The inventive subject matter relates to systems and methods to identify unmanned aerial systems and to identify the owner/operatorsan owner/operator of unmanned aerial systems.
Unmanned aerial systems (sometimes referred-to in the art as “drones”) are proliferating at an amazing rate. People are buying them for business, hobby and public purposes. However, there is no means of identifying thean owner/operator of an unmanned aerial system while it is in the air. In most instances the airframes are too small for identification numbers. Unmanned aerial systems have been spotted in prohibited areas with no possibility of tracking down the owner/operator. The Federal Aviation Administration is proposing that all unmanned aerial systems must be registered to prevent bad behavior. However, registration would only be effective if law enforcement was able to identify the owner/operator. In most instances, the unmanned aerial system is flown away and the owner/operator is never found. There is a significant need for a system that allows for the identification of an unmanned aerial system while it is in the air, preferably with the capture of relevant data such as altitude and positioning information of the unmanned aerial system, and to tie the unmanned aerial system to its owner/operator.
Presently known art does not sufficiently address and solve these problems. The following represents a list of known related art:
(The teachings of each of the above-listed references are herein incorporated by reference.)
Accordingly, there is a need for improved unmanned aerial vehicle (UAV) identification systems. For example, there is a need for improved systems and methods for receiving UAV identification data, processing the data, and transferring the data to other relevant devices.
Recognizing the deficiencies of prior methodologies, hardware, and other systems, the inventive subject matter provides methods, hardware and systems for the short-range transmission of information from unmanned aerial systems to mobile and other ground-based or aerial devices, and, more particularly, but not exclusively, to users thereof. While such methods, hardware and systems may be employed to deliver a wide array of information, they find particular application in the delivery of identification codes and sensor data when ground-based or aerial users need to identify unmanned aerial systems, their location, their altitude and other information.
According to a first aspect, the inventive subject matter provides a method for providing information to a user, comprising the steps of: (a) transmitting a signal from an unmanned aerial system, wherein the unmanned aerial system is positioned within a space and the signal comprises an identification code, along with global positioning system data and other sensor data; (b) receiving the signal on a mobile device for a user located within range of the unmanned aerial system transmitter; (c) saving the identification code, along with global positioning system data and other sensor data to the handheld mobile device; (d) in some embodiments, retrieving information from at least one data-base using the identification code in the signal wherein the information retrieved by the mobile device is gated through a credentialing system that is a function of the privileges of the user; and (e) displaying on the mobile device the unmanned aerial system owner and system information associated with the identification code.
According to a second aspect, this description discloses a computing environment comprising a processor, a memory, and instructions stored on the memory that, when executed by the processor, cause the computing environment to carry out one or more disclosed methods. As but onean example, an unmanned aerial system comprises such a computing environment. For example, an unmanned aerial system can comprise a processor and a memory containing instructions that, when executed, cause the unmanned aerial system to perform a method for providing information to a user, the method comprising: determining a position of the unmanned aerial system within a space and transmitting from the unmanned aerial system a signal containing a unique identification code corresponding to the unmanned aerial system and an encoded form of the position of the unmanned aerial system.
According to a third aspect, this application discloses a computing environment and methods for identifying and/or determining a position of an unmanned aerial vehicle. According to the third aspect, a ground-based or aerial system, manned or unmanned, can receive a signal of the type transmitted by an unmanned aerial vehicle. As but onean example, a mobile device located within range of a transmitter of an unmanned aerial system can receive the signal and save a unique identification code corresponding to the unmanned aerial system, along with, for example, global positioning system data or other positional data, and, in some instances, other sensor data, contained in the signal. In some embodiments, the mobile device can retrieve information from at least one database using the identification code in the signal wherein the information retrieved by the mobile device is gated through a credentialing system that is a function of the privileges of the user. The mobile device can display on the mobile device the unmanned aerial system owner and system information associated with the identification code in one or more of the at least one database. The mobile device can embody a computing environment as disclosed herein.
Additional advantages of the inventive subject matter will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The advantages of the invention may be realized and attained by means of the instrumentalities and combinations particularly pointed out in the appended claims. Further benefits and advantages of the embodiments of the invention will become apparent from consideration of the following detailed description given with reference to the accompanying drawings, which specify and show preferred embodiments of the inventive subject matter.
