摘要:
A method and apparatus for authenticating a signal received at a wireless node. The signal is received at the wireless node. The wireless node is one of a plurality of wireless nodes in a communications network. A set of parameters is identified for the signal. A distance between the wireless node and a source of the signal is identified using a location of the wireless node and the set of parameters for the signal. A determination as to whether the source of the signal is an authorized source is made using the distance identified.
摘要:
A method, apparatus, and system for managing network security at an airport. A threat level for the airport is identified. A number of policies for a network data processing system is identified at the airport based on the threat level identified for the airport in response to identifying the threat level for the airport. Enforcement of the number of policies is initiated in the network data processing system.
摘要:
A method, apparatus, and system for managing network security at an airport. A threat level for the airport is identified. A number of policies for a network data processing system is identified at the airport based on the threat level identified for the airport in response to identifying the threat level for the airport. Enforcement of the number of policies is initiated in the network data processing system.
摘要:
Methods and systems for use in exchanging information between aircraft at an airport are provided. The system includes a power system capable of providing power to each of the plurality of vehicles via an electric cable, at least one off-board broadband over power lines (BPL) module coupled to the power system. The at least one off-board BPL module is capable of communicating via the electric cable with an onboard BPL module on each of the plurality of vehicles. The system also includes a network coupled to each of the at least one off-board BPL modules for communicatively coupling each of the at least one off-board BPL modules such that the plurality of vehicles can exchange information via the network.
摘要:
Methods and systems for use in exchanging information between aircraft at an airport are provided. The system includes a power system capable of providing power to each of the plurality of vehicles via an electric cable, at least one off-board broadband over power lines (BPL) module coupled to the power system. The at least one off-board BPL module is capable of communicating via the electric cable with an onboard BPL module on each of the plurality of vehicles. The system also includes a network coupled to each of the at least one off-board BPL modules for communicatively coupling each of the at least one off-board BPL modules such that the plurality of vehicles can exchange information via the network.
摘要:
A method and apparatus for managing wireless devices on an aircraft. A map for a number of wireless devices on the aircraft is generated. The number of wireless devices is identified in a profile. A risk for the number of wireless devices on the aircraft is identified during operation of the aircraft using state information for the aircraft and the profile. Access to a wireless network on the aircraft by the number of wireless devices is managed based on the risk identified for the number of wireless devices.
摘要:
A method and apparatus for managing software components and information. An apparatus comprises a computer system, a library application running on the computer system, a distribution application running on the computer system, and a crate tool in the computer system. The library application is configured to store a number of software components and information for ground vehicles in the computer system and generate tasks to manage software components and the information in the ground vehicles. The distribution application is configured to send a selected software component in the number of software components to a ground vehicle and receive the information from the ground vehicle. The crate tool is configured to manage crates containing the software components and the information and validate signatures associated with the software components and the information in the crates.
摘要:
A computer-implemented method for use in evaluating at least one threat to a complex system includes identifying one or more physical components of the complex system and modeling the one or more physical components with interactive software multi-agents. The multi-agents are programmed to monitor and control at least one function of the modeled physical components. One or more threats to a target of the complex system are identified. Each threat is defined as a cyber threat or physical threat and the target is defined as a cyber component or physical component. The method includes simulating an attack on the complex system by the identified threat and assessing an impact of the attack on the complex system.
摘要:
A method and apparatus for managing health of a passenger on an aircraft. A physiological condition of the passenger seated in a seat in a cabin in the aircraft is monitored using a passenger condition sensor to provide passenger condition information. An environmental condition in the cabin is monitored using a cabin condition sensor to provide cabin condition information. The passenger condition information and the cabin condition information are processed to provide passenger health information. The passenger health information is displayed to the passenger.
摘要:
A computer-implemented method for use in evaluating at least one threat to a complex system includes identifying one or more physical components of the complex system and modeling the one or more physical components with interactive software multi-agents. The multi-agents are programmed to monitor and control at least one function of the modeled physical components. One or more threats to a target of the complex system are identified. Each threat is defined as a cyber threat or physical threat and the target is defined as a cyber component or physical component. The method includes simulating an attack on the complex system by the identified threat and assessing an impact of the attack on the complex system.