The present subject matter relates to a system and method for secure communications and coordination with unmanned aerial vehicles and various stakeholders in the system.
Unmanned aerial vehicle, drone, systems have many stakeholders, each requiring differing interactions with the system. Drone operating companies need to instruct and track drone operations. Drone manufacturers may be able to prepare drones for operation in many respects prior to deployment by drone owners. Various other stakeholders have needs that are not being met by prior art systems. Insurance companies do not readily track drone operations. In many scenarios, administrative and enforcement agencies have difficulty maintaining accountability of drone and is the case we operators.
A stakeholder is a party that has an interest in a company or system or regime and can either affect or be affected by the business. Stakeholders can affect or be affected by the organization's actions, objectives and policies. Some examples of key stakeholders in the drone community are operators, owners, employees, federal, state, and local governmental agencies, shareholders, suppliers, service providers, and the community from which the regime draws its resources and receives its services. Stakeholders may be resolved into categories of users, governance, influencers, and providers.
The needs created by the exploding volume of drone flights have exceeded the capabilities of the prior art in many areas. These areas include establishing accountability of drone operators for compliance with airspace regulations, informing drone operators of restrictions in the drones airspace, secure communications, gathering information via sensors, and facilitating proper regulatory registrations and updates. There is a need for providing solutions that must meet the constraints inherent in aerial vehicles.
Noncompliance with airspace regulations causes dangerous incidents. In the case of many harmful or potentially disastrous incidents, authorities have had great difficulty in identifying the drone and the operator to whom the drone is registered. There is necessity to hold drone operators accountable for noncompliance with airspace regulations. According to the United States Federal Aviation Administration (FAA) reports of drones flying improperly or getting too close to other aircraft averaged 159 incidents per month from February through September 2016. Researchers at Virginia Tech's College of Engineering demonstrated in 2015 that an eight-pound quadcopter drone could rip apart a nine-foot-diameter engine in less than 1/200th of a second. In 2017, the FAA conducted a study based on computerized models. The study concluded that drones would cause more damage than birds of similar size because they contain metal parts. Significant damage to windshields, wings and tail surfaces was possible.
Stakeholders include companies that insure drone operations. They need actuarial data for calculating premiums. Tracking drone operations allows insurers to calculate risks. Therefore, unsafe operators would contribute to the cost of harm caused by their actions.
The FAA maintains restrictions for operation within a given airspace. Some regulations apply in general. Other regulations apply to airspace in the vicinity of special locations such as military bases and tall buildings. The restrictions are analogous to automobile regulations. The FAA provides regulations. Updates to regulations may comprise restrictions in view of special events. Updates could also comprise an exemption from a particular restriction. Beacons may provide information to drones on localized restrictions in order to update the drones' stored data.
As of 2016, the FAA said it wanted to modify normal regulatory requirements so it could more quickly adopt an automated system for approving low-level drone flights in restricted areas. The FAA receives thousands of requests per month for special flight authorizations. The agency has created what it calls the Low Altitude Authorization and Notification Capability, which takes five minutes for approval via computer instead of months. Authorization could be transmitted to a drone in real time and inform the drone operator of an exemption from airspace regulations.
Secure communications are a necessity. “Hacking” of drone communications could cause immense damage. Robustness of prior art systems could be improved. Drones have provided video and other data. Unexpected new data gathering capabilities via sensors are possible.
Drone registration is commonly achieved through communications by an individual directly with the FAA. It would be desirable to have a streamlined process for creating and updating registrations.
U.S. Pat. No. 9,646,502 discloses a system in which one of a plurality of UAVs may transmit its own identifying certificates and receive one or more identifying certificates from one or more individual UAVs operating in a common airspace. An identifying certificate may include a unique identification number associated with the UAV, such as a serial number; the owner and/or operator of the UAV, the UAV's license and issuer; validity dates, and a public key fingerprint. The UAV must operate in a mesh network and does not interact directly with a beacon. No manner of entering or updating identification information is disclosed.
United States Published Patent Application No. 20170011637 discloses a method and apparatus for generating and outputting dynamic variance reports for deviations of vehicle operations from programmed vehicle operations. The dynamic variance reports enable a vehicle operations scheduler to understand trends, patterns, or the like in variances between planned vehicle operations and actual vehicle operations. A complete report is not provided to a third-party used for processing by the third-party user's own algorithms.
United States Published Patent Application No. 20180088206 discloses methods and apparatus for accurately tracking a package and encrypting keys. Key management is achieved by transmission of encrypted signals. However, means are not disclosed for providing an encrypted memory for data at rest.
United States Published Patent Application No. 20180144124 discloses a path manager that exercises control by transmitting messages to the client that establishes privileges to systems paths through an authentication protocol. However, real time updating of privileges is not disclosed.
U.S. Pat. No. 9,984,260 discloses an IC tag issuing apparatus for writing identification data to IC tags, the IC tags arranged in multiple rows aligned as an IC tag continuous body. An IC tags issuing apparatus including second antenna units is arranged to face each row of the IC tags arranged in multiple rows. Data is not downloaded from a secure network.
Briefly stated, in accordance with the present subject matter, a novel system performing novel methods. A base station server commands and coordinates communication with and coordination between operations and requirements of various stakeholders. Some stakeholders need to command and regulate drone operations. Others need various forms of current and historical data of drone performance. Others may need to monitor drone operations in view of physical or legal constraints. The base station server provides identity and encryption tag information to drones and receives data from the drones. Data in transit between the drone and the base station is encrypted. Data at rest may be encrypted or decrypted. RFID tags for inclusion in drone electronics include microprocessors capable of encryption and decryption. The base station server may issue blocks of drone tag IDs, which a manufacturer may assign to individual drones. X-Y-Z coordinates are established for an initial drone position. As the drone is in flight, coordinates are updated by data from accelerometers. Further, storage of flight information comprises storing encrypted data. Providing dynamic positioning data is done without requiring the use of GPS. A record of the drones' flight path and velocities at selected points on the flight path are generated. Parameter sensors placed in the drone provide further data. The present system allows for previously unavailable dynamic control of operations and for selectable fashioning of data for various stakeholder requirements. The system provides hitherto unavailable flexibility and adaptability to meet the needs of all stakeholders in the drone community.
The present subject matter utilizes drone tags in a system to provide information not previously obtainable. Drone tags including encryption, communication, and processing circuitry are operated to interact with individual drone operators communicating with specific drones, subscribers, and with outside agencies on behalf of subscribers. One group of services is provided for a respective class of subscribers.
A consolidated information service is provided to subscribers. These subscribers are provided with usage information and flight records. These subscribers may use their own algorithms and data processing methods to derive information relevant to their interests. Another class of subscribers may comprise electronics manufacturers and drone assemblers. Preprogrammed blocks of identification numbers may be provided by a drone service company so that a subscriber may be preregistered with a services company when it receives delivery of new drones.
Types of stakeholders include drone service companies 100, governmental aviation control authorities 110, government law enforcement authorities 120, drone manufacturers 130, drone electronics manufacturers 140, drone owners 150, drone operators 160, and subscribers 170 One type of subscriber is an insurance company that needs to know how the drone operator 160 performs its tasks and also needs recorded evidence in the event of a drone mishap. Another type of subscriber is a drone owner 150 who wishes to have a record of the use of the drone including flight paths and conditions of operation.
Drone services companies 100 will customarily be housed in a base station 114. The base station 114 comprises a base station server 116 and a radio frequency communications unit 108. The base station server 116 comprises a base station server database 118. Subscribers include individuals or organizations that have a direct interest in drone operations.
