Unmanned aerial vehicle intrusion detection and countermeasures
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04W-012/12
H04L-027/00
H04L-027/26
H04L-012/26
H04W-012/06
H04L-029/06
H04L-029/08
출원번호
US-0102098
(2018-08-13)
등록번호
US-10237743
(2019-03-19)
발명자
/ 주소
Shattil, Steve
Sen, Robi
출원인 / 주소
Department 13, Inc.
대리인 / 주소
Shattil, Steven J
인용정보
피인용 횟수 :
0인용 특허 :
26
초록▼
A system deploys electronic countermeasures against unmanned aerial vehicles (UAVs) that are determined to be a threat. A radio transceiver coupled to at least one antenna detects if radio signals are being communicated between a remote control unit and a UAV. A mitigation engine communicatively cou
A system deploys electronic countermeasures against unmanned aerial vehicles (UAVs) that are determined to be a threat. A radio transceiver coupled to at least one antenna detects if radio signals are being communicated between a remote control unit and a UAV. A mitigation engine communicatively coupled to the radio transceiver synthesizes an exploit signal to be transmitted to the UAV, wherein the exploit signal is configured to inject commands into the UAV's navigation system. If the system determines that the UAV is operating in an autopilot mode, it transmits an induce-mode signal that causes the UAVs to switch to a communication mode so the UAV is responsive to the exploit signal.
대표청구항▼
1. An apparatus, comprising: a radio transceiver coupled to at least one antenna and configured to detect if radio signals are being communicated between a remote control unit and a remote-controlled vehicle, and to transmit signals to the remote-controlled vehicle; anda mitigation engine communicat
1. An apparatus, comprising: a radio transceiver coupled to at least one antenna and configured to detect if radio signals are being communicated between a remote control unit and a remote-controlled vehicle, and to transmit signals to the remote-controlled vehicle; anda mitigation engine communicatively coupled to the radio transceiver and configured to synthesize an exploit signal to be transmitted to the remote-control vehicle, the exploit signal configured to inject commands into the remote-controlled vehicle's navigation system;wherein, upon determining the remote-controlled vehicle is operating in an autopilot mode, transmitting an induce-mode signal to induce the remote-controlled vehicle to switch to a communication mode to cause the remote-controlled vehicle to be responsive to the exploit signal. 2. The apparatus recited in claim 1, further comprising a threat analyzer comprising at least one processor configured to determine if the remote-controlled vehicle is a threat based on remote-sensing data. 3. The apparatus recited in claim 1, further comprising a response analyzer configured to detect a response from the remote-controlled vehicle, the response comprising at least one of a radio transmission from the remote-controlled vehicle and a change in the remote-controlled vehicle's navigation, and the mitigation engine configured to adapt the exploit signal based on the response. 4. The apparatus recited in claim 1, further comprising a classifier comprising at least one processor coupled to a classification database and, responsive to sensor data, configured to classify the remote-controlled vehicle by at least one of manufacturer, model number, and operating system; and wherein the mitigation engine is responsive to classification of the remote-controlled vehicle for selecting at least one of the exploit signal and the induce-mode signal. 5. The apparatus recited in claim 1, wherein the mitigation engine is configured to employ information about the remote-controlled vehicle obtained from sensor data to generate at least one of the exploit signal and the induce-mode signal. 6. The apparatus recited in claim 1, wherein the mitigation engine is configured to employ machine learning to apply exploits against the remote-controlled vehicle, monitor responses of the remote-controlled vehicle to each exploit, and adapt the exploit signal. 7. The apparatus recited in claim 1, wherein the radio transceiver comprises a plurality of network edge devices, the mitigation engine comprises a plurality of processors in a central-processing configuration or a Cloud-computing configuration, and a fronthaul network communicatively couples the mitigation engine to the plurality of network edge devices. 8. The apparatus recited in claim 1, wherein the radio transceiver comprises a plurality of airborne radio transceivers. 9. An apparatus comprising at least one processor, memory in electronic communication with the processor, and instructions stored in the memory, the instructions executable by the at least one processor to: detect if radio signals are being communicated between a remote control unit and a remote-controlled vehicle;synthesize an exploit signal to be transmitted to the remote-controlled vehicle, the exploit signal configured to inject commands into the remote-controlled vehicle's navigation system; andupon determining the remote-controlled vehicle is operating in an autopilot mode, transmit an induce-mode signal to the remote-controlled vehicle to induce the remote-controlled vehicle to switch to a communication mode to cause the remote-controlled vehicle to be responsive to the exploit signal. 