Patents by Inventor Jordan C. Bonney

Jordan C. Bonney has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11947655
    Abstract: A computing device may authenticate a user of the computing device as an authorized user. The computing device may, in response to authenticating the user of the computing device as the authorized user, transition from a locked state to an unlocked state. The computing device may, in response to authenticating the user of the computing device as the authorized user, determine one or more computing devices that are proximate to the computing device. The computing device may, in response to determining the one or more computing devices that are proximate to the computing device, send to each of the one or more computing devices an indication of successful user authentication by the computing device to enable each of the one or more computing devices to transition from the locked state to the unlocked state without performing user authentication.
    Type: Grant
    Filed: February 2, 2021
    Date of Patent: April 2, 2024
    Assignee: ARCHITECTURE TECHNOLOGY CORPORATION
    Inventors: Jafar Al-Gharaibeh, Ryan Lee Hagelstrom, Jordan C. Bonney
  • Publication number: 20240013662
    Abstract: A method of generating a plan for a vehicle is provided. The method includes receiving information indicating a location of each of a plurality of communication nodes and the vehicle during a first time period and a second time period. The vehicle is configured to send wireless signals to and receive wireless signals with the plurality of communication nodes. The method includes developing a plan that defines a path of motion for the vehicle and a configuration for an antenna on the vehicle during the first time period and the second time period based on connectivity between the vehicle and the plurality of communication nodes.
    Type: Application
    Filed: February 20, 2023
    Publication date: January 11, 2024
    Inventors: Barry A. Trent, Ranga S. Ramanujan, Fabio F. Pozzo, Ian McLinden, Jordan C. Bonney
  • Patent number: 11863456
    Abstract: This disclosure is directed to network optimization in a complex joint network for increasing the network utility of the complex joint network. A computing device in the complex joint network may receive a data flow via a complex joint network. The computing device may determine, based on a network template, a mission utility associated with the data flow and a traffic class associated with the data flow. The computing device may control one or more quality of service decisions based at least in part on the mission utility associated with the data flow and the traffic class associated with the data flow.
    Type: Grant
    Filed: September 6, 2022
    Date of Patent: January 2, 2024
    Assignee: ARCHITECTURE TECHNOLOGY CORPORATION
    Inventors: Benjamin L Burnett, Deborah K. Charan, Ian J. McLinden, Jordan C. Bonney
  • Publication number: 20230179420
    Abstract: Embodiments for a computer readable medium including a software module are provided. The software module causes one or more processing devices to obtain a biometric identifier from a user. Access to a resource is requested by providing a software credential token and the biometric identifier. The software credential token corresponds to a hardware credential token, and the hardware credential token is one of a set of hardware credential tokens that are used to access the resource. An indication that access to the resource has been granted is received and after receiving the indication an indication that the access to the resource has been revoked is received. After receiving the indication that access to the resource has been revoked, a biometric identifier is re-obtained from a user and access to the resource is re-requested by providing a software credential token and the re-obtained biometric identifier.
    Type: Application
    Filed: December 22, 2022
    Publication date: June 8, 2023
    Inventors: Ranga S. Ramanujan, Deborah K. Charan, Barry A. Trent, Jordan C. Bonney
  • Publication number: 20230063618
    Abstract: This disclosure is directed to network optimization in a complex joint network for increasing the network utility of the complex joint network. A computing device in the complex joint network may receive a data flow via a complex joint network. The computing device may determine, based on a network template, a mission utility associated with the data flow and a traffic class associated with the data flow. The computing device may control one or more quality of service decisions based at least in part on the mission utility associated with the data flow and the traffic class associated with the data flow.
    Type: Application
    Filed: September 6, 2022
    Publication date: March 2, 2023
    Inventors: Benjamin L. Burnett, Deborah K. Charan, Ian J. McLinden, Jordan C. Bonney
  • Patent number: 11539524
    Abstract: Embodiments for a computer readable medium including a software module are provided. The software module causes one or more processing devices to obtain a biometric identifier from a user. Access to a resource is requested by providing a software credential token and the biometric identifier. The software credential token corresponds to a hardware credential token, and the hardware credential token is one of a set of hardware credential tokens that are used to access the resource. An indication that access to the resource has been granted is received and after receiving the indication an indication that the access to the resource has been revoked is received. After receiving the indication that access to the resource has been revoked, a biometric identifier is re-obtained from a user and access to the resource is re-requested by providing a software credential token and the re-obtained biometric identifier.
    Type: Grant
    Filed: July 13, 2020
    Date of Patent: December 27, 2022
    Inventors: Ranga S. Ramanujan, Deborah K. Charan, Barry A. Trent, Jordan C. Bonney
  • Patent number: 11463366
    Abstract: This disclosure is directed to network optimization in a complex joint network for increasing the network utility of the complex joint network. A computing device in the complex joint network may receive a data flow via a complex joint network. The computing device may determine, based on a network template, a mission utility associated with the data flow and a traffic class associated with the data flow. The computing device may control one or more quality of service decisions based at least in part on the mission utility associated with the data flow and the traffic class associated with the data flow.
    Type: Grant
    Filed: September 22, 2020
    Date of Patent: October 4, 2022
    Assignee: Architecture Technology Corporation
    Inventors: Benjamin L. Burnett, Deborah K. Charan, Ian J. McLinden, Jordan C. Bonney
  • Patent number: 10846391
    Abstract: In general, the techniques of this disclosure describe a computing device in a secure domain that is configured to receive, via a guard device, an authentication factor from at least one authentication device of a plurality of authentication devices each in a non-secure domain. The respective authentication factor comprises a respective identifier of a respective user of the respective authentication device. The computing device may then determine whether the respective user of each respective authentication device is a particular trusted user based on the received authentication factors. Responsive to determining that the respective user of each respective authentication device is the particular trusted user, the computing device may enable access to one or more applications on the computing device. Once access is enabled, the computing device may continue to enable access so long as the authentication devices send additional authentication factors that confirm the identity of the user.
    Type: Grant
    Filed: January 9, 2018
    Date of Patent: November 24, 2020
    Assignee: ARCHITECTURE TECHNOLOGY CORPORATION
    Inventors: Jordan C. Bonney, Ranga Ramanujan
  • Patent number: 10715327
    Abstract: Embodiments for a method for issuing a software credential token with reliance on a hardware credential token are disclosed. A data server that allows access thereto via a set of hardware credential tokens is provided. The method includes receiving a request for a software credential token from a personal computing device. The request includes an indication of a hardware credential token upon which the request relies. An email address and a public key corresponding to the hardware credential token are obtained. The method also includes sending an email to the email address. The email includes a one-time password encrypted with the public key. Access to the email is restricted to an individual to which the hardware credential token was issued. The method also includes receiving an inputted password from the personal computing device. If the inputted password matches the one-time password, a software credential token is issued to a user.
    Type: Grant
    Filed: May 30, 2018
    Date of Patent: July 14, 2020
    Assignee: Architecture Technology Corporation
    Inventors: Ranga S. Ramanujan, Deborah K. Charan, Barry A. Trent, Jordan C. Bonney
  • Patent number: 7995475
    Abstract: The present application relates to an implementation of a reliable transport protocol that provides receiver-based congestion control within a computing system. An exemplary system includes a first network device and a second network device within a network. During a handshake procedure, a transmission rate at which data can be sent as well as an acceptable corruptive loss rate for a data path between the first network device and the second network device in the network is determined. The second network device then receives data sent from the first network device at the transmission rate. When the acceptable corruptive loss rate for received data has been exceeded, the second network device determines an amount by which to reduce the transmission rate, and then sends a notification to the first network device indicating the amount by which to reduce the transmission rate for subsequently transmitted data.
