Method and system for utilizing jet engines to clear drones from airspace

ABSTRACT

A system and method that uses one or more jet engines to remove unmanned aircraft from restricted airspace. Generally, the force created by a jet engine can be used to remove drones or other unwanted objects from the restricted airspace. Once the system determines the presence of an unauthorized aircraft or object within the restricted airspace, the jet engine(s) can be activated and used to pull the drone or flying object towards the jet engine though the force created by the intake of the jet engine(s), or to expel the drone or object from the restricted area through the force created by the exhaust of the jet engine(s).

This application is a continuation of U.S. application Ser. No.17/846,843, filed Jun. 22, 2022, which is a continuation of U.S.application Ser. No. 17/134,313, filed Dec. 26, 2020, now U.S. Pat. No.11,378,361, which is a continuation of U.S. application Ser. No.15/908,017, filed Feb. 28, 2018, now U.S. Pat. No. 10,876,820, whichapplication claims the benefit of and priority to U.S. ProvisionalPatent Application Ser. No. 62/464,899, filed Feb. 28, 2017. Allapplications are incorporated by reference in their entireties for allpurposes.

BACKGROUND

A typical jet engine is a gas turbine, composed of a compressor, whichhas blades that spin rapidly. This draws in air and compresses it, whichconverts the air to a high-pressure gas. Fuel is then injected into thegas and ignited, increasing the gas's temperature and pressure. The gasthen flows through a turbine which extracts energy from the gas,lowering the gas's temperature and pressure. The turbine forces the gasout the back of the engine through a nozzle. This action decreasespressure, but increases the gas's velocity, creating thrust. The thrustcreated by a jet engine is what allows most jet aircraft to fly. Thus,jet engines create enormous amounts of force from both drawing air inthrough their intakes, and through expelling air out of the back of theengine through its exhaust.

Traditionally, drones were limited by price and technologicallimitations to military applications. As the drone industry hasdeveloped, the general public can now purchase a drone for recreationaland/or commercial use at affordable price points. The FAA expects thenumber of licensed drones to increase to 30,000 by 2020. The growth inunmanned aircraft has led to safety, privacy, and security concerns. Asnon-limiting examples of some of the security concerns, unmannedaircraft can be outfitted for nefarious purposes, or can accidentally beflown into restricted areas.

The disclosed embodiments are directed to the above problems.

SUMMARY OF THE DISCLOSURE

A system and method are disclosed that utilizes jet engine(s) to removeunmanned aircraft from restricted airspace. Generally, the force createdby a jet engine can be used to remove drones or unwanted objects fromrestricted airspace, preferably by pulling a drone or flying objecttowards a jet engine though the force created by the engine's intake, orby expelling the drone or object from the restricted area through theforce created by the jet engine's exhaust.

Non-limiting definitions that will be used in describing certainembodiments include:

