Aircraft flight security system and method
First Claim
Patent Images
1. A method of securing a vehicle, comprising:
- commencing pre-departure operations, creating in a security system a non-persistent identifier after commencement of pre-departure operations, entering the non-persistent identifier into an identifier receiver, storing the non-persistent identifier in an identifier processor, monitoring during operation of the vehicle for a restricted event, requesting entry of a comparison identifier upon detection of the restricted event, allowing the restricted event to proceed if the comparison identifier matches the non-persistent identifier, performing a restriction action if the comparison identifier does not match the non-persistent identifier, terminating operation of the vehicle, and clearing the non-persistent identifier from the identifier processor;
wherein the non-persistent identifier includes an access code that is not pre-arranged in the identifier processor prior to activation of the security system, the access code being uniquely created by a user each time the security system, is activated by the user.
0 Assignments
0 Petitions
Accused Products
Abstract
A system of securing access to vehicle control systems using non-persistent identifiers. Identifiers are received and stored at the commencement of vehicle operations. Restricted events are detected and confirmation identifiers are requested, in order to continue vehicle operations. If confirmation identifiers are not presented, vehicle operations enter caution mode, and access to vehicle controls is restricted. Upon termination of a vehicle trip, the non-persistent identifiers are discarded. The system provides a convenient, low-overhead, secure means of regulating access to vehicle control systems.
79 Citations
56 Claims
-
1. A method of securing a vehicle, comprising:
-
commencing pre-departure operations, creating in a security system a non-persistent identifier after commencement of pre-departure operations, entering the non-persistent identifier into an identifier receiver, storing the non-persistent identifier in an identifier processor, monitoring during operation of the vehicle for a restricted event, requesting entry of a comparison identifier upon detection of the restricted event, allowing the restricted event to proceed if the comparison identifier matches the non-persistent identifier, performing a restriction action if the comparison identifier does not match the non-persistent identifier, terminating operation of the vehicle, and clearing the non-persistent identifier from the identifier processor;
wherein the non-persistent identifier includes an access code that is not pre-arranged in the identifier processor prior to activation of the security system, the access code being uniquely created by a user each time the security system, is activated by the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A system for securing a vehicle, the vehicle comprising one or more vehicle controls, the system comprising:
-
an identifier receiver adapted to receive a non-persistent identifier;
an identifier processor adapted to store the non-persistent identifier, to compare the stored non-persistent identifier with a comparison identifier, and to provide a comparison result; and
a vehicle control access manager adapted to receive the comparison result from the identifier processor, and to grant or deny access to the one or more vehicle controls depending on the comparison result;
wherein the non-persistent identifier includes an access code that is not prearranged in the identifier processor prior to activation of the system, the access code being uniquely created by a user each time the system is activated by the user, and wherein the vehicle control access manager is adapted to detect a restricted event report the restricted event to the identifier processor and request entry of the comparison identifier, and wherein the restricted event occurs during vehicle operations. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56)
-
Specification