[go: up one dir, main page]

WO2018044231A1 - System and method for detecting, intercepting and taking over control of multiple rogue drones simultaneously - Google Patents

System and method for detecting, intercepting and taking over control of multiple rogue drones simultaneously Download PDF

Info

Publication number
WO2018044231A1
WO2018044231A1 PCT/SG2016/050434 SG2016050434W WO2018044231A1 WO 2018044231 A1 WO2018044231 A1 WO 2018044231A1 SG 2016050434 W SG2016050434 W SG 2016050434W WO 2018044231 A1 WO2018044231 A1 WO 2018044231A1
Authority
WO
WIPO (PCT)
Prior art keywords
drone
drones
gps
jammer
fly
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/SG2016/050434
Other languages
French (fr)
Inventor
Frankie CHAN KOK LIANG
Foo MOO TENG
Edgardo Ii OSILLADA GONZALES
Anna Veronica BATERINA
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Global Expert Team Sdn Bhd
Original Assignee
Global Expert Team Sdn Bhd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Global Expert Team Sdn Bhd filed Critical Global Expert Team Sdn Bhd
Priority to PCT/SG2016/050434 priority Critical patent/WO2018044231A1/en
Publication of WO2018044231A1 publication Critical patent/WO2018044231A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/80Jamming or countermeasure characterized by its function
    • H04K3/92Jamming or countermeasure characterized by its function related to allowing or preventing remote control
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G5/00Traffic control systems for aircraft
    • G08G5/20Arrangements for acquiring, generating, sharing or displaying traffic information
    • G08G5/22Arrangements for acquiring, generating, sharing or displaying traffic information located on the ground
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G5/00Traffic control systems for aircraft
    • G08G5/20Arrangements for acquiring, generating, sharing or displaying traffic information
    • G08G5/26Transmission of traffic-related information between aircraft and ground stations
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G5/00Traffic control systems for aircraft
    • G08G5/30Flight plan management
    • G08G5/34Flight plan management for flight plan modification
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G5/00Traffic control systems for aircraft
    • G08G5/50Navigation or guidance aids
    • G08G5/55Navigation or guidance aids for a single aircraft
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G5/00Traffic control systems for aircraft
    • G08G5/50Navigation or guidance aids
    • G08G5/56Navigation or guidance aids for two or more aircraft
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G5/00Traffic control systems for aircraft
    • G08G5/70Arrangements for monitoring traffic-related situations or conditions
    • G08G5/72Arrangements for monitoring traffic-related situations or conditions for monitoring traffic
    • G08G5/727Arrangements for monitoring traffic-related situations or conditions for monitoring traffic from a ground station
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/40Jamming having variable characteristics
    • H04K3/45Jamming having variable characteristics characterized by including monitoring of the target or target signal, e.g. in reactive jammers or follower jammers for example by means of an alternation of jamming phases and monitoring phases, called "look-through mode"
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/60Jamming involving special techniques
    • H04K3/65Jamming involving special techniques using deceptive jamming or spoofing, e.g. transmission of false signals for premature triggering of RCIED, for forced connection or disconnection to/from a network or for generation of dummy target signal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/80Jamming or countermeasure characterized by its function
    • H04K3/90Jamming or countermeasure characterized by its function related to allowing or preventing navigation or positioning, e.g. GPS
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G5/00Traffic control systems for aircraft
    • G08G5/50Navigation or guidance aids
    • G08G5/57Navigation or guidance aids for unmanned aircraft
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K2203/00Jamming of communication; Countermeasures
    • H04K2203/10Jamming or countermeasure used for a particular application
    • H04K2203/22Jamming or countermeasure used for a particular application for communication related to vehicles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K2203/00Jamming of communication; Countermeasures
    • H04K2203/10Jamming or countermeasure used for a particular application
    • H04K2203/24Jamming or countermeasure used for a particular application for communication related to weapons
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K2203/00Jamming of communication; Countermeasures
    • H04K2203/30Jamming or countermeasure characterized by the infrastructure components
    • H04K2203/32Jamming or countermeasure characterized by the infrastructure components including a particular configuration of antennas

