Method and system for validating access keys for unmanned vehicle interdiction device

ABSTRACT

The devices and methods described herein integrate security and/or recording mechanisms into unmanned vehicle interdiction devices to prevent unauthorized use and to record information related to operation of the unmanned vehicle interdiction device, identification of an unmanned vehicle, location of the unmanned vehicle, and operation of the unmanned vehicle.

CLAIM OF PRIORITY

The present application claims priority to U.S. Pat. No. 11,097,842,entitled “UNMANNED AIRCRAFT SYSTEM DETECTION, IDENTIFICATION, ANDINTERDICTION” and filed Jan. 19, 2021, which claims priority to U.S.Patent Application No. 62/995,218, entitled “UNMANNED AIRCRAFT SYSTEMDETECTION, IDENTIFICATION, AND INTERDICTION” and filed Jan. 17, 2020,both of which are assigned to the assignee hereof and hereby expresslyincorporated by reference in their entirety.

FIELD

The subject matter described herein relates to devices and methods fordetecting, identifying, and disrupting operation of unmanned vehiclesand more particularly to security mechanisms to prevent unauthorized useof such devices.

BACKGROUND

The recent increase in the availability and use of unmanned aircraftsystems (UASs), drones, and remote-controlled model aircraft raisessafety and security concerns, both for civilians and governmentalagencies including the Department of Defense (DoD). These recreationalaircraft can be co-opted for malicious intent by terrorists andcriminals. More specifically, they can be used to threaten the safety ofcivilians, especially at large social gatherings (e.g. Olympics), byterrorist organizations.

A UAS can be used, either intentionally or through ignorance, to impedethe efforts of first responders in emergency situations. For example,private drones have been known to hamper firefighters battling wildfiresthat are common across the western United States every summer. Bypreventing firefighters from effectively containing a wildfire, theseUASs cause property loss, injuries, and potential loss of life.

News services have also reported numerous instances of unauthorized UASsflying and crashing over political or public gatherings or intorestricted airspace. These incidents represent a public safety risk.

SUMMARY

The devices and methods described herein integrate security and/orrecording mechanisms into unmanned vehicle interdiction devices toprevent unauthorized use and to record information related to operationof the unmanned vehicle interdiction device, identification of anunmanned vehicle, location of the unmanned vehicle, and operation of theunmanned vehicle.

In one example, an unmanned vehicle interdiction device comprises ahand-held housing encapsulating a control unit comprising memory and atleast one processor, an unmanned vehicle interdiction mechanism coupledto the control unit to selectively emit signals to disrupt operation ofan unmanned vehicle, and a credential detector coupled to the controlunit having an interface to detect and validate access keys. The controlunit, in response to receiving a signal from the credential detectorindicating that an access key has been validated, sends a signal toenable the unmanned vehicle interdiction mechanism.

In some examples, the memory stores a database of authorized users ofthe unmanned vehicle interdiction device, and the credential detectorvalidates the access key based on whether a user associated with theaccess key is identified as an authorized user in the database ofauthorized users.

In some examples, the unmanned vehicle interdiction device furthercomprises a communications interface configured to: query a remotedatabase of authorized users to determine whether a user associated withthe access key is an authorized user, and receive an indication that theuser associated with the access key is identified as an authorized userin the remote database of authorized users. The credential detectorvalidates the access key based on the received indication that the userassociated with the access key is identified as an authorized user inthe remote database of authorized users.

In some examples, the unmanned vehicle interdiction mechanism comprisesat least one of the following: a radio frequency jammer, a GlobalNavigation Satellite System (GNSS) signal replacement mechanism, and asignal generator configured to generate signals from a simulatedsatellite constellation that conflict with signals from an actualsatellite constellation.

In some examples, the access key comprises at least one of thefollowing: a Common Access Card (CAC), a Personal Identity Verification(PIV) credential, a key that contains an identity of a user encryptedwith a public key of the unmanned vehicle interdiction device, and a keythat contains an identity of a user encrypted with a private key of theuser.

In some examples, the unmanned vehicle interdiction device furthercomprises a recording mechanism coupled to the memory to record datarelated to at least one of the following: operation of the unmannedvehicle interdiction device, identification of an unmanned vehicle,location of the unmanned vehicle, and operation of the unmanned vehicle.

In some examples, the unmanned vehicle interdiction device furthercomprises an optical sensor coupled to the control unit and therecording mechanism to record, in response to receiving a signal fromthe control unit, at least one of the following: images and videoassociated with the unmanned vehicle, an identifier located on a surfaceof the unmanned vehicle, and a location in which the unmanned vehicle isbeing operated.

In some examples, the unmanned vehicle interdiction device furthercomprises: a Global Navigation Satellite System (GNSS) receiver coupledto the recording mechanism to record a geographical location of theunmanned vehicle interdiction device, and a compass coupled to therecording mechanism to record a heading of the optical sensor.

In some examples, the unmanned vehicle interdiction device furthercomprises a radio frequency sensor coupled to the recording mechanism torecord identification information broadcast from the unmanned vehicle ina radio frequency signal.

In some examples, the unmanned vehicle interdiction device furthercomprises an electro-optical sensor coupled to the recording mechanismto record identification information broadcast from the unmanned vehiclein at least one of the following: a visible signal, a near-infraredsignal, and a thermal laser signal.

In some examples, the recording mechanism is configured to, in responseto activation of the unmanned vehicle interdiction mechanism,automatically log information related to operation of the unmannedvehicle interdiction device by the authorized user.

In some examples, the recording mechanism is configured to, upon receiptof an input from the authorized user that indicates a request to loginformation, log information related to a current operational state ofthe unmanned vehicle interdiction device.

In some examples, the recording mechanism is configured to, upon receiptof an input from the authorized user that indicates a request to loginformation, record information related to a current operational stateof at least one unmanned vehicle operating within range of the unmannedvehicle interdiction device.

In some examples, the recording mechanism is configured to, in responseto activation of the unmanned vehicle interdiction mechanism,automatically log information related to at least one of the following:identification of an unmanned vehicle, location of the unmanned vehicle,and operation of the unmanned vehicle.

In some examples, the unmanned vehicle interdiction device furthercomprises an unmanned vehicle detection mechanism coupled to the controlunit configured to detect at least one of the following signals that areassociated with an unmanned vehicle: a control signal, a video signal,and a telemetry signal.

In some examples, the recording mechanism is configured to, in responseto detection of an unmanned vehicle by the unmanned vehicle detectionmechanism, automatically log information related to at least one of thefollowing: identification of the unmanned vehicle, location of theunmanned vehicle, and operation of the unmanned vehicle.

In another example, an unmanned vehicle interdiction device comprises ahand-held housing encapsulating a control unit comprising memory and atleast one processor, an unmanned vehicle interdiction mechanism coupledto the control unit to selectively emit signals to disrupt operation ofan unmanned vehicle, and a security mechanism coupled to the controlunit having an interface to validate access keys. The control unit, inresponse to receiving a signal from the security mechanism indicatingthat an access key has been validated, sends a signal to enable theunmanned vehicle interdiction mechanism.

In some examples, the access key comprises at least one of thefollowing: a mechanical key, a radio frequency identification (RFID)tag, a transponder key, a smart key, and an electronic card or stick.

In a further example, a method is performed at an unmanned vehicleinterdiction device comprising an unmanned vehicle detection mechanismand an unmanned vehicle interdiction mechanism configured to selectivelyemit signals to disrupt operation of an unmanned vehicle. The methodcomprises detecting presentation of a valid access key by an authorizeduser and, in response to presentation of the valid access key, enablingthe unmanned vehicle interdiction mechanism.

In some examples, the method further comprises validating the access keybased on a determination that a user associated with the access key isidentified as an authorized user in a database of authorized users.

In some examples, the method further comprises logging data related toat least one of the following: operation of the unmanned vehicleinterdiction device, identification of an unmanned vehicle, location ofthe unmanned vehicle, and operation of the unmanned vehicle.

In some examples, the logging of data is automatically performed inresponse to activation of the unmanned vehicle interdiction mechanism.

In some examples, the logging of data is automatically performed inresponse to detection of an unmanned vehicle by the unmanned vehicledetection mechanism.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of an example unmanned vehicle interdictiondevice that requires presentation of a valid access key in order toenable the functionality of an unmanned vehicle interdiction mechanismof the unmanned vehicle interdiction device.

FIG. 2 is a side-view schematic illustration of an example unmannedvehicle interdiction device having a housing that is suitable for asingle user to hold and operate the unmanned vehicle interdictiondevice.

FIG. 3 is a flowchart of an example of a method in which an unmannedvehicle interdiction device detects the presentation of a valid accesskey by an authorized user and, in response to presentation of the validaccess key, enables an unmanned vehicle interdiction mechanism.

DETAILED DESCRIPTION

Currently, unmanned aircraft system (UAS) interdiction devices can onlybe used in the United States for Congressionally approved applicationsby federal agencies. Concerns about safety, side effects, andappropriate use have caused lawmakers and the policy makers for federalagencies to prevent state and local law enforcement, firefighters, andfirst responders from using these UAS interdiction devices to disable,disrupt, disorient, and/or take control of a UAS that is being operatedin an unlawful or unsafe manner.

Most methods for UAS interdiction have side effects. For example,jamming also interrupts the operation of legitimate wireless devices,such as computers or navigation equipment. Thus, UAS interdictiondevices should only be operated by individuals who have the necessarytraining and authorization to do so.

Moreover, in order to prosecute the operator of a dangerously operatedUAS, it is necessary to provide physical evidence of the incident.Recorded imagery, with date, time, and location information are crucialevidentiary data. Since the Federal Aviation Administration (FAA)requires all registered UASs to display their registration number on theoutside of the craft, a camera on the UAS interdiction device can alsobe used to capture the registration number or serial number from arecovered UAS. This same data enables post operation analysis andaccountability of UAS interdiction device operators, addressing publicconcerns of appropriate use of force.

Given the foregoing considerations, the devices and methods describedherein integrate security and/or recording mechanisms into unmannedvehicle interdiction devices to prevent unauthorized use and to recordinformation related to operation of the unmanned vehicle interdictiondevice, identification of an unmanned vehicle, location of the unmannedvehicle, and operation of the unmanned vehicle.

As used herein, the term “unmanned vehicle” (UV) can refer to anyunmanned vehicle. For example, unless otherwise specified, an unmannedvehicle could be an unmanned aerial vehicle (UAV) or unmanned aircraftsystem (UAS) such as a drone, an airplane, or a rotorcraft; an unmannedland-based vehicle such as a car, truck, tank, or armored vehicle; anunmanned watercraft such as a boat or riverine craft; and an unmannedamphibious vehicle.

Although the different examples of unmanned vehicle interdiction devicesand methods of using the unmanned vehicle interdiction devices may bedescribed separately, any of the features of any of the examples may beadded to, omitted from, or combined with any other example.

FIG. 1 is a block diagram of an example unmanned vehicle interdictiondevice that requires presentation of a valid access key in order toenable the functionality of an unmanned vehicle interdiction mechanismof the unmanned vehicle interdiction device. Unmanned vehicleinterdiction device 100 comprises hand-held housing 102, whichencapsulates control unit 104, unmanned vehicle (UV) detection mechanism106, unmanned vehicle (UV) interdiction mechanism 108, and credentialdetector/security mechanism 110. Unmanned vehicle interdiction device100 may also include communications interface 114, recording mechanism116, optical sensor 118, Global Navigation Satellite System (GNSS)receiver 120, compass 122, radio frequency (RF) sensor 124,electro-optical sensor 126, trigger 128, and user interface 130.

Control unit 104 comprises memory and at least one processor. UVdetection mechanism 106, which is coupled to control unit 104, isconfigured to detect at least one of the following signals that areassociated with an unmanned vehicle: a control signal, a video signal,and a telemetry signal. In some examples, UV detection mechanism 106utilizes a set of directed antennas and receivers to monitor the radiofrequency bands assigned by the Federal Communications Commission (FCC)for unmanned vehicle communications, command, and control in order tolocate, engage, and defeat unmanned vehicles. The assigned frequencybands currently include: the 430-450 MHz band, the 920 MHz band, the 2.4GHz band, and the 5.8 GHz band. These bands are listed as examples, andother appropriate frequencies may be used instead of or in addition tothese bands. Each receiver output is directed to a circuit, whichconverts the received power to a voltage. This voltage is digitizedusing an analog-to-digital converter (ADC) and the resulting digitalvalues are read by control unit 104, which interprets the digital valuerepresenting received signal strength to produce a light bar display.The light bar can be implemented as discrete LEDs, a light bar panel, ora simulated light bar shown on a digital display panel on user interface130. The number of lights or height of the bar indicates signal strengthin each communication band at the unmanned vehicle interdiction device'scurrent pointing direction. The signal strength indication may either bea raw value or the amount above an integrated background estimate.

As described above, when UV detection mechanism 106 detects a signalwithin one of the assigned radio frequency bands, the operator receivesan indication on a display of user interface 130. This indication cantake the form of a strength signal, direction, or both that aredisplayed as the operator changes the direction of the unmanned vehicleinterdiction device 100. The system can optionally include advancedpattern recognition, which classifies strong sources as likely unmannedvehicles. This information, along with pointing information provided bycompass 122, is displayed to the operator on user interface 130, aidingin quickly locating unmanned vehicle threats in radio frequency orvisually cluttered environments.

In the example shown in FIG. 1 , user interface 130 is an interface bywhich a user of unmanned vehicle interdiction device 100 can (1) obtaininformation regarding the status of unmanned vehicle interdiction device100, (2) detect the presence of an unmanned vehicle within the effectiverange of unmanned vehicle interdiction device 100, and (3) entercommands, instructions, and/or selections pertaining to the operation ofunmanned vehicle interdiction device 100. For example, regarding thestatus of unmanned vehicle interdiction device 100, user interface 130may be configured to display information indicating (1) the remainingcharge of a battery located within, or connected to, unmanned vehicleinterdiction device 100, (2) the current operating state of unmannedvehicle interdiction device 100, and/or (3) whether unmanned vehicleinterdiction device 100 is currently transmitting jamming signals.

Regarding detection of an unmanned vehicle, user interface 130 may, insome examples, be configured to display information indicating thepresence, strength, type, and/or direction of detected radio signalsassociated with operation of an unmanned vehicle. In still furtherexamples, user interface 130 may be configured to display informationindicating an estimated range and/or direction of the unmanned vehiclefrom unmanned vehicle interdiction device 100.

Regarding entry of user commands/selections, user interface 130 may beconfigured, in some examples, to receive from a user, signal generationparameters associated with the desired operational state of unmannedvehicle interdiction device 100. In certain examples, a user mayconfigure unmanned vehicle interdiction device 100 to operate in a statein which the jamming signal transmission duration is either “continuous”transmission of the jamming signal or only when a user activatestransmission (e.g., by pressing a button/trigger 128 on unmanned vehicleinterdiction device 100).

UV interdiction mechanism 108, which is coupled to control unit 104,selectively emits signals to disrupt operation of an unmanned vehicle.In some examples, UV interdiction mechanism 108 comprises at least oneof the following: a radio frequency jammer, a GNSS signal replacementmechanism, and a signal generator configured to generate signals from asimulated satellite constellation that conflict with signals from anactual satellite constellation. In the examples in which UV interdictionmechanism 108 comprises a radio frequency (RF) jammer, the RF jammer maybe any jammer that is designed to disrupt (1) command signals from thecontroller to the unmanned vehicle, (2) telemetry and video signals fromthe unmanned vehicle to the controller, and/or (3) navigation signalsfrom overhead satellites. In some examples, the RF jammers operate byflooding the command and navigation frequency bands with either randomor structured noise, overwhelming the unmanned vehicle's receivers, sothat the command and/or navigation signals are buried in the noise sothe unmanned vehicle cannot detect the true satellite navigationsignals. With loss of operator control and/or navigation, the unmannedvehicle then resorts to default behavior, such as landing, hovering, orreturning to its base.

Global Navigation Satellite System (GNSS) is an umbrella term thatencompasses all global satellite positioning systems. This includesconstellations of satellites orbiting over the Earth's surface andcontinuously transmitting signals that enable users to determine theirposition. The Global Positioning System (GPS) is one example of a GlobalNavigation Satellite System. Besides GPS, there are other satellitenavigation systems, such as Russia's Global Navigation Satellite System(GLONASS), China's BeiDou Navigation Satellite System (BDS), and theEuropean Union's Galileo. Japan's Quasi-Zenith Satellite System (QZSS)is a GPS satellite-based augmentation system to enhance GPS's accuracy,with satellite navigation independent of GPS scheduled for 2023. Indiahas the Indian Regional Navigation Satellite System (IRNSS), also knownas Navigation with Indian Constellation (NAVIC), an autonomous regionalsatellite navigation system that provides accurate real-time positioningand timing services, with plans to expand to a global version in thelong-term.

In the examples in which UV interdiction mechanism 108 comprises a GNSSsignal replacement mechanism, the goal is to take control of an unmannedvehicle by broadcasting false GNSS signals configured to interfere withthe unmanned vehicle's navigation. The GNSS signal replacement mechanismgenerates a convincing pirate signal, which is a signal that is used tocapture and control navigation of the target unmanned vehicle. Morespecifically, the false (e.g., pirate) GNSS signal is matched to thetrue signals from the GNSS satellites. By providing a stronger GNSSsignal to the unmanned vehicle, the jamming system tricks the unmannedvehicle's signal tracking loops to lock onto the set of false GNSSsignals. The navigation signals are then manipulated to allow a pirateoperator to gain operational control of the unmanned vehicle.

In the examples in which UV interdiction mechanism 108 comprises asignal generator configured to generate signals from a simulatedsatellite constellation that conflict with signals from an actualsatellite constellation, the signal generator generates aconflicting/competing signal to the actual GNSS signals. In someexamples, the signal generator (1) generates signals from a simulatedsatellite constellation, wherein the signals from the simulatedsatellite constellation conflict/compete with signals from an actualsatellite constellation, and (2) transmits the signals from thesimulated satellite constellation towards an unmanned vehicle using adirectional antenna.

