Patents by Inventor Jordan C. Bonney
Jordan C. Bonney has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11947655Abstract: A computing device may authenticate a user of the computing device as an authorized user. The computing device may, in response to authenticating the user of the computing device as the authorized user, transition from a locked state to an unlocked state. The computing device may, in response to authenticating the user of the computing device as the authorized user, determine one or more computing devices that are proximate to the computing device. The computing device may, in response to determining the one or more computing devices that are proximate to the computing device, send to each of the one or more computing devices an indication of successful user authentication by the computing device to enable each of the one or more computing devices to transition from the locked state to the unlocked state without performing user authentication.Type: GrantFiled: February 2, 2021Date of Patent: April 2, 2024Assignee: ARCHITECTURE TECHNOLOGY CORPORATIONInventors: Jafar Al-Gharaibeh, Ryan Lee Hagelstrom, Jordan C. Bonney
-
Publication number: 20240013662Abstract: A method of generating a plan for a vehicle is provided. The method includes receiving information indicating a location of each of a plurality of communication nodes and the vehicle during a first time period and a second time period. The vehicle is configured to send wireless signals to and receive wireless signals with the plurality of communication nodes. The method includes developing a plan that defines a path of motion for the vehicle and a configuration for an antenna on the vehicle during the first time period and the second time period based on connectivity between the vehicle and the plurality of communication nodes.Type: ApplicationFiled: February 20, 2023Publication date: January 11, 2024Inventors: Barry A. Trent, Ranga S. Ramanujan, Fabio F. Pozzo, Ian McLinden, Jordan C. Bonney
-
Patent number: 11863456Abstract: This disclosure is directed to network optimization in a complex joint network for increasing the network utility of the complex joint network. A computing device in the complex joint network may receive a data flow via a complex joint network. The computing device may determine, based on a network template, a mission utility associated with the data flow and a traffic class associated with the data flow. The computing device may control one or more quality of service decisions based at least in part on the mission utility associated with the data flow and the traffic class associated with the data flow.Type: GrantFiled: September 6, 2022Date of Patent: January 2, 2024Assignee: ARCHITECTURE TECHNOLOGY CORPORATIONInventors: Benjamin L Burnett, Deborah K. Charan, Ian J. McLinden, Jordan C. Bonney
-
Publication number: 20230179420Abstract: Embodiments for a computer readable medium including a software module are provided. The software module causes one or more processing devices to obtain a biometric identifier from a user. Access to a resource is requested by providing a software credential token and the biometric identifier. The software credential token corresponds to a hardware credential token, and the hardware credential token is one of a set of hardware credential tokens that are used to access the resource. An indication that access to the resource has been granted is received and after receiving the indication an indication that the access to the resource has been revoked is received. After receiving the indication that access to the resource has been revoked, a biometric identifier is re-obtained from a user and access to the resource is re-requested by providing a software credential token and the re-obtained biometric identifier.Type: ApplicationFiled: December 22, 2022Publication date: June 8, 2023Inventors: Ranga S. Ramanujan, Deborah K. Charan, Barry A. Trent, Jordan C. Bonney
-
Publication number: 20230063618Abstract: This disclosure is directed to network optimization in a complex joint network for increasing the network utility of the complex joint network. A computing device in the complex joint network may receive a data flow via a complex joint network. The computing device may determine, based on a network template, a mission utility associated with the data flow and a traffic class associated with the data flow. The computing device may control one or more quality of service decisions based at least in part on the mission utility associated with the data flow and the traffic class associated with the data flow.Type: ApplicationFiled: September 6, 2022Publication date: March 2, 2023Inventors: Benjamin L. Burnett, Deborah K. Charan, Ian J. McLinden, Jordan C. Bonney
-
