Abstract: A connected devices authentication system for UAV, comprising a user-interface integrated into a computing unit wirelessly connected to the UAV, allowing operators to input commands related to the UAV’s operational requirements, a control unit within the UAV processes these commands to identify critical devices based on the type of operation, a communication module for connecting the control unit to various devices through the Drone CAN protocol, enabling the retrieval of Unique Identifiers (UIDs) from connected devices, if a device fails to provide a valid UID, it is flagged as not connected and a pre-arm message is displayed to prevent UAV take-off, any unauthorized devices are flagged by comparing UIDs with a pre-stored database, the system ensures that only authorized devices are used by allowing the operator to manage device parameters for previously unauthorized devices.
Description:FIELD OF THE INVENTION
[0001] The present invention relates to a connected devices authentication system for UAV that ensures only the authorized and functional devices are connected to the UAV, preventing unauthorized access and blocking the UAV from taking off if any critical device is disconnected, malfunctioning, or unauthorized, to improve overall flight safety and security by proactively identifying and addressing potential risks before takeoff.
BACKGROUND OF THE INVENTION
[0002] Unmanned Aerial Vehicles (UAVs) have gained widespread adoption in various industries such as agriculture, logistics, surveillance, infrastructure inspection, and search and rescue operations due to their ability to perform tasks efficiently and safely in environments that are hazardous or difficult for humans. UAVs consist of multiple interconnected components such as GPS modules, sensors, electronic speed controllers (ESCs), batteries, communication systems, and propulsion units. Each of these components is critical for ensuring the UAV operates optimally and safely. Traditionally, UAV systems rely on basic communication protocols to connect and control these components. While such systems suffice for simple tasks, they often lack mechanisms for verifying the authenticity and functionality of the connected devices.
[0003] In many conventional UAV systems, device authentication and verification are not integrated in real-time. The devices are typically assumed to be connected and functioning properly once they are set up or powered on and any issues or malfunctions often go undetected until after the UAV is airborne. As a result, operators rely on post-flight diagnostics or manual checks to identify device failures, which not only lead to mission delays but also increase the risk of safety incidents. Unauthorized or counterfeit components, such as GPS modules or sensors are inadvertently used, potentially compromising the reliability of the UAV and the quality of the data collected during operations.
[0004] The traditional method of manual inspection and reliance on basic communication protocols does not provide a comprehensive solution for preventing unauthorized device usage, nor does it offer proactive measures to ensure all components are functioning correctly before flight. As UAV systems become more complex with increasing numbers of devices and sensors, this becomes challenging for operators to track and verify the status of each device in real-time. The lack of verification systems contributes to operational inefficiencies, increased downtime, and a higher risk of malfunction during critical missions. Moreover, in industries such as agriculture, emergency response, or infrastructure inspection, the failure of a single device significantly impacts mission success. Therefore, there is a growing need for methods that not only authenticate connected devices before takeoff but also provide continuous monitoring and alerts throughout the flight, ensuring that the UAV performs reliably and safely throughout its mission.
[0005] In traditional UAV systems, device verification and authorization are typically performed manually before flight. Operators visually inspect and check each component, such as GPS modules, sensors, and communication systems, to ensure they are connected and functioning properly. This process is time-consuming and heavily reliant on human judgment, which increases the likelihood of errors. Since this verification is not performed in real-time, it becomes difficult to detect unauthorized or malfunctioning devices, especially in systems with multiple connected components. As a result, devices that are either counterfeit, improperly configured, or malfunctioning go unnoticed, posing risks to the UAV’s operational performance and safety. The lack of automated, real-time validation systems leads to higher operational risks and inefficiencies.
[0006] Many traditional UAV systems rely on basic communication protocols that do not support unique identifier (UID) verification for connected devices. These protocols enable basic communication between the UAV's control unit and its devices, but they fail to distinguish between authorized and unauthorized components. Without the ability to authenticate devices through a UID or similar identification method, there is a risk that counterfeit, faulty, or incompatible devices are connected and used during flight. This lack of differentiation between trusted and untrusted devices lead to serious security vulnerabilities, operational failures, and safety issues, as unauthorized devices function improperly or fail during critical missions, potentially compromising the entire UAV system.
