Sign In to Follow Application
View All Documents & Correspondence

System And Method For Authorizing A Flight Of An Unmanned Aerial Vehicle (Uav)

Abstract: System and method are disclosed for authorizing a flight of an unmanned aerial vehicle (UAV). According to an embodiment, a system for authorizing a flight of the UAV includes anauthorization unit. The authorization unit includes a processor to execute set of instructions to: receive a plurality of attributes from a computing device associated with the UAV; compare a first set of attributes selected from the plurality of attributes with a first dataset comprising a set of authentication attributes of one or more users to authenticate the user; and responsive to positive authentication of the user, compare a second set of attributes selected from the plurality of attributes with a second dataset comprising one or more attributes associated with allowable conditions for the flight of the UAV, wherein the flight of the UAV is authorized if each of the second set of attributes is within the allowable conditions for the flight of the UAV.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
03 September 2019
Publication Number
38/2020
Publication Type
INA
Invention Field
MECHANICAL ENGINEERING
Status
Email
info@khuranaandkhurana.com
Parent Application
Patent Number
Legal Status
Grant Date
2022-03-29
Renewal Date

Applicants

Skylark Drones Private Limited
Skylark Drones, IKP Eden, 16, Bhuvanappa Layout, Tavarekere Main Rd, Bengaluru-560029, Karnataka, India.

Inventors

1. GOEL, Sidhant
3646, Tel Mandi, Pahar Ganj, New Delhi – 110055, India.
2. MOODBIDRI, Nihal Mohan
#2, Panchajanya, 5th Cross, Basavanapura Main Road, Nisarga Layout, KR Puram, Bangalore-36, Karnataka, India.

Specification

Claims:1. A system for authorizing a flight of an unmanned aerial vehicle (UAV), said system comprising:
anauthorizationunit configured with the UAV to enable flight of the UAV, the permission unit comprising a processor coupled to a memory, the memory storing a set of instructions executable by the processor to:
receive a plurality of attributes from a computing device associated with the UAV;
compare a first set of attributes selected from the plurality of attributes with a first dataset comprising a set of authentication attributes of one or more users to authenticate the user; and
responsive to positive authentication of the user, compare a second set of attributes selected from the plurality of attributes with a second dataset comprising one or more attributes associated with allowable conditions for the flight of the UAV,
wherein the flight of the UAV is authorized if each of the second set of attributes is within the allowable conditions for the flight of the UAV.
2. The system as claimed in claim 1, wherein the processor configured to compare a third set of attributes selected from the plurality of attributes with a third dataset comprising a set of authentication attributes of one or more UAVs to authenticate the UAV, wherein the third set of attributes comprises any or a combination of a unique identifier associated with the UAV and registration parameters of the UAV.
3. The system as claimed in claim 1, wherein the authorizationunit is detachable from the UAV, and wherein the flight of the UAV is enabled when the authorization unit is attached to the UAV.
4. The system as claimed in claim 1, wherein a permission artefact is stored on the authorization unit, and wherein the permission artefact is cryptographically signed to enhance integrity of the permission artefact.
5. The system as claimed in claim 4, wherein the permission artefact comprises any or a combination of the first dataset, the second dataset and the third dataset.
6. The system as claimed in claim 1, wherein the first set of attributes comprises any or a combination of biometrics of the user, a unique identifier associated with the user and registration parameters of the user.
7. The system as claimed in claim 1, wherein the second set of attributes comprises any or a combination of location, flight path, an altitude of flight, time duration of flight, time window of flight and speed of flight.
8. The system as claimed in claim 1, wherein the authorization unit comprises a communication unit operatively coupled to a server for communication of a plurality of attributes from the UAV to the server.
9. A method for authorizing a flight of an unmanned aerial vehicle (UAV), said method comprising:
receiving, by a processor of the UAV, a plurality of attributes from a computing device associated with the UAV;
comparing, by the processor, a first set of attributes selected from the plurality of attributes with a first dataset comprising a set of authentication attributes of one or more users to authenticate the user; and
responsive to positive authentication of the user, comparing, by the processor, a second set of attributes selected from the plurality of attributes with a second dataset comprising one or more attributes associated with allowable conditions for the flight of the UAV, wherein the flight of the UAV is authorized if each of the second set of attributes is within the allowable conditions for the flight of the UAV.
10. An unmanned aerial vehicle (UAV) comprising:
an authorization unit configured with the UAV to enable flight of the UAV, the permission unit comprising a processor coupled to a memory, the memory storing a set of instructions executable by the processor to:
receive a plurality of attributes from a computing device associated with the UAV;
compare a first set of attributes selected from the plurality of attributes with a first dataset comprising a set of authentication attributes of one or more users to authenticate the user; and
responsive to positive authentication of the user, compare a second set of attributes selected from the plurality of attributes with a second dataset comprising one or more attributes associated with allowable conditions for the flight of the UAV,
wherein the flight of the UAV is authorized if each of the second set of attributes is within the allowable conditions for the flight of the UAV.
, Description:TECHNICAL FIELD
[001] The present disclosure relates to the field of aviation technology. More particularly, the present disclosure relates to systems and method for authorizing flight of unmanned aerial vehicle (UAV).

