-
公开(公告)号:US11563488B1
公开(公告)日:2023-01-24
申请号:US17587859
申请日:2022-01-28
Applicant: Architecture Technology Corporation
Inventor: Ian McLinden , Jordan Bonney
IPC: H04B10/114 , H04L1/00 , H04B10/66 , H04B10/516
Abstract: Disclosed herein are embodiments of an aerial network system including a first transceiver configured to transmit and receive free space optical (FSO) signals and a second transceiver configured to transmit and receive radio frequency (RF) signals. A processor provides modulated data signals to the first and second transceivers for transmission and receives demodulated signals from the first and second transceiver. The processor is configured for policy-based multipath admission of requests for access to an IP-routing enabled overlay network. The processor includes an inverse mission planning system configured for predictive traffic load balancing of transmitted FSO signals and RF signals. The inverse mission planning system includes radio behavior models and aerial platform models, and is configured for geographic simulation and optimization of mission planning data based upon user-inputted mission-specific data. Forward error correction (FEC) coding of transmitted communications via packet erasure coding provides resiliency with a low bit error rate.
-
公开(公告)号:US11539524B1
公开(公告)日:2022-12-27
申请号:US16946940
申请日:2020-07-13
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Ranga S. Ramanujan , Deborah K. Charan , Barry A. Trent , Jordan C. Bonney
Abstract: Embodiments for a computer readable medium including a software module are provided. The software module causes one or more processing devices to obtain a biometric identifier from a user. Access to a resource is requested by providing a software credential token and the biometric identifier. The software credential token corresponds to a hardware credential token, and the hardware credential token is one of a set of hardware credential tokens that are used to access the resource. An indication that access to the resource has been granted is received and after receiving the indication an indication that the access to the resource has been revoked is received. After receiving the indication that access to the resource has been revoked, a biometric identifier is re-obtained from a user and access to the resource is re-requested by providing a software credential token and the re-obtained biometric identifier.
-
公开(公告)号:US11503064B1
公开(公告)日:2022-11-15
申请号:US16995458
申请日:2020-08-17
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Scott Aloisio , Robert Joyce , Judson Powers
Abstract: Disclosed herein are embodiments of systems, methods, and products comprise an analytic server, which provides a SilverlineRT system that prioritizes and analyzes security alerts and events. The server builds an attack tree based on attack detection rules. The server monitors large-scale distributed systems and receives alerts from various devices. The server determines attacks using the attack tree while excluding false alarms. The server determines impact and risk metrics for attacks in real-time, and calculates an impact score for each attack. The server ranks and prioritizes the attacks based on the impact scores. The server also generates real-time reports. By consider the mission and system specific context in the analysis alert information, the server gives insight into the overall context of problems and potential solutions, improving decision-making. By showing the impacts of alters, the server allows security personnel to prioritize responses and focus on highest value defense activities.
-
公开(公告)号:US11461477B1
公开(公告)日:2022-10-04
申请号:US16838595
申请日:2020-04-02
Applicant: Architecture Technology Corporation
Inventor: Judson Powers , Robert A. Joyce , Scott Aloisio , Matthew A. Stillerman
Abstract: An example method includes initializing, by an obfuscation computing system, communications with nodes in a distributed computing platform, the nodes including one or more compute nodes and a controller node, and performing at least one of: (a) code-level obfuscation for the distributed computing platform to obfuscate interactions between an external user computing system and the nodes, wherein performing the code-level obfuscation comprises obfuscating data associated with one or more commands provided by the user computing system and sending one or more obfuscated commands to at least one of the nodes in the distributed computing platform; or (b) system-level obfuscation for the distributed computing platform, wherein performing the system-level obfuscation comprises at least one of obfuscating system management tasks that are performed to manage the nodes or obfuscating network traffic data that is exchanged between the nodes.
-
公开(公告)号:US11444974B1
公开(公告)日:2022-09-13
申请号:US16661513
申请日:2019-10-23
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Martiros Shakhzadyan , Judson Powers , Matthew A. Stillerman
IPC: H04L9/40
Abstract: Systems, methods, and products comprise an analytic server, which improves security of a unified system of distributed network infrastructure comprising a plurality of cyber-physical systems. The analytic server may instantiate a sub attack tree for each cyber-physical system within the unified system. The analytic server may determine how the interconnection of the plurality of cyber-physical systems may affect the unified system security. The analytic server may monitor systems and receive electronic notifications of alerts in real-time from devices in the plurality of cyber-physical systems. The analytic server may follow the logic of the attack tree model by traversing the attack tree from bottom up and determine how the alerts from the cyber-physical systems may affect the distributed network infrastructure as a whole. The analytic server may generate reports comprising a list of the prioritized attacks and recommendation actions to mitigate the attacks.
