Communication of navigation data spoofing between unmanned vehicles
First Claim
Patent Images
1. A computer-implemented method, comprising:
- receiving, by a computer system of an unmanned aerial vehicle (UAV), global positioning system (GPS) data associated with an area, the computer system configured to direct a flight of the UAV to deliver an item from a source to a destination based at least in part on the GPS data;
receiving, by the computer system and over a network, a token from a second UAV;
establishing, by the computer system, a communication channel between the UAV and the second UAV over the network based at least in part on the token;
receiving, by the computer system and over the communication channel, an indication of GPS data spoofing detected in the area from the second UAV;
determining, by the computer system, that the GPS data is spoofed based at least in part on an identifier of the second UAV and on the indication of GPS data spoofing; and
directing, by the computer system, a portion of the flight independently of the GPS data that is spoofed.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for determining whether data associated with an autonomous operation of a first unmanned vehicle may be trusted. For example, the first unmanned vehicle may receive an indication related to the data and originating from a second unmanned vehicle over a network. For instance, the indication may indicate that similar data for a similar autonomous operation of the second unmanned vehicle may be untrusted. Based on a level of trust accorded to the indication, the first unmanned vehicle may determine that the data may be untrusted and the autonomous navigation may be directed independently of the data.
129 Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
receiving, by a computer system of an unmanned aerial vehicle (UAV), global positioning system (GPS) data associated with an area, the computer system configured to direct a flight of the UAV to deliver an item from a source to a destination based at least in part on the GPS data; receiving, by the computer system and over a network, a token from a second UAV; establishing, by the computer system, a communication channel between the UAV and the second UAV over the network based at least in part on the token; receiving, by the computer system and over the communication channel, an indication of GPS data spoofing detected in the area from the second UAV; determining, by the computer system, that the GPS data is spoofed based at least in part on an identifier of the second UAV and on the indication of GPS data spoofing; and directing, by the computer system, a portion of the flight independently of the GPS data that is spoofed. - View Dependent Claims (2, 3, 4, 19, 20)
-
-
5. One or more non-transitory computer readable media comprising instructions that, when executed with a computer system of a first unmanned vehicle, cause the computer system to at least:
-
access first navigation data of a source external to the first unmanned vehicle, the first navigation data associated with directing an autonomous navigation of the first unmanned vehicle within an area; receive, over a network, a token from a second unmanned vehicle; establish a communication channel between the first unmanned vehicle and the second unmanned vehicle over the network based at least in part on the token; receive, from the second unmanned vehicle over the communication channel, an indication that second navigation data of the second unmanned vehicle is untrusted within the area; determine that the first navigation data is untrusted based at least in part on the indication that the second navigation data is untrusted; and direct the autonomous navigation of the first unmanned vehicle independently of the first navigation data based at least in part on the first navigation data being untrusted. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12)
-
-
13. A system installed at a central station and configured to communicate with a plurality of unmanned vehicles over a network, the system comprising:
-
one or more processors; and one or more computer readable media comprising instructions that, when executed with the one or more processors, cause the system to at least; access, over the network, first navigation data of a source external to a first unmanned vehicle, the first navigation data associated with directing an autonomous navigation of the first unmanned vehicle within an area; generate a map associating locations with indications of untrusted navigation data; access, based at least in part on the map, an indication that second navigation data of a second unmanned vehicle is untrusted within the area; determine that the first navigation data is untrusted based at least in part on the indication that the second navigation data is untrusted; and generate a corrective action associated with directing the autonomous navigation of the first unmanned vehicle independently of the first navigation data that is untrusted. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification