US20180261109A9 - Low altitude aircraft identification system - Google Patents
Low altitude aircraft identification system Download PDFInfo
- Publication number
- US20180261109A9 US20180261109A9 US15/839,661 US201715839661A US2018261109A9 US 20180261109 A9 US20180261109 A9 US 20180261109A9 US 201715839661 A US201715839661 A US 201715839661A US 2018261109 A9 US2018261109 A9 US 2018261109A9
- Authority
- US
- United States
- Prior art keywords
- aircraft
- identification
- low
- light
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G5/00—Traffic control systems for aircraft
- G08G5/70—Arrangements for monitoring traffic-related situations or conditions
- G08G5/72—Arrangements for monitoring traffic-related situations or conditions for monitoring traffic
- G08G5/727—Arrangements for monitoring traffic-related situations or conditions for monitoring traffic from a ground station
-
- G08G5/0082—
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B64—AIRCRAFT; AVIATION; COSMONAUTICS
- B64C—AEROPLANES; HELICOPTERS
- B64C39/00—Aircraft not otherwise provided for
- B64C39/02—Aircraft not otherwise provided for characterised by special use
- B64C39/024—Aircraft not otherwise provided for characterised by special use of the remote controlled vehicle type, i.e. RPV
-
- G08G5/0026—
-
- G08G5/0069—
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G5/00—Traffic control systems for aircraft
- G08G5/20—Arrangements for acquiring, generating, sharing or displaying traffic information
- G08G5/22—Arrangements for acquiring, generating, sharing or displaying traffic information located on the ground
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G5/00—Traffic control systems for aircraft
- G08G5/50—Navigation or guidance aids
- G08G5/55—Navigation or guidance aids for a single aircraft
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G5/00—Traffic control systems for aircraft
- G08G5/50—Navigation or guidance aids
- G08G5/57—Navigation or guidance aids for unmanned aircraft
-
- B64C2201/146—
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B64—AIRCRAFT; AVIATION; COSMONAUTICS
- B64U—UNMANNED AERIAL VEHICLES [UAV]; EQUIPMENT THEREFOR
- B64U2201/00—UAVs characterised by their flight controls
- B64U2201/20—Remote controls
Definitions
- aspects of the example implementations are directed to methods and systems for identification of airborne objects at a low altitude, and more specifically, to systems and methods for identification of low-altitude aircraft.
- UAVs unmanned aerial vehicles
- UASs unmanned aircraft systems
- one of the bases of the car control system may include an identification credential issued by a division of motor vehicles (DMV) or others, such as a license plate.
- DMV motor vehicles
- UAVs and/or UASs there is no analogous identification method or system for related art UAVs and/or UASs.
- related art small UASs e.g., aircrafts up to 25 pounds flying up to 500 ft of the low altitude airspace
- related art tail numbers that are used in commercial aircraft are too large in size (e.g., area) to be provided on these vehicles, or they will be too small to allow the small UAS identification.
- Encrypting information via a regular broadcast radio signal such as WiFi while utilizing a static SSID for the identification and addressing of WiFi packets is prone to “packet sniffing” to determine the SSID. Once the SSID is determined it may be possible to “clone” that device and intercept packets intended for it. It would be useful and more secure to have an encrypted identifier for any radio frequency (RF) transmission beacon, and particularly for WiFi transmissions, that utilized existing standards and equipment.
- RF radio frequency
- An identification solution is needed that permits ground-level identification, as well as identification by other aircrafts of various sizes and altitudes.
- the identification solution also needs to allow detection in an automated manner using a device.
- Example implementations associated with the aspects of the present invention include a low altitude aircraft identification system composed by three components: a small aircraft electronic identification box with an embedded logger, a ground identification equipment to automatically identify the aircraft just pointing at it, and a central identification code database server.
- the identification code can be transmitted by a visible light color sequence or by a radio frequency signal.
- the ground identification device is capable of recognizing both kinds of code.
- a traffic management system has the function of monitoring the traffic and the ability of notifying the responsible party in case of any non-compliance with a regulation. Therefore, an operation to identify the responsible party is to identify the vehicle.
- the ground traffic management system requires all vehicles to have a license plate for driving on public roads. This license plate allows the police and other drivers to identify the vehicle.
- the present example implementation is directed to a light array that blinks a defined color pattern sequence for each aircraft.
- This identification mechanism is the possibility for a person to visually identify an aircraft from a distance of about 500 feet, without the use of any special equipment.
- the color sequence, blinking speed and the meaning thereof can be defined by the pilot, the fleet control or even by a regulatory agency.
- the number of colors used and the number of blinks may define the quantity of codes possible.
- the electronic identification box has a position logger and a transponder.
- the position logger has a global positioning system (GPS) module to obtain the absolute position where the aircraft is flying by.
- GPS global positioning system
- the logger stores the flight path of each trip made by the aircraft. Together with the positioning information, the speed and heading may also be stored.
- Telemetry data provided by the aircraft sensors, such as inertial measurement unit (IMU) and power level, and application data provided by the autopilot or any embedded component are also stored. This information is the proof of the aircraft real flight data, and it may perform functions similar to a civil aviation “black box” in case of a crash.
- IMU inertial measurement unit
- the data may show where the UAS flew by.
- the transponder may transmit a code similar to the one generated (e.g., blinked) by the light arrays but through the RF frequency, allowing automatic identification by any RF receiver on land, or installed in other aircrafts.
- the transponder may also transmit the last position, including but not limited to heading and speed, thus allowing the implementation of a collision avoidance system.
- the identification box has also an independent battery to allow the transmitter works even without the external power supply. Accordingly, in case of an aircraft crash, the transponder will continue to transmit the last know position so that the wrecked vehicle may be located or identified.
- the identification box has a photo sensor configured to receive external signals.
- the photo sensor is excited with a high luminous beam in a specific wavelength and modulation, such as a laser beam, the identification box may change its operational behavior.
- the identification box can, for instance, change its light brightness, send commands to the autopilot, increase the data storage frequency, but is not limited thereto.
- One of the preset configurations for the photo sensor stimulation is to modify flag data in the RF data sent by the transmitter, and/or the behavior of the blinking pattern.
- more than one aircraft may be flying close to each other, in a way that a receiver on the ground is detecting all of the flying aircraft without knowing which UAV is transmitting each identification code. Therefore, it is just a matter of directing a specific wavelength and modulated light beam emitter to one of the aircrafts, and the aircraft will thus modify its behavior and its transmitted data, allowing the data-to-vehicle association.
- This feature creates a duplex communication, allowing the identification box to send broadcast data by its color light emitters, and receive directional data through the light sensor.
- Commands can also be received and executed using the communication channel.
- the identification box can, for instance, receive way point change command through a modulated light beam and change the UAV destination coordinates.
- a police department may maintain law enforcement agents who are supervising the roads and highways in order to detect drivers disobeying traffic laws.
- Devices such as the radar allow police officers to detect the vehicle speed.
- the license plate allows for identifying the vehicle owner and accessing the complete history of the vehicle. This kind of control allows for small remote controlled aircraft surveillance and regulation.
- the example implementation includes a remote (e.g., ground) device to assist the aircraft identification. Since the electronic identification box relies on visual information, the ground device is equipped with a camera, lens and image processing algorithms to capture the color sequence. In addition, this device has an RF receiver capable of receiving the identification box RF signal to connect both information sources and to verify the authenticity. The device may also have a network connection through Wi-Fi or cellphone network to access the identification server.
- a remote e.g., ground
- the ground device is equipped with a camera, lens and image processing algorithms to capture the color sequence.
- this device has an RF receiver capable of receiving the identification box RF signal to connect both information sources and to verify the authenticity.
- the device may also have a network connection through Wi-Fi or cellphone network to access the identification server.
- the aircraft code and the position where the aircraft was detected at are submitted to the central identification server to identify its owner, the responsible pilot and the flight permission.
- the remote (e.g., ground) user wants to check if one specific vehicle has the flight permission to fly in that area, that user directs the identification device in the vicinity of the aircraft.
- the identification device automatically handles the identification and crosschecks with the identification database.
- the device shows on the screen if the aircraft position and timestamp is according to its permitted flight plan. In one example implementation, the device screen shows a “valid” message. Otherwise, the user will see an “invalid” message. Clicking in the message is possible to see all the information database information associated with the aircraft.
- FIG. 1 shows the external view of the identification box with 4 light arrays, according to an example implementation.
- FIG. 2 shows the schematic view of the identification box, according to the example implementation.
- FIGS. 3A and 3B show the external view of the ground identification device facing forward and backward, according to the example implementation.
- FIG. 4 shows the schematic view of the ground identification device, according to the example implementation.
- FIG. 5 shows the user interface of the ground identification device, according to the example implementation.
- FIG. 6 shows the server process flow, according to the example implementation.
- FIG. 7 shows the identification box software flow, according to the example implementation.
- FIG. 8 shows the remote (e.g., ground) device software flow, according to the example implementation.
- FIG. 9 illustrates an embodiment of an encryption system 900 for low altitude aircraft identification.
- FIG. 10 illustrates an embodiment of an encryption process 1000 for low altitude aircraft identification systems.
- FIG. 11 illustrates an embodiment of an encryption system 1100 for low altitude aircraft identification.
- FIG. 12 illustrates an embodiment of an encryption system 1200 for low altitude aircraft identification.
- FIG. 13 illustrates an embodiment of encrypted communication 1300 in low altitude aircraft identification systems.
- FIG. 14 illustrates an embodiment of drone operation logic 1400 .
- Described herein are example embodiments of systems, devices, and methods that enable identification of airborne objects at a low altitude, and more specifically, to systems and methods for identification of low-altitude aircraft.
- SSID herein refers to “Service Set IDentifier, a unique identifier attached to the header of packets sent over a wireless local-area network (WLAN).
- the SSID acts as a password when a mobile device tries to connect to the basic service set (BSS) and is a standard feature of the IEEE 802.11 WLAN architecture.
- BSS basic service set
- references to “one embodiment” or “an embodiment” do not necessarily refer to the same embodiment, although they may.
- the words “comprise,” “comprising,” and the like are to be construed in an inclusive sense as opposed to an exclusive or exhaustive sense; that is to say, in the sense of “including, but not limited to.” Words using the singular or plural number also include the plural or singular number respectively, unless expressly limited to a single one or multiple ones.
- the words “herein,” “above,” “below” and words of similar import when used in this application, refer to this application as a whole and not to any particular portions of this application.
- FIG. 1 shows the perspective view of one of the two components of the example implementation
- FIG. 2 shows its schematic with the internal components
- FIG. 7 shows firmware execution flow.
- the identification box 1 includes one or more light arrays 2 each including several light color emitters 3 . These color emitters 3 are controlled by the light controller module 17 as shown in FIG. 2 as being connected to color emitters 11 . More specifically, the color emitters 3 generate (e.g., blink, variable light intensity or color fade) a defined color sequence programmed in the unit firmware executed by the central control unit 18 (shown in FIG. 2 ), and following the main loop flow 71 , shown in FIG. 7 and described below.
- the central control unit 18 shown in FIG. 2
- main loop flow 71 shown in FIG. 7 and described below.
- the identification box 1 also has a radio antenna 5 connected to a RF module 16 shown in FIG. 2 as being connected to RF antenna 12 , that transmits the same code or a modified version of the code through a radio signal.
- the RF module 16 can receive the RF signal from identification boxes (e.g. nearby) installed in other aircrafts, and save this information in the non-volatile storage module 15 that is connected to the memory card installed in the memory card slot 7 .
- the example implementation also has one light detection sensor 4 connected to a light receiver module 19 configured to detect external excitation by a light beam with defined wavelength and intensity.
- the light beam detection flow 72 of FIG. 7 is executed. Consequently, the behavior of the identification box 1 can change, for instance adding or changing extra data information to the transmitted RF signal or change the light blink pattern or intensity.
- the identification box 1 also has a location system antenna 6 (e.g., GPS antenna) connected to a location module 14 , shown in FIG. 2 as being connected to system antenna 13 , to log the flight path in the storage module 15 .
- This positioning data e.g. GPS data, camera motion capture, radio triangulation system
- This positioning data is also transmitted by the RF module 16 together with the identification code.
- the identification box 1 has also an external power connector 8 used to recharge the internal power storage 20 (e.g., LiPo (Lithium-Polymer) battery or super capacitor) and supply power to all internal and external components.
- the internal power storage 20 e.g., LiPo (Lithium-Polymer) battery or super capacitor
- the internal power storage 20 can supply power to all the components.
- the RF module 16 may keep following the main loop flow 71 , and transmitting the last location position and the identification code until the battery runs out of power, while the other components will be in a sleep mode.
- a housing 9 e.g., standard weatherproof box
- All the internal components are protected by a housing 9 (e.g., standard weatherproof box) against impact and weather, in order to resist a crash without damaging the internal circuit.
- the other component of the example implementation is the ground identification device 21 , which is remote from the UAV or UAS, as shown in left and right perspective in FIGS. 3A and 3B respectively, and with its internal schematic in FIG. 4 .
- the main user interface is shown in FIG. 5 , the server process in FIG. 6 and its firmware process flow in FIG. 8 .
- the ground identification device 21 may be a custom-made device, specifically for the example implementation.
- the ground identification device 21 may be a mobile communication device (e.g., smartphone), containing instructions (e.g., software or downloadable and/or online application) as would be known to those skilled in the art.
- the mobile communication device can also be attached to external components like zoom lens or light beams, but not limited to, to be able to execute other features of the ground device 21 .
- the ground identification device 21 has a camera with zoom 22 capable of capturing images such as video in real-time.
- the identification procedure flow 81 as shown in FIG. 8 is executed to process the video and identify the aircraft. This video goes to an image processing module 36 , connected to camera 32 in FIG. 4 , which analyses the image to detect that the identification box blinks and capture the blink sequence.
- the detected code is informed to the touchscreen 24 , in the field 51 as shown in FIG. 5 .
- a detection window 54 will be shown around the detected aircraft.
- a request to a server will be made to obtain further aircraft data, following the aircraft request data flow 61 as shown in FIG. 6 .
- Other information, associated with the aircraft owner is presented in the field 52 , is provided.
- a location system antenna 27 (e.g., GPS antenna) is connected to a location module 41 as antenna 40 in FIG. 4 , in order to get the position where the aircraft was detected. Both information, including the detected id and the location detection position, are transmitted to a server through a data communication antenna 28 connected to a data communication module 38 as antenna 34 in FIG. 4 (e.g. cellular network or Wi-Fi). The server will follow the aircraft route confirmation process 62 as shown in FIG. 6 , and reply an id verification message that is presented in the field 53 of the touchscreen 24 .
- a data communication antenna 28 connected to a data communication module 38 as antenna 34 in FIG. 4 (e.g. cellular network or Wi-Fi).
- the server will follow the aircraft route confirmation process 62 as shown in FIG. 6 , and reply an id verification message that is presented in the field 53 of the touchscreen 24 .
- the ground identification device 21 also can detect aircrafts through the RF signal transmitted from the identification box RF module 16 .
- the signal is received by the RF receiver antenna 26 connected to the RF receiver module 37 , shown as antenna 33 in FIG. 4 . Since many signals can be received at the substantially same time by the receiver module 37 , the detected ids are presented in the field 55 in a list format. If at any time the user decides to use the touchscreen 24 to select (e.g., click) on any id number, a request will be made to a server following the aircraft information flow 61 of FIG. 6 , to show more information about that aircraft.
- the ground device In order to activate (e.g., excite) the identification box light sensor 19 , the ground device has a light beam emitter 23 connected to a light beam modulator 35 , shown as emitter 31 in FIG. 4 .
- the light beam excitation flow 82 is executed by the ground device 21 .
- This beam when captured by the light sensor 19 will change the data transmitted by the identification box RF module 16 .
- This difference in the data is detected by the ground device RF module 37 , and the light excited aircraft id presented in the field 55 will be shown in a distinguishable form, for example but not by way of limitation, bold-text.
- the ground device internal components are protected by a weather proof housing 29 .
- the front screen panel has few general-purpose buttons 25 that can be configured, for instance, to perform commands provided by the user, such as to activate the light beam.
- the identification box light emitters 3 and light sensor 4 of the identification box 1 create a two-way communication system.
- the ground device camera 22 and light beam emitter 23 of the ground device 21 also create a two-way communication system.
- the RF receiver and transmitter 16 and 37 in both the identification box 1 and the ground device 21 creates a duplex communication. Therefore, the identification box 1 and ground device 21 together can exchange information through light or RF. This feature allows other applications.
- One example application may be to send data to an UAV through light and RF.
- a delivery drone can receive a message to update its destination coordinate when the delivery drone gets closer to the delivery address as described following.
- the ground device 21 detects the UAV flying at a long distance from the user address through the RF signal received by the RF module 37 .
- the ground device 21 communicate with the server sending the received ID and the device location capture by the location module 41 (e.g., GPS, AGPS, Wi-Fi mapping or cellphone tower position) to check if the received id belongs to a delivery UAV going to the ground device position.
- the location module 41 e.g., GPS, AGPS, Wi-Fi mapping or cellphone tower position
- the server follows the aircraft destination process flow 63 shown in FIG. 6 to return the confirmation to the ground device 21 .
- the ground device 21 shows on its screen 24 a message informing the user that his delivery is arriving.
- the user points the ground device 21 to the UAV (e.g., goes outdoors), and uses one of the general-propose buttons 25 to turn on the light emitter 23 .
- the ground device 21 will start to transmit its position through the RF module 37 .
- the light sensor 4 of the identification box 1 detects the light beam and the RF module 16 receives the ground device 21 position.
- the identification box central control module 18 sends destination update to the UAV autopilot through the autopilot connector 10 . After that, the UAV will update its destination to drop the delivery in the exact location the user is transmitting.
- ground device 21 is attached to an aircraft, and the identification box 1 is attached to a ground object.
- the identification device 1 is attached to several landing pads, each one sending a unique identification code through the light emitters 2 and the RF module 16 simultaneously.
- the aircraft with the ground device 21 pointing to the ground receives the landing pad id and the location data through the RF module 37 .
- a connection between the aircraft autopilot and the ground device 21 through the data connector 30 allows the ground device to send messages to the aircraft, a destination coordinates update for instance.
- the ground device 21 After receiving the landing pad id, the ground device 21 search for the landing pad visual position of that specific landing pad color sequence using the camera 22 .
- This process allows a fine control of the aircraft using real-time optical navigation to approach and land in the moving landing pad.
- This application can be executed in an outdoor and indoor environment, even without the location data been transmitted by the landing pad identification box.
- the ground device 21 can modulate data through the light beam modulator 35 .
- the identification box central control module 18 can demodulate the light beam in order to execute commands.
- the light beam command transmit flow 83 shown in FIG. 8 is executed by the ground device 21 .
- the user selects the command on the screen 24 , and the light beam modulator 35 turns the light beam emitter 23 on and off in a defined frequency and protocol.
- the identification box light sensor 4 detects the modulated light beam and send the binary data to the central control unit 18 that is execution the light beam command execution flow 73 shown in FIG. 7 .
- the identification box 1 sends the execution results (e.g. an ACK, or an error status code) to the ground identification unit 21 through the RF module 16 and it can also change the color sequence to show the result visually.
- the light controller module 17 can turn the red color on for a while in case of an invalid command, and the green light in case of a successfully executed command.
- the central processing unit 39 receives inputs from the location module 41 , the cellular modem 38 , the RF module 37 , the light beam modulator 35 and the image processing module 36 , and performs the processes (e.g., software or instructions) associated with the ground identification unit 21 .
- the processes e.g., software or instructions
- FIG. 6 shows the server process flow, according to the example implementation.
- a server may await the receipt of a request at 611 , such as from a ground device, for example.
- a ground device may request a database search, as explained above.
- the server receives the request from the ground device, and performs a search on the database, for the requested identity information, which was based on the combination of light signals, blanks etc. as explained above.
- the ground device may obtain identification information of the small and/or low altitude aircraft.
- the server waits for one or more requests from the ground device.
- the ground device provides a request for a database search.
- the server receives the request, and performs a search of the database for the requested identifying information of the aircraft.
- the server performs a comparison of the aircraft route data, with the ground device location data. In this operation, the server confirms whether the aircraft is on the correct route or not.
- the server provides a confirmation to the ground device as to whether or not the aircraft route is correct.
- a ground device or the server may optionally perform an action, such as providing a report of an incorrect aircraft route, or other report that one skilled in the art would understand to provide if an aircraft is not on a correct route.
- a server may await the receipt of a request at 631 .
- a ground device may provide a request for database search to the server at 632 .
- the server upon receiving the request from the ground device for a server search, the server performs the search for the requested ID, and determines the identification of the aircraft.
- the server performs a comparison between the aircraft destination data, and the ground device location data. At this point, the server confirms whether the aircraft is at the correct destination or not.
- the server provides a confirmation to the ground device as to whether or not the aircraft is at the correct destination.
- the ground device or the server may optionally perform an action indicative of the correctness of the aircraft destination.
- FIG. 7 shows the identification box software flow, according to the example implementation.
- the flows 71 , 72 , 73 may be implemented on a processor that is present in the identification box as explained above. Alternatively, various operations may be offloaded to other processors in the identification box.
- the central control module reads instructions stored in a non-volatile storage. Based on the reading of those instructions, at 712 the central control module instructs light emitters to light a color sequence instruction in a loop. The color sequence instruction may be determined based on the command received at the central control module.
- the RF module receives location data from a location module, and transmits a code and location information associated with the location data the RF module performs this operation in response to command the central control module. The central control module may provide this command based on the code or instructions stored in the nonvolatile storage.