3D Motion and Sound An electronic device that contains one or morecameras capable of Sensor identifying individual objects, people andmotion regardless of lighting conditions as well as one or moremicrophones to detect audio. The cameras can utilize technologiesincluding, but not limited to, color RGB, CMOS sensors, infraredprojectors and RF-modulated light. They may also contain microprocessorsand image sensors to detect and process information both sent out andreceived by the various cameras. The electronic device calculates ifthere has been a change in location of the drone or flying object ofinterest over a period of time. As a non-limiting example, a flyingobject can be at time Tl located at coordinates (x1, y1, z1) in apicture frame taken by the camera. At time T2 the same flying object iscaptured by the picture frame taken by the camera at coordinates (x2,y2, z2). Based on this information, motion, speed and direction can bederived utilizing the elapsed time and comparing the two 3D coordinatesover the elapsed time. As opposed to conventional motion sensors, whichuse captured motion to control a camera, the 3D Motion and Sound Sensorpreferably used with the method and system, uses the camera in order tocompute the motion. The size of the drone or flying object of interestcan also be computed and/or configures through software within the Senorand/or through software running, operating and/or controlling thecomputerized monitoring system. The camera/sensors are preferablycontinuously on at all times while the monitoring is occurring,regardless of whether the drone or flying object of interest is movingor not, so as to ensure that any movement will be automaticallycaptured, computer and/or monitored as it is occurring. Thus, thecamera/sensors “on” time is independent of whether the drone or flyingobject of interest is moving or not and does not require a triggeringevent to turn “on”. The camera preferably views the entire airspace or alarge portion of the airspace simply by its placement in a mannersufficient for the airspace to be visible to the camera. Though notlimiting, the defined airspace can be related to a security area, flightpath, restricted air space, or any other designated or assigned area.While “on”, the camera can record and/or transmit video and/or 3D depthdata to the other components of the system for analysis, processing andfurther actions. As the video camera is recording or otherwisetransmitting video and/or 3D depth data to the other system componentsat all times during monitoring, the electronic device is able toimmediately track, capture and/or record the monitored drone or flyingobject of interest at all times within the monitored area/airspace andwill be able to provide information regarding the activities of thedrone/flying object of interest while within the monitoredarea/airspace. Preferably the 3D Motion and Sound Sensor records,captures and/or streams video and/or 3D depth data. As video istechnically made up of individual picture frames (i.e. 30 frames persecond of video), the above reference to picture frames is referring toframes of video in a preferred embodiment. The 3D Motion and SoundSensor can be located within the area of the airspace or restrictedairspace being monitored and/or potentially just outside of the airspaceor restricted airspace while preferably allowing the restricted airspaceto still be properly monitored. The 3D Motion and Sound Sensor can beconnected to the computerized communication and computerized monitoringsystems via a data connection (TCP/IP or comparable technology). Thedescribed system and method can use more than one 3D Motion and SoundSensors and is not considered limited to any specific number of sensors.Computerized A computer system specially programmed and/or configured toMonitoring System monitor activity of the 3D Motion and Sound sensor(s).The computerized monitoring system can be located at any physicallocation so long as a data connection (TCP/IP or comparable technology)exists between the computerized monitoring system, the computerizedcommunication system, centralized monitoring station and the 3D motionand sound sensor(s). The computerized monitoring system preferably makesits determinations based on the data received by the video camerasensor(s)/3D Motion and Sound Sensor(s). Computerized A computer systemspecially programmed to facilitate communication Communication Systembetween an administrator and computerized monitoring system in the eventa drone or other unauthorized flying object enters a restricted airspaceor is determined to about to enter a restricted airspace. This systemmay include, but is not limited to, amplified speakers, microphones,lights, monitors, audio and/or visual alarms, computer terminals, mobilephones and/or other technologies to allow for the electroniccommunication and/or notification to take place. The computerizedcommunication system can also be located at any location so long as adata connection (TCP/IP or comparable technology) exists between thecomputerized monitoring system, the computerized communication system,centralized monitoring station and the 3D motion and sound sensor(s).Centralized Monitoring A computer system specially programmed and/orconfigured to Station receive video, audio and data streams from one ormore computerized monitoring systems, computerized communication systemsand/or 3D motion and sound sensors. The centralized monitoring stationwill process the information received from one or more computerizedmonitoring systems, computerized communication systems and/or 3D motionand sound sensors and can display the information in an organized mannerto an individual or group of individuals assigned to monitor theairspace. The centralized monitoring station can be located at anylocation so long as a data connection (TCP/IP or comparable technology)exists between the computerized monitoring systems, computerizedcommunication systems, centralized monitoring station and the 3D motionand sound sensors. Centralized Monitoring A computer display connectedto the centralized monitoring station, Primary Displayshowing/displaying video and/or transmitting audio of all restrictedairspace assigned for monitoring by the centralized monitoring station.Not all airspace need to be displayed at all times. Variousconfigurations can be programmed into the centralized monitoringstation. As non-limiting examples, the display can be change after acertain time period, in a rotating pattern, so that just one airspace isdisplayed at a time. Where a particular issue/event in a specificairspace is determined, the centralized monitoring station can causethat particular airspace to be displayed and remain displayed until theissue/event has been addressed (especially in an embodiment of thedisclosure where no separate alert display is provided). Otherconfigurations may also be used and all are considered within the scopeof the disclosure. Centralized Monitoring A computer display connectedto the centralized monitoring station, Alert Display showing video andaudio of any restricted airspace where a drone or other unauthorizedflying object has entered or about to enter the restricted airspace orother triggering event, preferably at the moment such determination ismade. System Database A computer database that electronically storesrecords of all alerts generated, confirmation requests, responses, andreconfirmation requests. Restricted Airspace An area of airspace inwhich those with authority over that airspace have determined that airtraffic must be restricted from access by unauthorized drones or otherflying objects or from other triggering events. Jet Engine An engine,generally a gas turbine, that produces thrust from a jet of hot gasesproduced by burning fuel in a combustion chamber. Jet engine in thiscontext includes gas turbine engines, turbojets, turbofans, rockets,ramjets, pulse jets, or other similar means of propulsion now developedor developed in the future. Drone An aircraft or other flying objectwithout a human pilot aboard. This may be remotely piloted or flyautonomously without a human controller. Access Terminal The physicalterminal where the computerized communication system can be accessed. Asa non-limiting example this may include a monitor, keyboard, mouse,and/or other peripherals used to manipulate or enter data into acomputerized system Wireless Receiver The device which detects signalsor transmissions (or the absence of signals) from a WirelessTransmitter. This device can measure the strength of a signal in orderto determine the proximity of a wireless transmitter. The wirelessreceiver can be in electrical communication with the computerizedmonitoring system or control system. Wireless Transmitter A device whichtransmits a code or signal unique to an authorized aircraft. The methodof transmission can include, but is not limited to, Bluetooth and otherlong or short-range frequencies transmission techniques now known orlater developed. Flying Object Any object capable of self-propelledflight or object launched from the ground on an upward trajectory.Administrator The individual or individuals who monitor or oversee thedrone removal system, and/or the individual or individuals who authorizeaccess to restricted airspace. Authentication Signal The code or signalbroadcasted by the wireless transmitter unique to an authorizedaircraft.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram/flow diagram of a preferred non-limitingembodiment for the drone or other flying object removal system inaccordance with the present disclosure;

FIG. 2 is a block diagram/flow diagram of a non-limiting centralizedmonitoring and alerting embodiment for the drone or other flying objectremoval system in accordance with the present disclosure;

FIG. 3 is an internal view of certain components of a representativenon-limiting example for a jet engine that can be used as part of thedrone or other flying object removal system in accordance with thepresent disclosure; and

FIG. 4 is a block diagram/flow diagram of a non-limiting wirelessidentification of permitted aircraft embodiment for the drone or otherflying object removal system in accordance with the present disclosure.

DETAILED DESCRIPTION

FIG. 1 shows the workflow for removing a drone from a restrictedairspace through the use of a jet engine in conjunction with 3D Motionand Sound sensors, and/or proximity sensors in accordance with onenon-limiting embodiment of the present disclosure.

At F1 a, a drone removal control system preferably comprises acomputerized monitoring and communication system in communication witheach other. The system can include a computer and its associatedperipherals through which a user has read/write access to a droneremoval control system. The computerized monitoring system allows a userto view data received from a drone detection system, input systemparameters, and manually control the drone removal system. In apreferred embodiment, the drone removal control system receives the rawdata from the proximity sensor(s) and/or 3D Motion and Sound sensor(s).The drone removal control system determines whether a drone or otherflying object has entered into restricted airspace by, in onenon-limiting embodiment, creating a configurable three-dimensional zoneor perimeter around a restricted area. The 3D Motion and Sound sensor(s)can be programmed to lock on the object entering the restricted area andsend back to the control system the 3D coordinates of the object and adigitalized outline of the object. The control system preferably usesinformation received from the 3D Motion and Sound sensor(s) to determineif the object is a drone, naturally occurring object (for non-limitingexample, a bird), or other object.

This captured video can also be stored and/or reviewed by the DroneRemoval Control System when the system makes its determination. Addingor focusing one or more additional 3D Motion and Sound sensors and/orproximity sensors outside of the restricted area also allows the systemto recognize whether an object is approaching the restricted area andallow more time for the Control System to monitor the object.

When the control system detects that an object has entered a restrictedarea, a record can be made and stored in the database and the audibleand/or visible alerts can be issued.

At F1 b, a Drone Detection System preferably comprises one or more 3DMotion and Sound sensor(s) and/or proximity sensor(s), which can bepreferably connected to the Control System via a data connection(wireless, wired, TCP/IP or comparable technology). The one or more 3DMotion and Sound sensors, and/or proximity sensors can be configured tomonitor an area for the presence of flying objects. The one or more 3DMotion and Sound sensors and/or proximity sensors can be configured torecognize and identify flying objects using identifiers such as size,airspeed, vehicle identification, distance between points on the object,shape of the object, etc. Alternatively, the object can be identified bymeans of creating a three-dimensional zone in the restricted area thoughthe software application or though the use of an electronic transmitterattached to an authorized aircraft. Once an object is identified by thecontrol system (or the sensors can be programmed with identifyingcapabilities) from the data received from the sensor(s), the software ofthe control system can automatically determine whether the object isauthorized in the area or not, and if the object is not authorized,activate the drone removal system.

At F1 c, data from the one or more 3D Motion and Sound sensor(s),proximity sensor(s), and video camera(s) can be sent to the controlsystem. The drone removal control system monitors whether any objectshave entered into the restricted airspace and if so can also determineif the object is authorized or unauthorized to be in the restrictedairspace.

At F1 d, the software determines whether a flying object, which can usethe same methods discussed in F1 b, has approached or entered thethree-dimensional restricted area. Data from the one or more“continuously on” 3D Motion and Sound sensors are sent to the controlsystem. The control system receives the raw data from the camera sensorand makes its determination based on such received raw data. The systemdetermines whether an object has entered a restricted area preferably bycreating a configurable three-dimensional zone or perimeter around thearea to be restricted. The 3D Motion and Sound sensor can be programmedto lock on an object approaching and/or entering the restricted area andcan send back to the computerized monitoring system the 3D coordinatesof object and video telemetry of the object. If there are no objects inthe restricted area, the control system continues to monitor therestricted airspace and the sensors remain continuously “on”.

