Presently, airborne drones have proliferated to assist humans, survey land and used for agriculture, used the movie industry, inspect power lines for utility companies, used for special and military operations, logistics, 3-d mapping, reconnaissance, research and development, news gathering, and the used for other industrial and commercial purposes.
Police drones are also deployed to improve public safety. A police application could in a multitude of scenarios: for instance, a suspect in a red car screeching to a halt outside an abandoned farmhouse with two police vehicles, in pursuit. The suspect makes off on foot, waving a large handgun in front of him. The officer launches a UAV, the drone hovers directly over the suspect, streaming images of the man from a high-definition camera down to a mobile computer screen. “I have a visual of the suspect,” an officer says into his radio device. “Positive ID of a gun in his right hand—proceed with caution.”
Another examples, could be putting a drone up over a crime or traffic accident scene to take digital photographs that might provide detectives with useful intelligence from an aerial perspective related to the threat of flooding from the Missouri River, which is an annual hazard in the region; UAV deployed to search for missing people—two victims of drowning and the third a person concussed in a car crash who wandered away from the scene in a daze; a search for two suspected criminals who had escaped from a local jail. The suspect runs into corn stalks eight feet high that made visibility on the ground impossible, and it would have taken a Swat team to hours to search it on foot. So instead they launched over the field, fitted out with a thermal-imaging device that could detect any live presence through body heat. The field was quickly traversed, and found to be empty—though the suspects were not there, the automated search freed up police officers to look elsewhere and the suspects were soon picked up in the surrounding area; an investigation into the rape of two students in their college apartment. Sheriffs wanted to test out a theory that the suspect had stalked his victims for some time, so they flew a drone outside the window of his apartment to show that he had a clear line of sight to the women's premises. The footage, taken by high-definition camera, was of high-enough quality that it could be presented in court as forensic evidence.
There are thousands of similar police (gov.) applications and commercial applications and “compliance”. It is understood by anyone familiar with the art, that the scope of this invention cannot possibly list a fraction of the applications. For the purpose of this UAVE, “compliance” means meeting operational and functional performance criteria and other requirements. Mandatory terms such as “must” are used only to ensure applicability of these particular methods of compliance when the acceptable means of compliance described are used by various government agencies. It is understood by anyone familiar with the art will understand that various regulatory compliance requirements or authorize deviations from regulatory requirements could be dynamically implemented for all UAVE systems.
The problem with the present police deployment and system is that no comprehensive standard, system for UAV apprehension and disablement. HR 658 on UAV and UAS drones includes speed limitations, weight limitations and other FAA airspace requirements. Bills, governmental regulations and the FAA's intent in road-mapping guidelines for public safety against the wrongful or criminal of UAVs is a true reality and should be implemented as soon as possible. However, practical application of apprehending and disabling unlawful drones must be resolved through invention not legislation. The present invention enables law enforcement and emergency responders with mechanisms and tools to detect, disable, disarm, apprehend, detain, capture and hold harmless UAV(s) who have violated or is suspected to violate, harm and injure citizens and endanger public safety.
An unmanned aerial vehicle (UAV), commonly known as a drone and also referred to as an unpiloted aerial vehicle and a remotely piloted aircraft (RPA) by the International Civil Aviation Organization (ICAO), is an aircraft without a human pilot aboard. ICAO classifies unmanned aircraft into two types under Circular 328 AN/190:
The present disclosure relates to a smart dynamic database which interfaces a plurality of UAVE designs and functions. For example, the UAVE being designed to travel at high-speeds, hover at great altitudes, travel long distances without recharge, withstand harsh winds and weather conditions, others designed to carry heavy payloads, others with sophisticated sensors and communication technologies or a combination of one or more components. One important embodiment of the invention, the invention includes is not limited to for example, the ability of the UAVE system to automatically:
The term “interception” could be defined as the point or coordinate at which a line, curve, surface, airspace, grid intersects a coordinate axis (XY or XYZ); to include or bound (a part of a space or curve) between points or lines. The UAVE could intercept another UAV's communication, flight record, radio transmission etc., in order to prevent a UAV from functioning, traveling, communicating or having access of GPS travel routes. In one embodiment of the invention, the UAVE system could interfere when required with the UAV's GPS coordinate and positioning. In other words, the UAVE system would allow authorized agents or personnel to alter the UAV's GPS coordinates for example, to another GPS coordinate. In another embodiment UAVE could take, seize, or halt a UAV or a UAV on the way from one place to another and cut off one or more UAVs from an intended destination.