Definitions

  • Embodiments of the present invention generally relate to computer and digital processing systems for scanning, detecting, intercepting and taking over the control of multiple rouge drones simultaneously.
  • Drones are relatively new technology. However, it is readily available for consumer purchase. Some famous consumer and hobbyist drones easily available in the market are Parrot, DJI and Syma. Onboard drone cameras are capable of storing video from few minutes to few hours long video on a microSD card, SD card or USB drive. More advanced drone may have feature to allow for real-time upload of video to external storage network. Most drones today have fully operational Wi-Fi, Radio Frequency (RF) and Bluetooth antennas or a combination of all two or three. Drone movement can be preprogrammed or manually controlled by a hand-held device, which can be a smart phone, tablet or radio controller. Manual control requires radio frequency and can operate in several frequency bands:
  • Unregulated frequency bands typically 2.4 GHz and 5 GHz.
  • Bluetooth frequency bands very short range
  • Movement is typically along the x- and y-axes. It can be preprogrammed via code (some through a manual input Graphical User Interface, GUI), provided through reference coordinates from a GPS. Because of these abilities, individuals and organizations must be aware of the threats drones can pose.
  • GUI Graphical User Interface
  • Drones targeting sensitive areas such as power retransmission stations where touching two lines is enough to cause a blackout
  • Drones can be shut down in the middle of the flight and causing injury to passerby and also property damage, or flown into places such as buildings, open public area, traffic jam area and others.
  • Drones can be flown into sports venues packed with spectators such as stadiums. Removing the plastic guards or protector cover essentially turns the drones into flying, radio-controlled razor blades. Imagine the injury or damage it can cause. What if it carries explosive material sabotage by certain terrorist groups?
  • Drones can be flown into commercial jets flight path and hit the jet engines especially during taking off and landing. Interestingly enough, this scenario has played out hundreds of times in the past few months at several airports and occurred regularly in the United State of America (USA).
  • Terrorist organizations could easily design and build a drone capable of carrying several pounds of explosives into public areas and government buildings causing intensive damages and live loses.
  • Optical signal and infrared cameras • Optical signal and infrared cameras. The solution is potentially to be blocked by buildings, trees and any structure. Besides, it is also subjected to false alarms and inaccuracies. Optical signal and infrared is usually very short range and therefore consider expensive solution.
  • LIDAR Laser and Light Detection & Range
  • Radio frequency or signal jammer to jam the entire operating radio frequency channel • Radio frequency or signal jammer to jam the entire operating radio frequency channel.
  • This solution has lots of legal issues as it is usually not permitted by law in most of the countries. Besides, it is inefficient on many types of drones, especially those drones capable of auto-pilot (fly with GPS location pre-set). Furthermore, it is subjective to potential false alarms and inaccuracies.
  • Our invention will overcome the current market invention lack of in countering rogue drones as well as more importantly multi-drone intrusion or assault. By being able to detect the multi-drone simultaneously, our invention can take appropriate action to neutralize the potential threats as mentioned above. Summary of the Invention
  • Intruder flies Drone close and into the No Drone Zone or restricted area such as Airport, Power Plant, Military Base, President Palace, Government Buildings & etc.
  • the invented system will automatically and continuously scan the air to find and identify intruding Drone (433MHz, 2.4GHz and 5.0-5.8GHz frequency bands) flying in the vicinity of No Drone Zone.
  • a de-authentication signal can be sent to the intruding drone to disassociate/disconnect the Intruder from controlling the drone that approaching the No Drone Zone.
  • the invented system will then establish a connection to the loose drone and immediately take over the control of the intruding drone.
  • the invented system can instruct the drone to land at specific area through the X-Y axes calibration and gracefully shut it down or can instruct the drone to fly back to point of origin that if fly from or crash it where it flies.
  • the invented system has a GPS spoofing feature that intend to cheat the drone by sending fake GPS location signal to the drone and make it fly to a specific location (which it where we want it to be but to the drone, it thought it has fly to the right path),
  • - Invention will not be restricted by multi-drone assault as it is able to scan multi-drone within vicinity coverage and take correctly measure.
  • - Invention does not limit to manual piloted drone as it also supports auto- piloted drone (which fly through GPS pre-setting) detection, interception and take over control.
  • Fig. 1 shows the overall processes of the invented system. It depicts the action from scan, detect and identify, disassociate, connect, take over control, command instructions to land, crash or go back and also a GPS spoofing capability for auto-pilot drones.
  • the system will scan 101 the target surrounding area for any intruding drones with radio frequency 433MHz, 2.4GHz and 5.0-5.8GHz. Any intruding drone operating at these frequencies can detected and identified 102.
  • the system will send de-association signal 103 to the drone if the drone to disconnect it controller.
  • the system will connect 104 to the drone and to take over the control 105 of the drone. It can give instructions to the drone either to land, crash or go back 106 to where it comes from through x and y-axes maneuver.
  • the system also has the capability to spoof the GPS signal 107 to provide the wrong GPS information to the auto-pilot drone flying into the restricted area. For drone that cannot disassociated, RF jamming 108 will be executed up to a maximum of 50 meters from the restricted area.
  • Fig. 2 shows the invented systems with component parts for an operation against multiple rogue drones intruding a none fly zone or restricted area.
  • the invention system includes Main System 001 which is a Linux based computer system with software design to perform functions that include radio frequency scanning, detecting and identifying, take over control, instruct drones to land, crash or go back to location it flies from, perform GPS spoofing of location, jamming of RF signals, as well as analysis to perform locating of drone controllers. All these functionalities are performed through the integrated use and processes of the devices that include Multiple Antenna Array 002, GPS Spoofing Device 003 and RF Jammer 004.

