Real Time Touch

new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)

Real Time Touch

Architecture Technology Corporation patents

Recent patent applications related to Architecture Technology Corporation. Architecture Technology Corporation is listed as an Agent/Assignee. Note: Architecture Technology Corporation may have other listings under different names/spellings. We're not affiliated with Architecture Technology Corporation, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "A" | Architecture Technology Corporation-related inventors

Automated real-time clearance analysis for air traffic

An example method includes receiving, by a computing device comprising one or more processors, from a plurality of sources, data associated with an aircraft that is in an operation, wherein the plurality of sources comprises one or more sources of historical data and one or more sources of real-time data that is generated while the aircraft is in the operation. The example method further includes performing, by the computing device, a risk analysis of the data using a bayesian network model that models risks associated with the aircraft in the operation. ... Architecture Technology Corporation

Mobile emergency perimeter system and method

A mobile emergency perimeter system includes one or more fixed radio frequency (rf) sensors, and one or more moving rf sensors; a wireless mesh network coupling together each of the sensors; and a central processor system coupled to the wireless mesh network. The central processor system executes machine instructions stored on a computer-readable storage medium to control each of the rf sensors to receive time of arrival data for a rf signal transmitted by an emitter and received at each of the rf sensors, receive location information for each of the rf sensors and determine a three-dimensional (3-d) estimate of the geographical location of the emitter.. ... Architecture Technology Corporation

Integrated multi-mode automation for air traffic control

Systems, devices, methods, and techniques are described for automated air traffic management using multiple flight operation modes. In one example, a method includes receiving, by a computing device comprising one or more processors, data associated with one or more aircraft in flight in a controlled airspace. ... Architecture Technology Corporation

Transparent bridge for monitoring crypto-partitioned wide-area network

This disclosure is directed to monitoring a crypto-partitioned, or cipher-text, wide-area network (wan). A first computing device may be situated in a plain-text portion of a first enclave behind a first inline network encryptor (ine). ... Architecture Technology Corporation

Peer integrity checking system

A distributed file integrity checking system is described. The described peer integrity checking system (pics) may negate an attack by storing a properties database amongst nodes of a peer-to-peer network of hosts, some or all of which co-operate to protect and watch over each other.. ... Architecture Technology Corporation

Context-aware network and situation management for crypto-partitioned networks

This disclosure describes a context aware scalable dynamic network whereby network information concerning network elements in an untrusted (black) network are gathered by network sensors, stored at a network sensor collector, and sent to another network sensor collector in a trusted (red) network through a one-way guard. At the red network, the network information from the black network may be combined with network information from one or more red networks. ... Architecture Technology Corporation

Scalable and automated network-parameter assignment

In one example, in a dynamic host configuration protocol (dhcp) network comprising one or more configuration computing systems, a method includes receiving one or more augmented dhcp configuration messages. The method also includes determining that each of the one or more augmented dhcp configuration messages includes a message tag indicating that the respective augmented dhcp configuration message contains parameter information that includes a client identifier associated with a respective one of the one or more network devices. ... Architecture Technology Corporation

Multi-domain application execution management

An example method includes selecting, based at least on first and second policies, first and second containers in which to execute first and second applications, respectively. The example method further includes isolating execution of the first application in the first container, and isolating execution of the second application in the second container. ... Architecture Technology Corporation

Low bandwidth media stream transmission

In general, this disclosure describes media stream transmission techniques for a field computing device and a central computing device. The central computing device may capture an image of a local background environment. ... Architecture Technology Corporation

Application randomization mechanism

An example method includes generating, by a computing system, first unique configuration information, generating, by the computing system and based on the first unique configuration information, a first unique instance of a software component, generating second unique configuration information, wherein the second unique configuration information is different from the first unique configuration information, and generating, based on the second unique configuration information, a second unique instance of the software component that is executable on the runtime computing system. The first and second unique instances of the software component comprise different instances of the same software component that each are configured to have uniquely different operating characteristics during execution on the runtime computing system.. ... Architecture Technology Corporation

Low-overhead routing

A method of routing an internet protocol (ip) packet from a routing device is provided. The method includes receiving a first ip packet having a first ip header and a first ip data field, the first ip packet having a final destination corresponding to a destination device communicatively coupled to the routing device via a network route including at least two hops between the routing device and the final destination. ... Architecture Technology Corporation

Methods, networks and nodes for dynamically establishing encrypted communications

Methods, networks and nodes for dynamically establishing encrypted communications between a first node having a first identification and a first private key and a second node having a second identification and a second private key. A first signal comprising information indicative of the first identification of the first node is transmitted, then, upon receipt of the first signal by the second node, a second signal comprising information indicative of the second identification of the second node and a first portion of a symmetric key is transmitted, then, upon receipt of the second signal by the first node, a third signal comprising a second portion of the symmetric key is transmitted.. ... Architecture Technology Corporation

Fight-through nodes for survivable computer network

A network node includes enhanced functionality to fight through cyber-attacks. A plurality of virtual machines run at the network node. ... Architecture Technology Corporation

Automated execution and evaluation of network-based training exercises

This disclosure generally relates to automated execution and evaluation of computer network training exercises, such as in a virtual machine environment. An example environment includes a control and monitoring system, an attack system, and a target system. ... Architecture Technology Corporation

02/02/17 / #20170032694

Real-time monitoring of network-based training exercises

An example method includes outputting a graphical dashboard that includes one or more learning objective nodes and one or more skill nodes, selecting one or more software agents that are associated with the one or more skill nodes, providing, to at least one host computing system, an indication of the one or more software agents that are configured to collect parameter data from the at least one host computing system while a trainee performs actions, receiving the parameter data collected by the one or more software agents during execution, determining, based on the parameter data, that the one or more skills represented by the one or more skill nodes have been demonstrated by the trainee, and updating the one or more skill nodes to graphically indicate that one or more represented skills have been demonstrated.. . ... Architecture Technology Corporation

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009


This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. is not affiliated or associated with Architecture Technology Corporation in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Architecture Technology Corporation with additional patents listed. Browse our Agent directory for other possible listings. Page by