-
公开(公告)号:US12192181B2
公开(公告)日:2025-01-07
申请号:US18117768
申请日:2023-03-06
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Timothy Hartley , Deborah Charan , Ranga S. Ramanujan
IPC: H04W12/02 , G06F21/60 , H04L9/40 , H04L47/2441 , H04L49/201 , H04L69/22 , H04W4/06 , H04L45/16 , H04L69/04
Abstract: Disclosed herein are embodiments of systems, methods, and products comprising a computing device, which provides Efficient Data-In-Transit Protection Techniques for Handheld Devices (EDITH) to protect data-in-transit. An end user device (EUD) may generate a multicast data packet. The EDITH module of the EUD encapsulates the data packet in a GRE packet and directs the GRE packet to a unicast destination address of an EDITH Multicast Router included in an infrastructure. The EDITH module on the EUD double compresses and double encrypts the GRE packet. The EDITH module on the infrastructure decrypts and decompresses the double compressed and double encrypted GRE packet to recreate the GRE packet. The EDITH module on the infrastructure decapsulates the GRE packet to derive the original multicast data packet, and distributes the original multicast data packet to the multiple group member based on the multicast destination address included in the original multicast data packet.
-
2.
公开(公告)号:US11997131B1
公开(公告)日:2024-05-28
申请号:US17948980
申请日:2022-09-20
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Joseph Sirianni , Judson Powers , Robert Joyce
CPC classification number: H04L63/145 , G06N3/04 , G06N3/084 , G06N20/10 , H04L63/1425 , H04L63/1433
Abstract: Disclosed herein are embodiments of systems, methods, and products comprise an analytic server, which detects and defends against malware in-flight regardless of the specific nature and methodology of the underlying attack. The analytic server learns the system's normal behavior during testing and evaluation phase and trains a machine-learning model based on the normal behavior. The analytic server monitors the system behavior during runtime comprising the runtime behavior of each sub-system of the system. The analytic server executes the machine-learning model and compares the system runtime behavior with the normal behavior to identify anomalous behavior. The analytic server executes one or more mitigation instructions to mitigate malware. Based on multiple available options for mitigating malware, the analytic server makes an intelligent decision and takes the least impactful action that have the least impact on the system to maintain mission assurance.
-
公开(公告)号:US11985159B1
公开(公告)日:2024-05-14
申请号:US17884908
申请日:2022-08-10
Applicant: Architecture Technology Corporation
Inventor: Judson Powers , Matthew Donovan
IPC: G09B9/00 , G06Q10/0639 , H04L9/40
CPC classification number: H04L63/1441 , G06Q10/06398 , G09B9/003 , H04L63/1416
Abstract: A method for improving efficiency of a training program begins with a processor monitoring and adapting execution of a training exercise of the training program. The processor determines a training program effectiveness measure including determining trainee skill improvement demonstrated during the training exercise, and monitoring and determining correctness and timeliness of trainee actions during the training exercise. The processor then determines a training program cost measure by determining a first monetary cost for the execution of the at least one training exercise, determining a second monetary cost associated with trainee man-hours for the training exercise, and generating the training program cost measure based on the first and second monetary costs. The processor then computes a ratio of the training program effectiveness measure to the training program cost measure.
-
4.
公开(公告)号:US20240114010A1
公开(公告)日:2024-04-04
申请号:US18117768
申请日:2023-03-06
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Timothy HARTLEY , Deborah Charan , Ranga S. RAMANUJAN
IPC: H04L9/40 , G06F21/60 , H04L47/2441 , H04L49/201 , H04L69/22 , H04W4/06 , H04W12/02
CPC classification number: H04L63/0428 , G06F21/602 , H04L47/2441 , H04L49/201 , H04L63/0272 , H04L69/22 , H04W4/06 , H04W12/02 , H04L45/16
Abstract: Disclosed herein are embodiments of systems, methods, and products comprising a computing device, which provides Efficient Data-In-Transit Protection Techniques for Handheld Devices (EDITH) to protect data-in-transit. An end user device (EUD) may generate a multicast data packet. The EDITH module of the EUD encapsulates the data packet in a GRE packet and directs the GRE packet to a unicast destination address of an EDITH Multicast Router included in an infrastructure. The EDITH module on the EUD double compresses and double encrypts the GRE packet. The EDITH module on the infrastructure decrypts and decompresses the double compressed and double encrypted GRE packet to recreate the GRE packet. The EDITH module on the infrastructure decapsulates the GRE packet to derive the original multicast data packet, and distributes the original multicast data packet to the multiple group member based on the multicast destination address included in the original multicast data packet.
-
公开(公告)号:US11934968B1
公开(公告)日:2024-03-19
申请号:US15872645
申请日:2018-01-16
Applicant: Architecture Technology Corporation
Inventor: Matthew A. Stillerman
Abstract: A method and system for determining predictably feasible model designs. The method includes defining a plurality of model designs, wherein the plurality of model designs include a plurality of infeasible model designs, wherein one or more of the infeasible model designs are infeasible due to limits in technology; storing information representing a plurality of technological trends; and classifying one or more of the infeasible model designs as predictably feasible model designs, wherein the predictable feasible model designs are those infeasible model designs expected to become feasible model designs if one or more of the plurality of technological trends continues as anticipated.