The interactions and data to be provided may be a function of the requirements of each stakeholder 20. The present subject matter allows customization and modification of data inputs and outputs to meet the needs of various stakeholders 20. Selected forms of interaction for various stakeholders include:
service companies 100—operate a base station 114 to provide communication between a drone operating company and one or more drones, coordination and communication between selected stake holders, maintaining infrastructure, providing and maintaining a server to process data and control operation, providing and maintaining software to operate the system and components subsystems, and creating sets of information to serve unique needs of different stakeholders governmental aviation control authorities 110—obtain information on flight paths of drones, observe compliance with regulations, authorize or deny requested exceptions to airspace regulations
government law enforcement authorities 120—monitor flight paths of drones and enforce boundaries of restricted areas
drone manufacturers 130—provide drones with capability of carrying unique identification data, provide mechanical coupling between drones and drone electronics
drone electronics manufacturers 140—provide RFID tags and printed circuit boards for operation in accordance with system protocols
drone owners 150—track inventory of drones and collect evidence of actions by drone operators
drone operators 160—program operation of drones, maintain real time contact with drones and provide dynamic update
subscribers 170—obtain sets of data including actionable information to enable meaningful interaction with other stakeholders
Further forms of communications are used to enable interaction of entities in the system 1. A transceiver 240 couples entities to a beacon 261. A dedicated receiver 270 is provided for receiving data. The dedicated receiver 270 may be a standalone receiver or may be included in one or more of the entities discussed above. A portable interactive device 260 may also be used for communications. The typical portable interactive device 260 is a smart phone 280. The smart phone 280 communicates via a cell tower 284. The unique interactions provided by the present subject matter are discussed below. The drone 10 is operated in response to communications with entities 30 via a drone tag 410 described with respect to
This system 1 provides secure communication, data generation and data transfer, monitoring, and tracking between the drone 10 and the large number of entities 30 as required to fill predefined purposes. A first function is to provide secure communication between base station 114 and the drone 10. The base station 114 includes a transmitter-receiver 108. The transmitter-receiver 108 is tuned to communicate with a frequency to which a transceiver in the drone 10 is set. Other entities are set to provide and to respond to frequencies of entities 30 with which they will interact. One interaction comprises providing identity information for each drone 10. Identity information may be set up by the drone services company 100 to provide data formatted for use by each drone 10. The drone services company 100 may supply blocks of identity numbers to drone manufacturers 130 in order to allow the drone manufacturers 130 to provide drones 10 which are pre-identified. The drone services company 100 issues blocks of drone tag IDs from the base station server 116. A manufacturer 130 may assign individual ID tags to individual respective drones 10. A verification routine is provided between the base station server 116 and the RFID drone tag 410 (
A cloud server 204 is accessible via the Internet 50 to all entities 30. The cloud server 204 provides for cloud-based services and cloud-based storage.
The base station server 116 performs data processing, storage of information to be transmitted, and storage of information to be received. One range of data comprises identity information. Each drone participating in the system 1 has a drone identifier stored in a memory location in the base station server 116. Further, encryption information is provided for data in motion. The base station server 116 comprises a database 118 including locations storing encryption tag information. Each drone will have circuitry for generating a key and transmitting the key to the base station server 116. Encryption tag information includes a key. The key may be generated by the drone 10 in a manner further described below with respect to
A drone tag 410 is mounted in the drone 10. The drone tag 410 comprises an RFID tag 420 (
The drone tag memory includes storage for constraints, such as a flight plan, company operation policies, and other operating considerations. in the RFID drone tag 420 and selectively updating the flight plan. The method performed by the system comprises communicating from the base station 114 to a plurality of individual drone operators 160 each associated with a drone ID tag, receiving requests from the operators for permission to change flight parameters, forwarding the requests to a responsible authority, and returning any authorization to an operator. Forwarding the request, usually by the base station 114, comprises translating the request into a format for receipt by a cognizant governmental authority and monitoring communication and forwarding a response to the drone operator and wherein forwarding an authorization comprises sending flight commands to the drone. The base station server interacts with a plurality of drone operating companies to provide real time flight information to each drone operating company for use by said drone operating company in accordance with its own algorithms.
The drone tag 410 receives data and transmits the data via an encryption processor 474 (
In the present illustration, the drone 10 comprises a quadricopter 300. The quadricopter 300 comprises a central body 310 which includes operating hardware 400 further described with respect to
The drone tag 410 comprises an RFID tag 420 and further circuitry. Novel interactions in the printed circuit board 416 include data exchange between the sensor package 440 and the RFID tag 420. The sensor package 440 comprises accelerometers 442 which sense the motion of the drone 10. The system illustrates that the drone tag 410 comprises a location memory in a drone tag 428 for storing initial GPS coordinates, and all other current and preloaded data. The accelerometers 442 are condition-responsive sensors which provide data to the RFID tag 420 to update current position of the drone 10 in said drone memory 428. In this manner, updated information may be provided without the necessity of a GPS signal. Consequently, position information may be maintained at all times even if the GPS signal is lost.
The printed circuit board 416 includes a motor control circuit 430. A battery 436 is connected to the motor control circuit 430 to provide power for the electric motors. The battery 436 may also power other elements of the drone tag 410, as further illustrated in
The processing section 464 comprises an integrated circuit performing many functions. The components within the processing section 464 are illustrated as discrete components for purposes of description. Each processor comprises a microprocessor. Each microprocessor comprises memory. A processor 470 comprises a secure, encryption processor 474 and an open processor 476. The encryption processor 474 maintains encryption keys. The antenna 421 may be formed by vapor deposition. The circuit board 416 translates control signals to the motor control circuit 430. Power is provided from a battery 446. The battery 446 is coupled to the motor control circuit 430 and to the circuit board 416. A sensor package 441 provides condition-responsive information to the processing section 464. The sensor package 441 measures current parameters and updates condition-responsive data stored in the drone tag 410 during flight. Accelerometers 442 may be provided in the sensor package 441 and may update the position of the drone 10 in comparison to an initial position measured by GPS. An updated signal indicative of the new position is sent to the processor 476 for storage and for transmission to an entity 30. Transmission may be performed in response to a stored program in the processor 476. Transmission may also be performed in response to a query from an entity 30. Additional transducers and timers may also be provided.
The drone 10 communicates to the outside world via a communications module 486. Radio frequency communication is provided by a transceiver 488. Certain exchanges may be provided via modules 490 and 492 that accommodate cellular telephone signals and Bluetooth signals respectively, generally when the drone 10 is at or near a takeoff or landing location. The cellular module 490 allows communication with entities using portable interactive devices such as cell phones. The Bluetooth module 492 is preferably a Bluetooth Low Energy (BLE) module in order to reduce power consumption and yet maintain a similar communications range. The BLE protocol transmits small packets as compared to Bluetooth Classic. In accordance with the present subject matter, commands and information are arranged so that the high bandwidth capability of Bluetooth Classics is not required.
Field 612 may be provided to record the status and condition at various times. Status may include battery level, motion or non-motion, non-compliance with operating constraints and other conditions which may be selected by drone operators or programmers. Operating constraints may be stored in field 616. Operating constraints include maximum permissible speed, maximum or minimum altitude, and allowable distance from other objects, whether airborne or stationary. Field 620 comprises control management data. Data management is one function. The sensor package 441 is queried at a preselected rate. Higher frequency produces greater granularity. Lower frequency increases battery life. The control may also determine whether groups of data are transmitted at successive times or whether all information is stored and downloaded when a flight is complete. Management also comprises selecting the time when the drone 10 begins to gather data. For example, data gathering may be postponed until the time when the drone 10 reaches a preselected altitude.
A library field 624 may contain rules for operation. Rules for operation may be set by the drone owner 150, the drone services company 100 or other entities. The rules may include maximum length of time operation, permitted or restricted areas of operation, protocols for various functions and limits for various parameters such as speed airborne time. The library 624 may also comprise a regulations section to operating constraints or notice requirements of jurisdictions having cognizance over the drone operation. The library 624 may inform the operation field 616 of values of parameters to which to compare drone operation.