Other embodiments are contemplated in the Detailed Description below, the appended Figures, and in the claims, as originally written or amended, the claims as such being incorporated by reference into this Summary. The foregoing is not intended to be an exhaustive list of embodiments and features of the inventive subject matter. Persons skilled in the art can appreciate other embodiments and features from the following detailed description in conjunction with the drawings.
The accompanying drawings, which are incorporated into and constitute a part of this specification, illustrate one or more embodiments of the inventive subject matter and, together with the detailed description, serve to explain the principles and implementations of the invention.
throughand 3 show various screens of a mobile device close proximity notification system configured in accordance with the embodiments of the inventive subject matter.
As a preface to the following detail and description of the inventive subject matter when appropriate, like reference materials and characters are used to designate identical, corresponding, or similar components in differing figure drawings. The figure drawings associated with this disclosure typically are not drawn with dimensional accuracy to scale, i.e., such drawings have been drafted with a focus on clarity of viewing and understanding rather than dimensional accuracy.
Described herein are methods, systems and devices for close location provision of information to a mobile device (e.g., a mobile phone, smart phone, tablet computer system or similar device) from an unmanned aerial system. The information is any information related to and broadcast by an unmanned aerial system. In one embodiment, as a user of a mobile device comes into proximity of an unmanned aerial system, the identification code and sensor information of the unmanned aerial system is displayed and recorded on the user's mobile device. In another embodiment, an authorized user, can use the mobile device to query an unmanned aerial system database/application server with the unmanned aerial system identification code and retrieve the unmanned aerial system owner's information.
A close proximity notification system configured in accordance with embodiments of the inventive subject matter may, thus, be used to record the UASUnmanned Aerial System (UAS) identification code and sensor data of the unmanned aerial system and identify, in real time or later, the unmanned aerial system and the owner of the unmanned aerial system.
Also shown in
An authorized mobile device 5 is further in wireless communication, e.g., via the Internet or other communications network or network of networks 8, with a database/application server 7. That is, having received the broadcast from transmitter 3, the application running on the mobile device seeks to establish communication with the database/application server 7. Upon successfully contacting the server and providing appropriate credentials 10, a UAS Identification Code 4 stored by the close proximity notification application running on the authorized mobile device 5 is transmitted (e.g., under the control of the close proximity notification application) from the mobile device to database/application server 7. An authorized user may choose to automatically look up a UAS identification codeIdentification Code or choose which UAS identification codes to look up.
In another embodiment the UAS transmits telemetry and identification data directly to the database/application service server through the internet over a licensed spectrum wireless connection.
In another embodiment the UAS telemetry and identification data is transmitted to a device that is licensed spectrum capable, then is published via the device over licensed spectrum to the database/application service server.
In another embodiment, the authorized mobile handheld device accesses UAS telemetry and identification data provided to the database/application from the UAS over a licensed spectrum connection or via a mobile device that providedprovides the UAS telemetry and identification data to the database/application over a licensed spectrum connection.
The database/application server 7 stores in a database information regarding the UAS identification codeIdentification Code 4 and the associated unmanned owner/operator and UAS information 9. Hence, upon receiving of the UAS Identification Code, the database/application server 7 will look up the UAS Identification Code and return the unmanned aerial system owner/operator information and UAS information 9 associated with the UAS Identification Code 4.
This point bears further attention-unlike wide area transmitters attached to unmanned aerial systems, the use of a short-range wireless transmitter 3 ensures that any mobile device 5 that receives information from the unmanned aerial system 1 is located within close proximity to the physical location of the unmanned aerial system 1. This reduces the chance that a handheld mobile device 5, 6 will receive a signal from unmanned aerial systems that are not near the handheld mobile device. Otherwise, the close proximity notification application on the handheld mobile device could be overwhelmed with the number of UAS Identification Codes 54. Accordingly, what is considered short range may depend in part on known or expected UAS density in a given area.
A non-authorized handheld mobile device 6 that cannot provide the proper credentials 10 will not be allowed access to the database/application server 7. However, the non-authorized handheld mobile device 6 will still be able to store the UAS identification Code 4 and sensor data 2. The non-authorized handheld mobile device 6 can, however, transfer the UAS Identification Code 4 and sensor data 2 to an authorized handheld mobile device 5. The authorized handheld mobile device 5 can then send the UAS identification codeIdentification Code 4 to the database/application server 7.
However, the UAS owner/operator and UAS information 9 will not be transmitted to the non-authorized handheld mobile device 6.
Transmitter
The transmitter 3 can be any suitable transmitter that may be attached to, or integrated with, an unmanned aerial system. The transmitter may be self-contained, or may be part of another electronic device. The transmitter may be powered by at least one power supply, such as a battery, and/or by external power. The transmitter may be attached to the unmanned aerial system 1 by any suitable means, non-limiting examples of which include a double-sided tape, hook and loop fastener (e.g., Velcro™ fastener), a mechanical fastener, or may be an embedded system as part of the unmanned aerial system 1.
The transmitter 3 mounted on or integrated with the unmanned aerial system 1 may be confronted with any suitable technology, including, but not limited to, Bluetooth, BLE (Bluetooth low energy) RFID (radio frequency identification), ZigBee™, Wibree™, UWB (ultra-wideband), WUSB (wireless USB), or other WLAN (wireless local area network) technology. The signal transmitted from the unmanned aerial system 1 may be limited to the effective range of the transmission technology. The effective range, strength, duration, and frequency of the signal transmitted from the unmanned aerial system 1 may change, and may be modified. The signal can be sent continuously or at a set interval. However, the unmanned aerial system 1 must transmit a signal while it is turned on.
When a handheld mobile device is located in sufficient proximity to the transmitter 3, the mobile device is able to receive the transmitted signal. The handheld mobile device is configured with hardware, software, and/or firmware capable of decoding the transmitted signal for us in subsequent steps of processing identification and sensor data. The effective reception distance which allows for such operation may be more or less than about 500 M and may vary depending upon environmental conditions and the technology used.
Mobile Device and Close Proximity Notification Application
The mobile device can be based on any operating system, including, but not limited to Apple Inc.'s iOS™, Google Inc.'s Android™, Microsoft Corp.'s Windows Phone™, Nokia Corp.'s Symbian™, or Research In Motion Limited's BlackBerry™ operating system, or an embedded Linux operating system such as Maemo™ or MeeGo™. Non-limiting examples of mobile devices capable of being used in accordance with the inventive subject matter include, a mobile phone (which may or may not be a “smart” phone), a GSM-enabled mobile phone, a CDMA-enabled mobile phone, a GPRS-enabled mobile phone, a mobile phone with a camera, a mobile phone with browser capabilities, a portable GPS (Global Positioning System) unit (whether embodied as a mobile phone or otherwise), a tracking unit, a portable computer system (such as a laptop computer, notebook computer, netbook computer, tablet computer, mini tablet computer, or other portable computer system), a personal digital assistant (PDA), ana portable audio or audio-video player, a portable camera, a pager, a portable gaming device, an electronic watch, an electronic keychain fob, or other device capable of executing the close proximity notification application or having dedicated hardware for performing the operations thereof.
The close proximity notification application is, in one possible embodiment, intended for download and installation on a compatible mobile device. When installed and running on the mobile device, the application may provide notifications to the user of the mobile device as he/she moves into proximity of an unmanned aerial system 1. These notifications may be delivered under a “push” paradigm, without need for a user to specifically request the same before they are delivered. For instance, a push notification may advise the user that he/she is in close proximity to an unmanned aerial system 1 (i.e., within the effective reception distance discussed above) to the user.
In some instances, the notification requires no response from the user. In other instances, the notifications may be saved and stored for easy retrieval. Users may set the number of instances or notifications to keep or for how long to keep data.
. Illustrates the UAS Identification Code lookup and retrieval screens of the authorized handheld mobile device. Typically, users must have input a valid username and password to access these screens. The screens show various possible functions and features that may be configured into a mobile device software, firmware, hardware, and/or other computing environment, as described below:
As persons skilled in the art will appreciate, the embodiment shown in the Figuresfigures is just one of many possible embodiments of the inventive subject matter, and it is not intended to be limiting.
Computing Environments
In addition, the memory 192 can store other instructions that, when executed by the processor, cause the computing environment or an associated system to perform any of a variety of tasks as described herein
The computing environment 190 includes at least one central processing unit 191 and a memory 192. In
A processing unit, or processor, can include an application specific integrated circuit (ASIC), a general-purpose microprocessor, a field-programmable gate array (FPGA), a digital signal controller, or a set of hardware logic structures (e.g., filters, arithmetic logic units, and dedicated state machines) arranged to process instructions.
