Patents by Inventor Kenneth J. Thurber

Kenneth J. Thurber has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9838415
    Abstract: A network node includes enhanced functionality to fight through cyber-attacks. A plurality of virtual machines run at the network node. The network node receives a plurality of transaction requests and distributes a copy of each of the transaction requests to the plurality of virtual machines over a plurality of time steps. Based on the first virtual machine having executed (n) transaction requests in the plurality of transaction requests, the node detects whether any of the virtual machines has been compromised. In response to detecting the plurality of virtual machines includes a compromised virtual machine, the network node isolates the compromised virtual machine. Furthermore, after isolating the compromised virtual machine, the network node may receive a subsequent transaction request and dispatch the subsequent transaction request to the compromised virtual machine. The compromised virtual machine may execute the subsequent transaction request.
    Type: Grant
    Filed: October 17, 2016
    Date of Patent: December 5, 2017
    Assignee: Architecture Technology Corporation
    Inventors: Judson Powers, Stephen K. Brueckner, Kenneth J. Thurber
  • Patent number: 9766986
    Abstract: A server system receives messages from client computing devices. Each of the messages corresponds to a transaction. The server system assigns each respective transaction to a respective fresh virtual machine. Furthermore, the server system performs, as part of a respective virtual machine processing a respective transaction, a modification associated with the respective transaction to a shared database. The shared database is persisted independently of the plurality of virtual machines. In response to determining that processing of the respective transaction is complete, the server system discards the respective virtual machine. In response to determining that the respective transaction is associated with a cyber-attack, the server system uses checkpoint data associated with the respective transaction to roll back the modifications associated with the respective transaction to the shared database.
    Type: Grant
    Filed: August 27, 2013
    Date of Patent: September 19, 2017
    Assignee: Architecture Technology Corporation
    Inventors: Stephen K. Brueckner, Robert A. Joyce, Carl Manson, Hajime Inoue, Kenneth J. Thurber
  • Patent number: 9769250
    Abstract: A server system receives messages from client computing devices. Each of the messages corresponds to a transaction. The server system assigns each respective transaction to a respective fresh virtual machine. Furthermore, the server system performs, as part of a respective virtual machine processing a respective transaction, a modification associated with the respective transaction to a shared database. The shared database is persisted independently of the plurality of virtual machines. In response to determining that processing of the respective transaction is complete, the server system discards the respective virtual machine. In response to a trigger, such as determining that the respective transaction is associated with a cyber-attack, the server system uses checkpoint data associated with the respective transaction to roll back the modifications associated with the respective transaction to the shared database.
    Type: Grant
    Filed: July 2, 2015
    Date of Patent: September 19, 2017
    Assignee: Architecture Technology Corporation
    Inventors: Judson Powers, Stephen K. Brueckner, Robert A. Joyce, Kenneth J. Thurber
  • Publication number: 20170034198
    Abstract: A network node includes enhanced functionality to fight through cyber-attacks. A plurality of virtual machines run at the network node. The network node receives a plurality of transaction requests and distributes a copy of each of the transaction requests to the plurality of virtual machines over a plurality of time steps. Based on the first virtual machine having executed (n) transaction requests in the plurality of transaction requests, the node detects whether any of the virtual machines has been compromised. In response to detecting the plurality of virtual machines includes a compromised virtual machine, the network node isolates the compromised virtual machine. Furthermore, after isolating the compromised virtual machine, the network node may receive a subsequent transaction request and dispatch the subsequent transaction request to the compromised virtual machine. The compromised virtual machine may execute the subsequent transaction request.
    Type: Application
    Filed: October 17, 2016
    Publication date: February 2, 2017
    Inventors: Judson Powers, Stephen K. Brueckner, Kenneth J. Thurber
  • Patent number: 9473526
    Abstract: A survivable network is described in which one or more network device includes enhanced functionality to fight through cyber attacks. A Fight-Through Node (FTN) is described, which may be a combined hardware/software system that enhances existing networks with survivability properties. A network node comprises a hardware-based processing system having a set of one or more processing units, a hypervisor executing on each one of the processing units, and a plurality of virtual machines executing on each of the hypervisor. The network node includes an application-level dispatcher to receive a plurality of transaction requests from a plurality of network communication session with a plurality of clients and distribute a copy of each of the transaction requests to the plurality of virtual machines executing on the network node over a plurality of time steps to form a processing pipeline of the virtual machines.
