The present invention generally relates to systems and methods for drone hijacking and jamming, and more particularly to systems and methods for taking control over and forcing down drones, including influencing drone parameters, and the like.
In recent years, drone hacking systems have emerged. However, such systems and methods lack efficient employment of hack parameters, signal strength measurement and geolocation awareness, and the like.
Therefore, there is a need for methods and systems that address the above, and other problems. The above and other problems are addressed by the illustrative embodiments of the present invention, which provide systems and methods for employment of controlled drone descent and deactivation, including adjusting geolocation parameters, signal jamming, signal blocking, and the like.
Accordingly, in illustrative aspects of the present invention there is provided a system, method and computer program product for controlled drone descent, and deactivation, including a drone deactivation system; and a location system. The drone deactivation system calculates positioning, signal reception, signal strength, and signal identification parameters of a target drone from the location system, and determines an attack method based on the calculated parameters. The drone deactivation system employs the determined attack method against the target drone for forcing at least one of controlled drone descent, and deactivation of the target drone.
The drone deactivation system includes at least one of a PC, a smart phone, a laptop client, and a server.
The location system includes at least one of a global positioning system, cell tower triangulation system, a Galileo location system, a Glonass location system, and Google location services.
The drone deactivation system includes deactivation resources including countermeasures including at least one of a GPS repositioning system, drone triangulation device, GPS jamming device, drone signal or system intrusion software devices, drone signal or system intrusion hardware devices, a drone position recognition and identifier system, and physical countermeasures, including delivering at least one of electromagnetic pulses, explosives, destructive objects and bullets.
The physical countermeasures include an attack drone delivering at least one of electromagnetic pulses, explosives, destructive objects and bullets.
Still other aspects, features, and advantages of the present invention are readily apparent from the following detailed description, by illustrating a number of illustrative embodiments and implementations, including the best mode contemplated for carrying out the present invention. The present invention is also capable of other and different embodiments, and its several details can be modified in various respects, all without departing from the spirit and scope of the present invention. Accordingly, the drawings and descriptions are to be regarded as illustrative in nature, and not as restrictive.
The embodiments of the present invention are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements and in which:
Referring now to the drawings, wherein like reference numerals designate identical or corresponding parts throughout the several views, and more particularly to
By adjusting geolocation parameters, signal jamming and signal blocking, hacking, and the like, or through physical attack means, such as the hunter drone 120, including countermeasures, such as a self-sacrificing directional explosive charge, electromagnetic pulse, and the like, the target drone 106 can be disabled and/or destroyed.
For example, suitable hacking methods 112, such as a script can be employed to hack the target drone 106 by employing any suitable methods of de-authenticating of communications between the target drone 106 and drone operator 104 (e.g., employing suitable systems and methods, such as similar to mdk3, aircrack, etc.), and the like. Thus, hacking methods 112 include a large array of hacking methods that can be used by programs that either try to hack user interaction with the drone 106 or instructing the drone 106 to do something that deviates from the drone operators' instructions, and the like. Craft information gathered by a radio signal sensor array 114 (e.g., frequency sniffer, traffic sniffer, position sniffer, etc.) is employed to generally disinform the drone 106, disinform a geolocation of the drone 106, disinform a flight level of the drone 106, and the like. By using the sensor array 114 surrounding vectors can be obtained in the form of GPS signals, cell tower information, and the broadcasted signals from both the drone 106 and the drone operator 104, and the like. Such gathered signals can be used to triangulate positions and employed by a drone descent tool in a similar way as to how doppler radar works as the source and observer move towards (or away from) each other. Such positions are used to time other attack methods, such as 112, 116 or 118. For example, the attack method 116 replaces or jams the incoming GPS signal of the drone 106 with a static or a fake position regarding height or location combined with the information gathered from the sensors 114. The attack method 118 can be employed to harm the drone 106 by any suitable physically by means, such as employing an object, projectile, electromagnetic pulse, and the like, to harm the drone 106 itself or hardware of the drone 106 using the information gathered from the sensors 114. The sensor data and calculation coming from the sensors 114 is advantageous for various other attack methods to time and/or aim an attack, and the like.