Landscapes

  • Engineering & Computer Science (AREA)
  • Aviation & Aerospace Engineering (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Burglar Alarm Systems (AREA)
  • Position Fixing By Use Of Radio Waves (AREA)

Abstract

A system for detecting, intercepting and taking over control of multiple drones simultaneously, comprising a scanner with multiple antenna array that supports scanning frequencies of 433 MHz, 2.4 GHz and 5.0-5.8 GHz, a GPS spoofer, a radio frequency (RF) jammer and a main system on a Linux based operating system. The scanner receives and transmits signals, such as de-authentication signal to the multiple drones. The GPS spoofer spoofs the location information. The RF jammer jams drones that cannot be intercepted and taken control of. The main system is loaded with central management software for managing the detecting, intercepting and taking over control of the drone using the scanner, GPS spoofer and RF jammer.

Description

System and Method for Detecting, Intercepting and Taking Over Control of Multiple Rogue Drones Simultaneously Technical Field
Embodiments of the present invention generally relate to computer and digital processing systems for scanning, detecting, intercepting and taking over the control of multiple rouge drones simultaneously. Background Art
Drones are relatively new technology. However, it is readily available for consumer purchase. Some famous consumer and hobbyist drones easily available in the market are Parrot, DJI and Syma. Onboard drone cameras are capable of storing video from few minutes to few hours long video on a microSD card, SD card or USB drive. More advanced drone may have feature to allow for real-time upload of video to external storage network. Most drones today have fully operational Wi-Fi, Radio Frequency (RF) and Bluetooth antennas or a combination of all two or three. Drone movement can be preprogrammed or manually controlled by a hand-held device, which can be a smart phone, tablet or radio controller. Manual control requires radio frequency and can operate in several frequency bands:
· Various short range FM and UHF;
• Unregulated frequency bands (typically 2.4 GHz and 5 GHz); and
• Bluetooth frequency bands (very short range) - for mini or micro drones. Movement is typically along the x- and y-axes. It can be preprogrammed via code (some through a manual input Graphical User Interface, GUI), provided through reference coordinates from a GPS. Because of these abilities, individuals and organizations must be aware of the threats drones can pose.
Here are some threats and scenarios that drone can pose:
• Drone flying directly over nuclear plant infrastructure such as cooling towers, where they can simply be shut off or drop while carrying an explosive payload;
• Drones targeting sensitive areas such as power retransmission stations where touching two lines is enough to cause a blackout;
• Drone submarines that can dive themselves into hydroelectric turbines or detonate an explosive next to an aging dam.
• Some higher end camera and software allow drone operators to incorporate infrared and night vision, which could easily be employed to watch and document security patrols around government and federal buildings, airports, corporate and public locations and military installations.
• Drones can be shut down in the middle of the flight and causing injury to passerby and also property damage, or flown into places such as buildings, open public area, traffic jam area and others.
• Drones can be flown into sports venues packed with spectators such as stadiums. Removing the plastic guards or protector cover essentially turns the drones into flying, radio-controlled razor blades. Imagine the injury or damage it can cause. What if it carries explosive material sabotage by certain terrorist groups?
• Drones can be flown into commercial jets flight path and hit the jet engines especially during taking off and landing. Interestingly enough, this scenario has played out hundreds of times in the past few months at several airports and occurred regularly in the United State of America (USA).
• Terrorist organizations could easily design and build a drone capable of carrying several pounds of explosives into public areas and government buildings causing intensive damages and live loses.
Considering such as great threats drone can pose to infrastructure and human beings, we come out with the system and method with design that can detect, intercept and take over control of multiple Wi-Fi drones.
Technical Problem
There are many current inventions or solutions in the market to counter drones. However, none of them provide sufficient coverage to counter multiple drones simultaneously. Here are some list of current inventions and solutions:
· Catching a drone with a net. There are some solutions that use a drone carrying a net to intercept and catch the rogue drone flying into restricted area. However, this will require you to have the visibility of the rogue drone approaching and be able to take off the drone interceptor to intercept the flight path of the rogue drone. This won't be feasible if the area is dark such as at night or there are multiple rogue drones approaching at the same time.
• Catching a drone with an eagle. Eagle has been trained by Dutch police to intercept and catch a rogue drone. However, this might cause injury to the bird if the drone uses a strong spin propeller. Animal watch group will strongly oppose to this solution.
• Optical signal and infrared cameras. The solution is potentially to be blocked by buildings, trees and any structure. Besides, it is also subjected to false alarms and inaccuracies. Optical signal and infrared is usually very short range and therefore consider expensive solution.
• Radar. The solution is expensive. Usually, it comes with very high false alarm rate and impractical for small drone detection. It does not really detect small drones. In the United States of America (USA), the active RADAR system requires Federal Communication Commission (FCC) approval and must not interfere with radio frequencies (RF).
• Laser and Light Detection & Range (LIDAR). The solution is very expensive. Also, it has lots of legal issues and it is unlawful to shoot down drones in countries such as the United State of America (USA) even the drone flies above the private property. To execute, you first need to detect. It has limited range especially during bad weather. Also, it has high false alarm and inaccuracies.
• Radio frequency or signal jammer to jam the entire operating radio frequency channel. This solution has lots of legal issues as it is usually not permitted by law in most of the countries. Besides, it is inefficient on many types of drones, especially those drones capable of auto-pilot (fly with GPS location pre-set). Furthermore, it is subjective to potential false alarms and inaccuracies.
The current available invention or solutions as listed above lack the readiness and completeness to counter multi-drone intrusion or assault.
Solution to Problem
Our invention will overcome the current market invention lack of in countering rogue drones as well as more importantly multi-drone intrusion or assault. By being able to detect the multi-drone simultaneously, our invention can take appropriate action to neutralize the potential threats as mentioned above. Summary of the Invention
Intruder flies Drone close and into the No Drone Zone or restricted area such as Airport, Power Plant, Military Base, President Palace, Government Buildings & etc. The invented system will automatically and continuously scan the air to find and identify intruding Drone (433MHz, 2.4GHz and 5.0-5.8GHz frequency bands) flying in the vicinity of No Drone Zone.
A de-authentication signal can be sent to the intruding drone to disassociate/disconnect the Intruder from controlling the drone that approaching the No Drone Zone. The invented system will then establish a connection to the loose drone and immediately take over the control of the intruding drone. The invented system can instruct the drone to land at specific area through the X-Y axes calibration and gracefully shut it down or can instruct the drone to fly back to point of origin that if fly from or crash it where it flies. By using multiple adapter
If the drone is auto-piloted through a pre-programmed route, the invented system has a GPS spoofing feature that intend to cheat the drone by sending fake GPS location signal to the drone and make it fly to a specific location (which it where we want it to be but to the drone, it thought it has fly to the right path),
Advantageous Effects of Invention
Here is the list of advantages effects of the invention:
- Invention does not affect by day or night or requirement of line of sight to detect the intrusion of rogue drones. So, it can operate 24 by 7 whole year round.
- Invention will not be restricted by multi-drone assault as it is able to scan multi-drone within vicinity coverage and take correctly measure. - Invention does not limit to manual piloted drone as it also supports auto- piloted drone (which fly through GPS pre-setting) detection, interception and take over control. Detailed Description of Drawings
The two diagrams will show the full implementation pictures include system parts as well as the processes involved for achieving multiple drone detection and take over control. Refer to brief description of Drawings below. Fig. 1 shows the overall processes of the invented system. It depicts the action from scan, detect and identify, disassociate, connect, take over control, command instructions to land, crash or go back and also a GPS spoofing capability for auto-pilot drones. Firstly, the system will scan 101 the target surrounding area for any intruding drones with radio frequency 433MHz, 2.4GHz and 5.0-5.8GHz. Any intruding drone operating at these frequencies can detected and identified 102. The system will send de-association signal 103 to the drone if the drone to disconnect it controller. Then, the system will connect 104 to the drone and to take over the control 105 of the drone. It can give instructions to the drone either to land, crash or go back 106 to where it comes from through x and y-axes maneuver. The system also has the capability to spoof the GPS signal 107 to provide the wrong GPS information to the auto-pilot drone flying into the restricted area. For drone that cannot disassociated, RF jamming 108 will be executed up to a maximum of 50 meters from the restricted area. Fig. 2 shows the invented systems with component parts for an operation against multiple rogue drones intruding a none fly zone or restricted area. Drone or multiple different type of drones here refer to 005A, 005B, 005C, 005D and 005E can be piloted by man or pre-programmed route through GPS location setting to enter into restricted area or none fly zone. The invention system includes Main System 001 which is a Linux based computer system with software design to perform functions that include radio frequency scanning, detecting and identifying, take over control, instruct drones to land, crash or go back to location it flies from, perform GPS spoofing of location, jamming of RF signals, as well as analysis to perform locating of drone controllers. All these functionalities are performed through the integrated use and processes of the devices that include Multiple Antenna Array 002, GPS Spoofing Device 003 and RF Jammer 004.