[0007] US20220223056A1 discloses various systems, methods, for unmanned aerial vehicles (UAV) are disclosed. In one aspect, UAVs operation in an area may be managed and organized by UAV corridors, which can be defined ways for the operation and movement of UAVs. UAV corridors may be supported by infrastructures and/or systems supported UAVs operations. Support infrastructures may include support systems such as resupply stations and landing pads. Support systems may include communication UAVs and/or stations for providing communications and/or other services, such as aerial traffic services, to UAV with limited communication capabilities. Further support systems may include flight management services for guiding UAVs with limited navigation capabilities as well as tracking and/or supporting unknown or malfunctioning UAVs.
[0008] US11080381B2 discloses a system for managing an unmanned aerial vehicle (UAV) include one or more storage media storing offline data that comprises verified information associated with a user, an input device configured to receive an input from the user, and one or more processors, individually or collectively configured to determine whether a connection to an online database is established and, if the connection to the database is not established, process the input and the offline data; and manage a flight of the UAV according to the processing of the input and the offline data.
[0009] Conventionally, many devices are available in the market that aids in operation and performance of UAV systems, offering various functionalities essential for the system’s overall operation. However, these conventional methods lack a mechanism for ensuring the authenticity and proper functioning of the connected devices. While they facilitate basic communication between the system’s control unit and its components, they fail to provide a secured method for distinguishing between authorized and unauthorized devices. This limitation increases the risk of using counterfeit, faulty, or incompatible devices, which] lead to operational failures, security vulnerabilities, and safety hazards.
[0010] In order to overcome the aforementioned drawbacks, there exists a need in the art to develop a system that requires to be capable of securely and efficiently verifying the authenticity and functionality of all connected devices in real-time before and during UAV operations. The developed system should be able to ensure that only authorized and properly functioning devices are in use, thereby preventing any unauthorized, counterfeit, or malfunctioning devices from compromising the UAV's performance. The developed system should also provide continuous monitoring of device status and facilitate immediate alerts in case of any issues for enabling operators to take corrective action before takeoff.
OBJECTS OF THE INVENTION
[0011] The principal object of the present invention is to overcome the disadvantages of the prior art.
[0012] An object of the present invention is to develop a device that is capable of verifying authenticity of connected devices before allowing their operation, for ensuring that only authorized components are in use during UAV operations.
[0013] Another object of the present invention is to develop a device that is capable of developing a framework that blocks operation of the UAV, if any connected device fails to provide a valid identifier or is flagged as unauthorized for enhancing overall security of the UAV system.
[0014] Another object of the present invention is to develop a device that is capable of preventing UAV takeoff, if any critical device is disconnected, malfunctioning, or unauthorized for minimizing the risk of in-flight failures or accidents.
[0015] Another object of the present invention is to develop a device that is capable of providing continuous monitoring of connected devices for ensuring that any issues, such as disconnections or device malfunctions are detected before the UAV is armed for flight.
[0016] Another object of the present invention is to develop a device that is capable of allowing for easy authorization of new or replaced components for enabling quick integration into the system without the need for extensive hardware modifications or firmware updates.
[0017] Another object of the present invention is to develop a device that is capable of optimizing UAV operations by ensuring that only properly authenticated and connected devices are in use, thus reducing downtime and the likelihood of operational failures.
[0018] Another object of the present invention is to develop a device that is capable of offering real-time and actionable alerts to the operator regarding the status of connected devices for helping them make quick, informed decisions before takeoff.
[0019] Yet another object of the present invention is to develop a device that is capable of providing the ability to easily configure and adjust device parameters for different operational scenarios, offering greater flexibility and adaptability to varying requirements.
[0020] The foregoing and other objects, features, and advantages of the present invention will become readily apparent upon further review of the following detailed description of the preferred embodiment as illustrated in the accompanying drawings.
SUMMARY OF THE INVENTION
[0021] The present invention relates to a connected devices authentication system for UAV that facilitates integration of new or replaced devices into UAV system for enabling quick authorization through configurable parameters which minimizes downtime, reduces the need for complex hardware updates, and ensures that UAV operations run efficiently with verified and reliable components.
