KR20170101673A - Drone Security System for Protecting Privacy and Method for Controlling the Same - Google Patents
Drone Security System for Protecting Privacy and Method for Controlling the Same Download PDFInfo
- Publication number
- KR20170101673A KR20170101673A KR1020160024525A KR20160024525A KR20170101673A KR 20170101673 A KR20170101673 A KR 20170101673A KR 1020160024525 A KR1020160024525 A KR 1020160024525A KR 20160024525 A KR20160024525 A KR 20160024525A KR 20170101673 A KR20170101673 A KR 20170101673A
- Authority
- KR
- South Korea
- Prior art keywords
- drones
- security
- drone
- control
- gps
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/80—Jamming or countermeasure characterized by its function
- H04K3/90—Jamming or countermeasure characterized by its function related to allowing or preventing navigation or positioning, e.g. GPS
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B64—AIRCRAFT; AVIATION; COSMONAUTICS
- B64C—AEROPLANES; HELICOPTERS
- B64C39/00—Aircraft not otherwise provided for
- B64C39/02—Aircraft not otherwise provided for characterised by special use
- B64C39/024—Aircraft not otherwise provided for characterised by special use of the remote controlled vehicle type, i.e. RPV
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S13/00—Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
- G01S13/02—Systems using reflection of radio waves, e.g. primary radar systems; Analogous systems
- G01S13/04—Systems determining presence of a target
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/80—Jamming or countermeasure characterized by its function
- H04K3/92—Jamming or countermeasure characterized by its function related to allowing or preventing remote control
-
- B64C2201/126—
-
- B64C2201/127—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K2203/00—Jamming of communication; Countermeasures
- H04K2203/10—Jamming or countermeasure used for a particular application
- H04K2203/22—Jamming or countermeasure used for a particular application for communication related to vehicles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/40—Jamming having variable characteristics
- H04K3/45—Jamming having variable characteristics characterized by including monitoring of the target or target signal, e.g. in reactive jammers or follower jammers for example by means of an alternation of jamming phases and monitoring phases, called "look-through mode"
Abstract
The present invention relates to a drones security device and a control method thereof for protecting privacy by enhancing security by guiding landing and forced landing by GPS control and jamming when a dron penetrates into a privacy protection area, A security management server for detecting occurrence of GPS and disturbance propagation for determining whether the penetrator is authorized or not and analyzing images taken by a security drone, And a security drone that acquires an image and generates GPS disturbance and jamming to control the penetration drones.
Description
More particularly, the present invention relates to a drones security device for protecting privacy by enhancing security by inducing landing and forced landing by occurrence of GPS disturbance and jamming when a dron penetrates into a privacy protection area, ≪ / RTI >
Recently, drone (Drone) has become widespread, causing concern about privacy invasion. The drones are also known as helicopters as ultra lightweight flying devices, which can be used to take great pictures and videos with cameras.
Figure 1 is a drone device image.
In the near future, drones are expected to be used for various purposes such as security, logistics, observation, and scientific exploration. However, concerns over the explosion of the commercial drones market are mounting.
First of all, there are many people who worry about the drones' collapse, human accidents caused by collision.
Civilian drones are not equipped with state-of-the-art anti-collision systems like passenger planes. Also, because drones fly at low altitudes, urban areas with high-rise buildings and steeple-like structures are more likely to collide with obstacles.
In the future, the addition of drones to existing airspace will make the sky more complex, and airborne collisions between drones can also occur.
If you crash in a residential area or crash into a passenger plane, it can cause a big loss of life.
In addition, the controversy over privacy violation by drone is also expanding. This is because it is possible to inadvertently shoot another person in the air, or to track a person's private property or secretly, and shoot the image.
Recently, the drone has been able to shoot 4K UHD video, and it has been miniaturized so that it can be worn on the wrist or put in a pocket, so it can be watched more intelligently than CCTV.
In the United States and Europe, the use of drones by celebrity paparazzi is becoming more and more controversial.
The media might use the drones for coverage, but the fact that someone else can basically shoot me and watch me can add to the public's objection.