Claims

Claims
[Claim 1 ] A system for detecting, intercepting and taking over control of multiple rogue drones simultaneously. The system consists of:
• A scanner with multiple antenna array that support different range of frequencies scanning which include 433 MHz, 2.4GHz and also 5.0- 5.8GHz frequency range. The antennas can receive (listen) and transmit signal simultaneously as it supports transmitting of certain signal (de-authentication signal) to targeted drones.
• A GPS spoofing device to spoof and trick the auto-pilot drone which fly by location information provided by GPS satellites to think that it flies to the wrong location and will fly out of the coverage site (none fly zone or restricted area).
• A radio frequency (RF) jammer for short distance jamming of drones that cannot be intercepted and take over control.
• A main system with Linux based operating system loaded with central management software for managing the scanner antennas for detecting, intercepting and taking over control of multiple drones, managing the GPS spoofing device and the RF jammer.
[Claim 2 ] The scanner, part of the entire system with multiple antenna array deployment is able to scan multiple frequency channels, including 433 MHz, 2.4GHz and 5.0-5.8GHz frequency bands. The receiving data will be fed to the main system which is able to list out and identify the existing of drones within the scan vicinity. Through the same antenna array, a disassociation signal can also be sent to the intruding drone(s) and disconnect off the original controller and allow the main system connect to the drone. Once the drone is being control, it can be instructed to land immediately, land at a specific location, crash or go back to where it flies from.
[Claim 3 ] The GPS spoofing devices, part of the entire system can spoof or trick the auto-pilot drone which is not controlled by a man-managed controller and fly by location information provided through GPS satellites. It can create and send a false GPS signal to the intruding drone and make the drone thinks that it flies to the wrong location and will fly out of the restricted area.
[Claim 4 ] The RF jammer, part of the entire system can jam the entire RF at short distance (to a maximum of 50 meter) that will result in some drone be forced land or go back to the original location it flies from. It is only use when there is no other successful way to restrict the intruding drones through the Claim 2 and Claim 3.
[Claim 5 ] The main system which includes the invention software to centrally manage the scanner antenna array, GPS spoofing device and RF jammer. It comes with Web Management Graphical User Interface
(GUI) where scanned data (which include the drone/object and frequencies it fly) of intruding drone data, action data (instructions data set from the Main System) and status with logs is available for visualization and analysis.
PCT/SG2016/050434 2016-09-05 2016-09-05 System and method for detecting, intercepting and taking over control of multiple rogue drones simultaneously Ceased WO2018044231A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/SG2016/050434 WO2018044231A1 (en) 2016-09-05 2016-09-05 System and method for detecting, intercepting and taking over control of multiple rogue drones simultaneously

