Patent application number | Description | Published |
20120044092 | AIRCRAFT SAFETY AND CONFIGURATION MONITORING SYSTEM AND METHOD - An aircraft safety and configuration monitoring system includes a plurality of RFID equipped items, a plurality of RFID interrogators communicating with the plurality of RFID equipped items, a processor communicating with the plurality of RFID interrogators and adapted to determine an issue with respect to any of the plurality of RFID equipped items and an indicating mechanism communicating with the processor and adapted to indicate the issue. | 02-23-2012 |
20120306666 | Aircraft Part Control System - A method and apparatus for managing parts. Location information is displayed for a part on an aircraft on a mobile device. A determination is made as to whether the part is present in a location using a sensor system in the mobile device when the mobile device is in a zone including the location. A presence of the part in the location is indicated in response to the part being present in the location. | 12-06-2012 |
20130054176 | SYSTEMS AND METHODS FOR AUTOMATED ANOMALY LOCATION AND CLASSIFICATION - An anomaly detection and cataloging system is described that includes a handheld probe having a probe tip, a user interface, and a communications interface. The system further includes a system controller and a probe locating device. The probe is operable, via the user interface, for transmitting, via the communications interface, a user selected anomaly type to the system controller, the anomaly type being associated with a manufactured part or airplane on the ground (AOG). The probe locating device is operable to provide to the system controller a location associated with the probe tip, and the system is programmed to associate the user selected anomaly type with the location associated with the probe tip. | 02-28-2013 |
20140013431 | METHODS AND SYSTEMS FOR USE IN IDENTIFYING CYBER-SECURITY THREATS IN AN AVIATION PLATFORM - Methods and apparatus for use in identifying cyber-security threats for an aircraft are provided. The method includes storing parts information relating to each hardware and software component used on the aircraft in an aircraft parts database, receiving, by a computing device, a cyber-security threat, and determining, by the computing device, a threat is relevant to the aircraft by comparing the received threats to the stored parts information. | 01-09-2014 |
20140114442 | REAL TIME CONTROL SYSTEM MANAGEMENT - Systems and methods for real time control system management in networked environments are disclosed. In one embodiment, a computer-based system for real time embedded control system behavior monitoring and anomaly detection comprises a processor and logic instructions stored in a tangible computer-readable medium coupled to the processor which, when executed by the processor, configure the processor to generate a behavior training set for the embedded control system, wherein the behavior training set correlates inputs to the embedded control system with outputs from the embedded control system during a training process to define behavior fingerprints for the embedded control system monitor inputs to the embedded control system and outputs from the embedded control system in real time during operation of the embedded control system, and generate an alert when one or more of the inputs into the embedded control system or the outputs collected from the embedded control system in real time operation represent an anomaly. | 04-24-2014 |
20140210598 | SYSTEMS AND METHODS FOR RFID INSPECTION - A radio-frequency identification (RFID) reader is provided. The RFID reader includes a transmitter/receiver module configured to transmit a radio signal at a plurality of different power levels, and a control module coupled to the transmitter/receiver module and configured to control the power level at which the radio signal is transmitted based on a number of RFID tags detected when transmitting the radio signal at an initial power level. | 07-31-2014 |
20140380485 | METHODS AND SYSTEMS FOR USE IN ANALYZING CYBER-SECURITY THREATS IN AN AVIATION PLATFORM - Methods and systems for use in in analyzing cyber-security threats for an aircraft are described herein. One example method includes generating an interconnection graph for a plurality of interconnected aircraft systems. The interconnection graph includes a plurality of nodes and a plurality of links. The method also includes defining a cost function for a cyber-security threat to traverse each link and defining a requirements function for a cyber-security threat to exploit each node. The method further includes generating a set of threat traversal graphs for each cyber-security threat of a plurality of cyber-security threats. | 12-25-2014 |
20150207805 | EXECUTING UNPROTECTED MODE SERVICES IN A PROTECTED MODE ENVIRONMENT - Disclosed herein is a method for executing unprotected mode services in a protected mode computing environment includes initiating a protected mode service that is configured to execute in a protected mode. Further, the method includes verifying an integrity of one or more unprotected mode services configured to execute in an unprotected mode. The one or more unprotected mode services is registered with the protected mode service. The method also includes initiating an unprotected mode service of the one or more unprotected mode services in response to the integrity of the unprotected mode service being verified. | 07-23-2015 |