KR20170101673A - Drone Security System for Protecting Privacy and Method for Controlling the Same - Google Patents

Drone Security System for Protecting Privacy and Method for Controlling the Same Download PDF

Info

Publication number
KR20170101673A
KR20170101673A KR1020160024525A KR20160024525A KR20170101673A KR 20170101673 A KR20170101673 A KR 20170101673A KR 1020160024525 A KR1020160024525 A KR 1020160024525A KR 20160024525 A KR20160024525 A KR 20160024525A KR 20170101673 A KR20170101673 A KR 20170101673A
Authority
KR
South Korea
Prior art keywords
drones
security
drone
control
gps
Prior art date
Application number
KR1020160024525A
Other languages
Korean (ko)
Other versions
KR101779938B1 (en
Inventor
김태우
이건상
변원태
성기욱
성덕주
이동호
Original Assignee
국민대학교산학협력단
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 국민대학교산학협력단 filed Critical 국민대학교산학협력단
Priority to KR1020160024525A priority Critical patent/KR101779938B1/en
Publication of KR20170101673A publication Critical patent/KR20170101673A/en
Application granted granted Critical
Publication of KR101779938B1 publication Critical patent/KR101779938B1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/80Jamming or countermeasure characterized by its function
    • H04K3/90Jamming or countermeasure characterized by its function related to allowing or preventing navigation or positioning, e.g. GPS
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B64AIRCRAFT; AVIATION; COSMONAUTICS
    • B64CAEROPLANES; HELICOPTERS
    • B64C39/00Aircraft not otherwise provided for
    • B64C39/02Aircraft not otherwise provided for characterised by special use
    • B64C39/024Aircraft not otherwise provided for characterised by special use of the remote controlled vehicle type, i.e. RPV
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/02Systems using reflection of radio waves, e.g. primary radar systems; Analogous systems
    • G01S13/04Systems determining presence of a target
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/80Jamming or countermeasure characterized by its function
    • H04K3/92Jamming or countermeasure characterized by its function related to allowing or preventing remote control
    • B64C2201/126
    • B64C2201/127
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K2203/00Jamming of communication; Countermeasures
    • H04K2203/10Jamming or countermeasure used for a particular application
    • H04K2203/22Jamming or countermeasure used for a particular application for communication related to vehicles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/40Jamming having variable characteristics
    • H04K3/45Jamming having variable characteristics characterized by including monitoring of the target or target signal, e.g. in reactive jammers or follower jammers for example by means of an alternation of jamming phases and monitoring phases, called "look-through mode"

Abstract

The present invention relates to a drones security device and a control method thereof for protecting privacy by enhancing security by guiding landing and forced landing by GPS control and jamming when a dron penetrates into a privacy protection area, A security management server for detecting occurrence of GPS and disturbance propagation for determining whether the penetrator is authorized or not and analyzing images taken by a security drone, And a security drone that acquires an image and generates GPS disturbance and jamming to control the penetration drones.

Description

TECHNICAL FIELD [0001] The present invention relates to a drone security system and a control method thereof,

More particularly, the present invention relates to a drones security device for protecting privacy by enhancing security by inducing landing and forced landing by occurrence of GPS disturbance and jamming when a dron penetrates into a privacy protection area, ≪ / RTI >

Recently, drone (Drone) has become widespread, causing concern about privacy invasion. The drones are also known as helicopters as ultra lightweight flying devices, which can be used to take great pictures and videos with cameras.

Figure 1 is a drone device image.

In the near future, drones are expected to be used for various purposes such as security, logistics, observation, and scientific exploration. However, concerns over the explosion of the commercial drones market are mounting.

First of all, there are many people who worry about the drones' collapse, human accidents caused by collision.

Civilian drones are not equipped with state-of-the-art anti-collision systems like passenger planes. Also, because drones fly at low altitudes, urban areas with high-rise buildings and steeple-like structures are more likely to collide with obstacles.

In the future, the addition of drones to existing airspace will make the sky more complex, and airborne collisions between drones can also occur.

If you crash in a residential area or crash into a passenger plane, it can cause a big loss of life.

In addition, the controversy over privacy violation by drone is also expanding. This is because it is possible to inadvertently shoot another person in the air, or to track a person's private property or secretly, and shoot the image.

Recently, the drone has been able to shoot 4K UHD video, and it has been miniaturized so that it can be worn on the wrist or put in a pocket, so it can be watched more intelligently than CCTV.

In the United States and Europe, the use of drones by celebrity paparazzi is becoming more and more controversial.