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/SG2016/050434 WO2018044231A1 (en) 2016-09-05 2016-09-05 System and method for detecting, intercepting and taking over control of multiple rogue drones simultaneously

Publications (1)

Publication Number Publication Date
WO2018044231A1 true WO2018044231A1 (en) 2018-03-08

Family

ID=61305214

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SG2016/050434 Ceased WO2018044231A1 (en) 2016-09-05 2016-09-05 System and method for detecting, intercepting and taking over control of multiple rogue drones simultaneously

Country Status (1)

Country Link
WO (1) WO2018044231A1 (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109407049A (en) * 2018-12-10 2019-03-01 中国电子科技集团公司第十研究所 A kind of object localization method and system of full passive detection
CN110719136A (en) * 2019-08-27 2020-01-21 安徽四创电子股份有限公司 Unmanned aerial vehicle interference deception system and unmanned aerial vehicle defense system
GB2578905A (en) * 2018-11-13 2020-06-03 Martek Drones Ltd Anti-drone system
WO2020226239A1 (en) * 2018-08-21 2020-11-12 윤성욱 Low-altitude unmanned aerial vehicle surveillance system
DE102019119049A1 (en) * 2019-07-15 2021-01-21 Rheinmetall Electronics Gmbh Net catching drone, system and method for catching a flying drone
US20210325867A1 (en) * 2020-04-17 2021-10-21 E-N-G Mobile Systems, Llc Mobile command and control system for unmanned aerial vehicles
CN114337909A (en) * 2022-01-17 2022-04-12 中国人民解放军陆军边海防学院 Unmanned aerial vehicle prevention and control reaction system and method
CN114666005A (en) * 2022-05-26 2022-06-24 广东德九新能源有限公司 Scoring and batting implementation method of guarding and batting integrated combined equipment
US11385341B2 (en) * 2019-07-31 2022-07-12 CACI, Inc.—Federal Methods and systems for detecting and passively monitoring communications of an unmanned aerial vehicle
EP4099302A1 (en) * 2021-06-02 2022-12-07 Arlo Technologies, Inc. Multisensor security system with aircraft monitoring
CN116202517A (en) * 2023-01-09 2023-06-02 北京理工大学 Method for extracting guide information of anti-unmanned mechanism
CN119353980A (en) * 2024-10-22 2025-01-24 北京瀚科智翔科技发展有限公司 An anti-swarm system and method for rapidly clustering and deploying an aerial killing matrix
US20250116488A1 (en) * 2021-07-30 2025-04-10 Swatter Company, Lda Method and system for intercepting and controlling target-drones
RU2839693C1 (en) * 2024-06-13 2025-05-12 Акционерное общество "Федеральный научно-производственный центр "Нижегородский научно-исследовательский институт радиотехники" Device for detection and determination of azimuth position of uav

