LOCATING PARTS WITH ELECTROMAGNETIC IDENTIFICATION (EMID) TAGS FOR CONTEXTUAL VISUALIZATION
    1.
    发明申请
    LOCATING PARTS WITH ELECTROMAGNETIC IDENTIFICATION (EMID) TAGS FOR CONTEXTUAL VISUALIZATION 有权
    具有电磁识别(EMID)标签的定位部件,用于实现可视化

    公开(公告)号:US20150363616A1

    公开(公告)日:2015-12-17

    申请号:US14303440

    申请日:2014-06-12

    CPC classification number: G06K7/10366 G01S13/75 G06K7/10099 G06K7/10386

    Abstract: In one or more embodiments, a disclosed method involves transmitting a first transmit signal(s) having a first signal strength and/or a first field of view (FOV), thereby establishing a first radiation region. The method further involves receiving a first receive signal(s) radiated from an EMID tag(s). Also, the method involves transmitting a second transmit signal(s) having a second signal strength and/or a second field of view (FOV), thereby establishing a second radiation region. In addition, the method involves receiving a second receive signal(s) radiated from an EMID tag(s). Additionally, the method involves subtracting the second radiation region from the first radiation region to determine a difference region. Also, the method involves determining which of the EMID tags are located within the difference region by using the first receive signal(s) and the second receive signal(s). Further, the method involves determining a location of the EMID tag(s) located within the difference region.

    Abstract translation: 在一个或多个实施例中,所公开的方法包括发送具有第一信号强度和/或第一视场(FOV)的第一发射信号,由此建立第一辐射区域。 该方法还包括接收从一个或多个EMID标签辐射的第一接收信号。 此外,该方法涉及发送具有第二信号强度和/或第二视场(FOV)的第二发射信号,由此建立第二辐射区域。 另外,该方法包括接收从一个或多个EMID标签辐射的第二接收信号。 另外,该方法包括从第一辐射区域减去第二辐射区域以确定差分区域。 此外,该方法涉及通过使用第一接收信号和第二接收信号来确定哪个EMID标签位于差分区域内。 此外,该方法涉及确定位于差异区域内的EMID标签的位置。

    Locating parts with electromagnetic identification (EMID) tags for contextual visualization
    2.
    发明授权
    Locating parts with electromagnetic identification (EMID) tags for contextual visualization 有权
    使用电磁识别(EMID)标签定位用于上下文可视化的部件

    公开(公告)号:US09576167B2

    公开(公告)日:2017-02-21

    申请号:US14303440

    申请日:2014-06-12

    CPC classification number: G06K7/10366 G01S13/75 G06K7/10099 G06K7/10386

    Abstract: In one or more embodiments, a disclosed method involves transmitting a first transmit signal(s) having a first signal strength and/or a first field of view (FOV), thereby establishing a first radiation region. The method further involves receiving a first receive signal(s) radiated from an EMID tag(s). Also, the method involves transmitting a second transmit signal(s) having a second signal strength and/or a second field of view (FOV), thereby establishing a second radiation region. In addition, the method involves receiving a second receive signal(s) radiated from an EMID tag(s). Additionally, the method involves subtracting the second radiation region from the first radiation region to determine a difference region. Also, the method involves determining which of the EMID tags are located within the difference region by using the first receive signal(s) and the second receive signal(s). Further, the method involves determining a location of the EMID tag(s) located within the difference region.

    Abstract translation: 在一个或多个实施例中,所公开的方法包括发送具有第一信号强度和/或第一视场(FOV)的第一发射信号,由此建立第一辐射区域。 该方法还包括接收从一个或多个EMID标签辐射的第一接收信号。 此外,该方法涉及发送具有第二信号强度和/或第二视场(FOV)的第二发射信号,由此建立第二辐射区域。 另外,该方法包括接收从一个或多个EMID标签辐射的第二接收信号。 另外,该方法包括从第一辐射区域减去第二辐射区域以确定差分区域。 此外,该方法涉及通过使用第一接收信号和第二接收信号来确定哪个EMID标签位于差分区域内。 此外,该方法涉及确定位于差异区域内的EMID标签的位置。

    SYSTEMS AND METHODS FOR RFID INSPECTION
    3.
    发明申请
    SYSTEMS AND METHODS FOR RFID INSPECTION 有权
    RFID检测系统与方法

    公开(公告)号:US20140210598A1

    公开(公告)日:2014-07-31

    申请号:US13756220

    申请日:2013-01-31

    Abstract: A radio-frequency identification (RFID) reader is provided. The RFID reader includes a transmitter/receiver module configured to transmit a radio signal at a plurality of different power levels, and a control module coupled to the transmitter/receiver module and configured to control the power level at which the radio signal is transmitted based on a number of RFID tags detected when transmitting the radio signal at an initial power level.

