Abstract: A computer-implemented method for assessing an image sentiment. The method can include receiving an image to identify a region of interest in the image; determining an image sentiment value associated with the image based on the region of interest, or a classification of the image; and displaying an indication of the image sentiment value with a spatial (e.g. geographical) location.
Type:
Application
Filed:
February 22, 2019
Publication date:
August 27, 2020
Applicant:
Booz Allen Hamilton Inc.
Inventors:
Catherine Ordun, Andrea Blackwell, Jo Clark, Erin Bradford, Nathan Schwan, Saba Ali, Michael Joyce, Nat Burgwyn, Kevin Chiu, Carver Sorensen, Michael Tong
Abstract: A system for enhancing efficiency of an enterprise network via electronic currency communication within the enterprise network. The system can include a first client computer configured to create a first electronic message, and a transaction database configured to store electronic currency. The system can include a server to receive the first electronic message from the first client computer, wherein the server includes an assessment module and an embedding module. The system can include a second client computer to receive the first electronic message containing the metadata from the server, parse the first electronic message containing the metadata to obtain an offer associated with the executable task, and determine whether to accept the offer. The server can include a reallocation module to reallocate network resources based on first client computer behavior data, second client computer behavior data, timestamp data, network topology data, network transactions data, network traffic data.
Type:
Application
Filed:
February 13, 2019
Publication date:
August 13, 2020
Applicant:
BOOZ ALLEN HAMILTON INC.
Inventors:
Mark Becker, Paul-Sung Hong, Matthew E. Lee
Abstract: A vehicle can be configured to include a body having a body bottom conjoined with a body sidewall and a body top forming a body cavity. The body top includes a body top opening and the body sidewall includes a body sidewall opening. The vehicle can include a payload housing having a payload bottom conjoined with a payload housing sidewall and a payload housing top forming a payload housing cavity, wherein the payload housing cavity is configured to hold at least one operating module for the vehicle. The vehicle can include at least one arm. The vehicle can include at least one interlocking arrangement of the body top opening or body side wall configured to removably secure the payload housing and the at least one arm to the body. Each of the body, the payload housing, and the at least one arm can be structured with additive manufactured material.
Type:
Application
Filed:
February 11, 2019
Publication date:
August 13, 2020
Applicant:
Booz Allen Hamilton Inc.
Inventors:
Jason Sebastian, Robyn Kincade, Catherine Henderson, Bradley Evans, Jacques Davignon, Ryan Fernandez, Jeff Dowell
Abstract: A computer-automated method for securing unidirectional communication within a network. The method includes orchestrating an automated arrangement and/or coordination of at least one portion of a message using a top level orchestration server, transmitting a first data packet from the top level orchestration server to a first top level backbone server, wherein the first data packet is a first portion of the message, and authenticating the first data packet using the first top level backbone server. The method can include transmitting a second data packet from the first top level backbone server to a second top level backbone server, wherein the second data packet is a second portion of the message and/or the second data packet includes a modified first data packet, and authenticating the second data packet using the second top level backbone server.
Type:
Application
Filed:
April 8, 2020
Publication date:
July 30, 2020
Applicant:
BOOZ ALLEN HAMILTON INC.
Inventors:
Evan MONTGOMERY-RECHT, James J. TER BEEST
Abstract: An exemplary mobile computing device includes an interface configured to wirelessly receive a control policy from an antenna; a processor configured to enforce the received control policy; and memory configured to store the received control policy and retain a last-received control policy for enforcement by the processor when the interface is outside an antenna range to wirelessly receive any control policy.
Type:
Grant
Filed:
April 15, 2019
Date of Patent:
June 30, 2020
Assignee:
BOOZ ALLEN HAMILTON INC.
Inventors:
Gary Jason Myers, Matthias Welsh, Robert Wayne Knight, Timothy Schaefer
Abstract: Biometrics fingerprint matching has been done with a heavily hand-tuned and designed process of classical computer vision techniques for several decades. This approach has led to accurate solutions for solving crimes today and, as such, little effort has been devoted to using deep learning in this domain. Exemplary embodiments disclosed herein leverage synthetic data generators to train a neural fingerprint enhancer to improve matching accuracy on real fingerprint images.
Abstract: An exemplary system and method for generating a network diagram. The system includes a first interface for receiving one or more first datasets of network data. A processor configured to generate a first network diagram and identify changes in a network by overlaying one or more network diagram layers or a second network diagram on the first network diagram. The one or more network diagram layers corresponding to captured packets of the first datasets or of second datasets and the second network diagram corresponding to captured packets of the second datasets. A second interface for graphically displaying the network diagram by highlighting and/or animating one or more nodes and/or node connections based on at least one of the identified changes from the overlay.