BACKGROUND
[002] Background description includes information that may be useful in understanding the present invention. It is not an admission that any of the information provided herein is prior art or relevant to the presently claimed invention, or that any publication specifically or implicitly referenced is prior art.
[003] As drones become very common, the likelihood of the drones being used for the malicious objective of breach of personal or private space of an individual is more prone. Also,an increase in thenumber of instances of a droneinadvertently or intentionally flying into restricted air space can be observed. The restricted airspace can include but are not limited to airports, airplane flight paths, no-fly zones, buildings/skyscrapers, military reservations, stadiums, private property, and other geographic boundaries.However, presently, there are no systems that effectively prevent or otherwise restrict a drone from flying into restricted air space.
[004] As more and more people are becoming aware of drone devices, there is a considerable increase inthe number of drone enthusiast. Drones can be flown or operated from a distant location therefore, it is not easy to track the person controlling the drone. Hence, the drones can be used by anyone for malicious purposes such as stalking. also, Currently, there is no system in place for authorizing flight request for an unmanned aerial vehicle (UAVs) that can help regulate flying of the UAVs.
[005] Efforts have been made in the past to overcome the problem associated with restrictions to flight of the UAVs. However, the existing solutions require the UAVs to be in constant network connection to enable them to transmit their real-time location to a server and when the UAV tries to enter a restricted area the flite of the UAV is restricted. Further, the administrative checks of checking identification of the UAV and/or the user flying the UAV is also performed at the server. Thus, there is a huge scope to manipulate the permissions and also, there is a scope of obtaining malicious permissions to fly to the restricted area. Further, existing techniques are based on restriction of flight by defining various zones as no-fly zone and thus fails to restrict UAV mischievous or malicious objectives such as stalking or entering someone private space without any prior permission.
[006] There is therefore, a need in the art to provide a system and methodthat overcome the above-mentioned and other limitations of the existing solutions and utilize techniques, which are, robust, accurate, efficient, cost-effective, and easy to implement that can help authorize flight requests for every UAVs before the UAVs can take off. Further, the system and method are required that does not require communication between the UAV and central server for the authorization of the flight.
[007] All publications herein are incorporated by reference to the same extent as if each individual publication or patent application were specifically and individually indicated to be incorporated by reference. Where a definition or use of a term in an incorporated reference is inconsistent or contrary to the definition of that term provided herein, the definition of that term provided herein applies and the definition of that term in the reference does not apply.
[008] In some embodiments, the numbers expressing quantities or dimensions of items, and so forth, used to describe and claim certain embodiments of the invention are to be understood as being modified in some instances by the term “about.” Accordingly, in some embodiments, the numerical parameters set forth in the written description and attached claims are approximations that can vary depending upon the desired properties sought to be obtained by a particular embodiment. In some embodiments, the numerical parameters should be construed in light of the number of reported significant digits and by applying ordinary rounding techniques. Notwithstanding that the numerical ranges and parameters setting forth the broad scope of some embodiments of the invention are approximations, the numerical values set forth in the specific examples are reported as precisely as practicable. The numerical values presented in some embodiments of the invention may contain certain errors necessarily resulting from the standard deviation found in their respective testing measurements.
[009] The recitation of ranges of values herein is merely intended to serve as a shorthand method of referring individually to each separate value falling within the range. Unless otherwise indicated herein, each individual value is incorporated into the specification as if it were individually recited herein. All methods described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The use of any and all examples, or exemplary language (e.g. “such as”) provided with respect to certain embodiments herein is intended merely to better illuminate the invention and does not pose a limitation on the scope of the invention otherwise claimed. No language in the specification should be construed as indicating any non-claimed element essential to the practice of the invention.
[0010] Groupings of alternative elements or embodiments of the invention disclosed herein are not to be construed as limitations. Each group member can be referred to and claimed individually or in any combination with other members of the group or other elements found herein. One or more members of a group can be included in, or deleted from, a group for reasons of convenience and/or patentability. When any such inclusion or deletion occurs, the specification is herein deemed to contain the group as modified thus fulfilling the written description of all groups used in the appended claims.

OBJECTS OF THE PRESENT DISCLOSURE
[0011] Some of the objects of the present disclosure, which at least one embodiment herein satisfies are as listed hereinbelow.
[0012] It is an object of the present disclosure to provide system and method for authorizing every flight of an unmanned aerial vehicle (UAV).
[0013] It is another object of the present disclosure to provide system and method for authorizing flight of UAV that does not require network connection between the UAV and central server for obtaining authorization for the flight.
[0014] It is another object of the present disclosure to provide system and method for authorizing flight of UAV that assists in regulating flying of the UAVs.
[0015] It is another object of the present disclosure to provide system and method for authorizing flight of UAV that can log the details of the flight that includes breach of allowable conditions.
[0016] It is another object of the present disclosure to provide system and method for authorizing flight of UAV that can be provided a detachable component that enables the flight of the UAV only when the component is attached to the UAV.
[0017] It is another object of the present disclosure to provide UAV for authorizing flight.
[0018] It is another object of the present disclosure to provide system and method for authorizing flight of UAV that is cost-efficient and easy to implement.


