Patent application number | Description | Published |
20090037505 | INTERPOLATING CUBIC SPLINE FILTER AND METHOD - A filter for high speed digital signal processing. In one embodiment the filter includes a linear, phase-B, interpolating cubic spline filter having a pre-filter section and an interpolating post-filter section. The pre-filter section may be formed to implement any one of a 1-4-1 cubic spline function, a 2-5-2 cubic spline function or a 1-2-1 cubic spline function. The post-filter may be formed using a plurality of running average filters arranged in a cascade (i.e., serial) fashion. The filter can be constructed using significantly fewer independent component parts for a given level of pass band and stop band performance criteria, as compared with a conventional finite impulse response (FIR) filter. The filter is thus ideally suited for implementation with very large scale integration (VLSI) technology, and in a wide variety of electronic devices where high speed digital filtering is required. | 02-05-2009 |
20090196170 | QUALITY OF SERVICE, POLICY ENHANCED HIERARCHICAL DISRUPTION TOLERANT NETWORKING SYSTEM AND METHOD - According to an embodiment, a method includes a Delay Tolerant Network (DTN) software overlay residing in a first plane of a node of the network is used to define hierarchical forwarding behavior for data being generated in the first plane. In a second plane of the network, local buffering and data retransmission is performed in response to at least one intermittent network outage. Communication between the first and second planes is performed to manage the transmission of data between the first and second planes as needed in the event of at network outage that is longer in duration than the at least one intermittent network outage, to thus prevent the loss of data. | 08-06-2009 |
20090212914 | DATA MANAGEMENT FOR INTERMITTENTLY CONNECTED SENSORS - A computer implemented method, apparatus, and computer usable program code for managing data on an intermittently connected sensor. A data management system manages the data on radio frequency identification tags. The data management system comprises a radio frequency identification tag capable of storing the data, program code stored on the radio frequency identification tag, and a reader data processing system. The reader data processing system is capable of receiving the data and the program code from the radio frequency identification tag in a radio frequency signal and capable of executing the program code to read the data. | 08-27-2009 |
20090274045 | QOS PROVISIONING IN A NETWORK HAVING DYNAMIC LINK STATES - A network node for a network having dynamic link states includes a processing unit and computer-readable memory for causing the processing unit to monitor a link state of the network; perform QoS provisioning and make appropriate updates to the QoS provisioning based on changes in the link state and QoS provisioning demands of QoS-aware applications; and provide notification to the QoS-aware applications to allow those applications to dynamically adapt to the link state changes. | 11-05-2009 |
20090296599 | SYSTEM AND METHOD FOR PROVIDING INTEGRATED SERVICES ACROSS CRYPTOGRAPHIC BOUNDARIES IN A NETWORK - A method for providing network integrated services based ReSerVation Protocol across a cryptographic network boundary includes assigning one or more DiffServ forwarding classifications to correspond to IntServ requests for QoS provisioning. A daemon in the QoS Service Provider module signals the QoS upon detecting data packets indicating a DiffServ forwarding class assigned to IntServ QoS requests. In response to the notification, the QoS Services Provider module initiates an RSVP-based request for network resources, and establishes a network path in response to acceptance of the RSVP path request. The data flow comprised of encrypted data is then transmitted over the reserved path. Multiple simultaneous aggregated flows may be provisioned. Paths may be reconfigured and resized by the QoS services provider module in response to an overlimit data flow, subject to network resource availability. An ECN bit is returnable from the destination application to signal a problem with the data transmission. | 12-03-2009 |
20100052911 | SYSTEMS, METHODS, AND APPARATUS FOR RFID TAG DETECTION - A system for tracking objects that include radio frequency identification (RFID) tags associated therewith. The system including a structure substantially defining an enclosure, a reflective interior of the enclosure configured for the reflection of radio signals, at least one conveyor belt that transports the objects through the structure, at least one RFID reader panel inside the structure, wherein the at least one RFID reader panel transmits a radio signal into the interior of the structure such that the radio signal will reflect off of the interior of the structure to increase a probability that the RFID tags associated with the objects that enter the structure are read, and an operator terminal that receives and stores information regarding read RFID tags from the at least one reader panel. | 03-04-2010 |