- the light emitters are emitting the instructed color sequence, and the RF module has obtained the necessary location data and prepared the necessary information, and the identification box, including the light sensor and RF module, are waiting an external event, such as the heat of information from the ground device.
- light sensor detects a light beam.
- the light beam may be received from the ground device.
- the central control module receives the light beam information, and verifies the wavelength of the light beam. Based on the wavelength of light beam, it is determined whether the received light beam is a light beam associated with an instruction for that aircraft associated with the identification box that is attached to the aircraft.
- a behavior configuration is read from the nonvolatile storage by the central control module.
- the RF module changes in extra data field based on the information provided in operation 725 .
- a light coat pattern is changed, based on the instruction also provided from central control module, based on the information received in operations 721 , 722 and 723 . Accordingly, an instruction is provided, either by the ground device, another aircraft or a flight control tower, or other source of instruction as would be understood by those skilled in the art, to instruct the identification box of the aircraft change the light code pattern. Light code pattern changed may be indicative of a certain status of the aircraft, such as being on the correct or incorrect destination, or other information.
- the light sensor of the identification box may detect the light beam at 731 .
- the central control module may demodulate the light beam, thus determining any information instruction associated with light beam.
- the central control may execute a command based on the information and instructions received in the demodulated light beam.
- the RF module may send from the screen of the user interface of the ground device.
- the light code pattern may change based on the command execution result.
- FIG. 8 shows the remote (e.g., ground) device software flow, according to the example implementation.
- the RF module of the ground device may receive identification information, such as the identification should of the aircraft.
- imaging processing module may detect a color sequence associated with the aircraft that is admitted by the identification box.
- the central processing unit of the ground device may transmit a request to the server to obtain information associated with color sequence that was received.
- the server returns the requested information to the ground device, and the requested information is shown on the screen, as explained above.
- a user may activate an object on a user interface, such as pressing a button on a screen of the ground device.
- a light beam modulator may transmit a light beam from the ground device to a target.
- the target may include the aircraft, and more specifically, the identification box of the aircraft.
- the RF module may detect a change in the extra data might, as explained above.
- the target ID may be bolded or otherwise identified in the user interface, so as to highlight to the user the change in that target ID associated with the aircraft.
- the user may select a command in the screen.
- a light beam modulator may send a light beam command to the target, such as the identification box of the aircraft as explained above.
- the RF module may detect a confirmation message received from the target, such as a message received from the identification box.
- the image processing module may also detect a confirmation sequence, as shown above.
- the screen receives and shows a result of the command execution, as also explained above.
- the server and the drone there must be two-way trust between the server and the drone.
- the drone must be able to trust that the server that is transmitting policy information from a remote location such as at ground level is authentic, and is providing verified policy information.
- the server and transmitters at the ground must have trust that the target drone that is receiving the policy information is credentialed. If two-way trust is not verified, the risk of transmission and reception is high.
- the risks of misidentification or erroneous validation by either the drone, or the ground transmitter and server, or both are substantial.
- a drone that accepts an unverified policy command could be receiving that information, which may result in the drone performing unauthorized commands, or commands provided by bad actors.
- the transmitter from the ground may be providing policy or command information to an un-trusted party, or a bad actor that may use this information to avoid detection, or perform bad acts.
- the forgoing example implementations permit credentialing of the drone, so as to provide grant privileges at two levels.
- a drone may be identified as being associated with a trustworthy source (e.g., company, law enforcement, etc.).
- a trustworthy source e.g., company, law enforcement, etc.
- the drone may be verified as to his individual identification based on the information transmitted to the ground device, as explained in the forgoing example implementations.
- an ad hoc authorization network connection is required to exchange information.
- This connection is essentially a peer to peer connection, as opposed to a connection provided via mobile telecommunications network or via website or general Internet communication.
- the network connection is specific to the drone associated with the identifying information, and the example implementation must be able to perform the connection and communication without connectivity to the Internet, as well as without needing to clear the communication via a database for security reasons.
- communication is generally limited to direct communication by RF and light signals, as explained above. Further, in view of the nature of the motion of a drone, and the speeds of movements and pursuit, the communication must be real time, and delayed or asynchronous communication may result in the drone not being able to achieve its intended task, goal or purpose.
- each drone is provided with a certificate by a certificate authority, which may include the ground identification device.
- the communication may be performed by RF, Wi-Fi, Bluetooth, or other communication protocol for which real-time peer-to-peer communication may be performed in a secure manner.
- RF wireless fidelity
- Wi-Fi Wireless Fidelity
- Bluetooth Wireless Fidelity
- TCP/IP Transmission Control Protocol
- HTTP/HTTPS HTTP/HTTPS
- the system implements a rotating SSID which is utilized to address information packets over wireless networks. By frequently changing the SSID, the probability of it being discovered and exploited or spoofed are greatly reduced.
- the transmission of the identification must be reliable and unique, but also predictable to known parties so that the identification can be can tracked on the server-side to ensure that the wireless beacon was not changed or cloned, etc.
- the system utilizes an OTP (one-time password) generation technique to periodically generate a token utilized for the SSID.
- a pre-shared private key may be used to generate a hash, or a hash may be hard-coded into the device. Hashes may be generated utilizing a hash function which gives a number of the correct length, for example SHA 1 (Secure hash Algorithm), but not limited thereto; other schemes and encryption or hashing methods as would be understood to those skilled in the art at the time of the invention may be substituted therefore without departing from the inventive scope.
- SHA 1 Secure hash Algorithm
- the system utilizes a digital time stamp at a given moment as the second portion of the information used to generate the token for the SSID.
- FIG. 9 illustrates an embodiment of an encryption system 900 for low altitude aircraft identification.
- the encryption system 900 may be operated in accordance with the process outlined in FIG. 10 .
- the encryption system 900 comprises an SSID 902 , a first time 904 (the output of a clock circuit, for example), a first hash 906 , a second hash 908 , a second time 910 , a first token 912 , a second token 914 , an SSID 916 , a key 918 , a transceiver 920 , and a beacon 922 .
- a private, pre-shared key 918 may be used to generate the hash 906 which is then combined with the time 910 to create the token 914 which is used in the SSID 902 .
- the SSID 902 and the SSID 916 must match, which requires that the hash 908 is the same as the hash 906 and that the time 910 is the same as the time 904 .
- This enables a secure, predictable rotating SSID which can be calculated on both network ends to allow for secure connection between a wireless beacon 922 and a transceiver 920 on the network 924 .
- FIG. 10 illustrates an embodiment of an encryption process 1000 for low altitude aircraft identification systems.
- encryption process 1000 retrieves a time stamp from a clock module.
- the encryption process 1000 retrieves a hash from memory.
- the encryption process 1000 combines the hash with the time stamp to generate a token.
- the encryption process 1000 implements the token as a network SSID for a beacon.
- FIG. 11 illustrates an embodiment of an encryption system 1100 for low altitude aircraft identification.
- the encryption system 1100 comprises a beacon 1102 , a network 1106 and a transceiver 1104 .
- Transceiver 1104 accesses the network 1106 via the beacon 1102 by utilizing the rotating SSID 916 generated by the encryption system 900 .
- FIG. 12 illustrates an embodiment of an encryption system 1200 for low altitude aircraft identification.
- the encryption system 1200 comprises a drone 1214 , a wireless transmitter 1202 , a battery 1204 , a real time clock 1206 , an OTP generator 1208 , a memory 1210 , and a private key 1212 .
- the private key 1212 in memory 1210 is applied to generate a hash which is then combined with a timestamp from a real time clock 1206 in the OTP generator 1208 to generate an SSID, which is utilized by the wireless transmitter 1202 and the drone 1214 to communicate with one another.
- FIG. 13 illustrates an embodiment of encrypted communication 1300 in low altitude aircraft identification systems.
- the encrypted communication 1300 comprises various SSIDs (SSID 102 , SSID 1304 , SSID 1306 , SSID 1308 , and SSID 1310 ) generated at different times (time 1314 , time 1316 , time 1318 , time 1320 , and time 1322 ) by an OTP generator 1208 based on an applied a hash 1324 .
- the OTP generator 1208 combines the hash 1324 and with time 1314 to create SSID 1302 .
- the OTP generator 1208 waits a time interval 1326 and then combines time 1316 with the hash 1324 to generate SSID 1304 .
- the OTP generator 1208 waits again for the time interval 1326 and combines time 1318 with hash 1324 to generate SSID 1306 , and so on to generate SSID 1308 and SSID 1310 , etc.
- the time interval 1326 may be fixed or may vary by an amount or by a function that is pre-shared between the wireless beacon and the device that will communicate with the wireless beacon, e.g., a low altitude aircraft such as a drone.
- drone operation logic 1400 comprises a main controller 1404 the controls and coordinates the operation of other components as well as providing general computational capabilities (e.g., to execute image processing 1418 ).
- the main controller 1404 may comprise a central processing unit and/or one or more controllers or combinations of these components.
- the drone operation logic 1400 will typically comprise memory 1408 which may be utilized by the main controller 1404 and other components (e.g., the DSP 1426 and or the GPU 1422 ) to read and write instructions (commands) and data (operands for the instructions).
- memory 1408 may be utilized by the main controller 1404 and other components (e.g., the DSP 1426 and or the GPU 1422 ) to read and write instructions (commands) and data (operands for the instructions).
- At least one camera 1416 may interface to image processing 1418 logic to record images and video from the environment.
- the image processing 1418 may operate to provide image/video enhancement, compression, feature extraction, and other transformations, and provide these to the main controller 1404 for further processing and storage to memory 1408 .
- the image processing 1418 may further utilize a navigation board 1402 and or DSP 1426 toward these ends. Images and video stored in the memory 1408 may also be read and processed by the main controller 1404 , DSP 1426 , and/or the GPU 1422 .
- the drone operation logic 1400 may operate on power received from a battery 1414 .
- the battery 1414 capability, charging, and energy supply may be managed by a power manager 1410 .
- the drone operation logic 1400 may transmit wireless signals of various types and range (e.g., cellular, WiFi, BlueTooth, and near field communication i.e. NFC) using the wireless communication logic 1420 and/or other transducers 1424 .
- the drone operation logic 1400 may also receive these types of wireless signals.
- Wireless signals are transmitted and received using one or more antenna.
- Other forms of electromagnetic radiation may be used to interact with proximate devices, such as infrared (not illustrated).
- the drone operation logic 1400 may include a navigation board 1402 which includes a motor control 1406 (to operate propellers and/or landing gear), an altimeter 1428 , a gyroscope 1430 , and its own memory 1412 .
- a navigation board 1402 which includes a motor control 1406 (to operate propellers and/or landing gear), an altimeter 1428 , a gyroscope 1430 , and its own memory 1412 .
- logic may be distributed throughout one or more devices, and/or may be comprised of combinations memory, media, processing circuits and controllers, other circuits, and so on. Therefore, in the interest of clarity and correctness logic may not always be distinctly illustrated in drawings of devices and systems, although it is inherently present therein.