Abstract: An exemplary mobile computing device includes an interface configured to wirelessly receive a control policy from an antenna; a processor configured to enforce the received control policy; and memory configured to store the received control policy and retain a last-received control policy for enforcement by the processor when the interface is outside an antenna range to wirelessly receive any control policy.
Type:
Grant
Filed:
April 15, 2019
Date of Patent:
May 26, 2020
Assignee:
BOOZ ALLEN HAMILTON INC.
Inventors:
Gary Jason Myers, Matthias Welsh, Robert Wayne Knight, Timothy Schaefer
Abstract: A vehicle guidance system, including: sensors to detect a surface pressure distribution for a respective location of the corresponding sensor on a vehicle, respectively; and a controller to receive an initial value for a Mach number; and calculate a converged value for an angle of attack based on first surface pressure data from a first set of the sensors, and a converged sideslip angle value based on second surface pressure data from a second set of the sensors. The controller calculates a freestream dynamic pressure based on the initial Mach number, the converged angle of attack, and the converged sideslip angle value, and calculates a freestream pressure, and calculates a converged value for Mach number based on the freestream pressure and the freestream dynamic pressure. A flight control processor provides an output for adjusting an orientation of the vehicle based on the converged Mach number and the freestream pressure.
Abstract: A computer-automated method for securing unidirectional communication within a network. The method includes orchestrating an automated arrangement and/or coordination of at least one portion of a message using a top-level orchestration server, transmitting a first data packet from the top-level orchestration server to a first top-level backbone server, wherein the first data packet is a first portion of the message, and authenticating the first data packet using the first top-level backbone server. The method can include transmitting a second data packet from the first top-level backbone server to a second top-level backbone server, wherein the second data packet is a second portion of the message and/or the second data packet includes a modified first data packet and authenticating the second data packet using the second top-level backbone server.
Type:
Grant
Filed:
July 24, 2018
Date of Patent:
May 12, 2020
Assignee:
BOOZ ALLEN HAMILTON, INC.
Inventors:
Evan Montgomery-Recht, James J. Ter Beest
Abstract: A method for securing a network by applying one or more artificial intelligence (AI) models in a computing environment with a computing speed selected as a function of a bandwidth of the network. The method includes receiving data at a node associated with the network, and identifying a suspected cyber adversarial event at the network. The method includes applying an AI model on the data in real-time to enrich the data with information that indicates behavior associated with an exploitation of the network, and analyzing the enriched data as part of a cyber workflow for an indication of a compromise associated with the exploitation of the network.
Type:
Application
Filed:
October 22, 2018
Publication date:
April 23, 2020
Applicant:
Booz Allen Hamilton Inc.
Inventors:
Aaron Sant-Miller, Greg McCullough, James Blaha, Morris LaGrand, Rachel Allen, Peter Guerra, Patrick Beggs
Abstract: A system for issuing a certificate to permit access to information, the system including: an identification service to receive dynamic biometric and contextual data regarding an individual located within an area, and to receive at least one of stored identity, biometric, and contextual data for a given individual to provide an identity estimate and a level of certainty indicator of a match based on comparison of the biometric and contextual data regarding the individual to the biometric and contextual data regarding the subscribers; a registration authority to receive the identity estimate and the level of certainty indicator, and to determine whether a certificate should be issued to an individual based on the level of certainty indicator; and a certificate authority to issue the certificate upon determining that the certificate should be issued, wherein the certificate will allow an individual to use the computing device to access an information system.
Abstract: A device for obtaining surveillance information from an aerial vehicle. The device includes a camera configured to obtain image data based on a position of the vehicle, a transceiver configured to receive operator controls and output the obtained image data, a designator unit configured to emit a light source onto a surface of an object of interest to illuminate that surface when a designation command is received from an operator, a gimbal mechanism having a plurality of motors configured to orient the designator unit, a gimbal controller configured to control the motors of the gimbal mechanism, and a controller configured to control the designator unit to continuously emit the light source onto the surface of the object irrespective of the position of the vehicle. The controller compensates for an orientation of the designator unit based on the aerial vehicle's movement such that the designator unit continuously illuminates the object.
Type:
Grant
Filed:
November 17, 2017
Date of Patent:
April 14, 2020
Assignee:
BOOZ ALLEN HAMILTON INC.
Inventors:
James Edward Freeman, Dylan Christopher Williams, Richard Charles Barrett, Dakota Robert Baber, Maria Medina
Abstract: A system and method are disclosed for collecting and analyzing data in a cognitive fabric. The system can include a network of intelligent nodes, each node being configured for sharing or receiving data as a function of analytic processing to be performed at the node.
