PrintPrint

Awards

Topic Information Award/Contract Number Proposal Information Company Performance
Period
Award/Contract
Value
Abstract

H-SB010.2-003
Large-Scale Network Survivability, Rapid Recovery, and Reconstitution

D10PC20037 1021021
(FY10.2 Phase I)
PICS: Peer Integrity Checking System

Architecture Technology Corporation
9977 Valley View Road
Eden Prairie, MN 55344-3552

10/15/2010
to
04/28/2011
$99,962.00

Modern computer networks are vulnerable to an ever widening variety of attacks and exploits. These attacks degrade the performance of individual hosts and of the network as a whole. They lead directly to the loss of critical data, privacy and, of course, money. A key characteristic of these attacks is the installation of unwanted programs (malware) into the host nodes comprising the network. Architecture Technology will leverage its extensive experience in conducting and transitioning leading-edge research into commercial products in the networking and security fields to create PICS, the Peer Integrity Checking System. PICS uses Peer-to-Peer technology as a means of network self-defense: the network itself will sense and react to intrusive attacks in a distributed, fault-tolerant manner. The goal of this work is to strengthen file integrity checking by ensuring that many more than just one host must be compromised before an attack on any one host goes undetected. Co-operative processes automatically detect suspicious or obviously compromised nodes without human intervention, alerting other nodes, users, and network owners/operators to their presence. PICS is commercially applicable to virtually all network-connected computers as a means of co-operative network defense against intrusive malware.

H-SB015.1-005
A Wearable Communications Hub Designed to Streamline and Improve First Responder Communication Capabilities

HSHQDC-15-C-00024 HSHQDC-15-R-00017-H-SB015.1-005-0006-I
(HSHQDC-15-R-00017 Phase I)
WiHub: Wearable Intelligent Communication Hub

Architecture Technology Corporation
9971 Valley View Road
Eden Prairie, MN 55344-3552

05/05/2015
to
11/04/2015
$99,578.75

The huge growth in mobile industry including smartphones and tablets, wearable devices, and the internet of things, caused an explosion in the number of sensor technologies and sensory data. This growth was accompanied by huge leaps in wireless communication technologies in term of speed and geographical coverage. When a highly-trained first responder arrives at an incident scene, an array of communication tools such as land mobile radio (LMR), smartphone and other available communication devices and sensors can overwhelm and distract the first responder. Furthermore, wireless communication can be sporadic at times, with some networks unavailable especially in disaster areas. Architecture Technology Corporation proposes to build WiHub: a wearable intelligent communication hub that is capable of encapsulating and abstracting all of the underlying available communication channels and sensors providing an easy to use plug-and-play interface to help first responders focus on their job rather than managing and configuring the set of devices they have at the scene. If more than one communication link is available, the hub will automatically pick the best route during data transmission, auto-detect link quality and failure and reroute data accordingly without the need for user intervention. The objective of the communication hub is to dissolve the barrier between responders and the many available sources of critical information. The results of Phase I will be three WiHub prototypes with capability demonstration showing their ability to connect to sensors and to utilize available communication links. Phase II completion will add complete auto-detection and auto-configuration features for sensors, networks.

H-SB04.2-001
Cross-Domain Attack Correlation Technologies

NBCHC050002 0421009
(FY04.2 Phase I)
DOODLEBUG: A Distributed, Peer-to-Peer Approach to Cross-Domain Attack Correlation

Smart Information Flow Technologies, LLC d/b/a SIFT, LLC
211 N 1st St.
Suite 300
Minneapolis, MN 55401-1480

11/01/2004
to
05/15/2005
$99,743.00

SIFT`s DOODLEBUG approach provides a revolutionary approach to intrusion event correlation and fusion. Existing correlation systems are brittle, mostly rule-based systems that provide centralized correlation of intrusion events from very restricted areas. They require access to confidential information of the systems whose events they correlate, share those systems` false positive problems, and are difficult to configure and operate. By contrast, DOODLEBUG provides a lightweight event correlation solution that will operate over extremely large areas (e.g., continent-wide). The DOODLEBUG approach will build a robust, redundant, decentralized network for event correlation, producing rich results by incorporate very large amounts of information. Using large amounts of information, and combining it with relatively simple, and computationally inexpensive operations, DOODLEBUG will enable detection and identification of both known and novel attacks. In order to incorporate these large numbers of nodes, DOODLEBUG must stretch across not just administrative domains, but enterprises as well. To make this possible, DOODLEBUG will incorporate techniques for robust computation even in the face of malicious network members, and will provide strong assurances of the privacy of network nodes. DOODLEBUG will do this by combining a novel re-framing of the correlation problem with existing techniques for robust distributed computation and privacy protection.

H-SB05.1-006
SECURE CARTON SYSTEM

NBCHC050119 0511031
(FY05.1 Phase I)
Secure Carton System by ESII

Essential Systems Integration, Inc.
13506 Thrush Street NW
Andover, MN 55304-3390

06/01/2005
to
12/15/2005
$100,000.00

Essential Systems Integration, Inc (ESII) proposes to fulfill the objective of developing a sub-system device for securing cargo that communicates to the Advanced Container Security Device (ACSD). Multiple technologies are employed to accommodate securing various package sizes and to indicate a breach in the cargo. Anti-bypass methods and encryption techniques are implemented to ensure cargo integrity. The device can be tracked and have other detection devices incorporated. It is complementary to the Marine Asset Tag Tracking System (MATTS) communication hardware. The ESII patent pending device has commercialization potential in nearly every market where securing and tracking items is vital, because it can communicate to industry standard equipment. Legend: For any purpose other than to evaluate the proposal, this data except proposal cover sheet shall not be disclosed outside the Government and shall not be duplicated, used, or disclosed in whole or in part, provided that if a contract is awarded to the proposer as a result of or in connection with the submission of this data, the Government shall have the right to duplicate, use or disclose the data to the extent provided in the funding agreement. This restriction does not limit the Government`s right to use information contained in the data if it is obtained from another source without restriction. The data subject to this restriction is contained on the pages of the proposal listed on the line below.

