Patents by Inventor Stephen K. Brueckner

Stephen K. Brueckner has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10872539
    Abstract: An example method includes outputting a graphical dashboard that includes one or more learning objective nodes and one or more skill nodes, selecting one or more software agents that are associated with the one or more skill nodes, providing, to at least one host computing system, an indication of the one or more software agents that are configured to collect parameter data from the at least one host computing system while a trainee performs actions, receiving the parameter data collected by the one or more software agents during execution, determining, based on the parameter data, that the one or more skills represented by the one or more skill nodes have been demonstrated by the trainee, and updating the one or more skill nodes to graphically indicate that one or more represented skills have been demonstrated.
    Type: Grant
    Filed: September 21, 2018
    Date of Patent: December 22, 2020
    Assignee: ARCHITECTURE TECHNOLOGY CORPORATION
    Inventors: Stephen K. Brueckner, Matthew P. Donovan
  • Patent number: 10777093
    Abstract: This disclosure generally relates to automated execution and evaluation of computer network training exercises, such as in a virtual machine environment. An example environment includes a control and monitoring system, an attack system, and a target system. The control and monitoring system initiates a training scenario to cause the attack system to engage in an attack against the target system. The target system then performs an action in response to the attack. Monitor information associated with the attack against the target system is collected by continuously monitoring the training scenario. The attack system is then capable of sending dynamic response data to the target system, wherein the dynamic response data is generated according to the collected monitor information to adapt the training scenario to the action performed by the target system. The control and monitoring system then generates an automated evaluation based upon the collected monitor information.
    Type: Grant
    Filed: August 9, 2018
    Date of Patent: September 15, 2020
    Assignee: ARCHITECTURE TECHNOLOGY CORPORATION
    Inventors: Stephen K. Brueckner, Frank N. Adelstein, Haim Yehuda Bar, Matthew P. Donovan
  • Patent number: 10083624
    Abstract: An example method includes outputting a graphical dashboard that includes one or more learning objective nodes and one or more skill nodes, selecting one or more software agents that are associated with the one or more skill nodes, providing, to at least one host computing system, an indication of the one or more software agents that are configured to collect parameter data from the at least one host computing system while a trainee performs actions, receiving the parameter data collected by the one or more software agents during execution, determining, based on the parameter data, that the one or more skills represented by the one or more skill nodes have been demonstrated by the trainee, and updating the one or more skill nodes to graphically indicate that one or more represented skills have been demonstrated.
    Type: Grant
    Filed: July 28, 2015
    Date of Patent: September 25, 2018
    Assignee: Architecture Technology Corporation
    Inventors: Stephen K. Brueckner, Matthew P. Donovan
  • Patent number: 10068493
    Abstract: This disclosure generally relates to automated execution and evaluation of computer network training exercises, such as in a virtual machine environment. An example environment includes a control and monitoring system, an attack system, and a target system. The control and monitoring system initiates a training scenario to cause the attack system to engage in an attack against the target system. The target system then performs an action in response to the attack. Monitor information associated with the attack against the target system is collected by continuously monitoring the training scenario. The attack system is then capable of sending dynamic response data to the target system, wherein the dynamic response data is generated according to the collected monitor information to adapt the training scenario to the action performed by the target system. The control and monitoring system then generates an automated evaluation based upon the collected monitor information.
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: September 4, 2018
    Assignee: Architecture Technology Corporation
    Inventors: Stephen K. Brueckner, Frank N. Adelstein, Haim Yehuda Bar, Matthew P. Donovan
  • Patent number: 9838415
    Abstract: A network node includes enhanced functionality to fight through cyber-attacks. A plurality of virtual machines run at the network node. The network node receives a plurality of transaction requests and distributes a copy of each of the transaction requests to the plurality of virtual machines over a plurality of time steps. Based on the first virtual machine having executed (n) transaction requests in the plurality of transaction requests, the node detects whether any of the virtual machines has been compromised. In response to detecting the plurality of virtual machines includes a compromised virtual machine, the network node isolates the compromised virtual machine. Furthermore, after isolating the compromised virtual machine, the network node may receive a subsequent transaction request and dispatch the subsequent transaction request to the compromised virtual machine. The compromised virtual machine may execute the subsequent transaction request.
