AUTHENTICATED MESSAGES BETWEEN UNMANNED VEHICLES
First Claim
Patent Images
1. An unmanned aerial vehicle, comprising:
- a propulsion subsystem configured to propel the unmanned aerial vehicle between locations; and
a transceiver configured to receive and transmit messages;
an on-board computer system including;
one or more processors; and
memory that stores;
a set of tasks to be completed by the unmanned aerial vehicle; and
instructions that, when executed by the one or more processors, cause the on-board computer system to;
determine a task for the set of tasks based at least in part a first message received via the transceiver;
at a time after determining the task, cryptographically verifying that a second message received through the transceiver is trustworthy;
recalculate the task based at least in part on information in the received second message; and
control at least the propulsion subsystem to complete the recalculated task.
1 Assignment
0 Petitions
Accused Products
Abstract
An unmanned vehicle communicates with other unmanned vehicles. When the unmanned vehicle receives a message from another unmanned vehicle, the unmanned vehicle verifies authenticity of the message. For at least some types of messages, if determined that the message is authentic, the unmanned vehicle updates a set of operations the unmanned vehicle will perform in accordance with information in the message.
-
Citations
20 Claims
-
1. An unmanned aerial vehicle, comprising:
-
a propulsion subsystem configured to propel the unmanned aerial vehicle between locations; and a transceiver configured to receive and transmit messages; an on-board computer system including; one or more processors; and memory that stores; a set of tasks to be completed by the unmanned aerial vehicle; and instructions that, when executed by the one or more processors, cause the on-board computer system to; determine a task for the set of tasks based at least in part a first message received via the transceiver; at a time after determining the task, cryptographically verifying that a second message received through the transceiver is trustworthy; recalculate the task based at least in part on information in the received second message; and control at least the propulsion subsystem to complete the recalculated task. - View Dependent Claims (2, 3, 4)
-
-
5. A computer-implemented method, comprising:
under the control of an on-board computer system of an unmanned vehicle, storing information specifying a set of operations to be performed by the unmanned vehicle; receiving, from another unmanned vehicle, a message and authentication information for the message, the authentication information specific to an originator of the message; determining, based at least in part on the authentication information, that the message is authentic; and modifying the information based at least in part on the message. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12)
-
13. A non-transitory computer-readable storage medium having stored thereon executable instructions that, when executed by one or more processors of a computer system of an unmanned vehicle, cause the computer system to at least:
-
store an operational plan specifying a set of operations the unmanned vehicle is to perform; receive a message; use authentication information specific to another unmanned aerial vehicle to cryptographically verify whether the message originated from the other unmanned vehicle; and update the operational plan in accordance with information in the message if the message is cryptographically verified as having originated from the other unmanned vehicle. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification