Authentication systems and methods for identification of authorized participants
A technology of identification and identifier, applied in transmission systems, digital data authentication, traffic control systems, etc., can solve problems such as hijacking unmanned aerial vehicles, and achieve the effect of improving flight safety
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0998] Example 1: Geofencing Devices for Privacy
[0999] As the number of unmanned aerial vehicles in the airspace increases, private individuals may wish to retain control of their own residences and retain some privacy. If an UAV with a camera is flown over an individual residence, the UAV may be able to capture images of the residence, which may include the user's private yard or rooftop. Unmanned aerial vehicles flying close to said residence may also cause noise pollution. In some embodiments, when a novice user is operating the UAV, there is a risk that the UAV will crash into the individual's residence or into a person at the user's residence, causing injury or damage.
[1000]Individuals may be expected to be able to prevent unmanned aerial vehicles from entering their personal space over which they exercise control. For example, an individual may wish to keep unmanned aerial vehicles out of their residence or property. Individuals may wish to keep UAVs out of a re...
example 2
[1007] Example 2: Geofencing device for containment
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