20100091650 | SYSTEM AND METHOD FOR CONVEYING PRIORITY ASSOCIATED WITH A COMMUNICATION AMONG A PLURALITY OF NETWORKS - A system for conveying priority associated with a communication conveyed among networks includes: (a) a first network originating the communication in packets; each respective packet including two segments; a first segment containing a portion of the communication in information payload bits in a first encoding scheme; a second segment containing overhead information relating to the packet in overhead bits in a second encoding scheme; a number of the overhead bits being configured to indicate the priority; and (b) a second network cooperating with the first network to alter encoding of the first segment of a selected packet-set to express the information payload bits in a third encoding scheme that is unreadable in the second network; the second network employing the priority-indicating bits to ascertain priority for handling the communication by the second network; the second network preempting lower priority resources to reserve resources for higher priority packet-sets. | 04-15-2010 |
20100254395 | METHODS AND APPARATUS FOR ROUTING DATA TO NODES - A method is described for routing data from a first node to a second node via a gateway. The second node is detected at the gateway, which determines a local identifier of the second node. A name and a global address are associated with the second node. The name and the global address are published to a name service, such that the first node can retrieve the global address based on the name. The gateway receives data from the first node that is addressed to the global address and transmits the data to the second node using the local identifier. The gateway includes software implementing a service-oriented architecture (SOA). Any number of additional services may be added to process messages passing through the gateway. | 10-07-2010 |
20110013539 | SYSTEM AND METHOD FOR MANAGING INTERNETWORK COMMUNICATIONS AMONG A PLURALITY OF NETWORKS - A system for managing internetwork communications among a plurality of networks includes: (a) a plurality of edge network nodes; each respective edge network node being coupled to manage internetwork communications between a respective own network and other networks of the plurality of networks than the respective own network; and (b) at least one gateway-capable edge network node communicatingly coupled with each respective network node. Each respective edge network node includes a native communication network management unit for managing communications by the respective edge network node using a native communication protocol. Each respective edge network node includes an overlay communication network management unit for managing communications by the respective edge network node using an overlay communication protocol. | 01-20-2011 |
20110103393 | SYSTEM, APPARATUS, AND METHOD FOR COMMUNICATION IN A TACTICAL NETWORK - A system, apparatus, and method are described for communication in a tactical network. A gateway is communicatively couplable to one or more tactical nodes and to one or more other gateways. The gateway is programmed to transmit information to and/or receive information from other gateways. Information exchanged includes gateway attributes, link attributes, service availability, and/or data availability. The gateway optionally provides quality of service, distributed persistence, load balancing, and/or transformation services. Services are provided in a modular, service-oriented architecture (SOA) to accommodate the addition of services and/or applications. | 05-05-2011 |
20120084839 | SURVEILLANCE NETWORK SYSTEM - Embodiments of a sensor network system provide surveillance capabilities in multiple contexts/environments (e.g., military, commercial, scientific, civic, urban, wilderness, etc.). Network nodes may include devices such as sensors, network routers, network controllers, etc. Network sensors may be configured so that power management objectives are maximized. Network sensors (both individually and as a group) may be capable of intelligent and cooperative information gathering, so that the output of the sensor network does not contain high levels of irrelevant information. The network nodes may communicate among one another via one or more communication links, and in some cases, multiple routes between any two network nodes may be available. The sensor network may include aspects of both high data rate and low data rate network features. One or more network controllers may provide various network management capabilities, including management of network routing, information collection, information exportation, network configuration, etc. | 04-05-2012 |
20120131650 | SPOT BEAM BASED AUTHENTICATION - In one embodiment, a method to authenticate a claimant comprises receiving, from the claimant, at least one of a set of beam data from a spot beam transmission, comparing the claimed at least one set of beam data to a known valid data set, and authenticating the claimant when a difference between at least one set of beam data and the known valid data set is less than a threshold. | 05-24-2012 |
20120139782 | DIFFERENTIAL CORRECTION SYSTEM ENHANCEMENT LEVERAGES ROVING RECEIVERS ENABLED FOR A NON-GPS, SECONDARY PN&T SIGNAL TO CHARACTERIZE LOCAL ERRORS - System, methods, and devices for a self-sustaining differential corrections network that employs roving reference devices (RRDs) as reference stations for improving positioning, navigation, and timing (PN&T) solutions for other enabled local roving and/or stationary receiving devices (RDs) are disclosed herein. The disclosed differential correction system enhancement leverages RRDs enabled for a non-global positioning system (non-GPS), secondary PN&T signal to characterize local errors. These local errors are then used by local RDs in combination with a signal to calculate an improved PN&T estimate for the RDs. | 06-07-2012 |