The UAVE system's functions could include but is not limited to the following examples:
The UAVE system could include any type of sensor or equipment, including but not limited to gyroscopes, motion detection, chemical, thermal (night vision), high-definition video and audio, x-ray, radar, heat, lumens, GPRS, mechanical, electrical, software, control system, software, mapping, programming, automation or manual controls, a plurality of mobile devices, links, Internet access and sites, communication and transmission devices, etc.
The UAVE system could be capable of reading any FAA required registration signal installed on any UAV if required by the law. For example, the scope of this invention could include legislation which requires some or all UAV's register information in regards to the owner of the vehicle, usage, coordinates and flight path(s), communication etc., exemplified by the following hypothetical FAA registration process Table 1:
Table 1, describes a hypothetical FAA registration process. Anyone familiar with the art will understand that FAA laws, state laws and local governmental laws could have a multitude of reiterations. It is also understood by anyone familiar with the art that the advancement of UAV technologies could result in changes in FAA requirements and laws in order to enforce new aerial drone technologies. With that understanding in mind, the UAVE system could utilize any UAV technology for enforcement. The uniqueness of one embodiment of the invention is based on UAVE enforcement of various registered and unregistered UAVs. If the law does not require registration the UAVE system could still deploy, detect and disable, seize and enforce. The following exemplifies one embodiment of the invention indicated by:
Enforcement
I. Detection and Restrictions
In addition, UAVE used by enforcement could capture, gather and analyzes a multitude of Digital Data Identification Capture (DDIC) sources. GPS or AVL positioning and other inputs for the purpose of expeditious response by individual and or a plurality of autonomous or human control UAVE applications. In addition, the UAVE could in one embodiment interface mobile smart devices as well as can be accessed bi-directionally by all mobile devices or controlled and or managed by all mobile smart devices. UAVE could interface secure smart mobile devices as well as one or more control commands from various central stations or a combination of both. Traffic control and management network data capture implemented by federal, state, county and local government, red light enforcement cameras data capture, private security cameras data capture, public safety cameras placed in parks, downtown and municipal geographies, retail districts, school campuses, industrial parks, etc., inputs, UAV License Plate Recognition systems used by law enforcement on police vehicles to capture and analyze license plate data to identify known offenders, wanted persons, sex offenders, stolen vehicles, etc., inputs, Web cams data capture, Audio data capture, Thermal and night (other frequencies) vision data capture, Forensic UAV recognition data capture, RFID and other frequencies capture as exemplified by smart license plates and embedded vehicle tags data capture, Satellite imagery capture, Systems designed to track capture data from individuals or groups of persons, Systems designed to capture data from track livestock or other animals, vehicle tracking systems data capture, systems designed to capture and track payloads or specific items, vehicle recognition, drone airborne, amphibious, road vehicles data capture. Unmanned Public Safety Vehicles (UPSV) and or UAVE, unmanned mobile vehicles, multiple unmanned mobile vehicles, driver and passenger location, single or multiple route locators by UAV traffic, single or multiple route locators by vehicle traffic, single or multiple route locators by unmanned aerial traffic, single or multiple route locators, single or multiple route locators by unmanned rail traffic, single or multiple route locators by unmanned road vehicle traffic, gunshot and protection technology, Bomb blast technology, technology related to motion detector(s), alert tracking, UAV to UAV (vehicle to vehicle) operations. The invention could include smart wearable(s) and smart webcam(s), Nano technology, Other DDIC alerts and applications.
The UAVE system could decrease the time of both emergency and non-emergency response regarding the variables such as but not limited to:
UMVE data capture enabled by technological advances in communication networks, Internet and wireless data transfer speeds, combined with increases in server capacity, advances in digital photographic and video images and other technologies of digitized images, multitude of public and private sources, Images, video and other identification sources are generated from, large scale independent and networked systems as well as smaller “stand-alone” devices or networks.
DDIC descriptions, figures and definitions will be presented in the following embodiments: In addition, various wireless LAN controllers providing system-wide WLAN functions such as intrusion prevention, RF management, encryption, DDIC integrity, quality of service (QoS) and mobility could be used in the scope of the current invention. In addition, anyone familiar with the art would recognize that one or more databases, routers, servers, controllers, switches, etc., could be utilized when transmitting DDIC captured data through WAN/Internet configurations or that multiple, independent databases could be manually or dynamically combined for a specific application. A combination of one or more elements of DDIC ALERT could be utilized for any non-emergency or emergency situation and/or event. The DRMS system could also customize each alert in order to tailor the alert and or response to the need and to help prevent the loss of individual freedom, by erasing or clearing resolved situations which are not required for follow up or a court of law and proceedings. DDIC inputs and alerting could transpire in real-time or near-time depending on the severity, sources, number of inputs and need. Defines various sources of Digital Data Identification Capture (DDIC) and Bi-directional ALERTS derived from a plurality of sources. The captured data could be transmitted through both wireless and wireland means. Digital Relay management System (DRMS) could be defined as a communication management system, which could establish communication rules and standards for a plurality of various inputs, data feeders and sources. DDIC could obtain data through multiple inputs. DDIC inputs from a plurality of access points for the data and location-based services necessary for one or more Unmanned Vehicle(s) (UAVs).