SUMMARY
[0019] The present disclosure relates to the field of aviation technology. More particularly, the present disclosure relates to systems and method for authorizing flight of unmanned aerial vehicle (UAV).
[0020] An aspect of the present disclosure provides a system for authorizing a flight of an unmanned aerial vehicle (UAV), the system includes:an authorization unit configured with the UAV to enable flight of the UAV, the permission unit comprising a processor coupled to a memory, the memory storing a set of instructions executable by the processor to:receive a plurality of attributes from a computing device associated with the UAV;compare a first set of attributes selected from the plurality of attributes with a first dataset comprising a set of authentication attributes of one or more users to authenticate the user; andresponsive to positive authentication of the user, compare a second set of attributes selected from the plurality of attributes with a second dataset comprising one or more attributes associated with allowable conditions for the flight of the UAV,wherein the flight of the UAV is authorized if each of the second set of attributes is within the allowable conditions for the flight of the UAV.
[0021] In an embodiment, the processor configured to compare a third set of attributes selected from the plurality of attributes with a third dataset comprising a set of authentication attributes of one or more UAVs to authenticate the UAV, wherein the third set of attributes comprises any or a combination of a unique identifier associated with the UAV and registration parameters of the UAV.
[0022] In an embodiment, the authorization unit is detachable from the UAV, and wherein the flight of the UAV is enabled when the authorization unit is attached to the UAV.
[0023] In an embodiment, a permission artefact is stored on the authorization unit, and wherein the permission artefact is cryptographically signed to enhance integrity of the permission artefact.
[0024] In an embodiment, the permission artefact comprises any or a combination of the first dataset, the second dataset, and the third dataset.
[0025] In an embodiment, the first set of attributes comprises any or a combination of biometrics of the user, a unique identifier associated with the user and registration parameters of the user.
[0026] In an embodiment, the second set of attributes comprises any or a combination of location, flight path, an altitude of flight, time duration of flight, time window of flight and speed of flight.
[0027] In an embodiment, the authorization unit comprises a communication unit operatively coupled to a server for communication of a plurality of attributes from the UAV to the server.
[0028] Another aspect of the present disclosure provides a method for authorizing a flight of an unmanned aerial vehicle (UAV), the method includes:receiving, by a processor of the UAV, a plurality of attributes from a computing device associated with the UAV;comparing, by the processor, a first set of attributes selected from the plurality of attributes with a first dataset comprising a set of authentication attributes of one or more users to authenticate the user; andresponsive to positive authentication of the user, comparing, by the processor, a second set of attributes selected from the plurality of attributes with a second dataset comprising one or more attributes associated with allowable conditions for the flight of the UAV, wherein the flight of the UAV is authorized if each of the second set of attributes is within the allowable conditions for the flight of the UAV.
[0029] Yet another aspect of the present disclosure provides a unmanned aerial vehicle (UAV) comprising:an authorization unit configured with the UAV to enable flight of the UAV, the permission unit comprising a processor coupled to a memory, the memory storing a set of instructions executable by the processor to:receive a plurality of attributes from a computing device associated with the UAV;compare a first set of attributes selected from the plurality of attributes with a first dataset comprising a set of authentication attributes of one or more users to authenticate the user; andresponsive to positive authentication of the user, compare a second set of attributes selected from the plurality of attributes with a second dataset comprising one or more attributes associated with allowable conditions for the flight of the UAV,wherein the flight of the UAV is authorized if each of the second set of attributes is within the allowable conditions for the flight of the UAV.

BRIEF DESCRIPTION OF THE DRAWINGS
[0030] In the figures, similar components and/or features may have the same reference label. Further, various components of the same type may be distinguished by following the reference label with a second label that distinguishes among the similar components. If only the first reference label is used in the specification, the description is applicable to any one of the similar components having the same first reference label irrespective of the second reference label.
[0031] FIG. 1 illustrates an exemplary network architecture in which or with which proposed system can be implemented in accordance with an embodiment of the present disclosure.
[0032] FIG. 2 illustrates an exemplary functional component of a system in accordance with an embodiment of the present disclosure.
[0033] FIG. 3 is a flow diagram illustrating a process for authorizing flight of the UAV in accordance with an embodiment of the present disclosure.
[0034] FIG. 4 illustrates an exemplary UAV system with detachable authorization unit in accordance with an embodiment of the present disclosure.

