Systems and methods for mapping data structures to memory in multi-level memory hierarchies

    公开(公告)号:US12175103B1

    公开(公告)日:2024-12-24

    申请号:US16126728

    申请日:2018-09-10

    Abstract: Systems and methods for analyzing memory architectures and for mapping data structures in software programs to appropriate memory to take advantage of the different memory architectures. A computer architecture having a processor connected to one or more first memories and one or more second memories is defined, wherein the first memories and the second memories are characterized by different performance profiles. An executable of a software program is instrumented to capture, during runtime, patterns of access to selected data structures of the executable. Based on an analysis of the patterns of access, allocation of the selected data structures between the first and second memories is determined.

    Applying constraints models for application layer security

    公开(公告)号:US12158960B2

    公开(公告)日:2024-12-03

    申请号:US18317807

    申请日:2023-05-15

    Inventor: Judson Powers

    Abstract: A computer-implemented method of securing vulnerabilities in a program, the method including receiving, by a computer, state information generated by an executed application program, training, by the computer, a constraints model based on the state information, generating, by the computer, one or more constraints with the constraints model, each of the one or more constraints describing an execution constraint for executing the application program, wherein the execution constraint enforces an intended operation of the application program, and applying, by the computer, the one or more constraints to the application program.

    Nested ledger
    3.
    发明授权

    公开(公告)号:US12158862B1

    公开(公告)日:2024-12-03

    申请号:US17937769

    申请日:2022-10-03

    Abstract: Software configured to receive a first record is provided. The first record includes first record data, a first identification code in an identification code field, a first hash in a record hash field, and a second hash in a previous record pointer field. The first hash is calculated based on the first record data, the first identification code, and the second hash. The second hash is included in a record hash field of a second record. The second record includes the first identification code in its identification code field. A first block is generated having the first record in a first record field, a third hash in a block hash field, and a fourth hash in a previous block pointer field. The third hash is calculated based on the first record and the fourth hash. The fourth hash is included in a block hash field of a second block. The second block is part of a main ledger that includes a third block having the second record in its record field. The third block is positioned prior to the second block in the main ledger.

    ARTIFICIALLY INTELLIGENT WAREHOUSE MANAGEMENT SYSTEM

    公开(公告)号:US20230267400A1

    公开(公告)日:2023-08-24

    申请号:US18066782

    申请日:2022-12-15

    CPC classification number: G06Q10/08 G06N5/04 G06Q10/06315 G06Q10/06393

    Abstract: A warehouse management system may receive a predictive analytics request associated with one or more warehouses and may, in response, input data associated with the one or more warehouses into a warehouse management model to determine one or more predictive analytics associated with the one or more warehouses, where the warehouse management model is trained via machine learning to determine the predictive analytics. The warehouse management system may perform simulations of operations of the one or more warehouses based on the one or more predictive analytics to determine one or more warehouse actions to meet one or more operational requirements. The warehouse management system may communicate the one or more warehouse actions to one or more devices associated with the one or more warehouses to enable the one or more devices to operate according to the one or more warehouse actions to meet the one or more operational requirements.

    System and method for migrating legacy software to a system common architecture

    公开(公告)号:US11733975B1

    公开(公告)日:2023-08-22

    申请号:US17543006

    申请日:2021-12-06

    CPC classification number: G06F8/30 G06F8/72 G06F8/76

    Abstract: A software migration system includes a processor; a user interface that receives and displays components of a legacy software and a new software system; and a migration program as machine instructions stored on a non-transitory, computer-readable storage medium. The processor executes to identify reference models, standards, and requirements of a system common architecture that together define a process for migrating the legacy software to the new software system; load the legacy software onto a virtual machine instantiated on a dedicated hardware platform; refactor the legacy software; subdivide the refactored legacy software into legacy software subsets; move a first legacy software subset to a second virtual machine instantiated on the hardware platform; for a second legacy software subset, adapt the second legacy software subset to the system common architecture; and combine the adapted second legacy software subset and the first legacy software subset to produce the new software system.

    Reconfigurations for network devices

    公开(公告)号:US11729221B1

    公开(公告)日:2023-08-15

    申请号:US17992154

    申请日:2022-11-22

    Abstract: Disclosed herein are embodiments of systems and methods that dynamically reconfigure a multi-tiered system of network devices and software applications in response to an ongoing and/or anticipated cyber-attack. The dynamic reconfiguration of the network devices may consist of a wide range of processes, which may include generating new network addresses for individual network devices; reconfiguring the network devices by creating firewalls, changing protocols between the network devices in a multi-tier reconfiguration solution, changing the cloud infrastructure provider of the network devices, even when the underlying network infrastructure ecosystem differs across cloud service providers (CSPs); and maintaining a secure and updated data model of a record of reconfigured network devices and their dependencies to allow legitimate users of the network devices to understand reconfiguration actions that are hidden from malicious users such as hackers and cyber-attackers.

    Aircraft surface state event track system and method

    公开(公告)号:US11727818B1

    公开(公告)日:2023-08-15

    申请号:US17542913

    申请日:2021-12-06

    Abstract: A method, executed by a processor, includes the processor receiving signals information from a device located on a departing airplane; verifying an identification of the airplane and identifying an expected departure sequence of aircraft surface states; monitoring and identifying additional signals information received from the mobile device, including comparing the additional signals information to known data; logging the additional signals information, and processing the additional signals information, and determining the logged data corresponds to events indicative of an aircraft surface state; sending an aircraft surface state reached message to Local and Center flight management; and executing a statistical routine and providing statistical data from the execution relating to an occurrence of upcoming aircraft surface state event and sending the statistical data with the aircraft surface state message.

    SOFTWARE CREDENTIAL TOKEN PROCESS, SOFTWARE, AND DEVICE

    公开(公告)号:US20230179420A1

    公开(公告)日:2023-06-08

    申请号:US18145841

    申请日:2022-12-22

    Abstract: Embodiments for a computer readable medium including a software module are provided. The software module causes one or more processing devices to obtain a biometric identifier from a user. Access to a resource is requested by providing a software credential token and the biometric identifier. The software credential token corresponds to a hardware credential token, and the hardware credential token is one of a set of hardware credential tokens that are used to access the resource. An indication that access to the resource has been granted is received and after receiving the indication an indication that the access to the resource has been revoked is received. After receiving the indication that access to the resource has been revoked, a biometric identifier is re-obtained from a user and access to the resource is re-requested by providing a software credential token and the re-obtained biometric identifier.

Patent Agency Ranking