Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
SECURE BEACON AND READER SYSTEM FOR REMOTE DRONE AND PILOT IDENTIFICATION
Document Type and Number:
WIPO Patent Application WO/2019/032162
Kind Code:
A2
Abstract:
A system and method for identifying an unmanned aerial vehicle (UAS) detected in a location is provided. The system may include a reader having a receiver configured to receive identification information, and a transmitter configured to re-transmit the received identification information; and an identification server having a memory storing UAS registration information, a receiver configured to receive transmissions, a transmitter to transmit information and a processor configured to provide a verification of the identification information received by the reader based on the re-transmitted identification information and the stored UAS registration.

Inventors:
BANGA JASMINDER (US)
VALIQUETTE TYLER (US)
BAR-NAHUM GUY (US)
FOINA AISLAN GOMIDE (US)
Application Number:
PCT/US2018/032606
Publication Date:
February 14, 2019
Filing Date:
May 14, 2018
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
AIRSPACE SYSTEMS INC (US)
International Classes:
G08G5/00; G06Q50/30
Attorney, Agent or Firm:
JONES, Michael, C. et al. (US)
Download PDF:
Claims:
Claims

What is claimed is:

1. A system for identifying an unmanned aerial vehicle (UAS) detected in a location, the system comprising:

a reader having

a receiver configured to receive identification information transmitted from the UAS, and

a transmitter configured to re-transmit the received identification information;

an identification server having

a memory storing UAS registration information associated with the UAS, a receiver configured to receive transmissions;

a transmitter to transmit information and

a processor configured to provide a verification of the identification information received by the reader based on the re-transmitted identification information and the stored UAS registration.

2. The system of claim 1, wherein the processor provides the verification by transmitting stored contact information identifying a user associated with the UAS to the reader to facilitate communication between the reader and the user associated with the UAS.

3. The system of claim 2, the stored contact information connects the reader to the user via one or more of:

a voice call;

a video call;

a real-time text-based message exchange; a delayed text-based message exchange.

4. The system of claim 2, wherein the processor provides the stored contact information to the reader via an anonymized communication system that connects the reader to the user without providing the stored contact information to the reader.

5. The system of claim 4, wherein the anonymized communication system further blocks identification information associated with the reader from being provided to the user.

6. The system of claim 4, wherein the anonymized communication system connects the reader to the user via one or more of:

a voice call;

a video call;

a real-time text-based message exchange;

a delayed text-based message exchange.

7. The system of claim 1, wherein the received identification information includes location information associated with the UAS and the transmitter re-transmits the received location information to the identification server.

8. The system of claim 7, wherein the processor provides the verification by comparing the received location information to stored location information associated with the UAS.

9. The system of claim 8, wherein the stored location information is received from a user operating the UAS.

10. The system of claim 9, wherein the stored location information is received from the user as part of a filed flight log.

11. The system of claim 9, wherein the stored location information is received as part of an access request submitted to the identification server by the user.

12. The system of claim 1, wherein the processor provides the verification by automatically initiating a communication with a user associated with the UAS.

13. The system of claim 12, wherein the received identification information includes location information associated with the UAS and the transmitter re-transmits the received location information to the identification server; and

wherein the automatically initiated communication includes the location information received from the drone.

14. The system of claim 13, wherein the automatically initiated communication includes an automatically generated message providing the location information sent to the user associated with the UAS and requesting the user provide confirmation of current operation of the UAS.

15. The system of claim 14, wherein the request that the user provide confirmation of current operation of the UAS includes a request to provide a secured identification code to confirm the identity of the user.

16. The system of claim 1, further comprising a user associated device associated with a user associated with the UAS, the user associated device comprising: a transmitter to transmit information;

a receiver configured to receive information;

a memory configured to store information and

a processor configured to control the receiver to receive information from the UAS associated with the User, store the received information from the UAS in the memory, and control transmitter to transmit the stored information to the identification server in response to a query from the identification server.

17. The system of claim 16, wherein user associated device automatically provides current status information of the UAS at regular intervals to the identification server.

18. The system of claim 17, wherein the current status information includes a current location of the UAS.

19. The system of claim 18, wherein the processor of the identification server provides the verification by comparing the current location to the identification information received from the UAS.

20. The system of claim 17, wherein the current status information includes an identity of a current pilot controlling the UAS.

21. The system of claim 20, wherein the processor of the identification server provides the verification by comparing identity of the current pilot to the UAS registration information.

22. The system of claim 16, wherein identification server transmits a verification request to the user associated device and requests a reply.

23. The system of claim 22, wherein user associated device provides a reply include a unique identifier specific to the user to verify control.

24. The system of claim 22, wherein identification server provides an interdiction request in response to not receiving a validated reply within a specified time window.

25. The system of claim 24, wherein the interdiction request includes one or more of:

issuing warnings to the user associated device to have the UAS to exit the current location; enacting radio frequency jamming; or hacking into a command and control link of the drone.

26. The system of claim 24, further comprising an interdiction platform, wherein the interdiction request includes issuing an order to deploy the interdiction platform to capture, remove, disable, or destroy the UAS.

27. The system of claim 26, wherein the interdiction platform is a UAS having an onboard interdiction system.

28. The system of claim 1, wherein the reader has an interface coupled to the transmitter to transmit a UAS report regarding activities of the UAS to the identification server; and

wherein the processor of the identification server controls the receiver to receive the UAS report and updates the stored UAS registration information based on the UAS report.

29. The system of claim 28, wherein the processor updates the stored UAS registration to reflect a revocation of location access based on the received UAS report.

30. The system of claim 1, wherein the received identification information is transmitted by a beacon installed on the UAS, wherein the beacon includes:

a receiver configured to receive transmissions;

a transmitter configured to transmit identification information; and

a processor configured to control the transmitter to transmit identification information in response to a received query received through the receiver.

31. The system of claim 30, wherein the processor is configured to control the transmitter to transmit an encrypted unique identifier in response to a verified query received via the receiver.

32. The system of claim 30, wherein the beacon further includes a visual indicator configured to provide a visual signal; and

wherein the processor is configured to control the visual indicator to provide a visual signal based on a verified query received via the receiver.

33. The system of claim 32, wherein the visual indicator is one or more of: a visible light emitting diode (LED) and

an infrared LED.

34. The system of claim 34, wherein the processor is configured to control the visual indicator to provide the visual signal as a machine readable visual pattern transmitted in response to the verified query.

35. A method for identifying an unmanned aerial vehicle (UAS) detected in a location, the method comprising:

receiving, by a reader, identification information transmitted from the UAS; and comparing received identification information to stored UAS registration information associated with the UAS; and

providing, by a server, a verification of the identification information based on a result of the comparison of the re-transmitted identification information and the stored

UAS registration.

36. The method of claim 35, wherein providing the verification comprises transmitting stored contact information identifying a user associated with the UAS to the reader to facilitate communication between the reader and the user associated with the UAS.

37. The method of claim 36, the stored contact information connects the reader to the user via one or more of:

a voice call; a video call;

a real-time text-based message exchange;

a delayed text-based message exchange.

38. The method of claim 36, wherein the stored contact information is provided to the reader via an anonymized communication system that connects the reader to the user without providing the stored contact information to the reader.

39. The method of claim 38, further comprising blocking, by the anonymized communication system, identification information associated with the reader from being provided to the user.

40. The method of claim 38, wherein the anonymized communication system connects the reader to the user via one or more of:

a voice call;

a video call;

a real-time text-based message exchange;

a delayed text-based message exchange.

41. The method of claim 35, wherein the received identification information includes location information associated with the UAS and the transmitter re-transmits the received location information to the identification server.

42. The method of claim 41, wherein the providing the verification further comprises comparing the received location information to stored location information associated with the UAS.

43. The method of claim 42, wherein the stored location information is received from a user operating the UAS.

44. The method of claim 43, wherein the stored location information is received from the user as part of a filed flight log.

45. The method of claim 44, wherein the stored location information is received as part of an access request submitted to the identification server by the user.

46. The method of claim 35, wherein providing the verification comprises automatically initiating a communication with a user associated with the UAS.

47. The method of claim 46, wherein the received identification information includes location information associated with the UAS; and

wherein the automatically initiated communication includes the location information received from the UAS.

48. The method of claim 47, wherein the automatically initiated

communication includes an automatically generated message providing the location information sent to the user associated with the UAS and requesting the user provide confirmation of current operation of the UAS.

49 The method of claim 48, wherein the request that the user provide confirmation of current operation of the UAS includes a request to provide a secured identification code to confirm the identity of the user.

50. The method of claim 35, further

receiving, by a user associated device, information from the UAS,

storing the received information from the UAS in a memory, and

transmitting the stored information to the server in response to a query from the server.

51. The method of claim 50, automatically providing, by the user associated device current status information of the UAS at regular intervals to the server.

52. The method of claim 51, wherein the current status information includes a current location of the UAS.

53. The method of claim 52, wherein providing the verification comprises comparing the current location to the identification information received from the UAS.

54. The method of claim 51 wherein the current status information includes an identity of a current pilot controlling the UAS.

55. The method of claim 54, wherein the providing the verification comprises comparing identity of the current pilot to the UAS registration information.

56. The method of claim 50, further comprising transmitting, by the server, a verification request to the user associated device and requesting a reply.

