Authentication systems and methods for generating flight regulations
First Claim
Patent Images
1. A method of authenticating an unmanned aerial vehicle (UAV), said method comprising:
- receiving an authentication request from a UAV, wherein the authentication request comprises a UAV identifier;
retrieving information that corresponds to the UAV identifier;
generating authentication vectors based on the retrieved information, wherein the authentication vectors comprise at least an authentication token;
transmitting the authentication token and a key evaluation reference to the UAV, wherein the UAV authenticates the authentication vector based on a message authentication code generated based on the authentication token, the key evaluation reference, and a key encoded on the UAV;
receiving a response from the UAV, wherein the response is based on the key evaluation reference and the key encoded on the UAV; and
verifying the authentication request based on the response received from the UAV.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for UAV safety are provided. An authentication system may be used to confirm UAV and/or user identity and provide secured communications between users and UAVs. The UAVs may operate in accordance with a set of flight regulations. The set of flight regulations may be associated with a geo-fencing device in the vicinity of the UAV.
-
Citations
20 Claims
-
1. A method of authenticating an unmanned aerial vehicle (UAV), said method comprising:
-
receiving an authentication request from a UAV, wherein the authentication request comprises a UAV identifier; retrieving information that corresponds to the UAV identifier; generating authentication vectors based on the retrieved information, wherein the authentication vectors comprise at least an authentication token; transmitting the authentication token and a key evaluation reference to the UAV, wherein the UAV authenticates the authentication vector based on a message authentication code generated based on the authentication token, the key evaluation reference, and a key encoded on the UAV; receiving a response from the UAV, wherein the response is based on the key evaluation reference and the key encoded on the UAV; and verifying the authentication request based on the response received from the UAV. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system of authenticating an unmanned aerial vehicle (UAV), said system comprising:
-
an authentication module; a communication module; and one or more processors operably coupled to the authentication module and the communication module and configured to individually or collectively; receive an authentication request from a UAV, wherein the authentication request comprises a UAV identifier; retrieve information that corresponds to the UAV identifier; generate authentication vectors based on the retrieved information, wherein the authentication vectors comprise at least an authentication token; transmit the authentication token and a key evaluation reference to the UAV, wherein the UAV authenticates the authentication vector based on a message authentication code generated based on the authentication token, the key evaluation reference, and a key encoded on the UAV; receive a response from the UAV, wherein the response is based on the key evaluation reference and the key encoded on the UAV; and verify the authentication request based on the response received from the UAV.
-
-
11. A method of authenticating an authentication center, said method comprising:
-
providing an authentication request from a UAV to an authentication center, wherein the authentication request comprises a UAV identifier; receiving authentication vectors from the authentication center, wherein the authentication vectors comprise an authentication token and a key evaluation reference, and wherein the authentication token is generated based on retrieved information that corresponds to the UAV identifier; calculating an authentication sequence number based on the authentication token; generating an authentication key based on the key evaluation reference and a key encoded on the UAV; determining a message authentication code based on the authentication token, the authentication sequence number, and the authentication key; and authenticating the authentication center based on at least one of the authentication sequence number and the message authentication code determined from the authentication vectors received from the authentication center. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification