Patents Assigned to Keyw Corporation
-
Patent number: 10063429Abstract: Disclosed herein are systems and methods to integrate and manage a computer network operations (CNO) infrastructure. A framework may include CNO applications that are used to find a target computer system, breach the target, extract data therefrom and analyze the data. A CNO organization in a secure network can use the framework to maintain, manage and monitor CNO applications in an unsecured network without compromising security from counter-attacks. The framework remains engaged with targeted computer systems during routine maintenance, management and monitoring processes to mitigate loss of mission opportunities. The framework utilizes virtual instances to provision CNO capabilities for missions operations that couple the secure and unsecured networks in an asynchronous manner while allowing bidirectional communications between the framework and computers on their respective network.Type: GrantFiled: April 9, 2014Date of Patent: August 28, 2018Assignee: THE KEYW CORPORATIONInventors: Chad Caison, Carol O. Lloyd, Eamon Walsh, Tejas Hemant Patel, Chris Fanning
-
Patent number: 9848697Abstract: One modular aviation equipment rack has vertical and horizontal tubing members fixed together via a plurality of identical corner pieces to form a rectangular frame. Two opposing faces of each vertical tubing member have holes drilled therein in a repeating pattern, and two opposing faces of each horizontal tubing member have holes drilled therein in a repeating pattern. Each corner piece has a vertical flange received by a vertical tubing member, and a lateral flange received by a horizontal tubing member. Each vertical flange has apertures corresponding to the vertical tubing member holes, and each lateral flange has apertures corresponding to the horizontal tubing member holes. Two of the vertical tubing members are coplanar, and a backer strip is secured to a back face of one of the coplanar members. The backer strip is configured to provide electrical ground for the rack.Type: GrantFiled: October 20, 2015Date of Patent: December 26, 2017Assignee: The KEYW CorporationInventors: John Andrew Eichelberger, Richard Coveno, Jason Osterberg
-
Patent number: 9215208Abstract: A network system for launching a cyber-offensive countermeasure to improve network security is provided. For example, a system that enables launching a cyber-offensive countermeasure on a network may include a receiving section that receives packets routed on the network and analyzes the received packets to detect an attack directed toward a device on the network when the attack is external to the device, an editing section that edits the received packets, and a transmitting section that transmits the edited packets on the network.Type: GrantFiled: August 14, 2013Date of Patent: December 15, 2015Assignee: The KEYW CorporationInventors: John Fraize, Darrell Covell, Thomas Williams, Stephanie Tomanek
-
Publication number: 20150331808Abstract: Systems and processes for filtering network traffic. In one example, an event based flow record aging process may be used to identify flow records to be removed from memory to provide space for newer flow records. In this example, a new incoming network packet may trigger a determination of the flow record to be removed from memory based on the hardware time stamps of the flow records stored in memory. Determining aging flow records in this way may advantageously reduce the amount of computer resources required to manage flow record aging when compared to traditional techniques that require keeping a timer and periodically performing a cleanup process to check the freshness date of each flow record.Type: ApplicationFiled: July 22, 2015Publication date: November 19, 2015Applicant: THE KEYW CORPORATIONInventors: John FRAIZE, Darrell COVELL, Thomas WILLIAMS, Stephanie TOMANEK
-
Publication number: 20150295751Abstract: Disclosed herein are systems and methods to integrate and manage a computer network operations (CNO) infrastructure. A framework may include CNO applications that are used to find a target computer system, breach the target, extract data therefrom and analyze the data. A CNO organization in a secure network can use the framework to maintain, manage and monitor CNO applications in an unsecured network without compromising security from counter-attacks. The framework remains engaged with targeted computer systems during routine maintenance, management and monitoring processes to mitigate loss of mission opportunities. The framework utilizes virtual instances to provision CNO capabilities for missions operations that couple the secure and unsecured networks in an asynchronous manner while allowing bidirectional communications between the framework and computers on their respective network.Type: ApplicationFiled: April 9, 2014Publication date: October 15, 2015Applicant: THE KEYW CORPORATIONInventors: Chad CAISON, Carol O. LLOYD, Eamon WALSH, Tejas Hemant PATEL, Chris FANNING
-
Patent number: 9154461Abstract: Systems and processes for filtering network traffic. In one example, an event based flow record aging process may be used to identify flow records to be removed from memory to provide space for newer flow records. In this example, a new incoming network packet may trigger a determination of the flow record to be removed from memory based on the hardware time stamps of the flow records stored in memory. Determining aging flow records in this way may advantageously reduce the amount of computer resources required to manage flow record aging when compared to traditional techniques that require keeping a timer and periodically performing a cleanup process to check the freshness date of each flow record.Type: GrantFiled: May 16, 2013Date of Patent: October 6, 2015Assignee: THE KEYW CORPORATIONInventors: John Fraize, Darrell Covell, Thomas Williams, Stephanie Tomanek
