Authentication systems and methods for generating flight regulations
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G08G-005/00
B64C-039/02
G06F-009/445
G06F-017/30
G06F-021/31
G06F-021/44
H04L-029/08
출원번호
US-0215515
(2016-07-20)
등록번호
US-9805607
(2017-10-31)
발명자
/ 주소
Gong, Ming
Dai, Jin
Cui, Hao
Wang, Xiaodong
Huang, Han
Wu, Jun
Fan, Wei
Ma, Ning
Rong, Xinhua
Lin, Xingsen
출원인 / 주소
SZ DJI Technology Co., Ltd.
대리인 / 주소
Wilson Sonsini Goodrich & Rosati
인용정보
피인용 횟수 :
5인용 특허 :
32
초록▼
Systems and methods for UAV safety are provided. An authentication system may be used to confirm UAV and/or user identity and provide secured communications between users and UAVs. The UAVs may operate in accordance with a set of flight regulations. The set of flight regulations may be associated wi
Systems and methods for UAV safety are provided. An authentication system may be used to confirm UAV and/or user identity and provide secured communications between users and UAVs. The UAVs may operate in accordance with a set of flight regulations. The set of flight regulations may be associated with a geo-fencing device in the vicinity of the UAV.
대표청구항▼
1. A method of authenticating an unmanned aerial vehicle (UAV), said method comprising: receiving an authentication request from a UAV, wherein the authentication request comprises a UAV identifier;retrieving information that corresponds to the UAV identifier;generating authentication vectors based
1. A method of authenticating an unmanned aerial vehicle (UAV), said method comprising: receiving an authentication request from a UAV, wherein the authentication request comprises a UAV identifier;retrieving information that corresponds to the UAV identifier;generating authentication vectors based on the retrieved information, wherein the authentication vectors comprise at least an authentication token;transmitting the authentication token and a key evaluation reference to the UAV, wherein the UAV authenticates the authentication vector based on a message authentication code generated based on the authentication token, the key evaluation reference, and a key encoded on the UAV;receiving a response from the UAV, wherein the response is based on the key evaluation reference and the key encoded on the UAV; andverifying the authentication request based on the response received from the UAV. 2. The method of claim 1, wherein the authentication vectors further comprise an expected response. 3. The method of claim 2, wherein the authentication request is verified when the response received from the UAV matches the expected response. 4. The method of claim 2, wherein the expected response is calculated based on a key associated with the UAV identifier that is included in the retrieved information. 5. The method of claim 1, wherein the authentication vectors further comprise an encryption key and an integration-checking key. 6. The method of claim 5, wherein the encryption key and the integration-checking key are able to be calculated at the UAV based on the authentication token and the key evaluation reference. 7. The method of claim 5, further comprising providing the encryption key and the integration-checking key to an air control system. 8. The method of claim 7, further comprising establishing secure communications between the UAV and the air control system based on the encryption key and the integration-checking key. 9. The method of claim 8, wherein the encryption key is generated at the UAV and wherein the integration-checking key is provided by an authentication center to the air control system. 10. A system of authenticating an unmanned aerial vehicle (UAV), said system comprising: an authentication module;a communication module; andone or more processors operably coupled to the authentication module and the communication module and configured to individually or collectively: receive an authentication request from a UAV, wherein the authentication request comprises a UAV identifier;retrieve information that corresponds to the UAV identifier;generate authentication vectors based on the retrieved information, wherein the authentication vectors comprise at least an authentication token;transmit the authentication token and a key evaluation reference to the UAV, wherein the UAV authenticates the authentication vector based on a message authentication code generated based on the authentication token, the key evaluation reference, and a key encoded on the UAV;receive a response from the UAV, wherein the response is based on the key evaluation reference and the key encoded on the UAV; andverify the authentication request based on the response received from the UAV. 11. A method of authenticating an authentication center, said method comprising: providing an authentication request from a UAV to an authentication center, wherein the authentication request comprises a UAV identifier;receiving authentication vectors from the authentication center, wherein the authentication vectors comprise an authentication token and a key evaluation reference, and wherein the authentication token is generated based on retrieved information that corresponds to the UAV identifier;calculating an authentication sequence number based on the authentication token;generating an authentication key based on the key evaluation reference and a key encoded on the UAV;determining a message authentication code based on the authentication token, the authentication sequence number, and the authentication key; andauthenticating the authentication center based on at least one of the authentication sequence number and the message authentication code determined from the authentication vectors received from the authentication center. 12. The method of claim 11, wherein the authentication center is authenticated when the message authentication code matches an expected message authentication code generated based on the key encoded on the UAV. 13. The method of claim 11, wherein the authentication is unauthenticated when the authentication sequence number falls outside an acceptable range as determined by an authentication module. 14. The method of claim 11, wherein the authentication key is generated based on evaluation of a standardized reference number. 15. The method of claim 14, wherein the standardized reference number is a number of seconds that have passed since an agreed-upon point in time. 16. The method of claim 11, wherein the authentication key is generated based on a random number generated as an additional authentication vector and provided to the UAV. 17. The method of claim 11, wherein the authentication vectors further comprise an encryption key and an integration-checking key. 18. The method of claim 17, wherein the encryption key and the integration-checking key are able to be calculated at the UAV based on authentication token and the key evaluation reference. 19. The method of claim 17, further comprising providing the encryption key and the integration-checking key to an air control system. 20. The method of claim 19, further comprising establishing secure communications between the UAV and the air control system based on the encryption key and the integration-checking key.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (32)
Cline, Duane M.; Milkie, Thomas T., Acoustic airspace collision detection system.
Wood, Joanne E.; Hashimi, Jamil R.; Thourot, Fred G.; Johnson, Stephen P.; Goff, Russell W.; Carroll, Douglas, Apparatus and method for controlling an unmanned vehicle.
Sampigethaya, Radhakrishna G.; Li, Mingyan; Mitchell, Timothy M., Method and apparatus for authenticating information received at an airport surface wireless node.
Rennie, Richard W.; Truver, John P., Method and apparatus for monitoring the RF environment to prevent airborne radar false alarms that initiate evasive maneuvers, reactionary displays or actions.
Sills, Maxwell Andrew; Gordon, Robert Samuel; Wetherbee, Ian, Methods and systems for providing feedback based on information received from an aerial vehicle.
Duggan, David S.; Felio, David A.; Pate, Billy B.; Longhi, Vince R.; Petersen, Jerry L.; Bergee, Mark J., Multi-sensor autonomous control of unmanned aerial vehicles.
Bodin, William Kress; Redman, Jesse J. W.; Thorson, Derral C., Navigating a UAV under remote control and manual control with three dimensional flight depiction.
Sislak, David; Pechoucek, Michal; Volf, Premysl; Marik, Vladimir; Losiewicz, Paul, System and method for planning/replanning collision free flight plans in real or accelerated time.
Kokkeby, Kristen L.; Lutter, Robert P.; Munoz, Michael L.; Cathey, Frederick W.; Hilliard, David J.; Olson, Trevor L., System and methods for autonomous tracking and surveillance.
Mixdorf, Sheila; DeGroote, Curtis; Davis, Scott; Nichols, Brad, System for targeting messages to consumers based on determination of current ownership.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.