Apparatus, system and method for aircraft security and anti-hijacking intervention
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
B64C-000/00
G05D-001/00
G05D-003/00
출원번호
US-0894253
(2004-07-19)
등록번호
US-7376494
(2008-05-20)
발명자
/ 주소
Arnouse,Michael
출원인 / 주소
Arnouse,Michael
대리인 / 주소
DLA Piper US LLP
인용정보
피인용 횟수 :
5인용 특허 :
19
초록▼
A security mechanism identifies users, so as to restrict access and operation to authorized users, such as to persons authorized to access and fly a particular aircraft. The security mechanism comprises one or more security devices to identify the user attempting to gain access or operate the contro
A security mechanism identifies users, so as to restrict access and operation to authorized users, such as to persons authorized to access and fly a particular aircraft. The security mechanism comprises one or more security devices to identify the user attempting to gain access or operate the controller; and one or more monitoring devices to determine whether or not the user identified is authorized to have access or operate the controller. Methods of safely operating aircraft are also described. The methods include protocols for limiting access to the aircraft and assuming remote control of the aircraft if a possibly hostile situation is detected.
대표청구항▼
What is claimed is: 1. A method of operating an aircraft in which access is limited and automated or remote control can be assumed in the event of a possibly hostile situation, the method comprising the steps of: maintaining a first database having identity and associated biometric information rela
What is claimed is: 1. A method of operating an aircraft in which access is limited and automated or remote control can be assumed in the event of a possibly hostile situation, the method comprising the steps of: maintaining a first database having identity and associated biometric information relating to crew members and with each crew member having a particular authorization according to the category of crew member; downloading a subset of information from the database to the aircraft, the subset consisting essentially of information relating to crew members that are assigned to the aircraft for a particular flight; reading biometric information of an individual requesting access to the aircraft; comparing the biometric information read from the individual requesting aircraft access to the crew member information downloaded to the aircraft to determine if there is a match; if a match is determined, granting the individual access to the aircraft; downloading a second subset of information from the database to a point of access to a tarmac on which the aircraft is found, the second subset consisting essentially of information relating to ground crew members that are assigned to a particular aircraft on the tarmac; reading biometric information of an individual requesting access to the tarmac; comparing the biometric information read from the individual requesting tarmac access to the ground crew information downloaded to the point of access to determine if there is a match; if a match is determined, granting access to the tarmac to the individual requesting tarmac access; substantially continuously reading biometric information of an individual attempting to directly control the flight of the aircraft, by way of biometric sensors placed on those aircraft controls that are responsible for controlling the flight of the aircraft; substantially continuously comparing the biometric information read from the individual attempting to directly control the flight of the aircraft to the crew member information downloaded to the aircraft to determine if the individual is authorized to directly control the flight of the aircraft; if the individual attempting to directly control the flight of the aircraft is determined to be authorized, granting the individual permission to directly control the flight of the aircraft; if the individual attempting to directly control the flight of the aircraft is determined to be unauthorized, locking out the individual from directly controlling the flight of the aircraft, and engaging an autopilot located on the aircraft to take over control of the aircraft during flight; maintaining a second database having information relating to prohibited airspace; inputting flight plan information into a monitoring system; calculating acceptable deviation tolerances of the flight plan with respect to prohibited airspace information; if a deviation from the flight plan occurs, assessing whether a possibly hostile situation exists via: (i) assessing, from the ground or other location remote from the aircraft, the state of control of the aircraft by monitoring at least one indicator from the group consisting of: automated communications received from the aircraft, voice communications from the aircraft, a video signal from a cockpit camera on the aircraft, and aircraft position and course information; (ii) determining whether the aircraft is proximate to or on course to violate prohibited airspace; and (iii) determining whether a violation of prohibited airspace is imminent by assessing whether an aircraft vector is directed at a potential terrorist target or whether the aircraft altitude is below a pre-determined flight floor limit; and if a potentially hostile situation cannot be ruled out within a reasonable time, assuming control of the aircraft by (i) remotely controlling the aircraft from the ground or other location remote from the aircraft, or (ii) engaging an automated control unit on the aircraft to execute a pre-programmed flight path or contingency protocol that contradicts the modification. 2. The method of claim 1 wherein the step of maintaining the database comprises the step of providing a central system for recording the identity and associated biometric information, the central system being capable of accepting and transmitting the information. 3. The method of claim 2 wherein the maintaining step further comprises the step of enrolling staff by capturing biometric information for new crew members and loading the biometric information into the central system. 4. The method of claim 3 wherein, if a match is not determined during the comparing step, the method further comprises repeating the step of reading biometric information of the individual requesting access to the aircraft a pre-selected number of times. 5. The method of claim 4 wherein, if a match is not determined during the comparing step after repeating the step of reading biometric information of the individual requesting access to the aircraft a pre-selected number of times, the method further comprises the steps of considering the individual to be potentially hostile and implementing security procedures. 6. The method of claim 5 wherein, if a match is not determined during the comparing step after repeating the step of reading biometric information of the individual requesting access to the aircraft a pre-selected number of times, the method further comprises the step of recording the individual's biometric information and providing the biometric information to security personnel or other authority. 7. The method of claim 1 further comprising the step of determining whether or not there is adequate time to notify ground control of the desired modification prior to deviating from the flight plan. 8. The method of claim 7 wherein, if there is not adequate time to notify ground control of the desired modification, the step of assessing whether a possibly hostile situation exists comprises the steps of: determining if the deviation is outside of acceptable deviation tolerance; and (i) if the deviation is outside of acceptable deviation tolerance, declaring an alarm condition, and (ii) if the deviation is not outside of acceptable deviation tolerance, continuing flight operations. 9. The method of claim 1 further comprising, if the state of control of the aircraft is not found to be acceptable, the steps of: declaring an alarm condition; on the ground or other location remote from the aircraft, substantially continuously monitoring the video signal from the cockpit camera or other monitoring device on the aircraft; and preparing to assume control of the aircraft from the ground or other location remote from the aircraft. 10. The method of claim 9 further comprising the step of assuming control of the aircraft from the ground or other location remote from the aircraft if (i) evidence of hostile activity on board the aircraft is detected, or (ii) the elapsed time of substantially continuously monitoring the cockpit camera or other monitoring device exceeds a pre-selected threshold time without ruling out the possibility of hostile activity. 11. The method of claim 7 further comprising, if an authorized pilot is not at a controller of the aircraft, the steps of declaring an alarm condition; on the ground or other location remote from the aircraft, substantially continuously monitoring a video signal from the cockpit camera or other monitoring device on the aircraft; and preparing to assume control of the aircraft from the ground. 12. The method of claim 11 further comprising the step of assuming control of the aircraft from the ground or other location remote from the aircraft if (i) evidence of a hostile situation on board the aircraft is detected, or (ii) the elapsed time of substantially continuously monitoring the cockpit camera or other monitoring device exceeds a pre-selected threshold time without ruling out the possibility of hostile activity. 13. The method of claim 8 wherein, if the deviation is outside of acceptable deviation tolerance, the step of assessing whether a possibly hostile situation exists further comprises the step of: from the ground or other location remote from the aircraft, determining the state of control of the aircraft by monitoring automated communications received from the aircraft, listening to voice communications from the aircraft, or monitoring a video signal from a cockpit camera on the aircraft. 14. The method of claim 13 further comprising, if the state of control of the aircraft is not found to be acceptable, the steps of: declaring a second alarm condition; on the ground or other location remote from the aircraft, substantially continuously monitoring the video signal from the cockpit camera or other monitoring device on the aircraft; and preparing to assume control of the aircraft from the ground. 15. The method of claim 14 further comprising the step of assuming control of the aircraft from the ground or other location remote from the aircraft if (i) evidence of a hostile situation on board the aircraft is detected, or (ii) the elapsed time of substantially continuously monitoring the cockpit camera or other monitoring device exceeds a pre-selected threshold time without ruling out the possibility of hostile activity. 16. An apparatus for limiting access to an aircraft and for operating the aircraft in which automated or remote control can be assumed in the event of a possibly hostile situation, the apparatus comprising: a database having identity and associated biometric information relating to crew members; means for downloading a subset of information from the database to the aircraft, the subset consisting essentially of information relating to crew members that are assigned to the aircraft for a particular flight; means for reading biometric information of an individual requesting access to the aircraft; means for comparing the biometric information read from the individual requesting access to the information downloaded to the aircraft to determine if there is a match; means for granting the individual access to the aircraft if a match is determined; means for downloading a second subset of information from the database to a point of access to a tarmac on which the aircraft is found, the second subset consisting essentially of information relating to around crew members that are assigned to a particular aircraft on the tarmac; means for reading biometric information of an individual requesting access to the tarmac; means for comparing the biometric information read from the individual requesting tarmac access to the ground crew information downloaded to the point of access to determine if there is a match; means for granting the individual access to the tarmac if a match is determined; means for substantially continuously reading biometric information of an individual attempting to directly control the flight of the aircraft; means for substantially continuously comparing the biometric information read from the individual attempting to directly control the flight of the aircraft to information downloaded to the aircraft to determine if the individual is authorized to directly control the flight of the aircraft; means for granting the individual permission to directly control the flight of the aircraft if the individual attempting to directly control the flight of the aircraft is determined to be authorized; means for locking out the individual from directly controlling the flight of the aircraft, and engaging an autopilot located on the aircraft to take over control of the aircraft during flight, if the individual attempting to directly control the flight of the aircraft is determined to be unauthorized; a monitoring system containing means for accessing a database having information relating to prohibited airspace, flight plan information and acceptable deviation tolerances relating to the flight plan with respect to the prohibited airspace information; means for assessing whether a possibly hostile situation exists, said means comprising: (i) means for assessing, from the ground or other location remote from the aircraft, the state of control of the aircraft by monitoring automated communications received from the aircraft, listening to voice communications from the aircraft, monitoring aircraft position and course information, or monitoring a video signal from a cockpit camera on the aircraft; (ii) means for determining whether the aircraft is proximate to or on course to violate prohibited airspace; and (iii) means for determining whether a violation of prohibited airspace is imminent via means for assessing whether an aircraft vector is directed at a potential terrorist target or whether the aircraft altitude is below a pre-determined flight floor limit; and means for assuming control of the aircraft if a potentially hostile situation cannot be ruled out within a time period following a deviation from the flight plan, wherein the means for assuming control comprises: (i) means for remotely controlling the aircraft from the ground or other location remote from the aircraft, or (ii) means for engaging an automated control unit on the aircraft to execute a pre-programmed flight path or contingency protocol that contradicts the deviation.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (19)
Orton, Kevin, Aircraft flight security system and method.
Pilley Harold R. (R.F.D. #1 ; Box 204 Deering NH 03244), Airport control/management system using GNSS-based methods and equipment for the control of surface and airborne traffic.
Hughes, Paul J.; Smith, Patrick W.; Nerheim, Magne H.; Markle, Ryan C.; Sheharri, Nache D.; Szakach, John F., Systems and methods for conditional use of a product.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.