20120144451 | GEOLOCATING NETWORK NODES IN ATTENUATED ENVIRONMENTS FOR CYBER AND NETWORK SECURITY APPLICATIONS - A system and method for verifying and/or geolocating network nodes in attenuated environments for cyber and network security applications are disclosed. The system involves an origination network node, a destination network node, and at least one router network node. The origination network node is configured for transmitting a data packet to the destination network node through at least one router network node. The data packet contains a security signature portion, a routing data portion, and a payload data portion. The security signature portion comprises a listing of at least one network node that the data packet travelled through from the origination network node to the destination network node. In addition, the security signature portion comprises geolocation information, identifier information, and timing information for at least one network node in the listing. | 06-07-2012 |
20120146815 | MANAGING A PLURALITY OF RADIO FREQUENCY IDENTIFICATION DEVICES - A method and apparatus for managing identification devices on an aircraft. An occurrence of an event is identified using information for a plurality of identification devices. Each of the plurality of identification devices is associated with a plurality of components on the aircraft. The information for the plurality of identification devices comprises data received from the plurality of identification devices and specification data for the plurality of identification devices. In response to identifying the occurrence of the event, a number of operations for the plurality of identification devices are initiated. | 06-14-2012 |
20120222089 | NETWORK TOPOLOGY AIDED BY SMART AGENT DOWNLOAD - A system, method, and apparatus for a network topology aided by a smart agent download are disclosed. The method involves authenticating, with at least one authenticator device, at least one claimant. The method further involves transmitting, by at least one transmission source, the smart agent download to at least one receiving source associated with at least one claimant. In one or more embodiments, at least one transmission source is employed in a Lower Earth Orbiting (LEO) Iridium satellite. Also, the method involves receiving, by at least one receiving source, the smart agent download. In addition, the method involves executing, by at least one processor, the smart agent download. Further, the method involves monitoring, by the smart agent download, network behavior. The monitoring of network behavior includes monitoring the users on the network, monitoring data passing through the network, and monitoring the quantity of data passing through the network. | 08-30-2012 |
20120304007 | METHODS AND SYSTEMS FOR USE IN IDENTIFYING ABNORMAL BEHAVIOR IN A CONTROL SYSTEM - Methods and apparatus for use in identifying abnormal behavior in a control system. Operating events associated with a control system are received, and an actual behavior of the control system is determined based on the received operating events. The actual behavior is compared to expected behavior to determine whether the actual behavior differs from the expected behavior. The expected behavior includes a correlation between a plurality of operating events associated with the control system. The expected behavior is updated based on an indication of whether the actual behavior is abnormal from a user. | 11-29-2012 |
20120306666 | Aircraft Part Control System - A method and apparatus for managing parts. Location information is displayed for a part on an aircraft on a mobile device. A determination is made as to whether the part is present in a location using a sensor system in the mobile device when the mobile device is in a zone including the location. A presence of the part in the location is indicated in response to the part being present in the location. | 12-06-2012 |
20130019317 | SECURE ROUTING BASED ON DEGREE OF TRUST - A system, method, and apparatus for secure routing based on a degree of trust are disclosed herein. The disclosed method involves assigning a level of trust to at least one network node, and utilizing the level of trust to determine a degree of security of the network node(s). The level of trust of the network node(s) is related to an amount of certainty of the physical location of the network node(s). The amount of certainty is attained from the network node(s) being located in a known secure location, and/or from verification of the physical location of the network node(s) by using satellite geolocation techniques or by using network ping ranging measurements. The method further involves utilizing the level of trust of the network node(s) to determine a degree of trust of at least one path for routing the data, where the path(s) includes at least one of the network nodes. | 01-17-2013 |
20130031598 | Contextual-Based Virtual Data Boundaries - A system, method, and apparatus for contextual-based virtual data boundaries are disclosed herein. In particular, the present disclosure relates to improvements in access control that work to restrict the accessibility of data based on assigning contextual data thresholds that create a virtual boundary. Specifically, the disclosed method involves assigning at least one threshold to at least one contextual criterion. The method further involves determining whether contextual information from the claimant meets at least one threshold to at least one contextual criterion. Also, the method involves authenticating the claimant, if the contextual information from the claimant meets at least one of the thresholds to at least one contextual criterion. Further, the method involves allowing the claimant access to the data, if the claimant is authenticated. | 01-31-2013 |
20130083698 | NATIVE WI-FI ARCHITECTURE FOR 802.11 NETWORKS - A software based wireless infrastructure system is provided. The system has a driver that communicates with the network stack and a network interface card (NIC), a station server in communication with the station driver and an 802.1X supplicant or an 802.1X authenticator. Each NIC provides station and/or access point functionality support. The driver drops packets that have been received if the packet has not been authenticated and associated. Packets that have been fragmented or encrypted are unfragmented and decrypted. An association manager is used in conjunction with a configuration table manager to associate stations and access points via management packets. A manager receives 802.1X data packets from the packet processor and sends them up to a station server that communicates with user mode applications and an 802.1X supplicant or an 802.1X authenticator that are used to authenticate and deauthenticate stations and access points. APIs are provided to enable communication between the components. | 04-04-2013 |
20130305044 | Geothentication Based on New Network Packet Structure - A system and method for verifying and/or geolocating network nodes in a network in attenuated environments for cyber and network security applications are disclosed. The system involves an origination network node, a destination network node, and at least one router network node. The origination network node is configured for transmitting a data packet downstream to the destination network node through at least one router network node. The data packet contains a header portion and a payload data portion. At least one of the network nodes is an enabled network node. The enabled network node(s) is configured to verify any of the network nodes that are located upstream from the enabled network node(s) by analyzing the header portion and/or the payload data portion of the data packet. | 11-14-2013 |
20130305357 | Context Aware Network Security Monitoring for Threat Detection - The disclosed method involves monitoring behavior of at least one node, associated with at least one user, in a network to generate a behavior profile for the user(s). The method further involves comparing the behavior profile for at least one user with a baseline behavior profile for the user(s). Also, the method involves determining when there is a difference between the behavior profile for at least one user and the baseline behavior profile for the user(s). Further, the method involves flagging an event associated with the difference: when the difference exceeds a baseline threshold level, does not exceed a baseline threshold level, meets at least one criterion, and/or does not meet at least one criterion. Additionally, the method involves classifying the event to an event classification. Further, the method involves transmitting the event to at least one other node in the network and/or a network operations center. | 11-14-2013 |
20140013431 | METHODS AND SYSTEMS FOR USE IN IDENTIFYING CYBER-SECURITY THREATS IN AN AVIATION PLATFORM - Methods and apparatus for use in identifying cyber-security threats for an aircraft are provided. The method includes storing parts information relating to each hardware and software component used on the aircraft in an aircraft parts database, receiving, by a computing device, a cyber-security threat, and determining, by the computing device, a threat is relevant to the aircraft by comparing the received threats to the stored parts information. | 01-09-2014 |
20140036686 | Onboard Wireless Performance Testing - A method and associated wireless monitor and data analysis system are provided. The method includes installing one or more of a plurality of wireless monitors at respective locations onboard a complex system on which a wireless system of interest is installed or planned for installation. The method may then include by the plurality of wireless monitors, emulating the wireless system of interest, and recording data related to performance of the wireless system of interest at one or more recorded times over a plurality of operating conditions of the complex system. The method may also include by the plurality of wireless monitors, collecting data including the respective locations of the wireless monitors correlated with respective recorded data and recorded times. In this regard, the collected data for the plurality of wireless monitors may be retrievable for analysis of the wireless system of interest based thereon. | 02-06-2014 |
20140068079 | SERVERS AND METHODS FOR OPERATING A COMMUNICATION SYSTEM - A server includes a memory device configured to store a plurality of computer-executable instructions, and a processor coupled to the memory device. When the processor executes the plurality of computer-executable instructions, the processor is programmed to determine an available spectrum of frequencies within a location over time, and receive a request from a wireless device to access the available spectrum for a predefined duration. The processor is also programmed to select a frequency band within the spectrum that is available to be used by the wireless device for the predefined duration, and transmit an authorization message to the wireless device to use the selected frequency band. | 03-06-2014 |
