Authenticated messages between unmanned vehicles
First Claim
Patent Images
1. A computer-implemented method, comprising:
- under the control of an on-board computer system of an unmanned vehicle,storing information specifying a set of operations to be performed by the unmanned vehicle;
receiving, from a second unmanned vehicle, a message and authentication information for the message, the authentication information specific to an originator of the message;
cryptographically determining, based at least in part on the authentication information, that the message is authentic;
modifying the information specifying the set of operations based at least in part on the message;
receiving a second message from the second unmanned aerial vehicle and cryptographically verify whether the second message originated from a command and control facility computer system; and
fulfilling a command of the second message contingent on successful verification that the second message originated from the command and control facility computer system.
1 Assignment
0 Petitions
Accused Products
Abstract
An unmanned vehicle communicates with other unmanned vehicles. When the unmanned vehicle receives a message from another unmanned vehicle, the unmanned vehicle verifies authenticity of the message. For at least some types of messages, if determined that the message is authentic, the unmanned vehicle updates a set of operations the unmanned vehicle will perform in accordance with information in the message.
50 Citations
19 Claims
-
1. A computer-implemented method, comprising:
under the control of an on-board computer system of an unmanned vehicle, storing information specifying a set of operations to be performed by the unmanned vehicle; receiving, from a second unmanned vehicle, a message and authentication information for the message, the authentication information specific to an originator of the message; cryptographically determining, based at least in part on the authentication information, that the message is authentic; modifying the information specifying the set of operations based at least in part on the message; receiving a second message from the second unmanned aerial vehicle and cryptographically verify whether the second message originated from a command and control facility computer system; and fulfilling a command of the second message contingent on successful verification that the second message originated from the command and control facility computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
9. A non-transitory computer-readable storage medium having stored thereon executable instructions that, when executed by one or more processors of a computer system of an unmanned vehicle, cause the computer system to at least:
-
store an operational plan specifying a set of operations the unmanned vehicle is to perform; receive, from a second unmanned aerial vehicle, a message; use authentication information specific to the second unmanned aerial vehicle to cryptographically verify whether the message originated from the second unmanned vehicle; update the operational plan in accordance with information in the message if the message is cryptographically verified as having originated from the second unmanned aerial vehicle; receive a second message from the second unmanned aerial vehicle, the second message specifying a command; cryptographically verify whether the second message originated from a command and control facility computer system; and fulfill the command contingent on successful verification that the second message originated from the command and control facility computer system. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. An unmanned aerial vehicle, comprising:
-
a propulsion subsystem configured to propel the unmanned aerial vehicle between locations; a transceiver configured to receive and transmit messages; and an on-board computer system including; one or more processors; and memory that stores; a set of tasks to be completed by the unmanned aerial vehicle; and instructions that, when executed by the one or more processors, cause the on-board computer system to; determine a task for the set of tasks based at least in part on a first message received via the transceiver; at a time after determining the task, receive, through the transceiver and from a second unmanned aerial vehicle, a second message; cryptographically verify that the second message received through the transceiver originated from a command and control facility computer system; as a result of cryptographically verifying that the second message originated from the command and control facility computer system, update the task based at least in part on information in the second message; and control at least the propulsion subsystem to complete the task. - View Dependent Claims (17, 18, 19)
-
Specification