At F1 e, the control system uses the information received from the 3DMotion and Sound Sensor to identify objects entering and/or approachingthe restricted area. The software can be programmed to recognize naturalobjects (as non-limiting examples: birds, leaves, squirrels, etc.)compared to man-made objects such as drones. Video of the object can becaptured and stored and/or reviewed by the Control System when thesystem makes its determination. Adding or focusing one or moreadditional 3D Motion and Sound Sensors and/or proximity sensor(s)outside of the restricted area allows the system to recognize that anobject is approaching the restricted area to permit more time for theSystem to monitor the object.

At F1 f, if the object can be identified by its visual, auditory, speed,or other characteristics, the system queries whether the object isauthorized to be in the restricted area. If the object is permitted tobe in the authorized area, the process can proceed to F1 j.

At F1 g, the control system can be configured to determine whatparameters an object must possess in order for the drone removal systemto be activated or employed. These parameters can be manually orautomatically set by the control system or programmed into the controlsystem. As a non-limiting, example, objects above or below a certainsize parameter or objects moving at a certain rate of speed could beexcluded from the system. If the object is not within the configurableparameters, the process can proceed to F1 j.

At F1 h, the control system then determines whether the object is inrange of the removal system. The software running on one or more of thecomponents of the control system can calculate the effective range ofthe removal system with the location and trajectory of the object. Ifthe object is not in range, or is not on course to enter the effectiverange of the removal system, the process can proceed to F1 j.

At F1 i, in some non-limiting embodiments, the drone removal system cancomprise one or more jet engine(s) and a noise abatement system. In somenon-limiting embodiments, the jet engine(s) can be affixed in place,while in others the jet engine(s) can be provided on a guided track orsimilar mount where it can be maneuvered into position to remove adetermined unauthorized drone or other object (preferably based on theestimated/calculated/anticipated trajectory or flight path of the flyingobject. In some non-limiting embodiments, the jet engine(s) can bedesigned to pull in an object out of the air through force created byits intake, while in other non-limiting embodiments, the jet engine(s)can be used to blow an object out of or prevent entry into therestricted area through the force created by the jet engine(s) exhaust.

When the drone removal system is activated or otherwise employed, thesystem can automatically determines the level of force necessary toexpel the object from the restricted area or can automatically activateto preprogrammed level of force. In some non-limiting drone removalembodiments, this expulsion can be accomplished through theactivation/use of one or more jet engines designed to pull the objectinto a capture device through the force created by air pulled into a jetengine's intake. In other non-limiting drone removal embodiments, thiscan be accomplished through activation/use of one or more jet enginesdesigned to push away objects through the force created by expelled airthrough the exhaust(s) of jet engine(s). In further non-limiting droneremoval embodiments, jet engine(s) can be maneuvered into place prior toactivation/use, and in other non-limiting embodiments jet engine(s) maybe permanently or semi-permanently mounted in place. The drone removalsystem can preferably adjust the amount of thrust created by the jetengines to respond to or based on the characteristics of the object tobe removed. Combination of jet engines, such as some using the jetengine's intake and others using the jet engine's exhaust can also beprovided and is also considered within the scope of the disclosure.

At F1 j, data from the proximity and/or 3D Sound and Motion sensors, aswell as any determinations, calculations, etc. performed by the controlsystem can be stored in the system database by the control system. Thesystem database can also be updated to reflect actions taken or nottaken and any other decisions automatically made or manually enteredinto the control system during the process. The system can also beprovided with the ability to provide audible and/or visible warningsadvising or alerting designated personal, the object itself (where ithas communication/intelligence capabilities) or the owner of the object(where determined) that the object is entering the restricted area.Notification can also be given that the object has failed to comply withthe communication from the control system. Notification can be broadcastthrough phone call, text messaging, speakerphone systems, email, audiblealerts, sirens, flashing lights, or other electronic means ofcommunication.

FIG. 2 shows the workflow for monitoring and alerting by the centralmonitoring & communication system regarding whether an unauthorizedflying object has entered into restricted airspace through the use of 3DMotion and Sound sensors.

