Apparatus, system and method for aircraft security and anti-hijacking intervention
First Claim
1. A method of operating an aircraft in which access is limited and automated or remote control can be assumed in the event of a possibly hostile situation, the method comprising the steps of:
- maintaining a first database having identity and associated biometric information relating to crew members and with each crew member having a particular authorization according to the category of crew member;
downloading a subset of information from the database to the aircraft, the subset consisting essentially of information relating to crew members that are assigned to the aircraft for a particular flight;
reading biometric information of an individual requesting access to the aircraft;
comparing the biometric information read from the individual requesting aircraft access to the crew member information downloaded to the aircraft to determine if there is a match;
if a match is determined, granting the individual access to the aircraft;
downloading a second subset of information from the database to a point of access to a tarmac on which the aircraft is found, the second subset consisting essentially of information relating to ground crew members that are assigned to a particular aircraft on the tarmac;
reading biometric information of an individual requesting access to the tarmac;
comparing the biometric information read from the individual requesting tarmac access to the ground crew information downloaded to the point of access to determine if there is a match;
if a match is determined, granting access to the tarmac to the individual requesting tarmac access;
substantially continuously reading biometric information of an individual attempting to directly control the flight of the aircraft, by way of biometric sensors placed on those aircraft controls that are responsible for controlling the flight of the aircraft;
substantially continuously comparing the biometric information read from the individual attempting to directly control the flight of the aircraft to the crew member information downloaded to the aircraft to determine if the individual is authorized to directly control the flight of the aircraft;
if the individual attempting to directly control the flight of the aircraft is determined to be authorized, granting the individual permission to directly control the flight of the aircraft;
if the individual attempting to directly control the flight of the aircraft is determined to be unauthorized, locking out the individual from directly controlling the flight of the aircraft, and engaging an autopilot located on the aircraft to take over control of the aircraft during flight;
maintaining a second database having information relating to prohibited airspace;
inputting flight plan information into a monitoring system;
calculating acceptable deviation tolerances of the flight plan with respect to prohibited airspace information;
if a deviation from the flight plan occurs, assessing whether a possibly hostile situation exists via;
(i) assessing, from the ground or other location remote from the aircraft, the state of control of the aircraft by monitoring at least one indicator from the group consisting of;
automated communications received from the aircraft, voice communications from the aircraft, a video signal from a cockpit camera on the aircraft, and aircraft position and course information;
(ii) determining whether the aircraft is proximate to or on course to violate prohibited airspace; and
(iii) determining whether a violation of prohibited airspace is imminent by assessing whether an aircraft vector is directed at a potential terrorist target or whether the aircraft altitude is below a pre-determined flight floor limit; and
if a potentially hostile situation cannot be ruled out within a reasonable time, assuming control of the aircraft by(i) remotely controlling the aircraft from the ground or other location remote from the aircraft, or(ii) engaging an automated control unit on the aircraft to execute a pre-programmed flight path or contingency protocol that contradicts the modification.
1 Assignment
0 Petitions
Accused Products
Abstract
A security mechanism identifies users, so as to restrict access and operation to authorized users, such as to persons authorized to access and fly a particular aircraft. The security mechanism comprises one or more security devices to identify the user attempting to gain access or operate the controller; and one or more monitoring devices to determine whether or not the user identified is authorized to have access or operate the controller. Methods of safely operating aircraft are also described. The methods include protocols for limiting access to the aircraft and assuming remote control of the aircraft if a possibly hostile situation is detected.