57. The method of claim 56, wherein user associated device provides a reply include a unique identifier specific to the user to verify control.

58. The method of claim 56, further comprising issuing an interdiction request in response to not receiving a validated reply within a specified time window.

59. The method of claim 58, wherein the issuing the interdiction request comprises issuing warnings to the user associated device to have the UAS to exit the current location.

60. The method of claim 59, wherein the issuing interdiction request includes issuing an order to deploy an interdiction platform to capture, remove, disable, or destroy the UAS.

61. The method of claim 60, wherein the interdiction platform is a UAS having an onboard interdiction system.

62. The method of claim 35, further comprising transmitting a UAS report regarding activities of the UAS to the server; and

updating, by the server, the stored UAS registration information based on the UAS report.

63. The method of claim 62, wherein the updating the stored UAS registration comprises a revoking location access based on the received UAS report.

64. The method of claim 35, further comprising, transmitting by a beacon associated with the UAS, an encrypted unique identifier in response to a verified query received by the beacon.

65. The method of claim 64, controlling a visual indicator to provide a visual signal based on a verified query received by the beacon.

66. The method of claim 65, wherein the visual indicator is one or more of: a visible light emitting diode (LED) and

an infrared LED.

67. The method of claim 66, wherein the controlling the visual indicator to provide the visual signal comprises generating a machine readable visual pattern transmitted in response to the verified query.

68. A non-transitory computer readable medium having stored therein a program for making a computer execute a method of identifying an unmanned aerial vehicle (UAS) detected in a location, the method comprising:

receiving, by a reader, identification information transmitted from the UAS; and comparing received identification information to stored UAS registration information associated with the UAS; and

providing, by a server, a verification of the identification information based on a result of the comparison of the re-transmitted identification information and the stored

UAS registration.

69. The computer readable medium of claim 68, wherein providing the verification comprises transmitting stored contact information identifying a user associated with the UAS to the reader to facilitate communication between the reader and the user associated with the UAS.

70. The computer readable medium of claim 69, the stored contact information connects the reader to the user via one or more of:

a voice call;

a video call;

a real-time text-based message exchange;

a delayed text-based message exchange.

71. The computer readable medium of claim 70, wherein the stored contact information is provided to the reader via an anonymized communication system that connects the reader to the user without providing the stored contact information to the reader.

72. The computer readable medium of claim 71, further comprising blocking, by the anonymized communication system, identification information associated with the reader from being provided to the user.

73. The computer readable medium of claim 71, wherein the anonymized communication system connects the reader to the user via one or more of:

a voice call;

a video call;

a real-time text-based message exchange;

a delayed text-based message exchange.

74. The computer readable medium of claim 68, wherein the received identification information includes location information associated with the UAS and the transmitter re-transmits the received location information to the identification server.

75. The computer readable medium of claim 74, wherein the providing the verification further comprises comparing the received location information to stored location information associated with the UAS.

76. The computer readable medium of claim 75, wherein the stored location information is received from a user operating the UAS.

77. The computer readable medium of claim 76, wherein the stored location information is received from the user as part of a filed flight log.

78. The computer readable medium of claim 77, wherein the stored location information is received as part of an access request submitted to the identification server by the user.

79. The computer readable medium of claim 68, wherein providing the verification comprises automatically initiating a communication with a user associated with the UAS.

80. The computer readable medium of claim 79, wherein the received identification information includes location information associated with the UAS; and wherein the automatically initiated communication includes the location information received from the UAS.

81. The computer readable medium of claim 80, wherein the automatically initiated communication includes an automatically generated message providing the location information sent to the user associated with the UAS and requesting the user provide confirmation of current operation of the UAS.

82 The computer readable medium of claim 81, wherein the request that the user provide confirmation of current operation of the UAS includes a request to provide a secured identification code to confirm the identity of the user.

83. The computer readable medium of claim 68, further receiving, by a user associated device, information from the UAS, storing the received information from the UAS in a memory, and

transmitting the stored information to the server in response to a query from the server.

84. The computer readable medium of claim 83, automatically providing, by the user associated device current status information of the UAS at regular intervals to the server.

85. The computer readable medium of claim 84, wherein the current status information includes a current location of the UAS.

86. The computer readable medium of claim 85, wherein providing the verification comprises comparing the current location to the identification information received from the UAS.

87. The computer readable medium of claim 84 wherein the current status information includes an identity of a current pilot controlling the UAS.

88. The computer readable medium of claim 87, wherein the providing the verification comprises comparing identity of the current pilot to the UAS registration information.

89. The computer readable medium of claim 83, further comprising

transmitting, by the server, a verification request to the user associated device and requesting a reply.

90. The computer readable medium of claim 89, wherein user associated device provides a reply include a unique identifier specific to the user to verify control.

91. The computer readable medium of claim 89, further comprising issuing an interdiction request in response to not receiving a validated reply within a specified time window.

92. The computer readable medium of claim 91, wherein the issuing the interdiction request comprises issuing warnings to the user associated device to have the UAS to exit the current location.

93. The computer readable medium of claim 92, wherein the issuing interdiction request includes issuing an order to deploy an interdiction platform to capture, remove, disable, or destroy the UAS.

94. The computer readable medium of claim 93, wherein the interdiction platform is a UAS having an onboard interdiction system.

95. The computer readable medium of claim 68, further comprising

transmitting a UAS report regarding activities of the UAS to the server; and

updating, by the server, the stored UAS registration information based on the UAS report.

96. The computer readable medium of claim 95, wherein the updating the stored UAS registration comprises a revoking location access based on the received UAS report.

97. The computer readable medium of claim 68, further comprising, transmitting by a beacon associated with the UAS, an encrypted unique identifier in response to a verified query received by the beacon.

98. The computer readable medium of claim 97, controlling a visual indicator to provide a visual signal based on a verified query received by the beacon.

99. The computer readable medium of claim 98, wherein the visual indicator is one or more of:

a visible light emitting diode (LED) and

an infrared LED.

100. The computer readable medium of claim 99, wherein the controlling the visual indicator to provide the visual signal comprises generating a machine readable visual pattern transmitted in response to the verified query.

Description:
SECURE BEACON AND READER SYSTEM FOR REMOTE DRONE AND

PILOT IDENTIFICATION

BACKGROUND

Field

[0001] Aspects of the example implementations are directed to methods and systems for identification of airborne objects at a low altitude, and more specifically, to systems and methods for identification of low-altitude aircraft.

Related Art

[0002] Related art unmanned aerial vehicles (UAVs) or unmanned aircraft systems

(UASs) markets once belonged to professional companies. However, related art UAVs and UASs now include amateur pilots flying affordable models available for purchase, for example, in an electronic store, and which may be controlled by mobile communication devices such as smartphones. However, these related art flying objects may cause damage and/or injury due to their altitude, speed and weight. Further, it is also possible that a UAS may be used for acts of terrorism, criminal activity, or espionage. Thus, there is a need to manage the related art UAVs and UASs.

[0003] In ground-based systems, such as the related art automotive market, one of the bases of the car control system, may include an identification credential issued by a division of motor vehicles (DMV) or others, such as a license plate. However, there is no analogous identification method or system for related art UAVs and/or UASs. Currently, the FAA requires sUASs to identify themselves by replicating the ID system used on aircrafts (i.e.: "Tail Numbers"). This is a static, antiquated, and easily defeated

identification system. For related art small UASs (e.g., aircrafts up to 25 pounds flying up to 500ft of the low altitude airspace), tail numbers that are used in commercial aircraft are too large in size (e.g., area) to be provided on these vehicles, or they will be too small to allow the small UAS identification.

[0004] Related art systems do not fully address the necessary demands of an identification scheme that permits ground-level identification, as well as identification by other aircrafts of various sizes and altitudes as may be required by the growth of sUAS systems. Related art systems also do not fully address the need for a solution that allows detection in an automated way by a device.

Summary of the Disclosure

[0005] Aspects of the present application may relate to a system for identifying an unmanned aerial vehicle (UAS). The system may include a reader having a receiver configured to receive identification information, and a transmitter configured to retransmit the received identification information; and an identification server having a memory storing UAS registration information, a receiver configured to receive transmissions, a transmitter to transmit information and a processor configured to provide a verification of the identification information received by the reader based on the retransmitted identification information and the stored UAS registration.

[0006] Additional aspects of the present application may relate to a non-transitory computer readable medium having stored therein a program for making a computer execute a method of identifying an unmanned aerial vehicle (UAS) detected in a location. The method may include receiving, by a reader, identification information transmitted from the UAS; and comparing received identification information to stored UAS registration information associated with the UAS; and providing, by a server, a verification of the identification information based on a result of the comparison of the retransmitted identification information and the stored UAS registration. [0007] Further aspects of the present application relate to a method of identifying an unmanned aerial vehicle (UAS) detected in a location. The method may include receiving, by a reader, identification information transmitted from the UAS; and comparing received identification information to stored UAS registration information associated with the UAS; and providing, by a server, a verification of the identification information based on a result of the comparison of the re-transmitted identification information and the stored UAS registration.

[0008] Still further aspects of the present application relate to a computer apparatus configured to identify an unmanned aerial vehicle (UAS) detected in a location. The computer apparatus may include means for receiving identification information transmitted from the UAS; means for comparing received identification information to stored UAS registration information associated with the UAS; means for providing, by a server, a verification of the identification information based on a result of the comparison of the re-transmitted identification information and the stored UAS registration.