For example, at step S304, defined and tactical sensor info, and the like, can be employed to provide adverse or advantageous effects, and the like, on the takedown of the drone 106, such as signal jamming 2112, signal influencing 116, drone-control takeover 114, and the like. Advantageously, this feature can be employed to allow controlled descent of the drone or alter information within the drone. In one example, the drone takeover system can provide misinformation to the drone operator 104 or the drone 106 itself rendering it inoperable or gaining access to the drone 106 itself giving it instructions that deviate from the original ones, and the like.
In step S308, the intrusion of the drone takeover system 122 is executed between the drone operator 104 and the drone 106. At step S310, the drone takeover and/or information blocking/obfuscation and/or instruction replacement and execution, and the like, as previously described, is performed. At step S312, parameters used by the step S302 are updated to a current state based on the parameters of 106, 108, 110 and 118 collected at step S310, completing the process.
In
In
In
In further embodiments, the system and method can include other counter measures as physical destruction methods, such as deliberate collision with another drone or other object, such as a bullet or a high energy pulse, such as an Electro Magnetic Pulse, and the like, controlled by the drone takedown and descent system, based on the teaching of the present disclosure, and as will be appreciated by those of ordinary skill in the relevant art(s).
Advantageously, the illustrative systems and methods, provide employment of drone descent and deactivation system, including adjusting geolocation parameters, signal jamming and signal blocking, physical attack means, such as a hunter drone. including countermeasures, such as a self-sacrificing directional explosive charge, electromagnetic pulse parameters, and the like.
Although the illustrative systems and methods are described in terms of employment of drone descent and deactivation system, including adjusting geolocation parameters, signal jamming and signal blocking or physical attack means, such as a hunter drone, including countermeasures, such as a self-sacrificing directional explosive charge or electromagnetic pulse parameters, and the like, the illustrative systems and methods can be applied to any other suitable types of operator vs client takedown applications, and the like, based on the teaching of the present disclosure, and as will be appreciated by those of ordinary skill in the relevant art(s).
The above-described devices and subsystems of the illustrative embodiments can include, for example, any suitable servers, workstations, PCs, laptop computers, PDAs, Internet appliances, handheld devices, cellular telephones, wireless devices, other devices, and the like, capable of performing the processes of the illustrative embodiments. The devices and subsystems of the illustrative embodiments can communicate with each other using any suitable protocol and can be implemented using one or more programmed computer systems or devices.
One or more interface mechanisms can be used with the illustrative embodiments, including, for example, Internet access, telecommunications in any suitable form (e.g., voice, modem, and the like), wireless communications media, and the like. For example, employed communications networks or links can include one or more wireless communications networks, cellular communications networks, G3 communications networks, Public Switched Telephone Network (PSTNs), Packet Data Networks (PDNs), the Internet, intranets, a combination thereof, and the like.
It is to be understood that the devices and subsystems of the illustrative embodiments are for illustrative purposes, as many variations of the specific hardware used to implement the illustrative embodiments are possible, as will be appreciated by those skilled in the relevant art(s). For example, the functionality of one or more of the devices and subsystems of the illustrative embodiments can be implemented via one or more programmed computer systems or devices.
To implement such variations as well as other variations, a single computer system can be programmed to perform the special purpose functions of one or more of the devices and subsystems of the illustrative embodiments. On the other hand, two or more programmed computer systems or devices can be substituted for any one of the devices and subsystems of the illustrative embodiments. Accordingly, principles and advantages of distributed processing, such as redundancy, replication, and the like, also can be implemented, as desired, to increase the robustness and performance of the devices and subsystems of the illustrative embodiments.
The devices and subsystems of the illustrative embodiments can store information relating to various processes described herein. This information can be stored in one or more memories, such as a hard disk, optical disk, magneto-optical disk, RAM, and the like, of the devices and subsystems of the illustrative embodiments. One or more databases of the devices and subsystems of the illustrative embodiments can store the information used to implement the illustrative embodiments of the present inventions. The databases can be organized using data structures (e.g., records, tables, arrays, fields, graphs, trees, lists, and the like) included in one or more memories or storage devices listed herein. The processes described with respect to the illustrative embodiments can include appropriate data structures for storing data collected and/or generated by the processes of the devices and subsystems of the illustrative embodiments in one or more databases thereof.