    Type: Grant
    Filed: October 17, 2016
    Date of Patent: December 5, 2017
    Assignee: Architecture Technology Corporation
    Inventors: Judson Powers, Stephen K. Brueckner, Kenneth J. Thurber
  • Patent number: 9769250
    Abstract: A server system receives messages from client computing devices. Each of the messages corresponds to a transaction. The server system assigns each respective transaction to a respective fresh virtual machine. Furthermore, the server system performs, as part of a respective virtual machine processing a respective transaction, a modification associated with the respective transaction to a shared database. The shared database is persisted independently of the plurality of virtual machines. In response to determining that processing of the respective transaction is complete, the server system discards the respective virtual machine. In response to a trigger, such as determining that the respective transaction is associated with a cyber-attack, the server system uses checkpoint data associated with the respective transaction to roll back the modifications associated with the respective transaction to the shared database.
    Type: Grant
    Filed: July 2, 2015
    Date of Patent: September 19, 2017
    Assignee: Architecture Technology Corporation
    Inventors: Judson Powers, Stephen K. Brueckner, Robert A. Joyce, Kenneth J. Thurber
  • Patent number: 9766986
    Abstract: A server system receives messages from client computing devices. Each of the messages corresponds to a transaction. The server system assigns each respective transaction to a respective fresh virtual machine. Furthermore, the server system performs, as part of a respective virtual machine processing a respective transaction, a modification associated with the respective transaction to a shared database. The shared database is persisted independently of the plurality of virtual machines. In response to determining that processing of the respective transaction is complete, the server system discards the respective virtual machine. In response to determining that the respective transaction is associated with a cyber-attack, the server system uses checkpoint data associated with the respective transaction to roll back the modifications associated with the respective transaction to the shared database.
    Type: Grant
    Filed: August 27, 2013
    Date of Patent: September 19, 2017
    Assignee: Architecture Technology Corporation
    Inventors: Stephen K. Brueckner, Robert A. Joyce, Carl Manson, Hajime Inoue, Kenneth J. Thurber
  • Publication number: 20170032695
    Abstract: This disclosure generally relates to automated execution and evaluation of computer network training exercises, such as in a virtual machine environment. An example environment includes a control and monitoring system, an attack system, and a target system. The control and monitoring system initiates a training scenario to cause the attack system to engage in an attack against the target system. The target system then performs an action in response to the attack. Monitor information associated with the attack against the target system is collected by continuously monitoring the training scenario. The attack system is then capable of sending dynamic response data to the target system, wherein the dynamic response data is generated according to the collected monitor information to adapt the training scenario to the action performed by the target system. The control and monitoring system then generates an automated evaluation based upon the collected monitor information.
    Type: Application
    Filed: June 30, 2016
    Publication date: February 2, 2017
    Inventors: Stephen K. Brueckner, Frank N. Adelstein, Haim Yehuda Bar, Matthew P. Donovan
  • Publication number: 20170034198
    Abstract: A network node includes enhanced functionality to fight through cyber-attacks. A plurality of virtual machines run at the network node. The network node receives a plurality of transaction requests and distributes a copy of each of the transaction requests to the plurality of virtual machines over a plurality of time steps. Based on the first virtual machine having executed (n) transaction requests in the plurality of transaction requests, the node detects whether any of the virtual machines has been compromised. In response to detecting the plurality of virtual machines includes a compromised virtual machine, the network node isolates the compromised virtual machine. Furthermore, after isolating the compromised virtual machine, the network node may receive a subsequent transaction request and dispatch the subsequent transaction request to the compromised virtual machine. The compromised virtual machine may execute the subsequent transaction request.
    Type: Application
    Filed: October 17, 2016
    Publication date: February 2, 2017
    Inventors: Judson Powers, Stephen K. Brueckner, Kenneth J. Thurber
  • Publication number: 20170032694
    Abstract: An example method includes outputting a graphical dashboard that includes one or more learning objective nodes and one or more skill nodes, selecting one or more software agents that are associated with the one or more skill nodes, providing, to at least one host computing system, an indication of the one or more software agents that are configured to collect parameter data from the at least one host computing system while a trainee performs actions, receiving the parameter data collected by the one or more software agents during execution, determining, based on the parameter data, that the one or more skills represented by the one or more skill nodes have been demonstrated by the trainee, and updating the one or more skill nodes to graphically indicate that one or more represented skills have been demonstrated.