-
公开(公告)号:US11431548B2
公开(公告)日:2022-08-30
申请号:US16813142
申请日:2020-03-09
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Timothy E. Hartley , Ranga S. Ramanujan , Clint M. Sanders
Abstract: Embodiments for a method of implementing multiple domains in a network switching device are disclosed. The method includes assigning a plurality of hardware ports to a plurality of domains. Ports are assigned to at least two of the plurality of domains, and none of the ports are concurrently assigned to multiple domains. The method also includes loading rules for forwarding packets between the plurality of ports into a data plane. The rules direct the data plane to forward only between ports in a common domain of the plurality of domains. The method also includes assuring that a packet received at any port assigned to a first domain is not sent in legible form from any port assigned to a second domain if an error causes the data plane to forward or request forwarding the packet to any port assigned to a second domain.
-
公开(公告)号:US11354685B2
公开(公告)日:2022-06-07
申请号:US16874239
申请日:2020-05-14
Applicant: Architecture Technology Corporation
Inventor: Drew Sullivan , Evan Eaves , William Colligan
Abstract: A product obsolescence forecast system includes machine instructions stored in a non-transitory computer readable storage medium, the machine instructions. A processor executes the instructions to receive an identity of a first product and identities of one or more second products similar to the first product, each of the second products having gone obsolete; receive a determinant of obsolescence of one or more of the obsolete second products; generate one or more observations related to the first product by inputting each received determinant to a trained network; and generate a statistical analysis of the one or more observations to provide an expected value of an actual obsolescence date for the first product.
-
公开(公告)号:US11354386B2
公开(公告)日:2022-06-07
申请号:US16839728
申请日:2020-04-03
Applicant: Architecture Technology Corporation
Inventor: Joseph Sirianni , Matthew Donovan
Abstract: A method for detecting, identifying, and mitigating advanced persistent threats in a computer network having one or more computers includes a processor in the computer network: receiving a request to access a resource in the computer network; identifying the request as originating from an application executing on the computer network; executing an anomaly operation to determine a behavior of the application is one of anomalous and not anomalous; executing a privilege operation to determine the request is one of permanently allowed and not-permanently allowed; granting access to the resource for both a non-anomalous-behaving application and a permanently allowed request; and generating and displaying, on a graphical user interface of the computer network, and prompt for either an anomalous-behaving application or a not-permanently allowed request.
-
公开(公告)号:US11302215B2
公开(公告)日:2022-04-12
申请号:US16806226
申请日:2020-03-02
Applicant: Architecture Technology Corporation
Inventor: Matthew Donovan , Colleen Kimball
Abstract: A computer-implemented adaptive group training method a computer accessing a virtual system and initiating a group training exercise for training a trainee group comprising one or more trainees, the group training exercise including one or more challenges to the virtual system, each of the one or more challenges including a pre-defined sequence of one or more injectable events; the computer controlling subsequent execution of the group training exercise comprising injecting the injectable events; and the computer evaluating performance of the trainee group during the subsequent execution of the group training exercise, including analyzing actions taken by the trainee group in response to each of the injections, and attributing one or more of the actions taken to a trainee.
-
公开(公告)号:US11218569B1
公开(公告)日:2022-01-04
申请号:US16842625
申请日:2020-04-07
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: John Wu , Nathan E. Bahr , Ranga S. Ramanujan
Abstract: A method of embedding information in a packet with low overhead is provided. The method includes receiving an IP packet at a first networking device and translating it into an intermediary packet having a non-IP header and a data field. Translating includes copying at least the transport layer data field into the data field of the intermediary packet, compressing the IP header, and embedding out-of-band data into the non-IP header of the intermediary packet. The intermediary packet is sent to second networking device. At the second networking device the intermediary packet is translated into a re-created IP packet. The re-created IP packet is sent toward a destination of the original IP packet.
-
-
-
-
-
-
-
-
-