Location verification and secure no-fly logic for unmanned aerial vehicles
First Claim
1. A non-transitory computer-readable medium comprising computer-executable instructions that, when executed by a processor, cause the processor to perform operations including:
- obtaining a location of an unmanned aerial vehicle engaged in autonomous flight, the location determined from a satellite-based navigation system;
determining location data from one or more sources accessible by the unmanned aerial vehicle, the one or more sources including at least one of a broadcast beacon, a wireless network identifier, a cellular tower, and a visual marker;
comparing the location data to the location by;
determining a range associated with the location data;
determining a source location of the one or more sources of the location data;
determining a distance between the location and the source location; and
comparing the range to the distance; and
initiating an action based on the comparison, the action including;
landing of the unmanned aerial vehicle, returning the unmanned aerial vehicle to a previously determined location, returning the unmanned aerial vehicle to a base station associated with the unmanned aerial vehicle, requesting user control of the unmanned aerial vehicle, or initiating self-destruction of the unmanned aerial vehicle.
10 Assignments
0 Petitions
Accused Products
Abstract
Certain embodiments herein relate to location verification for autonomous unmanned aerial vehicles (also referred to as “drones”). In some embodiments, an unmanned aerial vehicle engaged in autonomous flight may determine its location using a satellite-based navigation system. The location may be evaluated against location data obtained from one or more secondary factors, such as public broadcast beacons, cellular towers, wireless network identifiers, visual markers, or any combination thereof. If the location is determined to be invalid, the unmanned aerial vehicle may be instructed to take a mitigation action. Additionally, certain embodiments also include the verification of a flight plan for the unmanned aerial vehicle using secure no-fly logic to verify a flight plan does not violate no-fly zones. If the flight plan is verified, the flight plan may be signed using a cryptographic signature and provided to a navigation module that verifies the signature and executes the flight plan.
-
Citations
10 Claims
-
1. A non-transitory computer-readable medium comprising computer-executable instructions that, when executed by a processor, cause the processor to perform operations including:
-
obtaining a location of an unmanned aerial vehicle engaged in autonomous flight, the location determined from a satellite-based navigation system; determining location data from one or more sources accessible by the unmanned aerial vehicle, the one or more sources including at least one of a broadcast beacon, a wireless network identifier, a cellular tower, and a visual marker; comparing the location data to the location by; determining a range associated with the location data; determining a source location of the one or more sources of the location data; determining a distance between the location and the source location; and comparing the range to the distance; and initiating an action based on the comparison, the action including;
landing of the unmanned aerial vehicle, returning the unmanned aerial vehicle to a previously determined location, returning the unmanned aerial vehicle to a base station associated with the unmanned aerial vehicle, requesting user control of the unmanned aerial vehicle, or initiating self-destruction of the unmanned aerial vehicle. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An unmanned aerial vehicle, comprising:
-
a processor; a computer-readable memory including computer-executable instructions that, when executed by the processor, cause the processor to perform operations including; obtaining a location of the unmanned aerial vehicle while engaged in autonomous flight, the location determined from a satellite-based navigation system; determining location data from one or more sources accessible by the unmanned aerial vehicle, the one or more sources including at least one of a broadcast beacon, a wireless network identifier, a cellular tower, and a visual marker; comparing the location data to the location by; determining a range associated with the location data; determining a source location of the one or more sources of the location data; determining a distance between the location and the source location; and comparing the range to the distance; and initiating an action based on the comparison, the action including;
landing of the unmanned aerial vehicle, returning the unmanned aerial vehicle to a previously determined location, returning the unmanned aerial vehicle to a base station associated with the unmanned aerial vehicle, requesting user control of the unmanned aerial vehicle, or initiating self-destruction of the unmanned aerial vehicle. - View Dependent Claims (7, 8, 9, 10)
-
Specification