- the techniques and procedures described herein may be implemented via logic distributed in one or more computing devices. The particular distribution and choice of logic will vary according to implementation.
- a signal bearing media include, but are not limited to, the following: recordable type media such as floppy disks, hard disk drives, CD ROMs, digital tape, flash drives, SD cards, solid state fixed or removable storage, and computer memory.
- the related art aircraft identification systems focus on civil or military aviation. None of the related art systems work for a small aircraft in a low altitude. Using a visible light sequence, an aircraft in a low altitude flight may be visually identified.
- the other related art identification systems for aircraft need a radar system or special devices to be able to receive the identification signal, which works well for a scenario involving an airport tower and an aircraft, but does not work for a scenario involving a person without such devices and an aircraft.
- This invention is an identification system that can be used to identify any vehicle, ship, aircraft or other static or mobile objects that are located up to about 1 mile from a person.
Landscapes
- Engineering & Computer Science (AREA)
- Aviation & Aerospace Engineering (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Traffic Control Systems (AREA)
- Optical Communication System (AREA)
Abstract
Description
- This application is a continuation of PCT/US2016/037071, filed on Jun. 10, 2016, which claims priority to U.S. provisional application No. 62/175,153, filed Jun. 12, 2015, the contents of which are incorporated herein by reference in their entirety for all purposes. Further, this application claims priority to U.S. provisional application No. 62/566,450, filed Oct. 1, 2017, the contents of which is also incorporated herein by reference in its entirety for all purposes.
- Aspects of the example implementations are directed to methods and systems for identification of airborne objects at a low altitude, and more specifically, to systems and methods for identification of low-altitude aircraft.
- Related art unmanned aerial vehicles (UAVs) or unmanned aircraft systems (UASs) markets once belonged to professional companies. However, related art UAVs and UASs now include amateur pilots flying affordable models available for purchase, for example, in an electronic store, and which may be controlled by mobile communication devices such as smartphones. However, these related art flying objects may cause damage and/or injury due to their altitude, speed and weight. Thus, there is a need to manage the related art UAVs and UASs.
- In ground-based systems, such as the related art automotive market, one of the bases of the car control system, may include an identification credential issued by a division of motor vehicles (DMV) or others, such as a license plate. However, there is no analogous identification method or system for related art UAVs and/or UASs. For related art small UASs (e.g., aircrafts up to 25 pounds flying up to 500 ft of the low altitude airspace), related art tail numbers that are used in commercial aircraft are too large in size (e.g., area) to be provided on these vehicles, or they will be too small to allow the small UAS identification.
- Encrypting information via a regular broadcast radio signal such as WiFi while utilizing a static SSID for the identification and addressing of WiFi packets is prone to “packet sniffing” to determine the SSID. Once the SSID is determined it may be possible to “clone” that device and intercept packets intended for it. It would be useful and more secure to have an encrypted identifier for any radio frequency (RF) transmission beacon, and particularly for WiFi transmissions, that utilized existing standards and equipment.
- An identification solution is needed that permits ground-level identification, as well as identification by other aircrafts of various sizes and altitudes. The identification solution also needs to allow detection in an automated manner using a device.
- Example implementations associated with the aspects of the present invention include a low altitude aircraft identification system composed by three components: a small aircraft electronic identification box with an embedded logger, a ground identification equipment to automatically identify the aircraft just pointing at it, and a central identification code database server.
- The identification code can be transmitted by a visible light color sequence or by a radio frequency signal. The ground identification device is capable of recognizing both kinds of code.
- Electronic Identification Box
- A traffic management system has the function of monitoring the traffic and the ability of notifying the responsible party in case of any non-compliance with a regulation. Therefore, an operation to identify the responsible party is to identify the vehicle. The ground traffic management system requires all vehicles to have a license plate for driving on public roads. This license plate allows the police and other drivers to identify the vehicle.
- With respect to UAVs and UASs, there is a need to have a structure that permits identification, as with a traffic management system.
- Instead of the related art approach of stamping letters and numbers in the aircraft, the present example implementation is directed to a light array that blinks a defined color pattern sequence for each aircraft. One potential advantage of this identification mechanism is the possibility for a person to visually identify an aircraft from a distance of about 500 feet, without the use of any special equipment. The color sequence, blinking speed and the meaning thereof can be defined by the pilot, the fleet control or even by a regulatory agency. The number of colors used and the number of blinks may define the quantity of codes possible.
- Together with the light array, the electronic identification box has a position logger and a transponder. The position logger has a global positioning system (GPS) module to obtain the absolute position where the aircraft is flying by. The logger stores the flight path of each trip made by the aircraft. Together with the positioning information, the speed and heading may also be stored. Telemetry data provided by the aircraft sensors, such as inertial measurement unit (IMU) and power level, and application data provided by the autopilot or any embedded component are also stored. This information is the proof of the aircraft real flight data, and it may perform functions similar to a civil aviation “black box” in case of a crash. In addition, in case of an UAV doing an autonomous flight beyond line-of-sight, the data may show where the UAS flew by.
- The transponder may transmit a code similar to the one generated (e.g., blinked) by the light arrays but through the RF frequency, allowing automatic identification by any RF receiver on land, or installed in other aircrafts. In addition to the code, the transponder may also transmit the last position, including but not limited to heading and speed, thus allowing the implementation of a collision avoidance system. The identification box has also an independent battery to allow the transmitter works even without the external power supply. Accordingly, in case of an aircraft crash, the transponder will continue to transmit the last know position so that the wrecked vehicle may be located or identified.
- The identification box has a photo sensor configured to receive external signals. In case the photo sensor is excited with a high luminous beam in a specific wavelength and modulation, such as a laser beam, the identification box may change its operational behavior. The identification box can, for instance, change its light brightness, send commands to the autopilot, increase the data storage frequency, but is not limited thereto.
- One of the preset configurations for the photo sensor stimulation is to modify flag data in the RF data sent by the transmitter, and/or the behavior of the blinking pattern. In some scenarios, more than one aircraft may be flying close to each other, in a way that a receiver on the ground is detecting all of the flying aircraft without knowing which UAV is transmitting each identification code. Therefore, it is just a matter of directing a specific wavelength and modulated light beam emitter to one of the aircrafts, and the aircraft will thus modify its behavior and its transmitted data, allowing the data-to-vehicle association. This feature creates a duplex communication, allowing the identification box to send broadcast data by its color light emitters, and receive directional data through the light sensor.
- Commands can also be received and executed using the communication channel. Through a physical connection between the identification box and the UAV autopilot, the identification box can, for instance, receive way point change command through a modulated light beam and change the UAV destination coordinates.
- Ground Identification Device
- A police department may maintain law enforcement agents who are supervising the roads and highways in order to detect drivers disobeying traffic laws. Devices such as the radar allow police officers to detect the vehicle speed. Moreover, the license plate allows for identifying the vehicle owner and accessing the complete history of the vehicle. This kind of control allows for small remote controlled aircraft surveillance and regulation.
- The example implementation includes a remote (e.g., ground) device to assist the aircraft identification. Since the electronic identification box relies on visual information, the ground device is equipped with a camera, lens and image processing algorithms to capture the color sequence. In addition, this device has an RF receiver capable of receiving the identification box RF signal to connect both information sources and to verify the authenticity. The device may also have a network connection through Wi-Fi or cellphone network to access the identification server.
- The aircraft code and the position where the aircraft was detected at are submitted to the central identification server to identify its owner, the responsible pilot and the flight permission. Hence, if the remote (e.g., ground) user wants to check if one specific vehicle has the flight permission to fly in that area, that user directs the identification device in the vicinity of the aircraft. The identification device automatically handles the identification and crosschecks with the identification database. After the database server verifies the information, the device shows on the screen if the aircraft position and timestamp is according to its permitted flight plan. In one example implementation, the device screen shows a “valid” message. Otherwise, the user will see an “invalid” message. Clicking in the message is possible to see all the information database information associated with the aircraft.
-
FIG. 1 shows the external view of the identification box with 4 light arrays, according to an example implementation. -
FIG. 2 shows the schematic view of the identification box, according to the example implementation. -
FIGS. 3A and 3B show the external view of the ground identification device facing forward and backward, according to the example implementation. -
FIG. 4 shows the schematic view of the ground identification device, according to the example implementation. -
FIG. 5 shows the user interface of the ground identification device, according to the example implementation. -
FIG. 6 shows the server process flow, according to the example implementation. -
FIG. 7 shows the identification box software flow, according to the example implementation. -
FIG. 8 shows the remote (e.g., ground) device software flow, according to the example implementation. -
FIG. 9 illustrates an embodiment of anencryption system 900 for low altitude aircraft identification. -
FIG. 10 illustrates an embodiment of anencryption process 1000 for low altitude aircraft identification systems. -
FIG. 11 illustrates an embodiment of anencryption system 1100 for low altitude aircraft identification. -
FIG. 12 illustrates an embodiment of anencryption system 1200 for low altitude aircraft identification. -
FIG. 13 illustrates an embodiment ofencrypted communication 1300 in low altitude aircraft identification systems. -
FIG. 14 illustrates an embodiment ofdrone operation logic 1400. - The subject matter described herein is taught by way of example embodiments. Various details have been omitted for the sake of clarity and to avoid obscuring the subject matter. Examples shown below are directed to structures and functions for implementing and enabling control and enforcement of access of user data.
- Described herein are example embodiments of systems, devices, and methods that enable identification of airborne objects at a low altitude, and more specifically, to systems and methods for identification of low-altitude aircraft.
- “SSID” herein refers to “Service Set IDentifier, a unique identifier attached to the header of packets sent over a wireless local-area network (WLAN). The SSID acts as a password when a mobile device tries to connect to the basic service set (BSS) and is a standard feature of the IEEE 802.11 WLAN architecture.
- References to “one embodiment” or “an embodiment” do not necessarily refer to the same embodiment, although they may. Unless the context clearly requires otherwise, throughout the description and the claims, the words “comprise,” “comprising,” and the like are to be construed in an inclusive sense as opposed to an exclusive or exhaustive sense; that is to say, in the sense of “including, but not limited to.” Words using the singular or plural number also include the plural or singular number respectively, unless expressly limited to a single one or multiple ones. Additionally, the words “herein,” “above,” “below” and words of similar import, when used in this application, refer to this application as a whole and not to any particular portions of this application. When the claims use the word “or” in reference to a list of two or more items, that word covers all of the following interpretations of the word: any of the items in the list, all of the items in the list and any combination of the items in the list, unless expressly limited to one or the other. Any terms not expressly defined herein have their conventional meaning as commonly understood by those having skill in the relevant art(s).
-
FIG. 1 shows the perspective view of one of the two components of the example implementation,FIG. 2 shows its schematic with the internal components, andFIG. 7 shows firmware execution flow. - As shown in
FIG. 1 , theidentification box 1 includes one or morelight arrays 2 each including severallight color emitters 3. Thesecolor emitters 3 are controlled by thelight controller module 17 as shown inFIG. 2 as being connected tocolor emitters 11. More specifically, thecolor emitters 3 generate (e.g., blink, variable light intensity or color fade) a defined color sequence programmed in the unit firmware executed by the central control unit 18 (shown inFIG. 2 ), and following themain loop flow 71, shown inFIG. 7 and described below. - The
identification box 1 also has aradio antenna 5 connected to aRF module 16 shown inFIG. 2 as being connected toRF antenna 12, that transmits the same code or a modified version of the code through a radio signal. TheRF module 16 can receive the RF signal from identification boxes (e.g. nearby) installed in other aircrafts, and save this information in thenon-volatile storage module 15 that is connected to the memory card installed in thememory card slot 7. - The example implementation also has one
light detection sensor 4 connected to alight receiver module 19 configured to detect external excitation by a light beam with defined wavelength and intensity. In case of external light detection by thelight sensor 4, the lightbeam detection flow 72 ofFIG. 7 is executed. Consequently, the behavior of theidentification box 1 can change, for instance adding or changing extra data information to the transmitted RF signal or change the light blink pattern or intensity. - Additionally, the
identification box 1 also has a location system antenna 6 (e.g., GPS antenna) connected to alocation module 14, shown inFIG. 2 as being connected tosystem antenna 13, to log the flight path in thestorage module 15. This positioning data (e.g. GPS data, camera motion capture, radio triangulation system) is also transmitted by theRF module 16 together with the identification code. - The
identification box 1 has also anexternal power connector 8 used to recharge the internal power storage 20 (e.g., LiPo (Lithium-Polymer) battery or super capacitor) and supply power to all internal and external components. - In case of no power being supplied, the
internal power storage 20 can supply power to all the components. In this “no external power” state, theRF module 16 may keep following themain loop flow 71, and transmitting the last location position and the identification code until the battery runs out of power, while the other components will be in a sleep mode. - All the internal components are protected by a housing 9 (e.g., standard weatherproof box) against impact and weather, in order to resist a crash without damaging the internal circuit.
- The other component of the example implementation is the
ground identification device 21, which is remote from the UAV or UAS, as shown in left and right perspective inFIGS. 3A and 3B respectively, and with its internal schematic inFIG. 4 . In addition, the main user interface is shown inFIG. 5 , the server process inFIG. 6 and its firmware process flow inFIG. 8 . Theground identification device 21 may be a custom-made device, specifically for the example implementation. Alternatively, theground identification device 21 may be a mobile communication device (e.g., smartphone), containing instructions (e.g., software or downloadable and/or online application) as would be known to those skilled in the art. The mobile communication device can also be attached to external components like zoom lens or light beams, but not limited to, to be able to execute other features of theground device 21. - The
ground identification device 21 has a camera withzoom 22 capable of capturing images such as video in real-time. Theidentification procedure flow 81 as shown inFIG. 8 is executed to process the video and identify the aircraft. This video goes to animage processing module 36, connected tocamera 32 inFIG. 4 , which analyses the image to detect that the identification box blinks and capture the blink sequence. - In case of a successful detection, the detected code is informed to the
touchscreen 24, in thefield 51 as shown inFIG. 5 . Adetection window 54 will be shown around the detected aircraft. A request to a server will be made to obtain further aircraft data, following the aircraftrequest data flow 61 as shown inFIG. 6 . Other information, associated with the aircraft owner is presented in thefield 52, is provided. - A location system antenna 27 (e.g., GPS antenna) is connected to a
location module 41 asantenna 40 inFIG. 4 , in order to get the position where the aircraft was detected. Both information, including the detected id and the location detection position, are transmitted to a server through adata communication antenna 28 connected to adata communication module 38 asantenna 34 inFIG. 4 (e.g. cellular network or Wi-Fi). The server will follow the aircraftroute confirmation process 62 as shown inFIG. 6 , and reply an id verification message that is presented in thefield 53 of thetouchscreen 24. - The
ground identification device 21 also can detect aircrafts through the RF signal transmitted from the identificationbox RF module 16. The signal is received by theRF receiver antenna 26 connected to theRF receiver module 37, shown asantenna 33 inFIG. 4 . Since many signals can be received at the substantially same time by thereceiver module 37, the detected ids are presented in thefield 55 in a list format. If at any time the user decides to use thetouchscreen 24 to select (e.g., click) on any id number, a request will be made to a server following the aircraft information flow 61 ofFIG. 6 , to show more information about that aircraft. - In order to activate (e.g., excite) the identification
box light sensor 19, the ground device has alight beam emitter 23 connected to alight beam modulator 35, shown asemitter 31 inFIG. 4 . The lightbeam excitation flow 82 is executed by theground device 21. This beam, when captured by thelight sensor 19 will change the data transmitted by the identificationbox RF module 16. This difference in the data is detected by the grounddevice RF module 37, and the light excited aircraft id presented in thefield 55 will be shown in a distinguishable form, for example but not by way of limitation, bold-text. - The ground device internal components are protected by a weather
proof housing 29. The front screen panel has few general-purpose buttons 25 that can be configured, for instance, to perform commands provided by the user, such as to activate the light beam. - The identification box
light emitters 3 andlight sensor 4 of theidentification box 1 create a two-way communication system. Similarly, theground device camera 22 andlight beam emitter 23 of theground device 21 also create a two-way communication system. The RF receiver and 16 and 37 in both thetransmitter identification box 1 and theground device 21 creates a duplex communication. Therefore, theidentification box 1 andground device 21 together can exchange information through light or RF. This feature allows other applications. One example application may be to send data to an UAV through light and RF. - For instance, a delivery drone can receive a message to update its destination coordinate when the delivery drone gets closer to the delivery address as described following. The
ground device 21 detects the UAV flying at a long distance from the user address through the RF signal received by theRF module 37. Theground device 21 communicate with the server sending the received ID and the device location capture by the location module 41 (e.g., GPS, AGPS, Wi-Fi mapping or cellphone tower position) to check if the received id belongs to a delivery UAV going to the ground device position. - The server follows the aircraft destination process flow 63 shown in
FIG. 6 to return the confirmation to theground device 21. When the server confirms if the UAV is going to the ground device position, theground device 21 shows on its screen 24 a message informing the user that his delivery is arriving. The user points theground device 21 to the UAV (e.g., goes outdoors), and uses one of the general-proposebuttons 25 to turn on thelight emitter 23. - At this moment, the
ground device 21 will start to transmit its position through theRF module 37. Thelight sensor 4 of theidentification box 1 detects the light beam and theRF module 16 receives theground device 21 position. The identification boxcentral control module 18 sends destination update to the UAV autopilot through theautopilot connector 10. After that, the UAV will update its destination to drop the delivery in the exact location the user is transmitting. - In addition, other applications can be provided if the
ground device 21 is attached to an aircraft, and theidentification box 1 is attached to a ground object. For instance, an automated landing procedure in a mobile landing pad attached to a vehicle can use these devices in this configuration. Theidentification device 1 is attached to several landing pads, each one sending a unique identification code through thelight emitters 2 and theRF module 16 simultaneously. - The aircraft with the
ground device 21 pointing to the ground receives the landing pad id and the location data through theRF module 37. A connection between the aircraft autopilot and theground device 21 through thedata connector 30 allows the ground device to send messages to the aircraft, a destination coordinates update for instance. After receiving the landing pad id, theground device 21 search for the landing pad visual position of that specific landing pad color sequence using thecamera 22. - This process allows a fine control of the aircraft using real-time optical navigation to approach and land in the moving landing pad. This application can be executed in an outdoor and indoor environment, even without the location data been transmitted by the landing pad identification box.
- Further, the
ground device 21 can modulate data through thelight beam modulator 35. The identification boxcentral control module 18 can demodulate the light beam in order to execute commands. The light beam command transmitflow 83 shown inFIG. 8 is executed by theground device 21. The user selects the command on thescreen 24, and thelight beam modulator 35 turns thelight beam emitter 23 on and off in a defined frequency and protocol. The identificationbox light sensor 4 detects the modulated light beam and send the binary data to thecentral control unit 18 that is execution the light beamcommand execution flow 73 shown inFIG. 7 . - After the command execution, the
identification box 1 sends the execution results (e.g. an ACK, or an error status code) to theground identification unit 21 through theRF module 16 and it can also change the color sequence to show the result visually. For instance, thelight controller module 17 can turn the red color on for a while in case of an invalid command, and the green light in case of a successfully executed command. - In
FIG. 4 above, thecentral processing unit 39 receives inputs from thelocation module 41, thecellular modem 38, theRF module 37, thelight beam modulator 35 and theimage processing module 36, and performs the processes (e.g., software or instructions) associated with theground identification unit 21. -
FIG. 6 shows the server process flow, according to the example implementation. As explained above, and as shown in theflow 61, a server may await the receipt of a request at 611, such as from a ground device, for example. At 612, a ground device may request a database search, as explained above. At 613, the server receives the request from the ground device, and performs a search on the database, for the requested identity information, which was based on the combination of light signals, blanks etc. as explained above. At 614, upon obtaining the requested identification information of the aircraft, the requested information is returned to the ground device. Accordingly, the ground device may obtain identification information of the small and/or low altitude aircraft. - According to another example implementation of the server process flow, as shown in
flow 62, at 621, the server waits for one or more requests from the ground device. At 622, the ground device provides a request for a database search. At 623, and as explained above, the server receives the request, and performs a search of the database for the requested identifying information of the aircraft. At 624, the server performs a comparison of the aircraft route data, with the ground device location data. In this operation, the server confirms whether the aircraft is on the correct route or not. At 625, the server provides a confirmation to the ground device as to whether or not the aircraft route is correct. At this point, a ground device or the server may optionally perform an action, such as providing a report of an incorrect aircraft route, or other report that one skilled in the art would understand to provide if an aircraft is not on a correct route. - According to yet another example implementation of the server process flow, as shown in
flow 63, a server may await the receipt of a request at 631. As explained above, a ground device may provide a request for database search to the server at 632. At 633, and as explained above, upon receiving the request from the ground device for a server search, the server performs the search for the requested ID, and determines the identification of the aircraft. At 634, the server performs a comparison between the aircraft destination data, and the ground device location data. At this point, the server confirms whether the aircraft is at the correct destination or not. At 625, the server provides a confirmation to the ground device as to whether or not the aircraft is at the correct destination. At this point, and as explained above with respect tooperation 625, the ground device or the server may optionally perform an action indicative of the correctness of the aircraft destination. -
FIG. 7 shows the identification box software flow, according to the example implementation. For example, but not by way of limitation the 71, 72, 73 may be implemented on a processor that is present in the identification box as explained above. Alternatively, various operations may be offloaded to other processors in the identification box.flows - As shown in
flow 71, and as explained above, at 711, the central control module reads instructions stored in a non-volatile storage. Based on the reading of those instructions, at 712 the central control module instructs light emitters to light a color sequence instruction in a loop. The color sequence instruction may be determined based on the command received at the central control module. At 713, the RF module receives location data from a location module, and transmits a code and location information associated with the location data the RF module performs this operation in response to command the central control module. The central control module may provide this command based on the code or instructions stored in the nonvolatile storage. At 714, the light emitters are emitting the instructed color sequence, and the RF module has obtained the necessary location data and prepared the necessary information, and the identification box, including the light sensor and RF module, are waiting an external event, such as the heat of information from the ground device. - As shown in
flow 72, and is also explained above, at 721, light sensor detects a light beam. For example, the light beam may be received from the ground device. At 722, the central control module receives the light beam information, and verifies the wavelength of the light beam. Based on the wavelength of light beam, it is determined whether the received light beam is a light beam associated with an instruction for that aircraft associated with the identification box that is attached to the aircraft. At 723, a behavior configuration is read from the nonvolatile storage by the central control module. At 724, the RF module changes in extra data field based on the information provided in operation 725. At 725, a light coat pattern is changed, based on the instruction also provided from central control module, based on the information received in 721, 722 and 723. Accordingly, an instruction is provided, either by the ground device, another aircraft or a flight control tower, or other source of instruction as would be understood by those skilled in the art, to instruct the identification box of the aircraft change the light code pattern. Light code pattern changed may be indicative of a certain status of the aircraft, such as being on the correct or incorrect destination, or other information.operations - As shown in
flow 73, the light sensor of the identification box may detect the light beam at 731. At 732, the central control module may demodulate the light beam, thus determining any information instruction associated with light beam. At 733, the central control may execute a command based on the information and instructions received in the demodulated light beam. At 734, the RF module may send from the screen of the user interface of the ground device. At 735, the light code pattern may change based on the command execution result. -
FIG. 8 shows the remote (e.g., ground) device software flow, according to the example implementation. As shown inflow 81, at 811, the RF module of the ground device may receive identification information, such as the identification should of the aircraft. At 812, imaging processing module may detect a color sequence associated with the aircraft that is admitted by the identification box. At 813, the central processing unit of the ground device may transmit a request to the server to obtain information associated with color sequence that was received. At this point, one or more of the operations described above in 61, 62 and/or 63 may be performed. At 814, the server returns the requested information to the ground device, and the requested information is shown on the screen, as explained above.flow - As shown in
flow 82, at 821, a user may activate an object on a user interface, such as pressing a button on a screen of the ground device. At 822, a light beam modulator may transmit a light beam from the ground device to a target. For example, but not by way of limitation, the target may include the aircraft, and more specifically, the identification box of the aircraft. At the 23, the RF module may detect a change in the extra data might, as explained above. Further, at 824, the target ID may be bolded or otherwise identified in the user interface, so as to highlight to the user the change in that target ID associated with the aircraft. - As shown in
flow 83, at 831, the user may select a command in the screen. At 832, a light beam modulator may send a light beam command to the target, such as the identification box of the aircraft as explained above. At 833, the RF module may detect a confirmation message received from the target, such as a message received from the identification box. Further, in response to the light beam, at 834, the image processing module may also detect a confirmation sequence, as shown above. At 835, the screen receives and shows a result of the command execution, as also explained above. - In the forgoing example implementation, there must be two-way trust between the server and the drone. For example, but not by way of limitation, the drone must be able to trust that the server that is transmitting policy information from a remote location such as at ground level is authentic, and is providing verified policy information. Conversely, the server and transmitters at the ground must have trust that the target drone that is receiving the policy information is credentialed. If two-way trust is not verified, the risk of transmission and reception is high.
- The risks of misidentification or erroneous validation by either the drone, or the ground transmitter and server, or both are substantial. For example, but not by way of limitation, a drone that accepts an unverified policy command could be receiving that information, which may result in the drone performing unauthorized commands, or commands provided by bad actors. Similarly, if a transmitter from the ground is unable to verify that the drone is credentialed, the transmitter from the ground may be providing policy or command information to an un-trusted party, or a bad actor that may use this information to avoid detection, or perform bad acts.
- Moreover, the forgoing example implementations permit credentialing of the drone, so as to provide grant privileges at two levels. At the group level, a drone may be identified as being associated with a trustworthy source (e.g., company, law enforcement, etc.). At an individual level, the drone may be verified as to his individual identification based on the information transmitted to the ground device, as explained in the forgoing example implementations.
- In view of the relatively short distances between a small drone and the ground identification device, as well as the relatively short time that is available for the drone to implement the policy or commands provided by the ground identification device, an ad hoc authorization network connection is required to exchange information. This connection is essentially a peer to peer connection, as opposed to a connection provided via mobile telecommunications network or via website or general Internet communication. The network connection is specific to the drone associated with the identifying information, and the example implementation must be able to perform the connection and communication without connectivity to the Internet, as well as without needing to clear the communication via a database for security reasons. Given the short distance of peers from each other, communication is generally limited to direct communication by RF and light signals, as explained above. Further, in view of the nature of the motion of a drone, and the speeds of movements and pursuit, the communication must be real time, and delayed or asynchronous communication may result in the drone not being able to achieve its intended task, goal or purpose.
- To implement the foregoing, each drone is provided with a certificate by a certificate authority, which may include the ground identification device. Depending on the carrier or protocol, the communication may be performed by RF, Wi-Fi, Bluetooth, or other communication protocol for which real-time peer-to-peer communication may be performed in a secure manner. For example, but not by way of limitation, in a Wi-Fi network, TCP/IP or HTTP/HTTPS as would be understood by those skilled in the art may be used to implement a security protocol. Similar schemes may be employed for Bluetooth communications, as explained in further detail below.
- Disclosed herein are systems and processes to provide secured wireless communication utilizing SSIDs conforming to the 802.11 standard as the mechanism of network packet identification. The system implements a rotating SSID which is utilized to address information packets over wireless networks. By frequently changing the SSID, the probability of it being discovered and exploited or spoofed are greatly reduced.
- In order for this system to be reliable, the transmission of the identification must be reliable and unique, but also predictable to known parties so that the identification can be can tracked on the server-side to ensure that the wireless beacon was not changed or cloned, etc. The system utilizes an OTP (one-time password) generation technique to periodically generate a token utilized for the SSID.
- A pre-shared private key may be used to generate a hash, or a hash may be hard-coded into the device. Hashes may be generated utilizing a hash function which gives a number of the correct length, for example SHA 1 (Secure hash Algorithm), but not limited thereto; other schemes and encryption or hashing methods as would be understood to those skilled in the art at the time of the invention may be substituted therefore without departing from the inventive scope.
- Because this hash is immutable, it must be combined with another variable make sure that the uniqueness of the generated token will be predictably different each time. The system utilizes a digital time stamp at a given moment as the second portion of the information used to generate the token for the SSID.
- In applications where ephemeral (volatile) memory is used, non-permanent data is lost when the system is shut down or the battery voltage becomes too low. This may have the side effect of disrupting the timing as well. Because token generation for the SSID requires that the times be the same in order for SSIDs to match, it is important that time be maintained in the event of a system shutdown.
- There are a number of ways which this can be achieved. First, it is possible to utilize GPS as a “point of truth” for time synchronization, although in this case the speed with which the SSID will be cycled may become inefficient. Another option is to place the device into a configuration mode every time it starts or charges. The most effective solution is to use a RTC (real time clock) circuit with a long backup battery. This implementation has the additional benefit of maintaining a more accurate clock by separating the time increments from the system's compute cycles as system voltage fluctuations can cause the clock speed of a system to shift which would cause the time signature used in the SSID to be incorrect.
-
FIG. 9 illustrates an embodiment of anencryption system 900 for low altitude aircraft identification. Theencryption system 900 may be operated in accordance with the process outlined inFIG. 10 . Theencryption system 900 comprises anSSID 902, a first time 904 (the output of a clock circuit, for example), afirst hash 906, asecond hash 908, asecond time 910, afirst token 912, asecond token 914, anSSID 916, a key 918, atransceiver 920, and abeacon 922. A private,pre-shared key 918 may be used to generate thehash 906 which is then combined with thetime 910 to create the token 914 which is used in theSSID 902. - In order to establish wireless communications over the
network 924, theSSID 902 and theSSID 916 must match, which requires that thehash 908 is the same as thehash 906 and that thetime 910 is the same as thetime 904. This enables a secure, predictable rotating SSID which can be calculated on both network ends to allow for secure connection between awireless beacon 922 and atransceiver 920 on thenetwork 924. -
FIG. 10 illustrates an embodiment of anencryption process 1000 for low altitude aircraft identification systems. Inblock 1002,encryption process 1000 retrieves a time stamp from a clock module. Inblock 1004, theencryption process 1000 retrieves a hash from memory. Inblock 1006, theencryption process 1000 combines the hash with the time stamp to generate a token. Inblock 1008, theencryption process 1000 implements the token as a network SSID for a beacon. -
FIG. 11 illustrates an embodiment of anencryption system 1100 for low altitude aircraft identification. Theencryption system 1100 comprises abeacon 1102, anetwork 1106 and atransceiver 1104.Transceiver 1104 accesses thenetwork 1106 via thebeacon 1102 by utilizing therotating SSID 916 generated by theencryption system 900. -
FIG. 12 illustrates an embodiment of anencryption system 1200 for low altitude aircraft identification. Theencryption system 1200 comprises adrone 1214, awireless transmitter 1202, abattery 1204, areal time clock 1206, anOTP generator 1208, amemory 1210, and aprivate key 1212. - The
private key 1212 inmemory 1210 is applied to generate a hash which is then combined with a timestamp from areal time clock 1206 in theOTP generator 1208 to generate an SSID, which is utilized by thewireless transmitter 1202 and thedrone 1214 to communicate with one another. -
FIG. 13 illustrates an embodiment ofencrypted communication 1300 in low altitude aircraft identification systems. Theencrypted communication 1300 comprises various SSIDs (SSID 102,SSID 1304,SSID 1306,SSID 1308, and SSID 1310) generated at different times (time 1314,time 1316,time 1318,time 1320, and time 1322) by anOTP generator 1208 based on an applied ahash 1324. - The
OTP generator 1208 combines thehash 1324 and withtime 1314 to createSSID 1302. TheOTP generator 1208 waits atime interval 1326 and then combinestime 1316 with thehash 1324 to generateSSID 1304. TheOTP generator 1208 waits again for thetime interval 1326 and combinestime 1318 withhash 1324 to generateSSID 1306, and so on to generateSSID 1308 andSSID 1310, etc. - The
time interval 1326 may be fixed or may vary by an amount or by a function that is pre-shared between the wireless beacon and the device that will communicate with the wireless beacon, e.g., a low altitude aircraft such as a drone. - Referring to
FIG. 14 ,drone operation logic 1400 comprises amain controller 1404 the controls and coordinates the operation of other components as well as providing general computational capabilities (e.g., to execute image processing 1418). Themain controller 1404 may comprise a central processing unit and/or one or more controllers or combinations of these components. - The
drone operation logic 1400 will typically comprisememory 1408 which may be utilized by themain controller 1404 and other components (e.g., theDSP 1426 and or the GPU 1422) to read and write instructions (commands) and data (operands for the instructions). - At least one camera 1416 may interface to
image processing 1418 logic to record images and video from the environment. Theimage processing 1418 may operate to provide image/video enhancement, compression, feature extraction, and other transformations, and provide these to themain controller 1404 for further processing and storage tomemory 1408. Theimage processing 1418 may further utilize anavigation board 1402 and orDSP 1426 toward these ends. Images and video stored in thememory 1408 may also be read and processed by themain controller 1404,DSP 1426, and/or theGPU 1422. - The
drone operation logic 1400 may operate on power received from abattery 1414. Thebattery 1414 capability, charging, and energy supply may be managed by apower manager 1410. - The
drone operation logic 1400 may transmit wireless signals of various types and range (e.g., cellular, WiFi, BlueTooth, and near field communication i.e. NFC) using thewireless communication logic 1420 and/orother transducers 1424. Thedrone operation logic 1400 may also receive these types of wireless signals. Wireless signals are transmitted and received using one or more antenna. Other forms of electromagnetic radiation may be used to interact with proximate devices, such as infrared (not illustrated). - The
drone operation logic 1400 may include anavigation board 1402 which includes a motor control 1406 (to operate propellers and/or landing gear), analtimeter 1428, agyroscope 1430, and itsown memory 1412. - Those having skill in the art will appreciate that there are various logic implementations by which processes and/or systems described herein can be effected (e.g., hardware, software, or firmware), and that the preferred vehicle will vary with the context in which the processes are deployed. If an implementer determines that speed and accuracy are paramount, the implementer may opt for a hardware or firmware implementation; alternatively, if flexibility is paramount, the implementer may opt for a solely software implementation; or, yet again alternatively, the implementer may opt for some combination of hardware, software, or firmware. Hence, there are numerous possible implementations by which the processes described herein may be effected, none of which is inherently superior to the other in that any vehicle to be utilized is a choice dependent upon the context in which the implementation will be deployed and the specific concerns (e.g., speed, flexibility, or predictability) of the implementer, any of which may vary. Those skilled in the art will recognize that optical aspects of implementations may involve optically-oriented hardware, software, and or firmware.
- Those skilled in the art will appreciate that logic may be distributed throughout one or more devices, and/or may be comprised of combinations memory, media, processing circuits and controllers, other circuits, and so on. Therefore, in the interest of clarity and correctness logic may not always be distinctly illustrated in drawings of devices and systems, although it is inherently present therein. The techniques and procedures described herein may be implemented via logic distributed in one or more computing devices. The particular distribution and choice of logic will vary according to implementation.
- The foregoing detailed description has set forth various embodiments of the devices or processes via the use of block diagrams, flowcharts, or examples. Insofar as such block diagrams, flowcharts, or examples contain one or more functions or operations, it will be understood as notorious by those within the art that each function or operation within such block diagrams, flowcharts, or examples can be implemented, individually or collectively, by a wide range of hardware, software, firmware, or virtually any combination thereof. Portions of the subject matter described herein may be implemented via Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs), digital signal processors (DSPs), or other integrated formats. However, those skilled in the art will recognize that some aspects of the embodiments disclosed herein, in whole or in part, can be equivalently implemented in standard integrated circuits, as one or more computer programs running on one or more processing devices (e.g., as one or more programs running on one or more computer systems), as one or more programs running on one or more processors (e.g., as one or more programs running on one or more microprocessors), as firmware, or as virtually any combination thereof, and that designing the circuitry or writing the code for the software or firmware would be well within the skill of one of skill in the art in light of this disclosure. In addition, those skilled in the art will appreciate that the mechanisms of the subject matter described herein are capable of being distributed as a program product in a variety of forms, and that an illustrative embodiment of the subject matter described herein applies equally regardless of the particular type of signal bearing media used to actually carry out the distribution. Examples of a signal bearing media include, but are not limited to, the following: recordable type media such as floppy disks, hard disk drives, CD ROMs, digital tape, flash drives, SD cards, solid state fixed or removable storage, and computer memory.
- In a general sense, those skilled in the art will recognize that the various aspects described herein which can be implemented, individually or collectively, by a wide range of hardware, software, firmware, or any combination thereof can be viewed as being composed of various types of circuitry.
- Those skilled in the art will recognize that it is common within the art to describe devices or processes in the fashion set forth herein, and thereafter use standard engineering practices to integrate such described devices or processes into larger systems. At least a portion of the devices or processes described herein can be integrated into a network processing system via a reasonable amount of experimentation. Various embodiments are described herein and presented by way of example and not limitation.
- The related art aircraft identification systems focus on civil or military aviation. None of the related art systems work for a small aircraft in a low altitude. Using a visible light sequence, an aircraft in a low altitude flight may be visually identified.
- The other related art identification systems for aircraft need a radar system or special devices to be able to receive the identification signal, which works well for a scenario involving an airport tower and an aircraft, but does not work for a scenario involving a person without such devices and an aircraft.
- Using visible light identification, a person can observe at an aircraft and memorize its color sequence. This approach is similar to the way cars are identifiable by their license plate, instead of the way aircrafts are identified in the related art.
- This invention is an identification system that can be used to identify any vehicle, ship, aircraft or other static or mobile objects that are located up to about 1 mile from a person.
- Although a few example embodiments have been shown and described, these example embodiments are provided to convey the subject matter described herein to people who are familiar with this field. It should be understood that the subject matter described herein may be embodied in various forms without being limited to the described example embodiments. The subject matter described herein can be practiced without those specifically defined or described matters or with other or different elements or matters not described. It will be appreciated by those familiar with this field that changes may be made in these example embodiments without departing from the subject matter described herein as defined in the appended claims and their equivalents.
-
REFERENCE NUMERALS IN THE DRAWINGS 1 Identification box 2 Light arrays 3 Light emitters 4 Light sensor 5 RF antenna 6 Location system antenna 7 Memory card slot 8 Power connector 9 Housing 10 Autopilot data connector 11 Light emitter 12 RF antenna 13 Location system antenna 14 Location module 15 Non-volatile storage module 16 RF module 17 Light controller module 18 Central control module 19 Light receiver 20 Internal power storage 21 Ground identification device 22 Camera with zoom 23 Light beam emitter 24 Touchscreen 25 General buttons 26 RF antenna 27 Location system antenna 28 Data communication antenna 29 Housing 30 Data connector 31 Light beam emitter 32 Camera module 33 RF antenna 34 Data communication antenna 35 Light beam modulator 36 Image processing module 37 RF module 38 Data communication module 39 Central processing unit 40 Location system antenna 41 Location module 51 Id captured by the camera 52 Aircraft responsible name 53 System message 54 Detection window 55 RF detected ids 56 General buttons 61 Aircraft data request flow 62 Aircraft route confirmation process 63 Aircraft destination confirmation process 71 Main loop flow 72 Light beam detection flow 73 Light beam command execution flow 81 Identification procedure flow 82 Light beam excitation flow 83 Light beam command transmit flow
Claims (19)
Priority Applications (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US15/839,661 US10192451B2 (en) | 2015-06-12 | 2017-12-12 | Low altitude aircraft identification system |
| US16/142,442 US20190103030A1 (en) | 2015-06-12 | 2018-09-26 | Aerial vehicle identification beacon and reader system |
| US16/143,172 US20190149322A1 (en) | 2015-06-12 | 2018-09-26 | Verifying identity identifier transmitted by an aerial vehicle |
| PCT/US2018/053081 WO2019067693A1 (en) | 2017-10-01 | 2018-09-27 | Verifying identity identifier transmitted by an aerial vehicle |
| US16/215,406 US10713959B2 (en) | 2015-06-12 | 2018-12-10 | Low altitude aircraft identification system |
Applications Claiming Priority (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201562175153P | 2015-06-12 | 2015-06-12 | |
| PCT/US2016/037071 WO2016201359A1 (en) | 2015-06-12 | 2016-06-10 | A low altitude aircraft identification system |
| US201762566450P | 2017-10-01 | 2017-10-01 | |
| US15/839,661 US10192451B2 (en) | 2015-06-12 | 2017-12-12 | Low altitude aircraft identification system |
Related Parent Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2016/037071 Continuation WO2016201359A1 (en) | 2015-06-12 | 2016-06-10 | A low altitude aircraft identification system |
Related Child Applications (3)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US16/142,442 Continuation-In-Part US20190103030A1 (en) | 2015-06-12 | 2018-09-26 | Aerial vehicle identification beacon and reader system |
| US16/143,172 Continuation-In-Part US20190149322A1 (en) | 2015-06-12 | 2018-09-26 | Verifying identity identifier transmitted by an aerial vehicle |
| US16/215,406 Continuation US10713959B2 (en) | 2015-06-12 | 2018-12-10 | Low altitude aircraft identification system |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| US20180114451A1 US20180114451A1 (en) | 2018-04-26 |
| US20180261109A9 true US20180261109A9 (en) | 2018-09-13 |
| US10192451B2 US10192451B2 (en) | 2019-01-29 |
Family
ID=57504573
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US15/839,661 Active US10192451B2 (en) | 2015-06-12 | 2017-12-12 | Low altitude aircraft identification system |
| US16/215,406 Active - Reinstated US10713959B2 (en) | 2015-06-12 | 2018-12-10 | Low altitude aircraft identification system |
Family Applications After (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US16/215,406 Active - Reinstated US10713959B2 (en) | 2015-06-12 | 2018-12-10 | Low altitude aircraft identification system |
Country Status (2)
| Country | Link |
|---|---|
| US (2) | US10192451B2 (en) |
| WO (1) | WO2016201359A1 (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20190047695A1 (en) * | 2017-08-10 | 2019-02-14 | Wesley John Boudville | Drone interacting with a stranger having a cellphone |
| US20250182629A1 (en) * | 2022-02-23 | 2025-06-05 | Controlant Hf. | A method and a system for operating a wireless logger device while being on board of an aircraft |
Families Citing this family (15)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR101546717B1 (en) * | 2015-02-23 | 2015-08-25 | 김영권 | Mobile communication terminal having unmanned aerial vehicle |
| WO2017032906A2 (en) * | 2015-08-27 | 2017-03-02 | Dronsystems Limited | A highly automated system of air traffic control (atm) for at least one unmanned aerial vehicle (unmanned aerial vehicles uav) |
| US10338609B2 (en) * | 2017-03-31 | 2019-07-02 | T-Mobile Usa, Inc. | Authorizing drone access to fulfillment centers |
| CN108810941B (en) * | 2017-05-05 | 2021-04-20 | 华为技术有限公司 | A network access method, network device and terminal |