Brief Description of the Drawings

[0009] The patent or application file contains at least one drawing executed in color. Copies of this patent or patent application publication with color drawing(s) will be provided by the Office upon request and payment of the necessary fee.

[0010] FIGS. 1-8 illustrate schematic representations of an Identify Friend or Foe

System in accordance with example implementations of the present application.

[0011] FIGS. 9-12 illustrate user interfaces (UI) in accordance with example implementations of the present application.

[0012] FIGS. 13-18 illustrate flow diagrams of processes in accordance with example implementations of the present application. [0013] FIG. 19A illustrates a perspective view of a beacon in accordance with an example implementation of the present application.

[0014] FIG. 19B illustrates a perspective view of an IFF reader/interface unit in accordance with an example implementation of the present application.

[0015] FIGS. 20A and 20B illustrate images of a beacon in accordance with example implementations of the present application.

[0016] FIG. 21 illustrates an example computing environment with an example computer device suitable for use in some example implementations of the present application.

Detailed Description

[0017] The following detailed description provides further details of the figures and example implementations of the present application. Reference numerals and descriptions of redundant elements between figures are omitted for clarity. Terms used throughout the description are provided as examples and are not intended to be limiting. For example, the use of the term "automatic" may involve fully automatic or semiautomatic implementations involving user or operator control over certain aspects of the implementation, depending on the desired implementation of one of ordinary skill in the art practicing implementations of the present application. Further, sequential terminology, such as "first", "second", "third", etc., may be used in the description and claims simply for labeling purposes and should not be limited to referring to described actions or items occurring in the described sequence. Actions or items may be ordered into a different sequence or may be performed in parallel or dynamically, without departing from the scope of the present application.

[0018] The proliferation of small unmanned aerial vehicles (sUAS) in domestic

US airspace is rapidly increasing and with it the need to effectively enforce rules and regulations governing their safe operation. How these rules and regulations are applied will vary between individuals and organizations depending on permissions that have been granted by those responsible for the airspace in which the sUAS is flying. As with any permit-contingent regulation, effective enforcement of these rules depends on the ability of nearby observers to ascertain the identity of the pilot and aircraft and determine whether or not they are permitted to operate in the specific airspace in which the sUAS they are flying is observed.

[0019] As discussed above, existing sUAS identification systems do not provide an optimal experience and there may be an industry need for a new identification system that can drive sUAS adoption globally. Example implementations of the present application may include an Identify Friend or Foe (IFF) system that may overcome some or all of the problems with the related art systems. Example implementations of the present application may enable observers to positively identify a sUAS and pilot using simple and intuitive components based on current consumer electronics. Example implementations of the present application may provide a system is globally interoperable, incorporates bank-level verification, and can be operated reliably anywhere there is cellphone coverage. Further, some example implementations may rely on locally stored databases of regularly provisioned ID, pilot, sUAS, mission, etc., information to allow operation with only intermittent communication (e.g., no cellular coverage may be required.

[0020] Example implementations may be constructed from low-cost components, enabling anyone, from a private citizen to a multinational corporation, to determine who is flying in the air above them and to directly contact the pilot if desired, all while protecting the privacy of all parties. [0021] In some example implementations, the system may be implemented by integrating an IFF identification code into an ADS-B transponder that may append a unique IFF identifier to the code typically sent out by the ADS-B. This may allow the IFF information to be received by an ADS-B receiver or reader device.

[0022] Thus, the System may enable the safe and permitted operation of authorized sUASs in private and controlled airspaces by providing its operator with the ability to identify any sUAS as a friendly or otherwise. Example implementations of such a system may rely on secure air-to-ground communication and can verify whether the sUAS in question is authorized to be flying in any given airspace. Example uses of the IFF System may include:

[0023] 1. Commercial and government entities that want to protect their airspace and have a way to mitigate any potential threats from sUASs. The same entities may employ their own sUAS for enterprise or governmental use, and the system allows easy identification of these sUAS to avoid mitigating a friendly sUAS.

[0024] 2. Individuals or entities that wish to allow sUASs to enter their airspace for sightseeing, and want to communicate with the sUAS operator for revenue generation.

[0025] 3. Individuals or entities that want to identify a specific sUAS for privacy and/or personal interest purposes.

[0026] By providing a capability to identify and verify who is piloting an sUAS

(and who is the owner of said sUAS) within a specific airspace, example implementations of the present application may provide a solution for regulating the regions around secure facilities or public venues and in some implementations may also allow owners to commercialize travel there through. Further, the ability to regulate regions of airspace may become increasingly important as sUAS systems become more prevalent. [0027] As an example implementations, a beacon to be mounted on a sUAS to interact with an IFF system may be rented out (or a unique, registered code may be provided to a beacon already mounted on the sUAS) by an organization as part of sale or rental of access to restricted airspace in locations where no network may exist. For example, the National Park Service may sell time-limited permit codes (or rent out a beacon) to allow people to photograph Yosemite Valley as part of a revenue generating opportunity enable by an IFF system.

[0028] As another example without an effective IFF solution in place many sports stadiums may prohibit the use of any drones to capture footage of sporting events.

However, with an IFF system implemented, stadium operators or sports associations may issue permits or registrations to certain companies (broadcasters, etc.) as part of selling aerial footage capture rights for potentially substantial value. An IFF system may allow the differentiation of the drones that have access rights from drones that are trespassing, and the trespassing drones can be removed, disabled or destroyed while the authorized drones can proceed without interruption. Other example implementations may have other potential uses that might be apparent to a person of ordinary skill in the art.

[0029] Further, subsequent to identification and verification, example

implementations of the present application may also provide or be coupled with systems that may provide interdiction with "trespassing" sUAS to minimize or neutralize any potential threats. For example, soft interdiction may be performed by issuing an exclude signal instructing any unauthorized sUAS to vacate a controlled area to avoid direct interdiction. Further, hard interdiction may be performed by capturing, disabling, or destroying the unauthorized sUAS via a ground-based or air-based interdiction platform (e.g., ground-based capture, disable, or destruction system; a deployable sUAS having an onboard interdiction system capable of capturing, disabling, or destroying the unauthorized sUAS). For example, a patrol sUAS capture and control capabilities may ensnare the unauthorized sUAS and move it out of the controlled area. Electronic hard mitigation systems may also be deployed (e.g., radio frequency jamming or hacking of the command and control (C2) link).

[0030] Multiple example implementations of the present application are discussed below for explanatory purposes. Discussion of specific components as part of one example implementation is not intended to convey that those components are limited to that example implementation; any of the discussed components may be combined or incorporated into other example implementations as may be apparent to a person of ordinary skill in the art. Further, any reference to a specific component, part, model, or other aspect of any example implementation should not be interpreted as limiting any example implementation to that specific component, part, model, or aspect and equivalent components, parts, models, or aspects may be incorporated into example implementations without departing from the nature of the application as may be apparent to a person of ordinary skill in the art.

[0031] In the present application, the terms "sUAS", "aerial platform", "aerial vehicle", "aerial drone", or "drone" may be used interchangeably and any specific usage is not intended to limit or exclude any of the other terms. Further, in the present application, the terms "operator", "owner", "pilot", or "user" may be used to describe roles of individuals interacting with example implementations of the present application.

However, an individual may fill/occupy multiple roles when interacting with example implementations and may move from one role in one situation to another in a different situation. Further, use of one of these terms in relation to an example implementation of the present application is not intended to limit example implementations to only allow interaction with an individual in that role and other roles may similarly interact with example implementations of the present application as may be apparent to a person of ordinary skill in the art.

[0032] FIGS. 1-4 illustrate a schematic representation 100 of a system in accordance with an example implementation of the present application. As illustrated, a drone 1 may be operated by an owner or pilot 10 in a location. The location may be a public location (such as a park, forest, garden, or any other location that might be apparent to a person of ordinary skill in the art), a private location (such as a private residence, a corporate location, a private golf course, or any other location that might be apparent to a person of ordinary skill in the art), a secured location (such as a power plant, a military base, a government facility or any other location that might be apparent to a person of ordinary skill in the art) or any other type of location that might be apparent to a person of ordinary skill in the art. Further, the location does not need to be a fixed location and instead, the owner or pilot 10 may be in a mobile location (e.g., a vehicle such as a car, truck, boat, ship, or other mobile platform that might be apparent to a person of ordinary skill in the art).

[0033] In example implementations, the drone 1 is not particularly limited and may include a quadcopter, hexacopter, octocopter, helicopter a fixed wing drone, or any other type of air maneuverable drone that may be apparent to a person of ordinary skill in the art. Further, in some example implementations, the drone may be ground-based (e.g., car, truck, tracked drone, or any other ground drone that might be apparent to a person of ordinary skill in the art. Similarly, in some example implementations, the drone may be water-based (e.g., a boat, submarine, hovercraft or other water drone that might be apparent to a person of ordinary skill in the art. The drone 1 may be controlled by the pilot/owner 10 using a cellular signal, radiofrequency signal, Bluetooth signal, line-of- sight laser signal or any other wireless signal that may be apparent to a person of ordinary skill in the art. Further, the drone 1 may include an identification beacon 2 that may be either integrated into the drone itself by the drone manufacturer or added as an aftermarket module by the owner/pilot 10.