[0022] According to an embodiment of the present invention, a connected devices authentication system for UAV, includes a user-interface inbuilt in a computing unit wirelessly linked to the UAV which allows the operator to input commands regarding the type of operation. Based on these commands, the control unit processes the input and determines the critical devices needed for the operation. A communication module in the control unit establishes connections with the connected devices via the Drone CAN protocol to retrieve the Unique Identifiers (UIDs) of each device. If any device fails to provide a valid UID, it is flagged as not connected and the control unit prevents the UAV from arming, displaying a specific pre-arm message on the computing unit. The system includes a database storing authorized device UIDs, and if any device sends an unauthorized UID, it is flagged as unauthorized, thus triggering an alert on the computing unit. If any critical device is not connected, the control unit blocks the UAV from taking off. The computing unit also allows the operator to manage device parameters and authorize previously unauthorized devices. A battery powers the system’s electrical and electronic components for ensuring reliable operation.
[0023] While the invention has been described and shown with particular reference to the preferred embodiment, it will be apparent that variations might be possible that would fall within the scope of the present invention.
BRIEF DESCRIPTION OF THE DRAWINGS
[0024] These and other features, aspects, and advantages of the present invention will become better understood with regard to the following description, appended claims, and accompanying drawings where:
Figure 1 illustrates a flow chart depicting workflow of a connected devices authentication system for UAV.
DETAILED DESCRIPTION OF THE INVENTION
[0025] The following description includes the preferred best mode of one embodiment of the present invention. It will be clear from this description of the invention that the invention is not limited to these illustrated embodiments but that the invention also includes a variety of modifications and embodiments thereto. Therefore, the present description should be seen as illustrative and not limiting. While the invention is susceptible to various modifications and alternative constructions, it should be understood, that there is no intention to limit the invention to the specific form disclosed, but, on the contrary, the invention is to cover all modifications, alternative constructions, and equivalents falling within the spirit and scope of the invention as defined in the claims.
[0026] In any embodiment described herein, the open-ended terms "comprising," "comprises,” and the like (which are synonymous with "including," "having” and "characterized by") may be replaced by the respective partially closed phrases "consisting essentially of," consists essentially of," and the like or the respective closed phrases "consisting of," "consists of, the like.
[0027] As used herein, the singular forms “a,” “an,” and “the” designate both the singular and the plural, unless expressly stated to designate the singular only.
[0028] The present invention relates to a connected devices authentication system for UAV that implements continuous device monitoring and delivers immediate, actionable alerts to operators for helping them quickly identify any device issues and ensures that UAV operations are optimized and that operators are promptly informed of any device malfunctions or disconnections in view of improving decision-making and overall mission reliability.
[0029] Referring to Figure 1, a flow chart depicting workflow of a connected devices authentication system for UAV is illustrated.
[0030] The device disclosed herein includes a user-interface inbuilt in a computing unit of the system which is wirelessly associated with the UAV’s control unit. The computing unit include but not limited to a tablet, smartphone, or any other device with a display and user input capabilities such as touch or keyboard. The interface is developed to allow an operator of the UAV to provide real-time inputs to the system, including the type of operation for which the UAV is intended. These operations range from simple tasks, such as aerial photography, to more complex functions like crop spraying in agriculture or search and rescue missions.
[0031] Upon receiving the operator's input, the control unit processes the command to determine which critical devices are required for the operation. For example, if the UAV is to be used for spraying, the control unit identify that devices like pumps, flow sensors, and GPS modules are essential for the task. These decisions are based on the operator's command and the UAV's preset operational parameters stored in the system. The user interface facilitates communication between the operator and the UAV by displaying the necessary information, including the status of devices and whether any critical component is missing or malfunctioning. This allows the operator to make informed decisions and configure device parameters before flight. The computing unit typically uses high-performance embedded applications running on tablets or mobile devices that are compatible with the UAV’s control system. These devices often run on Android or iOS platforms, equipped with a custom application that supports device communication, data exchange, and user input functionalities.
[0032] The control unit is the brain of the UAV system and is built into the UAV itself that serves as the central processor for receiving commands from the computing unit, interpreting them, and executing the necessary actions to ensure the UAV functions correctly. This also acts as an interface between the user interface and the various connected devices on the UAV. When the operator inputs a command via the user interface, the control unit processes this information to identify the critical devices needed for the specific type of operation. This is crucial as different tasks require different sets of devices to be operational.
[0033] For example, if the UAV is tasked with mapping, the control unit recognize that sensors like a LiDAR and a camera are essential, along with GPS for georeferencing the images. If the task is spraying on crops, the control unit focus on ensuring that the spray pump, flow sensors, and GPS are functioning correctly. Once the control unit identifies the required devices, this ensures that the devices are connected, authenticated, and ready for operation. To manage the authentication and communication of devices, the control unit utilizes the Drone CAN protocol to interact with each device, retrieving Unique Identifiers (UIDs) and verifying their status.
[0034] The Drone CAN protocol is specifically developed for use in UAVs for ensuring communication between the control unit and the various devices connected to the UAV. This is based on the Controller Area Network (CAN) bus, which is widely used protocol in automotive and industrial systems due to its reliability and real-time data processing capabilities. In the case of UAVs, the Drone CAN protocol serves as the medium for transmitting UIDs from the devices such as GPS modules, ESCs (Electronic Speed Controllers), sensors, pumps, etc. to the control unit.
[0035] The Drone CAN protocol operates on a network where each device on the UAV is connected to the bus, each device having a unique identifier. This allows the control unit to retrieve the UID of each connected device by sending a request over the CAN bus. The devices respond by transmitting their UIDs, which are then checked against a pre-stored list of authorized UIDs stored within the system's database.
[0036] A communication module integrated within the control unit of the UAV serves as the essential bridge between the control unit and the various connected devices such as GPS modules, ESCs, sensors, pumps, and other peripherals on the UAV. This module enables the control unit to establish real-time communication with each device and retrieve critical data such as Unique Identifiers (UIDs), and validate the authenticity and functionality of these devices. The communication module is developed to operate within the UAV’s integrated control system, utilizing reliable, low-latency communication protocols to ensure fast and accurate data retrieval. Drone CAN (Controller Area Network) protocol is typically used to establish this connection that provide efficient means for devices to communicate with the control unit over a shared bus. The communication protocol includes but not limited to wireless options such as Wi-Fi (Wireless Fidelity) or Bluetooth for non-critical devices or wired connections such as the Drone CAN bus for critical components.
[0037] Upon powering on the UAV, the communication module initializes the Drone CAN protocol for establishing communication between the control unit and all connected devices. Devices connected to the UAV, such as GPS modules, ESCs, sensors, cameras, and spray pumps, are each linked to the control unit via the shared CAN bus or dedicated communication channels. Each device on the network is uniquely identified by its UID. The communication module is responsible for sending data requests to all connected devices to retrieve their UIDs. This is typically done using CAN message request, which prompts each device to respond with its specific UID. These UIDs act as identifiers that distinguish each device and allow the system to authenticate it against the database. Once the devices respond to the control unit’s request, the communication module relays the UIDs back to the control unit. The control unit then compares these UIDs with a pre-stored list of authorized UIDs stored in its database.
• Authorized UIDs: These are the UIDs that belong to trusted, pre-approved devices that are known to be functioning correctly and are safe to operate. For example, the GPS module with known UID is trusted to work with the UAV’s navigation system.
• Unauthorized UIDs: If the device sends a UID that does not match any entry in the authorized database, it is flagged as unauthorized. This is due to the use of a counterfeit device, a malfunctioning device, or a component that is not properly integrated into the UAV system.
[0038] If any of the devices fail to respond with a valid UID or if they provide an unauthorized UID, the communication module triggers a failure flag within the system. Devices that are not connected or that fail to transmit a valid UID are marked as such by the control unit. This status is then communicated to the user interface via the computing unit, displaying a specific pre-arm message. The pre-arm message notifies the operator about the issue with the device. For example, if the GPS module is not connected or a flow sensor is unauthorized, the message displays something like "GPS Module Not Connected" or "Unauthorized Flow Sensor Found". This message effectively prevents the UAV from arming, as the system do not allow the UAV to take off with critical components missing or unverified.
[0039] Before the UAV is armed for flight, the control unit performs a check to ensure that all critical devices are both connected and authorized. This involves retrieving the UIDs of critical components, such as the GPS module, ESCs, battery monitoring system, and sensors. If any critical device is missing, disconnected, or flagged as unauthorized, the control unit block the UAV from arming. This preemptive safety check ensures that the UAV is fully operational and that no component essential for safe flight is bypassed or malfunctioning. For example, if the GPS module is missing or unauthorized, the UAV's navigation system is compromised that leads to potential flight instability or mission failure. Similarly, if the ESCs (which control the motors) are not functioning or authenticated, the UAV is at risk of losing propulsion during flight. In such cases, the communication module ensures that the UAV is prevented from taking off by sending a command to the control unit to disable the arming sequence. The system then alerts the operator with a clear message indicating which specific device is causing the issue.
[0040] Once the device fails the validation process, the communication module triggers the pre-arm message on the user interface via the computing unit. The operator receives a visual and/or auditory notification that provide details about the specific device causing the issue. For example, a message such as “Unauthorized GPS Module detected” or “Sensor not connected” prompt the operator to take action before proceeding. This is essential in ensuring that the operator resolve any issues, whether it's reconnecting a device or replacing an unauthorized component, before attempting to take off. The user interface is developed to allow operators to quickly troubleshoot and address issues in order to minimize delays and ensuring safe flight operations.
[0041] The database integrated within the UAV’s control unit aids maintaining the integrity and safety of the UAV system by storing and managing the Unique Identifiers (UIDs) of all authorized devices connected to the UAV. This database acts as the central authority that verifies the authenticity of the devices in the system for ensuring that only legitimate and verified components are allowed to participate in flight operations. The database stores the list of pre-approved UIDs that correspond to various critical UAV components, such as the GPS modules, Electronic Speed Controllers (ESCs), sensors, pumps, and other integral parts. Each device, when connected to the UAV, provides unique UID that is compared against the entries in the authorized database. If the device’s UID is not found or if the device is flagged as unauthorized, the UAV is not allowed to arm and fly for preventing any potential safety or operational risks.
[0042] The database within the control unit is developed to be a high-performance and secure repository of all authorized UIDs for the UAV’s devices. The database is structured using a relational or key-value format where each entry is a device's UID associated with metadata, such as the device type, manufacturer details, version number, and other attributes. The database also includes additional fields for device status, indicating whether the device is active, inactive, or under maintenance. The database is pre-loaded with authorized UIDs at the time of the UAV's assembly or during maintenance/upgrades. Alternatively, the UAV support the ability to dynamically update the database as new devices are added, replaced, or upgraded by the operator. In both cases, the database serves as the single point of truth for validating connected devices. For example, consider the UAV's GPS module that have a specific UID (such as “12345-XYZ-GPS”), which is stored in the database along with other attributes such as the model and firmware version. Similarly, the ESCs have their own UIDs, and these are also cataloged in the same database.
[0043] When the UAV is powered on, the control unit sends requests to all connected devices via the communication module using the Drone CAN protocol. Each device responds with its UID, which the control unit forwards to the database for authentication. The database checks each UID against the list of authorized UIDs stored in it. If the device’s UID matches an entry in the database, this is deemed authorized, and the system continues with the rest of the validation checks for other devices. If the UID does not match or is absent, the device is flagged as unauthorized. For example, if a new GPS module is attached to the UAV and its UID is “98765-ABC-GPS,” but this UID is not found in the authorized database, the database immediately identifies it as unauthorized.
[0044] If any device sends a UID that does not match any entry in the authorized database, the device is flagged as unauthorized by the control unit. This triggers a sequence of actions developed to protect the UAV from operating with an unverified or potentially faulty component. The system then alerts the operator by displaying the pre-arm message on the user interface of the computing unit. This message specify which device is causing the issue, typically in the form of a clear warning like “Unauthorized GPS Module detected” or “Unauthorized ESC found.” The operator is prompted to resolve the issue before proceeding with flight. If the device is unauthorized, the system also prevents the UAV from arming and does not allow the UAV to take off until the issue is addressed. This is a safety feature to ensure that all devices meet the required standards and prevent any operational failure during flight.
[0045] When the operator receives a notification about an unauthorized device, the computing unit allows them to access the interface to take appropriate action. The management interface provides several options for the operator, such as;
• Authorization of the Device: If the operator is confident that the device is legitimate (such as it is a newly installed device that is to be authorized), they manually authorize the device. This involves the operator adding the device's UID to the authorized database using the system's interface.
• Reconnection or Replacement of the Device: If the device is malfunctioning or incorrectly installed (such as the GPS module is physically disconnected or damaged), the operator chooses to disconnect the device and either replace it or reconnect it properly to ensure it responds with the correct UID.
• Device Status Update: For devices that are not faulty but have a temporary issue (such as a sensor temporarily disconnected during maintenance), the operator updates the device status in the interface. This status update indicate that the device is under maintenance or currently inactive for allowing the system to recognize the device’s condition but not flag it as permanently unauthorized.
• For example, if the GPS module “98765-ABC-GPS” is new and the operator wants to authorize it, they log into the user interface and select option like “Authorize New Device.” The system prompts the operator to confirm that the device is legitimate and that its UID is added to the database.
[0046] Once the operator authorizes an unauthorized device, the database is updated in real-time to reflect the new device’s UID. This ensures that in future sessions, the device do not trigger unauthorized flag. The updated database is then synchronized with the control unit for ensuring that all subsequent UID checks are performed against the most current version of the database. In addition to manual updates, the UAV system allow for automatic database synchronization with remote databases especially in large-scale UAV fleets or commercial operations that allow the system to update the authorized UIDs periodically in view of ensuring that the UAV always has access to the latest device credentials.
[0047] Consider the UAV equipped with several components such as the GPS module, ESCs, sensors, and spray pump. The operator powers on the UAV and initiates the pre-flight check. The control unit sends UID requests to the connected devices but one of the ESCs responds with the UID that is not in the authorized list, likely as this was replaced recently or is counterfeit part. The database identifies this ESC as unauthorized and sends this information back to the control unit, which in turn triggers the pre-arm message on the computing unit. The message displayed rea as “Unauthorized ESC detected. UAV is not armed.” The operator, upon receiving the message check the management interface and determine that the ESC is new and needs to be authorized. They then proceed to add the UID of the new ESC to the authorized database via the user interface. Once the new ESC is authorized, the operator proceeds with a database update, and the system allow the UAV to arm and take off safely.
[0048] The system incorporates a battery that powers all electrical and electronically operated components, such as the control unit, communication module, and user-interface. This battery ensures continuous operation of the UAV’s authentication and safety systems, including UID retrieval, pre arm checks, and real-time alerts. By providing reliable power to the system's essential components, the battery enables functioning of the UAV, even during extended missions or remote operations. The battery also ensures that the system remains operational throughout preflight checks and real-time monitoring of device status, thereby supporting the overall safety, security, and reliability of UAV operations.
NON OBVIOUSNES
• Centralized UID-Based Authentication: Unlike traditional systems, this invention uses real-time authentication via the Drone CAN protocol for ensuring that only authorized devices are connected to the UAV for improving security and reliability.
• Dynamic Parameter-Driven Authorization: The system allows operators to authorize devices using configurable parameters, for avoiding the need for firmware updates or hardware modifications in view of offering greater flexibility.
• Pre-arm Safety Interlocks: The invention proactively prevents UAV operation if any device is unauthorized or disconnected, unlike traditional systems that detect issues only post-flight.
• Real-Time Device Status Alerts: Instead of vague warnings, the system gives specific alerts about unauthorized or disconnected devices for simplifying troubleshooting and enhancing user experience.
• Multi-GPS Configuration: The system allows operators to easily switch between single or dual GPS modules via simple parameters for offering operational flexibility without hardware changes.
• Scalability with Drone CAN: The use of the Drone CAN protocol ensures compatibility with various UAV components across different manufacturers that makes the system scalable and adaptable for both small drones and large industrial UAVs.
NOVELTY
• Real-Time UID Authentication: Uses the Drone CAN protocol for real-time, precise verification of connected devices for ensuring secure authentication, unlike traditional systems.
• Pre-arm Safety Mechanism: Prevents UAV operation if any critical device (GPS, ESC, pump) is unauthorized or disconnected for offering proactive safety measures not found in conventional systems.
• Configurable Device Authorization: Allows integration of new or replaced devices by resetting and storing UIDs through adjustable parameters for eliminating the need for firmware updates.