| WO2018237204A1 (en) * | 2017-06-21 | 2018-12-27 | Airspace Systems Inc. | SYSTEM AND METHOD FOR DIFFUSING THE POSITION OF LOW ALTITUDE OBJECTS |
| US11079757B1 (en) * | 2017-11-20 | 2021-08-03 | Amazon Technologies, Inc. | Unmanned aerial vehicles to survey locations and collect data about different signal sources |
| WO2019220444A1 (en) * | 2018-05-16 | 2019-11-21 | B. G. Negev Technologies And Applications Ltd., At Ben-Gurion University | Authentication mechanism for drones |
| US11393346B1 (en) * | 2018-06-11 | 2022-07-19 | Amazon Technologies, Inc. | Location beacon using pre-existing infrastructure |
| US10913532B2 (en) | 2018-08-22 | 2021-02-09 | Ford Global Technologies, Llc | Precision landing system for unmanned aerial vehicles and utilization thereof |
| CN109509353B (en) * | 2018-12-19 | 2019-11-12 | 天津普泰国信科技有限公司 | Smart road-based mobile monitoring unit and smart road system |
| JP2020120235A (en) * | 2019-01-23 | 2020-08-06 | ソニー株式会社 | Information processing apparatus, information processing method and information processing program |
| CN109896014B (en) * | 2019-03-28 | 2022-11-18 | 徐州臣赐网络科技有限公司 | Fixed-wing unmanned aerial vehicle roof airdrop indicating method |
| US20220230547A1 (en) * | 2021-01-16 | 2022-07-21 | Jeffrey Floyd Miller | PUD application and protocols for deployment and qualification of independent non-centralized registered autonomous Drone, Quadcopter, Helicopter or UAV with an ESN, SN, MID, Remote ID or FAA registration number |
| US20220245380A1 (en) * | 2021-02-04 | 2022-08-04 | Skyway Technologies Corp. | Light identification system for unmanned aerial vehicles |
| CN119107848A (en) * | 2024-08-26 | 2024-12-10 | 上海交通大学 | Low-altitude aircraft warning system based on Zigbee and edge detection equipment and construction method |
Family Cites Families (23)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6173220B1 (en) * | 1999-10-12 | 2001-01-09 | Honeywell International Inc. | Attitude direction indicator with supplemental indicia |
| US20150054639A1 (en) * | 2006-08-11 | 2015-02-26 | Michael Rosen | Method and apparatus for detecting mobile phone usage |
| US7724155B1 (en) * | 2006-09-07 | 2010-05-25 | Rockwell Collins, Inc. | Graphical methods for enhancing attitude awareness |
| FR2939325B1 (en) | 2008-12-04 | 2015-10-16 | Parrot | DRONES SYSTEM WITH RECONNAISSANCE BEACONS |
| KR101073042B1 (en) | 2009-12-31 | 2011-10-12 | 한국항공우주연구원 | System and method for remote control of unmanned air vehicle |
| US9350923B2 (en) * | 2010-08-31 | 2016-05-24 | Cast Group Of Companies Inc. | System and method for tracking |
| ES2589581T3 (en) | 2012-02-17 | 2016-11-15 | The Boeing Company | Unmanned aerial vehicle that recovers energy from rising air currents |
| CN103049764A (en) * | 2012-12-13 | 2013-04-17 | 中国科学院上海微系统与信息技术研究所 | Low-altitude aircraft target identification method |
| US8989922B2 (en) * | 2013-03-15 | 2015-03-24 | Azure Sky Group, LLC. | Modular drone and methods for use |
| US9689976B2 (en) | 2014-12-19 | 2017-06-27 | Xidrone Systems, Inc. | Deterent for unmanned aerial systems |
| US10176447B2 (en) | 2015-02-16 | 2019-01-08 | International Business Machines Corporation | Autonomous delivery of items |
| US9646502B1 (en) | 2015-02-27 | 2017-05-09 | Amazon Technologies, Inc. | Universal unmanned aerial vehicle identification system |
| US9651944B2 (en) | 2015-03-22 | 2017-05-16 | Microsoft Technology Licensing, Llc | Unmanned aerial vehicle piloting authorization |
| DK3158553T3 (en) | 2015-03-31 | 2019-03-18 | Sz Dji Technology Co Ltd | Authentication systems and methods for identifying authorized participants |
| US20170024746A1 (en) | 2015-04-10 | 2017-01-26 | AerWaze | Process to Enable Digital Registration, Compliance Enforcement, and Permission Indications for Unmanned Aerial Vehicles and Other Devices |
| US10218510B2 (en) | 2015-06-01 | 2019-02-26 | Branch Banking And Trust Company | Network-based device authentication system |
| KR101837979B1 (en) | 2015-07-31 | 2018-03-13 | 삼성에스디에스 주식회사 | Method for controlling drone, apparatus and system for executing the method, and server for controlling drone |
| KR20170028811A (en) | 2015-09-04 | 2017-03-14 | 유성훈 | Method for monitoring flight of unmanned aerial vehicle, user terminal, server and detecting apparatus using the same |
| CN105430761B (en) | 2015-10-30 | 2018-12-11 | 小米科技有限责任公司 | Establish the method, apparatus and system of wireless network connection |
| US20170195945A1 (en) | 2015-12-31 | 2017-07-06 | The Southern Company | Systems and methods for identifying unmanned aerial vehicles |
| CN105739520B (en) | 2016-01-29 | 2019-10-08 | 余江 | A kind of unmanned vehicle identifying system and its recognition methods |
| EP3229445B1 (en) | 2016-04-06 | 2018-08-08 | The Boeing Company | A system and a computer-implemented method for multi path communication with an unmanned aerial vehicle during a mission |
| KR101728641B1 (en) | 2016-09-30 | 2017-04-20 | 주식회사 포드림 | Pilot verification system for UAV(Unmanned Aerial Vehicle) flight history |
-
2016
- 2016-06-10 WO PCT/US2016/037071 patent/WO2016201359A1/en not_active Ceased
-
2017
- 2017-12-12 US US15/839,661 patent/US10192451B2/en active Active
-
2018
- 2018-12-10 US US16/215,406 patent/US10713959B2/en active Active - Reinstated
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20190047695A1 (en) * | 2017-08-10 | 2019-02-14 | Wesley John Boudville | Drone interacting with a stranger having a cellphone |
| US10625854B2 (en) * | 2017-08-10 | 2020-04-21 | Wesley John Boudville | Drone interacting with a stranger having a cellphone |
| US20250182629A1 (en) * | 2022-02-23 | 2025-06-05 | Controlant Hf. | A method and a system for operating a wireless logger device while being on board of an aircraft |
Also Published As
| Publication number | Publication date |
|---|---|
| US20180114451A1 (en) | 2018-04-26 |
| US10713959B2 (en) | 2020-07-14 |
| US10192451B2 (en) | 2019-01-29 |
| WO2016201359A1 (en) | 2016-12-15 |
| US20190108762A1 (en) | 2019-04-11 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10713959B2 (en) | Low altitude aircraft identification system | |
| US20190149322A1 (en) | Verifying identity identifier transmitted by an aerial vehicle | |
| US10696398B2 (en) | Multi-modal UAV certification | |
| US12022289B2 (en) | Integrated secure device manager systems and methods for cyber-physical vehicles | |
| US20190103030A1 (en) | Aerial vehicle identification beacon and reader system | |
| US11645920B2 (en) | Secure unmanned aerial vehicle flight planning | |
| He et al. | Flight security and safety of drones in airborne fog computing systems | |
| US11134380B2 (en) | Systems and methods for cyber-physical vehicle management, detection and control | |
| US11064363B2 (en) | Systems and methods for cyber-physical vehicle management, detection and control | |
| EP3335211B1 (en) | An aircraft controlled by a secure integrated airspace management system | |
| CN107407915B (en) | Authentication system and method for generating flight controls | |
| CN107408351B (en) | Certification system and method for generating flight controls | |
| CN107409174B (en) | System and method for regulating the operation of an unmanned aerial vehicle | |
| CN107408352B (en) | System and method for geofencing device communication | |
| CN107430403B (en) | System and method with geofencing device level | |
| CN107533331B (en) | Geo-fencing device with dynamic characteristics | |
| CN107531324B (en) | System and method for mobile geofencing | |
| CN107615785B (en) | System and method for displaying geofence device information | |
| US10969777B2 (en) | Local drone identification verification | |
| WO2019032162A2 (en) | Secure beacon and reader system for remote drone and pilot identification | |
| US20190020404A1 (en) | Utilization of National Cellular Infrastructure for UAV Command and Control | |
| He et al. | How to govern the non-cooperative amateur drones? | |
| WO2017120618A1 (en) | System and method for autonomous vehicle air traffic control |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: AIRSPACE SYSTEMS INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:FOINA, AISLAN GOMIDE;BAR-NAHUM, GUY;SIGNING DATES FROM 20171211 TO 20171212;REEL/FRAME:044375/0069 |
|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
| FEPP | Fee payment procedure |
Free format text: PETITION RELATED TO MAINTENANCE FEES GRANTED (ORIGINAL EVENT CODE: PTGR); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
| AS | Assignment |
Owner name: AIRSPACE SYSTEMS, INC., CALIFORNIA Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE NAME PREVIOUSLY RECORDED ON REEL 044375 FRAME 0069. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNORS:FOINA, AISLAN GOMIDE;BAR-NAHUM, GUY;SIGNING DATES FROM 20171211 TO 20171212;REEL/FRAME:052581/0099 |
|
| AS | Assignment |
Owner name: AIRSPACE SYSTEMS, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BANGA, JASMINDER SINGH;FOINA, AISLAN GOMIDE;BAR-NAHUM, GUY;SIGNING DATES FROM 20200426 TO 20200514;REEL/FRAME:052676/0856 |
|
| CC | Certificate of correction | ||
| FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
| FEPP | Fee payment procedure |
Free format text: SURCHARGE FOR LATE PAYMENT, SMALL ENTITY (ORIGINAL EVENT CODE: M2554); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
| MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 4 |
|
| AS | Assignment |
Owner name: AIRSPACE DEFENSE, INC., DELAWARE Free format text: ASSIGNMENT OF ASSIGNOR'S INTEREST;ASSIGNOR:SILICON VALLEY BANK, A DIVISION OF FIRST-CITIZENS BANK & TRUST COMPANY;REEL/FRAME:072857/0596 Effective date: 20240903 Owner name: SILICON VALLEY BANK, A DIVISION OF FIRST-CITIZENS BANK & TRUST COMPANY, CALIFORNIA Free format text: SECURITY INTEREST;ASSIGNOR:AIRSPACE SYSTEMS, INC.;REEL/FRAME:072857/0610 Effective date: 20240903 Owner name: AIRSPACE DEFENSE, INC., DELAWARE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SILICON VALLEY BANK, A DIVISION OF FIRST-CITIZENS BANK & TRUST COMPANY;REEL/FRAME:072857/0596 Effective date: 20240903 |