[0034] The beacon 2 may be a small, self-contained wireless transmitting device that is registered with a database that is part of the IFF system 15. In some example implementations, the beacon 15 may broadcast an encrypted signature using SSL certificates that are unique to each beacon that enables the rest of the IFF System 15 to identify the drone and verify whether it is permitted to fly in any given airspace. As discussed in greater detail below, the beacon 2 may include a housing, battery, microcontroller with support electronics, a charging port, and antenna for sending and receiving wireless signals (Wi-Fi, cellular, satellite communication, ZigBee, Bluetooth, or any other wireless frequency or protocol that might be apparent to a person of ordinary skill in the art). As an aftermarket device, the beacon 2 may be mounted onto any drone using either a generic mounting system or one designed specifically for the most common drones (e.g. DJI Phantom, 3DR Solo, DJI Inspire).

[0035] Additionally, the beacon 2 may include three layers or components: 1. A data link layer that may be implemented by Wi-Fi, cellular, satellite communication, ZigBee, Bluetooth, or any other wireless frequency or protocol that might be apparent to a person of ordinary skill in the art; 2. An authentication layer that may implement encrypted identification information and/or provide two-way authentication; and 3. a telemetry layer that may provide location information or other onboard senor data. The information may also include other pilot/owner selected and specified information - e.g. drone type, company, mission, social media feed, contact information or any other information that might be apparent to a person of ordinary skill in the art. [0036] During operation, the drone 1 may be observed by a third-party

operator/ob server 5, who is located in a general vicinity of the drone 1. Though the operator/ob server 5 may be in a general vicinity of the drone 1, the operator/ob server 5 may be very distant from the drone owner/pilot 10 as the signal range for the

communication between the owner/pilot 10 and the drone 1 may be quite large. Thus, without some sort of system to identify the drone 1 and/or the drone's owner/pilot 10, the observer/operator 5 is unable to determine whether the drone 10 is authorized to be at the location and/or the drone's purpose creating a knowledge gap. The IFF system 15 according to an example implementation of the present application may seek to fill that knowledge gap as discussed below.

[0037] As illustrated in FIG. 1, as an initial matter the drone owner/operator 10 may register the drone 1 with the IFF system 15 using communication 105. The owner/operator 10 may use a mobile application on a mobile computing device or may use a web-based registration form to provide the IFF system 15 with registration information. The registration information may include identification information for the drone 1 (e.g., manufacturer, model, manufacture date, etc.) and identification information for the beacon 2 (e.g., identification number or identification card). The registration information may also include identification information for the drone owner/pilot 10 (e.g., name, address, phone number, email address, etc.). The registration process is discussed in greater detail below with respect to the user interfaces of FIG. 10.

[0038] In some example implementations, the pilot/owner may also have an option to control whether the registered information is publically available and optionally, to provide redacted information that will be publically available as an alternative to the registered information. For example, a pilot/owner may use a private, personal email address for registration purposes, but provide a different, corporate a use-specific address to be publically listed.

[0039] In some implementations, the owner/operator 10 may not pre-register the information using communication 105 but the identification information for the drone 1, the beacon 2, and the drone owner/pilot 10 may be provided to the IFF system 15 in real time using communication 105 while the drone owner/pilot 10 is operating the drone 1.

[0040] The IFF system 15 may include a database to store received information and a backend to facilitate communications between the IFF system and other parties and provide information stored in the database to authorized requesters. The database may be a proprietary database set-up for operation by corporate clients, a public database maintained by a third party, or a combination of both. The database may contain confidential sUAS information such as unique identifiers, sUAS data, registered flight plans, airspace access permissions, purchased permits, social media connections, FAA registrations, sUAS owner (private or corporate), and pilot information. This database is kept up to date on a remote server for ease of access wherever internet is available. The database may be periodically downloaded to a Smartphone Application or other software program for use when data connection is unavailable, for offline use. Further the database may also be stored locally on the beacon by the owner/pilot and transmitted to the observer when the observer is unable to connect to the internet.

[0041] Further, the wireless communication signal 105 may be a Wi-Fi, cellular, satellite communication, ZigBee, Bluetooth, a direct line-of-sight laser signal, or any other wireless frequency or protocol that might be apparent to a person of ordinary skill in the art.

[0042] As illustrated in FIG. 2, the operator/observer 5 may use a handheld IFF interface unit 4 to wirelessly communicate with the beacon 2. In some example implementations the IFF interface unit 4 may be an IFF specific mobile device designed to interact with the IFF system and registered secure beacons such as the beacon 2. In other example implementations, the IFF interface unit 4 may be the operator/ob server's 5 personal communications device (e.g. smart phone, tablet, smart watch etc.) running a software program or mobile application (e.g., an IFF Smartphone app) designed to interface with the IFF system 15.

[0043] The IFF interface unit may include the following components or layers: 1.

Data link layer that may facilitate data exchange with both the drone 1 (or the beacon 2 mounted on the drone 1) and the Internet/cloud-based network may be implemented by Wi-Fi, cellular, satellite communication, ZigBee, Bluetooth, or any other wireless frequency or protocol that might be apparent to a person of ordinary skill in the art; 2. An Authentication layer that may provide one-way or two-way authentication; and 3. a data storage layer that may store a local copy of the IFF database, archived data frames, uploaded policy data, or any other information necessary for the operation of the IFF interface unit 4. In some example implementations, another layer may be provided for information to be transmitted to the pilot/owner via the drone (e.g., "you are in a secure airspace, please depart immediately", or any other communication message that might be apparent to a person of ordinary skill in the art.)

[0044] The IFF Smartphone App or software program may be compatible with all latest generation smartphones, either natively or through a web application. Using the onboard RF antenna, the app may receive transmissions via Wi-Fi, cellular, satellite communication, ZigBee, Bluetooth, or any other wireless frequency or protocol that might be apparent to a person of ordinary skill in the art from the IFF Beacon which it cross- references with an IFF Database. The App may then display an augmented reality user interface incorporating any publicly available drone and pilot information associated with the IFF Beacon over the smartphone camera view as discussed below. Through the app the user may access any relevant/available pilot and sUAS data contained in the database as well as the ability to contact the pilot anonymously if so desired.

[0045] In some example implementations, the IFF interface unit 4 may also include an IFF receiver. The IFF Receiver may be a compact handheld device capable of extending the effective range of the IFF Smartphone App running on a mobile device. The receiver may be comprised of a housing, battery, microcontroller with support electronics, Bluetooth receiver, wire connections for data and/or power, and single directional communication antenna (and potentially a high powered camera). The receiver may operate using Wi-Fi, cellular, satellite communication, ZigBee, Bluetooth, or any other wireless frequency or protocol that might be apparent to a person of ordinary skill in the art. The receiver may pair with a mobile device (e.g., a large-screen, latest generation smartphone or mini tablet) and provides an ergonomic platform for aiming and operating the smartphone app.

[0046] In some example implementations, the beacon 2 may broadcast encrypted identification information (optionally including current location based on GPS information or other location information). This transmission may use bank-level encryption, transmitted over 2.4 GHz radio link or any other data link that might be apparent to a person of ordinary skill in the art, and can be received by IFF interface unit 4. Due to the two-way authentication at the data transmission level, the information from the drone 1 may be trusted as coming from the drone 1.

[0047] For example, with the IFF interface unit 4, the operator/ob server 5 may receive an encrypted code or identification number from the beacon 2 mounted on the drone 1 via wireless communication signal 110. The encrypted code or identification number and optional GPS location may be transmitted by the beacon 2 once per second, or at any interval that might be apparent to a person of ordinary skill in the art.

[0048] Once the operator/ob server 5 receives the encrypted code or identification number from the beacon 2, the operator/ob server 5 may provide the encrypted code or identification number to the IFF system 15 using wireless communication signal 115 along with the request for verification that the drone 1 is authorized to be at this specific location and/or contact information of the drone owner/pilot 10. Again, either of the wireless communication signals 110, 115 may be a transmission using Wi-Fi, cellular, satellite communication, ZigBee, Bluetooth, a direct line-of-sight laser signal, or any other wireless frequency or protocol that might be apparent to a person of ordinary skill in the art.

[0049] As illustrated in FIG. 3, the IFF system 15 may reply to the wireless communication signal 115 with identification information transmitted through wireless communication signal 120. In some example implementations, the identification information may include a notification that the drone 1 has preauthorization to be in the location as well as an explanation of the intended purpose for its presence. In other example implementations, the identification information may additionally or alternatively include identification information which may identify and/or allow communications with the drone owner/pilot 10. For example, the identification information may include the drone owner/pilot's 10 name, phone number, email address, social media username, or any other information that may be used to identify and/or contact the drone owner/pilot 10.

[0050] As illustrated in FIG. 4, after receiving the identification information by the wireless communication signal 120, the operator/ob server 5 may send a communication signal 125 to the drone owner/pilot 10 to confirm that he is actually piloting the drone 1 associated with the beacon 2. This may provide a second factor of authentication to allow confirmation that not only is the specific drone 1 authorized to be in a specific location, but that the registered owner/pilot is operating the drone and the registered drone has not been commandeered by a rogue pilot. The communication signal 125 may be an email, an application based communication sent through shared communication platform (either incorporated as part of the IFF system or a third-party communications platform such as an instant message platform, social media platform etc.), a short messaging system (SMS) communication, a voice over IP (VOIP) communication, a telephonic call using telephone infrastructure (e.g. cellular network or hardline), a message or other communication uploaded to the beacon and downloaded to the owner/pilot via a data connection with the beacon or any other communication that may be apparent to a person of ordinary skill in the art.