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140266851A1 (en) * 2013-03-14 2014-09-18 Counter Echo Solutions LLC System and Methods for Countering Satellite-Navigated Munitions
WO2016045772A1 (en) * 2014-09-24 2016-03-31 Diehl Bgt Defence Gmbh & Co. Kg Anti-unmanned aerial vehicle defense apparatus, protective device for fighting an unmanned aircraft, and method for operating a protective device
CN205280942U (en) * 2015-12-15 2016-06-01 烟台朗欣航空技术有限公司 Unmanned aerial vehicle intercepts GPS generator of usefulness in air
CN105721100A (en) * 2016-04-08 2016-06-29 纪伯文 Handheld unmanned aerial vehicle countering security device
CN105842683A (en) * 2016-05-27 2016-08-10 南京博驰光电科技有限公司 Unmanned aerial vehicle integrated defense system and method
CN105842717A (en) * 2016-05-19 2016-08-10 湖南矩阵电子科技有限公司 Anti-UAV(unmanned aerial vehicle) method and system
CN205490581U (en) * 2016-01-28 2016-08-17 纪伯文 Bear hidden counter unmanned aerial vehicle device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140266851A1 (en) * 2013-03-14 2014-09-18 Counter Echo Solutions LLC System and Methods for Countering Satellite-Navigated Munitions
WO2016045772A1 (en) * 2014-09-24 2016-03-31 Diehl Bgt Defence Gmbh & Co. Kg Anti-unmanned aerial vehicle defense apparatus, protective device for fighting an unmanned aircraft, and method for operating a protective device
CN205280942U (en) * 2015-12-15 2016-06-01 烟台朗欣航空技术有限公司 Unmanned aerial vehicle intercepts GPS generator of usefulness in air
CN205490581U (en) * 2016-01-28 2016-08-17 纪伯文 Bear hidden counter unmanned aerial vehicle device
CN105721100A (en) * 2016-04-08 2016-06-29 纪伯文 Handheld unmanned aerial vehicle countering security device
CN105842717A (en) * 2016-05-19 2016-08-10 湖南矩阵电子科技有限公司 Anti-UAV(unmanned aerial vehicle) method and system
CN105842683A (en) * 2016-05-27 2016-08-10 南京博驰光电科技有限公司 Unmanned aerial vehicle integrated defense system and method

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
FCC ONLINE TABLE OF FREQUENCY ALLOCATIONS, 31 August 2016 (2016-08-31), XP055470496, Retrieved from the Internet <URL:https://transition.fcc.gov/oet/spectrum/table/fcctable.pdf> [retrieved on 20161021] *
GIRAY S. M.: "Anatomy of unmanned aerial vehicle hijacking with signal spoofing", 6TH INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN SPACE TECHNOLOGIES (RAST, 15 June 2013 (2013-06-15), pages 795 - 800, XP032477276, [retrieved on 20161021] *
LIU Y. ET AL.: "Basic Frame Constructing Of Counter UAV Technique", JOURNAL OF SICHUAN ORDNANCE, vol. 10, 31 October 2015 (2015-10-31), pages 18 - 20, [retrieved on 20161021] *
S ATHYAMOORTHY D.: "A Review Of Security Threats Of Unmanned Aerial Vehicles And Mitigation Steps", THE JOURNAL OF DEFENCE AND SECURITY, vol. 6, no. 1, 31 December 2015 (2015-12-31), pages 81 - 97, XP055470493, [retrieved on 20161021] *
UNMANNED AERIAL SYSTEM THREATS: EXPLORING SECURITY IMPLICATIONS AND MITIGATION TECHNOLOGIES, 18 March 2015 (2015-03-18), pages 12 - 15, XP055470498, Retrieved from the Internet <URL:https://www.gpo.gov/fdsys/pkg/CHRG-114hhrg94580/pdf/CHRG-114hhrg94580.pdf> [retrieved on 20161021] *
YANG Y. ET AL.: "Anti-drone strategy and weaponry Status and Development Trend", AERODYNAMIC MISSILE JOURNAL, vol. 8, 31 August 2013 (2013-08-31), pages 28 - 31, [retrieved on 20161021] *

