Multi core vehicle management countermeasures system and method
First Claim
1. A computer system adapted to intercept a true civil flight management data message containing a plurality of true identification data portions and transmit a decoy civil flight management data message whereby said plurality of true identification data portions are removed and replaced with a plurality of decoy data portions prior to transmission via a civil transponder, said computer system comprising:
- a processor; and
a memory coupled to the processor, the memory having stored therein software instructions that, when executed by the processor, cause the processor to perform operations including;
receiving a said true civil flight management data message from a civil flight management system component, said true civil flight management data message containing said plurality of true identification data portions, and said true civil flight management data message containing data indicating a destination component, said destination component including a civil transponder;
generating a said plurality of decoy data portions each said decoy data portion corresponding to one of said true identification data portions;
creating said decoy civil flight management data message based on said true civil flight management data message by removing said plurality of true identification data portions and replacing with said plurality of decoy data portions, said decoy civil flight management data message being free of said true identification data portions; and
transmitting said decoy civil flight management data message via said civil transponder.
1 Assignment
0 Petitions
Accused Products
Abstract
A computerized method for performing countermeasure transmission of decoy vehicle data. The method can include receiving a vehicle management data message from one of a plurality of vehicle management system components. The vehicle management data message can have data indicating at least one destination component, and the at least one destination component can include a civil transponder. The method can include transforming said vehicle management data message into a decoy vehicle management data message and transmitting the decoy flight management data message to at least one of the at least one destination component(s).
29 Citations
18 Claims
-
1. A computer system adapted to intercept a true civil flight management data message containing a plurality of true identification data portions and transmit a decoy civil flight management data message whereby said plurality of true identification data portions are removed and replaced with a plurality of decoy data portions prior to transmission via a civil transponder, said computer system comprising:
-
a processor; and a memory coupled to the processor, the memory having stored therein software instructions that, when executed by the processor, cause the processor to perform operations including; receiving a said true civil flight management data message from a civil flight management system component, said true civil flight management data message containing said plurality of true identification data portions, and said true civil flight management data message containing data indicating a destination component, said destination component including a civil transponder; generating a said plurality of decoy data portions each said decoy data portion corresponding to one of said true identification data portions; creating said decoy civil flight management data message based on said true civil flight management data message by removing said plurality of true identification data portions and replacing with said plurality of decoy data portions, said decoy civil flight management data message being free of said true identification data portions; and transmitting said decoy civil flight management data message via said civil transponder. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computerized method for performing countermeasure transmission of decoy vehicle data, the method comprising:
-
receiving by a processor a true vehicle management data message from one of a plurality of vehicle management system components, said true vehicle management data message having data indicating at least one destination component, said at least one destination component including a civil transponder; transforming by said processor said true vehicle management data message into a decoy vehicle management data message wherein said true vehicle management data message contains a true vehicle identifier data portion, and wherein transforming said true vehicle management data message into a decoy vehicle management data message includes; creating a decoy vehicle identifier data portion; replacing said true vehicle identifier data portion with said decoy vehicle identifier data portion; and transmitting by said processor said decoy vehicle management data message to at least one of said at least one destination component. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A nontransitory computer readable medium haring stored thereon software instructions that, when executed by a computer, cause the computer to perform operations comprising:
-
receiving a true vehicle management data message from one of a plurality of vehicle management system components, said true vehicle management data message having data indicating at least one destination component, said at least one destination component including a civil transponder, and said plurality of vehicle management system components including a civil vehicle management system component and a tactical vehicle management system component; transforming said true vehicle management data message into a decoy vehicle management data message wherein said vehicle management data message contains a true vehicle identifier data portion, and wherein transforming said true vehicle management data message into a decoy vehicle management data message includes; creating a decoy vehicle identifier data portion; replacing said true vehicle identifier data portion with said decoy vehicle identifier data portion; and transmitting said decoy flight management data message to at least one of said at least one destination component. - View Dependent Claims (15, 16, 17, 18)
-
Specification