    Abstract translation: 提供射频识别(RFID)阅读器。 RFID读取器包括被配置为以多个不同功率电平发送无线电信号的发射器/接收器模块,以及耦合到发射器/接收器模块并被配置为基于以下方式控制无线电信号被发送的功率电平的控制模块 当以初始功率电平发送无线电信号时检测到许多RFID标签。

    Systems and methods for RFID inspection
    4.
    发明授权
    Systems and methods for RFID inspection 有权
    RFID检测系统和方法

    公开(公告)号:US09582692B2

    公开(公告)日:2017-02-28

    申请号:US13756220

    申请日:2013-01-31

    Abstract: A radio-frequency identification (RFID) reader is provided The RFID reader includes a transmitter/receiver module configured to transmit a radio signal at a plurality of different power levels, and a control module coupled to the transmitter/receiver module and configured to control the power level at which the radio signal is transmitted based on a number of RFID tags detected when transmitting the radio signal at an initial power level.

    Abstract translation: 提供射频识别(RFID)读取器RFID读取器包括被配置为以多个不同功率电平发射无线电信号的发射器/接收器模块,以及耦合到发射器/接收器模块并被配置为控制 基于在初始功率级发送无线电信号时检测到的RFID标签的数量来发送无线电信号的功率电平。

    Methods and systems for use in analyzing cyber-security threats in an aviation platform
    5.
    发明授权
    Methods and systems for use in analyzing cyber-security threats in an aviation platform 有权
    用于分析航空平台中网络安全威胁的方法和系统

    公开(公告)号:US09171167B2

    公开(公告)日:2015-10-27

    申请号:US13922825

    申请日:2013-06-20

    CPC classification number: G06F21/577 H04B7/18506 H04L63/1433

    Abstract: Methods and systems for use in in analyzing cyber-security threats for an aircraft are described herein. One example method includes generating an interconnection graph for a plurality of interconnected aircraft systems. The interconnection graph includes a plurality of nodes and a plurality of links. The method also includes defining a cost function for a cyber-security threat to traverse each link and defining a requirements function for a cyber-security threat to exploit each node. The method further includes generating a set of threat traversal graphs for each cyber-security threat of a plurality of cyber-security threats.

    Abstract translation: 本文描述了用于分析飞机的网络安全威胁的方法和系统。 一个示例性方法包括生成多个互连飞行器系统的互连图。 互连图包括多个节点和多个链路。 该方法还包括定义用于网络安全威胁的成本函数,以遍历每个链接,并为网络安全威胁定义需求函数以利用每个节点。 该方法还包括为多个网络安全威胁的每个网络安全威胁生成一组威胁遍历图。

    EXECUTING UNPROTECTED MODE SERVICES IN A PROTECTED MODE ENVIRONMENT
    6.
    发明申请
    EXECUTING UNPROTECTED MODE SERVICES IN A PROTECTED MODE ENVIRONMENT 有权
    在受保护的模式环境中执行未经保护的模式服务

    公开(公告)号:US20150207805A1

    公开(公告)日:2015-07-23

    申请号:US14159127

    申请日:2014-01-20

    Abstract: Disclosed herein is a method for executing unprotected mode services in a protected mode computing environment includes initiating a protected mode service that is configured to execute in a protected mode. Further, the method includes verifying an integrity of one or more unprotected mode services configured to execute in an unprotected mode. The one or more unprotected mode services is registered with the protected mode service. The method also includes initiating an unprotected mode service of the one or more unprotected mode services in response to the integrity of the unprotected mode service being verified.

