Remote wipe of aircraft data
First Claim
1. An application interface to an in-flight entertainment and communication (IFEC) computer system on board an aircraft for selectively wiping data stored thereon, the application interface comprising:
- a remote control interface in communication with a wide area network connection and receptive to a potential attack indicator from a remote client computer system;
an attack classifier that assigns an attack severity classification based upon the potential attack indicator received by the remote control interface;
a stored data cataloger including a catalog of individual predefined blocks of data stored on the IFEC computer system with each block assigned a data sensitivity classification, and an inventory of each predefined block of data associated with the data sensitivity classification being maintained as a data inventory list;
a controller in communication with the attack classifier and the stored data cataloger, the controller designating selected ones of the predefined blocks of data to be deleted in accordance with an attack attempt response that correlates the data sensitivity classification of the predefined blocks of data to the attack severity classifications; and
a data removal engine in communication with the controller and a database of the IFEC computer system on which the predefined blocks of data are stored, the data removal engine implementing the deletion operations on the database as designated in the attack attempt response for the selected ones of the predefined blocks of data.
1 Assignment
0 Petitions
Accused Products
Abstract
In the selective wiping of data stored on an aircraft Inflight Entertainment and Communications (IFEC) computer system, a potential attack indicator generated in response to a detection of an attack attempt that is received from a remote manager client computer system. The potential attack indicator includes an attack severity classification, which is correlated to one of a plurality of attack attempt responses. Each of the attack attempt responses correspond to a data sensitivity classification, and each predefined block of data stored on the IFEC computer system is assigned a data sensitivity classification. According to the attack attempt response that was correlated to the received attack severity classification, the predefined blocks of data assigned to the data sensitivity classification corresponding to the attack attempt response are deleted.
11 Citations
20 Claims
-
1. An application interface to an in-flight entertainment and communication (IFEC) computer system on board an aircraft for selectively wiping data stored thereon, the application interface comprising:
-
a remote control interface in communication with a wide area network connection and receptive to a potential attack indicator from a remote client computer system; an attack classifier that assigns an attack severity classification based upon the potential attack indicator received by the remote control interface; a stored data cataloger including a catalog of individual predefined blocks of data stored on the IFEC computer system with each block assigned a data sensitivity classification, and an inventory of each predefined block of data associated with the data sensitivity classification being maintained as a data inventory list; a controller in communication with the attack classifier and the stored data cataloger, the controller designating selected ones of the predefined blocks of data to be deleted in accordance with an attack attempt response that correlates the data sensitivity classification of the predefined blocks of data to the attack severity classifications; and a data removal engine in communication with the controller and a database of the IFEC computer system on which the predefined blocks of data are stored, the data removal engine implementing the deletion operations on the database as designated in the attack attempt response for the selected ones of the predefined blocks of data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for selectively wiping data stored on an in-flight entertainment and communications (IFEC) computer system, the method comprising:
-
receiving a potential attack indicator from a remote manager client computer system, the potential attack indicator being generated in response to a detection of an attack attempt against the IFEC computer system and including an attack severity classification; correlating, on the IFEC computer system, the attack severity classification to one of a plurality of attack attempt responses each corresponding to a data sensitivity classification, each of a plurality of predefined blocks of data stored on the IFEC computer system being assigned one of the data sensitivity classifications; and deleting, from the IFEC computer system according to the attack attempt response that was correlated to the received attack severity classification, the predefined blocks of data that are assigned the data sensitivity classification corresponding to the attack attempt response. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A system for selectively wiping data stored on a vehicle entertainment system, the system comprising:
-
a remote control interface in communication with a wide area network connection and receptive to a potential attack indicator from a client computer system on the vehicle storing different kinds of data; an attack classifier that assigns an attack severity classification based upon the potential attack indicator received by the remote control interface; an inventory of the different kinds of data with each kind of data assigned a data sensitivity classification; a controller in communication with the attack classifier designates selected kinds of data to be deleted in accordance with an attack attempt response that correlates the data sensitivity classification of the kind of data to the attack severity classifications based on the inventory; and a data removal engine in communication with the controller and the client computer system in which the data removal engine performs deletion operations corresponding to the attack attempt response for the selected ones kinds of data. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification