US 9,813,911 B2
Methods and systems for monitoring computing devices on a vehicle
Jason Kong, Lake Forest, CA (US); Michael Dierickx, Lake Forest, CA (US); Phillip Watson, Lake Forest, CA (US); and Justin Vaicaro, Lake Forest, CA (US)
Assigned to Panasonic Avionics Corporation, Lake Forest, CA (US)
Filed by Panasonic Avionics Corporation, Lake Forest, CA (US)
Filed on Dec. 8, 2015, as Appl. No. 14/962,425.
Prior Publication US 2017/0164199 A1, Jun. 8, 2017
Int. Cl. H04M 1/66 (2006.01); H04W 12/08 (2009.01); H04B 1/3822 (2015.01)
CPC H04W 12/08 (2013.01) [H04B 1/3822 (2013.01)] 21 Claims
OG exemplary drawing
1. A machine implemented method, comprising:
monitoring for detecting a potential security breach, a first set of networked devices located on a transportation vehicle and a second set of user devices that are controlled by users of the transportation vehicle;
detecting that a first parameter has reached a first threshold value indicating a suspicious behavior by a user device;
obtaining at least a second parameter associated with the user device and the first parameter, based on detecting that the first parameter has reached the first threshold value;
correlating the first parameter and the second parameter to declare a security related event when the second parameter has reached a second threshold value associated with the second parameter; and
providing an alert for the security related event and a summary of security related events that have reached the first threshold value and the second threshold value; wherein an alert level for the security event varies based on a type of the security related event.