-
公开(公告)号:US10657548B2
公开(公告)日:2020-05-19
申请号:US15453006
申请日:2017-03-08
Applicant: Architecture Technology Corporation
Inventor: Drew Sullivan , Evan Eaves , William Colligan
Abstract: A product obsolescence forecast system comprises machine instructions stored in a non-transitory computer readable storage medium. A processor executes the machine instructions to access data items related to a first product and one or more second products designated as similar to the first product, the first product and each of the one or more second products belonging to a same class of products; extract data elements from the data items; reformat the data elements as analyzable data elements and store the analyzable data elements in an analyzable data structure; apply a probabilistic model to selected ones of the analyzable data elements to provide a forecast obsolescence date for the first product; and using the forecast obsolescence date, determine one or more impacts based on the forecast obsolescence date.
-
公开(公告)号:US20200151389A1
公开(公告)日:2020-05-14
申请号:US16740603
申请日:2020-01-13
Applicant: Architecture Technology Corporation
Inventor: Andrew Murphy , Evan Eaves , Eric R. Chartier , William Colligan , Paul C. Davis
IPC: G06F40/295 , G06F16/35 , G06F16/93 , G06F40/226 , G06F40/30
Abstract: A computer-implemented method for training a neural network system to classify data items as true mentions of relevant data objects includes, based on a domain of interest, a processor controlling an input component and a data store to receive and store a document related to the domain of interest, control a natural language processor to extract data items related to the domain of interest from the document, create a first training data set of selected ones of the data items, using the first training data set, train the neural network to identify true mentions of data objects relevant to the domain of interest, apply tweaks to one or more of the data items to create a list of tweaked data items, creating a second training data set including the tweaked data items, and using the first and second training data sets, further train the neural network to identify true mentions of relevant data objects.
-
公开(公告)号:US20200150951A1
公开(公告)日:2020-05-14
申请号:US16740619
申请日:2020-01-13
Applicant: Architecture Technology Corporation
Inventor: Colleen Kimball , Katey Huddleston , Paul Nicotera
Abstract: A computer-implemented method includes creating, by a computing device, an abstract syntax tree based on a source code file of a software application, the source code file including source code defining operations of the software application. The method also includes traversing, by the computing device, the abstract syntax tree. The method further includes identifying, by the computing device and based on the traversing of the abstract syntax tree, one or more code violations present in the source code. The method also includes generating, by the computing device, at least one refactoring option for the one or more code violations, each refactoring option of the at least one refactoring option representing a change to the source code file that is configured to remediate the associated code violation.
-
公开(公告)号:US10652220B1
公开(公告)日:2020-05-12
申请号:US15975610
申请日:2018-05-09
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Ranga S. Ramanujan
IPC: H04L29/06 , H04L12/851
Abstract: Disclosed herein are embodiments of systems, methods, and products comprise a computing device, which provides a secure data transport service (SecureX) for data packets traversing from an end user device (EUD) to a mission network over untrusted networks. The disclosed SecureX module may be software product running on the EUD and on a SecureX appliance fronting the mission network. The SecureX module on the EUD compresses the data packets by removing header fields that are constant over the same packet flow and double encrypts the data packets with different cryptographic keys. The SecureX on the EUD transmits the double compressed encrypted data packets over the untrusted network. The SecureX appliance receives the double compressed encrypted data packets, decrypts the data packets and decompresses the data packets to recreate the original data packets. The SecureX appliance transmits the original data packets to the mission network.
-
公开(公告)号:US10587450B1
公开(公告)日:2020-03-10
申请号:US15583661
申请日:2017-05-01
Applicant: Architecture Technology Corporation
Inventor: Timothy E. Hartley , Ranga S. Ramanujan , Clint M. Sanders
IPC: H04L29/06 , H04L12/46 , H04L12/715 , H04L12/915 , G06F9/455
Abstract: Embodiments for a method of implementing multiple domains in a network switching device are disclosed. The method includes assigning a plurality of hardware ports to a plurality of domains. Ports are assigned to at least two of the plurality of domains, and none of the ports are concurrently assigned to multiple domains. The method also includes loading rules for forwarding packets between the plurality of ports into a data plane. The rules direct the data plane to forward only between ports in a common domain of the plurality of domains. The method also includes assuring that a packet received at any port assigned to a first domain is not sent in legible form from any port assigned to a second domain if an error causes the data plane to forward or request forwarding the packet to any port assigned to a second domain.
