Authentication system and method for generating flight controls
A technology of authentication token and authentication request, which is applied in the field of unmanned aerial vehicles and systems for controlling unmanned aerial vehicles, which can solve problems such as hijacking unmanned aerial vehicles, and achieve the effect of improving flight safety.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[1002] Example 1: Geofencing Devices for Privacy
[1003] As the number of unmanned aerial vehicles in the airspace increases, private individuals may wish to retain control of their own residences and retain some privacy. If an UAV with a camera is flown over an individual residence, the UAV may be able to capture images of the residence, which may include the user's private yard or rooftop. Unmanned aerial vehicles flying close to said residence may also cause noise pollution. In some embodiments, when a novice user is operating the UAV, there is a risk that the UAV will crash into the individual's residence or into a person at the user's residence, causing injury or damage.
[1004] Individuals may be expected to be able to prevent unmanned aerial vehicles from entering their personal space over which they exercise control. For example, an individual may wish to keep unmanned aerial vehicles out of their residence or property. Individuals may wish to keep UAVs out of a r...
example 2
[1011] Example 2: Geofencing device for containment
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


