Communication of navigation data spoofing between unmanned vehicles
First Claim
Patent Images
1. A computer-implemented method, comprising:
- receiving, by a computer system of an unmanned aerial vehicle (UAV), global positioning system (GPS) data associated with an area, the computer system configured to direct a flight of the UAV to deliver an item from a source to a destination based at least in part on the GPS data;
receiving, by the computer system and over a network, a token from a second UAV;
establishing, by the computer system, a communication channel between the UAV and the second UAV over the network based at least in part on the token;
receiving, by the computer system and over the communication channel, an indication of GPS data spoofing detected in the area from the second UAV;
determining, by the computer system, that the GPS data is spoofed based at least in part on an identifier of the second UAV and on the indication of GPS data spoofing; and
directing, by the computer system, a portion of the flight independently of the GPS data that is spoofed.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for determining whether data associated with an autonomous operation of a first unmanned vehicle may be trusted. For example, the first unmanned vehicle may receive an indication related to the data and originating from a second unmanned vehicle over a network. For instance, the indication may indicate that similar data for a similar autonomous operation of the second unmanned vehicle may be untrusted. Based on a level of trust accorded to the indication, the first unmanned vehicle may determine that the data may be untrusted and the autonomous navigation may be directed independently of the data.
-
Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
receiving, by a computer system of an unmanned aerial vehicle (UAV), global positioning system (GPS) data associated with an area, the computer system configured to direct a flight of the UAV to deliver an item from a source to a destination based at least in part on the GPS data; receiving, by the computer system and over a network, a token from a second UAV; establishing, by the computer system, a communication channel between the UAV and the second UAV over the network based at least in part on the token; receiving, by the computer system and over the communication channel, an indication of GPS data spoofing detected in the area from the second UAV; determining, by the computer system, that the GPS data is spoofed based at least in part on an identifier of the second UAV and on the indication of GPS data spoofing; and directing, by the computer system, a portion of the flight independently of the GPS data that is spoofed. - View Dependent Claims (2, 3, 4, 19, 20)
-
-
5. One or more non-transitory computer readable media comprising instructions that, when executed with a computer system of a first unmanned vehicle, cause the computer system to at least:
-
access first navigation data of a source external to the first unmanned vehicle, the first navigation data associated with directing an autonomous navigation of the first unmanned vehicle within an area; receive, over a network, a token from a second unmanned vehicle; establish a communication channel between the first unmanned vehicle and the second unmanned vehicle over the network based at least in part on the token; receive, from the second unmanned vehicle over the communication channel, an indication that second navigation data of the second unmanned vehicle is untrusted within the area; determine that the first navigation data is untrusted based at least in part on the indication that the second navigation data is untrusted; and direct the autonomous navigation of the first unmanned vehicle independently of the first navigation data based at least in part on the first navigation data being untrusted. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12)
-
-
13. A system installed at a central station and configured to communicate with a plurality of unmanned vehicles over a network, the system comprising:
-
one or more processors; and one or more computer readable media comprising instructions that, when executed with the one or more processors, cause the system to at least; access, over the network, first navigation data of a source external to a first unmanned vehicle, the first navigation data associated with directing an autonomous navigation of the first unmanned vehicle within an area; generate a map associating locations with indications of untrusted navigation data; access, based at least in part on the map, an indication that second navigation data of a second unmanned vehicle is untrusted within the area; determine that the first navigation data is untrusted based at least in part on the indication that the second navigation data is untrusted; and generate a corrective action associated with directing the autonomous navigation of the first unmanned vehicle independently of the first navigation data that is untrusted. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification