-
公开(公告)号:US11997129B1
公开(公告)日:2024-05-28
申请号:US17967533
申请日:2022-10-17
Applicant: Architecture Technology Corporation
Inventor: Scott Aloisio , Robert Joyce , Judson Powers
CPC classification number: H04L63/1433 , G06N5/025 , H04L41/0636 , H04L41/22 , H04L43/06 , H04L63/1416 , H04L63/302
Abstract: Disclosed herein are embodiments of systems, methods, and products comprise an analytic server, which provides a SilverlineRT system that prioritizes and analyzes security alerts and events. The server builds an attack tree based on attack detection rules. The server monitors large-scale distributed systems and receives alerts from various devices. The server determines attacks using the attack tree while excluding false alarms. The server determines impact and risk metrics for attacks in real-time, and calculates an impact score for each attack. The server ranks and prioritizes the attacks based on the impact scores. The server also generates real-time reports. By consider the mission and system specific context in the analysis alert information, the server gives insight into the overall context of problems and potential solutions, improving decision-making. By showing the impacts of alters, the server allows security personnel to prioritize responses and focus on highest value defense activities.
-
公开(公告)号:US11893386B1
公开(公告)日:2024-02-06
申请号:US18098565
申请日:2023-01-18
Applicant: Architecture Technology Corporation
Inventor: Jason Hogan , Judson Powers
Abstract: Various computing technologies for various reverse engineering platforms capable of outputting, including creating or generating, a human readable and high level source code, such as C, Fortran, LISP, or BASIC, from various binary files, such as application binaries, executable binaries, or data binaries, in an original language as developed pre-compilation. For example, some of such reverse engineering platforms can be programmed to disassemble binary files from different process architectures, identify various code optimizations as compiler introduced, reverse or unwind various compiler optimizations (de-optimize), and generate a human readable and high-level source code from de-optimized data.
-
公开(公告)号:US11606426B1
公开(公告)日:2023-03-14
申请号:US16661645
申请日:2019-10-23
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Joseph Cascioli , Judson Powers
IPC: H04L67/1087 , H04L67/104 , H04L67/1061 , G06F16/93 , H04L9/08 , H04L9/06 , H04L9/00
Abstract: A plurality of distributed network nodes may provide a decentralized access gateway to multiple, diverse types of databases. The plurality of distributed network nodes may host a private party blockchain. Each node may execute a peer-to-peer (P2P) client to perform operations associated with the private party blockchain. A subset of the nodes may be configured as validator nodes that may implement gossip protocols to cooperatively validate one or more database operations and generate a new block for the private party blockchain. Another subset of nodes may be configured as host nodes that may receive the new block and update a corresponding local copy of the private party blockchain appending the new block. Utilizing the co-operative validation of database operations and the updates appending the new blocks, the private party blockchain may maintain an immutable digital record of access and updates to the multiple and diverse types of databases.
-
公开(公告)号:US11522904B2
公开(公告)日:2022-12-06
申请号:US16712576
申请日:2019-12-12
Applicant: Architecture Technology Corporation
Inventor: Daniel McArdle , Judson Powers , Robert A. Joyce
Abstract: For each respective virtual machine (VM) of a plurality of VMs, a distributed computing system generates a unique Application Binary Interface (ABI) for an operating system for the respective VM, compiles a software application to use the unique ABI, and installs the operating system and the compiled software application on the respective VM. A dispatcher node dispatches, to one or more VMs of the plurality of VMs that provide a service and are in the active mode, request messages for the service. Furthermore, a first host device may determine, in response to software in the first VM invoking a system call in a manner inconsistent with the unique ABI for the operating system of the first VM, that a failover event has occurred. Responsive to the failover event, the distributed computing system fails over from the first VM to a second VM.
-
公开(公告)号:US11503075B1
公开(公告)日:2022-11-15
申请号:US16741953
申请日:2020-01-14
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Joseph Sirianni , Judson Powers
IPC: H04L9/40
Abstract: Disclosed herein are embodiments of systems, methods, and products comprise an analytic server, which improves security of a system. The analytic server may monitor the system by retrieving status information from various devices within the system. The analytic server may generate an attack tree model based on a set of aggregation rules that are configured based on the monitored status information. The analytic server may detect one or more attacks by associating the status information with corresponding nodes of the attack tree model and executing a logic of the attack tree model. The analytic server may determine aggregated impact and risk metrics and calculate an impact score for each attack based on aggregated impact and risk metrics. The analytic server may generate reports comprising the one or more attacks ranked based on the impact scores. The analytic server may respond to one or more attacks by taking automated actions.