DETAILED DESCRIPTION
[0035] The following is a detailed description of embodiments of the disclosure depicted in the accompanying drawings. The embodiments are in such detail as to clearly communicate the disclosure. However, the amount of detail offered is not intended to limit the anticipated variations of embodiments; on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the present disclosure as defined by the appended claims.
[0036] If the specification states a component or feature “may”, “can”, “could”, or “might” be included or have a characteristic, that particular component or feature is not required to be included or have the characteristic. As used in the description herein and throughout the claims that follow, the meaning of “a,” “an,” and “the” includes plural reference unless the context clearly dictates otherwise. Also, as used in the description herein, the meaning of “in” includes “in” and “on” unless the context clearly dictates otherwise.
[0037] The present disclosure relates to the field of aviation technology. More particularly, the present disclosure relates to systems and method for authorizing flight of unmanned aerial vehicle (UAV).
[0038] An aspect of the present disclosure provides a system for authorizing a flight of an unmanned aerial vehicle (UAV), the system includes: an authorization unit configured with the UAV to enable flight of the UAV, the permission unit comprising a processor coupled to a memory, the memory storing a set of instructions executable by the processor to: receive a plurality of attributes from a computing device associated with the UAV; compare a first set of attributes selected from the plurality of attributes with a first dataset comprising a set of authentication attributes of one or more users to authenticate the user; and responsive to positive authentication of the user, compare a second set of attributes selected from the plurality of attributes with a second dataset comprising one or more attributes associated with allowable conditions for the flight of the UAV, wherein the flight of the UAV is authorized if each of the second set of attributes is within the allowable conditions for the flight of the UAV.
[0039] In an embodiment, the processor configured to compare a third set of attributes selected from the plurality of attributes with a third dataset comprising a set of authentication attributes of one or more UAVs to authenticate the UAV, wherein the third set of attributes comprises any or a combination of a unique identifier associated with the UAV and registration parameters of the UAV.
[0040] In an embodiment, the authorization unit is detachable from the UAV, and wherein the flight of the UAV is enabled when the authorization unit is attached to the UAV.
[0041] In an embodiment, a permission artefact is stored on the authorization unit, and wherein the permission artefact is cryptographically signed to enhance integrity of the permission artefact.
[0042] In an embodiment, the permission artefact comprises any or a combination of the first dataset, the second dataset, and the third dataset.
[0043] In an embodiment, the first set of attributes comprises any or a combination of biometrics of the user, a unique identifier associated with the user and registration parameters of the user.
[0044] In an embodiment, the second set of attributes comprises any or a combination of location, flight path, an altitude of flight, time duration of flight, time window of flight and speed of flight.
[0045] In an embodiment, the authorization unit comprises a communication unit operatively coupled to a server for communication of a plurality of attributes from the UAV to the server.
[0046] Another aspect of the present disclosure provides a method for authorizing a flight of an unmanned aerial vehicle (UAV), the method includes: receiving, by a processor of the UAV, a plurality of attributes from a computing device associated with the UAV; comparing, by the processor, a first set of attributes selected from the plurality of attributes with a first dataset comprising a set of authentication attributes of one or more users to authenticate the user; and responsive to positive authentication of the user, comparing, by the processor, a second set of attributes selected from the plurality of attributes with a second dataset comprising one or more attributes associated with allowable conditions for the flight of the UAV, wherein the flight of the UAV is authorized if each of the second set of attributes is within the allowable conditions for the flight of the UAV.
[0047] Yet another aspect of the present disclosure provides a unmanned aerial vehicle (UAV) comprising: an authorization unit configured with the UAV to enable flight of the UAV, the permission unit comprising a processor coupled to a memory, the memory storing a set of instructions executable by the processor to: receive a plurality of attributes from a computing device associated with the UAV; compare a first set of attributes selected from the plurality of attributes with a first dataset comprising a set of authentication attributes of one or more users to authenticate the user; and responsive to positive authentication of the user, compare a second set of attributes selected from the plurality of attributes with a second dataset comprising one or more attributes associated with allowable conditions for the flight of the UAV, wherein the flight of the UAV is authorized if each of the second set of attributes is within the allowable conditions for the flight of the UAV.
[0048] FIG. 1 illustrates an exemplary network architecture in which or with which proposed system can be implemented in accordance with an embodiment of the present disclosure.
[0049] In an aspect, network implementation 100 comprises a system 102 that can be implemented in any computing device that can be configured/operatively coupled with a server 112. Further, a plurality of unmanned aerial vehicles (UAVs) 106-1, 106-2…..106-N (collectively referred to as UAVs 106 and individually referred to as UAV 106 hereinafter) can be communicatively coupled with the system 102 through a network 104. The UAVs 106 can include drones, aircraft and the like.
[0050] Further, the network 104 can be a wireless network, a wired network or a combination thereof. The network 104 can be implemented as one of the different types of networks, such as an intranet, local area network (LAN), wide area network (WAN), the internet, Wi-Fi, LTE network, CDMA network, and the like. Further, the network 106 can either be a dedicated network or a shared network. The shared network represents an association of the different types of networks that use a variety of protocols, for example, Hypertext Transfer Protocol (HTTP), Transmission Control Protocol/Internet Protocol (TCP/IP), Wireless Application Protocol (WAP), and the like, to communicate with one another. Further the network 106 can include a variety of network devices, including routers, bridges, servers, computing devices, storage devices, and the like.
[0051] Further, the UAVs 106 can be operatively coupled to a plurality of the computing devices 108-1, 108-2…….108-N (which are collectively referred to as computing devices 108 and individually referred to as computing device 108 hereinafter). The computing devices 108 can include a variety of computing systems, including but not limited to, a laptop computer, a desktop computer, a notebook, a workstation, a portable computer, a personal digital assistant, a handheld device and a mobile device.
[0052] Further, a plurality of users 110-1, 110-2……110-N (which are collectively referred to as users110 and individually referred to as user 110 hereinafter) can interact with the UAVs 106 using their respective computing device 108. In an embodiment, the UAVs 106 can be operatively coupled to the computing devices 108 through the network 104.
[0053] In an embodiment, the system 102 can enable registration of the user 110. The registration can be based on details such as name, address, e-mail address, phone number, and the like. Also, the system 102 can utilize a unique identifier such as PAN card, Aadhar Card, Voter ID, and the like, provided by the user 110, to verify the authenticity of the user 110. Also, in an embodiment, said unique identifier can avoid multiplicity of registration of the same user.
[0054] In an aspect, while registration, the system 102 can require the user 108 to enter his/her physical address/location or the system 102 can retrieve the current location of the user 110 by retrieving current location of the computing device 108 of the respective user 110. It would be appreciated by the one skilled in the art that the location of the computing device 108 of the user 110 can be tracked using any or a combination of tracking technologies such as Geographic Information Systems (GIS), Global Positioning System (GPS), Radio Frequency Identification (RFID), Wireless Local Area Network (WLAN) and the like.
[0055] In an embodiment, the system 102 can be implemented on the UAV 106 such that the embodiments of the present disclosure can help authorization of flight of the UAV.In an embodiment, the system 102 includes anauthorization unit (not shown). In an embodiment, the authorization unit can be incorporatedwith the UAV 106 at the time of manufacturing of the UAV 106. In another embodiment, the authorization unit can be implemented such that the authorization unit is detachable from the UAV 106. The authorization unit can be used for authorizing a request pertaining to the flight of the UAV 106. In an embodiment, the authorization unit can comprise permission artefact. The permission artefact can include libraries comprising various permissions or authentication information that can be stored on the authorization unit. In an embodiment, if the authorization unit is detached from the UAV 106, the UAV 106 cannot initiate authorization request for flying. Hence, the UAV 106 can not fly.
[0056] In an embodiment, the authorization unit can be configured to receive a plurality of attributes from the computing device 108. The plurality of attributes can be received as a set of data packets being sent by the computing devices 108. A first set of attributes is selected from the plurality of attributes. The first set of attributes can include but not limited to biometrics of the user 110, a unique identifier associated with the user 110 and registration parameters of the user 110. Further, the first set of attributes is compared or matched with a first dataset. The first dataset comprises a set of authentication attributes of one or more users. In response to the positive authentication of the user 110, a second set of attributes is selected from the plurality of attributes. The second set of attributes is compared or matched with a second dataset to authenticate a request for flight. The second set of attributes comprises but not limited to location, flight path, altitude of flight, time duration of flight, time window of flight and speed of flight. The second dataset comprises one or more attributes associated with allowable conditions for the flight of the UAV 106. Now, based on comparison,if each of the second set of attributes is within allowable conditions, the flight of the UAV 106 is authorized else the flight of the UAV is denied.
[0057] Further, a third set of attributes is also selected from the plurality of attributes.The third set of attributes comprises a unique identifier associated with the UAV 106 and registration parameters of the UAV 106. The third dataset comprises a set of authentication attributes of one or more UAVs 106.
[0058] In an embodiment, the permission artefact can be cryptographically signed. The cryptographically signed permission artefact can be used for enhancing integrity of the permission artefact. Thus, data or information contained in the permission artefact is secure and the data can not be modified to provide anomalous or malicious permission or authorization to the UAV.
[0059] It would be appreciated by the person skilled in the art that the cryptography as encryption means is provided. However, other encryption means can also be used for encryption and decryption of data or information is well within the scope of the invention.In an aspect, the system 102 can store the first data set, the second data set and the third data set in a database that can be internally or externally coupled with the system 102. It would be appreciated that the database can be present on a cloud/ server.
[0060] FIG. 2 illustrates an exemplary functional component of a system in accordance with an embodiment of the present disclosure.
[0061] As illustrated system 102 can include one or more processor(s) 202. Processor(s) 202 can be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, logic circuitries, and/or any devices that manipulate data based on operational instructions. Among other capabilities, processor(s) 202 are configured to fetch and execute computer-readable instructions stored in a memory 204 of system 102. Memory 204 can store one or more computer-readable instructions or routines, which may be fetched and executed to create or share the data units over a network service. Memory 204 can include any non-transitory storage device including, for example, volatile memory such as RAM, or non-volatile memory such as EPROM, flash memory, and the like. In an example embodiment, memory 204 may be a local memory or may be located remotely, such as a server, a file server, a data server, and the Cloud.
