Secure unmanned vehicle operation and communication
First Claim
1. A hardware based system for secure wireless communications between an unmanned vehicle and an authorized operator of the unmanned vehicle, the system comprising:
- a remote control station configured to communicate with the unmanned vehicle;
the unmanned vehicle, configured to be initially locked from remote control by the remote control station;
a first access control hardware device physically attached to the control station and communicably coupled, using a network, with the unmanned vehicle, the first access control hardware device configured to;
receive a first authentication input from an operator;
in response to validating the first authentication input from the operator, generate encrypted vehicle control data; and
output, using a first processor and a first memory, the encrypted vehicle control data and operator identifying information to the unmanned vehicle; and
a second access control hardware device physically attached to the unmanned vehicle and communicably coupled, using the network, with the remote control station, the second access control hardware device configured to;
receive a second authentication input from the operator;
receive the encrypted vehicle control data and the operator identifying information from the first access control hardware device physically attached to the control station;
generate, using a second processor and a second memory, cryptographic information in response to validating the second authentication input by the operator;
decrypt the encrypted vehicle control data generated from validating the first authentication input by the operator, using the generated cryptographic information; and
based on validating the decrypted vehicle control data;
designate the operator as an approved operator for use of the remote control station; and
unlock the unmanned vehicle for control by the approved operator via the remote control station using a secure wireless connection between the remote control station and the unmanned vehicle, wherein the approved operator designation expires after a limited duration of time.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for unmanned vehicle security and control are provided herein. An exemplary system includes a control station and an unmanned vehicle. The unmanned vehicle may be locked from remote control by the control station. The system may also include a first access control hardware device attached to the control station and communicably coupled, using a network, with the unmanned vehicle. The system may also include a second access control hardware device physically attached to the unmanned vehicle and communicably coupled, using the network, with the control station. The first and/or second access control hardware devices are utilized to unlock the unmanned vehicle from remote control by the control station.
40 Citations
19 Claims
-
1. A hardware based system for secure wireless communications between an unmanned vehicle and an authorized operator of the unmanned vehicle, the system comprising:
-
a remote control station configured to communicate with the unmanned vehicle; the unmanned vehicle, configured to be initially locked from remote control by the remote control station; a first access control hardware device physically attached to the control station and communicably coupled, using a network, with the unmanned vehicle, the first access control hardware device configured to; receive a first authentication input from an operator; in response to validating the first authentication input from the operator, generate encrypted vehicle control data; and output, using a first processor and a first memory, the encrypted vehicle control data and operator identifying information to the unmanned vehicle; and a second access control hardware device physically attached to the unmanned vehicle and communicably coupled, using the network, with the remote control station, the second access control hardware device configured to; receive a second authentication input from the operator; receive the encrypted vehicle control data and the operator identifying information from the first access control hardware device physically attached to the control station; generate, using a second processor and a second memory, cryptographic information in response to validating the second authentication input by the operator; decrypt the encrypted vehicle control data generated from validating the first authentication input by the operator, using the generated cryptographic information; and based on validating the decrypted vehicle control data; designate the operator as an approved operator for use of the remote control station; and unlock the unmanned vehicle for control by the approved operator via the remote control station using a secure wireless connection between the remote control station and the unmanned vehicle, wherein the approved operator designation expires after a limited duration of time. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A hardware-based method for secure wireless communications between an unmanned vehicle and an authorized operator of the unmanned vehicle, the method comprising:
-
outputting, by a first access control hardware device physically attached to a control station and communicably coupled, by a network, with an unmanned vehicle, using a processor and memory, encrypted vehicle control data for a secure wireless connection between the control station and the unmanned vehicle, wherein the outputting occurs in response to a first authentication input by an operator; outputting, by the first access control hardware device, operator identifying information in response to the first authentication input by the operator; receiving, by a second access control hardware device physically attached to the unmanned vehicle and communicably coupled, by the network, with the control station, the encrypted vehicle control data from the first access control hardware device; generating, by the second access control hardware device, cryptographic information to decrypt the encrypted vehicle control data, in response to a second authentication input by the operator; decrypting, by the second access control hardware device, the encrypted vehicle control data using the cryptographic information; designating the operator as an approved operator to control the unmanned vehicle via the control station; unlocking, by the second access control hardware device, the unmanned vehicle for control by the approved operator via the control station using the decrypted vehicle control data and using the secure wireless connection between the control station and the unmanned vehicle, wherein the approved operator designation expires after a limited duration of time; receiving, by the second access control hardware device, the operator identifying information from the first access control hardware device; validating the operator identifying information using the cryptographic information; and converting the operator to an approved operator for use of the control station after validating the operator identifying information, based on both the first authentication input by the operator and the second authentication input by the operator. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A hardware-based system for unmanned vehicle security, the system comprising:
-
a control station configured to communicate with an unmanned vehicle; the unmanned vehicle configured to be initially locked from remote control by the control station; a first access control hardware device physically attached to the control station and communicably coupled, using a network, with the unmanned vehicle, the first access control hardware device configured to; receive a first biometric authentication input from an operator; and in response to receiving the first biometric authentication input from the operator, generate and output encrypted vehicle control data, operator identifying information, and a decryption key for a secure wire less connection between the control station and the unmanned vehicle; and a second access control hardware device physically attached to the unmanned vehicle and communicably coupled, using the network, with the control station, the second access control hardware device configured to; receive a second biometric authentication input from the operator; receive the operator identifying information from the first access control hardware device; and generate cryptographic information in response to the second biometric authentication input by the operator, the cryptographic information being used with the decryption key to decrypt the encrypted vehicle control data for the secure wireless connection between the control station and the unmanned vehicle and validate the operator identifying information, the decrypted vehicle control data used to designate the operator as an approved operator for use of the control station and unlock the unmanned vehicle for control by the approved operator via the control station using the secure wireless connection between the control station and the unmanned vehicle, wherein the approved operator designation expires after a limited duration of time. - View Dependent Claims (18, 19)
-
Specification