloud service providers (CSPs); and maintaining a secure and updated data model of a record of reconfigured network devices and their dependencies to allow legitimate users of the network devices to understand reconfiguration actions that are hidden from malicious users such as hackers and cyber-attackers.
-
公开(公告)号:US11245743B1
公开(公告)日:2022-02-08
申请号:US17032454
申请日:2020-09-25
Applicant: Architecture Technology Corporation
Inventor: Tyler J. Mitchell , Judson Powers , Scott Aloisio , Matthew A. Stillerman , Valentino Felipe
IPC: G06F15/16 , H04L29/06 , G06T7/194 , H04L12/927 , G16H40/67
Abstract: In general, this disclosure describes media stream transmission techniques for a computing device. The computing device may capture an image of a local background environment. The computing device may record a first media stream that includes at least a portion of the image of the background environment and at least one movement of at least one object through the background environment. The computing device may remove the image of the background environment from the first media stream to create a second media stream that includes the movement of the object without the image of the background environment. The computing device may determine a bandwidth of a network over which the second media stream will be transmitted and perform further alterations to the second media stream if the current bandwidth is less than a bandwidth threshold level in order to reduce the bandwidth needed to transmit the second media stream.
-
公开(公告)号:US11122079B1
公开(公告)日:2021-09-14
申请号:US16377971
申请日:2019-04-08
Applicant: Architecture Technology Corporation
Inventor: Scott Aloisio , Robert A. Joyce , Paul Nicotera , Matthew A. Stillerman
Abstract: An example technique includes initializing, by an obfuscation computing system, communications with nodes in a distributed computing platform. The nodes include compute nodes that provide resources in the distributed computing platform and a controller node that performs resource management of the resources. The obfuscation computing system serves as an intermediary between the controller node and the compute nodes. The technique further includes outputting an interactive user interface (UI) providing a selection between a first privilege level and a second privilege level, and performing one of: based on the selection being for the first privilege level, a first obfuscation mechanism for the distributed computing platform to obfuscate digital traffic between a user computing system and the nodes, or based on the selection being for the second privilege level, a second obfuscation mechanism for the distributed computing platform to obfuscate digital traffic between the user computing system and the nodes.
-
-
-