Abstract: A system, a method, and a computer program embodied on a non-transitory computer-readable medium, the program configured to cause at least one processor to perform steps including gathering observations and forecasts of a plurality of aviation environmental and operational data of a terminal airspace, independently transforming the observations and forecasts into respective terminal airspace risk factors; integrating the terminal airspace risk factors into operational time periods; weighting the integrated terminal airspace risk factors into an overall airspace risk score for each operational time period; categorizing the overall airspace risk score into a terminal airspace risk category based upon at least one predetermined risk score threshold; and displaying the risk categories and selected underlying risk factors data on a map with a plurality of display panes.
Type:
Grant
Filed:
January 21, 2020
Date of Patent:
February 22, 2022
Assignee:
ROBUST ANALYTICS, INC.
Inventors:
Peter F Kostiuk, Hugo Kang, Michael Mohen, Varun Sudarsanan
Abstract: A system, a method, and a computer program embodied on a non-transitory computer-readable medium, the program configured to cause at least one processor to perform steps including gathering observations and forecasts of a plurality of aviation environmental and operational data of a terminal airspace, independently transforming the observations and forecasts into respective terminal airspace risk factors; integrating the terminal airspace risk factors into operational time periods; weighting the integrated terminal airspace risk factors into an overall airspace risk score for each operational time period; categorizing the overall airspace risk score into a terminal airspace risk category based upon at least one predetermined risk score threshold; and displaying the risk categories and selected underlying risk factors data on a map with a plurality of display panes.
Type:
Application
Filed:
January 21, 2020
Publication date:
July 22, 2021
Applicant:
Robust Analytics, Inc.
Inventors:
Peter F KOSTIUK, Hugo KANG, Michael MOHEN
Abstract: A network of connected devices which is on-board an aircraft, including a plurality of connected devices, wherein at least one of the connected devices receives information from a source external to the network, and a consensus component to perform consensus on the at least one connected device which receives the information from the source to determine a main master and whether the information is correct, wherein the main master sends the correct information to the other device or devices.
Abstract: A network of connected devices which is on-board an aircraft, including a plurality of connected devices, wherein at least one of the connected devices receives information from a source external to the network, and a consensus component to perform consensus on the at least one connected device which receives the information from the source to determine a main master and whether the information is correct, wherein the main master sends the correct information to the other device or devices.
Abstract: A method or network that addresses cybersecurity vulnerabilities in an ADS-B network by validating and authenticating ADS-B messages. Nodes of the network maintain a validated ledger of ADS-B transactions and use validated information from this ledger to improve security against common cybersecurity attacks including, but not limited to, denial of service attacks, jamming attacks, spoofing attacks, flooding attacks and eavesdropping.
Abstract: A method or network that addresses cybersecurity vulnerabilities in an ADS-B network by validating and authenticating ADS-B messages. Nodes of the network maintain a validated ledger of ADS-B transactions and use validated information from this ledger to improve security against common cybersecurity attacks including, but not limited to, denial of service attacks, jamming attacks, spoofing attacks, flooding attacks and eavesdropping.
Abstract: A method or network that addresses cybersecurity vulnerabilities in an ADS-B network by validating and authenticating ADS-B messages. Nodes of the network maintain a validated ledger of ADS-B transactions and use validated information from this ledger to improve security against common cybersecurity attacks including, but not limited to, denial of service attacks, jamming attacks, spoofing attacks, flooding attacks and eavesdropping.