-
Publication number: 20150169808Abstract: Enterprise-scalable model-based analytics systems are disclosed. One example system may organize an analytic process in the form of an analytic model containing interconnected functional components, with each functional component containing a specific algorithm or analysis technique for fetching, manipulating, or analyzing data. A user may generate an analytic model designed to perform a desired analytic process by placing sub-analytic models and/or functional components in a particular configuration within a graphical user interface by dragging and dropping the sub-analytic models and/or functional components. The resulting process represented by the analytic model may depend on the sub-analytic models and/or functional components within the analytic model and the way they are interconnected. The resulting analytic model may be saved and distributed to other users for use and/or modification.Type: ApplicationFiled: February 25, 2015Publication date: June 18, 2015Applicant: THE KEYW CORPORATIONInventors: David A. MANLEY, Gabe E. GOLDHIRSH
-
Publication number: 20140324875Abstract: Systems and processes for managing data using a composite index formed from a major sub-index and zero or more minor sub-indexes are described. Updates to the data may be cached in memory. When the cache memory becomes full, the contents of the cache may be sorted and stored as entries in a minor sub-index in a hard-disk drive with a single streaming disk write. In response to a threshold condition, the major sub-index may be updated using streaming disk accesses based on the entries in the minor sub-indexes. Once the major sub-index is updated to include all of the updates from the minor sub-indexes, the minor sub-indexes may be deleted.Type: ApplicationFiled: April 29, 2013Publication date: October 30, 2014Applicant: KEYW CORPORATIONInventors: David A. GUDEMAN, Khoa Duy NGUYEN, Ramarao YENDLURI
-
Publication number: 20140283064Abstract: A network system for launching a cyber-offensive countermeasure to improve network security is provided. For example, a system that enables launching a cyber-offensive countermeasure on a network may include a receiving section that receives packets routed on the network and analyzes the received packets to detect an attack directed toward a device on the network when the attack is external to the device, an editing section that edits the received packets, and a transmitting section that transmits the edited packets on the network.Type: ApplicationFiled: August 14, 2013Publication date: September 18, 2014Applicant: THE KEYW CORPORATIONInventors: John FRAIZE, Darrell COVELL, Thomas WILLIAMS, Stephanie TOMANEK
-
Patent number: 8803467Abstract: A partial arc servomotor assembly having a curvilinear U-channel with two parallel rare earth permanent magnet plates facing each other and a pivoted ironless three phase coil armature winding moves between the plates. An encoder read head is fixed to a mounting plate above the coil armature winding and a curvilinear encoder scale is curved to be co-axis with the curvilinear U-channel permanent magnet track formed by the permanent magnet plates. Driven by a set of miniaturized power electronics devices closely looped with a positioning feedback encoder, the angular position and velocity of the pivoted payload is programmable and precisely controlled.Type: GrantFiled: October 14, 2011Date of Patent: August 12, 2014Assignee: The Keyw CorporationInventor: Xiuhong Sun
-
Patent number: 8462209Abstract: A portable, aerial, dual-swath photogrammetric imaging system comprising twin nadir pointing CCD cameras for simultaneously acquiring twin adjacent digital images for merging into a large panorama. A pair of lens shifters symmetrically shift twin images to the left and right sides of the focal points of two parallel lenses to extend imaging swathwidth. The twin adjacent images of the imaging system have a strip of narrow overlap at the center of the whole scene that are reserved for photogrammetric processing and stitching twin images into a seamless panorama. Each camera is connected to an embedded computer which controls imaging data acquisition, attaches GPS/IMU measurements, generates KML metadata files for its snapshots, and stores acquired images and metadata into removable SSDs. Direct geo-referenced panoramic digital stills are immediately registered on to Googleâ„¢ Earth precisely. Its images can be further processed for advanced mapping, change detection and GIS applications.Type: GrantFiled: June 26, 2009Date of Patent: June 11, 2013Assignee: Keyw CorporationInventor: Xiuhong Sun
-
Publication number: 20120206081Abstract: A partial arc servomotor assembly having a curvilinear U-channel with two parallel rare earth permanent magnet plates facing each other and a pivoted ironless three phase coil armature winding moves between the plates. An encoder read head is fixed to a mounting plate above the coil armature winding and a curvilinear encoder scale is curved to be co-axis with the curvilinear U-channel permanent magnet track formed by the permanent magnet plates. Driven by a set of miniaturized power electronics devices closely looped with a positioning feedback encoder, the angular position and velocity of the pivoted payload is programmable and precisely controlled.Type: ApplicationFiled: October 14, 2011Publication date: August 16, 2012Applicant: THE KEYW CORPORATIONInventor: Xiuhong Sun