    Type: Application
    Filed: July 28, 2015
    Publication date: February 2, 2017
    Inventors: Stephen K. Brueckner, Matthew P. Donovan
  • Patent number: 9473526
    Abstract: A survivable network is described in which one or more network device includes enhanced functionality to fight through cyber attacks. A Fight-Through Node (FTN) is described, which may be a combined hardware/software system that enhances existing networks with survivability properties. A network node comprises a hardware-based processing system having a set of one or more processing units, a hypervisor executing on each one of the processing units, and a plurality of virtual machines executing on each of the hypervisor. The network node includes an application-level dispatcher to receive a plurality of transaction requests from a plurality of network communication session with a plurality of clients and distribute a copy of each of the transaction requests to the plurality of virtual machines executing on the network node over a plurality of time steps to form a processing pipeline of the virtual machines.
    Type: Grant
    Filed: July 27, 2015
    Date of Patent: October 18, 2016
    Assignee: Architecture Technology Corporation
    Inventors: Stephen K. Brueckner, Kenneth J. Thurber
  • Patent number: 9384677
    Abstract: This disclosure generally relates to automated execution and evaluation of computer network training exercises, such as in a virtual machine environment. An example environment includes a control and monitoring system, an attack system, and a target system. The control and monitoring system initiates a training scenario to cause the attack system to engage in an attack against the target system. The target system then performs an action in response to the attack. Monitor information associated with the attack against the target system is collected by continuously monitoring the training scenario. The attack system is then capable of sending dynamic response data to the target system, wherein the dynamic response data is generated according to the collected monitor information to adapt the training scenario to the action performed by the target system. The control and monitoring system then generates an automated evaluation based upon the collected monitor information.
    Type: Grant
    Filed: April 10, 2015
    Date of Patent: July 5, 2016
    Assignee: Architecture Technology Corporation
    Inventors: Stephen K. Brueckner, Frank N. Adelstein, Haim Yehuda Bar, Matthew P. Donovan
  • Publication number: 20150334130
    Abstract: A survivable network is described in which one or more network device includes enhanced functionality to fight through cyber attacks. A Fight-Through Node (FTN) is described, which may be a combined hardware/software system that enhances existing networks with survivability properties. A network node comprises a hardware-based processing system having a set of one or more processing units, a hypervisor executing on each one of the processing units, and a plurality of virtual machines executing on each of the hypervisor. The network node includes an application-level dispatcher to receive a plurality of transaction requests from a plurality of network communication session with a plurality of clients and distribute a copy of each of the transaction requests to the plurality of virtual machines executing on the network node over a plurality of time steps to form a processing pipeline of the virtual machines.
    Type: Application
    Filed: July 27, 2015
    Publication date: November 19, 2015
    Inventors: Stephen K. Brueckner, Kenneth J. Thurber
  • Publication number: 20150309831
    Abstract: A server system receives messages from client computing devices. Each of the messages corresponds to a transaction. The server system assigns each respective transaction to a respective fresh virtual machine. Furthermore, the server system performs, as part of a respective virtual machine processing a respective transaction, a modification associated with the respective transaction to a shared database. The shared database is persisted independently of the plurality of virtual machines. In response to determining that processing of the respective transaction is complete, the server system discards the respective virtual machine. In response to a trigger, such as determining that the respective transaction is associated with a cyber-attack, the server system uses checkpoint data associated with the respective transaction to roll back the modifications associated with the respective transaction to the shared database.
    Type: Application
    Filed: July 2, 2015
    Publication date: October 29, 2015
    Inventors: Judson Powers, Stephen K. Brueckner, Robert A. Joyce, Kenneth J. Thurber
  • Publication number: 20150213730
    Abstract: This disclosure generally relates to automated execution and evaluation of computer network training exercises, such as in a virtual machine environment. An example environment includes a control and monitoring system, an attack system, and a target system. The control and monitoring system initiates a training scenario to cause the attack system to engage in an attack against the target system. The target system then performs an action in response to the attack. Monitor information associated with the attack against the target system is collected by continuously monitoring the training scenario. The attack system is then capable of sending dynamic response data to the target system, wherein the dynamic response data is generated according to the collected monitor information to adapt the training scenario to the action performed by the target system. The control and monitoring system then generates an automated evaluation based upon the collected monitor information.
    Type: Application
    Filed: April 10, 2015
    Publication date: July 30, 2015
    Inventors: Stephen K. Brueckner, Frank N. Adelstein, Haim Yehuda Bar, Matthew P. Donovan
  • Patent number: 9094449
    Abstract: A survivable network is described in which one or more network device includes enhanced functionality to fight through cyber attacks. A Fight-Through Node (FTN) is described, which may be a combined hardware/software system that enhances existing networks with survivability properties. A network node comprises a hardware-based processing system having a set of one or more processing units, a hypervisor executing on each one of the processing units, and a plurality of virtual machines executing on each of the hypervisor. The network node includes an application-level dispatcher to receive a plurality of transaction requests from a plurality of network communication session with a plurality of clients and distribute a copy of each of the transaction requests to the plurality of virtual machines executing on the network node over a plurality of time steps to form a processing pipeline of the virtual machines.
    Type: Grant
    Filed: January 27, 2014
    Date of Patent: July 28, 2015
    Assignee: Architecture Technology Corporation
    Inventors: Stephen K. Brueckner, Kenneth J. Thurber
  • Publication number: 20150143355
    Abstract: This disclosure is directed to techniques for providing version control functionality for web services of one or more service oriented architecture (SOA) systems. According to these techniques, a version control service (VCS) may receive an indication of a version update for a first web service. In response to the received request, the VCS determines whether the version update, if executed within the SOA system, will cause a change in operation of a second web service. If the version update will cause a change, VCS provides an indication of the determined change to a user.
    Type: Application
    Filed: November 24, 2014
    Publication date: May 21, 2015
    Inventors: Daniel James Tingstrom, Robert A. Joyce, Matthew A. Stillerman, Stephen K. Brueckner, Haim Yehuda Bar
  • Publication number: 20150046405
    Abstract: A server system receives messages from client computing devices. Each of the messages corresponds to a transaction. The server system assigns each respective transaction to a respective fresh virtual machine. Furthermore, the server system performs, as part of a respective virtual machine processing a respective transaction, a modification associated with the respective transaction to a shared database. The shared database is persisted independently of the plurality of virtual machines. In response to determining that processing of the respective transaction is complete, the server system discards the respective virtual machine. In response to determining that the respective transaction is associated with a cyber-attack, the server system uses checkpoint data associated with the respective transaction to roll back the modifications associated with the respective transaction to the shared database.
    Type: Application
    Filed: August 27, 2013
    Publication date: February 12, 2015
    Applicant: Architecture Technology Corporation
    Inventors: Stephen K. Brueckner, Robert A. Joyce, Carl Manson, Hajime Inoue, Kenneth J. Thurber
  • Publication number: 20140310810
    Abstract: A survivable network is described in which one or more network device includes enhanced functionality to fight through cyber attacks. A Fight-Through Node (FTN) is described, which may be a combined hardware/software system that enhances existing networks with survivability properties. A network node comprises a hardware-based processing system having a set of one or more processing units, a hypervisor executing on each one of the processing units, and a plurality of virtual machines executing on each of the hypervisor. The network node includes an application-level dispatcher to receive a plurality of transaction requests from a plurality of network communication session with a plurality of clients and distribute a copy of each of the transaction requests to the plurality of virtual machines executing on the network node over a plurality of time steps to form a processing pipeline of the virtual machines.
    Type: Application
    Filed: January 27, 2014
    Publication date: October 16, 2014
    Applicant: Architecture Technology Corporation
    Inventors: Stephen K. Brueckner, Kenneth J. Thurber
  • Patent number: 8862803
    Abstract: An apparatus for mediating communication between a universal serial bus (USB) device and a host computing device is described. In an example, the apparatus includes a USB host interface configured to be connected to a downstream USB device, and a USB device interface configured to be connected to an upstream host computing device. The apparatus also includes a mediation module positioned between the USB host interface and the USB device interface and configured to determine whether the USB device is authorized to communicate with the host computing device.
    Type: Grant
    Filed: May 31, 2011
    Date of Patent: October 14, 2014
    Assignee: Architecture Technology Corporation
    Inventors: Judson Powers, Matthew P. Donovan, Frank N. Adelstein, Michael Kentley, Stephen K. Brueckner