20140114442 | REAL TIME CONTROL SYSTEM MANAGEMENT - Systems and methods for real time control system management in networked environments are disclosed. In one embodiment, a computer-based system for real time embedded control system behavior monitoring and anomaly detection comprises a processor and logic instructions stored in a tangible computer-readable medium coupled to the processor which, when executed by the processor, configure the processor to generate a behavior training set for the embedded control system, wherein the behavior training set correlates inputs to the embedded control system with outputs from the embedded control system during a training process to define behavior fingerprints for the embedded control system monitor inputs to the embedded control system and outputs from the embedded control system in real time during operation of the embedded control system, and generate an alert when one or more of the inputs into the embedded control system or the outputs collected from the embedded control system in real time operation represent an anomaly. | 04-24-2014 |
20140341309 | AIRCRAFT DATA TRANSMISSION USING PHASE SEPARATION - Provided are methods and systems for terrestrial data transmission between aircrafts and external networks connected to gates at airports. This type of data transmission is performed through an electrical power cable that includes multiple conductors interconnecting electrical components of an aircraft and a gate. Each conductor may be used to establish a separate broadband over power line (BPL) communication channel using its own frequency range that does not overlap with frequency ranges of other channels. As such, no radio frequency (RF) shielding is needed in the cable and any standard multi-conductor cable may be used. A channel management unit is used to control allocation of data domains among different communication channels depending on characteristics of the data domains, characteristics of the channels, and other factors. For example, one channel may be designated for secure data transfer of specific data domains, such as aircraft control data. | 11-20-2014 |
20140380485 | METHODS AND SYSTEMS FOR USE IN ANALYZING CYBER-SECURITY THREATS IN AN AVIATION PLATFORM - Methods and systems for use in in analyzing cyber-security threats for an aircraft are described herein. One example method includes generating an interconnection graph for a plurality of interconnected aircraft systems. The interconnection graph includes a plurality of nodes and a plurality of links. The method also includes defining a cost function for a cyber-security threat to traverse each link and defining a requirements function for a cyber-security threat to exploit each node. The method further includes generating a set of threat traversal graphs for each cyber-security threat of a plurality of cyber-security threats. | 12-25-2014 |
20150016248 | SYSTEM FOR COMMUNICATION IN A TACTICAL NETWORK - A system is described for communication in a tactical network. A gateway is communicatively couplable to one or more tactical nodes and to one or more other gateways. The gateway is programmed to transmit information to and/or receive information from other gateways. Information exchanged includes gateway attributes, link attributes, service availability, and/or data availability. The gateway optionally provides quality of service, distributed persistence, load balancing, and/or transformation services. Services are provided in a modular, service-oriented architecture (SOA) to accommodate the addition of services and/or applications. | 01-15-2015 |
20150022373 | Wireless Fuel Sensor System - A method for generating sensor data is presented. A number of wireless power signals is sent to a group of sensor units. A number of wireless data collection signals is sent to the group of sensor units after the number of wireless power signals have been sent to the group of sensor units. Sensor data in a number of wireless response signals is received from the group of sensor units. | 01-22-2015 |
20150023437 | SYSTEMS AND METHODS FOR PHYSICAL SECURITY OF INFORMATION FLOWS OVER A POWER CABLE CONNECTION - An aircraft includes a first electrical connector configured to couple with a first power cable, a first data communication network and a first modem coupled to first electrical connector and first data communication network and is configured to transmit data received at first electrical connector through first power cable to first data communication network and to transmit data from first data communication network to first power cable through first electrical connector. The aircraft additionally includes a second electrical connector configured to couple with a second power cable, a second data communication network and a second modem coupled to second electrical connector and to second data communication network and is configured to transmit data received at second electrical connector through second power cable to second data communication network and to transmit data from second data communication network to second power cable through second electrical connector. | 01-22-2015 |
20150058929 | SYSTEM AND METHOD FOR TRUSTED MOBILE COMMUNICATIONS - Systems and methods for trusted mobile communications are described. A network system provisions a mobile client system with a collection of security parameters on a per application basis and a per device basis. The airplane system provides access to the mobile client system based on the established chain of trust without previously having information about the mobile client system even when the mobile client system and the airplane system are offline with respect to the network system. | 02-26-2015 |