Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHODS AND APPARATUS TO CONTACT AIRCRAFT
Document Type and Number:
WIPO Patent Application WO/2008/060605
Kind Code:
A3
Abstract:
Methods and apparatus to alert a pilot in an aircraft of certain conditions, such as airspace violations. In one embodiment, a system uniquely identifies aircraft and send a message to alert the pilot to contact air traffic control on a selected frequency.

Inventors:
ROLFE ERIC G (US)
Application Number:
PCT/US2007/024031
Publication Date:
July 24, 2008
Filing Date:
November 15, 2007
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
RAYTHEON CO (US)
ROLFE ERIC G (US)
International Classes:
G08G5/00
Domestic Patent References:
WO2003009255A12003-01-30
Foreign References:
US20050156777A12005-07-21
Attorney, Agent or Firm:
DURKEE, Paul, D. et al. (Crowley Mofford & Durkee, LLP,Suite 301A,354A Turnpike St, Canton Massachusetts, US)
Download PDF:
Claims:

1. A method, comprising: receiving identifying information for an aircraft; assigning a unique identity to an aircraft based upon the received identifying information; broadcasting a message containing the unique identify of the aircraft to alert a pilot of the aircraft to contact a designated entity over a selected frequency.

2. The method according to claim 1 , further including broadcasting the message after detection of an airspace violation by the aircraft.

3. The method according to claim 1 , further including receiving contact from the aircraft in response to the step of broadcasting the message.

4. The method according to claim 3, further including providing directions to the aircraft to terminate the airspace violation.

5. The method according to claim 1 , wherein the broadcast message includes a CF code from a TIS-B message format.

6. The method according to claim 1 , further including performing a threat assessment of the aircraft.

7. The method according to claim 6, further including evaluating broadcast information from the aircraft in view of surveillance and/or intelligence information for the aircraft.

8. The method according to claim 2, further including, prior to the airspace violation, storing a unique ID for the aircraft upon receiving a message from the aircraft.

9. The method according to claim 2, wherein the airspace violation is due to a temporary flight restriction.

10. The method according to claim 1, wherein the selected frequency is the emergency radio frequency.

11. A method, comprising: broadcasting identifying information for an aircraft by the aircraft to enable a ground station to assign a unique identity to an aircraft based upon the received identifying information; receiving message broadcast by the ground station containing the unique identify of the aircraft to alert a pilot of the aircraft to contact a designated entity over a selected frequency.

12. The method according to claim 1 1 , further including receiving the message after an airspace violation by the aircraft.

13. The method according to claim 1 1, further including sending a message in response to receiving the message from the ground station.

14. The method according to claim 3, further including receiving directions for terminating the airspace violation.

15. The method according to claim 12, wherein the airspace violation is due to a temporary flight restriction.

16. The method according to claim 1 1, wherein the selected frequency is the emergency radio frequency.

17. A system, comprising: an ID module to store unique identifying information for aircraft; an interface module to communicate with the aircraft; a threat assessment module to generate a message for broadcast containing a unique identify of a first one of the aircraft in airspace violation to alert a pilot of the aircraft to contact a designated entity over a selected frequency.

18. The system according to claim 17, wherein the airspace violation is a flight restriction.

19. The system according to claim 17, wherein the message includes directions to the aircraft to terminate the airspace violation.

Description:

METHODS AND APPARATUS TO CONTACT AIRCRAFT

BACKGROUND

As is known in the art, commercial and other aircraft use voice radios to communicate with ground-based air traffic control facilities. In some cases, the ground is unable to communicate with the aircraft, due to the current setting of the radios. A radio may be tuned to the wrong frequency or inadventantly have the volume turned down, or may not be selected. In the case of VFR traffic, there is no requirement to communicate with air traffic control, so it would be unlikely that a controller would know what frequency the radio was set to.

As is also known in the art, pilots are encouraged to continuously monitor an emergency frequency in addition to the frequencies that they use for normal communication. In some cases, this is not practical since aircraft may have only one radio, or may use multiple radios in a specified sequence that precludes or discourages such frequency monitoring.