In addition, monitoring and management software could be implemented in order to track a multitude of one or more UAV's NFC (RFID data inputs). Active RFID uses electromagnetic signals to uniquely distinguishes and identify a mobile “TAG” device or stationary TAG device. The active RFID identification system tag has its own power source enabling the unit to broadcast an identifying signal. This extends the range of the tags and capability of communicating advance data such as location and other pertinent information and broadcasts an identifying signal. Passive RFID tags are not powered and rely on active signals from location transmitters for their response. RSSI (Received Signal Strength Indication) is an algorithm that determines the location of an active tag by measuring the power of the radio signals or wireless communication outside of conventional WiFi such as but not limit to any and or air-grids. TDOA (Time Difference of Arrival) is an algorithm that determines the location of active tags by measuring the power of radio signals in real-time. Some RSSI systems have choke-point capabilities to provide an instantaneous notice that a tag passed a certain point.
The communication equipment connects to a main communication system of the cellular phone system through a various mean include but not limit to, a Mobile Telephone Switching Office (MTSO) or Mobile Switching Center (MSC). The phrase “public land mobile network (PLMN)” will be used to represent the entire mobile device communication network, regardless of the type of technology used in the communication network (e.g., GSM, GPRS, PCS, CDMA, UMTS, LIT etc.). The PLMN might typically control any base station with which it is in communication, and might handle connections from cellular tower to cellular tower and from a cellular tower to the normal land-based phone system. While the term “cell” or “cellular” is used herein to refer to a certain type of mobile device communication protocols, this term is used in its broadest sense to include other communications systems such as personal communications service (“PCS”) protocol, and the Global System for Mobile communications (“GSM”) protocol, or other similar communications protocols.
UAVE could interface cellular phones, switching cells and, thus, towers, as the phone is moved between geographic areas, allowing constant communication with the PLMN. UAVE(s) could control an interface all FAA data regarding but no limit to registration, detection and scanning, restriction and enforcement, etc. for all UAVs. Typically, a cellular phone, smart phone, satellite phone or any other type of handheld device has one or more codes associated with it, used to identify the specific phone, the phone's owner and the phone's service provider. In addition, nano demarcation particles, could be administered from an unmanned or manned squad vehicle to another vehicle in order to distinguish and track the vehicle or drone. The administration of nano particles could be through various methods, such as but not limited to a high pressured device attached to the front of the squad car and triggered robotically or manually. The nano “sprayed” car could be detected by infrared, and other wavelength spectrums and other devices such as for example, night vision. It is understood by anyone familiar with the art that nano particles could consist of any materials, formula or substance including a bonding material which permanently or temporarily adhere to a vehicle. When a DDIC readable device detects a vehicle which has been “sprayed” an alert could be sent to various mobile devices which could intercept the vehicle. A vehicle in this example could be any unmanned or manned motorized transportation entity.
A system of tracking UAV(s) or its registered agent could include one or more UAV(s) and its associated counterpart(s). UAV(s) could be integrated with an analytical or predictive software component to determine or estimate possible points of origin, routes of travel or proximity to a specific events or locations.
Given these concepts above, this Summary is provided to introduce a selection of embodiments in a simplified form that are further described below. This Summary is not intended to identify key features or essential features of any claimed subject matter, nor is it intended to be used to limit the scope of any claimed subject matter.
Described embodiments provide a system and method for capturing data from u sources, used for law enforcement, ERMT, governmental agencies, public health, and related emergency management organizations (UAVE) and/or commercial, individual, industrial or international UAV governance. The data could be captured watermarking the data, thus time stamping the data. In addition, the present invention could also be designed to perform “UA vehicle recognition” via video feeds in the same manner that “UAV recognition” software functions today. In another embodiment, smart technology, such as using a combination of active and passive RFID tags identifying information to be imbedded in a UA vehicles' license plate as well as the body of the vehicle. The UAVE system could provide emergency responders and or police with a multitude of information as previously described.
The systems proposed herein would be developed to harness and intelligently analyze the digital photo, audio, thermal, holographic magnetic resonance imaging, nano imaging, 3D imaging, nantomography and nanofabrication, high definition imaging and video information and other DDIC inputs from either the public and private sources mentioned above into a single or multiple databases based on location and function.
