Patent application number | Description | Published |
20100017048 | MODEL BASED SENSOR SYSTEM FOR LOADS AWARE CONTROL LAWS - A flight control system includes a model-based sensor system which estimates angular accelerations to control rotor system moment such that loads on the aircraft structure are reduced to thereby allow an aircraft structural envelope to more closely follow an aircraft service flight envelope. | 01-21-2010 |
20110137492 | STABILIZED APPROACH TO A POINT IN DEGRADED VISUAL ENVIRONMENT - A flight control system includes a fly by wire system operable to provide predictive termination point symbology overlaid on a synthetic imagery displayed by a display system in response to a control system and a sensor system. A method to facilitate a VTOL aircraft approach to a terminal point includes integrating a flight director mode with a control system to provide a stabilized approach path to a termination point. | 06-09-2011 |
20120136512 | External Load Inverse Plant - A method of controlling the flight of a rotorcraft in a feed-forward/feedback architecture includes utilizing an aircraft plant model to control the rotorcraft performance; determining when an external load is coupled to the rotorcraft; and modifying an inverse plant when the external load is present. | 05-31-2012 |
20130054053 | TORQUE BASED POWER LIMIT CUEING SYSTEM AND METHOD - A torque based power limit cueing system is provided and includes an engine computer to compile data relating to torque and additional information of each of one or more engines, an active stick by which tactile cueing are provided to a pilot and by which the pilot inputs control commands, a multi-function display (MFD) by which visible cues are provided to the pilot and a flight control computer (FCC) operably coupled to the engine computer, the active stick and the multi-function display, the FCC being configured to receive the data from the engine computer and to output tactile cue commands and visible commands in accordance with the torque and the additional information of each of the one or more engines to the active stick and the MFD, respectively. | 02-28-2013 |
Patent application number | Description | Published |
20090259849 | Methods and Apparatus for Authenticated User-Access to Kerberos-Enabled Applications Based on an Authentication and Key Agreement (AKA) Mechanism - Methods and apparatus are provided for authenticated user-access to Kerberos-enabled applications based on an Authentication and Key Agreement mechanism. A user is first authenticated using an Authentication and Key Agreement mechanism based on a bootstrapping protocol that mutually authenticates the user and one or more servers; and, once the user is authenticated, the user is enabled to derive a session key and is provided with a first ticket to a Ticket Granting Server. The first ticket can establish an identity of the user and include the session key. The bootstrapping protocol can be based on a Generic Bootstrapping Architecture | 10-15-2009 |
20090259851 | Methods and Apparatus for Authentication and Identity Management Using a Public Key Infrastructure (PKI) in an IP-Based Telephony Environment - Methods and apparatus arc provided for user authentication using a Public Key Infrastructure (PKI) in an IP-based telephony environment, such as an IMS network. A user of a user device attempting to access an IP-based telephony network can be authenticated by obtaining one or more private keys of the user from a secure memory associated with the user device; generating an integrity key and a ciphering key; encrypting the integrity key and the ciphering key using a session key; encrypting the session key with a public key of the IP-based telephony network; and providing the encrypted session key, encrypted integrity key and encrypted ciphering key to the IP-based telephony network for authentication. A network-based method is also provided for authenticating a user in an IP-based telephony network. | 10-15-2009 |
20100262703 | IDENTITY MANAGEMENT SERVICES PROVIDED BY NETWORK OPERATOR - Techniques are disclosed for enabling operators of communication networks to provide one or more identity services such as, for example, an authentication service. For example, in a communication network, assume that a first computing device is a client device, a second computing device is an application server, and a third computing device is a server under control of an operator of the communication network. A method may comprise the following steps. In response to the first computing device issuing a resource request to the second computing device and the first computing device providing a first identifier to the second computing device for use in authenticating the first computing device to the second computing device, and in response to the second computing device being unable to authenticate the first computing device, the third computing device assisting in the authentication of the first computing device to the second computing device when a correlation exists between the first identifier sent by the first computing device and a second identifier used by the first computing device to access the communication network as a subscriber, wherein the second computing device is able to reply to the resource request sent by the first computing device upon a successful authentication assisted by the third party computing device. | 10-14-2010 |
20110225643 | SECURE DYNAMIC AUTHORITY DELEGATION - In a communication network wherein a first computing device represents a resource owner and a second computing device represents a resource requestor, the resource owner detects an occurrence of an event, wherein the event occurrence represents a request to access one or more resources of the resource owner stored in a resource residence. The resource owner sends an authorization token to the resource requestor in response to the event occurrence, the authorization token serving as a proof of authorization delegated by the resource owner to be presented by the resource requestor to the resource residence so as to permit the resource requestor to access the one or more requested resources stored in the resource residence. | 09-15-2011 |
20110296518 | APPLICATION LAYER AUTHENTICATION IN PACKET NETWORKS - Techniques are disclosed for efficient authentication of an end user device at an application server of a communication network. For example, wherein it is assumed that, in a communication network, a first computing device is an end user device, a second computing device is a gateway server, and a third computing device is an application server, a method comprises the following steps. The second computing device authenticates one or more packets received from the first computing device. The second computing device marks the one or more packets with a first-layer identity before routing the one or more packets toward the third computing device such that the third computing device is able to authenticate the one or more packets from the first computing device by confirming an association between the first-layer identity and a second-layer identity. For example, the first-layer identity may comprise a link layer identity assigned to the first computing device (e.g., assigned by the gateway server or some other server), and the second-layer identity may comprise an application layer identity assigned to the first computing device (e.g., previously assigned by the application server or some other server). | 12-01-2011 |
20120303571 | OPTIMAL MULTI-FACTOR EVALUATION IN COMPUTING SYSTEMS - Techniques are disclosed for optimally scheduling computations that involve multiple factors, the cost of evaluations and probabilities of success of which are known. For example, a methodology is provided for determining an optimal schedule of a multi-factor test in sub-quadratic time. While the methodology has wide ranging application, we illustrate a particular applicability to a security application involving multi-factor authentication in a cloud computing environment, as well as applicability to the contact center agent scheduling. | 11-29-2012 |
20140067962 | DIRECT ELECTRONIC MAIL - Techniques are disclosed for enabling improved electronic mail handling in communication networks. For example, a method of handling an electronic mail message in an electronic mail system comprises the following steps. A secure connection is established between a client of a message sender and a server of a message recipient in the electronic mail system. An authentication exchange is employed to verify the identity of the message sender. The message sender deposits an electronic mail message with the server of the message recipient upon successful verification of the identity of the client of the message sender. | 03-06-2014 |