Patent number: 11539524Abstract: Embodiments for a computer readable medium including a software module are provided. The software module causes one or more processing devices to obtain a biometric identifier from a user. Access to a resource is requested by providing a software credential token and the biometric identifier. The software credential token corresponds to a hardware credential token, and the hardware credential token is one of a set of hardware credential tokens that are used to access the resource. An indication that access to the resource has been granted is received and after receiving the indication an indication that the access to the resource has been revoked is received. After receiving the indication that access to the resource has been revoked, a biometric identifier is re-obtained from a user and access to the resource is re-requested by providing a software credential token and the re-obtained biometric identifier.Type: GrantFiled: July 13, 2020Date of Patent: December 27, 2022Inventors: Ranga S. Ramanujan, Deborah K. Charan, Barry A. Trent, Jordan C. Bonney
-
Patent number: 11463366Abstract: This disclosure is directed to network optimization in a complex joint network for increasing the network utility of the complex joint network. A computing device in the complex joint network may receive a data flow via a complex joint network. The computing device may determine, based on a network template, a mission utility associated with the data flow and a traffic class associated with the data flow. The computing device may control one or more quality of service decisions based at least in part on the mission utility associated with the data flow and the traffic class associated with the data flow.Type: GrantFiled: September 22, 2020Date of Patent: October 4, 2022Assignee: Architecture Technology CorporationInventors: Benjamin L. Burnett, Deborah K. Charan, Ian J. McLinden, Jordan C. Bonney
-
Patent number: 10846391Abstract: In general, the techniques of this disclosure describe a computing device in a secure domain that is configured to receive, via a guard device, an authentication factor from at least one authentication device of a plurality of authentication devices each in a non-secure domain. The respective authentication factor comprises a respective identifier of a respective user of the respective authentication device. The computing device may then determine whether the respective user of each respective authentication device is a particular trusted user based on the received authentication factors. Responsive to determining that the respective user of each respective authentication device is the particular trusted user, the computing device may enable access to one or more applications on the computing device. Once access is enabled, the computing device may continue to enable access so long as the authentication devices send additional authentication factors that confirm the identity of the user.Type: GrantFiled: January 9, 2018Date of Patent: November 24, 2020Assignee: ARCHITECTURE TECHNOLOGY CORPORATIONInventors: Jordan C. Bonney, Ranga Ramanujan
-
Patent number: 10715327Abstract: Embodiments for a method for issuing a software credential token with reliance on a hardware credential token are disclosed. A data server that allows access thereto via a set of hardware credential tokens is provided. The method includes receiving a request for a software credential token from a personal computing device. The request includes an indication of a hardware credential token upon which the request relies. An email address and a public key corresponding to the hardware credential token are obtained. The method also includes sending an email to the email address. The email includes a one-time password encrypted with the public key. Access to the email is restricted to an individual to which the hardware credential token was issued. The method also includes receiving an inputted password from the personal computing device. If the inputted password matches the one-time password, a software credential token is issued to a user.Type: GrantFiled: May 30, 2018Date of Patent: July 14, 2020Assignee: Architecture Technology CorporationInventors: Ranga S. Ramanujan, Deborah K. Charan, Barry A. Trent, Jordan C. Bonney
-
Patent number: 7995475Abstract: The present application relates to an implementation of a reliable transport protocol that provides receiver-based congestion control within a computing system. An exemplary system includes a first network device and a second network device within a network. During a handshake procedure, a transmission rate at which data can be sent as well as an acceptable corruptive loss rate for a data path between the first network device and the second network device in the network is determined. The second network device then receives data sent from the first network device at the transmission rate. When the acceptable corruptive loss rate for received data has been exceeded, the second network device determines an amount by which to reduce the transmission rate, and then sends a notification to the first network device indicating the amount by which to reduce the transmission rate for subsequently transmitted data.Type: GrantFiled: October 31, 2008Date of Patent: August 9, 2011Assignee: Architecture Technology CorporationInventors: Ranga S. Ramanujan, Richard H. Carl, Barry Trent, Edward Mandy, Clint Sanders, Jordan C. Bonney
-