Oceanic flights communicating over HF radio use SELCAL codes, i.e., tone sequences that can be used by air traffic controllers to alert an aircraft to monitor a radio frequency. While this technology may work, special equipment is required onboard the aircraft. Most aircraft do not have this equipment. Also, since this approach requires the controller to know the code for a particular flight, in many cases the controller does not know the identity of the aircraft it is desirable to contact.

A developing technology known as Automatic Dependent Surveillance Broadcast (ADS-B) is being deployed by the FAA (Federal Aviation Administration). ADS-B provides the identity of aircraft having ADS capability. ADS also provides for uplink of 'broadcast' products to equipped aircraft, including weather and traffic information.

SUMMARY The present invention provides methods and apparatus for generating an alert for a pilot of an aircraft in airspace violation and requesting the pilot to contact air traffic

control. With this arrangement, inadvertent airspace violations can be remedied at relatively low cost. While exemplary embodiments of the invention are primarily shown and described in conjunction with certain flight restrictions and aircraft, it is understood that the inventive embodiments are applicable to air traffic control applications in general in which it is desirable to generate an alert to a pilot.

In one aspect of the invention, a method includes receiving identifying information for an aircraft, assigning a unique identity to an aircraft based upon the received identifying information, and broadcasting a message containing the unique identify of the aircraft to alert a pilot of the aircraft to contact a designated entity over a selected frequency. In one embodiment, the method further includes broadcasting the message after detection of an airspace violation by the aircraft.

In another aspect of the invention, a method includes broadcasting identifying information for an aircraft by the aircraft to enable a ground station to assign a unique identity to an aircraft based upon the received identifying information, and receiving message broadcast by the ground station containing the unique identify of the aircraft to alert a pilot of the aircraft to contact a designated entity over a selected frequency.

In a further aspect of the invention a system includes an ID module to store unique identifying information for aircraft, an interface module to communicate with the aircraft, and a threat assessment module to generate a message for broadcast containing a unique identify of a first one of the aircraft in airspace violation to alert a pilot of the aircraft to contact a designated entity over a selected frequency.

BRIEF DESCRIPTION OF THE DRAWINGS

The foregoing features of this invention, as well as the invention itself, may be more fully understood from the following description of the drawings in which:

FIG. 1 is a schematic representation of a system for generating alerts to a pilot in accordance with exemplary embodiments of the invention;

FIG. 2 is a schematic depiction of a system for generating alerts to a pilot in accordance with exemplary embodiments of the invention; and

FIG. 3 is a flow diagram showing an exemplary sequence of steps for generating alerts to a pilot in accordance with exemplary embodiments of the invention.

DETAILED DESCRIPTION

In accordance with exemplary embodiments of the invention, an ADS-B message is broadcast identifying a particular aircraft based upon its previously transmitted identity. Aircraft receiving this message would compare the received identity with its own identity. If the identities match, the pilot is alerted to contact air traffic control on an emergency frequency.

Before describing exemplary embodiments of the invention in further detail, some introductory material is provided. As will be readily appreciated, access to airspace must sometimes be restricted to protect against threats to ground or airborne assets. Monitoring and patrolling this airspace is an expensive undertaking, including full-time monitoring of air-traffic and other surveillance sensors, threat analysis and mitigation, and possibly active interdiction by armed aircraft. The effectiveness of this mission is reduced due to hundreds of accidental airspace incursions each year. These incursions waste valuable resources, induce lack-of- readiness due to a high false alarm rate, and increase the chance, each year, of a tragic, unnecessary shoot-down.

Airspace restrictions may be permanent, prohibiting access to certain airspace at all times (e.g. airspace surrounding the White House), or may be imposed temporarily, to protect certain events or operations (e.g. a spacecraft launch, fϊrefighting operations, or a presidential visit). In addition, there are scheduled restrictions in place during periodic, predictable time intervals. A simplified summary of the various types of restrictions are shown in the following Table I below.

Table 1 Airspace Restrictions

Type Access Type

Prohibited Area r light of aircraft prohibited|Permanent at all times

Restricted Areas Certain flights and/or Permanent location may be in operations are allowed effect only at certain times.