On the other hand, the GPS receiver mounted on the drones is easily exposed to hacking because it is vulnerable to external signal interference or signal manipulation. According to the FAA report last year, a civilian drones may have someone with a GPS transmitter intercepting the drones that are delivering the goods and using them for crime or terrorism purposes.
As a result of the popularization of drones, concerns about crime such as invasion of privacy through drones and invasion of personal space are increasing.
Prior art security systems are mostly security systems for humans, and there is no system to capture or defend against infiltration of aircraft such as drone.
Therefore, it is required to develop a new technique for effectively defending against infiltration of uninhabited drone.
The present invention solves the problem of the conventional drones security system. When the dron penetrates into the privacy protection area, the GPS signal is disturbed and jamming propagates, thereby inducing landing and forced landing. And a control method thereof.
The present invention provides a drones security device for privacy protection and a control method thereof for effectively controlling the use of an applied drones such as a courier drones and effectively preventing the use of drones for crimes, .
The present invention provides a drones security device for privacy protection and a control method thereof, including a security dron for capturing an image of a penetrating dron and controlling a penetrator by generating GPS disturbance and jamming propagation under the control of a security management server It has its purpose.
The present invention relates to a drones security device for privacy protection and a control method thereof for launching a security management server and establishing a drone information DB of a black list, analyzing a maker, specification, and communication protocol of the penetrator to determine a corresponding method and level The purpose is to provide.
The objects of the present invention are not limited to the above-mentioned objects, and other objects not mentioned can be clearly understood by those skilled in the art from the following description.
In order to achieve the above object, according to the present invention, there is provided a drones security device for detecting the appearance of a dron through a radar, analyzing images photographed by a security dron, And a security dron for tracking an infiltrator by control of a security management server to acquire an image and generating a GPS disturbance and a jamming radio wave to control the infiltrator according to the control of the security management server .
Here, the security management server constructs a drone information DB included in the release and black list, analyzes the manufacturer, specification, and communication protocol of the penetrator by analyzing the image and determines the corresponding method and the water level to control the security drone .
The security management server includes a drones sensing radar for sensing penetration drones, a drones information management unit for storing authorization and unauthorized information of the drones, and managing information on manufacturers, specifications, A drone communication protocol deciding unit for deciding a communication mode of the drone through an image analysis taken by a security drone, and a non-engined drone judging unit for deciding whether or not the penetrating drones photographed using the unlicensed information of the drone information managing unit are used And a video input / output manager for receiving the photographed image of the security dron and judging whether or not the dron is penetrated by the image analysis.
The security drone includes a radio disturbance signal generator for generating a radio disturbance signal under the control of the security management server, a GPS controller for controlling the GPS signal under the control of the security management server, and a radio disturbance signal generator An unmanned drones tracking control unit for controlling the tracking flight of the unauthorized security drones under the control of the security management server, and an unmanned drones tracking control unit for controlling the unmanned drones, And the like.
According to another aspect of the present invention, there is provided a control method of a drones security device for privacy protection, comprising: detecting a penetration drones in a droning detection radar of a security management server; A step of capturing and analyzing the penetration drones, determining whether the drones are authorized drones or non-drones by the security management server, controlling the GPS guidance and landing induction by using security drones, Determining a communication protocol to be used for transmitting / receiving control signals of the estimated unmanned drones, determining whether the unauthorized drones are in a blacklist, estimating a manufacturer and a model by analyzing images taken by the security drone, A security drone is controlled to generate a radio disturbance signal and a GPS disturbance signal, And a step of forcibly switching to an inoperable state in a landing or a safe area.
The drones security device and the control method thereof for privacy protection according to the present invention have the following effects.
First, when the dron penetrates into the privacy domain, it causes security disturbance by inducing landing and forced landing due to GPS disturbance and jamming.
Second, it enables efficient control of the use of licensed drones, such as courier drones, and effectively prevents the use of drones for crime.
Third, the penetration drones can be effectively controlled by the security drones which shoot images of penetration drones and generate GPS disturbance and jamming by control of the security management server.
Fourth, it launches on the security management server and builds the drone information DB of the black list to analyze the manufacturer, specification, and communication protocol of the penetration drones, determines the corresponding method and level, and improves the privacy protection effect.