[0051] Once the operator/ob server 5 is satisfied that the drone 1 associated with the beacon 2 is authorized and operated in accordance with applicable flight

restrictions/access guidelines the communication signal 125 may be terminated. The observer/operator 5 and the drone owner/pilot 10 may go about their respective activities. Alternatively, if the operator/ob server 5 is not satisfied that the drone 1 associated with the beacon 2 or is not operated in accordance with applicable flight restrictions/access guidelines, the operator/ob server 5 may take responsive action by initiating or requesting interdiction (e.g. soft interdiction or hard interdiction) of the drone 1 or reporting it to authorities such as FAA, Police, etc. Example implementations of this interdiction may be discussed in greater detail below.

[0052] FIG. 5 illustrates a schematic representation 500 of a system in accordance with another example implementation of the present application. Some aspects of the schematic representation 500 may be similar to aspects of the schematic representation 100 of FIGS. 1-4. Thus, similar description and reference numerals may be provided. Again, a drone 1 may be operated by an owner or pilot 10 in a location. The location may be a public location (such as a park, forest, garden, or any other location that might be apparent to a person of ordinary skill in the art), a private location (such as a private residence, a corporate location, a private golf course, or any other location that might be apparent to a person of ordinary skill in the art), a secured location (such as a power plant, a military base, a government facility or any other location that might be apparent to a person of ordinary skill in the art) or any other type of location that might be apparent to a person of ordinary skill in the art.

[0053] Further, the drone 1 again may include an identification beacon 2 that may be either integrated into the drone itself by the drone manufacturer or added as an aftermarket module by the owner/pilot 10. The beacon 2 may be a small, self-contained wireless transmitting device that is registered with a database that is part of the IFF system 15. For example, the beacon 15 may broadcast an encrypted signature using SSL certificates that are unique to each beacon that enables the rest of the IFF System 15 to identify the drone and verify whether it is permitted to fly in any given airspace. As discussed in greater detail below, the beacon 2 may include a housing, battery, microcontroller with support electronics, a charging port, and antenna for sending and receiving wireless signals (e.g., Wi-Fi, cellular, satellite communication, ZigBee,

Bluetooth, or any other wireless frequency or protocol that might be apparent to a person of ordinary skill in the art ). As an aftermarket device, the beacon 2 may be mounted onto any drone using either a generic mounting system or one designed specifically for the most common drones (e.g. DJI Phantom, 3DR Solo, DJI Inspire).

[0054] Again, the drone 1 may be observed by a third-party operator/ob server 5, who is located in a general vicinity of the drone 1. Though the operator/ob server 5 may be in a general vicinity of the drone 1, the operator/ob server 5 may be very distant from the drone owner/pilot 10 as the signal range for the communication between the owner/pilot 10 and the drone 1 may be quite large. The IFF system 15 according to an example implementation of the present application may seek to allow the observer/operator 5 to verify and validate the authorization of the drone to access the location.

[0055] The IFF system 15 may include a database to store registration information received from the drone owner/pilot 10 and a backend to facilitate communications between the IFF system and other parties and provide information stored in the database to authorized requesters. The database may be a proprietary database set-up for operation by corporate clients, a public database maintained by a third party, or a combination of both. The database may contain confidential sUAS information such as unique identifiers, sUAS data, registered flight plans, airspace access permissions, purchased permits, social media connections, FAA registrations, sUAS owner (private or corporate), and pilot information. This database is kept up to date on a remote server for ease of access wherever internet is available. The database may be periodically downloaded to a Smartphone Application or other software program for use when data connection is available, for offline use.

[0056] The registration information may be provided using a mobile application on a mobile computing device or may use a web-based registration form to provide the IFF system 15 with registration information. The registration information may include identification information for the drone 1 (e.g., manufacturer, model, manufacture date, etc.) and identification information for the beacon 2 (e.g., identification number or identification card). The registration information may also include identification information for the drone owner/pilot 10 (e.g., name, address, phone number, email address, etc.). The registration process is discussed in greater detail below with respect to the user interfaces of FIG. 10.

[0057] The backend of the IFF system 15 may facilitate communication using wired or wireless signals such as a Wi-Fi, cellular, satellite communication, ZigBee, Bluetooth, a direct line-of-sight laser signal, or any other type of wireless signal that may be apparent to a person of ordinary skill in the art.

[0058] As illustrated in FIG. 5, the operator/observer 5 may use a handheld IFF interface unit 4 to wirelessly communicate with the beacon 2 at 505. In some example implementations the IFF interface unit 4 may be an IFF specific mobile device designed to interact with the IFF system and registered secure beacons such as the beacon 2. In other example implementations, the IFF interface unit 4 may be the operator/ob server's 5 personal communications device (e.g. smart phone, tablet, smart watch etc.) running a software program or mobile application designed to interface with the IFF system 15.

[0059] The IFF Smartphone App or software program may be compatible with all latest generation smartphones, either natively or through a web application. Using the onboard RF antenna, the app may receive transmissions (e.g., Wi-Fi, cellular, satellite communication, ZigBee, Bluetooth, or any other wireless frequency or protocol that might be apparent to a person of ordinary skill in the art) from the IFF Beacon which it cross- references with an IFF Database. The App may then display an augmented reality user interface incorporating any publicly available drone and pilot information associated with the IFF Beacon over the smartphone camera view as discussed below. Through the app the user may access any relevant/available pilot and sUAS data contained in the database as well as the ability to contact the pilot anonymously if so desired.

[0060] In some example implementations, the IFF interface unit 4 may also include an IFF receiver. The IFF Receiver may be a compact handheld device capable of extending the effective range of the IFF Smartphone App running on a mobile device. The receiver may be comprised of a housing, battery, microcontroller with support electronics, Bluetooth receiver, and single directional communication (e.g., Wi-Fi, cellular, satellite communication, ZigBee, Bluetooth, or any other wireless frequency or protocol that might be apparent to a person of ordinary skill in the art) antenna (and potentially a high powered camera). The receiver may pair with a mobile device (e.g., a large-screen, latest generation smartphone or mini tablet) and provides an ergonomic platform for aiming and operating the smartphone app.

[0061] With the IFF interface unit 4, the operator/ob server 5 may receive an encrypted code or identification number from the beacon 2 mounted on the drone 1 via wireless communication signal 510.

[0062] Once the operator/ob server 5 receives the encrypted code or identification number from the beacon 2, the operator/ob server 5 may provide the encrypted code or identification number to the IFF system 15 using wireless communication signal 515 along with the request for verification that the drone 1 is authorized to be at this specific location and/or contact information of the drone owner/pilot 10.

[0063] The IFF system 15 may reply to the wireless communication signal 515 with identification information transmitted through wireless communication signal 520. In some example implementations, the identification information may include identification information which may identify and/or allow communications with the drone owner/pilot 10. For example, the identification information may include the drone owner/pilot's 10 name, phone number, email address, social media username, or any other information that may be used to identify and/or contact the drone owner/pilot 10.

[0064] After receiving the identification information by the wireless

communication signal 520, the operator/ob server 5 may send a communication signal 525 to the drone owner/pilot 10 to confirm that he is actually piloting the drone 1 associated with the beacon 2. In order to provide more enhanced security, the communication signal 525 may also include a command code request or other verification scheme to which a reply signal 530 will be required in order to validate the drone owner/pilot 5 as the registered drone owner/pilot.

[0065] In some example implementations, the reply signal 530 may include a required/requested PIN, password or other validation code that may verify that the replying party is the registered owner/pilot. This may provide a second factor of authentication to allow confirmation that not only is the specific drone 1 authorized to be in a specific location, but that it is being piloted or flown by the registered owner/pilot and has not been commandeered by a rogue pilot who is impersonating the authorized pilot/owner. In other words, the owner/pilot is verified not only by being reachable using the registered contact information but also by providing the PIN, password, or validation code associated with the drone 1. In some example implementations, the second factor of authentication may be provided by detecting location information (e.g., GPS, etc.) associated with a device (e.g., a phone, tablet, etc.) associated and co-located with the owner/pilot as a proxy for authentication (e.g., if the pilot is located at the same location of the drone, he must be piloting, or he must be ok).

[0066] Once the operator/ob server 5 is satisfied that the drone 1 associated with the beacon 2 is authorized and operated in accordance with applicable flight

restrictions/access guidelines the inquiry of the operator/ob server 5 may be terminated. The observer/operator 5 and the drone owner/pilot 10 may go about their respective activities. Alternatively, if the operator/ob server 5 is not satisfied that the drone 1 associated with the beacon 2 or is not operated in accordance with applicable flight restrictions/access guidelines, the operator/ob server 5 may take responsive action by initiating or requesting interdiction (e.g. soft interdiction or hard interdiction) of the drone 1. Example implementations of this interdiction may be discussed in greater detail below. [0067] In FIG. 5, the observer/operator 5 also has the ability to send a report or update 535 to the IFF system 15. For example, the observer/operator 5 may report that the drone 1 was flying dangerously, hovering in intrusive locations or otherwise violating flight/access standards. The report or update 535 may also include an indication that the drone 1 has been commandeered or been stolen. The IFF system 15 may store the report or forward to another party to act upon.

[0068] In the example implementations of FIGS. 1-5, the observer/operator 5 may interface directly with the drone owner/pilot 10 through communications 125/525/530. However, in certain situations either the observer/operator 5 and/or drone owner/pilot 10 may wish to not directly interface with the other. This may be a safety concern, a privacy concern, or merely a personal preference. The following embodiments may allow the IFF system 15 or some other third party system to provide a barrier.

[0069] FIG. 6 illustrates a schematic representation 600 of a system in accordance with another example implementation of the present application. Some aspects of the schematic representation 600 may be similar to aspects of the schematic representations 100 and 500 of FIGS. 1-5. Thus, similar description and reference numerals may be provided. Again, a drone 1 may be operated by an owner or pilot 10 in a location (e.g., a public location, a private location, a secured location, etc.) or any other type of location that might be apparent to a person of ordinary skill in the art.

[0070] Further, the drone 1 again may include an identification beacon 2 that may be either integrated into the drone itself by the drone manufacturer or added as an aftermarket module by the owner/pilot 10. The beacon 2 may be a small, self-contained wireless transmitting device that is registered with a database that is part of the IFF system 15. For example, the beacon 15 may broadcast an encrypted signature using SSL certificates that are unique to each beacon that enables the rest of the IFF System 15 to identify the drone and verify whether it is permitted to fly in any given airspace.

[0071] Again, the drone 1 may be observed by a third-party operator/ob server 5, who is located in a general vicinity of the drone 1. Though the operator/ob server 5 may be in a general vicinity of the drone 1, the operator/ob server 5 may be very distant from the drone owner/pilot 10 as the signal range for the communication between the owner/pilot 10 and the drone 1 may be quite large. The IFF system 15 according to an example implementation of the present application may seek to allow the observer/operator 5 to verify and validate the authorization of the drone to access the location.

[0072] The IFF system 15 may include a database to store confidential sUAS information such as unique identifiers, sUAS data, registered flight plans, airspace access permissions, purchased permits, social media connections, FAA registrations, sUAS owner (private or corporate), and pilot information. This database is kept up to date on a remote server for ease of access wherever internet is available. The database may be periodically downloaded to a Smartphone Application or other software program for use when data connection is available, for offline use.

[0073] The registration information may be provided using a mobile application on a mobile computing device or may use a web-based registration form to provide the IFF system 15 with registration information. The registration information may include identification information for the drone 1 (e.g., manufacturer, model, manufacture date, etc.) and identification information for the beacon 2 (e.g., identification number or identification card). The registration information may also include identification information for the drone owner/pilot 10 (e.g., name, address, phone number, email address, etc.). The registration process is discussed in greater detail below with respect to the user interfaces of FIG. 10. [0074] The backend of the IFF system 15 may facilitate communication using wired or wireless signals such as a Wi-Fi, cellular, satellite communication, ZigBee, Bluetooth, a direct line-of-sight laser signal, or any other type of wireless signal that may be apparent to a person of ordinary skill in the art.

[0075] As illustrated in FIG. 6, the operator/observer 5 may use a handheld IFF interface unit 4 to wirelessly communicate with the beacon 2 at 605. In some example implementations the IFF interface unit 4 may be an IFF specific mobile device designed to interact with the IFF system and registered secure beacons such as the beacon 2. In other example implementations, the IFF interface unit 4 may be the operator/ob server's 5 personal communications device (e.g. smart phone, tablet, smart watch etc.) running a software program or mobile application designed to interface with the IFF system 15.

[0076] The IFF Smartphone App or software program may be compatible with all latest generation smartphones, either natively or through a web application. Using the onboard RF antenna, the app may receive transmissions (e.g., Wi-Fi, cellular, satellite communication, ZigBee, Bluetooth, or any other wireless frequency or protocol that might be apparent to a person of ordinary skill in the art) from the IFF Beacon which it cross- references with an IFF Database. The App may then display an augmented reality user interface incorporating any publicly available drone and pilot information associated with the IFF Beacon over the smartphone camera view as discussed below. Through the app the user may access any relevant/available pilot and sUAS data contained in the database (or transmitted directly from the beacon) as well as the ability to contact the pilot

anonymously if so desired.

[0077] In some example implementations, the IFF interface unit 4 may also include an IFF receiver. The IFF Receiver may be a compact handheld device capable of extending the effective range of the IFF Smartphone App running on a mobile device. The receiver may be comprised of a housing, battery, microcontroller with support electronics, Bluetooth receiver, and single directional antenna (e.g., Wi-Fi, cellular, satellite communication, ZigBee, Bluetooth, or any other wireless frequency or protocol that might be apparent to a person of ordinary skill in the art) (and potentially a high powered camera). The receiver may pair with a mobile device (e.g., a large-screen, latest generation smartphone or mini tablet) and provides an ergonomic platform for aiming and operating the smartphone app.

[0078] With the IFF interface unit 4, the operator/ob server 5 may receive an encrypted code or identification number from the beacon 2 mounted on the drone 1 via wireless communication signal 610. In some example implementations, signal 610 may also include pilot specified information (e.g., drone type, company, mission, social media feed, contact information or any other information that might be apparent to a person of ordinary skill in the art).

[0079] Once the operator/ob server 5 receives the encrypted code or identification number from the beacon 2, the operator/ob server 5 may provide the encrypted code or identification number to the IFF system 15 using wireless communication signals 615 along with a request for identification of the drone 1 and/or contact information of the drone owner/pilot 10. Any kind of encryption/authenti cation scheme may be used to establish a trusted communications link between devices. Please reference the Mind Tribe document "Security Overview" that was previously shared for more information on this matter.

[0080] In some example implementations, the X509-type certificates may be used to create a chain of trust that enables the Beacon and Reader to challenge and verify each other without requiring any pre-shared information beyond a single trusted root certificate. [0081] For example, a drone owner/pilot may use a specialized provisioning tool to generate a provisioning certificate (with an expiration date) that will be signed by a trusted root certificate. Getting the root certificate signature may be the only step that requires network access - the rest of the process can be done offline.

[0082] Prior to a flight, the beacon 2 may generates its own certificate (also with an expiration date), which is signed by the provisioning certificate. The provisioning certificate and individual beacon certificate may be transmitted to the Reader 4 to confirm trust.

[0083] The Reader 4 side may follow the same process - a provisioning certificate is signed by the root certificate (requiring network access), which is then used to sign the Reader's certificate offline.

[0084] The Reader 4 may stores both the Reader's certificate and the provisioning certificate that signed it and transmits them to the beacon 2 to confirm trust. In order to determine that a drone is friendly, the Reader 2 will broadcast a challenge message containing:

1. Current timestamp.

2. Reader's certificate.

3. Reader's provisioning certificate.

4. Signature of message using Reader's certificate.

[0085] The beacon will receive this challenge, and verify that:

1. The current timestamp is within the allowable clock skew.

2. The Reader's certificate was signed by the Reader's provisioning certificate and is valid.

3. The Reader's provisioning certificate was signed by the trusted root certificate and is valid. 4. The message signature is correct, which proves that the sender of this message is the Reader 4 since only the Reader4 will have access to the Reader's private key needed to generate the signature.

[0086] Once all of these have been verified, the Beacon will respond with a message that is encrypted using the Reader's public key, which contains:

1. The same timestamp from the first message.

2. Beacon's certificate.

3. Beacon's provisioning certificate.

4. Signature of message using Beacon's certificate.

[0087] The Reader 4 will decrypt this message and perform the same verification steps as the beacon 2. Once the beacon 2 is verified, the Reader 4 can indicate to the operator/ob server 5 that there is a friendly beacon 2 in the area.

[0088] In some example implementations, if the operator/ob server 5 would like to confirm the drone they see is the one the reader has identified as a friend the Reader 4 may command the beacon 2 to blink by sending a message encrypted with the beacon's private key containing the blink pattern in addition to the four components of the challenge message.

[0089] The IFF system 15 may reply to the wireless communication signal 615 with identification information associated with the drone and/or pilot/owner 10 transmitted through wireless communication signal 620. In some example implementations, the identification information may include identification information which may identify and/or allow communications with the drone owner/pilot 10. For example, the

identification information may include the drone owner/pilot's 10 name, phone number, email address, social media username, or any other information that may be used to identify and/or contact the drone owner/pilot 10. [0090] After receiving the identification information by the wireless

communication signal 620, the operator/ob server 5 may send a communication signal 625 to the IFF system 15 requesting verification that the registered drone owner/pilot 10 is actually controlling the drone 1 without directly contacting the drone owner/pilot 10. In response, the IFF system 15 provides a two-stage verification process. Specifically, the IFF system 15 may send a verification request communication signal 630 to a

communication platform 18 (e.g., an instant messaging platform, a VOIP platform, or any other type of communication platform that might be apparent to a person of ordinary skill in the art). In some example implementations, the verification request communication signal 630 may include a link to a verification website 17 located on a server of the IFF system 15. In parallel, the IFF system 15 may also initialize the verification website 17 by sending a communication signal 632 to prepare the verification website 17 to receive verification information from the drone owner/pilot 10.

[0091] After receiving the verification request communication signal 630, the communications platform may generate a message 635 (e.g., an Email, Instant message, SMS message, in-app message, etc.) with the link to the verification website 17 requesting that drone owner/pilot 10 provide a current location of the drone 1 and a PIN, password, or other validation code information associated with the drone 1 to the verification website 17.

[0092] The patent owner/pilot 10 would then be required to send a reply signal 640 to the verification site 17 in order to validate the drone owner/pilot 5 as the registered drone owner/pilot and verifying the current location of the drone. In some example implementations, the reply signal 640 may include a required/requested PIN, password or other validation code that may verify that the replying party is the registered owner/pilot. This may provide a second factor of authentication to allow confirmation that not only is the specific drone 1 authorized to be in a specific location, but that it is being piloted or flown by the registered owner/pilot and has not been commandeered by a rogue pilot who is impersonating the authorized pilot/owner. In other words, the owner/pilot is verified not only by being reachable using the registered contact information but also by providing the PIN, password, or validation code associated with the drone 1.

[0093] The verification website 17 may provide the received information from the reply signal 640 to the IFF system 15 through communication signal 645 and the IFF system 15 will compare the received information to the information stored in the IFF database to determine whether the drone owner/pilot 10 has verified the drone's location and passed the verification test provided by the verification site.

[0094] The IFF system 15 may then send a signal to the 650 operator/ob server 5 providing the results of the verification/validation process. If the operator/ob server 5 is satisfied that the drone 1 associated with the beacon 2 is authorized and operated in accordance with applicable flight restrictions/access guidelines, the inquiry of the operator/ob server 5 may be completed. The observer/operator 5 and the drone owner/pilot 10 may go about their respective activities. Alternatively, if the operator/ob server 5 is not satisfied that the drone 1 associated with the beacon 2 or is not operated in accordance with applicable flight restrictions/access guidelines, the operator/ob server 5 may take responsive action by initiating or requesting interdiction (e.g. soft interdiction or hard interdiction) of the drone 1. Example implementations of this interdiction may be discussed in greater detail below.

[0095] In FIG. 6, the observer/operator 5 also has the ability to send a report or update 655 to the IFF system 15. For example, the observer/operator 5 may report that the drone 1 was flying dangerously, hovering in intrusive locations or otherwise violating flight/access standards. The report or update 535 may also include an indication that the drone 1 has been commandeered or been stolen. The IFF system 15 may store the report or forward to another party to act upon.

[0096] In the example implementations of FIGS. 1-5, the observer/operator 5 may interface directly with the drone owner/pilot 10 through communications 125/525/530. However, in certain situations either the observer/operator 5 and/or drone owner/pilot 10 may wish to not directly interface with the other. This may be a safety concern, a privacy concern, or merely a personal preference. The following embodiments may allow the IFF system 15 or some other third party system to provide a barrier.

[0097] FIG. 7 illustrates a schematic representation 700 of a system in accordance with another example implementation of the present application. Some aspects of the schematic representation 700 may be similar to aspects of the schematic representations 100, 500 and 600 of FIGS. 1-6. Thus, similar description and reference numerals may be provided. In FIG. 7, the schematic representation 700 illustrates the interaction of hardware devices associated with the operator/ob server 5, the IFF system 15, and the drone owner/pilot 10. Specifically, an operator/ob server associated device 4 and a pilot/owner associated device 9 may be illustrated interacting with the IFF system 15 in the example implementation of FIG. 7.

[0098] Though FIG. 7 may illustrate the hardware devices associated with operator/ob server 5, the IFF system 15, and the drone owner/pilot 10 as smart phones or tablets, example implementations of the present application are not limited to smart phone or tablets and may be any device capable of performing the described functions as may be apparent to a person of ordinary skill in the art.

[0099] In the illustrated implementation, the drone 1 may be operated by an owner or pilot 10 in a location (e.g., a public location, a private location, a secured location or any other type of location that might be apparent to a person of ordinary skill in the art). Further, the drone 1 again may include an identification beacon 2 that may be either integrated into the drone itself by the drone manufacturer or added as an aftermarket module by the owner/pilot 10. The beacon 2 may be a small, self-contained wireless transmitting device that is registered with a database that is part of the IFF system 15. For example, the beacon 15 may broadcast an encrypted signature using SSL certificates that are unique to each beacon that enables the rest of the IFF System 15 to identify the drone and verify whether it is permitted to fly in any given airspace.

[00100] Other methods of establishing an authenticated or trusted communication may be used. For example, the challenge/reply scheme discussed above may be used. Alternatively, each Beacon and Reader with their own permanent IDs and secret keys, then pre-sharing all ID-key pairs with all Beacons and Readers so that they use the secret keys to verify each other.

[00101] Further in some example implementations, and to potentially speed up visual indication of multiple friendly drones as quickly as possible, a shared session key can be securely shared by the Reader with each Beacon as an additional (third) message in the initial challenge/response sequence. By encrypting the blink sequence using this pre- shared session key the same message can be sent to all friendly drones simultaneously while maintaining security.

[00102] Additionally, in some example implementations, the Reader may add a whitelist of all known friendly Beacons to its challenge messages. Readers who see their ID in the whitelist do not need to reply to the challenge since the Reader already knows that the Beacon exists. The Reader can periodically drop Beacon IDs from the whitelist in order to check if that Beacon is still in the area.

[00103] As illustrated, the pilot/owner associated device 9 may be used to register the drone 1 with the IFF system 15 using communication 705. The pilot/owner associated device 9 may run/interact with a mobile registration application 16A or may use a website- based registration form 15A to provide the IFF system 15 with registration information. The registration information may include identification information for the drone 1 (e.g., manufacturer, model, manufacture date, etc.) and identification information for the beacon 2 (e.g., identification number or identification card). The registration information may also include identification information for the drone owner/pilot 10 (e.g., name, address, phone number, email address, etc.). The registration process is discussed in greater detail below with respect to the user interfaces of FIG. 10.

[00104] Either the mobile registration application 16A or the website-based registration form 15A may be used to perform one or more of:

• Create owner/pilot profile;

• Register beacons;

• Enter drone serial numbers;

• Upload photos of drone; and

• Register phone numbers.

[00105] In some implementations, the owner/operator 10 may not pre-register the information using communication 705 but the identification information for the drone 1, the beacon 2, and the drone owner/pilot 10 may be provided to the IFF system 15 in real time using communication 705 while the drone owner/pilot 10 is operating the drone 1.

[00106] The IFF system 15 may include a database 15B to store received information and a backend to facilitate communications between the IFF system and other parties and provide information stored in the database to authorized requesters. The database 15B may be a proprietary database set-up for operation by corporate clients, a public database maintained by a third party, or a combination of both. The database 15B may contain confidential sUAS information such as unique identifiers, sUAS data, registered flight plans, airspace access permissions, purchased permits, social media connections, FAA registrations, sUAS owner (private or corporate), and pilot information. This database 15B is kept up to date on a remote server for ease of access wherever internet is available. The database 15B may be periodically downloaded to a Smartphone Application or other software program for use when data connection is available, for offline use. The IFF database and backend 15B may be running backend software 16B, which may perform one or more of:

• Store Registration Information;

• Serve drone/owner information;

• Process contact requests;

• Cross reference GPS locations between IFF receiver and drone owner;

• Log complaints; and

• Log activities.

[00107] As illustrated in FIG. 6, the operator/observer associated device 4 may be a handheld IFF interface unit that may wirelessly communicate with the beacon 2. In some example implementations, the operator/ob server associated device 4 may be an IFF specific mobile device designed to interact with the IFF system 15 and registered secure beacons such as the beacon 2. In other example implementations, the IFF interface unit 4 may be the operator/ob server's personal communications device (e.g. smart phone, tablet, smart watch etc.) running a software program or mobile application 6 designed to interface with the IFF system 15.

[00108] The software program or mobile application 6 may allow the

operator/ob server associated device 4 to do one or more of: • Read signals via Wi-Fi, cellular, satellite communication,

ZigBee, Bluetooth, or any other wireless frequency or protocol that might be apparent to a person of ordinary skill in the art;

• Send Queries to the IFF Backend;

• Display drone owner information;

• Sends text to drone owner (via an anonymization service or dedicated app);

• Call a drone owner; and

• Log complaints.

[00109] In some example implementations, the operator/ob server associated device 4 may also include an IFF receiver. The IFF Receiver may be a compact handheld device capable of extending the effective range of the Smartphone App 6 running on a mobile device. The receiver may be comprised of a housing, battery, microcontroller with support electronics, Bluetooth receiver, and single directional antenna (e.g., Wi-Fi, cellular, satellite communication, ZigBee, Bluetooth, or any other wireless frequency or protocol that might be apparent to a person of ordinary skill in the art) (and potentially a high powered camera). The receiver may pair with operator/ob server associated device 4 (e.g., a large-screen, latest generation smartphone or mini tablet) and provides an ergonomic platform for aiming and operating the smartphone app or may be a separate, independent stand-alone device.