Temporary Flight Certain flights and/or Temporary location may be in Restrictions operations may be allowed effect only at certain times

While prohibited and restricted areas appear on aeronautical charts, temporary flight restrictions (TFRs) are often in effect for a few hours or days. These restrictions are published in advance, when practical, but must sometimes be put in place with little advance notice due to unexpected events. The restrictions are published as Notices to Airmen (NOTAMs), and their descriptions are often long, complex, and difficult to understand.

Aircraft operating on Instrument Flight Rules (IFR) flight plans, which include most commercial passenger and cargo-carrying fights, are either not subject to the flight restriction, or are directed around the restriction by air traffic control. In effect, their cockpit operations do not require an awareness of TFRs.

Visual flight rules (VFR) aircraft (most likely General Aviation aircraft) are normally responsible for avoiding TFRs, or for following special procedures that require them to know the TFR boundaries. This is complicated by the fact, that as a group, aircraft flying VFR:

-Are flown by a single pilot as compared with two pilots for many commercial operations. The pilot must divide his attention between keeping the aircraft flying, looking for other aircraft, determining his current position, and possibly communicating with air traffic ' controllers;

-Have less advanced navigational equipment. Many are navigated with respect to ground landmarks (rivers, highways, etc.) or must rely on manually calculating their position based on radio beacons;

-Have less experienced pilots. Many fly only a few tens of hours per year vs. commercial pilots who may have accumulated tens of thousands of hours of experience.

While the VFR pilot is responsible for knowing position of the aircraft, knowing the boundaries of the TFR, and understanding the rules governing it, it is not surprising that the vast majority of aircraft violating restricted airspace are operating under VFR flight rules.

Studies indicate that the probable causes of violations occur because the pilot was:

-Not aware of the geographic extent of the TFR; -Not aware of the time/date of the TFR; -Not aware of the TFR procedures; or -Not aware of the TFR at all.

FlG. 1 shows an exemplary system 100, which can have similarity with an Automatic Dependent Surveillance-Broadcast (ADS-B) system, supporting ground and aircraft-based equipment to enable aircraft to continuously transmit identity, position, and intent at approximately one-second intervals. These transmissions may be received by other aircraft and by ground equipment. The system 100 also enables traffic information surveillance (TIS-B) where ground-based equipment transmits the positions of non-ADS-B equipped aircraft for receipt by equipped aircraft. The system 100 can further enable flight information surveillance broadcast (FIS-B) where ground-based equipment transmits weather and aeronautical information, including graphical depictions of TFRs for receipt by equipped aircraft.

The system 100 includes an onboard aircraft system 102 that interacts with a ground-based system 104 to generate pilot alerts for certain events, such as airspace violations, as described more fully below. The alert indicates that the pilot should contact an entity, such as air traffic control.

By providing for the display of Flight Information (FIS-B), a pilot can see a graphical display of the current aircraft position in relation to the latest TFR definition, and potentially provide a warning should the aircraft approach the geographic boundary of the restricted area. Because the data is updated "on the fly," the display can include even TFRs that are published while the aircraft is airborne.

Currently, VFR aircraft set a "non-discrete code" on their transponders to identify themselves to air traffic control. Although the aircraft's position and altitude will show up on a radar display, there is no indication as to the identity of the aircraft. VFR aircraft wishing to enter a TFR area must typically file a special flight plan. As they approach the TFR, they must identify themselves by radio, requesting entry. The air traffic controller looks for the associated flight plan, and assigns the aircraft a "discrete code", which the pilot enters into his transponder. This code, which shows up on the radar display, is then used to identify the aircraft. Once the aircraft can be uniquely identified, it may be given permission to enter the restricted airspace. Security personnel are able to evaluate whether the aircraft is flying according to the plan, and to contact the aircraft.

The ADS-B system can eliminate the code request/assignment step as automated processing can match the ADS-B transmitted code to the flight plan, significantly reducing controller workload.