The media might use the drones for coverage, but the fact that someone else can basically shoot me and watch me can add to the public's objection.

On the other hand, the GPS receiver mounted on the drones is easily exposed to hacking because it is vulnerable to external signal interference or signal manipulation. According to the FAA report last year, a civilian drones may have someone with a GPS transmitter intercepting the drones that are delivering the goods and using them for crime or terrorism purposes.

As a result of the popularization of drones, concerns about crime such as invasion of privacy through drones and invasion of personal space are increasing.

Prior art security systems are mostly security systems for humans, and there is no system to capture or defend against infiltration of aircraft such as drone.

Therefore, it is required to develop a new technique for effectively defending against infiltration of uninhabited drone.

Korean Patent No. 10-1587479 Korean Patent No. 10-0489736

The present invention solves the problem of the conventional drones security system. When the dron penetrates into the privacy protection area, the GPS signal is disturbed and jamming propagates, thereby inducing landing and forced landing. And a control method thereof.

The present invention provides a drones security device for privacy protection and a control method thereof for effectively controlling the use of an applied drones such as a courier drones and effectively preventing the use of drones for crimes, .

The present invention provides a drones security device for privacy protection and a control method thereof, including a security dron for capturing an image of a penetrating dron and controlling a penetrator by generating GPS disturbance and jamming propagation under the control of a security management server It has its purpose.

The present invention relates to a drones security device for privacy protection and a control method thereof for launching a security management server and establishing a drone information DB of a black list, analyzing a maker, specification, and communication protocol of the penetrator to determine a corresponding method and level The purpose is to provide.

The objects of the present invention are not limited to the above-mentioned objects, and other objects not mentioned can be clearly understood by those skilled in the art from the following description.

In order to achieve the above object, according to the present invention, there is provided a drones security device for detecting the appearance of a dron through a radar, analyzing images photographed by a security dron, And a security dron for tracking an infiltrator by control of a security management server to acquire an image and generating a GPS disturbance and a jamming radio wave to control the infiltrator according to the control of the security management server .

Here, the security management server constructs a drone information DB included in the release and black list, analyzes the manufacturer, specification, and communication protocol of the penetrator by analyzing the image and determines the corresponding method and the water level to control the security drone .

The security management server includes a drones sensing radar for sensing penetration drones, a drones information management unit for storing authorization and unauthorized information of the drones, and managing information on manufacturers, specifications, A drone communication protocol deciding unit for deciding a communication mode of the drone through an image analysis taken by a security drone, and a non-engined drone judging unit for deciding whether or not the penetrating drones photographed using the unlicensed information of the drone information managing unit are used And a video input / output manager for receiving the photographed image of the security dron and judging whether or not the dron is penetrated by the image analysis.

The security drone includes a radio disturbance signal generator for generating a radio disturbance signal under the control of the security management server, a GPS controller for controlling the GPS signal under the control of the security management server, and a radio disturbance signal generator An unmanned drones tracking control unit for controlling the tracking flight of the unauthorized security drones under the control of the security management server, and an unmanned drones tracking control unit for controlling the unmanned drones, And the like.

According to another aspect of the present invention, there is provided a control method of a drones security device for privacy protection, comprising: detecting a penetration drones in a droning detection radar of a security management server; A step of capturing and analyzing the penetration drones, determining whether the drones are authorized drones or non-drones by the security management server, controlling the GPS guidance and landing induction by using security drones, Determining a communication protocol to be used for transmitting / receiving control signals of the estimated unmanned drones, determining whether the unauthorized drones are in a blacklist, estimating a manufacturer and a model by analyzing images taken by the security drone, A security drone is controlled to generate a radio disturbance signal and a GPS disturbance signal, And a step of forcibly switching to an inoperable state in a landing or a safe area.

The drones security device and the control method thereof for privacy protection according to the present invention have the following effects.

First, when the dron penetrates into the privacy domain, it causes security disturbance by inducing landing and forced landing due to GPS disturbance and jamming.

Second, it enables efficient control of the use of licensed drones, such as courier drones, and effectively prevents the use of drones for crime.

Third, the penetration drones can be effectively controlled by the security drones which shoot images of penetration drones and generate GPS disturbance and jamming by control of the security management server.

Fourth, it launches on the security management server and builds the drone information DB of the black list to analyze the manufacturer, specification, and communication protocol of the penetration drones, determines the corresponding method and level, and improves the privacy protection effect.