[0062] System 102 can also include one or more interface(s) 206. Interface(s) 206 may include a variety of interfaces, for example, interfaces for data input and output devices, referred to as I/O devices, storage devices, and the like. Interface(s) 206 may facilitate communication of system 102 with various devices coupled to system 102. Interface(s) 206 may also provide a communication pathway for one or more components of system 102. Examples of such components include, but are not limited to, processing engine(s) 208 and database 210.
[0063] Processing engine(s) 208 can be implemented as a combination of hardware and software or firmware programming (for example, programmable instructions) to implement one or more functionalities of engine(s) 208. In the examples described herein, such combinations of hardware and software or firmware programming may be implemented in several different ways. For example, the programming for the engine(s) may be processor-executable instructions stored on a non-transitory machine-readable storage medium and the hardware for engine(s) 208 may include a processing resource (for example, one or more processors), to execute such instructions. In the examples, the machine-readable storage medium may store instructions that, when executed by the processing resource, implement engine(s) 208. In such examples, system 102 can include the machine-readable storage medium storing the instructions and the processing resource to execute the instructions, or the machine-readable storage medium may be separate but accessible to system 102 and the processing resource. In other examples, processing engine(s) 208 may be implemented by electronic circuitry. Database 210 can include data that is either stored or generated as a result of functionalities implemented by any of the components of processing engine(s) 208.
[0064] In an example, processing engine(s) 208 can include anauthentication engine 212, anauthorization engine 214, a communication engine 216and other engine(s) 218. Other engine(s) 218 can implement functionalities that supplement applications or functions performed by system 102 or processing engine(s) 208.
[0065] In an embodiment, the authentication engine 212 can be used for receiving the plurality of attributes from the computing devices associated with the UAVs. The plurality of attributes can be received as a set of data packets. The data packets received can be processed to retrieve a first set of attributes. The first set of attributes are selected from the plurality of attributes.
[0066] In an embodiment, the first set of attributes is compared or matched with a first data set to authenticate the user. The first set of attributes can include but not limited to biometrics of the user, a unique identifier associated with the user and registration parameters of the user. Further, the first set of attributes is compared or matched with a first dataset. The first dataset comprises a set of authentication attributes of one or more users.
[0067] In an embodiment, by authentication of the user, it could be made sure that the user is authenticated as a registered user. In case if the user is not authenticated the authentication engine 212 could provide an option to the user to register themselves. Further, if the user is authenticated, the authentication engine selects a third set of attributes from the plurality of attributes. The third set of attributes is compared or matched with the third data set to authenticate the UAV. The third set of attributes comprises a unique identifier associated with the UAVand registration parameters of the UAV. The third dataset comprises a set of authentication attributes of one or more UAVs.
[0068] In an embodiment, the authentication engine 212 can enable registration of the user. The registration can be based on details such as name, address, e-mail address, phone number, and the like. Also, the authentication engine 212can utilize a unique identifier such as PAN card, Aadhar Card, Voter ID, and the like, provided by the user, to verify the authenticity of the user. Also, in an embodiment, said unique identifier can avoid multiplicity of registration of the same user. In an aspect, while registration, the authentication engine 212 can require the user to enter his/her physical address/location or the authentication engine 212 can retrieve the current location of the user.
[0069] In an embodiment, the authorization engine 214 can be used for authorization of a request for flight by the UAVs. In response to positive authentication of the user and/or the UAV, the authorization engine 214 can process the received data packets to select a second set of attributes from the plurality of attributes. the second set of attributes is compared with a second dataset. The second set of attributes is compared or matched with a second dataset to authenticate a request for flight. The second set of attributes comprises but not limited to location, flight path, the altitude of flight, time duration of flight, time window of flight and speed of flight. The second dataset comprises one or more attributes associated with allowable conditions for the flight of the UAV. Now, based on comparison, if each of the second set of attributes is within allowable conditions, the flight of the UAV 106 is authorized else the flight of the UAV is denied.
[0070] In an embodiment, the second set of attributes provides a range of threshold values that can be used for defining allowable conditions for authorizing the request for the flight of the UAV. The allowable conditions can be defined as threshold conditions that help to determine a flight path, height of the UAV, the time duration the permission is being requested,time window (time of day) the UAV requests to fly and the like.
[0071] The allowable conditions can be defined as predefined thresholds for the second set of attributes. Now, when the second set of attributes is compared or matched with the second dataset and the threshold level or value for at least one of the plurality of attributes is breached, thus the flight of the UAV is not authorized. For example, if the request is received for the flight of the UAV near an army installation, then in such case due to privacy concerns the threshold for location is breached, therefore, the request for flight of the UAV is denied.
[0072] For example, if the request is received for the flight of UAV where the height of the flight path is very close to the ground, then in such a case due to public safety concern the threshold for flight path is breached, therefore, the request for flight of the UAV is denied.
