-
公开(公告)号:US20230199066A1
公开(公告)日:2023-06-22
申请号:US18113392
申请日:2023-02-23
Applicant: Architecture Technology Corporation
Inventor: Joseph CASCIOLI , Judson POWERS
IPC: H04L67/1087 , H04L67/104 , H04L67/1061 , G06F16/93 , H04L9/08 , H04L9/06
CPC classification number: H04L67/1093 , H04L67/1059 , H04L67/1068 , G06F16/93 , H04L9/088 , H04L9/0643 , H04L9/50
Abstract: A plurality of distributed network nodes may provide a decentralized access gateway to multiple, diverse types of databases. The plurality of distributed network nodes may host a private party blockchain. Each node may execute a peer-to-peer (P2P) client to perform operations associated with the private party blockchain. A subset of the nodes may be configured as validator nodes that may implement gossip protocols to cooperatively validate one or more database operations and generate a new block for the private party blockchain. Another subset of nodes may be configured as host nodes that may receive the new block and update a corresponding local copy of the private party blockchain appending the new block. Utilizing the co-operative validation of database operations and the updates appending the new blocks, the private party blockchain may maintain an immutable digital record of access and updates to the multiple and diverse types of databases.
-
公开(公告)号:US20230281322A1
公开(公告)日:2023-09-07
申请号:US18317807
申请日:2023-05-15
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Judson POWERS
CPC classification number: G06F21/577 , G06N20/00 , G06F2221/033
Abstract: A computer-implemented method of securing vulnerabilities in a program, the method including receiving, by a computer, state information generated by an executed application program, training, by the computer, a constraints model based on the state information, generating, by the computer, one or more constraints with the constraints model, each of the one or more constraints describing an execution constraint for executing the application program, wherein the execution constraint enforces an intended operation of the application program, and applying, by the computer, the one or more constraints to the application program.
-
公开(公告)号:US20200374298A1
公开(公告)日:2020-11-26
申请号:US16417531
申请日:2019-05-20
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Joseph SIRIANNI , Judson POWERS , Robert JOYCE
Abstract: Disclosed herein are embodiments of systems, methods, and products comprise an analytic server, which detects and defends against malware in-flight regardless of the specific nature and methodology of the underlying attack. The analytic server learns the system's normal behavior during testing and evaluation phase and trains a machine-learning model based on the normal behavior. The analytic server monitors the system behavior during runtime comprising the runtime behavior of each sub-system of the system. The analytic server executes the machine-learning model and compares the system runtime behavior with the normal behavior to identify anomalous behavior. The analytic server executes one or more mitigation instructions to mitigate malware. Based on multiple available options for mitigating malware, the analytic server makes an intelligent decision and takes the least impactful action that have the least impact on the system to maintain mission assurance.
-
-