Figure 1 shows a drone device image
2 is a block diagram illustrating a corresponding concept according to whether a drones security device for privacy protection according to the present invention is applied or not
FIG. 3 is a block diagram showing a corresponding method of an authorized drones and a non-droned drones using a drones security device for privacy protection according to the present invention.
4A is a block diagram of the security management server of the drones security apparatus according to the present invention.
FIG. 4B is a block diagram of the security drones of the drones security device according to the present invention.
5 is a flowchart showing a control method of the drones security device for privacy protection according to the present invention.
Hereinafter, a preferred embodiment of a drones security device and a control method thereof for privacy protection according to the present invention will be described in detail as follows.
The features and advantages of the drones security device and its control method for privacy protection according to the present invention will be apparent from the following detailed description of each embodiment.
FIG. 2 is a block diagram illustrating a corresponding concept according to whether or not a dron security device is used for privacy protection according to the present invention. FIG. 3 is a diagram illustrating a concept of a dron security device according to an embodiment of the present invention. Fig.
The present invention utilizes a security drones equipped with a communication and video input / output system to control the GPS of the penetration drones, or to cause the penetration drones to be landed and captured by generating jamming waves.
To this end, the drones security device for privacy protection according to the present invention detects the appearance of the drones through the radar, analyzes the images taken by the security drones, analyzes the manufacturers, specifications, and communication protocols of the penetrator drones, A security management server that determines the water level and controls the occurrence of GPS disturbance and jamming of the security drone so as to induce the landing of the penetration drones or forcibly lands the landing dock, And a security drone that controls the infiltration drones by generating jamming waves.
The drones found by the radar distinguish whether they are authorized or unauthorized drones.
Authorized drones allow access to the security system and use the GPS control system to direct the authorization drone to the desired location automatically.
For example, in the case of a courier drones, the GPS is controlled and guided safely to the delivery room.
In the case of unmanned drones, it controls the GPS or controls the frequency of the drones, making them inoperable to prevent them from entering the security system.
The detailed configuration of the security management server of the drone security device according to the present invention is as follows.
4A is a block diagram of a security management server of a drones security apparatus according to the present invention.
The security management server of the dron security device according to the present invention includes a
The detailed construction of the security drones of the drones security device according to the present invention is as follows.
4B is a block diagram of a security drones of the drones security device according to the present invention.
The security drone according to the present invention includes a radio
Here, the radio
For example, a frequency band may be divided into a plurality of channels, and a jamming signal may be generated for each channel by synthesizing a sinewave and a white noise signal for each channel.
The control method of the drones security device for privacy protection according to the present invention will be described in detail as follows.
5 is a flowchart illustrating a method of controlling a drones security device for privacy protection according to the present invention.
First, the penetration drones are detected in the drones detecting radar of the security management server (S501)
By the control of the security management server, the tracking flight of the security drone is started and the shooting and analysis of the penetration drones is started (S502)
Then, it is determined whether the security management server is an authorized drone or an uninvited drone (S503)
And, if the dron is an authorized dron, the security drone is used to control the guidance of the GPS and the landing, and land the dronon at a specific position (S504)
Next, in the case of the unlicensed dron, the image obtained by the security drone is analyzed to estimate the manufacturer and the model, and it is determined whether it is a drone in the black list (S505)
The communication protocol used for transmitting / receiving the control signal of the estimated unmanned drones is determined (S506), and the security drones are controlled to generate the radio disturbance signal and the GPS disturbance signal to forcibly switch from the forced landing or the safe area to the disabled state. S507)
The drones security device and its control method for privacy protection according to the present invention described above can be applied to security drones that capture images of penetration drones and generate GPS disturbance and jamming waves under the control of a security management server to control penetration drones To effectively enhance the drones security system for privacy protection.
Especially, it is released to the security management server and black list drone information DB is constructed to analyze the manufacturer, specification, and communication protocol of the penetrator to determine the response method and the water level to enable the effective response to the penetrator.
As described above, it will be understood that the present invention is implemented in a modified form without departing from the essential characteristics of the present invention.