[0073] In an embodiment, the communication 216 unit can be configured to send or receive data packets of information to and from the central server after a preconfigured time period. The data packets of information to the server can include any or a combination of a current GPS location of the UAV, a height of the UAV, flight path that the UAV followed, and the like. The data packets of information from the server to the UAV can include but not limited to entries of the first dataset, the second data set and the third dataset. Further, the communication unit 216 can be used for creating an online/offline the flight information of the UAV.
[0074] For example, a user requested the drone to be flown from point A to point B. Now, if during the flight, the UAV enters into a restricted access location then the logs are being created for the breach of allowable conditions of the UAV.
[0075] FIG. 3 is a flow diagram illustrating a process for authorizing flight of the UAV in accordance with an embodiment of the present disclosure.
[0076] In an aspect, the proposed method may be described in general context of computer-executable instructions. Generally, computer-executable instructions can include routines, programs, objects, components, data structures, procedures, modules, functions, etc., that perform particular functions or implement particular abstract data types. The method can also be practiced in a distributed computing environment where functions are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, computer-executable instructions may be located in both local and remote computer storage media, including memory storage devices.
[0077] The order in which the method as described is not intended to be construed as a limitation and any number of the described method blocks may be combined in any order to implement the method or alternate methods. Additionally, individual blocks may be deleted from the method without departing from the spirit and scope of the subject matter described herein. Furthermore, the method may be implemented in any suitable hardware, software, firmware, or combination thereof. However, for ease of explanation, in the embodiments described below, the method may be considered to be implemented in the above-described system.
[0078] In the context of a flow diagram 300, step 302 pertains to receiving a plurality of attributes from a computing device associated with the UAV. The computing device can be used by a user to control the UAV. The UAV can comprise anauthorization unit. The authorization unit can include a processor coupled to the memory to execute instructions stored in the memory.
[0079] Step 304 pertains to selecting, by the processor, a first set of attributes from the plurality of attributes. The first set of attributes can be compared with a first dataset comprising a set of authentication attributes of one or more users to authenticate the user. The first set of attributes includes any or a combination of biometrics of the user, a unique identifier associated with the user and registration parameters of the user.
[0080] Further, in response to positive authentication of the user, step 306 pertains to compare a second set of attributes selected from the plurality of attributes with a second dataset comprising one or more attributes associated with allowable conditions for the flight of the UAV, wherein the flight of the UAV is authorized if each of the second set of attributes is within the allowable conditions for the flight of the UAV. The second set of attributes comprises any or a combination of location, flight path, an altitude of flight, time duration of flight, time window of flight and speed of flight.
[0081] It would be appreciated by the person skilled in the art that since the present disclosure restricts flying of UAVs if the permission artefact is missing (either, the authorization unit is detached from the UAV or the permission has not been requested). Since, permission artefact would be granted by a central authority such as government. Therefore, the unauthorized flights would be completely restricted.
[0082] FIG. 4 illustrates an exemplary UAV system with detachable authorization unit in accordance with an embodiment of the present disclosure.
[0083] In an embodiment, as illustrated in composite figure 400 of UAV 402 and authorization unit 404. In an embodiment, the Authorization unit 402 can include a first data set, a second data set, and a third dataset. The first dataset, the second dataset, and the third dataset can be stored on a memory of the authorization unit 404. In another embodiment, the first dataset, the second dataset, and the third dataset can be stored on a memory of the UAV. In yet another embodiment, the authorization unit 404 can be detachable with the UAV 402 such that the authorization unit 404 can enable flight of the UAV 402. For example, if the authorization unit 404 is detached from the UAV 402, in such a case the UAV 402 would not be able to initiate flying. The first dataset comprises a set of authentication attributes of one or more users. The second dataset comprises one or more attributes associated with allowable conditions for the flight of the UAV. The third dataset comprises comprising a set of authentication attributes of one or more UAVs.
[0084] It would be appreciated by the person skilled in the art that the authorization unit 404 can help authorize journey of vehicles, airplanes and the like that are well within the scope of the invention.
[0085] It should be apparent to those skilled in the art that many more modifications besides those already described are possible without departing from the inventive concepts herein. The inventive subject matter, therefore, is not to be restricted except in the spirit of the appended claims. Moreover, in interpreting both the specification and the claims, all terms should be interpreted in the broadest possible manner consistent with the context. In particular, the terms “comprises” and “comprising” should be interpreted as referring to elements, components, or steps in a non-exclusive manner, indicating that the referenced elements, components, or steps may be present, or utilized, or combined with other elements, components, or steps that are not expressly referenced. Where the specification claims refers to at least one of something selected from the group consisting of A, B, C …. and N, the text should be interpreted as requiring only one element from the group, not A plus N, or B plus N, etc.
[0086] While the foregoing describes various embodiments of the invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof. The scope of the invention is determined by the claims that follow. The invention is not limited to the described embodiments, versions or examples, which are included to enable a person having ordinary skill in the art to make and use the invention when combined with information and knowledge available to the person having ordinary skill in the art.

ADVANTAGE OF THE PRESENT DISCLOSURE
[0087] The present disclosure provides system and method for authorizing every flight of an unmanned aerial vehicle (UAV).
[0088] The present disclosure provides system and method for authorizing flight of UAV that does not require network connection between the UAV and central server for obtaining authorization for the flight.
[0089] The present disclosure provides system and method for authorizing flight of UAV that assists in regulating flying of the UAVs.
[0090] The present disclosure provides system and method for authorizing flight of UAV that can log the details of the flight that includes breach of allowable conditions.
[0091] The present disclosure provides system and method for authorizing flight of UAV that can be provided a detachable component that enables the flight of the UAV only when the component is attached to the UAV.
[0092] The present disclosure provides UAV for authorizing flight.
[0093] The present disclosure provides system and method for authorizing flight of UAV that is cost-efficient and easy to implement.

Documents

Application Documents

# Name Date
1 201941035490-STATEMENT OF UNDERTAKING (FORM 3) [03-09-2019(online)].pdf 2019-09-03
2 201941035490-FORM FOR STARTUP [03-09-2019(online)].pdf 2019-09-03
3 201941035490-FORM FOR SMALL ENTITY(FORM-28) [03-09-2019(online)].pdf 2019-09-03
4 201941035490-FORM FOR SMALL ENTITY [03-09-2019(online)].pdf 2019-09-03
5 201941035490-FORM 1 [03-09-2019(online)].pdf 2019-09-03
6 201941035490-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [03-09-2019(online)].pdf 2019-09-03
7 201941035490-DRAWINGS [03-09-2019(online)].pdf 2019-09-03
8 201941035490-DECLARATION OF INVENTORSHIP (FORM 5) [03-09-2019(online)].pdf 2019-09-03
9 201941035490-COMPLETE SPECIFICATION [03-09-2019(online)].pdf 2019-09-03
10 201941035490-Proof of Right (MANDATORY) [26-11-2019(online)].pdf 2019-11-26
11 201941035490-FORM-26 [26-11-2019(online)].pdf 2019-11-26
12 201941035490-Correspondence-28-02-2020.pdf 2020-02-28
13 201941035490-FORM-9 [10-09-2020(online)].pdf 2020-09-10
14 201941035490-STARTUP [11-09-2020(online)].pdf 2020-09-11
15 201941035490-FORM28 [11-09-2020(online)].pdf 2020-09-11
16 201941035490-FORM 18A [11-09-2020(online)].pdf 2020-09-11
17 201941035490-FER_SER_REPLY [26-12-2020(online)].pdf 2020-12-26
18 201941035490-CORRESPONDENCE [26-12-2020(online)].pdf 2020-12-26
19 201941035490-CLAIMS [26-12-2020(online)].pdf 2020-12-26
20 201941035490-FORM-26 [25-03-2021(online)].pdf 2021-03-25
21 201941035490-Correspondence to notify the Controller [25-03-2021(online)].pdf 2021-03-25
22 201941035490-Written submissions and relevant documents [20-04-2021(online)].pdf 2021-04-20
23 201941035490-MARKED COPIES OF AMENDEMENTS [20-04-2021(online)].pdf 2021-04-20
24 201941035490-FORM 13 [20-04-2021(online)].pdf 2021-04-20
25 201941035490-Annexure [20-04-2021(online)].pdf 2021-04-20
26 201941035490-AMMENDED DOCUMENTS [20-04-2021(online)].pdf 2021-04-20
27 201941035490-US(14)-HearingNotice-(HearingDate-05-04-2021).pdf 2021-10-17
28 201941035490-FER.pdf 2021-10-17
29 201941035490 Correspondence by Office_Defence_27-01-2022.pdf 2022-01-27
30 201941035490_Reply From Defence.pdf 2022-03-28
31 201941035490-PatentCertificate29-03-2022.pdf 2022-03-29
32 201941035490-IntimationOfGrant29-03-2022.pdf 2022-03-29
33 393360-Correspondence_SIPP Facilitator_25-07-2022.pdf 2022-07-25

Search Strategy

1 35490E_24-09-2020.pdf

ERegister / Renewals

3rd: 28 Jun 2022

From 03/09/2021 - To 03/09/2022

4th: 28 Jun 2022

From 03/09/2022 - To 03/09/2023

5th: 28 Jun 2022

From 03/09/2023 - To 03/09/2024

6th: 02 Sep 2024

From 03/09/2024 - To 03/09/2025

7th: 02 Sep 2024

From 03/09/2025 - To 03/09/2026

8th: 02 Sep 2024

From 03/09/2026 - To 03/09/2027

9th: 02 Sep 2024

From 03/09/2027 - To 03/09/2028

10th: 02 Sep 2024

From 03/09/2028 - To 03/09/2029

11th: 02 Sep 2024

From 03/09/2029 - To 03/09/2030

12th: 02 Sep 2024

From 03/09/2030 - To 03/09/2031

13th: 02 Sep 2024

From 03/09/2031 - To 03/09/2032

14th: 02 Sep 2024

From 03/09/2032 - To 03/09/2033

15th: 02 Sep 2024

From 03/09/2033 - To 03/09/2034

16th: 02 Sep 2024

From 03/09/2034 - To 03/09/2035

17th: 02 Sep 2024

From 03/09/2035 - To 03/09/2036

18th: 02 Sep 2024

From 03/09/2036 - To 03/09/2037

19th: 02 Sep 2024

From 03/09/2037 - To 03/09/2038

20th: 02 Sep 2024

From 03/09/2038 - To 03/09/2039