Systems and methods for encrypting and transmitting data packets using a unicast address

    公开(公告)号:US12192181B2

    公开(公告)日:2025-01-07

    申请号:US18117768

    申请日:2023-03-06

    Abstract: Disclosed herein are embodiments of systems, methods, and products comprising a computing device, which provides Efficient Data-In-Transit Protection Techniques for Handheld Devices (EDITH) to protect data-in-transit. An end user device (EUD) may generate a multicast data packet. The EDITH module of the EUD encapsulates the data packet in a GRE packet and directs the GRE packet to a unicast destination address of an EDITH Multicast Router included in an infrastructure. The EDITH module on the EUD double compresses and double encrypts the GRE packet. The EDITH module on the infrastructure decrypts and decompresses the double compressed and double encrypted GRE packet to recreate the GRE packet. The EDITH module on the infrastructure decapsulates the GRE packet to derive the original multicast data packet, and distributes the original multicast data packet to the multiple group member based on the multicast destination address included in the original multicast data packet.

    Systems and methods including machine-learning models for detecting and mitigating malware

    公开(公告)号:US11997131B1

    公开(公告)日:2024-05-28

    申请号:US17948980

    申请日:2022-09-20

    Abstract: Disclosed herein are embodiments of systems, methods, and products comprise an analytic server, which detects and defends against malware in-flight regardless of the specific nature and methodology of the underlying attack. The analytic server learns the system's normal behavior during testing and evaluation phase and trains a machine-learning model based on the normal behavior. The analytic server monitors the system behavior during runtime comprising the runtime behavior of each sub-system of the system. The analytic server executes the machine-learning model and compares the system runtime behavior with the normal behavior to identify anomalous behavior. The analytic server executes one or more mitigation instructions to mitigate malware. Based on multiple available options for mitigating malware, the analytic server makes an intelligent decision and takes the least impactful action that have the least impact on the system to maintain mission assurance.

    System and method for improving training program efficiency

    公开(公告)号:US11985159B1

    公开(公告)日:2024-05-14

    申请号:US17884908

    申请日:2022-08-10

    CPC classification number: H04L63/1441 G06Q10/06398 G09B9/003 H04L63/1416

    Abstract: A method for improving efficiency of a training program begins with a processor monitoring and adapting execution of a training exercise of the training program. The processor determines a training program effectiveness measure including determining trainee skill improvement demonstrated during the training exercise, and monitoring and determining correctness and timeliness of trainee actions during the training exercise. The processor then determines a training program cost measure by determining a first monetary cost for the execution of the at least one training exercise, determining a second monetary cost associated with trainee man-hours for the training exercise, and generating the training program cost measure based on the first and second monetary costs. The processor then computes a ratio of the training program effectiveness measure to the training program cost measure.

    System and method for anticipating advances in technology

    公开(公告)号:US11934968B1

    公开(公告)日:2024-03-19

    申请号:US15872645

    申请日:2018-01-16

    CPC classification number: G06N5/041 G06N20/00

    Abstract: A method and system for determining predictably feasible model designs. The method includes defining a plurality of model designs, wherein the plurality of model designs include a plurality of infeasible model designs, wherein one or more of the infeasible model designs are infeasible due to limits in technology; storing information representing a plurality of technological trends; and classifying one or more of the infeasible model designs as predictably feasible model designs, wherein the predictable feasible model designs are those infeasible model designs expected to become feasible model designs if one or more of the plurality of technological trends continues as anticipated.

    Advisor system and method
    7.
    发明授权

    公开(公告)号:US11837103B1

    公开(公告)日:2023-12-05

    申请号:US17524633

    申请日:2021-11-11

    Abstract: An automatic, autonomous, and aircraft-centric interference advisory method is executed entirely on a fist aircraft operating on a movement area of a runway, the movement are including ramps, taxiways, and runways. The method includes a processor onboard the first aircraft computing a first movement projection for the first aircraft using first aircraft data received at the first aircraft; the processor computing additional second movement projections for multiple second aircraft operating on the movement area of the airport using second data regarding each of the multiple second aircraft; the processor detecting a threat to the first aircraft on approach to a defined intersection of the movement area from any of the multiple second aircraft based on a corresponding second movement projection within a configurable time limit of entry into the defined intersection by the first aircraft; and providing on the first aircraft, a threat advisory for a detected threat.

    Data synchronization of cloud data based upon network connections

    公开(公告)号:US11824930B1

    公开(公告)日:2023-11-21

    申请号:US17987222

    申请日:2022-11-15

    CPC classification number: H04L67/1095 H04L67/01

    Abstract: Disclosed herein are embodiments of a cloud data synchronization system enabling an user operating a mobile client device to download mission-specific data sets from a fixed cloud-based server system to a database of the mobile client device, and then use the downloaded data sets independently on the mobile client device when the mobile client device is disconnected from a network connecting to the fixed cloud-based server system. When connectivity to the fixed cloud-based server system is re-established by the mobile client device in an intermittent and bandwidth-limited communication network environment, the fixed cloud-based server system may provide bi-directional data synchronization between records of the fixed cloud-based server system and the mobile client device to update the data sets on the fixed cloud-based server system and the mobile client device while operating in the intermittent and bandwidth-limited communication network environment.

    Systems and methods for establishing and managing computer network access privileges

    公开(公告)号:US11714884B1

    公开(公告)日:2023-08-01

    申请号:US17833159

    申请日:2022-06-06

    CPC classification number: G06F21/123 G06F21/604 H04L63/101 H04W12/08

    Abstract: A method for detecting, identifying, and mitigating advanced persistent threats in a computer network having one or more computers includes a processor in the computer network: receiving a request to access a resource in the computer network; identifying the request as originating from an application executing on the computer network; executing an anomaly operation to determine a behavior of the application is one of anomalous and not anomalous; executing a privilege operation to determine the request is one of permanently allowed and not-permanently allowed; granting access to the resource for both a non-anomalous-behaving application and a permanently allowed request; and generating and displaying, on a graphical user interface of the computer network, and prompt for either an anomalous-behaving application or a not-permanently allowed request.

Patent Agency Ranking