Credential detector 110, which is coupled to control unit 104, has aninterface to detect and validate access keys 112. In order to enable UVinterdiction mechanism 108 and promote appropriate use, a user presentsaccess key 112 for validation by credential detector 110, as will bediscussed more fully below. The concept of “presenting” or“presentation” of access key 112 may take any suitable manner ofsubmitting access key 112 for validation, which will be dependent onwhich type of access key is being utilized. For example, “presenting” amechanical access key may involve a user inserting the mechanical keyinto a lock to validate the access key, and in some examples, the userwould additionally be required to turn the key to validate the accesskey. In other examples, “presenting” a key that utilizes radio frequencyidentification (RFID) technology may involve a user placing the accesskey in a location that is close enough to unmanned vehicle interdictiondevice 100 to be read by an RFID interrogation signal. In furtherexamples, “presenting” a key card may include inserting the key cardinto, or swiping the key card through, unmanned vehicle interdictiondevice 100.

If unmanned vehicle interdiction device 100 does not recognize accesskey 112, or no access key is provided, UV interdiction mechanism 108cannot be activated, significantly reducing the risk of irresponsibleuse. Regardless of whether access key 112 is validated or not, theuser's identity, as indicated by access key 112, can be logged in memoryof unmanned vehicle interdiction device 100 or logged in a remote datasource accessible via a wireless network.

In some examples, the access key is associated with the user, taking theform of a Common Access Card (CAC) or a Personal Identity Verification(PIV) credential. A CAC is a “smart” card about the size of a creditcard, which is the standard identification for active-duty uniformedService personnel, Selected Reserve, Department of Defense (DOD)civilian employees, and eligible contractor personnel. It is also theprincipal card used to enable physical access to buildings andcontrolled spaces, and it provides access to DoD computer network andsystems.

A Personal Identity Verification (PIV) credential is a U.S. Federalgovernmentwide credential used to access Federally controlled facilitiesand information systems at the appropriate security level. PIVcredentials have certificates and key pairs, pin numbers, biometricslike fingerprints and pictures, and other unique identifiers. When puttogether into a PIV credential, it provides the capability to implementmulti-factor authentication for networks, applications and buildings.

These types of access keys use public/private key encryption to securelyidentify authorized users and the current user. More specifically, thesetypes of access keys contain the user identity encrypted with theunmanned vehicle interdiction device's public key. When the access keycard (e.g., CAC or PIV) is inserted into the unmanned vehicleinterdiction device, the certificate from the access key is read anddecrypted by the unmanned vehicle interdiction device's private key. Theprivate key is stored permanently on the unmanned vehicle interdictiondevice in secure memory. If the access key card is associated with anauthorized user, credential detector 110 sends a signal to control unit104 indicating that access key 112 has been validated. In response toreceiving the signal indicating that access key 112 has been validated,control unit 104 sends a signal to enable unmanned vehicle interdictionmechanism 108. Although the foregoing discussion focused on CACs and PIVcredentials, the access key may be any other key, besides a CAC or a PIVcredential, that contains an identity of a user encrypted with a publickey of the unmanned vehicle interdiction device, in other examples.

In other examples, the access key is associated with the users, ratherthan the unmanned vehicle interdiction device. In these examples, theunmanned vehicle interdiction device is loaded with the public keys ofauthorized users. When the user's access key (e.g., identity card) isinserted in the unmanned vehicle interdiction device, the access keyprovides the user's identity, which is encrypted with the user's privatekey. The unmanned vehicle interdiction device looks up the user's publickey in its database and can decrypt the encrypted identity with thatpublic key. The decrypted identity and user's identity are thencompared. If the identities match, the user is determined to be anauthorized user, and credential detector 110 sends a signal to controlunit 104 indicating that access key 112 has been validated. In responseto receiving the signal indicating that access key 112 has beenvalidated, control unit 104 sends a signal to enable unmanned vehicleinterdiction mechanism 108.

As mentioned above, credential detector 110 may access a database ofauthorized users to validate an access key that is presented by a user.In some examples, a database of authorized users of unmanned vehicleinterdiction device 100 is stored in the memory of unmanned vehicleinterdiction device 100, and credential detector 110 validates accesskey 112 based on whether a user associated with access key 112 isidentified as an authorized user in the database of authorized users. Insome examples, the on-board database of authorized users can beimplemented using an electrically erasable programmable read only memory(EEPROM), which can be re-programmed in circuit. For example, unmannedvehicle interdiction device 100 can include a slot for a physicaladministrative key, which when inserted will allow the database to bere-programmed. This administrative key can be associated with unmannedvehicle interdiction device 100 and may be either a mechanical key thatcloses a circuit or an electronically readable key. In further examples,unmanned vehicle interdiction device 100 may also include a serialinterface connector (RS232, USB, etc.), which accepts a cable connectedto programming equipment. The EEPROM can be programmed withauthorization information using the associated programming equipment.Once the EEPROM programming is complete, the cable is disconnected, andthe administrative key is removed and stored in a secure location.

In other examples, credential detector 110 utilizes communicationsinterface 114 to query a remote database of authorized users todetermine whether a user associated with access key 112 is an authorizeduser. Communications interface 114 receives, from the remote database,an indication whether the user associated with access key 112 isidentified as an authorized user in the remote database of authorizedusers. Credential detector 110 validates access key 112, based on areceived indication that the user associated with access key 112 isidentified as an authorized user in the remote database of authorizedusers.

In some examples, credential detector 110 is replaced with a securitymechanism, which is coupled to control unit 104 and has an interface tovalidate access keys. The main difference between credential detector110 and the security mechanism is that the security mechanism is notgenerally configured to handle encryption involving public/private keypairs. In the examples in which a security mechanism is utilized inplace of credential detector 110, the access key may be a mechanicalkey, a radio frequency identification (RFID) tag, a transponder key, asmart key, or an electronic card or “stick.”

In examples in which the access key is a mechanical key, the mechanicalkey has teeth or notches designed to match those on the securitymechanism (e.g., locking mechanism) on unmanned vehicle interdictiondevice 100. When the mechanical key is turned, it closes a circuit.Control unit 104 reads the state of that circuit and enables operationof UV interdiction mechanism 108 when a valid key is inserted. The usercan check out a mechanical key along with unmanned vehicle interdictiondevice 100, providing the necessary link between key and user identity.

In other examples, the access key is a proximity key such as an RFidentification (RFID) tag or key fob worn/carried by the user. Aproximity key, such as an RFID tag or key fob, enables UV interdictionmechanism 108 if the proximity key is close enough to unmanned vehicleinterdiction device 100 to be read by an RFID interrogation signal. Someexamples use a high frequency tag (13.56 MHz) to limit the proximityrange to under a meter. This limited range can require unmanned vehicleinterdiction device 100 to be in the user's possession to be enabled.Although other frequency tags may be used, some low frequency tags maynot have sufficient range for operation of a hand-held device, andultra-high frequency tags may fall into the range of unmanned aircraft(UA) radio bands, making them subject to interruption by RF jamming fromunmanned vehicle interdiction device 100.

As with the mechanical key, there can be two options for coding theproximity key. The proximity key can be specific to the device orspecific to the user. In the first case, the user “checks out” an RFIDkey with unmanned vehicle interdiction device 100, so that there is alink between RFID key identity and user identity.

In the second case, the RFID key uniquely identifies the user, and theuser identity is validated against a database of authorized users. Forexample, when unmanned vehicle interdiction device 100 is powered on, itactivates an on-board RFID transmitter and listens for a response.Unmanned vehicle interdiction device 100 can continue to use the RFIDtransmitter to “ping” and listen until it reads a response. Control unit104 can then compare the identity received in the response against thedevice identity (e.g., for device key) or against a database ofauthorized users (e.g., for operator key). If the received identity isassociated with an authorized user, the proximity key is valid, andcontrol unit 104 can enable UV interdiction mechanism 108 and start atimer. When the timer expires (e.g., after one second, one minute, onehour, or other intervals), unmanned vehicle interdiction device 100 canonce again check for the presence of the proximity key. If a valid keyis found, unmanned vehicle interdiction device 100 can continueoperating. If no valid key is found, unmanned vehicle interdictiondevice 100 can disable UV interdiction mechanism 108 and continue tocheck for a valid proximity key while unmanned vehicle interdictiondevice 100 is powered on.

The second and all subsequent checks for a valid proximity key can becoordinated with UV interdiction mechanism 108 (e.g., RF jammer). Whenthe valid key timer expires, control unit 104 can determine if UVinterdiction mechanism 108 is active and delay the key interrogationuntil UV interdiction mechanism 108 is turned off to avoid disablingunmanned vehicle interdiction device 100 during critical operations.Control unit 104 can also coordinate received power monitoring with theproximity key interrogation. For example, while the proximity keyinterrogation is active, control unit 104 can ignore all power readings.

In other examples, the access key is a transponder key. Transponderdevices use microchips to transmit a low-level signal from a key that isread by a remote receiver. The microchip is programmed with a uniqueserial number. Using RFID, the receiver must detect the correct serialnumber in order to unlock or open. As applied to unmanned vehicleinterdiction device 100, when a transponder key is inserted into thesecurity mechanism of unmanned vehicle interdiction device 100, a signalis sent to a receiver located within unmanned vehicle interdictiondevice 100. If the digital serial number in the transponder key matchesthe one programmed in unmanned vehicle interdiction device 100, thetransponder key is validated, and UV interdiction mechanism 108 isenabled. When the transponder key is removed, UV interdiction mechanism108 is disabled. The user can check out a transponder key along withunmanned vehicle interdiction device 100, providing the necessary linkbetween transponder key and user identity.

In further examples, the access key is a smart key. Smart keys worksimilarly to transponder keys, but they are more convenient for theuser. For example, a smart key is not required to be inserted intounmanned vehicle interdiction device 100. Thus, the smart key allows theuser to keep the key fob in their pocket or elsewhere on their personwhile operating unmanned vehicle interdiction device 100. The smart keyis identified via an antenna in housing 102, which receives an RF signaltransmitted from a radio pulse generator in the smart key housing. Insome cases, the smart key can also store customizablesettings/configurations such as limitations regarding the allowabletype/strength of jamming/navigation satellite signals that may beutilized by UV interdiction mechanism 108 to disrupt unmanned vehicleoperations. The user can check out a smart key along with unmannedvehicle interdiction device 100, providing the necessary link betweensmart key and user identity.

In examples in which the access key is an electronic card or “stick”that is inserted into a slot on unmanned vehicle interdiction device100, the access key can contain a code, which is read by an electronicscircuit of the security mechanism of unmanned vehicle interdictiondevice 100. Control unit 104 compares this code against a fixed codespecific to unmanned vehicle interdiction device 100. If the code isvalid, the control unit 104 enables UV interdiction mechanism 108. Ifthe code is not valid, UV interdiction mechanism 108 cannot be enabled.When the access key is removed, UV interdiction mechanism 108 isdisabled. The user can check out an access key along with unmannedvehicle interdiction device 100, providing the necessary link betweenaccess key and user identity.

In some examples, unmanned vehicle interdiction device 100 includesrecording mechanism 116 coupled to the memory to record data related toat least one of the following: operation of unmanned vehicleinterdiction device 100, identification of an unmanned vehicle, locationof the unmanned vehicle, and operation of the unmanned vehicle. Morespecifically, recording mechanism 116 may be configured to collect datarelated to a geographical position of unmanned vehicle interdictiondevice 100, the current date and time as reported by GNSS receiver 120,the compass direction (as reported by compass 122) and integratedpointing angles (pan and tilt), a compressed or full resolution snapshotcaptured from optical sensor 118 (e.g., a camera), the user identityassociated with a validated access key. Since the data recorded byrecording mechanism 116 may relate to a particular user's use or misuseof unmanned vehicle interdiction device 100, recording mechanism 116 maybe designed to be tamper-resistant or tamper-proof, in some examples.

In further examples, unmanned vehicle interdiction device 100 may alsoinclude optical sensor 118 coupled to control unit 104 and recordingmechanism 116 to record, in response to receiving a signal from controlunit 104, at least one of the following: images and video associatedwith the unmanned vehicle, an identifier located on a surface of theunmanned vehicle, and a location in which the unmanned vehicle is beingoperated. In some examples, optical sensor 118 is a wide field of viewcamera to capture critical evidence of an illegally or dangerouslyoperated unmanned vehicle. This recorded evidence includes imagery andgeographical location of the target unmanned vehicle, with date and timestamps. More specifically, optical sensor 118 may be a wide field ofview, high resolution color camera or other imaging device.

In some examples, unmanned vehicle interdiction device 100 also includesan audio input device such as a microphone. In these examples, thecamera and microphone are connected to electronics that capture the rawvideo and audio signals, respectively. Additional electronics (orprocessing software in an embedded computer) converts the raw cameradata to a displayable format, such as High-Definition MultimediaInterface (HDMI). This signal is routed to an onboard display panel,which may be included on user interface 130, in some examples. Inaddition, the audio and/or video signals may be compressed using acommercial algorithm, such as H.264, Moving Picture Experts Group-2(MPEG-2), or Joint Photographic Experts Group (JPEG). The compressedsignal(s) is transferred to a mass storage memory device, such as aUniversal Serial Bus (USB) flash drive or micro-Secure Digital(micro-SD) card, which records the information.

In some examples, unmanned vehicle interdiction device 100 includesGlobal Navigation Satellite System (GNSS) receiver 120 coupled torecording mechanism 116 to record a geographical location of unmannedvehicle interdiction device 100. These examples may also include compass122 coupled to recording mechanism 116 to record a heading of opticalsensor 118. In these examples, GNSS receiver 120, digital compass 122,and a three-axis gyroscope and accelerometer work together to measuregeographical location and pointing direction of unmanned vehicleinterdiction device 100. In some examples, control unit 104 continuouslyreceives the date, time, and geographical location from GNSS receiver120. Control unit 104 also reads compass 122, angular velocities, andacceleration.

The accelerometers within unmanned vehicle interdiction device 100measure forces, such as motion and gravity, based on electrical outputfrom a crystal sensitive to stress from acceleration. The gyroscopewithin unmanned vehicle interdiction device 100 measures rotationalmotion using the Coriolis effect. A gyroscope contains oscillatingmasses, typically two or more moving in opposite directions. Whenunmanned vehicle interdiction device 100 is turned (e.g., an angularvelocity is applied) by a user, the Coriolis force on each mass causes acapacitive change. The difference in capacitance is converted to avoltage, which is proportional to the angular velocity. The analogvoltages from the accelerometers and gyroscopes passes through analog todigital convertors to produce values that can be read by control unit104. Control unit 104 uses the three-dimensional acceleration values tomeasure the direction of gravity (e.g., downward) with respect tounmanned vehicle interdiction device 100. More specifically, controlunit 104 integrates the measured angular velocities to compute pan andtilt angles of unmanned vehicle interdiction device 100. Digital compass122 or a magnetometer measures magnetic fields to estimate the directionof north. By combining the up/down, pan, and tilt measurements computedfrom the accelerometer and gyroscope data with the magnetometer, controlunit 104 determines the geographical pointing direction of unmannedvehicle interdiction device 100.

GNSS receiver 120 receives signals from four (or more) satellites thatregularly transmit their position and the current time. Usingtrilateration, GNSS receiver 120 calculates its latitude, longitude, andaltitude from the satellite position signals and their time differences.Control unit 104 periodically reads the position and time informationfrom GNSS receiver 120. In some examples, GNSS receiver 120 may receivedata from one or more geographical satellite constellations (e.g., GPS,GLONASS, Beidou, etc.).

In further examples, unmanned vehicle interdiction device 100 includesradio frequency (RF) sensor 124 coupled to recording mechanism 116 torecord identification information broadcast from the unmanned vehicle ina radio frequency signal. Current FAA rules require that all unmannedaircraft display a registration number that is legible on closeexamination. Due to the small size of these aircraft, the registrationnumber cannot be read from a distance, even with stabilized long-rangecameras. Consequently, there is significant interest both by the FAA andin the UAS community for the capability equivalent of the transponderrequired in larger manned aircraft. The transponder on a manned aircraftbroadcasts an identity code assigned by local air traffic control andaltitude when interrogated by air traffic control. The interrogationoccurs on 1030 MHz, and commercial transponders reply on 1090 MHz. AllUASs were required to have an Automatic Dependent Surveillance-Broadcast(ADS-B) receiver by 2020, but there is currently no requirement forcarrying a transceiver. The FAA is in the process of definingtransponder requirements for both small and large UASs, but no formalspecification has been released.

Despite the current lack of a formal transponder requirement forunmanned vehicles, unmanned vehicle interdiction device 100 can includea directional receiver (e.g., RF sensor 124) capable of readingtransponder type signals, in some examples. This equipment may be acustom receiver capable of reading identity information broadcast fromofficial support UASs in an RF signal. The receiver may also be a radioreceiver capable of reading a proprietary wireless signal (e.g., acode-division multiple access (CDMA) electronic serial number). Forexample, one variation could include a receiver for FAA complianttransponder signals.

In other examples, unmanned vehicle interdiction device 100 can includean electro-optical sensor 126 coupled to recording mechanism 116 torecord identification information broadcast from the unmanned vehicle inat least one of the following: a visible signal, a near-infrared signal,and a thermal laser signal. Electro-optical sensor 126 may be a cameracapable of reading a visible signal, an infrared signal, a near-infraredsignal, a laser, and/or light-emitting diode(s).

Control unit 104 can listen for and interpret transponder signalswhenever it is also monitoring the UAS radio bands. Control unit 104 canextract the unique UAS identifier from the transponder signal. Thisvalue may be the registration number, serial number, or some otheridentifier. Control unit 104 may use this number to index an on-boarddatabase of authorized aircraft. The database can be stored in an EEPROMon unmanned vehicle interdiction device 100 and loaded from the FAAdatabase by authorized personnel, using the same procedure and equipmentas described above when programming authorized users. When control unit104 identifies an authorized UAS, it can automatically record a set ofevent data, as well as the unmanned vehicle's unique identifier.

There are a number of scenarios in which unmanned vehicle interdictiondevice 100 records or logs data. In some examples, recording mechanism116 is configured to automatically log information related to operationof unmanned vehicle interdiction device 100 by the authorized user, inresponse to activation of unmanned vehicle interdiction mechanism 108.Unmanned vehicle interdiction mechanism 108 is activated when anauthorized user depresses and holds down trigger 128 on unmanned vehicleinterdiction device 100. The example of FIG. 2 shows trigger 202 locatedon the upper front portion of a grip of unmanned vehicle interdictiondevice 200. In some examples, recording mechanism 116 automaticallystops logging data once trigger 128 is released by the authorized user.

In some examples, recording mechanism 116 is configured to loginformation related to a current operational state of unmanned vehicleinterdiction device 100 upon receipt of an input from an authorized userthat indicates a request to log information. For example, an authorizeduser may submit an input, via a button, knob, switch, dial, touchscreen,etc. on user interface 310 or elsewhere on unmanned vehicle interdictiondevice 100, to indicate a request to log the current operational state(e.g., a snapshot) of unmanned vehicle interdiction device 100. In someexamples, recording mechanism 116 can log the current operational stateof unmanned vehicle interdiction device 100 and stop logging datapursuant to the authorized user's request. In other examples, recordingmechanism 116 can continue logging the ongoing operational state ofunmanned vehicle interdiction device 100 and not stop logging data untilthe authorized user submits a request to stop logging the ongoingoperational state of unmanned vehicle interdiction device 100. In someexamples, the authorized user submits the request to stop logging bypressing or actuating the same input mechanism that was used to requestlogging the ongoing operational state of unmanned vehicle interdictiondevice 100.

In some examples, recording mechanism 116 is configured to recordinformation related to a current operational state of at least oneunmanned vehicle operating within range of unmanned vehicle interdictiondevice 100, upon receipt of an input from the authorized user thatindicates a request to log information. For example, an authorized usermay submit an input, via a button, knob, switch, dial, touchscreen, etc.on user interface 310 or elsewhere on unmanned vehicle interdictiondevice 100, to indicate a request to log the current operational state(e.g., a snapshot) of at least one unmanned vehicle. In some examples,recording mechanism 116 can log the current operational state of the atleast one unmanned vehicle and stop logging data pursuant to theauthorized user's request. In other examples, recording mechanism 116can continue logging the ongoing operational state of the at least oneunmanned vehicle and not stop logging data until the authorized usersubmits a request to stop logging the ongoing operational state of theat least one unmanned vehicle. In some examples, the authorized usersubmits the request to stop logging by pressing or actuating the sameinput mechanism that was used to request logging the ongoing operationalstate of the at least one unmanned vehicle.

In some examples, recording mechanism 116 is configured to automaticallylog information related to at least one of the following: identificationof an unmanned vehicle, location of the unmanned vehicle, and operationof the unmanned vehicle, in response to activation of unmanned vehicleinterdiction mechanism 108. Unmanned vehicle interdiction mechanism 108is activated when an authorized user depresses and holds down trigger128 on unmanned vehicle interdiction device 100. The example of FIG. 2shows trigger 202 located on the upper front portion of a grip ofunmanned vehicle interdiction device 200. In some examples, recordingmechanism 116 automatically stops logging data once trigger 128 isreleased by the authorized user.

In some examples, recording mechanism 116 is configured to, in responseto detection of an unmanned vehicle by unmanned vehicle detectionmechanism 106, automatically log information related to at least one ofthe following: identification of the unmanned vehicle, location of theunmanned vehicle, and operation of the unmanned vehicle. As discussedabove, unmanned vehicle interdiction device 100 can detect an unmannedvehicle in a variety of manners, including detection of control, video,and telemetry signals or transponder signals associated with unmannedvehicles.

In further examples, communications interface 114 of unmanned vehicleinterdiction device 100 may be configured to communicate, via aBluetooth communication link, with law enforcement, firefighter, orfirst responder communication equipment capable of requestinginformation from a government UAS registry database. For example, a userwould use the Bluetooth connection to request information on a specificUAS identifier. Controls on user interface 130 can allow the user toselect an identity value shown on the display panel. Unmanned vehicleinterdiction device 100 can then connect to equipment authorized toquery the UAS registry database and request further information on thatidentity value. Received information can be displayed to the user viauser interface 130.

Bluetooth wireless communications operate in the 2.4 GHz bands.Consequently, communication over Bluetooth can interfere with UASdetection operation, as it will overload the 2.4 GHz receiver.Consequently, detection operations can be coordinated with the use ofBluetooth communications. For example, a short-term wireless connectioncan be made by control unit 104 when the user requests information on aUAS identifier. The controls to establish a Bluetooth connection can beinactive whenever UV interdiction mechanism 108 is on, and any existinglink can be immediately terminated when UV interdiction mechanism 108 isactivated. Control unit 104 can also coordinate communication withreceived power monitoring. Thus, received power in the wirelesscommunication band that is being utilized for unmanned vehicle detectioncan be ignored whenever a Bluetooth link is active.

FIG. 3 is a flowchart of an example of a method in which an unmannedvehicle interdiction device detects the presentation of a valid accesskey by an authorized user and, in response to presentation of the validaccess key, enables an unmanned vehicle interdiction mechanism. Themethod 300 is performed at an unmanned vehicle interdiction devicecomprising an unmanned vehicle detection mechanism and an unmannedvehicle interdiction mechanism configured to selectively emit signals todisrupt operation of an unmanned vehicle. Method 300 begins withdetecting the presentation of a valid access key by an authorized user,302. In response to presentation of the valid access key, the unmannedvehicle interdiction mechanism is enabled, 304. The access key isvalidated based on a determination that a user associated with theaccess key is identified as an authorized user in a database ofauthorized users, 306. The unmanned vehicle interdiction device logsdata related to at least one of the following: operation of the unmannedvehicle interdiction device, identification of an unmanned vehicle,location of the unmanned vehicle, and operation of the unmanned vehicle,308. In some examples, the data is automatically logged in response toactivation of the unmanned vehicle interdiction mechanism. In otherexamples, the data is automatically logged in response to detection ofan unmanned vehicle by the unmanned vehicle detection mechanism.

In other examples, one or more of the steps of method 300 may beomitted, combined, performed in parallel, or performed in a differentorder than that described herein or shown in FIG. 3 . In still furtherexamples, additional steps may be added to method 300 that are notexplicitly described in connection with the example shown in FIG. 3 .Similarly, any of the features of any of the methods described hereinmay be performed in parallel or performed in a different manner/orderthan that described or shown herein.

Clearly, other examples and modifications of the foregoing will occurreadily to those of ordinary skill in the art in view of theseteachings. The above description is illustrative and not restrictive.The examples described herein are only to be limited by the followingclaims, which include all such examples and modifications when viewed inconjunction with the above specification and accompanying drawings. Thescope of the foregoing should, therefore, be determined not withreference to the above description alone, but instead should bedetermined with reference to the appended claims along with their fullscope of equivalents.

The invention claimed is:
 1. A method performed at an unmanned vehicleinterdiction device, the method comprising: validating, at the unmannedvehicle interdiction device, an access key presented by a user, theunmanned vehicle interdiction device comprising a hand-held housingencapsulating a control unit, an unmanned vehicle detection mechanismcoupled to the control unit, and an unmanned vehicle interdictionmechanism coupled to the control unit to selectively emit signals todisrupt operation of an unmanned vehicle; and in response to receiving,at the control unit, a signal indicating that the access key has beenvalidated, sending a signal to enable the unmanned vehicle interdictionmechanism.
 2. The method of claim 1, wherein validating the access keycomprises: validating the access key based on a determination that theuser associated with the access key is identified in a database ofauthorized users.
 3. The method of claim 2, wherein the database ofauthorized users is stored in a memory of the unmanned vehicleinterdiction device.
 4. The method of claim 2, wherein the database ofauthorized users is a remote database of authorized users, and whereinvalidating the access key comprises: querying the remote database ofauthorized users to determine whether the user associated with theaccess key is identified in the remote database of authorized users; andreceiving an indication that the user associated with the access key isidentified in the remote database of authorized users.
 5. The method ofclaim 1, further comprising: detecting the access key before validatingthe access key.
 6. The method of claim 1, further comprising: loggingdata related to at least one of the following: operation of the unmannedvehicle interdiction device, identification of an unmanned vehicle,location of the unmanned vehicle, and operation of the unmanned vehicle.7. The method of claim 6, wherein logging data is automaticallyperformed in response to activation of the unmanned vehicle interdictionmechanism.
 8. The method of claim 6, further comprising: detecting, withthe unmanned vehicle detection mechanism, at least one of the followingsignals that are associated with an unmanned vehicle: a control signal,a video signal, and a telemetry signal.
 9. The method of claim 8,wherein logging data is automatically performed in response to detectionof the unmanned vehicle by the unmanned vehicle detection mechanism. 10.The method of claim 6, further comprising: recording, with an opticalsensor of the unmanned vehicle interdiction device, at least one of thefollowing: images and video associated with the unmanned vehicle, anidentifier located on a surface of the unmanned vehicle, and a locationin which the unmanned vehicle is being operated.
 11. The method of claim10, further comprising: recording a geographical location of theunmanned vehicle interdiction device; and recording a heading of theoptical sensor.
 12. The method of claim 6, further comprising:recording, with a radio frequency sensor of the unmanned vehicleinterdiction device, identification information broadcast from theunmanned vehicle in a radio frequency signal.
 13. The method of claim 6,further comprising: recording, with an electro-optical sensor of theunmanned vehicle interdiction device, identification informationbroadcast from the unmanned vehicle in at least one of the following: avisible signal, a near-infrared signal, and a thermal laser signal. 14.The method of claim 6, wherein logging data comprises: upon receipt ofan input from an authorized user that indicates a request to loginformation, logging information related to a current operational stateof the unmanned vehicle interdiction device.
 15. The method of claim 6,wherein logging data comprises: upon receipt of an input from anauthorized user that indicates a request to log information, recordinginformation related to a current operational state of at least oneunmanned vehicle operating within range of the unmanned vehicleinterdiction device.
 16. A system comprising: a remote database ofauthorized users; and an unmanned vehicle interdiction devicecomprising: a hand-held housing encapsulating: a control unit comprisingmemory and at least one processor, an unmanned vehicle interdictionmechanism coupled to the control unit to selectively emit signals todisrupt operation of an unmanned vehicle, a means for validating accesskeys coupled to the control unit, wherein the control unit, in responseto receiving a signal from the means for validating access keysindicating that an access key has been validated, sends a signal toenable the unmanned vehicle interdiction mechanism, and a communicationsinterface configured to: query the remote database of authorized usersto determine whether a user associated with the access key is anauthorized user, and receive an indication that the user associated withthe access key is identified as an authorized user in the remotedatabase of authorized users, the means for validating access keysvalidating the access key based on the received indication that the userassociated with the access key is identified as an authorized user inthe remote database of authorized users.
 17. The system of claim 16,wherein the unmanned vehicle interdiction device further comprises: arecording mechanism coupled to the memory to record data related to atleast one of the following: operation of the unmanned vehicleinterdiction device, identification of an unmanned vehicle, location ofthe unmanned vehicle, and operation of the unmanned vehicle.
 18. Thesystem of claim 17, wherein the recording mechanism of the unmannedvehicle interdiction device is configured to automatically log data inresponse to activation of the unmanned vehicle interdiction mechanism.19. The system of claim 17, wherein the unmanned vehicle interdictiondevice further comprises: an unmanned vehicle detection mechanismcoupled to the control unit configured to detect at least one of thefollowing signals that are associated with an unmanned vehicle: acontrol signal, a video signal, and a telemetry signal.
 20. The systemof claim 19, wherein the recording mechanism of the unmanned vehicleinterdiction device is configured to, in response to detection of anunmanned vehicle by the unmanned vehicle detection mechanism,automatically log information related to at least one of the following:identification of the unmanned vehicle, location of the unmannedvehicle, and operation of the unmanned vehicle.