Figure 1 shows a drone device image
2 is a block diagram illustrating a corresponding concept according to whether a drones security device for privacy protection according to the present invention is applied or not
FIG. 3 is a block diagram showing a corresponding method of an authorized drones and a non-droned drones using a drones security device for privacy protection according to the present invention.
4A is a block diagram of the security management server of the drones security apparatus according to the present invention.
FIG. 4B is a block diagram of the security drones of the drones security device according to the present invention.
5 is a flowchart showing a control method of the drones security device for privacy protection according to the present invention.

Hereinafter, a preferred embodiment of a drones security device and a control method thereof for privacy protection according to the present invention will be described in detail as follows.

The features and advantages of the drones security device and its control method for privacy protection according to the present invention will be apparent from the following detailed description of each embodiment.

FIG. 2 is a block diagram illustrating a corresponding concept according to whether or not a dron security device is used for privacy protection according to the present invention. FIG. 3 is a diagram illustrating a concept of a dron security device according to an embodiment of the present invention. Fig.

The present invention utilizes a security drones equipped with a communication and video input / output system to control the GPS of the penetration drones, or to cause the penetration drones to be landed and captured by generating jamming waves.

To this end, the drones security device for privacy protection according to the present invention detects the appearance of the drones through the radar, analyzes the images taken by the security drones, analyzes the manufacturers, specifications, and communication protocols of the penetrator drones, A security management server that determines the water level and controls the occurrence of GPS disturbance and jamming of the security drone so as to induce the landing of the penetration drones or forcibly lands the landing dock, And a security drone that controls the infiltration drones by generating jamming waves.

The drones found by the radar distinguish whether they are authorized or unauthorized drones.

Authorized drones allow access to the security system and use the GPS control system to direct the authorization drone to the desired location automatically.

For example, in the case of a courier drones, the GPS is controlled and guided safely to the delivery room.

In the case of unmanned drones, it controls the GPS or controls the frequency of the drones, making them inoperable to prevent them from entering the security system.

The detailed configuration of the security management server of the drone security device according to the present invention is as follows.

4A is a block diagram of a security management server of a drones security apparatus according to the present invention.

The security management server of the dron security device according to the present invention includes a drones detecting radar 41 for detecting penetrator drones, a storage device for storing the authorization and unauthorized information of the drones, the manufacturer of the drones in the black list, A drones information management unit 42 for managing the information of the drones, a drones communication protocol judgment unit 43 for judging the communication method of the drones through image analysis taken by the security drones, An uninvited droner judging unit 44 for judging whether or not the penetrant drones are photographed using the unlicensed information, and a video input / output managing unit 45 for receiving the photographed images of the security drones and judging whether or not the drones have penetrated.

The detailed construction of the security drones of the drones security device according to the present invention is as follows.

4B is a block diagram of a security drones of the drones security device according to the present invention.

The security drone according to the present invention includes a radio disturbance signal generator 46 for generating a disturbance signal by the control of the security management server, a GPS controller 47 for controlling the GPS signal under the control of the security management server, A landing induction control unit 48 for forcibly switching from a forced landing or a safe area to an inoperable state by using a disturbance signal and a GPS disturbance signal and an unmanned drones tracking control unit 48 for controlling the tracking flight of an unauthorized security dron (49), and an image capturing unit (50) for capturing an image of the penetrating drones.

Here, the radio disturbance signal generator 46 may include means for generating jamming signals for each channel for a plurality of channels, and means for selecting and outputting a jamming signal for a specific channel.

For example, a frequency band may be divided into a plurality of channels, and a jamming signal may be generated for each channel by synthesizing a sinewave and a white noise signal for each channel.

The control method of the drones security device for privacy protection according to the present invention will be described in detail as follows.

5 is a flowchart illustrating a method of controlling a drones security device for privacy protection according to the present invention.

First, the penetration drones are detected in the drones detecting radar of the security management server (S501)

By the control of the security management server, the tracking flight of the security drone is started and the shooting and analysis of the penetration drones is started (S502)

Then, it is determined whether the security management server is an authorized drone or an uninvited drone (S503)

And, if the dron is an authorized dron, the security drone is used to control the guidance of the GPS and the landing, and land the dronon at a specific position (S504)

Next, in the case of the unlicensed dron, the image obtained by the security drone is analyzed to estimate the manufacturer and the model, and it is determined whether it is a drone in the black list (S505)

The communication protocol used for transmitting / receiving the control signal of the estimated unmanned drones is determined (S506), and the security drones are controlled to generate the radio disturbance signal and the GPS disturbance signal to forcibly switch from the forced landing or the safe area to the disabled state. S507)

The drones security device and its control method for privacy protection according to the present invention described above can be applied to security drones that capture images of penetration drones and generate GPS disturbance and jamming waves under the control of a security management server to control penetration drones To effectively enhance the drones security system for privacy protection.

Especially, it is released to the security management server and black list drone information DB is constructed to analyze the manufacturer, specification, and communication protocol of the penetrator to determine the response method and the water level to enable the effective response to the penetrator.

As described above, it will be understood that the present invention is implemented in a modified form without departing from the essential characteristics of the present invention.

It is therefore to be understood that the specified embodiments are to be considered in an illustrative rather than a restrictive sense and that the scope of the invention is indicated by the appended claims rather than by the foregoing description and that all such differences falling within the scope of equivalents thereof are intended to be embraced therein It should be interpreted.

41. Drone detection radar 42. Drone information management unit
43. Drone communication protocol judgment unit 44. Non-
45. Video input / output management section 46. Propagation disturbance signal generation section
47. GPS control unit 48. Landing induction control unit
49. Unmanned drone tracking control unit 50. Image shooting unit

Claims (5)

A security management server for detecting the appearance of the drones through the radar, analyzing images photographed by the security drone, and controlling the occurrence of GPS disturbance and jamming propagation for determining whether the penetrator is authorized or not;
And a security drone for tracking the infiltration drones under the control of the security management server and controlling the infiltration drones by acquiring images and generating GPS disturbance and jamming propagation.
The security management system according to claim 1,
And a drone information DB included in the black list is constructed to analyze the manufacturer, specification and communication protocol of the penetrator by image analysis, and to determine the corresponding method and the water level to control the security drone. Drones security device.
The security management system according to claim 1,
A droned detection radar that detects penetration drones,
A drone information management unit for storing authorization and unauthorized information of the drone, and managing the information on the manufacturer, specification, and communication method of the drone in the release and black list,
A dronon communication protocol judging unit for judging a communication mode of the drones through image analysis taken by a security dron,
An unmanned droner judging unit for judging whether or not the photographed penetrating drones are applied using the authorization and unauthorized information of the donor information management unit,
And a video input / output management unit for receiving a photographed image of the security dron and determining whether the dron is infiltrated by the image analysis.
The security drones according to claim 1,
A radio disturbance signal generator for generating a tram disturbance signal under the control of the security management server,
A GPS control unit for controlling the GPS signal under the control of the security management server,
A landing induction control unit for forcibly switching from a forced landing or a safe region to an inoperable state using a radio disturbance signal and a GPS disturbance signal;
An unauthorized drones tracking control unit for controlling the tracking flight of the unauthorized security drones under the control of the security management server,
And an image capturing unit for capturing an image of the penetrating drones.
Detecting the penetration drones from the droning detection radar of the security management server;
A step of capturing and analyzing the penetration drones by the security drone server under the control of the security drone;
Determining whether the security management server is an authorized drones or an uninvited drones;
Controlling the GPS guidance and the landing induction using the security drone to land the application drone at a specific location;
Analyzing the image photographed by the security drone to estimate the manufacturer and the model, and determining whether the drone is a drone in the black list;
Determining a communication protocol used for transmission and reception of control signals of the estimated unlicensed drones and controlling the security drone to generate a radio disturbance signal and a GPS disturbance signal and forcibly switching from a forced landing or a safe area to an inoperable state; And a control unit for controlling the security of the drones.
KR1020160024525A 2016-02-29 2016-02-29 Drone Security System for Protecting Privacy and Method for Controlling the Same KR101779938B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020160024525A KR101779938B1 (en) 2016-02-29 2016-02-29 Drone Security System for Protecting Privacy and Method for Controlling the Same

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020160024525A KR101779938B1 (en) 2016-02-29 2016-02-29 Drone Security System for Protecting Privacy and Method for Controlling the Same

Publications (2)

Publication Number Publication Date
KR20170101673A true KR20170101673A (en) 2017-09-06
KR101779938B1 KR101779938B1 (en) 2017-09-19

Family

ID=59925408

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020160024525A KR101779938B1 (en) 2016-02-29 2016-02-29 Drone Security System for Protecting Privacy and Method for Controlling the Same

Country Status (1)

Country Link
KR (1) KR101779938B1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101877224B1 (en) * 2017-10-18 2018-08-09 리치앤타임(주) Method And Apparatus for Neutralizing Unmanned Aerial Vehicle
KR102001181B1 (en) * 2019-03-13 2019-07-17 유콘시스템 주식회사 A drone that shoots down unlicensed drones
WO2020226239A1 (en) * 2018-08-21 2020-11-12 윤성욱 Low-altitude unmanned aerial vehicle surveillance system
KR20210006490A (en) * 2019-02-15 2021-01-18 최춘화 Anti-drone system using unmanned aerial vehicle
KR20210123671A (en) * 2020-04-03 2021-10-14 한국전력공사 Drone blackbox system and drone monitoring action method
KR102360796B1 (en) * 2020-10-12 2022-02-09 한국항공우주연구원 Surveillance reconnaissance response method and surveillance reconnaissance response system using unmanned aerial vehicle

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20200142133A (en) 2019-06-11 2020-12-22 김용익 Stealth dron having 360 degree photographing and gps protecting
KR102227468B1 (en) * 2020-07-16 2021-03-15 주식회사 숨비 Smart counter drone operation system
KR102536013B1 (en) * 2021-01-08 2023-05-26 주식회사 바른기술 Method and system to take over control of unmanned vehicle
KR102496689B1 (en) 2021-03-25 2023-02-07 주식회사 뷰메진 Automoatic image masking method, system and non-transitory computer-readable recording medium for privacy protection and information security from drones

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101040267B1 (en) * 2010-10-15 2011-06-10 엘아이지넥스원 주식회사 Apparatus for searching signal in wireless jamming system
JP6182343B2 (en) * 2013-03-29 2017-08-16 綜合警備保障株式会社 Flight control system and flight control method

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101877224B1 (en) * 2017-10-18 2018-08-09 리치앤타임(주) Method And Apparatus for Neutralizing Unmanned Aerial Vehicle
WO2020226239A1 (en) * 2018-08-21 2020-11-12 윤성욱 Low-altitude unmanned aerial vehicle surveillance system
KR20210006490A (en) * 2019-02-15 2021-01-18 최춘화 Anti-drone system using unmanned aerial vehicle
KR102001181B1 (en) * 2019-03-13 2019-07-17 유콘시스템 주식회사 A drone that shoots down unlicensed drones
KR20210123671A (en) * 2020-04-03 2021-10-14 한국전력공사 Drone blackbox system and drone monitoring action method
KR102360796B1 (en) * 2020-10-12 2022-02-09 한국항공우주연구원 Surveillance reconnaissance response method and surveillance reconnaissance response system using unmanned aerial vehicle

Also Published As

Publication number Publication date
KR101779938B1 (en) 2017-09-19

Similar Documents

Publication Publication Date Title
KR101779938B1 (en) Drone Security System for Protecting Privacy and Method for Controlling the Same
US10866597B1 (en) Drone detection and interception
US11794895B2 (en) Unmanned aerial vehicle with biometric verification
Frazier Surveillance through walls and other opaque materials
CN107566078A (en) A kind of unmanned plane low-altitude defence system
Peacock et al. Towards detection and control of civilian unmanned aerial vehicles
WO2009139802A2 (en) Method and system for finding a manpads launcher position
WO2016036312A1 (en) An offshore security monitoring system and method
CN111934813A (en) Unmanned aerial vehicle surveys counter-braking and equips integrated system
KR102292117B1 (en) Drone control system and method for detecting and identifying of drone using the same
CN110719136A (en) Unmanned aerial vehicle interference deception system and unmanned aerial vehicle defense system
US20210070441A1 (en) Autonomous Virtual Wall
Buric et al. Counter remotely piloted aircraft systems
KR20210006490A (en) Anti-drone system using unmanned aerial vehicle
WO2019145953A1 (en) Analyzing radio transmission for detecting wheather a drone is filming a point of interest
US11021249B2 (en) Drone-based, attacker neutralization
KR20150003893U (en) An Automated System for Military Surveillance and Security utilizing RADAR and DRONE
KR101229143B1 (en) Sea robber counter unity system and method of vessels
KR102479959B1 (en) Artificial intelligence based integrated alert method and object monitoring device
KR20200099818A (en) Anti-drone system using unmanned aerial vehicle
Tchouchenkov et al. Detection, recognition and counter measures against unwanted UAVS
CN111932820B (en) Intelligent no-fly area management method and system based on flight equipment signal shielding
KR20190123031A (en) UAV capture device and the method
KR20190141941A (en) Detecting and neutralizing apparatus of flight vehicle capable of flying underground and method thereof
Solis et al. COMPARISON OF DRONE RECOGNITION METHODS

Legal Events

Date Code Title Description
AMND Amendment
E601 Decision to refuse application
AMND Amendment
X701 Decision to grant (after re-examination)
GRNT Written decision to grant