H-SB06.1-007
NETWORK-BASED BOUNDARY CONTROLLERS

NBCHC060130 0613007
(FY06.1 Phase I)
Logical Network Boundary Controllers (LNBC)

Architecture Technology Corporation
9977 Valley View Road
Eden Prairie, MN 55344-3552

09/01/2006
to
03/15/2007
$99,837.00

The current, dominant approach to implementing secure boundary controls across networks relies on strict physical separation of networks. The approach of using trusted operating system platforms and automated guards has proven to be unworkable for multimedia applications and cost prohibitive for most civilian environments. The proposed STTR collaboration between Architecture Technology Corporation (ATC) and the University of Minnesota will develop a technology called Logical Network Boundary Controllers (LNBC) that will effectively distribute information to multiple security level users across multiple physical networks without compromising the security of the data. The technology will facilitate secure cross-domain collaborations for both synchronous (e.g. audio/video conference, chat) and asynchronous (e.g. document sharing, email) applications. The COTS-based technology will provide a low-cost solution to cross-domain information sharing in a variety of digital media for Homeland Security as well as other civilian operations.

H-SB06.2-002
MOBILE PERIPHERAL DEVICE FOR BIOLOGICAL ANALYSIS

NBCHC070080 0621048
(FY06.2 Phase I)
Plug and Play USB Electronic Reader for Mobile Multianalyte Quantitative Lateral Flow Immunoassays

Diagnostic Biosensors, LLC
1712 Brook Ave. SE
Minneapolis, MN 55414-2422

03/15/2007
to
09/30/2007
$99,999.25

Lateral flow strip immunoassay technology is one of the easiest to use for mobile applications because much of the sample preparation and fluid handling stages are built in. These assays are widely used, easy to read, and generally accepted. There are also many analytes that can be detected using immunological and ligand-based techniques. The sensitivity (limit of detection) of these assays, however, is not good. Furthermore, they are not very quantitative, usually providing just a YES - NO result. The proposed mobile assay development will improve the quantitativeness, precision, and multiplicity of the flow strip technology by using integrated magnetic detectors to detect and quantify giardia and cryptosporidium parvum. These detectors offer all of the features that are needed for mobile assays including: 1) low power, 2) rugged, 3) disposable microchip, 4) capability for detecting many spots, 5) highly quantitative, 6) and low background sensitivity. The associated reader will operate using the available USB power (<0.5 Amps, < 5 Volts) and be a little larger than a "thumb drive". This platform offers the fastest way to get high performance assay technology into a Plug and Play mobile format while opening opportunities for continued improvements in sensitivity, precision, and multianalyte capability.

H-SB06.2-005
3-D VISUALIZATION SYSTEM TO SHOW FIRST RESPONDERS AND ASSETS WITHIN BUILDING STRUCTURES IN URBAN AREAS FOR SITUATIONAL AWARENESS

NBCHC070068 0621072
(FY06.2 Phase I)
Situational Awareness Visualization for Emergency Responder (SAVFER)

Architecture Technology Corporation
9977 Valley View Road
Eden Prairie, MN 55344-3552

03/15/2007
to
09/30/2007
$99,504.00

Situational awareness is important in all activities that humans do for safety and efficiency reasons. Emergency personal situational awareness is currently limited by the inability to visualize and track the position of responders within a structure by commanders. Commanders are also restricted by the lack of up to the second location information of personal along with important points of interest within the building such as danger points, known victims, and available assets. The proposed SBIR will develop a technology called Awareness Visualization For Emergency Responder (SAVFER) that will take existing architectural design drawings and floor plans of structures and quickly convert them into a format that can then be displayed in a 3D manner to rescuers and commanders alike. SAVER will also allow the real time automatic updating and tracking of emergency personal within a building without the need for human interaction. This technology will be easy to use, scaleable and cross platform portable.

H-SB07.1-004
Mobile Biometrics Screening

NBCHC080021 0711222
(FY07.1 Phase I)
Mobile Stand-Off Secure Wireless Biometrics Screening Device

Advanced Medical Electronics Corp.
6901 East Fish Lake Road
Suite #190
Maple Grove, MN 55369-5457

10/22/2007
to
05/07/2008
$100,000.00

Lightweight portable biometrics screening tools are needed to accurately and rapidly screen and manage the identities of individuals at the scene of an incident. Such tools are preferably not dependant on local infrastructure, which may be compromised, and should operate in both land (e.g. border security) and maritime (e.g. coast guard) environments. A device that is portable, lightweight, secure, accurate, inexpensive, easy-to-use, and has a long battery life is desired. AME proposes in phase I to conduct a trade-off analysis based on DHS requirements. The output will be a recommendation of a phase II device and that can be constructed and tested in the field. The technical risks of this development will be presented to allow DHS to gauge the likelihood of success of the effort.