It is therefore to be understood that the specified embodiments are to be considered in an illustrative rather than a restrictive sense and that the scope of the invention is indicated by the appended claims rather than by the foregoing description and that all such differences falling within the scope of equivalents thereof are intended to be embraced therein It should be interpreted.
41.
43. Drone communication
45. Video input /
47.
49. Unmanned drone
Claims (5)
And a security drone for tracking the infiltration drones under the control of the security management server and controlling the infiltration drones by acquiring images and generating GPS disturbance and jamming propagation.
And a drone information DB included in the black list is constructed to analyze the manufacturer, specification and communication protocol of the penetrator by image analysis, and to determine the corresponding method and the water level to control the security drone. Drones security device.
A droned detection radar that detects penetration drones,
A drone information management unit for storing authorization and unauthorized information of the drone, and managing the information on the manufacturer, specification, and communication method of the drone in the release and black list,
A dronon communication protocol judging unit for judging a communication mode of the drones through image analysis taken by a security dron,
An unmanned droner judging unit for judging whether or not the photographed penetrating drones are applied using the authorization and unauthorized information of the donor information management unit,
And a video input / output management unit for receiving a photographed image of the security dron and determining whether the dron is infiltrated by the image analysis.
A radio disturbance signal generator for generating a tram disturbance signal under the control of the security management server,
A GPS control unit for controlling the GPS signal under the control of the security management server,
A landing induction control unit for forcibly switching from a forced landing or a safe region to an inoperable state using a radio disturbance signal and a GPS disturbance signal;
An unauthorized drones tracking control unit for controlling the tracking flight of the unauthorized security drones under the control of the security management server,
And an image capturing unit for capturing an image of the penetrating drones.
A step of capturing and analyzing the penetration drones by the security drone server under the control of the security drone;
Determining whether the security management server is an authorized drones or an uninvited drones;
Controlling the GPS guidance and the landing induction using the security drone to land the application drone at a specific location;
Analyzing the image photographed by the security drone to estimate the manufacturer and the model, and determining whether the drone is a drone in the black list;
Determining a communication protocol used for transmission and reception of control signals of the estimated unlicensed drones and controlling the security drone to generate a radio disturbance signal and a GPS disturbance signal and forcibly switching from a forced landing or a safe area to an inoperable state; And a control unit for controlling the security of the drones.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020160024525A KR101779938B1 (en) | 2016-02-29 | 2016-02-29 | Drone Security System for Protecting Privacy and Method for Controlling the Same |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020160024525A KR101779938B1 (en) | 2016-02-29 | 2016-02-29 | Drone Security System for Protecting Privacy and Method for Controlling the Same |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20170101673A true KR20170101673A (en) | 2017-09-06 |
KR101779938B1 KR101779938B1 (en) | 2017-09-19 |
Family
ID=59925408
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020160024525A KR101779938B1 (en) | 2016-02-29 | 2016-02-29 | Drone Security System for Protecting Privacy and Method for Controlling the Same |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR101779938B1 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101877224B1 (en) * | 2017-10-18 | 2018-08-09 | 리치앤타임(주) | Method And Apparatus for Neutralizing Unmanned Aerial Vehicle |
KR102001181B1 (en) * | 2019-03-13 | 2019-07-17 | 유콘시스템 주식회사 | A drone that shoots down unlicensed drones |
WO2020226239A1 (en) * | 2018-08-21 | 2020-11-12 | 윤성욱 | Low-altitude unmanned aerial vehicle surveillance system |
KR20210006490A (en) * | 2019-02-15 | 2021-01-18 | 최춘화 | Anti-drone system using unmanned aerial vehicle |