The memory 192 may be volatile memory (e.g., registers, cache, RAM), non-volatile memory (e.g., ROM, EEPROM, flash memory, etc.), or some combination of the two. The memory 192 stores instructions for software 198a that can, for example, implement one or more of the technologies described herein, when executed by a processor. Disclosed technologies can be embodied in software, firmware or hardware (e.g., an ASIC).
A computing environment may have additional features. For example, the computing environment 190 includes storage 194, one or more input devices 195, one or more output devices 196, and one or more communication connections 197. An interconnection mechanism (not shown) such as a bus, a controller, or a network, can interconnect the components of the computing environment 190. Typically, operating system software (not shown) provides an operating environment for other software executing in the computing environment 190, and coordinates activities of the components of the computing environment 190.
The store 194 may be removable or non-removable, and can include selected forms of machine-readable media. In general, machine-readable media includes magnetic disks, magnetic tapes or cassettes, non-volatile solid-state memory, CD-ROMs, CD-RWs, DVDs, magnetic tape, optical data storage devices, and carrier waves, or any other machine-readable medium which can be used to store information, and which can be accessed within the computing environment 190. The storage 194 can store instructions for the software 98b198b that can, for example, implement technologies described herein, when executed by a processor.
The store 194 can also be distributed, e.g., over a network so that software instructions are stored and executed in a distributed fashion. In other embodiments, e.g., in which the store 194, or a portion thereof, is embodied as an arrangement of hardwired logic structures, some (or all) of these operations can be performed by specific hardware components that contain the hardwired logic structures. The store 194 can further be distributed, as between or among machine-readable media and selected arrangements of hardwired logic structures. Processing operations disclosed herein can be performed by any combination of programmed data processing components and hardwired circuit, or logic, components.
The input device(s) 195 may be any one or more of the following: a touch input device, such as a keyboard, keypad, mouse, pen, touchscreen, touch pad, or trackball; a voice input device, such as one or more microphone transducers, speech-recognition technologies and processors, and combinations thereof; a scanning device; or another device, that provides input to the computing environment 190. For audio, the input device(s) 195 may include a microphone or other transducer (e.g., a sound card or similar device that accepts audio input in analog or digital form), or a computer-readable media reader that provides audio samples and/or machine-readable transcriptions thereof to the computing environment 190.
Speech-recognition technologies that serve as an input device can include any of a variety of signal conditioners and controllers, and can be implemented in software, firmware, or hardware. Further, the speech-recognition technologies can be implemented in a plurality of functional modules. The functional modules, in turn, can be implemented within a single computing environment and/or distributed between or among a plurality of networked computing environments. Each such networked computing environment can be in communication with one or more other computing environments implementing a functional module of the speech-recognition technologies by way of a communication connection.
The output device(s) 196 may be any one or more of a display, printer, loudspeaker transducer, DVD-writer, signal transmitter, or another device that provides output from the computing environment 190, e.g., an audio accessory 20a, 20b (
The communication connection(s) 197 enable communication over or through a communication medium (e.g., a connecting network) to another computing entity or accessory. A communication connection can include a transmitter and a receiver suitable for communicating over a local area network (LAN), a wide area network (WAN) connection, or both. LAN and WAN connections can be facilitated by a wired connection or a wireless connection. If a LAN or a WAN connection is wireless, the communication connection can include one or more antennas or antenna arrays. The communication medium conveys information such as computer-executable instructions, compressed graphics information, processed signal information (including processed audio signals), or other data in a modulated data signal. Examples of communication media for so-called wired connections include fiber-optic cables and copper wires. Communication media for wireless communications can include electromagnetic radiation within one or more selected frequency bands.
Machine-readable media are any available media that can be accessed within a computing environment 190. By way of example, and not limitation, with the computing environment 190, machine-readable media include memory 192, storage 194, communication media (not shown), and combinations of any of the above. Tangible machine-readable (or computer-readable) media exclude transitory signals.