All or a portion of the devices and subsystems of the illustrative embodiments can be conveniently implemented using one or more general purpose computer systems, microprocessors, digital signal processors, micro-controllers, and the like, programmed according to the teachings of the illustrative embodiments of the present inventions, as will be appreciated by those skilled in the computer and software arts. Appropriate software can be readily prepared by programmers of ordinary skill based on the teachings of the illustrative embodiments, as will be appreciated by those skilled in the software art. Further, the devices and subsystems of the illustrative embodiments can be implemented on the World Wide Web. In addition, the devices and subsystems of the illustrative embodiments can be implemented by the preparation of application-specific integrated circuits or by interconnecting an appropriate network of conventional component circuits, as will be appreciated by those skilled in the electrical art(s). Thus, the illustrative embodiments are not limited to any specific combination of hardware circuitry and/or software.
Stored on any one or on a combination of computer readable media, the illustrative embodiments of the present inventions can include software for controlling the devices and subsystems of the illustrative embodiments, for driving the devices and subsystems of the illustrative embodiments, for enabling the devices and subsystems of the illustrative embodiments to interact with a human user, and the like. Such software can include, but is not limited to, device drivers, firmware, operating systems, development tools, applications software, and the like. Such computer readable media further can include the computer program product of an embodiment of the present inventions for performing all or a portion (if processing is distributed) of the processing performed in implementing the inventions. Computer code devices of the illustrative embodiments of the present inventions can include any suitable interpretable or executable code mechanism, including but not limited to scripts, interpretable programs, dynamic link libraries (DLLs), Java classes and applets, complete executable programs, Common Object Request Broker Architecture (CORBA) objects, and the like. Moreover, parts of the processing of the illustrative embodiments of the present inventions can be distributed for better performance, reliability, cost, and the like.
As stated above, the devices and subsystems of the illustrative embodiments can include computer readable medium or memories for holding instructions programmed according to the teachings of the present inventions and for holding data structures, tables, records, and/or other data described herein. Computer readable medium can include any suitable medium that participates in providing instructions to a processor for execution. Such a medium can take many forms, including but not limited to, non-volatile media, volatile media, transmission media, and the like. Non-volatile media can include, for example, optical or magnetic disks, magneto-optical disks, and the like. Volatile media can include dynamic memories, and the like. Transmission media can include coaxial cables, copper wire, fiber optics, and the like. Transmission media also can take the form of acoustic, optical, electromagnetic waves, and the like, such as those generated during radio frequency (RF) communications, infrared (IR) data communications, and the like. Common forms of computer-readable media can include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, any other suitable magnetic medium, a CD-ROM, CDRW, DVD, any other suitable optical medium, punch cards, paper tape, optical mark sheets, any other suitable physical medium with patterns of holes or other optically recognizable indicia, a RAM, a PROM, an EPROM, a FLASH-EPROM, any other suitable memory chip or cartridge, a carrier wave or any other suitable medium from which a computer can read.
Accordingly, the computer implemented system, method and computer program product for employing drone descent and deactivation system, includes adjusting geolocation parameters, signal jamming and signal blocking or physical attack means, such as a hunter drone including countermeasures as a self-sacrificing directional explosive charge or electromagnetic pulse parameters, and the like.
While the present inventions have been described in connection with a number of illustrative embodiments, and implementations, the present inventions are not so limited, but rather cover various modifications, and equivalent arrangements, which fall within the purview of the appended claims.
The present invention is claims priority to U.S. Provisional Patent Application Ser. No. 62/984,976 of KERSEBOOM, entitled “DRONE TAKEOVER AND REDIRECTING SYSTEM AND METHOD EMPLOYING LANDING OF DRONES,” filed on 4 Mar. 2020, now pending, the entire disclosure of which is hereby incorporated by reference herein.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US21/20861 | 3/4/2021 | WO |
Number | Date | Country | |
---|---|---|---|
62984976 | Mar 2020 | US |