KR20210123671A (en) * | 2020-04-03 | 2021-10-14 | 한국전력공사 | Drone blackbox system and drone monitoring action method |
KR102360796B1 (en) * | 2020-10-12 | 2022-02-09 | 한국항공우주연구원 | Surveillance reconnaissance response method and surveillance reconnaissance response system using unmanned aerial vehicle |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20200142133A (en) | 2019-06-11 | 2020-12-22 | 김용익 | Stealth dron having 360 degree photographing and gps protecting |
KR102227468B1 (en) * | 2020-07-16 | 2021-03-15 | 주식회사 숨비 | Smart counter drone operation system |
KR102536013B1 (en) * | 2021-01-08 | 2023-05-26 | 주식회사 바른기술 | Method and system to take over control of unmanned vehicle |
KR102496689B1 (en) | 2021-03-25 | 2023-02-07 | 주식회사 뷰메진 | Automoatic image masking method, system and non-transitory computer-readable recording medium for privacy protection and information security from drones |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101040267B1 (en) * | 2010-10-15 | 2011-06-10 | 엘아이지넥스원 주식회사 | Apparatus for searching signal in wireless jamming system |
JP6182343B2 (en) * | 2013-03-29 | 2017-08-16 | 綜合警備保障株式会社 | Flight control system and flight control method |
-
2016
- 2016-02-29 KR KR1020160024525A patent/KR101779938B1/en active IP Right Grant
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101877224B1 (en) * | 2017-10-18 | 2018-08-09 | 리치앤타임(주) | Method And Apparatus for Neutralizing Unmanned Aerial Vehicle |
WO2020226239A1 (en) * | 2018-08-21 | 2020-11-12 | 윤성욱 | Low-altitude unmanned aerial vehicle surveillance system |
KR20210006490A (en) * | 2019-02-15 | 2021-01-18 | 최춘화 | Anti-drone system using unmanned aerial vehicle |
KR102001181B1 (en) * | 2019-03-13 | 2019-07-17 | 유콘시스템 주식회사 | A drone that shoots down unlicensed drones |
KR20210123671A (en) * | 2020-04-03 | 2021-10-14 | 한국전력공사 | Drone blackbox system and drone monitoring action method |
KR102360796B1 (en) * | 2020-10-12 | 2022-02-09 | 한국항공우주연구원 | Surveillance reconnaissance response method and surveillance reconnaissance response system using unmanned aerial vehicle |
Also Published As
Publication number | Publication date |
---|---|
KR101779938B1 (en) | 2017-09-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101779938B1 (en) | Drone Security System for Protecting Privacy and Method for Controlling the Same | |
US10866597B1 (en) | Drone detection and interception | |
US11794895B2 (en) | Unmanned aerial vehicle with biometric verification | |
Frazier | Surveillance through walls and other opaque materials | |
CN107566078A (en) | A kind of unmanned plane low-altitude defence system | |
Peacock et al. | Towards detection and control of civilian unmanned aerial vehicles | |
WO2009139802A2 (en) | Method and system for finding a manpads launcher position | |
WO2016036312A1 (en) | An offshore security monitoring system and method | |
CN111934813A (en) | Unmanned aerial vehicle surveys counter-braking and equips integrated system | |
KR102292117B1 (en) | Drone control system and method for detecting and identifying of drone using the same | |
CN110719136A (en) | Unmanned aerial vehicle interference deception system and unmanned aerial vehicle defense system | |
US20210070441A1 (en) | Autonomous Virtual Wall | |
Buric et al. | Counter remotely piloted aircraft systems | |
KR20210006490A (en) | Anti-drone system using unmanned aerial vehicle | |
WO2019145953A1 (en) | Analyzing radio transmission for detecting wheather a drone is filming a point of interest | |
US11021249B2 (en) | Drone-based, attacker neutralization | |
KR20150003893U (en) | An Automated System for Military Surveillance and Security utilizing RADAR and DRONE | |
KR101229143B1 (en) | Sea robber counter unity system and method of vessels | |
KR102479959B1 (en) | Artificial intelligence based integrated alert method and object monitoring device | |
KR20200099818A (en) | Anti-drone system using unmanned aerial vehicle | |
Tchouchenkov et al. | Detection, recognition and counter measures against unwanted UAVS | |
CN111932820B (en) | Intelligent no-fly area management method and system based on flight equipment signal shielding | |
KR20190123031A (en) | UAV capture device and the method | |
KR20190141941A (en) | Detecting and neutralizing apparatus of flight vehicle capable of flying underground and method thereof | |
Solis et al. | COMPARISON OF DRONE RECOGNITION METHODS |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AMND | Amendment | ||
E601 | Decision to refuse application | ||
AMND | Amendment | ||
X701 | Decision to grant (after re-examination) | ||
GRNT | Written decision to grant |