As explained above, some disclosed principles can be embodied in a store 194. Such a store can include tangible, non-transitory machine-readable medium (such as micro-electronic memory) having stored thereon or therein instructions. The instructions can program one or more data processing components (generically referred to here as a “processor”) to perform one or more processing operations described herein, including estimating, computing, calculating, measuring, adjusting, sensing, measuring, filtering, correlating, and decision making, as well as, by way of example, addition, subtraction, inversion, and comparison. In some embodiments, some or all of these operations (of a machine process) can be performed by specific electronic hardware components that contain hardwired logic (e.g., dedicated digital filter blocks). Those operations can alternatively be performed by any combination of programmed data processing components and fixed, or hardwired, circuit components.
Other Embodiments
The examples described above generally concern aerial systems and/or ground-based systems to identify and to determine a position for an unmanned aerial system, and related systems and methods. The previous description is provided to enable a person skilled in the art to make or use the disclosed principles. Embodiments other than those described above in detail are contemplated based on the principles disclosed herein, together with any attendant changes in configurations of the respective apparatus described herein, without departing from the spirit or scope of this disclosure. Various modifications to the examples described herein will be readily apparent to those skilled in the art.
For example, in some embodiments, the other sensors can take the form of an orientation sensor to help an unmanned aerial system to determine a position or orientation, then adjust operation of the unmanned aerial system in accordance with that determination. In some embodiments, the orientation sensor can be a traditional inertial-based sensor while in other embodiments, sensor readings from another sensor such as a proximity sensor can be used to make an orientation determination.
Directions and other relative references (e.g., up, down, top, bottom, left, right, rearward, forward, etc.) may be used to facilitate discussion of the drawings and principles herein, but are not intended to be limiting. For example, certain terms may be used such as “up,” “down,”, “upper,” “lower,” “horizontal,” “vertical,” “left,” “right,” and the like. Such terms are used, where applicable, to provide some clarity of description when dealing with relative relationships, particularly with respect to the illustrated embodiments. Such terms are not, however, intended to imply absolute relationships, positions, and/or orientations. For example, with respect to an object, an “upper” surface can become a “lower” surface simply by turning the object over. Nevertheless, it is still the same surface and the object remains the same. As used herein, “and/or” means “and” or “or”, as well as “and” and “or.” Moreover, all patent and non-patent literature cited herein is hereby incorporated by reference in its entirety for all purposes.
And, those of ordinary skill in the art will appreciate that the exemplary embodiments disclosed herein can be adapted to various configurations and/or uses without departing from the disclosed principles. Applying the principles disclosed herein, it is possible to provide a wide variety of damped acoustic enclosures, and related methods and systems. For example, the principles described above in connection with any particular example can be combined with the principles described in connection with another example described herein. Thus, all structural and functional equivalents to the features and method acts of the various embodiments described throughout the disclosure that are known or later come to be known to those of ordinary skill in the art are intended to be encompassed by the principles described and the features claimed herein. Accordingly, neither the claims nor this detailed description shall be construed in a limiting sense, and following a review of this disclosure, those of ordinary skill in the art will appreciate the wide variety of ultrasonic environmental sensors, and related methods and systems that can be devised under disclosed and claimed concepts.
As used herein the terms “part,”, “portion,”, “segment,”, “region,” “zone,” “section” and like terms are generally synonymous terms and do not imply that something is or is not a discrete element or subcomponent in a larger construct or is or is not a non-discrete subdivision of a larger unitary construct, unless context indicates otherwise.
Moreover, nothing disclosed herein is intended to be dedicated to the public regardless of whether such disclosure is explicitly recited in the claims. No claim feature is to be construed under the provisions of 35 USCU.S.C. 112(f), unless the feature is expressly recited using the phrase “means for” or “step for.”.
The appended claims are not intended to be limited to the embodiments shown herein, but are to be accorded the full scope consistent with the language of the claims, wherein reference to a feature in the singular, such as by use of the article “a” or “an” is not intended to mean “one and only one” unless specifically so stated, but rather “one or more.”. Further, in view of the many possible embodiments to which the disclosed principles can be applied, I reserve to the right is reserved to claim any and all combinations of features and technologies described herein as understood by a person of ordinary skill in the art, including, for example, all that comes within the scope and spirit of the following claims.
The instant application, application Ser. No. 17/563,988, filed Dec. 28, 2021 which is a reissue application of U.S. application Ser. No. 15/917,390, filed Mar. 9, 2018, now U.S. Pat. No. 10,825,345 which claims priority to U.S. Provisional Application No. 62/469,223, filed on Mar. 9, 2017.