At F2 a, one or more jet engines can be installed and are preferablylocated in and/or just outside the restricted airspace, though such isnot considered limiting and other locations can be also be selected andconsidered within the scope of the disclosure. These jet engines may bepermanently or semi-permanently mounted in place, or may be mounted on amoveable track or other device capable of maneuvering the jet engineinto position. 3D Motion and Sound sensors and/or proximity sensors canbe installed or focused in and/or just outside the restricted airspaceand connected to the computerized monitoring and communication systemsas described in FIG. 1 . Depending on the range of the sensor(s) theycan also be disposed at other locations that are also considered withinthe scope of the disclosure.

At F2 b, the video, audio and alert data can be sent to a centralizedmonitoring station where the data can be aggregated. In a preferredembodiment, the computerized monitoring system can receive the raw datafrom the sensors, runs all of the object recognition and identificationand then sends the audio, video and alert data to the centralizedmonitoring station.

At F2 c, all video, audio and alert feeds sent by the ComputerizedMonitoring & Communication Systems can be preferably electronically sentto the Centralized Monitoring Station. The centralized monitoringstation receives, processes and/or displays this data from the one moresensors/computerized monitoring systems. Similar to a grid of camerasbeing watched on a screen (i.e. where a plurality of camera feeds areviewed on a single screen), the centralized monitoring station canaggregate the various video feeds, as it receives and displaysinformation from multiple cameras. Preferably, the centralizedmonitoring station receives data at all times from the sensors to allowthe restricted airspace to be monitored whether or not a flying objecthas been detected within the restricted airspace.

At F2 d, all video, audio and alert feeds received by the centralizedmonitoring station can be displayed on the centralized monitoringprimary display. Alternatively, multiple centralized monitoring primarydisplays can be utilized based on the quantity of rooms/airspace to bemonitored at a given time.

At F2 e, when the centralized monitoring system receives an alert fromany of the computerized monitoring and communication systems indicatingthat an unauthorized flying object has entered the restricted airspace,the video, audio and alert information can be displayed on theCentralized Monitoring Alert Display.

Should the centralized monitoring station receive alerts from more thenone of the computerized monitoring and communication systems indicatingthat an unauthorized flying object(s) has(have) entered the restrictedairspace, the centralized monitoring alert display can display thevideo, audio and alerting information from all such instances at thesame time (i.e. split screen, etc.). The drone removal system can alsobe activated as described in FIG. 1 . If no alert is received by thecentralized monitoring station, nothing is preferably displayed on theCentralized Monitoring Alert Display. Preferably, a 360 degree panoramaof the restricted airspace can be displayed and visible on the centralmonitoring primary display whether alerting or not. When an alert isgenerated, attention can be drawn to the particular camera and aduplicative display of the alerting camera can be displayed on a secondseparate computer monitor (i.e. centralized monitoring alert display).

At F2 f, an electronic record of any alerts received by the CentralizedMonitoring Station can be stored in an electronic database.

FIG. 3 shows how the jet engine component in certain non-limitingembodiments creates force to pull in or push objects away from therestricted airspace. This is illustrative of how some jet engines work,and is meant as a non-limiting example of how some embodiments use jetengines to create force to pull drones or other unwanted objects towardsthe engine's intake, or use thrust to create force to push drones orother unwanted flying objects out of the restricted airspace. Though ajet engine is the preferred device for certain embodiments for creatingthe necessary suction/pull in and/or thrust/push away, it is within thescope of the disclosure that other known or later developed devices thatcan provide the necessary amount or a greater amount for thesuction/pull in and/or thrust/push away can also be used and areconsidered within the scope of the disclosure.

At F3 a, air can be drawn into the engine through one or more airinlets. This airflow is created by the force of spinning blades whichcreates suction into one or more compression chambers (See F3 b). Insome embodiments, this suction can be used to pull in drones or otherunauthorized flying objects away from restricted airspace, and into acapture device affixed to or nearby the jet engine.

At F3 b, air is drawn into the compression chamber(s) where it iscompressed, converting it into a high pressure gas. The air thenproceeds to the combustion chamber(s) (See F3 c).

At F3 c, in the combustion chamber(s), fuel is injected and the gas isignited. The gas then becomes high temperature and pressure. This gas isthen forced through a turbine (See F3 d)

At F3 d, the turbine can consist of a series of blades which spinrapidly, extracting energy from the compressed gas. This lowers thetemperature and pressure of the gas, and creates thrust when gas isexpelled out of the nozzle (See F3 e).

At F3 e, gas can be expelled out the rear of the engine through thenozzle. In some non-limiting embodiments, this expulsion of gas is usedto blow unwanted aircraft or objects out of the restricted airspace.

FIG. 4 shows one non-limiting embodiment in which a wireless receiverand transmitter cab be used in concert by the computerized monitoringsystem to identify authorized aircraft.

At F4 a, the Drone Detection System can comprise one or more 3D Motionand Sound sensor(s) and/or proximity sensor(s), which can be connectedto and/or in communication with the Control System via a data connection(wireless, wired, TCP/IP or comparable technology). The one or more 3DMotion and Sound sensors, and/or proximity sensors can be configured tomonitor an area for the presence of flying objects and/or tocontinuously capture video of an area to be monitored for the presenceof flying objects. The one or more 3D Motion and Sound sensors and/orproximity sensors can be configured to recognize and identify flyingobjects using identifiers such as size, airspeed, vehicleidentification, distance between points on the object, etc.Alternatively, the object can be identified by means of creating athree-dimensional zone in the restricted area though the softwareapplication or though the use of an electronic transmitter attached toan authorized aircraft. Once an object is identified, the software canautomatically determine whether the flying object is authorized in thearea or not. The above steps of identifying, determining, monitoring,etc. can be also be performed by the computerized monitoring system withthe sensors sending or providing a raw video feed of the area to thecomputerized monitoring system.

At F4 b, the computerized monitoring system can also be programmed toreceive a proper authorization signal for an authorized aircraft flyingin or approaching the restricted airspace, preferably from a wirelesstransmitter that can be affixed to the authorized aircraft. The wirelesstransmitter preferably continuously sends out an authentication signalunique to the authorized aircraft for receipt by a wireless receiver.The wireless receiver can be preferably in wired or wirelesscommunication with the computerized monitoring system or control system.The signal from the transmitter can be broadcasted or transmitted bylong or short-range frequency transmission technology or by otherpreferably wireless transmission technology now known or laterdeveloped. In a preferred non-limiting embodiment, the wireless receiverwhich receives the signal transmitted by the wireless transmitter can bein communication with the computerized monitoring system. In addition oras an alternative to authorizing by receipt of an authentication signal,predetermined frequency or code, the computerized monitoring system canbe informed that a specific aircraft has or will enter into therestricted airspace and/or from the signal transmitted from the wirelesstransmitter (as well as the information received from the 3D Motion andSound Sensor(s)) and can also make an “on the spot” determination ofwhether the flying object is authorized by the information it receivesfrom the transmitter and/or sensor(s). Accordingly, it is within thescope of the disclosure to use the wireless signal from the transmitterfor identifying a specific aircraft. However, as described below, thesignal can also be used to track the aircraft's movements within and/oroutside the restricted airspace, and also track how long the aircraftremains within the restricted airspace and/or within the vicinity of therestricted airspace.

At F4 c, the access terminal can be a physical computer or electronicdevice where an administrator can input a list of authorized aircraft,as well as enter other commands, information, instructions,authorizations, etc. as needed. This authorization may include securitymeasures such as, but not limited to, a code(s), frequency(s), ortransponder(s) carried by the authorized aircraft(s), or any otheraircraft identification system now developed or developed in the future.

At F4 d, the computerized monitoring system compares the any signalreceived by an aircraft or flying object to those in an electronic file(i.e. control file or database) where such signals or codes are storedand maintained. If the aircraft lacks a valid code or signal, it can beautomatically deemed or considered to be an unauthorized flying objectby the computerized monitoring system or an authorized individual canmanually enter information into the system to make such a determination.

At F4 e, the jet engine(s) is/are connected to the computerizedmonitoring system for activation as described in FIG. 1 where anunauthorized flying object has been determined to be present in orapproaching the restricted airspace.

At F4 f, in some non-limiting embodiments, the jet engine may include anoise abatement system. These systems include, but are not limited to,suppressed sound by inducing a rapid or shorter mixing region in thecombustion chamber, including deep corrugations, lobes, or multi-lobesin the jet engine's nozzle, utilizing specifically designed noisereduction linings, or other noise reduction systems now developed ordeveloped in the future.

The computerized monitoring system can also be programmed to sendsignals for controlling or adjusting the orientation or position of theat least one jet engine assembly based on a current location of theunauthorized flying object or an anticipated flight path of theunauthorized flying object. An adjustment/positioner mechanism(electrical, computerized and/or mechanical device) can be associatedwith the jet engine assemblies to receive the commands from thecomputerized monitoring system and make the necessaryposition/orientation adjustments for aiming the jet engine assembliestowards the unauthorized flying object or anticipated flight path of theunauthorized flying object.

Though responding to airborne object, the jet engine(s) are preferablylocated on land or on top of buildings or other structures.

It is also within the scope of the disclosure that the computerizedmonitoring system can be incorporated into or part of the sensortechnology/components as opposed to a separate component.