-
公开(公告)号:US11494295B1
公开(公告)日:2022-11-08
申请号:US17182895
申请日:2021-02-23
Applicant: Architecture Technology Corporation
Inventor: Joseph Sirianni , Paul Nicotera , Eric R. Chartier , Judson Powers
Abstract: In general, this disclosure describes methods and devices for analyzing source code to detect potential bugs in the code. Specifically, a device retrieves source code of an application. For each distinct execution of a plurality of executions of the application, the device initiates the respective execution at a particular starting point of the source code and inputs, into the source code, a unique set of inputs relative to any other execution. The device stores, into a path log, an indication of each line of source code and stores, into an output log, an indication of each output object encountered during the respective execution. Each output object includes a local variable dependent on the inputs. The device analyzes, using a machine learning model, the path and output logs to identify an abnormality indicative of a potential bug in the source code. The device outputs a graphical representation of the abnormality.
-
公开(公告)号:US11451577B2
公开(公告)日:2022-09-20
申请号:US16996148
申请日:2020-08-18
Applicant: Architecture Technology Corporation
Inventor: Judson Powers , Matthew Donovan
Abstract: A method for improving efficiency of a training program begins with a processor monitoring and adapting execution of a training exercise of the training program. The processor determines a training program effectiveness measure including determining trainee skill improvement demonstrated during the training exercise, and monitoring and determining correctness and timeliness of trainee actions during the training exercise. The processor then determines a training program cost measure by determining a first monetary cost for the execution of the at least one training exercise, determining a second monetary cost associated with trainee manhours for the training exercise, and generating the training program cost measure based on the first and second monetary costs. The processor then computes a ratio of the training program effectiveness measure to the training program cost measure.
-
公开(公告)号:US11245743B1
公开(公告)日:2022-02-08
申请号:US17032454
申请日:2020-09-25
Applicant: Architecture Technology Corporation
Inventor: Tyler J. Mitchell , Judson Powers , Scott Aloisio , Matthew A. Stillerman , Valentino Felipe
IPC: G06F15/16 , H04L29/06 , G06T7/194 , H04L12/927 , G16H40/67
Abstract: In general, this disclosure describes media stream transmission techniques for a computing device. The computing device may capture an image of a local background environment. The computing device may record a first media stream that includes at least a portion of the image of the background environment and at least one movement of at least one object through the background environment. The computing device may remove the image of the background environment from the first media stream to create a second media stream that includes the movement of the object without the image of the background environment. The computing device may determine a bandwidth of a network over which the second media stream will be transmitted and perform further alterations to the second media stream if the current bandwidth is less than a bandwidth threshold level in order to reduce the bandwidth needed to transmit the second media stream.
-
公开(公告)号:US10817604B1
公开(公告)日:2020-10-27
申请号:US16012695
申请日:2018-06-19
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Colleen Kimball , Robert Joyce , Judson Powers , Matthew Donovan
Abstract: Disclosed herein are embodiments of systems, methods, and products that execute tools to identify non-malicious faults in source codes introduced by engineers and programmers. The tools may execute a machine learning model on the source codes to perform sentiment analysis and pattern analysis on information associated with the source codes to generate annotated source code files identifying anomalies based on the sentiment analysis and the pattern analysis. One or more threat levels are then identified and ranked based on the one or more anomalies and a ranked list of the one or more threat levels is displayed on a graphical user interface of a computer.
-
公开(公告)号:US10656940B1
公开(公告)日:2020-05-19
申请号:US16267217
申请日:2019-02-04
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Jason Hogan , Judson Powers
Abstract: Described herein are various computing technologies for various reverse engineering platforms capable of outputting (e.g., creating, generating) a human readable and high level source code (e.g., C formatted text, Fortran formatted text, LISP formatted text, BASIC formatted text) from various binary files (e.g., application binary file, executable binary file, data binary file) in its original language, as developed before compilation. For example, some of such reverse engineering platforms can be programmed to disassemble binary files from different process architectures, identify various code optimizations as compiler introduced, reverse or unwind various compiler optimizations (de-optimize), and generate a human readable and high-level source code from de-optimized data. These techniques can be technically beneficial for design recovery purposes (e.g., security auditing, digital rights management, driver engineering).
-
-
-
-
-
-
-
-
-