-
公开(公告)号:US11869373B1
公开(公告)日:2024-01-09
申请号:US17836368
申请日:2022-06-09
Applicant: Architecture Technology Corporation
Inventor: Eric Chartier , Paul Davis , Erin Gambucci , Douglas Sweet
CPC classification number: G08G5/0078 , B64D45/00 , G08G5/0008 , G08G5/0013 , G08G5/0026 , G08G5/0043 , B64D2045/0075
Abstract: An automatic, autonomous predictive aircraft surface state event track (ASSET) system, includes a mobile device onboard an aircraft and a remote service in communication with the mobile device. The mobile device includes a processor, and an application that in turn includes machine instructions encoded on a non-transitory computer-readable storage medium. The processor executes the machine instructions to receive sensor data from aircraft onboard sensors, the sensor data indicating an operational state of the aircraft; and transmit the sensor data. The remote service receives the sensor data and includes a remote processor that executes machine instructions to compute an operational state of the aircraft; identify an aircraft event associated the aircraft; and using the aircraft operational data, the sensor data, and the event, predict that the aircraft will meet a next scheduled aircraft event within a specified time window.
-
公开(公告)号:US11837103B1
公开(公告)日:2023-12-05
申请号:US17524633
申请日:2021-11-11
Applicant: Architecture Technology Corporation
Inventor: Eric R. Chartier , Evan Eaves , William Colligan , Andrew Murphy
CPC classification number: G08G5/045 , G08G5/0008 , G08G5/0013 , G08G5/0021 , G08G5/0026 , G08G5/0065 , G08G5/0078 , G08G5/025 , G08G5/065 , G08G5/0052 , G08G5/0082
Abstract: An automatic, autonomous, and aircraft-centric interference advisory method is executed entirely on a fist aircraft operating on a movement area of a runway, the movement are including ramps, taxiways, and runways. The method includes a processor onboard the first aircraft computing a first movement projection for the first aircraft using first aircraft data received at the first aircraft; the processor computing additional second movement projections for multiple second aircraft operating on the movement area of the airport using second data regarding each of the multiple second aircraft; the processor detecting a threat to the first aircraft on approach to a defined intersection of the movement area from any of the multiple second aircraft based on a corresponding second movement projection within a configurable time limit of entry into the defined intersection by the first aircraft; and providing on the first aircraft, a threat advisory for a detected threat.
-
公开(公告)号:US11824930B1
公开(公告)日:2023-11-21
申请号:US17987222
申请日:2022-11-15
Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
Inventor: Benjamin L. Burnett , Ranga S. Ramanujan
IPC: H04L29/08 , H04L29/06 , H04L67/1095 , H04L67/01
CPC classification number: H04L67/1095 , H04L67/01
Abstract: Disclosed herein are embodiments of a cloud data synchronization system enabling an user operating a mobile client device to download mission-specific data sets from a fixed cloud-based server system to a database of the mobile client device, and then use the downloaded data sets independently on the mobile client device when the mobile client device is disconnected from a network connecting to the fixed cloud-based server system. When connectivity to the fixed cloud-based server system is re-established by the mobile client device in an intermittent and bandwidth-limited communication network environment, the fixed cloud-based server system may provide bi-directional data synchronization between records of the fixed cloud-based server system and the mobile client device to update the data sets on the fixed cloud-based server system and the mobile client device while operating in the intermittent and bandwidth-limited communication network environment.
-
公开(公告)号:US11729185B2
公开(公告)日:2023-08-15
申请号:US17663597
申请日:2022-05-16
Applicant: Architecture Technology Corporation
Inventor: Ranga Ramanujan , Benjamin L. Burnett
CPC classification number: H04L63/1408 , H04L12/2854 , H04L63/1441 , H04L63/1458 , H04L63/1483 , H04L69/22 , H04L2463/121
Abstract: This disclosure is directed to monitoring a crypto-partitioned, or cipher-text, wide-area network (WAN). A first computing device may be situated in a plain-text portion of a first enclave behind a first inline network encryptor (INE). A second device may be positioned in a plain-text portion of a second enclave behind a second INE. The two enclaves may be separated by a cipher-text WAN, over which the two enclaved may communicate. The first computing device may receive a data packet from the second computing device. The first computing device may then determine contents of a header of the data packet. The first computing device may, based at least in part on the contents of the header of the data packet, determine a status of the cipher-text WAN.
-
公开(公告)号:US11714884B1
公开(公告)日:2023-08-01
申请号:US17833159
申请日:2022-06-06
Applicant: Architecture Technology Corporation
Inventor: Joseph Sirianni , Matthew Donovan
CPC classification number: G06F21/123 , G06F21/604 , H04L63/101 , H04W12/08
Abstract: A method for detecting, identifying, and mitigating advanced persistent threats in a computer network having one or more computers includes a processor in the computer network: receiving a request to access a resource in the computer network; identifying the request as originating from an application executing on the computer network; executing an anomaly operation to determine a behavior of the application is one of anomalous and not anomalous; executing a privilege operation to determine the request is one of permanently allowed and not-permanently allowed; granting access to the resource for both a non-anomalous-behaving application and a permanently allowed request; and generating and displaying, on a graphical user interface of the computer network, and prompt for either an anomalous-behaving application or a not-permanently allowed request.
-
-
-
-
-
-
-
-
-