    Type: Grant
    Filed: October 31, 2008
    Date of Patent: August 9, 2011
    Assignee: Architecture Technology Corporation
    Inventors: Ranga S. Ramanujan, Richard H. Carl, Barry Trent, Edward Mandy, Clint Sanders, Jordan C. Bonney
  • Publication number: 20100039937
    Abstract: The present application relates to an implementation of a reliable transport protocol that provides receiver-based congestion control within a computing system. An exemplary system includes a first network device and a second network device within a network. During a handshake procedure, a transmission rate at which data can be sent as well as an acceptable corruptive loss rate for a data path between the first network device and the second network device in the network is determined. The second network device then receives data sent from the first network device at the transmission rate. When the acceptable corruptive loss rate for received data has been exceeded, the second network device determines an amount by which to reduce the transmission rate, and then sends a notification to the first network device indicating the amount by which to reduce the transmission rate for subsequently transmitted data.
    Type: Application
    Filed: October 31, 2008
    Publication date: February 18, 2010
    Inventors: Ranga S. Ramanujan, Richard H. Carl, Barry Trent, Edward Mandy, Clint Sanders, Jordan C. Bonney
  • Patent number: 7203173
    Abstract: A system is described for monitoring and testing enterprise networks that tend to have a number of geographically dispersed devices and interconnected sub-networks. The system includes a plurality of distributed agents to capture packets from a network. The system further includes an aggregation module coupled to the network to receive and aggregate the captured packets. During the aggregation process, the aggregation module identifies duplicate packets that were captured by different agents as an originating packet traverses the network. A display is coupled to the aggregation module, presents the non-duplicate network packets, giving a user a clear illustration of network activity. For the duplicate packets, the aggregation module presents a representative packet, such as the originating packet, that may be expanded by the user to view the details of the duplicate packets.
    Type: Grant
    Filed: January 25, 2002
    Date of Patent: April 10, 2007
    Assignee: Architecture Technology Corp.
    Inventors: Jordan C. Bonney, Benjamin L. Burnett, Deborah K. Charan
  • Patent number: 7096264
    Abstract: A system is described for monitoring and testing computer networks, such as enterprise networks that tend to have a number of geographically dispersed devices and interconnected sub-networks. The system includes a plurality of distributed agents coupled to a computing network. The system further includes a replay module coupled to the network that has a storage medium to store replay data. The replay module communicates respective portions of the replay data to the agents, and issues commands to the agents to control introduction of the network packets on the computing network by the agents. In this way, the system recreates network activity in order to test the computer network. The replay data stored by the storage medium may define a conditional flow for introduction of the network packets by the agents. Accordingly, the replay module may issue commands to the agents in accordance with the conditional flow.
    Type: Grant
    Filed: January 25, 2002
    Date of Patent: August 22, 2006
    Assignee: Architecture Technology Corp.
    Inventors: Jordan C. Bonney, Benjamin L. Burnett, Deborah K. Charan
  • Publication number: 20030142666
    Abstract: A system is described for monitoring and testing enterprise networks that tend to have a number of geographically dispersed devices and interconnected sub-networks. The system includes a plurality of distributed agents to capture packets from a network. The system further includes an aggregation module coupled to the network to receive and aggregate the captured packets. During the aggregation process, the aggregation module identifies duplicate packets that were captured by different agents as an originating packet traverses the network. A display is coupled to the aggregation module, presents the non-duplicate network packets, giving a user a clear illustration of network activity. For the duplicate packets, the aggregation module presents a representative packet, such as the originating packet, that may be expanded by the user to view the details of the duplicate packets.
    Type: Application
    Filed: January 25, 2002
    Publication date: July 31, 2003
    Inventors: Jordan C. Bonney, Benjamin L. Burnett, Deborah K. Charan
  • Publication number: 20030145039
    Abstract: A system is described for monitoring and testing computer networks, such as enterprise networks that tend to have a number of geographically dispersed devices and interconnected sub-networks. The system includes a plurality of distributed agents coupled to a computing network. The system further includes a replay module coupled to the network that has storage medium to store replay data. The replay module communicates respective portions of the replay data to the agents, and issues commands to the agents to control introduction of the network packets on the computing network by the agents. The replay data stored by the storage medium may define a conditional flow for introduction of the network packets by the agents. Accordingly, the replay module may issue commands to the agents in accordance with the conditional flow.
    Type: Application
    Filed: January 25, 2002
    Publication date: July 31, 2003
    Inventors: Jordan C. Bonney, Benjamin L. Burnett, Deborah K. Charan