    Type: Grant
    Filed: July 27, 2015
    Date of Patent: October 18, 2016
    Assignee: Architecture Technology Corporation
    Inventors: Stephen K. Brueckner, Kenneth J. Thurber
  • Patent number: 9229936
    Abstract: This disclosure describes techniques for dynamically assembling and utilizing a pedigree of a resource. A pedigree of a resource is a set of statements that describe a provenance of the resource. As described herein, a document may include local pedigree fragments and optionally one or more pointers to remote pedigree fragments not locally stored in the document. A pedigree fragment, generally, is a data structure that specifies a direct relationship between a first resource, e.g., a primary resource, and a second resource from which an asserted fact of the first resource is derived. Because a pedigree fragment specifies such direct relationships, a set of pedigree fragments may be used to assemble the complete pedigree of resource.
    Type: Grant
    Filed: August 12, 2013
    Date of Patent: January 5, 2016
    Assignee: Architecture Technology Corporation
    Inventors: Kenneth J. Thurber, Robert A. Joyce, Julia A. Baker
  • Publication number: 20150334130
    Abstract: A survivable network is described in which one or more network device includes enhanced functionality to fight through cyber attacks. A Fight-Through Node (FTN) is described, which may be a combined hardware/software system that enhances existing networks with survivability properties. A network node comprises a hardware-based processing system having a set of one or more processing units, a hypervisor executing on each one of the processing units, and a plurality of virtual machines executing on each of the hypervisor. The network node includes an application-level dispatcher to receive a plurality of transaction requests from a plurality of network communication session with a plurality of clients and distribute a copy of each of the transaction requests to the plurality of virtual machines executing on the network node over a plurality of time steps to form a processing pipeline of the virtual machines.
    Type: Application
    Filed: July 27, 2015
    Publication date: November 19, 2015
    Inventors: Stephen K. Brueckner, Kenneth J. Thurber
  • Publication number: 20150309831
    Abstract: A server system receives messages from client computing devices. Each of the messages corresponds to a transaction. The server system assigns each respective transaction to a respective fresh virtual machine. Furthermore, the server system performs, as part of a respective virtual machine processing a respective transaction, a modification associated with the respective transaction to a shared database. The shared database is persisted independently of the plurality of virtual machines. In response to determining that processing of the respective transaction is complete, the server system discards the respective virtual machine. In response to a trigger, such as determining that the respective transaction is associated with a cyber-attack, the server system uses checkpoint data associated with the respective transaction to roll back the modifications associated with the respective transaction to the shared database.
    Type: Application
    Filed: July 2, 2015
    Publication date: October 29, 2015
    Inventors: Judson Powers, Stephen K. Brueckner, Robert A. Joyce, Kenneth J. Thurber
  • Patent number: 9144007
    Abstract: Method of communication, in a wireless infrastructure access network having a plurality of wireless-enabled network nodes (WNNs), with a wireless-enabled infrastructure gateway node (WIG) and a wireless infrastructure access network. A default unidirectional route is established from each of said plurality of wireless-enabled network nodes (WNNs) to said wireless-enabled infrastructure gateway node (WIG). A bi-directional packet pathway is established over said wireless infrastructure access network between any given one of said wireless-enabled network nodes (WNNs) and said wireless infrastructure gateway node (WIG) that satisfies a specified quality of service (QoS).
    Type: Grant
    Filed: October 16, 2009
    Date of Patent: September 22, 2015
    Assignee: Architecture Technology, Inc.
    Inventors: Ranga S. Ramanujan, Maher N. Kaddoura, Kenneth J. Thurber
  • Patent number: 9094449
    Abstract: A survivable network is described in which one or more network device includes enhanced functionality to fight through cyber attacks. A Fight-Through Node (FTN) is described, which may be a combined hardware/software system that enhances existing networks with survivability properties. A network node comprises a hardware-based processing system having a set of one or more processing units, a hypervisor executing on each one of the processing units, and a plurality of virtual machines executing on each of the hypervisor. The network node includes an application-level dispatcher to receive a plurality of transaction requests from a plurality of network communication session with a plurality of clients and distribute a copy of each of the transaction requests to the plurality of virtual machines executing on the network node over a plurality of time steps to form a processing pipeline of the virtual machines.
    Type: Grant
    Filed: January 27, 2014
    Date of Patent: July 28, 2015
    Assignee: Architecture Technology Corporation
    Inventors: Stephen K. Brueckner, Kenneth J. Thurber
  • Publication number: 20150046405
    Abstract: A server system receives messages from client computing devices. Each of the messages corresponds to a transaction. The server system assigns each respective transaction to a respective fresh virtual machine. Furthermore, the server system performs, as part of a respective virtual machine processing a respective transaction, a modification associated with the respective transaction to a shared database. The shared database is persisted independently of the plurality of virtual machines. In response to determining that processing of the respective transaction is complete, the server system discards the respective virtual machine. In response to determining that the respective transaction is associated with a cyber-attack, the server system uses checkpoint data associated with the respective transaction to roll back the modifications associated with the respective transaction to the shared database.
    Type: Application
    Filed: August 27, 2013
    Publication date: February 12, 2015
    Applicant: Architecture Technology Corporation
    Inventors: Stephen K. Brueckner, Robert A. Joyce, Carl Manson, Hajime Inoue, Kenneth J. Thurber
  • Publication number: 20140310810
    Abstract: A survivable network is described in which one or more network device includes enhanced functionality to fight through cyber attacks. A Fight-Through Node (FTN) is described, which may be a combined hardware/software system that enhances existing networks with survivability properties. A network node comprises a hardware-based processing system having a set of one or more processing units, a hypervisor executing on each one of the processing units, and a plurality of virtual machines executing on each of the hypervisor. The network node includes an application-level dispatcher to receive a plurality of transaction requests from a plurality of network communication session with a plurality of clients and distribute a copy of each of the transaction requests to the plurality of virtual machines executing on the network node over a plurality of time steps to form a processing pipeline of the virtual machines.
    Type: Application
    Filed: January 27, 2014
    Publication date: October 16, 2014
    Applicant: Architecture Technology Corporation
    Inventors: Stephen K. Brueckner, Kenneth J. Thurber
  • Patent number: 8839426
    Abstract: A server system receives messages from client computing devices. Each of the messages corresponds to a transaction. The server system assigns each respective transaction to a respective fresh virtual machine. Furthermore, the server system performs, as part of a respective virtual machine processing a respective transaction, a modification associated with the respective transaction to a shared database. The shared database is persisted independently of the plurality of virtual machines. In response to determining that processing of the respective transaction is complete, the server system discards the respective virtual machine. In response to determining that the respective transaction is associated with a cyber-attack, the server system uses checkpoint data associated with the respective transaction to roll back the modifications associated with the respective transaction to the shared database.
    Type: Grant
    Filed: August 29, 2013
    Date of Patent: September 16, 2014
    Assignee: Architecture Technology Corporation
    Inventors: Stephen K. Brueckner, Robert A. Joyce, Carl Manson, Hajime Inoue, Kenneth J. Thurber
  • Patent number: 8640238
    Abstract: A survivable network is described in which one or more network device includes enhanced functionality to fight through cyber attacks. A Fight-Through Node (FTN) is described, which may be a combined hardware/software system that enhances existing networks with survivability properties. A network node comprises a hardware-based processing system having a set of one or more processing units, and a hypervisor executing on each one of the processing units; and a plurality of virtual machines executing on each of the hypervisor. The network node includes an application-level dispatcher to receive a plurality of transaction requests from a plurality of network communication session with a plurality of clients and distribute a copy of each of the transaction requests to the plurality of virtual machines executing on the network node over a plurality of time steps to form a processing pipeline of the virtual machines.
    Type: Grant
    Filed: January 17, 2012
    Date of Patent: January 28, 2014
    Assignee: Architecture Technology Corporation
    Inventors: Stephen K. Brueckner, Kenneth J. Thurber
  • Publication number: 20130325889
    Abstract: This disclosure describes techniques for dynamically assembling and utilizing a pedigree of a resource. A pedigree of a resource is a set of statements that describe a provenance of the resource. As described herein, a document may include local pedigree fragments and optionally one or more pointers to remote pedigree fragments not locally stored in the document. A pedigree fragment, generally, is a data structure that specifies a direct relationship between a first resource, e.g., a primary resource, and a second resource from which an asserted fact of the first resource is derived. Because a pedigree fragment specifies such direct relationships, a set of pedigree fragments may be used to assemble the complete pedigree of resource.
    Type: Application
    Filed: August 12, 2013
    Publication date: December 5, 2013
    Applicant: Architecture Technology Corporation
    Inventors: Kenneth J. Thurber, Robert A. Joyce, Julia A. Baker
  • Publication number: 20130067574
    Abstract: A survivable network is described in which one or more network device includes enhanced functionality to fight through cyber attacks. A Fight-Through Node (FTN) is described, which may be a combined hardware/software system that enhances existing networks with survivability properties. A network node comprises a hardware-based processing system having a set of one or more processing units, and a hypervisor executing on each one of the processing units; and a plurality of virtual machines executing on each of the hypervisor. The network node includes an application-level dispatcher to receive a plurality of transaction requests from a plurality of network communication session with a plurality of clients and distribute a copy of each of the transaction requests to the plurality of virtual machines executing on the network node over a plurality of time steps to form a processing pipeline of the virtual machines.
    Type: Application
    Filed: January 17, 2012
    Publication date: March 14, 2013
    Applicant: ARCHITECTURE TECHNOLOGY CORPORATION
    Inventors: Stephen K. Brueckner, Kenneth J. Thurber
  • Publication number: 20110090843
    Abstract: Method of communication, in a wireless infrastructure access network having a plurality of wireless-enabled network nodes (WNNs), with a wireless-enabled infrastructure gateway node (WIG) and a wireless infrastructure access network. A default unidirectional route is established from each of said plurality of wireless-enabled network nodes (WNNs) to said wireless-enabled infrastructure gateway node (WIG). A bi-directional packet pathway is established over said wireless infrastructure access network between any given one of said wireless-enabled network nodes (WNNs) and said wireless infrastructure gateway node (WIG) that satisfies a specified quality of service (QoS).
    Type: Application
    Filed: October 16, 2009
    Publication date: April 21, 2011
    Inventors: Ranga S. Ramanujan, Maher N. Kaddoura, Kenneth J. Thurber
  • Patent number: 4155119
    Abstract: A method of addressing memory in a digital computer where a plurality of devices are connected to a single input/output channel to the digital computer communicate with the digital computer by externally specifying the memory address of the data word or words to be transferred to or from the digital computer. More specifically, the invention provides a method for treating the externally specified address coming from one of the multiple devices external to the digital computer as a virtual address. Thus, an input/output process operating in the digital computer may operate within the digital computer's system virtual address space. This method allows input/output processes to be able to utilize the address mapping subsystem of the central processor of the digital computer. The method of memory addressing utilizes a subchannel page table for each one of the multiple devices connected to one input/output channel in addition to a channel page table utilized for each individual input/output channel.
    Type: Grant
    Filed: September 21, 1977
    Date of Patent: May 15, 1979
    Assignee: Sperry Rand Corporation
    Inventors: Robert C. De Ward, Kenneth J. Thurber
  • Patent number: 4128875
    Abstract: The present invention relates to a memory addressing mechanism which has been formulated to accommodate three address structures: real, based and virtual. To accomplish this result the address generation function in the memory addressing mechanism has been separated into two distinct parts, address computation and address translation. By merely changing the hardware components in the address translation part of the memory addressing mechanism and leaving the hardware in the address computation part constant, an optional memory addressing mechanism which supports either a real address structure, a based address structure or a virtual address structure can be implemented.Further, the present invention with the virtual address translation apparatus in cooperation with the fixed address computation apparatus provides a virtual addressing mechanism which will compute and retrieve a memory word utilizing a four-segment memory address with only two memory references.
    Type: Grant
    Filed: December 16, 1976
    Date of Patent: December 5, 1978
    Assignee: Sperry Rand Corporation
    Inventors: Kenneth J. Thurber, Jon C. Strauss