System for identifying drones

ABSTRACT

A system for identifying a drone is adapted to determine a base threat value for a drone. The system includes a scanning system, configured to obtain data that is stored in a pattern database. A timer that has a data structure for storing a counter initialized to a predetermined value, the timer being operable to iteratively increment the counter if the counter value is less than a timer increment. A microprocessor is programmed with instructions to receive information from the scanning system about the drone. Then, to store the information in a pattern database. After that, to determine a base threat value of the drone based on the information stored in the pattern database. Finally, to communicate the base threat value to a user so that the user can determine whether the drone is a friend or a foe.

RELATED APPLICATION

This application is a continuation of non-provisional patent application U.S. Ser. No. 15/048,911 filed on Feb. 19, 2016 which claims priority to provisional patent application U.S. Ser. No. 62/118,422 filed on Feb. 19, 2015, the entire contents of both applications is herein incorporated by reference.

BACKGROUND

The embodiments herein relate generally to systems for identifying whether a drone is a friend or a foe. Prior to embodiments of the disclosed invention, IFF systems used a two-channel system, with one frequency (1030 megahertz) used for the interrogating signals and another (1090 megahertz) for the reply. However, this system has not kept up with the proliferation of drone technology in the United States. Recreational and industrial drones were becoming prolific. While most of these drones are used for legitimate purposes, some were not. For example, drones were being used to spy on celebrities, industrial espionage, transporting weapons to inmates, and many other nefarious purposes. Embodiments of the disclosed invention solve this problem.

SUMMARY

A system for identifying a drone is adapted to determine a base threat value for a drone. The system includes a scanning system, configured to obtain data that is stored in a pattern database. A timer that has a data structure for storing a counter initialized to a predetermined value, the timer being operable to iteratively increment the counter if the counter value is less than a timer increment. A microprocessor is programmed with instructions to receive information from the scanning system about the drone. Then, to store the information in a pattern database. After that, to determine a base threat value of the drone based on the information stored in the pattern database. Finally, to communicate the base threat value to a user so that the user can determine whether the drone is a friend or a foe.

In some embodiments, a threat entry log can be communicatively coupled to the microprocessor. The scanning system further comprises a radio frequency detection system that searches for a radio frequency that is within a radio frequency threat entry range. The radio frequency can be recorded in the threat entry log for the drone.

In some embodiments, the scanning system further comprises a video and thermal imaging detection system that searches for a video and thermal image that is within an image frequency threat entry range. The video and thermal image is recorded in the threat entry log for the drone.

In some embodiments, the scanning system further comprises an active and passive radar detection system that searches for a radar that is within a radar frequency threat entry range. The radar is recorded in the threat entry log for the drone.

In some embodiments, the scanning system further comprises a lidar detection system that searches for lidar that is within a lidar threat entry range. The lidar can be recorded in the lidar entry log for the drone.

In some embodiments, the scanning system further comprises an audio detection system that searches for an audio signal that is within an audio frequency threat entry range. The audio signal can be recorded in the threat entry log for the drone.

In some embodiments, the microprocessor can be further programmed to receive identifying information from a transponder on the drone and use the identifying information to update the base threat level of the drone. In some embodiments, the microprocessor can be further programmed to determine positioning information from the drone and use the positioning information to update the base threat level of the drone. In some embodiments, the microprocessor can be further programmed to determine relative motion information from the drone and use the relative motion information to update the base threat level on the drone. In some embodiments, the microprocessor can be further programmed to determine signal strength from the drone and use the signal strength information to update the base threat level on the drone.

BRIEF DESCRIPTION OF THE FIGURES

The detailed description of some embodiments of the invention is made below with reference to the accompanying figures, wherein like numerals represent corresponding parts of the figures.

FIG. 1 shows a flow chart of one embodiment of the present invention;

FIG. 2 shows a flow chart of one embodiment of the present invention; and

FIG. 3 shows a schematic of one embodiment of the present invention.

DETAILED DESCRIPTION OF CERTAIN EMBODIMENTS

By way of example, and referring to FIG. 1, one embodiment of the system for identifying a drone 10 comprises a scanning system 12. Scanning system 12 further comprises radio frequency detection system 14, video and thermal imaging detection system 16, active and passive radar detection system 18, lidar detection system 20 and audio detection system 22.

While the system is operating during each time interval, radio frequency detection system 14 searches for a radio frequency that is within a radio frequency threat entry range. If so, then that frequency is recorded in threat entry log 24 for the source of the radio frequency.

While the system is operating during each time interval video and thermal imaging detection system 16 searches for a thermal image or a video image that is within an image threat entry range. If so, then that image is recorded in threat entry log 24 for the source of the image.

While the system is operating during each time interval, active and passive radar detection system 18 searches for a radar signal that is within a radar threat entry range. If so, then that radar signal is recorded in threat entry log 24 for the source of the radar.

While the system is operating during each time interval, lidar detection system 20 searches for a lidar signal that is within a lidar threat entry range. If so, then that lidar signal is recorded in threat entry log 24 for the source of the lidar.

While the system is operating during each time interval, audio detection system 24 searches for an audio signal that is within an audio threat entry range. If so, then that audio signal is recorded in threat entry log 24 for the source of the audio.

System for identifying a drone 10 then takes the entries in threat log entry 24 and makes a threat level assessment 26. The process then iterates at step 28 and the next time interval makes a new threat level assessment 26.

Turning to FIG. 2, threat level assignment 26 is recursively updated in the following manner. The threat log entry 24 is compared with entries in pattern database 28. If the pattern is recognized at step 30 and registered as a friend at step 32 then the friend is logged in an activity log 34. From there the process iterates at step 28.

If the pattern is recognized at step 30 and not registered as a friend at step 32, then system for identifying a drone 10 assigns base threat value 36 based on the sensor type used to make the threat entry. Base threat value 36 is then stored into pattern database 28. If pattern is not recognized at step 30, on once the base threat value 36 is then stored into pattern database, system for identifying a drone 10 determines if the drone has a transponder at step 38. If so, system for identifying a drone 10 determines if the drone has identifying information available at step 40.

If identifying information is available at step 40 then that identifying information is added into pattern database 28. Next, system for identifying a drone 10 determines if positioning information is available at step 42. If so that information is added to the base threat value 36.

If positioning information is not available at step 42, then system for identifying a drone 10 determines if relative motion information is available at step 44. If so that information is added to the base threat value 36.

If relative motion information is not available at step 44, then system for identifying a drone 10 determines if signal strength information is available at step 46. If so that information is added to the base threat value 36.

The base threat value is then communicated to a user at step 48. Following that the base threat value is logged in an activity log 34.

As used in this application, the term “a” or “an” means “at least one” or “one or more.”

As used in this application, the term “about” or “approximately” refers to a range of values within plus or minus 10% of the specified number.

As used in this application, the term “substantially” means that the actual value is within about 10% of the actual desired value, particularly within about 5% of the actual desired value and especially within about 1% of the actual desired value of any variable, element or limit set forth herein.

All references throughout this application, for example patent documents including issued or granted patents or equivalents, patent application publications, and non-patent literature documents or other source material, are hereby incorporated by reference herein in their entireties, as though individually incorporated by reference, to the extent each reference is at least partially not inconsistent with the disclosure in the present application (for example, a reference that is partially inconsistent is incorporated by reference except for the partially inconsistent portion of the reference).

A portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever.

Any element in a claim that does not explicitly state “means for” performing a specified function, or “step for” performing a specified function, is not to be interpreted as a “means” or “step” clause as specified in 35 U.S.C. § 112, ¶ 6. In particular, any use of “step of” in the claims is not intended to invoke the provision of 35 U.S.C. § 112, ¶ 6.

Persons of ordinary skill in the art may appreciate that numerous design configurations may be possible to enjoy the functional benefits of the inventive systems. Thus, given the wide variety of configurations and arrangements of embodiments of the present invention the scope of the invention is reflected by the breadth of the claims below rather than narrowed by the embodiments described above. 

What is claimed is:
 1. A system for identifying a drone is adapted to determine a threat value for a drone; the system comprising: a scanning system, wherein the scanning system obtains data; a timer; the timer having a data structure for storing a counter initialized to a predetermined value, the timer being operable to iteratively increment the counter if the counter value is less than a predetermined value; a microprocessor, programmed with instructions to: receive information from the scanning system about the drone; store the information; determine the threat value of the drone based on the information stored communicating the threat value; and start the counter and perform the following instructions in a loop until the predetermined value is reached: receiving additional information about the drone; calculating an updated threat level based on the additional information increment the counter value.
 2. The system for identifying a drone of claim 1, further comprising a threat entry log, communicatively coupled to the microprocessor.
 3. The system for identifying a drone of claim 1, wherein the scanning system further comprises a radio frequency detection system that searches for a radio frequency that is within a radio frequency threat range; wherein the radio frequency is recorded.
 4. The system for identifying a drone of claim 1, wherein the scanning system further comprises at least one member selected from the detection set consisting of: a video imaging detection system and thermal imaging detection system.
 5. The system for identifying a drone of claim 1, wherein the scanning system further comprises a system selected from at least one member of a system set consisting of: an active radar detection system and a passive radar detection system; wherein the at least one member searches for a radar that is within a radar frequency threat entry range.
 6. The system for identifying a drone of claim 1, wherein the scanning system further comprises a lidar detection system which is selected from one member of a lidar set consisting of: an incoherent detection method search and a coherent detection method search that searches for lidar that is within a threat entry range.
 7. The system for identifying a drone of claim 1, further comprising: wherein the scanning system further comprises an audio detection system that searches for an audio signal that is within an audio frequency threat entry range.
 8. The system for identifying a drone of claim 1, wherein the microprocessor is further programmed to receive identifying information from a transponder on the drone and use the identifying information to update the threat value of the drone.
 9. The system for identifying a drone of claim 1, wherein the microprocessor is further programmed to determine positioning information from the drone and use the positioning information to update the threat value of the drone.
 10. The system for identifying a drone of claim 1, wherein the microprocessor is further programmed to determine a signal strength from the drone and use the signal strength to update the threat value on the drone. 