Fields are provided to each entity 30 as needed. A selection circuit 680 may query each of the fields 604 preselected data. The system comprises a selection circuit 680 for resolving data received from said drone tag 410 into separate fields of drone information and selection circuit 680. The selection circuit 680 comprises a matrix 684 defining fields of drone information for an entity. One dimension of the matrix 684 identifies entities. A second dimension identifies information fields. Selection of one entity 30 will define a set of information fields to be provided to or from the selected entity 30. For example, the entity comprising the operating services company 100 will require a great deal of information. This includes virtually all of the fields 602 through 624. A subscriber 170 comprising an insurance company may require history data and compliance with regulations data. A local governmental authority 110 and may require location data to determine if the drone 10 is within the jurisdiction of the local governmental authority 110 and if so, what results need to be generated. For example, the local governmental authority 110 could impose a fee on a drone operator for each takeoff and each landing within the jurisdiction of the local governmental authority 110. In one embodiment, all data is provided to the base station server 116. The matrix 684 is programmed into the database server 116 so that each entity is provided with access to required data. Each entity is enabled to receive selected fields of data. For purposes of description, the nodes at which the data is connected to a respective entity is referred to as an access port. The access ports deliver respective sets of fields to appropriate subscribers 170 and other entities 30.
A certification manager server 710 is used to perform an authentication routine and to generate certification criteria for the key pair in the drone tag 410. The certification manager server 710 can be included in the base station 114 or could comprise an outside cybersecurity service. The certification manager server 710 maybe coupled to the base station server 116 via the Internet 50. A data bus 712 couples data to and from a certification processor 716 which reads to and writes from a register 720. Data is exchanged between the certification processor 716 and a certification database 724. The base station server database 118 comprises a key data repository 722. The base station server 116 also acts as a key server 674.
In operation, the drone tag 410 imports a drone services company 100′s public key. The information exchanged between the certification manager server 710 and the drone tag 410 is stored in encrypted form and transmitted in encrypted form. Therefore, the private key is inaccessible except to an authorized user. It is not possible to extract or insert a private key into the data stream. The secure processor 474 (
Encrypted stored data in the drone tag 410 is transmitted in encrypted form to the key data repository 672. The data is not decrypted. It is stored in encrypted form. Therefore, if a hacker gains entry into the drone tag 410 or the key data repository 672, the hacker will only obtain encrypted data. Each drone tag 410 contains encrypted keys. The key server 674 manages symmetrical encryption keys and their transmission to subscribers 170.
In operation, two card keys are required to start data exchanges. The drone tag 410 confirms authentication with the base station server 116 . This arrangement provides for secure performance. More specifically, the drone tag 410 records flight information and then uploads data to the portable interactive device 260 at the end of a drone 10 flight. The drone tag 410 may also send frequent location updates during a flight. Communication with entities outside of the drone can be made via a portable interactive device before and after a drone flight. Data encrypted in the drone tag 410 may be transmitted to and read by the portable interactive device 260, e.g., a cell phone 280, or by the dedicated receiver 270. Data is transmitted via the Internet 50 to the drone services company 100. Authentication management to provide certification of a drone 10 by its identity is incorporated in the drone tag 410.
There are many forms of subscribers 170. Subscriber 170-1 is a drone delivery company that will keep track of the flights executed by its drone 10. Subscriber 170-2 is an insurance company. Using its own algorithms, the subscriber 170-2 uses the actual data to calculate the risk presented by the drone operator.
The IoT message forwarder 750 receives data via a firewall 720 of the drone services company 100. Data is provided to and from the firewall 720 via an API (application program interface). An input API servicer interface 730 receives input data and an API output servicer interface 732 provides output data. The API servicer interface 730 and 732 interact with an API servicer 740 in a non-routable network 770. A non-routable network 770 uses a communications protocol that contains only a device address and not a network address and provides network segregation. It does not incorporate an addressing scheme for sending data from one network to another. Network segregation is a common security technique to prevent security issues in one network affecting another. One example of a non-routable protocol is NetBIOS.
The drone services company 100 including base station server 116 exchanges information with the API servicer 740. A message processing server 760 communicates with the API servicer 740. An air gap 780 separates the non-routable network 770 from the API servicer interfaces 730 and 732.
A second field group 830 describes structure of a data packet 832. A data block 834 is followed by a data type block 836 along with a drone tag identification 838. A third field group 850 provides identity 852 of a peripheral device providing an information data block 854. A fourth field group 860 identifies data structures for communicating from the cloud data base to the portable interactive device 260. Cloud data block 864 includes a tag ID 866 and data 868. User information data block 872 includes a user ID field 874 and a data field 876.
Row (1) represents creation of a new account. A new account could take the form of a new subscriber 170. The subscriber 170 may log in via the portable interactive device 260. The new account may be dedicated to one particular drone 10 which will have a unique identifier. This information is stored in the drone information database and then transmitted to a third-party key server. The third-party key server creates a storage location for the new account and generates the key. Row (2) illustrates that the new account may log in at the portable interactive device. The new account is verified at the drone information database and at the key server. In row (3) the key server produces key information returned to the portable interactive device. User details are sent from the drone information database to the portable interactive device.
In the description in
In row (4) a new tag in a drone 10 will send information to the portable interactive device 260 via BLE. Information indicative of the content of the new tag is added to the drone information database. The key server adds the information and creates a new key. As seen in row (5) the key server sends the new key via the portable interactive device to memory in the secure processor 474 in the drone tag 410.
In operation, at row (6), data acquired is sent to the drone tag secure processor and is encrypted with the key and then stored in encrypted form. Row (7) illustrates stored encrypted data transmitted via the Internet to the drone information database. The data remains encrypted while in storage. As seen at row (8) data may be sent from the drone tag via BLE to the portable interactive device. As seen at row (9) data may be temporarily stored in the portable interactive device and then sent to the drone information database.
Line 24 represents login by a subscriber at cell 24. The key server verifies the subscriber and sends keys in protected form to the subscriber. At line 26, data is pushed or pulled with respect to the drone information database. The encrypted data is received by the subscriber. At cell 27 (i) data is decrypted and used by the subscriber.
At block 916, sensing operations begin. Depending on the assigned task, selected sensors in the sensor package 441 (
Operation proceeds to block 930 where the drone 10 continues to execute preprogrammed and received commands. Next at block 924, the drone tag processor 474 (
The RFID tag element 420 is for purposes of inventory tracking and easy identification of the drone tag unit. The RFID interface is not utilized in the communication of any collected data or transmit/receive of command data.
Collected data and general command communication is preferably performed by interfaces, such as Cellular service, Bluetooth, ZigBee, UHF, and other protocols in existence or which may be developed in the future.
It is not essential to have all elements described above in a drone tag.
A basic core drone tag 410 would be comprised of the following:
RFID tag 420 for identification of the tag and inventory control;
Processor, RAM memory, and Flash Memory or other persistent storage included in the processors such as 474 and 476;
Radio Communications module, Bluetooth, cellular, ZigBee, UHF, and the like;
Accelerometers 442, at least one, but generally a plurality;
Encryption decryption capability;
Secure storage for encryption decryption key(s) which may also perform the encryption decryption;
Interface to allow additional devices to be connected to the drone tag 410 for purposes of providing additional types of data gathering such as temperature or proximity of other entities as by radar;
Circuit board, flexible or rigid; and
Optional replaceable or rechargeable batteries.
The present invention includes various operations. The operations of the present invention may be performed by integrated hardware components. Distributed discrete components are shown for ease in illustration. Field programmable gate arrays (FPGAs) could be used to provide processors. Those skilled in the art will recognize that many forms of communication may be provided in accordance with the present teachings. The present subject matter enables a comprehensive approach to providing useful, individualized data packages or command packages to many different stakeholders having diverse data requirements.
This patent application claims priority to U.S. Provisional Patent Application Ser. No. 62/689,349 filed Jun. 25, 2018, which is incorporated herein by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
62689349 | Jun 2018 | US |