38 Citations
16 Claims
-
1. A method of operating an aircraft in which access is limited and automated or remote control can be assumed in the event of a possibly hostile situation, the method comprising the steps of:
-
maintaining a first database having identity and associated biometric information relating to crew members and with each crew member having a particular authorization according to the category of crew member; downloading a subset of information from the database to the aircraft, the subset consisting essentially of information relating to crew members that are assigned to the aircraft for a particular flight; reading biometric information of an individual requesting access to the aircraft; comparing the biometric information read from the individual requesting aircraft access to the crew member information downloaded to the aircraft to determine if there is a match; if a match is determined, granting the individual access to the aircraft; downloading a second subset of information from the database to a point of access to a tarmac on which the aircraft is found, the second subset consisting essentially of information relating to ground crew members that are assigned to a particular aircraft on the tarmac; reading biometric information of an individual requesting access to the tarmac; comparing the biometric information read from the individual requesting tarmac access to the ground crew information downloaded to the point of access to determine if there is a match; if a match is determined, granting access to the tarmac to the individual requesting tarmac access; substantially continuously reading biometric information of an individual attempting to directly control the flight of the aircraft, by way of biometric sensors placed on those aircraft controls that are responsible for controlling the flight of the aircraft; substantially continuously comparing the biometric information read from the individual attempting to directly control the flight of the aircraft to the crew member information downloaded to the aircraft to determine if the individual is authorized to directly control the flight of the aircraft; if the individual attempting to directly control the flight of the aircraft is determined to be authorized, granting the individual permission to directly control the flight of the aircraft; if the individual attempting to directly control the flight of the aircraft is determined to be unauthorized, locking out the individual from directly controlling the flight of the aircraft, and engaging an autopilot located on the aircraft to take over control of the aircraft during flight; maintaining a second database having information relating to prohibited airspace; inputting flight plan information into a monitoring system; calculating acceptable deviation tolerances of the flight plan with respect to prohibited airspace information; if a deviation from the flight plan occurs, assessing whether a possibly hostile situation exists via; (i) assessing, from the ground or other location remote from the aircraft, the state of control of the aircraft by monitoring at least one indicator from the group consisting of;
automated communications received from the aircraft, voice communications from the aircraft, a video signal from a cockpit camera on the aircraft, and aircraft position and course information;(ii) determining whether the aircraft is proximate to or on course to violate prohibited airspace; and (iii) determining whether a violation of prohibited airspace is imminent by assessing whether an aircraft vector is directed at a potential terrorist target or whether the aircraft altitude is below a pre-determined flight floor limit; and if a potentially hostile situation cannot be ruled out within a reasonable time, assuming control of the aircraft by (i) remotely controlling the aircraft from the ground or other location remote from the aircraft, or (ii) engaging an automated control unit on the aircraft to execute a pre-programmed flight path or contingency protocol that contradicts the modification. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. An apparatus for limiting access to an aircraft and for operating the aircraft in which automated or remote control can be assumed in the event of a possibly hostile situation, the apparatus comprising:
-
a database having identity and associated biometric information relating to crew members; means for downloading a subset of information from the database to the aircraft, the subset consisting essentially of information relating to crew members that are assigned to the aircraft for a particular flight; means for reading biometric information of an individual requesting access to the aircraft; means for comparing the biometric information read from the individual requesting access to the information downloaded to the aircraft to determine if there is a match; means for granting the individual access to the aircraft if a match is determined; means for downloading a second subset of information from the database to a point of access to a tarmac on which the aircraft is found, the second subset consisting essentially of information relating to around crew members that are assigned to a particular aircraft on the tarmac; means for reading biometric information of an individual requesting access to the tarmac; means for comparing the biometric information read from the individual requesting tarmac access to the ground crew information downloaded to the point of access to determine if there is a match; means for granting the individual access to the tarmac if a match is determined; means for substantially continuously reading biometric information of an individual attempting to directly control the flight of the aircraft; means for substantially continuously comparing the biometric information read from the individual attempting to directly control the flight of the aircraft to information downloaded to the aircraft to determine if the individual is authorized to directly control the flight of the aircraft; means for granting the individual permission to directly control the flight of the aircraft if the individual attempting to directly control the flight of the aircraft is determined to be authorized; means for locking out the individual from directly controlling the flight of the aircraft, and engaging an autopilot located on the aircraft to take over control of the aircraft during flight, if the individual attempting to directly control the flight of the aircraft is determined to be unauthorized; a monitoring system containing means for accessing a database having information relating to prohibited airspace, flight plan information and acceptable deviation tolerances relating to the flight plan with respect to the prohibited airspace information; means for assessing whether a possibly hostile situation exists, said means comprising; (i) means for assessing, from the ground or other location remote from the aircraft, the state of control of the aircraft by monitoring automated communications received from the aircraft, listening to voice communications from the aircraft, monitoring aircraft position and course information, or monitoring a video signal from a cockpit camera on the aircraft; (ii) means for determining whether the aircraft is proximate to or on course to violate prohibited airspace; and (iii) means for determining whether a violation of prohibited airspace is imminent via means for assessing whether an aircraft vector is directed at a potential terrorist target or whether the aircraft altitude is below a pre-determined flight floor limit; and means for assuming control of the aircraft if a potentially hostile situation cannot be ruled out within a time period following a deviation from the flight plan, wherein the means for assuming control comprises; (i) means for remotely controlling the aircraft from the ground or other location remote from the aircraft, or (ii) means for engaging an automated control unit on the aircraft to execute a pre-programmed flight path or contingency protocol that contradicts the deviation.
-
Specification