Publication number: 20100039937Abstract: The present application relates to an implementation of a reliable transport protocol that provides receiver-based congestion control within a computing system. An exemplary system includes a first network device and a second network device within a network. During a handshake procedure, a transmission rate at which data can be sent as well as an acceptable corruptive loss rate for a data path between the first network device and the second network device in the network is determined. The second network device then receives data sent from the first network device at the transmission rate. When the acceptable corruptive loss rate for received data has been exceeded, the second network device determines an amount by which to reduce the transmission rate, and then sends a notification to the first network device indicating the amount by which to reduce the transmission rate for subsequently transmitted data.Type: ApplicationFiled: October 31, 2008Publication date: February 18, 2010Inventors: Ranga S. Ramanujan, Richard H. Carl, Barry Trent, Edward Mandy, Clint Sanders, Jordan C. Bonney
-
Patent number: 7203173Abstract: A system is described for monitoring and testing enterprise networks that tend to have a number of geographically dispersed devices and interconnected sub-networks. The system includes a plurality of distributed agents to capture packets from a network. The system further includes an aggregation module coupled to the network to receive and aggregate the captured packets. During the aggregation process, the aggregation module identifies duplicate packets that were captured by different agents as an originating packet traverses the network. A display is coupled to the aggregation module, presents the non-duplicate network packets, giving a user a clear illustration of network activity. For the duplicate packets, the aggregation module presents a representative packet, such as the originating packet, that may be expanded by the user to view the details of the duplicate packets.Type: GrantFiled: January 25, 2002Date of Patent: April 10, 2007Assignee: Architecture Technology Corp.Inventors: Jordan C. Bonney, Benjamin L. Burnett, Deborah K. Charan
-
Patent number: 7096264Abstract: A system is described for monitoring and testing computer networks, such as enterprise networks that tend to have a number of geographically dispersed devices and interconnected sub-networks. The system includes a plurality of distributed agents coupled to a computing network. The system further includes a replay module coupled to the network that has a storage medium to store replay data. The replay module communicates respective portions of the replay data to the agents, and issues commands to the agents to control introduction of the network packets on the computing network by the agents. In this way, the system recreates network activity in order to test the computer network. The replay data stored by the storage medium may define a conditional flow for introduction of the network packets by the agents. Accordingly, the replay module may issue commands to the agents in accordance with the conditional flow.Type: GrantFiled: January 25, 2002Date of Patent: August 22, 2006Assignee: Architecture Technology Corp.Inventors: Jordan C. Bonney, Benjamin L. Burnett, Deborah K. Charan
-
Publication number: 20030142666Abstract: A system is described for monitoring and testing enterprise networks that tend to have a number of geographically dispersed devices and interconnected sub-networks. The system includes a plurality of distributed agents to capture packets from a network. The system further includes an aggregation module coupled to the network to receive and aggregate the captured packets. During the aggregation process, the aggregation module identifies duplicate packets that were captured by different agents as an originating packet traverses the network. A display is coupled to the aggregation module, presents the non-duplicate network packets, giving a user a clear illustration of network activity. For the duplicate packets, the aggregation module presents a representative packet, such as the originating packet, that may be expanded by the user to view the details of the duplicate packets.Type: ApplicationFiled: January 25, 2002Publication date: July 31, 2003Inventors: Jordan C. Bonney, Benjamin L. Burnett, Deborah K. Charan
-
Publication number: 20030145039Abstract: A system is described for monitoring and testing computer networks, such as enterprise networks that tend to have a number of geographically dispersed devices and interconnected sub-networks. The system includes a plurality of distributed agents coupled to a computing network. The system further includes a replay module coupled to the network that has storage medium to store replay data. The replay module communicates respective portions of the replay data to the agents, and issues commands to the agents to control introduction of the network packets on the computing network by the agents. The replay data stored by the storage medium may define a conditional flow for introduction of the network packets by the agents. Accordingly, the replay module may issue commands to the agents in accordance with the conditional flow.Type: ApplicationFiled: January 25, 2002Publication date: July 31, 2003Inventors: Jordan C. Bonney, Benjamin L. Burnett, Deborah K. Charan