• Multi-GPS Configuration: Enables easy switching between one or two GPS modules using simple parameters for providing flexibility without hardware modifications.
• Real-Time Alerts: Provides specific, actionable pre-flight notifications for unauthorized or disconnected devices, making troubleshooting faster and more efficient.
• Drone CAN Integration: Fully integrates with the Drone CAN protocol for ensuring secure communication and compatibility across various UAV components and manufacturers.
INDUSTRIAL APPLICABILITY
• Agriculture: Ensures that essential devices like GPS, sensors, and pumps are authenticated before flight for reducing the risk of operational failures in tasks like spraying and seeding.
• Search and Rescue: Guarantees that all critical navigation and communication devices are functioning properly for ensuring reliable UAV operations in emergency missions.
• Commercial UAV Operations: Improves the efficiency and reliability of commercial drones used for mapping, surveying, and deliveries by ensuring that only authorized devices are used and providing real-time alerts for issues.
• Infrastructure Inspection: Ensures the safety and accuracy of UAVs used for inspecting bridges, towers, and pipelines by preventing operation with unauthorized or malfunctioning devices.
• Public Safety and Law Enforcement: Enhances UAV reliability for public safety applications, such as monitoring events or disaster response by ensuring all critical systems are authenticated and functional before takeoff.
• R&D and Aerospace: Enables integration of new or replacement parts into UAV systems for ensuring reliability during testing and research with real-time verification of device functionality.
ADVANTAGES
• Enhanced Security: The real-time UID authentication via the Drone CAN protocol ensures that only authorized devices are connected to the UAV, significantly reducing the risk of using counterfeit, tampered, or malfunctioning components which enhances overall system security.
• Improved Safety: The pre-arm safety mechanism prevents the UAV from taking off if any critical device (such as GPS, ESC, or sensors) is unauthorized or disconnected. This proactive measure reduces the chances of in-flight failures and ensures that all essential systems are functioning properly before takeoff.
• Operational Reliability: The continuous verification of connected devices ensures that only properly authenticated devices are used during flight. This leads to more reliable UAV operations by preventing unexpected device failures or malfunctions during critical tasks.
• Faster Integration of New Devices: The system allows for easy authorization of new or replaced devices using configurable parameters, which simplifies integration and eliminates the need for complex firmware updates or hardware modifications, saving time and reducing downtime.
• Real-Time Alerts for Quick Troubleshooting: The system provides specific, actionable alerts for unauthorized or disconnected devices before takeoff, helping operators quickly identify and address issues. This reduces troubleshooting time and increases the efficiency of UAV operations.
• Scalability and Flexibility: The system’s compatibility with the Drone CAN protocol ensures this is easily integrated with a wide range of UAV components which makes this scalable for various types of drones and applications from small commercial drones to large industrial UAVs without requiring major changes to the existing infrastructure.
[0049] The present invention works best in the following manner, where the operator accesses the user interface on the computing unit, that is wirelessly connected to the UAV’s control unit. The operator inputs the desired type of operation for the UAV, and the control unit processes these inputs to identify the critical devices required for that operation. The control unit then activates the communication module to establish connections with the devices via the Drone CAN protocol and retrieves the Unique Identifiers (UIDs) of each connected device. Each UID is cross-referenced with stored list of authorized UIDs in the database. If the device fails to provide valid UID, this is flagged as not connected and pre-arm message is displayed to the operator for preventing the UAV from arming. If any device provides the unauthorized UID, this is flagged as unauthorized and the notification is displayed on the computing unit. In case any critical device is missing or disconnected, the control unit blocks the UAV from taking off for ensuring operational safety. The system also allows the operator to access the interface to configure device parameters and authorize previously unauthorized devices and the battery powers the entire system for ensuring that all components are functioning properly throughout the process.