The information gathered from the DDIC inputs may be used to allow a manual response to an incident by a human user(s) or administrator(s) that receive input from the DDIC or an automated, networked or autonomous response by a specific technology (including, but not limited to robotic, unmanned vehicle (UV) and unmanned aerial vehicle (UAV) technology) or technologies that receive DDIC inputs.
Technically, the application potential for that data would be significant for a multitude of industries. A central computer integrating internal and external DDIC information databases with smart hierarchal protocols and methods could automate this activity with integrated software applications. DDIC data could run in real-time and be used as a repository of various Partner Location Servers, Location Appliances, Secure access and control servers and or wireless control systems designed for emergency or criminal response or other types of emergency and or non-emergency situations.
In addition, the system proposed herein will enable Public Safety Computer-aided Dispatch (CAD) systems and emergency response users using smartphone mobile and cellular devices which do not require voice 911 or voice emergency call centers but rather customizable emergency icons (such as gunman, assault, bomb threat, robbery etc.). The CAD system will be equipped with a software interface enabling the systems to read user based emergency alert information from smartphone devices. The user initiated alerts could be in the form of any robust type of information emulating from smart mobile devices and smart cellular devices as previously stated.
In another embodiment, the mobile/smart device could interface a multitude of sensors which identify one or more UAVs. The device could be triggered remotely by smart accessories, smart wearables and other devices. The unit could be remotely turned off, require a password, detect a different metabolism and other means of shutting off the device. In addition, the device when detecting another unauthorized user could automatically notify emergency responders. Emergency responders could track the device and or remotely turn the video and audio and other enriched data in stealth mode. This data in could be streamed to emergency responders enriched data to emergency personnel device in route and in process of apprehending the individual(s). Drone robots could be in a building or “campus”, “Campus” could be defined by any geographic territory, and could collect not only DDIC information but become a significant source of protection. Inside or on campus drone robots could be remotely guided to apprehend and or frighten the individual by bright lights, load sounds and other means. In addition, inside unmanned drones could be equipped with surveillance cameras, audio, and other technologies including but not limited to automated wireless guidance systems. The DDIC information from robotic drones could be integrated with all mobile devices and could integrate the DDIC information with defensive devices such as lockdown, sirens (voice commands) and other devices. In addition, mobile devices could be equipped with a Robotic Mobile Control System (RMCS) to override the computer system guiding the drone(s) depending on the type of situation, location and or emergency and or non-emergency. In addition, medical supplies and other equipment could be housed by the drone and delivered to the scene of the medical emergency and or non-emergency or situation. The RMCS system could include a one or more databases delivering medical instructions or a live expert or doctor who can visually (audibly) communicate through the drone device. The drone device in another embodiment could perform certain medical assistance or defensive assistance. Furthermore, the RMCS control system utilize all forms of commands including but limited to stealth commands from a mobile device or other secure demand from various authorized individuals.
Also for purposes of this description, the terms “couple,” “coupling,” “coupled,” “connect,” “connecting,” or “connected” refer to any manner known in the art or later developed in which energy is allowed to be transferred between two or more elements, and the interposition of one or more additional elements is contemplated, although not required. Conversely, the terms “directly coupled,” “directly connected,” etc., imply the absence of such additional elements. Signals and corresponding nodes or ports may be referred to by the same name and are interchangeable for purposes here.
It should be understood that the steps of the exemplary methods set forth herein are not necessarily required to be performed in the order described, and the order of the steps of such methods should be understood to be merely exemplary. Likewise, additional steps may be included in such methods, and certain steps may be omitted or combined, in methods consistent with various embodiments of the present invention.
As used herein in reference to an element and a standard, the term “compatible” means that the element communicates with other elements in a manner wholly or partially specified by the standard, and would be recognized by other elements as sufficiently capable of communicating with the other elements in the manner specified by the standard. The compatible element does not need to operate internally in a manner specified by the standard.
Also for purposes of this description, the terms “couple,” “coupling,” “coupled,” “connect,” “connecting,” or “connected” refer to any manner known in the art or later developed in which energy is allowed to be transferred between two or more elements, and the interposition of one or more additional elements is contemplated, although not required. Conversely, the terms “directly coupled,” “directly connected,” etc., imply the absence of such additional elements. Signals and corresponding nodes or ports may be referred to by the same name and are interchangeable for purposes here.
It will be further understood that various changes in the details, materials, and arrangements of the parts which have been described and illustrated in order to explain the nature of this invention may be made by those skilled in the art without departing from the scope of the invention as expressed in the claims to be filed upon the USPTO utility and International filing.
This application claims priority to U.S. provisional application No. 62/129,075, filed on Mar. 6, 2015, which is incorporated herein by reference as though fully set forth herein.