Number | Name | Date | Kind |
---|---|---|---|
5528234 | Mani et al. | Jun 1996 | A |
5570095 | Drouilhet, Jr. et al. | Oct 1996 | A |
6681158 | Griffith | Jan 2004 | B2 |
8886459 | Stefani et al. | Nov 2014 | B2 |
9087451 | Jarrell | Jul 2015 | B1 |
9412278 | Gong et al. | Aug 2016 | B1 |
9646502 | Gentry | May 2017 | B1 |
9805273 | Seeber | Oct 2017 | B1 |
10365646 | Farnsworth | Jul 2019 | B1 |
10370093 | Beckman | Aug 2019 | B1 |
10420062 | Kim | Sep 2019 | B2 |
20130217332 | Altman | Aug 2013 | A1 |
20140103104 | Jover | Apr 2014 | A1 |
20140342760 | Moldavsky et al. | Nov 2014 | A1 |
20150106900 | Pinski | Apr 2015 | A1 |
20150260824 | Malveaux | Sep 2015 | A1 |
20160078759 | Nerayoff | Mar 2016 | A1 |
20160140851 | Levy | May 2016 | A1 |
20160196525 | Kantor | Jul 2016 | A1 |
20160247404 | Srivastava | Aug 2016 | A1 |
20170034700 | Cohen | Feb 2017 | A1 |
20170039424 | Nerayoff | Feb 2017 | A1 |
20170160740 | Srivastava | Jun 2017 | A1 |
20170160751 | Pierce | Jun 2017 | A1 |
20170248969 | Ham | Aug 2017 | A1 |
20170255802 | Falk | Sep 2017 | A1 |
20170261604 | Van Voorst | Sep 2017 | A1 |
20180068567 | Gong | Mar 2018 | A1 |
20180086451 | Vaughn | Mar 2018 | A1 |
20180090012 | Jo | Mar 2018 | A1 |
20180091908 | Goel | Mar 2018 | A1 |
20180107209 | Hardee | Apr 2018 | A1 |
20180111683 | Di Benedetto | Apr 2018 | A1 |
20180114450 | Glaab | Apr 2018 | A1 |
20180128895 | Seeber | May 2018 | A1 |
20180129881 | Seeber | May 2018 | A1 |
20180141656 | Heinonen | May 2018 | A1 |
20180144644 | Heinonen | May 2018 | A1 |
20180157255 | Halverson | Jun 2018 | A1 |
20180165968 | Clark | Jun 2018 | A1 |
20180165972 | Zelenka | Jun 2018 | A1 |
20180194455 | Park | Jul 2018 | A1 |
20180222600 | Matos | Aug 2018 | A9 |
20180253092 | Trapero Esteban | Sep 2018 | A1 |
20180275654 | Merz | Sep 2018 | A1 |
20180293898 | Redmann | Oct 2018 | A1 |
20180305012 | Ichihara | Oct 2018 | A1 |
20180357909 | Eyhorn | Dec 2018 | A1 |
20180364741 | Van Voorst | Dec 2018 | A1 |
20180373243 | Russell | Dec 2018 | A1 |
20190012922 | Selander | Jan 2019 | A1 |
20190019418 | Tantardini | Jan 2019 | A1 |
20190031346 | Yong | Jan 2019 | A1 |
20190051190 | Russell | Feb 2019 | A1 |
20190075543 | Kim | Mar 2019 | A1 |
20190139421 | Nilsson | May 2019 | A1 |
20190147747 | Arngren | May 2019 | A1 |
20190295426 | Nilsson | Sep 2019 | A1 |
20200158814 | Troxler | May 2020 | A9 |
Entry |
---|
Jensen et al. “Drone Identification and Tracking in Denmark, Technical Report”, Oct. 2016, pp. 1-64 (Year: 2016). |
Jensen et al., “Drone Identification and Tracking in Denmark,” Oct. 2016, 65 pages. |
Ganti-Implementation of Detection and Tracking Mechanism for Small UAS, 2016 International Conference on Unmanned Aircraft Systems (ICUAS), Jun. 7-10, 2016, Arlington, VA, pp. 1254-1260 (Year: 2016). |
Number | Date | Country | |
---|---|---|---|
62469223 | Mar 2017 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 15917390 | Mar 2018 | US |
Child | 17563988 | US |