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020226239A1 (en) * 2018-08-21 2020-11-12 윤성욱 Low-altitude unmanned aerial vehicle surveillance system
GB2578905A (en) * 2018-11-13 2020-06-03 Martek Drones Ltd Anti-drone system
CN109407049A (en) * 2018-12-10 2019-03-01 中国电子科技集团公司第十研究所 A kind of object localization method and system of full passive detection
CN109407049B (en) * 2018-12-10 2023-10-31 中国电子科技集团公司第十一研究所 Target positioning method and system for full passive detection
DE102019119049A1 (en) * 2019-07-15 2021-01-21 Rheinmetall Electronics Gmbh Net catching drone, system and method for catching a flying drone
US11385341B2 (en) * 2019-07-31 2022-07-12 CACI, Inc.—Federal Methods and systems for detecting and passively monitoring communications of an unmanned aerial vehicle
US11762076B2 (en) 2019-07-31 2023-09-19 Caci, Inc. - Federal Methods and systems for detecting and passively monitoring communications of an unmanned aerial vehicle
CN110719136B (en) * 2019-08-27 2023-10-20 安徽四创电子股份有限公司 Unmanned aerial vehicle defense system
CN110719136A (en) * 2019-08-27 2020-01-21 安徽四创电子股份有限公司 Unmanned aerial vehicle interference deception system and unmanned aerial vehicle defense system
US20210325867A1 (en) * 2020-04-17 2021-10-21 E-N-G Mobile Systems, Llc Mobile command and control system for unmanned aerial vehicles
EP4099302A1 (en) * 2021-06-02 2022-12-07 Arlo Technologies, Inc. Multisensor security system with aircraft monitoring
US20250116488A1 (en) * 2021-07-30 2025-04-10 Swatter Company, Lda Method and system for intercepting and controlling target-drones
CN114337909A (en) * 2022-01-17 2022-04-12 中国人民解放军陆军边海防学院 Unmanned aerial vehicle prevention and control reaction system and method
CN114666005A (en) * 2022-05-26 2022-06-24 广东德九新能源有限公司 Scoring and batting implementation method of guarding and batting integrated combined equipment
CN116202517A (en) * 2023-01-09 2023-06-02 北京理工大学 Method for extracting guide information of anti-unmanned mechanism
RU2839693C1 (en) * 2024-06-13 2025-05-12 Акционерное общество "Федеральный научно-производственный центр "Нижегородский научно-исследовательский институт радиотехники" Device for detection and determination of azimuth position of uav
CN119353980A (en) * 2024-10-22 2025-01-24 北京瀚科智翔科技发展有限公司 An anti-swarm system and method for rapidly clustering and deploying an aerial killing matrix

Similar Documents

Publication Publication Date Title
WO2018044231A1 (en) System and method for detecting, intercepting and taking over control of multiple rogue drones simultaneously
US10866597B1 (en) Drone detection and interception
US12092756B1 (en) Deterrent for unmanned aerial systems
US11022407B2 (en) UAV defense system
US10915099B1 (en) System and method for detecting and defeating a drone
Humphreys Statement on the security threat posed by unmanned aerial systems and possible countermeasures
US20180081355A1 (en) Radio frequency device detection and intervention
KR102219450B1 (en) Smart jamming system
KR20210006490A (en) Anti-drone system using unmanned aerial vehicle
CN114911267A (en) Intelligent autonomous unmanned aerial vehicle counter-braking system
CN107566078A (en) A kind of unmanned plane low-altitude defence system
CN110673626A (en) Unmanned aerial vehicle GPS deception trapping method
WO2019032162A2 (en) Secure beacon and reader system for remote drone and pilot identification
CN110719136A (en) Unmanned aerial vehicle interference deception system and unmanned aerial vehicle defense system
US20170127245A1 (en) 4G Drone Link
Buric et al. Counter remotely piloted aircraft systems
US20220312168A1 (en) Site safety system
Kadripathi et al. De-authentication attacks on rogue UAVs
KR102162331B1 (en) Method of controlling drone shooting
Intwala et al. System to capture WiFi based Drones using IoT
CN111708049B (en) A method of UAV navigation deception using pseudolite
Goodyer Drone rangers
WO2022172217A1 (en) System and method for rogue drone detection and interception
CN119394099A (en) UAV interception method and device, storage medium and electronic device
Wallace et al. Exploring commercial counter-UAS operations: A case study of the 2017 Dominican Republic festival presidente

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16915340

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 25/07/2019)

122 Ep: pct application non-entry in european phase

Ref document number: 16915340

Country of ref document: EP

Kind code of ref document: A1