-
1.
公开(公告)号:US12175103B1
公开(公告)日:2024-12-24
申请号:US16126728
申请日:2018-09-10
Applicant: Architecture Technology Corporation
Inventor: Judson Powers , Colleen Kimball , Matthew A. Stillerman
IPC: G06F3/06
Abstract: Systems and methods for analyzing memory architectures and for mapping data structures in software programs to appropriate memory to take advantage of the different memory architectures. A computer architecture having a processor connected to one or more first memories and one or more second memories is defined, wherein the first memories and the second memories are characterized by different performance profiles. An executable of a software program is instrumented to capture, during runtime, patterns of access to selected data structures of the executable. Based on an analysis of the patterns of access, allocation of the selected data structures between the first and second memories is determined.
-
公开(公告)号:US12158960B2
公开(公告)日:2024-12-03
申请号:US18317807
申请日:2023-05-15
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Judson Powers
Abstract: A computer-implemented method of securing vulnerabilities in a program, the method including receiving, by a computer, state information generated by an executed application program, training, by the computer, a constraints model based on the state information, generating, by the computer, one or more constraints with the constraints model, each of the one or more constraints describing an execution constraint for executing the application program, wherein the execution constraint enforces an intended operation of the application program, and applying, by the computer, the one or more constraints to the application program.
-
公开(公告)号:US12158862B1
公开(公告)日:2024-12-03
申请号:US17937769
申请日:2022-10-03
Applicant: Architecture Technology Corporation
Inventor: Maher N. Kaddoura
IPC: G06F16/182 , G06F16/23 , H04L9/00 , H04L9/06 , H04L9/32 , H04L45/64 , H04L67/104 , H04L67/1097
Abstract: Software configured to receive a first record is provided. The first record includes first record data, a first identification code in an identification code field, a first hash in a record hash field, and a second hash in a previous record pointer field. The first hash is calculated based on the first record data, the first identification code, and the second hash. The second hash is included in a record hash field of a second record. The second record includes the first identification code in its identification code field. A first block is generated having the first record in a first record field, a third hash in a block hash field, and a fourth hash in a previous block pointer field. The third hash is calculated based on the first record and the fourth hash. The fourth hash is included in a block hash field of a second block. The second block is part of a main ledger that includes a third block having the second record in its record field. The third block is positioned prior to the second block in the main ledger.
-
4.
公开(公告)号:US12050577B1
公开(公告)日:2024-07-30
申请号:US16267252
申请日:2019-02-04
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Dahyun Hollister
IPC: G06F7/00 , G06F3/0482 , G06F3/0486 , G06F16/22 , G06F16/28 , G06N20/00
CPC classification number: G06F16/2246 , G06F3/0482 , G06F3/0486 , G06F16/284 , G06N20/00
Abstract: Embodiments disclosed herein describe systems, methods, and products to generate dynamic event trees that may be generated with ease and rapidly reconfigured. A computer may provide, e.g., through a web service, a user interface for a user (e.g., a trainer) to retrieve and customize event nodes from an event node database. The computer may also provide an event tree template where the user may simply drag and drop event nodes and use the dynamic event sequencers to generate hierarchical interconnections between the event nodes to generate a dynamic event tree. The computer may further execute a machine learning model that may recommend one or more event nodes. The computer may continuously train the machine learning model based upon the dynamic event tree and based upon whether the user has accepted the recommended event node.
-
公开(公告)号:US20230267400A1
公开(公告)日:2023-08-24
申请号:US18066782
申请日:2022-12-15
Applicant: Architecture Technology Corporation
Inventor: Paul Nicotera , Joseph Sirianni , Ryan Lee Hagelstrom , Robert A. Joyce , Tyler J. Mitchell , Kenneth McVearry
IPC: G06Q10/08 , G06N5/04 , G06Q10/0631 , G06Q10/0639
CPC classification number: G06Q10/08 , G06N5/04 , G06Q10/06315 , G06Q10/06393
Abstract: A warehouse management system may receive a predictive analytics request associated with one or more warehouses and may, in response, input data associated with the one or more warehouses into a warehouse management model to determine one or more predictive analytics associated with the one or more warehouses, where the warehouse management model is trained via machine learning to determine the predictive analytics. The warehouse management system may perform simulations of operations of the one or more warehouses based on the one or more predictive analytics to determine one or more warehouse actions to meet one or more operational requirements. The warehouse management system may communicate the one or more warehouse actions to one or more devices associated with the one or more warehouses to enable the one or more devices to operate according to the one or more warehouse actions to meet the one or more operational requirements.