[0050] Although the field of the invention has been described herein with limited reference to specific embodiments, this description is not meant to be construed in a limiting sense. Various modifications of the disclosed embodiments, as well as alternate embodiments of the invention, will become apparent to persons skilled in the art upon reference to the description of the invention. , Claims:1) A connected devices authentication system for UAV, comprising:
i) a user-interface inbuilt in a computing unit wirelessly associated with said system for enabling an operator of an UAV (unmanned aerial vehicle) to give input commands regarding type of operation for which said UAV is to be used, wherein a control unit inbuilt in said UAV and wirelessly linked with said computing unit processes said input commands to determine critical devices for said type of operation;
ii) a communication module integrated with said control unit for establishing connection between said control unit and devices connected with said UAV for allowing retrieval of UID (Unique Identifier) of each of said devices, wherein in case, any of said device fail to provide UID, said device is flagged as not connected in said system and said control unit directs said computing unit for displaying specific pre-arm message to prevent arming of said UAV by said operator;
iii) a database linked with said control unit and stored with UIDs of authorized devices, wherein in case any of said device sends UID that is not stored in said database, said device is flagged as unauthorized and a message is displayed on said computing unit for said operator regarding said unauthorized device.
2) The system as claimed in claim 1, wherein Drone CAN protocol for establishing connection between said control unit and said devices.
3) The system as claimed in claim 1, wherein in case any of said critical device is not collected, said control unit blocks UAV to take-off.
4) The system as claimed in claim 1, wherein said computing unit is accessed by said operator for managing and configuring device parameters to authorized previously unauthorized devices.
5) The system as claimed in claim 1, wherein a battery is associated with said system for supplying power to electrical and electronically operated components associated with said system.
| # | Name | Date |
|---|---|---|
| 1 | 202511001897-STATEMENT OF UNDERTAKING (FORM 3) [08-01-2025(online)].pdf | 2025-01-08 |
| 2 | 202511001897-REQUEST FOR EARLY PUBLICATION(FORM-9) [08-01-2025(online)].pdf | 2025-01-08 |
| 3 | 202511001897-PROOF OF RIGHT [08-01-2025(online)].pdf | 2025-01-08 |
| 4 | 202511001897-POWER OF AUTHORITY [08-01-2025(online)].pdf | 2025-01-08 |
| 5 | 202511001897-FORM-9 [08-01-2025(online)].pdf | 2025-01-08 |
| 6 | 202511001897-FORM FOR SMALL ENTITY(FORM-28) [08-01-2025(online)].pdf | 2025-01-08 |
| 7 | 202511001897-FORM FOR SMALL ENTITY [08-01-2025(online)].pdf | 2025-01-08 |
| 8 | 202511001897-FORM 1 [08-01-2025(online)].pdf | 2025-01-08 |
| 9 | 202511001897-FIGURE OF ABSTRACT [08-01-2025(online)].pdf | 2025-01-08 |
| 10 | 202511001897-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [08-01-2025(online)].pdf | 2025-01-08 |
| 11 | 202511001897-EVIDENCE FOR REGISTRATION UNDER SSI [08-01-2025(online)].pdf | 2025-01-08 |
| 12 | 202511001897-DRAWINGS [08-01-2025(online)].pdf | 2025-01-08 |
| 13 | 202511001897-DECLARATION OF INVENTORSHIP (FORM 5) [08-01-2025(online)].pdf | 2025-01-08 |
| 14 | 202511001897-COMPLETE SPECIFICATION [08-01-2025(online)].pdf | 2025-01-08 |
| 15 | 202511001897-MSME CERTIFICATE [18-03-2025(online)].pdf | 2025-03-18 |
| 16 | 202511001897-FORM28 [18-03-2025(online)].pdf | 2025-03-18 |
| 17 | 202511001897-FORM 18A [18-03-2025(online)].pdf | 2025-03-18 |
| 18 | 202511001897-FER.pdf | 2025-04-01 |
| 19 | 202511001897-FORM-8 [29-09-2025(online)].pdf | 2025-09-29 |
| 20 | 202511001897-FER_SER_REPLY [29-09-2025(online)].pdf | 2025-09-29 |
| 21 | 202511001897-DRAWING [29-09-2025(online)].pdf | 2025-09-29 |
| 22 | 202511001897-CORRESPONDENCE [29-09-2025(online)].pdf | 2025-09-29 |
| 23 | 202511001897-US(14)-HearingNotice-(HearingDate-07-01-2026).pdf | 2025-10-23 |
| 1 | 202511001897_SearchStrategyNew_E_SearchHistoryE_27-03-2025.pdf |