Type:
Application
Filed:
October 8, 2019
Publication date:
April 9, 2020
Applicant:
Booz Allen Hamilton Inc.
Inventors:
Ki Hyun LEE, John David PISANO, Saurin Pankaj SHAH, Andre Tai NGUYEN, Yuxun LEI, Christopher BROWN, Michael BECKER
Abstract: A method and system are disclosed for acquiring and processing data, the exemplary system includes: one or more intelligent devices connected in a dynamic ad hoc network as a network of edge devices which can optionally access a cloud storage, at least one intelligent device being configured with a software installation to selectively receive and execute analytics on data received; at least one of the intelligent devices being configured to identify data to be requested from at least one other edge device for enhancing analytics performed on the at least one intelligent device; and a switchboard for maintaining a current view of resources in the network, and functions for which each resource is tasked, the resources including the at least one intelligent device and those edge devices which can communicate with the at least one intelligent device on the network.
Type:
Application
Filed:
October 8, 2019
Publication date:
April 9, 2020
Applicant:
Booz Allen Hamilton Inc.
Inventors:
Raymond Charles HARDMAN, III, Ki Hyun LEE, Tyler James ALSTON, Rohit Leena MADHU, Parisa GANDOMKAR YARANDI
Abstract: Vulnerable code allows outside actors to interfere with the normal operation of current systems. To help defend against these outside actors, it is desirable to identify vulnerabilities in existing systems, including systems where the original source code is not available for study. Described herein are methods for identifying functional attributes that change the intended operation of a compiled binary extracted from a target system.
Type:
Grant
Filed:
October 26, 2018
Date of Patent:
April 7, 2020
Assignee:
BOOZ ALLEN HAMILTON INC.
Inventors:
Joshua Jones, Benjamin Demick, Malachi Jones, Matthew Chung, Michael Schroeder, Thomas Scida
Abstract: A method and system for determining the location of objects using a plurality of full motion video cameras where the location is based on the intersecting portions of a plurality of three-dimensional shapes that are generated from the video data provided by the cameras. The three-dimensional shapes include two-dimensional shapes that contain predetermined traits in each of the frames of the video signals.
Type:
Grant
Filed:
October 2, 2018
Date of Patent:
March 31, 2020
Assignee:
BOOZ ALLEN HAMILTON INC.
Inventors:
James J. Ter Beest, III, Evan R. Montgomery-Recht
Abstract: Disclosed is a system for updating a reference time from a decaying rotational period of a pulsar. The system can include: a database (DB) configured to store: coordinates for a pulsar; a recorded rate of rotation (RROR) for the pulsar; a rotational rate of decay (RROD) function for the pulsar; and a recorded reference time for the pulsar. A sensor can be configured to collect electromagnetic pulsar radiation from the pulsar and generate sensor data. A signal processor module can be configured to receive the sensor data, generate an observed rate of rotation (OROR) signal profile, generate a current rate of rotation (CROR) for the pulsar from the OROR signal profile, and update the RROR from the CROR. A time processor module can be configured to receive the RROD function and the CROR, and to solve the RROD function to output a reference time of the pulsar.
Type:
Application
Filed:
September 14, 2018
Publication date:
March 19, 2020
Applicant:
Booz Allen Hamilton Inc.
Inventors:
William MacLeod, James Ter Beest, Gideon Bass
Abstract: A projectile device for establishing a wireless network and transmitting data within the network. The projectile device includes a motion sensor configured to measure at least one of an acceleration, angular velocity, or an orientation of the projectile device; an antenna configured for communication within a wireless network between the projectile device and at least one external device. The projectile device includes a processor configured to establish communication in the wireless network for receiving and/or transmitting a message between the projectile device and the at least one external device via the antenna and a wireless protocol that is determined by at least one of the acceleration, angular velocity, or orientation of the projectile device. The projectile device includes a damping agent arranged to impact movement of components of the projectile device, wherein a form factor of the projectile device is complimentary with a launching mechanism of the projectile device.
Abstract: A computer-automated method for securing unidirectional communication within a network. The method includes orchestrating an automated arrangement and/or coordination of at least one portion of a message using a top-level orchestration server, transmitting a first data packet from the top-level orchestration server to a first top-level backbone server, wherein the first data packet is a first portion of the message, and authenticating the first data packet using the first top-level backbone server. The method can include transmitting a second data packet from the first top-level backbone server to a second top-level backbone server, wherein the second data packet is a second portion of the message and/or the second data packet includes a modified first data packet and authenticating the second data packet using the second top-level backbone server.
Type:
Application
Filed:
July 24, 2018
Publication date:
January 30, 2020
Applicant:
BOOZ ALLEN HAMILTON INC.
Inventors:
Evan MONTGOMERY-RECHT, James J. TER BEEST