A significant number of TFR violations occur because the pilot inadvertently switches his transponder back to a non-discrete code after being cleared to approach his destination airport. This error happens because this code switch is a ubiquitous procedure for normal operations (outside the TFR). Since the unique ADS-B code will continue to be transmitted, this type of violation is also be eliminated.

Further, should an aircraft enter the TFR without approval, security personnel can use the code to identify the aircraft, including size and performance characteristics, prior history, etc. This will enable a more rapid and complete threat assessment.

Regardless of the information provided by the aircraft, there is always the possibility that an unfriendly aircraft may have had its ADS-B equipment tampered with in order to provide misleading information. Continuous evaluation of broadcast information with other surveillance and intelligence information sources will still be desirable to characterize the threat.

FIG. 2 shows further details of a system 200 for generating alerts to a pilot in accordance with exemplary embodiments of the invention. An aircraft module 202, which can be disposed in a vehicle, such as an aircraft, helicopter, ship, submarine, automobile, etc., interacts with a remote, e.g., ground-based, module 204.

The aircraft module 202 includes an ID module 250 for storing unique identifying information for the aircraft. An interface module 252 enables the module 202 to communicate with the remote module 204. An alert module 254 compares an ID contained in a received message to the ID for the aircraft. If the IDs match, i.e., the message is addressed to the aircraft, the alert module 254 generates an alert signal for the pilot. The alert signal can be provided as any type of energy that can be perceived by the pilot. Exemplary alerts include sounds, such as beeps, lights, such as flashes, and the like.

The remote module 204 includes an interface module 260 for generating messages for transmission and capturing received messages. An aircraft ID module 262 stores and retrieves aircraft IDs from an aircraft database 264. As each aircraft sends unique identifying information, the aircraft ID module 262 stores this information to enable the remote module to later broadcast messages containing the ID for the given aircraft.

The remote module 204 can further include a threat assessment module 266. The threat assessment module 266 can determine whether a particular aircraft presents a threat based upon various criteria. The threat assessment module 266 can generate messages for a particular aircraft to attempt to request that a pilot contact air traffic

control. The broadcast message to generate the alert for the pilot will contain the unique ID for the aircraft. In one embodiment, the alert indicates that the pilot should tune to the emergency radio frequency (normally 121 .5 MHz) for further instruction.

FIG. 3 shows an exemplary sequence of steps for generating alerts for a pilot to contact air traffic control or other entity. In step 300, a remote system receives a message from a module on an aircraft containing unique identifying information for the aircraft. In step 302, the aircraft is monitored, such as by air traffic control. In step 304, an airspace violation is detected for an given aircraft. In step 306, a message is broadcast containing the unique ID of the aircraft in violation. The aircraft module receives the message, determines that the message is addressed to it, and generates an alert for the pilot to contact air traffic control. In step 308, the remote module or air traffic control, for example, receives contact from the pilot at the designated frequency.

With this arrangement, a pilot can be informed of an airspace violation. In an exemplary embodiment, the pilot can be provided directions for exiting the airspace. A pilot that can be contacted early enough may be able to exit the airspace without the need to launch an intercept mission. Although pilots are encouraged to monitor the emergency frequency whenever possible, radio limitations or conventional radio frequency assignment procedures often preclude this, particularly in the terminal/approach phase of flight.

In another embodiment, a CF code from the TIS-B message foπnat is used for messaging to alert a pilot. If the 24-bit ICAO address provided in the AA field matches the'Ownship" ICAO address, and the CF code were equal to 7, for example (currently unused and reserved). Then this would indicate that the aircraft should immediately tune the radio to the emergency or"guard' frequency. See for, example, the RTCA DO-260A, Minimum Operational Performance Standards for 1090 MHz Extended Squitter Automatic Dependent Surveillance-Broadcast (ADS-B) and Traffic Information System- Broadcast (TIS-B), which is incorporated herein by reference.

Having described exemplary embodiments of the invention, it will now become apparent to one of ordinary skill in the art that other embodiments incorporating their concepts may also be used. The embodiments contained herein should not be limited to disclosed embodiments but rather should be limited only by the spirit and scope of the appended claims. All publications and references cited herein are expressly incorporated herein by reference in their entirety.

What is claimed is: