Patents by Inventor Alen Cruz

Alen Cruz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9954884
    Abstract: Embodiments of a system and method for a cyber modeling and simulation framework arc generally described herein. In some embodiments, an interface (212) for ingest of network and vulnerability data associated with a node of a targeted network, a network visualization device (232) for presenting the network data and the vulnerability data, and for creating a network model based on the network and vulnerability data, a threat analysis simulator (240) for launching threat attacks on the targeted network and for applying modeled defenses against the threat attacks, the threat analysis simulator producing simulation results (244) and a data farming module for performing data fanning on the simulation results using different scenarios to generate a farm of data for use in designing anti-cyber-attack strategies (280) for the targeted network.
    Type: Grant
    Filed: October 23, 2013
    Date of Patent: April 24, 2018
    Assignee: Raytheon Company
    Inventors: Suzanne P. Hassell, Paul F. Beraud, III, Alen Cruz, Gangadhar Ganga, Brian J. Mastropietro, Travis C. Hester, David A. Hyde, Justin W. Toennies, Stephen R. Martin, Frank Pietryka, Niraj K. Srivastava
  • Patent number: 9424064
    Abstract: A system and method of deploying a network hopping adaptor is disclosed. In some embodiments, a network hopping adaptor may be configured to manipulate network traffic so as to change at least one network characteristic of the network traffic, and at least one network interface of a machine selected from a group of machines may be configured to send the network traffic to the network hopping adaptor. The network hopping adaptor may manipulate such characteristics as an IP address, a port number, an encryption algorithm or a compression algorithm. The group of machines may be deployed as virtual machines being executed by a virtualization server, and the network hopping adaptor may be implemented on another virtual machine being executed by the virtualization server. Alternatively, or in addition, the group of machines or the network hopping adaptor may be implemented as physical machines.
    Type: Grant
    Filed: August 1, 2014
    Date of Patent: August 23, 2016
    Assignee: Raytheon BBN Technologies Corp.
    Inventors: Gangadhar Ganga, Alen Cruz, Suzanne P. Hassell, Paul F. Beraud, III, Ledford J. Meadows, III, Stephen Patrick Marra, Jeanette M. Moody, Stephen R. Martin
  • Publication number: 20160036691
    Abstract: A system and method of deploying a network hopping adaptor is disclosed. In some embodiments, a network hopping adaptor may be configured to manipulate network traffic so as to change at least one network characteristic of the network traffic, and at least one network interface of a machine selected from a group of machines may be configured to send the network traffic to the network hopping adaptor. The network hopping adaptor may manipulate such characteristics as an IP address, a port number, an encryption algorithm or a compression algorithm. The group of machines may be deployed as virtual machines being executed by a virtualization server, and the network hopping adaptor may be implemented on another virtual machine being executed by the virtualization server. Alternatively, or in addition, the group of machines or the network hopping adaptor may be implemented as physical machines.
    Type: Application
    Filed: August 1, 2014
    Publication date: February 4, 2016
    Applicant: Raytheon BBN Technologies Corp.
    Inventors: Gangadhar Ganga, Alen Cruz, Suzanne P. Hassell, Paul F. Beraud, III, Ledford J. Meadows, III, Stephen Patrick Marra, Jeanette M. Moody, Stephen R. Martin
  • Publication number: 20150295948
    Abstract: Embodiments of a system and method for a cyber modeling and simulation framework arc generally described herein. In some embodiments, an interface (212) for ingest of network and vulnerability data associated with a node of a targeted network, a network visualization device (232) for presenting the network data and the vulnerability data, and for creating a network model based on the network and vulnerability data, a threat analysis simulator (240) for launching threat attacks on the targeted network and for applying modeled defenses against the threat attacks, the threat analysis simulator producing simulation results (244) and a data farming module for performing data fanning on the simulation results using different scenarios to generate a farm of data for use in designing anti-cyber-attack strategies (280) for the targeted network.
    Type: Application
    Filed: October 23, 2013
    Publication date: October 15, 2015
    Inventors: Suzanne P. Hassell, Paul F. Beraud, III, Alen Cruz, Gangadhar Ganga, Brian J. Mastropietro, Travis C. Hester, David A. Hyde, Justin W. Toennies, Stephen R. Martin, Frank Pietryka, Niraj K. Srivastava
  • Publication number: 20150236752
    Abstract: Embodiments for providing a next-time-interval routing parameter to a destination node are generally described herein. In some embodiments, a hopped routing parameter is calculated at a sending node using a static routing parameter of a destination node. The hopped routing parameter and source timing are encoded. The encoded hopped routing parameter and source timing are provided in the address fields of packets.
    Type: Application
    Filed: February 20, 2014
    Publication date: August 20, 2015
    Applicant: Raytheon BBN Technologies Corp.
    Inventors: Alen Cruz, Gangadhar Ganga, Paul F. Beraud, III, Suzanne P. Hassell, Ledford J. Meadows, III
  • Patent number: 8453212
    Abstract: According to one embodiment of the present invention, a method for accessing resources of a secure computing network may be provided. The method may include receiving a request to allow a user to access a secure computing network. The user may be associated with an avatar that has a unique set of one or more identifiers that are associated with the user. A security clearance level of the avatar may be determined from the unique set of identifiers of the avatar. The avatar may be authorized to access one or more virtual compartments of the secure computing network according to the security clearance level of the avatar. The virtual compartment may comprise one or more resources of the secure computing network. The method may further include facilitating display of one or more resources of a virtual compartment accessed by the avatar.
    Type: Grant
    Filed: July 27, 2010
    Date of Patent: May 28, 2013
    Assignee: Raytheon Company
    Inventors: Maria Antonio Feliciano Andrews, Sylvia A. Traxler, Luisito D. Espiritu, Robert B. Batie, Alen Cruz, Stephan Gonzalez
  • Publication number: 20120030733
    Abstract: According to one embodiment of the present invention, a method for accessing resources of a secure computing network may be provided. The method may include receiving a request to allow a user to access a secure computing network. The user may be associated with an avatar that has a unique set of one or more identifiers that are associated with the user. A security clearance level of the avatar may be determined from the unique set of identifiers of the avatar. The avatar may be authorized to access one or more virtual compartments of the secure computing network according to the security clearance level of the avatar. The virtual compartment may comprise one or more resources of the secure computing network. The method may further include facilitating display of one or more resources of a virtual compartment accessed by the avatar.
    Type: Application
    Filed: July 27, 2010
    Publication date: February 2, 2012
    Applicant: RAYTHEON COMPANY
    Inventors: Maria Antonio Feliciano Andrews, Sylvia A. Traxler, Luisito D. Espiritu, Robert B. Batie, Alen Cruz, Stephan Gonzalez
  • Publication number: 20110288904
    Abstract: In certain embodiments, an application maneuvering analysis tool accesses application characteristics information indicating one or more characteristics of an application for which a maneuver evaluation is desired. Using the accessed application characteristics information, the application maneuvering analysis tool determines a maneuverability index representing a maneuvering efficiency of the application and determines an implementation difficulty level according to the determined maneuverability index.
    Type: Application
    Filed: October 28, 2010
    Publication date: November 24, 2011
    Applicant: Raytheon Company
    Inventors: Suzanne P. Hassell, James D. Janscha, Jeffrey J. Wiley, Paul F. Beraud, III, Alen Cruz, Armando J. Santos, Juan E. Sandoval, Nicholas I. Sapankevych, Frederick E. Bass, JR.
  • Publication number: 20110258701
    Abstract: In certain embodiments, protecting a virtualization system against computer attacks comprises facilitating operation of hypervisors comprising operation zone hypervisors and one or more forensic hypervisors. Each hypervisor operates on a corresponding physical machine, and each operation zone hypervisor manages one or more virtual machines. An assurance procedure is initiated for the hypervisors. At least one virtual machine of a first operation zone hypervisor is moved to a forensic hypervisor to analyze the potential attack. The first operation zone hypervisor is cleaned.
    Type: Application
    Filed: April 14, 2010
    Publication date: October 20, 2011
    Applicant: Raytheon Company
    Inventors: Alen Cruz, Paul F. Beraud, III
  • Publication number: 20100146608
    Abstract: In some embodiments, a collaborative computing environment includes a federated identity manager coupled to a multi-level secure computing network and a client having a biometric reading device. The multi-level secure computing network includes multiple data repositories that store information according to a ranked classification system comprising multiple security levels. The federated identity manager has a storage device that is operable store a plurality of identity tokens each associated with a corresponding one of a plurality of users.
    Type: Application
    Filed: April 7, 2009
    Publication date: June 10, 2010
    Applicant: Raytheon Company
    Inventors: Robert B. Batie, Luisito D. Espiritu, Sil N. Mudsi, Maria A.F. Andrews, Daniel Teijido, Sylvia A. Traxler, Stephan Gonzalez, Alen Cruz