Hybrid communications based upon aerial networks

    公开(公告)号:US11563488B1

    公开(公告)日:2023-01-24

    申请号:US17587859

    申请日:2022-01-28

    Abstract: Disclosed herein are embodiments of an aerial network system including a first transceiver configured to transmit and receive free space optical (FSO) signals and a second transceiver configured to transmit and receive radio frequency (RF) signals. A processor provides modulated data signals to the first and second transceivers for transmission and receives demodulated signals from the first and second transceiver. The processor is configured for policy-based multipath admission of requests for access to an IP-routing enabled overlay network. The processor includes an inverse mission planning system configured for predictive traffic load balancing of transmitted FSO signals and RF signals. The inverse mission planning system includes radio behavior models and aerial platform models, and is configured for geographic simulation and optimization of mission planning data based upon user-inputted mission-specific data. Forward error correction (FEC) coding of transmitted communications via packet erasure coding provides resiliency with a low bit error rate.

    Software credential token process, software, and device

    公开(公告)号:US11539524B1

    公开(公告)日:2022-12-27

    申请号:US16946940

    申请日:2020-07-13

    Abstract: Embodiments for a computer readable medium including a software module are provided. The software module causes one or more processing devices to obtain a biometric identifier from a user. Access to a resource is requested by providing a software credential token and the biometric identifier. The software credential token corresponds to a hardware credential token, and the hardware credential token is one of a set of hardware credential tokens that are used to access the resource. An indication that access to the resource has been granted is received and after receiving the indication an indication that the access to the resource has been revoked is received. After receiving the indication that access to the resource has been revoked, a biometric identifier is re-obtained from a user and access to the resource is re-requested by providing a software credential token and the re-obtained biometric identifier.

    Alert systems and methods for attack-related events

    公开(公告)号:US11503064B1

    公开(公告)日:2022-11-15

    申请号:US16995458

    申请日:2020-08-17

    Abstract: Disclosed herein are embodiments of systems, methods, and products comprise an analytic server, which provides a SilverlineRT system that prioritizes and analyzes security alerts and events. The server builds an attack tree based on attack detection rules. The server monitors large-scale distributed systems and receives alerts from various devices. The server determines attacks using the attack tree while excluding false alarms. The server determines impact and risk metrics for attacks in real-time, and calculates an impact score for each attack. The server ranks and prioritizes the attacks based on the impact scores. The server also generates real-time reports. By consider the mission and system specific context in the analysis alert information, the server gives insight into the overall context of problems and potential solutions, improving decision-making. By showing the impacts of alters, the server allows security personnel to prioritize responses and focus on highest value defense activities.

    Obfuscation for high-performance computing systems

    公开(公告)号:US11461477B1

    公开(公告)日:2022-10-04

    申请号:US16838595

    申请日:2020-04-02

    Abstract: An example method includes initializing, by an obfuscation computing system, communications with nodes in a distributed computing platform, the nodes including one or more compute nodes and a controller node, and performing at least one of: (a) code-level obfuscation for the distributed computing platform to obfuscate interactions between an external user computing system and the nodes, wherein performing the code-level obfuscation comprises obfuscating data associated with one or more commands provided by the user computing system and sending one or more obfuscated commands to at least one of the nodes in the distributed computing platform; or (b) system-level obfuscation for the distributed computing platform, wherein performing the system-level obfuscation comprises at least one of obfuscating system management tasks that are performed to manage the nodes or obfuscating network traffic data that is exchanged between the nodes.

    Systems and methods for cyber-physical threat modeling

    公开(公告)号:US11444974B1

    公开(公告)日:2022-09-13

    申请号:US16661513

    申请日:2019-10-23

    Abstract: Systems, methods, and products comprise an analytic server, which improves security of a unified system of distributed network infrastructure comprising a plurality of cyber-physical systems. The analytic server may instantiate a sub attack tree for each cyber-physical system within the unified system. The analytic server may determine how the interconnection of the plurality of cyber-physical systems may affect the unified system security. The analytic server may monitor systems and receive electronic notifications of alerts in real-time from devices in the plurality of cyber-physical systems. The analytic server may follow the logic of the attack tree model by traversing the attack tree from bottom up and determine how the alerts from the cyber-physical systems may affect the distributed network infrastructure as a whole. The analytic server may generate reports comprising a list of the prioritized attacks and recommendation actions to mitigate the attacks.