-
公开(公告)号:US10581564B1
公开(公告)日:2020-03-03
申请号:US15926978
申请日:2018-03-20
Applicant: Architecture Technology Corporation
Inventor: John Wu , Ranga S. Ramanujan
IPC: H04L1/18 , H04L29/08 , H04L12/823 , B64C39/02 , G08G5/00
Abstract: Embodiments for a communication enhancement module for a first communicating device are disclosed. The communication enhancement module includes instructions thereon. The instructions cause the communication enhancement module to receive an activation message from a data terminal of the first communicating device. The activation message is sent from a communication enhancement module of a second communicating device. In response to receiving the activation message, a set of pre-placed messages is identified to which the activation message is assigned. A set of messages is generated corresponding to the set of pre-placed messages. Each message in the set of messages conforms to a communication protocol used by the second communicating device for messages sent to the first communicating device. The set of messages indicate that the set of messages originated at the second communicating device. The set of messages is sent to a main processing module of the first communicating device.
-
公开(公告)号:US10574688B1
公开(公告)日:2020-02-25
申请号:US15611106
申请日:2017-06-01
Applicant: Architecture Technology Corporation
Inventor: Ryan L. Hagelstrom , Ranga S. Ramanujan , Nathan E. Bahr
Abstract: A method of cyber-attack protection is provided. The method includes receiving one or more internet group management protocol (IGMP) membership report messages on one or more ports of a network switch. A table is maintained associating each of the one or more ports to the one or more group addresses of which any hosts coupled to that port are members. An IGMP group leave message is received at a first port of the network switch. A group address in the group leave message is compared to all group addresses associated in the table with the first port. If the group address in the group leave message does not match any group address associated with the first port, the group leave message is dropped without being acted on in accordance with IGMP.
-
公开(公告)号:US10412116B1
公开(公告)日:2019-09-10
申请号:US15604973
申请日:2017-05-25
Applicant: Architecture Technology Corporation
Inventor: Judson Powers , Robert A. Joyce , Daniel McArdle
Abstract: An example method includes providing, by a computing system, first randomized configuration information, generating, by the computing system and based on the first randomized configuration information, a first unique instance of a software component, providing second randomized configuration information, wherein the second randomized configuration information is different from the first randomized configuration information, and generating, based on the second randomized configuration information, a second unique instance of the software component that is executable on the runtime computing system. The first and second unique instances of the software component comprise different instances of the same software component that each are configured to have uniquely different operating characteristics during execution on the runtime computing system, and the first and second unique instances of the software component are each further configured, during execution on the runtime computing system, to output false information to an external computing system.
-
公开(公告)号:US10412114B1
公开(公告)日:2019-09-10
申请号:US15604868
申请日:2017-05-25
Applicant: Architecture Technology Corporation
Inventor: Judson Powers , Robert A. Joyce , Daniel McArdle
Abstract: An example method includes providing, by a computing system, first randomized configuration information, generating, by the computing system and based on the first randomized configuration information, a first unique instance of a software component, providing second randomized configuration information, wherein the second randomized configuration information is different from the first randomized configuration information, and generating, based on the second randomized configuration information, a second unique instance of the software component that is executable on the runtime computing system. The first and second unique instances of the software component comprise different instances of the same software component that each are configured to have uniquely different operating characteristics during execution on the runtime computing system, and the first and second unique instances of the software component are each further configured, during execution on the runtime computing system, to output false information to an external computing system.
-
公开(公告)号:US10402179B1
公开(公告)日:2019-09-03
申请号:US16015529
申请日:2018-06-22
Applicant: Architecture Technology Corporation
Inventor: Judson Powers , Robert A. Joyce
IPC: G06F3/00 , G06F8/52 , G06F21/57 , G06F8/71 , G06F8/41 , G06F9/54 , G06F8/30 , G06F9/445 , G06F21/14
Abstract: An example method includes generating, by a computing system, first unique configuration information, generating, by the computing system and based on the first unique configuration information, a first unique instance of a software component, generating second unique configuration information, wherein the second unique configuration information is different from the first unique configuration information, and generating, based on the second unique configuration information, a second unique instance of the software component that is executable on the runtime computing system. The first and second unique instances of the software component comprise different instances of the same software component that each are configured to have uniquely different operating characteristics during execution on the runtime computing system.
-
-
-
-
-
-
-
-
-