10. The apparatus recited in claim 9, further comprising instructions executable by the at least one processor to determine if the remote-controlled vehicle is a threat based on remote-sensing data. 11. The apparatus recited in claim 9, further comprising instructions executable by the at least one processor to: detect a response from the remote-controlled vehicle, the response comprising at least one of a radio transmission from the remote-controlled vehicle and a change in the remote-controlled vehicle's navigation; andadapt the exploit signal based on the response. 12. The apparatus recited in claim 9, further comprising instructions executable by the at least one processor to: responsive to sensor data, classify the remote-controlled vehicle by at least one of manufacturer, model number, and operating system; andresponsive to classification of the remote-controlled vehicle, select at least one of the exploit signal and the induce-mode signal. 13. The apparatus recited in claim 9, further comprising instructions executable by the at least one processor to employ information about the remote-controlled vehicle obtained from sensor data to generate at least one of the exploit signal and the induce-mode signal. 14. The apparatus recited in claim 9, wherein the instructions executable by the at least one processor are configured to employ machine learning to apply exploits against the remote-controlled vehicle, monitor responses of the remote-controlled vehicle to each exploit, and adapt the exploit signal. 15. The apparatus recited in claim 9, wherein the instructions to detect if radio signals are being communicated are executable by at least one processor residing on each of a plurality of network edge devices, and the instructions to synthesize the exploit signal are executable by a plurality of processors in a central-processing configuration or a Cloud-computing configuration. 16. The apparatus recited in claim 9, wherein the instructions to detect if radio signals are being communicated are executable by at least one processor residing on each of a plurality of airborne platforms. 17. A method, comprising: determining if radio signals are being communicated between a remote control unit and a remote-controlled vehicle;synthesizing an exploit signal to be transmitted to the remote-controlled vehicle, the exploit signal configured to inject commands into the remote-controlled vehicle's navigation system; andupon determining the remote-controlled vehicle is operating in an autopilot mode, transmitting an induce-mode signal to the remote-controlled vehicle to induce the remote-controlled vehicle to switch to a communication mode to cause the remote-controlled vehicle to be responsive to the exploit signal. 18. The method recited in claim 17, further comprising determining if the remote-controlled vehicle is a threat based on remote-sensing data. 19. The method recited in claim 17, further comprising: detecting a response from the remote-controlled vehicle, the response comprising at least one of a radio transmission from the remote-controlled vehicle and a change in the remote-controlled vehicle's navigation; andadapting the exploit signal based on the response. 20. The method recited in claim 17, further comprising: responsive to sensor data, classifying the remote-controlled vehicle by at least one of manufacturer, model number, and operating system; andresponsive to classification of the remote-controlled vehicle, selecting at least one of the exploit signal and the induce-mode signal. 21. The method recited in claim 17, further comprising employing information about the remote-controlled vehicle obtained from sensor data to generate at least one of the exploit signal and the induce-mode signal. 22. The method recited in claim 17, wherein machine learning is employed for at least one of synthesizing the exploit signal and adapting the induce-mode signal. 23. The method recited in claim 17, further comprising detecting the radio signals by a plurality of network edge devices, and wherein synthesizing the exploit signal is performed by a plurality of processors in a central-processing configuration or a Cloud-computing configuration. 24. The method recited in claim 17, further comprising detecting the radio signals by at least one processor residing on each of a plurality of airborne platforms.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (26)
Frolov, Sergey V.; Cyrus, Michael; Bruce, Allan J.; Moussouris, John Peter, Apparatus for distributed airborne wireless communications.
Duggan, David S.; Felio, David A.; Pate, Billy B.; Longhi, Vince R.; Petersen, Jerry L.; Bergee, Mark J., Autonomous control of unmanned aerial vehicles.
Frolov, Sergey V.; Cyrus, Michael; Bruce, Allan J.; Moussouris, John Peter, Methods and apparatus for a distributed airborne wireless communications fleet.
Rudnick, William Michael; Pun, Ngan-cheung; Clark, David; Datz, Charles Joseph, Mobile ad hoc network with dynamic TDMA slot assignments and related methods.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.