    High-assurance multi-domain network switch

    公开(公告)号:US11431548B2

    公开(公告)日:2022-08-30

    申请号:US16813142

    申请日:2020-03-09

    Abstract: Embodiments for a method of implementing multiple domains in a network switching device are disclosed. The method includes assigning a plurality of hardware ports to a plurality of domains. Ports are assigned to at least two of the plurality of domains, and none of the ports are concurrently assigned to multiple domains. The method also includes loading rules for forwarding packets between the plurality of ports into a data plane. The rules direct the data plane to forward only between ports in a common domain of the plurality of domains. The method also includes assuring that a packet received at any port assigned to a first domain is not sent in legible form from any port assigned to a second domain if an error causes the data plane to forward or request forwarding the packet to any port assigned to a second domain.

    Product obsolescence forecast system and method

    公开(公告)号:US11354685B2

    公开(公告)日:2022-06-07

    申请号:US16874239

    申请日:2020-05-14

    Abstract: A product obsolescence forecast system includes machine instructions stored in a non-transitory computer readable storage medium, the machine instructions. A processor executes the instructions to receive an identity of a first product and identities of one or more second products similar to the first product, each of the second products having gone obsolete; receive a determinant of obsolescence of one or more of the obsolete second products; generate one or more observations related to the first product by inputting each received determinant to a trained network; and generate a statistical analysis of the one or more observations to provide an expected value of an actual obsolescence date for the first product.

    Permission request system and method

    公开(公告)号:US11354386B2

    公开(公告)日:2022-06-07

    申请号:US16839728

    申请日:2020-04-03

    Abstract: A method for detecting, identifying, and mitigating advanced persistent threats in a computer network having one or more computers includes a processor in the computer network: receiving a request to access a resource in the computer network; identifying the request as originating from an application executing on the computer network; executing an anomaly operation to determine a behavior of the application is one of anomalous and not anomalous; executing a privilege operation to determine the request is one of permanently allowed and not-permanently allowed; granting access to the resource for both a non-anomalous-behaving application and a permanently allowed request; and generating and displaying, on a graphical user interface of the computer network, and prompt for either an anomalous-behaving application or a not-permanently allowed request.

    Adaptive team training evaluation system and method

    公开(公告)号:US11302215B2

    公开(公告)日:2022-04-12

    申请号:US16806226

    申请日:2020-03-02

    Abstract: A computer-implemented adaptive group training method a computer accessing a virtual system and initiating a group training exercise for training a trainee group comprising one or more trainees, the group training exercise including one or more challenges to the virtual system, each of the one or more challenges including a pre-defined sequence of one or more injectable events; the computer controlling subsequent execution of the group training exercise comprising injecting the injectable events; and the computer evaluating performance of the trainee group during the subsequent execution of the group training exercise, including analyzing actions taken by the trainee group in response to each of the injections, and attributing one or more of the actions taken to a trainee.

    IP packet translation for low-overhead out-of-band data embedding

    公开(公告)号:US11218569B1

    公开(公告)日:2022-01-04

    申请号:US16842625

    申请日:2020-04-07

    Abstract: A method of embedding information in a packet with low overhead is provided. The method includes receiving an IP packet at a first networking device and translating it into an intermediary packet having a non-IP header and a data field. Translating includes copying at least the transport layer data field into the data field of the intermediary packet, compressing the IP header, and embedding out-of-band data into the non-IP header of the intermediary packet. The intermediary packet is sent to second networking device. At the second networking device the intermediary packet is translated into a re-created IP packet. The re-created IP packet is sent toward a destination of the original IP packet.

Patent Agency Ranking