The system can use several components for its function and operation,including, but not limited to, the following:

-   -   1. One or more 3D Motion and Sound Sensors. However, it also        within the scope of the invention to eliminate the sound sensor        and have the functions of the invention be performed with only        motion sensors or cameras capturing video without sound, any        combination of the various sensors including proximity sensors        can also be used and also considered with the scope of the        disclosure;    -   2. Computerized Monitoring System in electronic communication        with the one or more 3D Motion and Sound Sensors or other        sensors used;    -   3. Computerized Communication System in electronic communication        with the Computerized Monitoring System;    -   4. Centralized Monitoring Station in electronic communication        with one or more 3D Motion and Sound Sensors, the Computerized        Monitoring and/or the Computerized Communication Systems;    -   5. Centralized Monitoring Primary Display in electronic        communication with one or more Centralized Monitoring Stations;        and/or    -   6. Centralized Monitoring Alert Display in electronic        communication with one or more Centralized Monitoring Stations;        and/or    -   7. One or more Jet engine(s) in electronic communication with        one or more Centralized Monitoring Stations;

The various components can be in electrical, wired and/or wirelesscommunication with each other.

It is also within the scope of the disclosure that the system be fullyautomatic and that the jet engines implemented and activated by thesystem to remove a detected unauthorized object without the use of anydisplays.

The automatic detection and removal of drones and other unauthorizedflying objects though the use of jet engine(s) will provide significantsecurity and privacy benefits to governments and individuals alike,including, but not limited to, the following public benefits:

-   -   1. Prevention of terrorist attacks carried out through the use        of drones.    -   2. Reduction in incidences of security breaches in secured        locations.    -   3. Increased privacy in secured areas.    -   4. Reduction in security costs for the detection and removal of        drones and other unauthorized flying objects.    -   5. Increase of flight safety by preventing or reducing in air        collisions by authorized aircraft with drones and other        unauthorized flying object in the flight path of the authorized        aircraft.

It should be understood that the exemplary embodiments described hereinshould be considered in a descriptive sense only and not for purposes oflimitation. Descriptions of features or aspects within each embodimentshould typically be considered as available for other similar featuresor aspects in other embodiments. While one or more embodiments have beendescribed with reference to the figures, it will be understood by thoseof ordinary skill in the art that various changes in form and detailsmay be made therein without departing from their spirit and scope.

All components of the described device/system and their locations,electronic communication methods between the system components, wiring,attachment or securement mechanisms, dimensions, values, shapes,materials, authentication techniques, sensors, monitoring methods, etc.discussed above or shown in the drawings, if any, are merely by way ofexample and are not considered limiting and other component(s) and theirlocations, electronic communication methods, wiring, attachment orsecurement mechanisms, dimensions, values, shapes, materials,authentication techniques, sensors, monitoring methods etc. can bechosen and used and all are considered within the scope of thedisclosure.

The benefits, advantages, solutions to problems, and any element(s) thatmay cause any benefit, advantage, or solution to occur or become morepronounced are not to be construed as a critical, required, or essentialfeatures or elements of any or all the claims.

While the novel system and method have been described and disclosed incertain terms and has disclosed certain embodiments or modifications,persons skilled in the art who have acquainted themselves with thedisclosure, will appreciate that it is not necessarily limited by suchterms, nor to the specific embodiments and modification disclosedherein. Thus, a wide variety of alternatives, suggested by the teachingsherein, can be practiced without departing from the spirit of thedisclosure, and rights to such alternatives are particularly reservedand considered within the scope of the disclosure.

Unless feature(s), part(s), component(s), characteristic(s) orfunction(s) described in the specification or shown in the drawings fora claim element, claim step or claim term specifically appear in theclaim with the claim element, claim step or claim term, then theinventor does not consider such feature(s), part(s), component(s),characteristic(s) or function(s) to be included for the claim element,claim step or claim term in the claim when and if the claim element,claim step or claim term is interpreted or construed. Similarly, withrespect to any “means for” elements in the claims, the inventorconsiders such language to require only the minimal amount of features,components, steps, or parts from the specification to achieve thefunction of the “means for” language and not all of the features,components, steps or parts describe in the specification that arerelated to the function of the “means for” language.

It should be understood that the exemplary embodiments described hereinshould be considered in a descriptive sense only and not for purposes oflimitation. Descriptions of features or aspects within each embodimentshould typically be considered as available for other similar featuresor aspects in other embodiments. While one or more embodiments have beendescribed with reference to the figures, it will be understood by thoseof ordinary skill in the art that various changes in form and detailsmay be made therein without departing from their spirit and scope.