    Abstract translation: 这里公开了一种用于在受保护模式计算环境中执行未保护模式服务的方法,包括启动被配置为以受保护模式执行的受保护模式服务。 此外,该方法包括验证被配置为以非保护模式执行的一个或多个未保护模式服务的完整性。 一个或多个不受保护的模式服务在保护模式服务中注册。 该方法还包括响应于正在验证的未保护模式服务的完整性,发起一个或多个未保护模式服务的无保护模式服务。

    REAL TIME CONTROL SYSTEM MANAGEMENT
    7.
    发明申请
    REAL TIME CONTROL SYSTEM MANAGEMENT 审中-公开
    实时控制系统管理

    公开(公告)号:US20140114442A1

    公开(公告)日:2014-04-24

    申请号:US13657440

    申请日:2012-10-22

    CPC classification number: G06F11/0754 G05B23/0254 G06F11/0736

    Abstract: Systems and methods for real time control system management in networked environments are disclosed. In one embodiment, a computer-based system for real time embedded control system behavior monitoring and anomaly detection comprises a processor and logic instructions stored in a tangible computer-readable medium coupled to the processor which, when executed by the processor, configure the processor to generate a behavior training set for the embedded control system, wherein the behavior training set correlates inputs to the embedded control system with outputs from the embedded control system during a training process to define behavior fingerprints for the embedded control system monitor inputs to the embedded control system and outputs from the embedded control system in real time during operation of the embedded control system, and generate an alert when one or more of the inputs into the embedded control system or the outputs collected from the embedded control system in real time operation represent an anomaly.

    Abstract translation: 披露了网络环境中实时控制系统管理的系统和方法。 在一个实施例中,用于实时嵌入式控制系统行为监视和异常检测的基于计算机的系统包括存储在耦合到处理器的有形计算机可读介质中的处理器和逻辑指令,当由处理器执行时,将该处理器配置为 为嵌入式控制系统生成行为训练集,其中行为训练集在训练过程中将来自嵌入式控制系统的输入与嵌入式控制系统的输出相关联,以定义用于嵌入式控制系统的行为指纹监视到嵌入式控制系统的输入 并在嵌入式控制系统运行期间实时输出嵌入式控制系统,并在嵌入式控制系统的一个或多个输入或嵌入式控制系统实时输出的输出中出现异常时产生警报 。

    Executing unprotected mode services in a protected mode environment
    8.
    发明授权
    Executing unprotected mode services in a protected mode environment 有权
    在受保护的模式环境中执行不受保护的模式服务

    公开(公告)号:US09344439B2

    公开(公告)日:2016-05-17

    申请号:US14159127

    申请日:2014-01-20

    Abstract: Disclosed herein is a method for executing unprotected mode services in a protected mode computing environment includes initiating a protected mode service that is configured to execute in a protected mode. Further, the method includes verifying an integrity of one or more unprotected mode services configured to execute in an unprotected mode. The one or more unprotected mode services is registered with the protected mode service. The method also includes initiating an unprotected mode service of the one or more unprotected mode services in response to the integrity of the unprotected mode service being verified.

    Abstract translation: 这里公开了一种用于在受保护模式计算环境中执行未保护模式服务的方法,包括启动被配置为以受保护模式执行的受保护模式服务。 此外,该方法包括验证被配置为以非保护模式执行的一个或多个未保护模式服务的完整性。 一个或多个不受保护的模式服务在保护模式服务中注册。 该方法还包括响应于正在验证的未保护模式服务的完整性,发起一个或多个未保护模式服务的无保护模式服务。

    METHODS AND SYSTEMS FOR USE IN ANALYZING CYBER-SECURITY THREATS IN AN AVIATION PLATFORM
    9.
    发明申请
    METHODS AND SYSTEMS FOR USE IN ANALYZING CYBER-SECURITY THREATS IN AN AVIATION PLATFORM 有权
    用于分析航空平台中的安全威胁的方法和系统

    公开(公告)号:US20140380485A1

    公开(公告)日:2014-12-25

    申请号:US13922825

    申请日:2013-06-20

    CPC classification number: G06F21/577 H04B7/18506 H04L63/1433

    Abstract: Methods and systems for use in in analyzing cyber-security threats for an aircraft are described herein. One example method includes generating an interconnection graph for a plurality of interconnected aircraft systems. The interconnection graph includes a plurality of nodes and a plurality of links. The method also includes defining a cost function for a cyber-security threat to traverse each link and defining a requirements function for a cyber-security threat to exploit each node. The method further includes generating a set of threat traversal graphs for each cyber-security threat of a plurality of cyber-security threats.

    Abstract translation: 本文描述了用于分析飞机的网络安全威胁的方法和系统。 一个示例性方法包括生成多个互连飞行器系统的互连图。 互连图包括多个节点和多个链路。 该方法还包括定义用于网络安全威胁的成本函数,以遍历每个链接,并为网络安全威胁定义需求函数以利用每个节点。 该方法还包括为多个网络安全威胁的每个网络安全威胁生成一组威胁遍历图。

Patent Agency Ranking