-
公开(公告)号:US11733975B1
公开(公告)日:2023-08-22
申请号:US17543006
申请日:2021-12-06
Applicant: Architecture Technology Corporation
Inventor: Paul C. Davis , Douglas Sweet , Erin Gambucci
Abstract: A software migration system includes a processor; a user interface that receives and displays components of a legacy software and a new software system; and a migration program as machine instructions stored on a non-transitory, computer-readable storage medium. The processor executes to identify reference models, standards, and requirements of a system common architecture that together define a process for migrating the legacy software to the new software system; load the legacy software onto a virtual machine instantiated on a dedicated hardware platform; refactor the legacy software; subdivide the refactored legacy software into legacy software subsets; move a first legacy software subset to a second virtual machine instantiated on the hardware platform; for a second legacy software subset, adapt the second legacy software subset to the system common architecture; and combine the adapted second legacy software subset and the first legacy software subset to produce the new software system.
-
公开(公告)号:US11729221B1
公开(公告)日:2023-08-15
申请号:US17992154
申请日:2022-11-22
Applicant: Architecture Technology Corporation
Inventor: Scott Aloisio , Robert Joyce
IPC: H04L29/06 , H04L9/40 , H04L41/0816 , H04L61/5007
CPC classification number: H04L63/20 , H04L41/0816 , H04L63/0209 , H04L63/0281 , H04L63/1441 , H04L61/5007
Abstract: Disclosed herein are embodiments of systems and methods that dynamically reconfigure a multi-tiered system of network devices and software applications in response to an ongoing and/or anticipated cyber-attack. The dynamic reconfiguration of the network devices may consist of a wide range of processes, which may include generating new network addresses for individual network devices; reconfiguring the network devices by creating firewalls, changing protocols between the network devices in a multi-tier reconfiguration solution, changing the cloud infrastructure provider of the network devices, even when the underlying network infrastructure ecosystem differs across cloud service providers (CSPs); and maintaining a secure and updated data model of a record of reconfigured network devices and their dependencies to allow legitimate users of the network devices to understand reconfiguration actions that are hidden from malicious users such as hackers and cyber-attackers.
-
公开(公告)号:US11727818B1
公开(公告)日:2023-08-15
申请号:US17542913
申请日:2021-12-06
Applicant: Architecture Technology Corporation
Inventor: William Colligan , Eric R Chartier , Paul Davis , Andrew Murphy , Douglas Sweet
CPC classification number: G08G5/0078 , B64D45/00 , G08G5/0008 , G08G5/0013 , G08G5/0026 , G08G5/0043 , G08G5/0082 , B64D2045/0075
Abstract: A method, executed by a processor, includes the processor receiving signals information from a device located on a departing airplane; verifying an identification of the airplane and identifying an expected departure sequence of aircraft surface states; monitoring and identifying additional signals information received from the mobile device, including comparing the additional signals information to known data; logging the additional signals information, and processing the additional signals information, and determining the logged data corresponds to events indicative of an aircraft surface state; sending an aircraft surface state reached message to Local and Center flight management; and executing a statistical routine and providing statistical data from the execution relating to an occurrence of upcoming aircraft surface state event and sending the statistical data with the aircraft surface state message.
-
9.
公开(公告)号:US20230221796A1
公开(公告)日:2023-07-13
申请号:US17965654
申请日:2022-10-13
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Scott Aloisio , Dahyun Hollister , Robert A. Joyce
CPC classification number: G06F3/012 , G06T19/006 , G06F11/3003 , G06F3/017 , G02B27/017 , G06N20/00
Abstract: Disclosed herein are embodiments for managing a task including one or more skills. A server stores a virtual environment, software agents configured to collect data generated when a user interacts with the virtual environment to perform the task, and a predictive machine learning model. The server generates virtual entities during the performance of the task, and executes the predictive machine learning model to configure the virtual entities based upon data generated when the user interacts with the virtual environment. The server generates the virtual environment and the virtual entities configured for interaction with the user during display by the client device, and receives the data collected by the software agents. The system displays a user interface at the client device to indicate a measurement of each of the skills during performance of the task. The server trains the predictive machine learning model using this measurement of skills during task performance.
-
公开(公告)号:US20230179420A1
公开(公告)日:2023-06-08
申请号:US18145841
申请日:2022-12-22
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Ranga S. Ramanujan , Deborah K. Charan , Barry A. Trent , Jordan C. Bonney
CPC classification number: H04L9/3213 , H04L9/3228 , H04L63/083 , H04L9/3263 , H04L9/3234
Abstract: Embodiments for a computer readable medium including a software module are provided. The software module causes one or more processing devices to obtain a biometric identifier from a user. Access to a resource is requested by providing a software credential token and the biometric identifier. The software credential token corresponds to a hardware credential token, and the hardware credential token is one of a set of hardware credential tokens that are used to access the resource. An indication that access to the resource has been granted is received and after receiving the indication an indication that the access to the resource has been revoked is received. After receiving the indication that access to the resource has been revoked, a biometric identifier is re-obtained from a user and access to the resource is re-requested by providing a software credential token and the re-obtained biometric identifier.
-
-
-
-
-
-
-
-
-