What is claimed is:
 1. A method for automatically responding to anunauthorized flying object approaching or which has entered a restrictedairspace, said method comprising the steps of: a. monitoring at least aportion of a restricted airspace using one or more sensors; b.electronically forwarding information from the one or more sensor(s) toa computerized monitoring system, the computerized monitoring systemprogrammed to recognize when an unauthorized flying object isapproaching or entered the restricted airspace based on the informationreceived from the one or more sensors; and c. activating a jet engine bythe computerized monitoring system to respond to an unauthorized flyingobject approaching or entering the restricted airspace.
 2. The methodfor automatically responding of claim 1 further comprising the step ofrequesting an authorization code or signal from the unauthorized flyingobject prior to step c.
 3. The method for automatically responding ofclaim 2 wherein step c. is performed only if a valid authorization codeor signal is not received from the unauthorized flying object.
 4. Themethod for automatically responding of claim 2 wherein step c. isperformed only if a valid authorization code or signal is not receivedfrom the unauthorized flying object within a preconfigured time period.5. The method for automatically responding of claim 1 further comprisingthe step of waiting for a preconfigured time period to receive anauthorization code or signal from the unauthorized flying object by thecomputerized monitoring system before proceeding to step c.
 6. Themethod for automatically responding of claim 1 wherein step c comprises(i) positioning the jet engine such that suction created by theactivated jet engine is directed towards the unauthorized flying objectand (ii) drawing the unauthorized flying object into the jet engine withthe suction.
 7. The method for automatically responding of claim 1wherein step c comprises (i) positioning the jet engine such that thrustcreated by the activated jet engine is directed towards the unauthorizedflying object and (ii) pushing the unauthorized flying object out of therestricted airspace with the thrust.
 8. The method for automaticallyresponding of claim 1 further comprising the step of displaying imageryor video of the unauthorized flying object on a computer screen ordisplay when the unauthorized flying object is approaching or enteredthe restricted airspace.
 9. The method for automatically responding ofclaim 1 further comprising the step of storing information in a databaseregarding any actions taken by the computerized monitoring system inresponse to the unauthorized flying object approaching or entering therestricted airspace.
 10. The method for automatically responding ofclaim 1 wherein the unauthorized flying object is a drone.
 11. Themethod for automatically responding of claim 1 wherein the unauthorizedflying object is an unmanned air vehicle or unmanned aircraft.
 12. Themethod for automatically responding of claim 1 further comprising thestep of determining by the computerized monitoring system that anunauthorized flying object is approaching or entered the restrictedairspace prior to step c.
 13. A system for automatically responding toan unauthorized flying object that is approaching or which has entered arestricted airspace, comprising: a detection system for monitoring atleast a portion of the restricted airspace. a computerized monitoringsystem in communication with the detection system, the computerizedmonitoring system programmed to recognize when an unauthorized flyingobject is approaching or entered the restricted airspace frominformation received from the detection system; and at least one jetengine assembly positioned close enough to the restricted airspace suchthat suction created by the jet engine draws the unauthorized flyingobject in or thrust created by the jet engine pushes the unauthorizedflying object away from the restricted airspace, the at least one jetengine assembly in communication with the computerized monitoringsystem.
 14. The system for automatically responding of claim 13 whereinthe computerized monitoring system is programmed to send an electroniccommand to activate the jet engine assembly when the computerizedmonitoring system determines that an unauthorized flying object isapproaching or entered the restricted airspace.
 15. The system forautomatically responding of claim 13 further comprising a wirelessreceiver in communication with the computerized monitoring system, thewireless receiver capable of receiving wireless transmissions from theunauthorized flying object for processing by the computerized monitoringsystem.
 16. The system for automatically responding of claim 13 whereinthe computerized monitoring system is programmed to request anauthorization code or authorization signal from the unauthorized flyingobject and programmed to wait a preconfigured period of time beforesending a command to the jet engine to active the jet engine forresponding to the unauthorized flying object.
 17. The system forautomatically responding of claim 13 wherein the at least one jet engineassembly is located on land, a building or other structure.
 18. Thesystem for automatically responding of claim 13 wherein the computerizedmonitoring system is programmed to send signals for controlling oradjusting the orientation or position of the at least one jet engineassembly based on a current location of the unauthorized flying objector an anticipated flight path of the unauthorized flying object.
 19. Thesystem for automatically responding of claim 15 wherein the wirelessreceiver is adapted for being in communication with a wirelesstransmitter associated with the unauthorized flying object, wherein thewireless transmitter sends the authorization code or authorizationsignal that is received by the wireless receiver for processing by thecomputerized monitoring system.
 20. The system for automaticallyresponding of claim 13 further comprising a database in communicationwith the computerized monitoring system; wherein information concerningevents and actions taken with respect to a determined unauthorizedflying object are stored within the database by the computerizedmonitoring system.
 21. The system for automatically responding of claim13 further comprising a noise abatement system associated with the atleast one jet engine assembly.