[00110] Similarly, the owner/pilot associated device 9 may be a handheld interface unit that may wirelessly communicate with the IFF system 15. In some example implementations, the owner/pilot associated device 9 may be a specific mobile device designed to interact with the IFF system 15. In other example implementations, the owner/pilot associated device 9 may be the owner/pilot's personal communications device (e.g. smart phone, tablet, smart watch etc.) running a software program or mobile application 11 designed to interface with the IFF system 15.

[00111] The software program or mobile application 11 may allow the drone owner/pilot associated device 9 to do one or more of:

• Create owner/pilot profiles;

• Register beacons/drones;

• Enter Drone serial numbers;

• Upload photo of the drone;

• Register phone numbers;

• Log flights & GPS locations;

• Update profiles;

• Upload photos to profiles.

[00112] During operation of the drone 1, the owner/pilot associated device 9 may regularly log location and other activities performed by the drone owner/pilot 10 during operation of the drone. The owner/pilot associated device 9 may report these logged activities to the IFF system 15 through communication signal 710. In some example implementations, the logged activity information sent with the communication signal 710 may also include GPS data associated with the drone 1.

[00113] Further, in some example implementations, the pilot may also load specific information onto the beacon 2 that would be available to the operator/ob server associated device 4 if an internet device is not available. For example, the pilot/owner may load contact information (e.g., phone number, email, social media link, current mission, current access authorizations, or any other information that might be apparent to a person of ordinary skill in the art). [00114] The operator/ob server associated device 4 may receive an encrypted code or identification number from the beacon 2 mounted on the drone 1 via wireless communication signal 715. Once operator/ob server associated device 4 receives the encrypted code or identification number from the beacon 2, the operator/ob server associated device 4 may provide the encrypted code or identification number to the IFF system 15 using wireless communication signal 720 along with a request for identification of the drone 1 and/or contact information of the drone owner/pilot 10. In some example implementations, the wireless communication signal 720 may also include GPS or other location information associated with the operator/observer associated device 4.

[00115] The IFF system 15 may reply to the wireless communication signal 720 with identification information associated with the drone 1 and/or pilot/owner 10 transmitted through wireless communication signal 725. In some example

implementations, the identification information may include identification information which may identify and/or allow communications with the drone owner/pilot 10. For example, the identification information may include the drone owner/pilot's 10 name, phone number, email address, social media username, or any other information that may be used to identify and/or contact the drone owner/pilot 10.

[00116] After receiving the identification information by the wireless

communication signal 725, the operator/ob server associated device 4 may send a communication signal 730A to the IFF system 15 requesting a message or phone call with the drone owner/pilot 10. In response, the IFF system 15 may route the message or phone call request to through an anonymization service 20 that strips out the operator/ob server associated device's 4 identification information from the request to generate

communication 730B and create an anonymized communication between the

operator/ob server associated device 4 and the owner/pilot associated device 9. [00117] Further, the IFF database and backend 15B may compare the received activity log received at 710 with the received GPS data associated with communication signal 720 received from the operator/ob server associated device 4. If the comparison indicates that drone 1 may not be authorized to be in a particular area, or may not be currently controlled by the registered owner/pilot, the IFF database and backend 15B may send an urgent alert signal 735 to the drone owner/pilot associated device 9.

[00118] The drone owner/pilot associated device 9 may then be required to send a reply signal 740 in order to validate the drone owner/pilot 5 as the registered drone owner/pilot and verifying the current location of the drone. In some example

implementations, the reply signal 740 may include a required/requested PIN, password or other validation code that may verify that the replying party is the registered owner/pilot. This may provide a second factor of authentication to allow confirmation that not only is the specific drone 1 authorized to be in a specific location, but that it is being piloted or flown by the registered owner/pilot and has not been commandeered by a rogue pilot who is impersonating the authorized pilot/owner. In other words, the owner/pilot is verified not only by being reachable using the registered contact information but also by providing the PIN, password, or validation code associated with the drone 1.

[00119] The IFF database and backend 15B may provide the received information from the reply signal 740 to observer/operator associated device 4 through communication signal 745. If the operator/ob server 5 is satisfied that the drone 1 associated with the beacon 2 is authorized and operated in accordance with applicable flight

restrictions/access guidelines, the inquiry of the operator/ob server 5 may be completed. The observer/operator 5 and the drone owner/pilot 10 may go about their respective activities. Alternatively, if the operator/ob server 5 is not satisfied that the drone 1 associated with the beacon 2 or is not operated in accordance with applicable flight restrictions/access guidelines, the operator/ob server 5 may take responsive action by initiating or requesting interdiction (e.g. soft interdiction or hard interdiction) of the drone 1 or reporting it to the authorities. Example implementations of this interdiction may be discussed in greater detail below.

[00120] In FIG. 7, the observer/operator associated device 4 may also have the ability to send a report or update 750 to the IFF system 15. For example, the

observer/operator 5 may report that the drone 1 was flying dangerously, hovering in intrusive locations or otherwise violating flight/access standards. The report or update 750 may also include an indication that the drone 1 has been commandeered or been stolen. The IFF system 15 may store the report or forward to another party to act upon.

[00121] In the example implementations of FIGS. 1-7, the drone 1 may be detected/ob served by a person or mobile device associated with a person. However, in some example implementations the drone may alternatively be detected by an automated base station or sensor tower.

[00122] FIGS. 8 illustrate a schematic representation 800 of a system in accordance with another example implementation of the present application. Some aspects of the schematic representation 800 may be similar to aspects of the schematic representations 100, 500, 600 and 700 of FIGS. 1-6. Thus, similar description and reference numerals may be provided. In FIG. 8, the schematic representation 800 illustrates a fixed base station 3 that is integrated with the IFF system 15.

[00123] Again, a drone 1 may be operated by an owner or pilot 10 in a location

(e.g., a public location, a private location, a secured location or any other type of location that might be apparent to a person of ordinary skill in the art).

[00124] Further, the drone 1 again may include an identification beacon 2 that may be either integrated into the drone itself by the drone manufacturer or added as an aftermarket module by the owner/pilot 10. The beacon 2 may be a small, self-contained wireless transmitting device that is registered with a database that is part of the IFF system 15. For example, the beacon 15 may broadcast an encrypted signature using SSL certificates that are unique to each beacon that enables the rest of the IFF System 15 to identify the drone and verify whether it is permitted to fly in any given airspace. The SSL certificate may be a Wi-Fi SSL or any RF communication frequency/protocol. Alternative processes used to establish a verified/secured session may be used as described above.

[00125] As illustrated in FIG. 8, the drone 1, communicates with a fixed base station 3 of the IFF system 15 wirelessly with communication signal 802. Communication signal 802 may include a unique identifier associated with the beacon 2, an encrypted security key, and GPS coordinates other location information associated with the drone 1. The fixed base station 3 and IFF ground server 820 may communicate with each other, an IFF tracking system 825 and a third-party software package 830 using communication signal 810. The communications signal 810 may provide the IFF ground server 820 with the identifier associated with the beacon and the received location information for storage and updating flight logs. The communication signal 810 may also provide the third-party software 830 with the received location information and identification information associated with the beacon 2 for verification of the logged information stored to the IFF ground server 820.

[00126] Further, the drone 1 may also communicate with the drone owner/pilot 10 via communication signal 803. Communication signal 803 may also include a unique identifier associated with the beacon 2, and encrypted security key, and GPS coordinates or other location information associated with the drone 1. The drone owner/pilots may communicate with the third-party software package 840 using communication signal 805, which includes the received unique identifier associated with the beacon 2, the encrypted security key, and the GPS coordinates associated with the drone 1.

[00127] The third-party software package 830 and the third-party software package 840 may be the same third-party software package or separate third-party software packages configured to communicate with each other over a communications network or other backend system. The third-party software package 830 and the third-party software package 840 may exchange information 850 in order to verify that the location

information (e.g. GPS coordinates) associated with the drone received by the fixed base station 3 matches the location information (e.g., GPS coordinates) reported by drone owner/pilot 10 based on the received identifier information associated with the beacon 2. Based on the results of a comparison performed by the third-party software package 830 and the third party software package 840, the third-party software package 830 may report back to the IFF ground server 820 that the received GPS coordinates or other location information have been verified.

[00128] The IFF tracking system 825 may also communicate with third-party visualization software 835 to generate a graphical representation of the drone 1 overlaid onto a map, aerial photo, satellite photo, or other representation of a location within which the drone reference 1 has been detected. In others words, example implementations consistent with FIG. 8 may provide not only verification of the location and/or identity of the drone 1, but may also produce a real time visualization, or a historical visualization of the drone 1 location, similar to radar tracking or other flight management systems used for large fixed wing aircraft.

[00129] FIGS. 9-12 illustrate user interfaces (UI) 900-1200 that may be used as part of the electronic communication signals discussed above with respect to the example implementations illustrated in FIGS. 1-8. Each UI 900-1200 may be displayed on a display device such as a computer screen, laptop screen, touchscreen of a mobile computing device or other display device that may be apparent to a person of ordinary skill in the art. The UIs 900-1200 may be used to control a computing device such as computing device 2105 of the computing environment 2100 illustrated and discussed below with respect to FIG. 21. The functionalities illustrated in the UIs 900-1200 are example functionalities that may be implement using the illustrated or similar UIs. Other UIs or functionalities may be apparent to a person of ordinary skill.

[00130] As illustrated in FIG. 9, the UI 900 includes a plurality of screens 905-920 which may be navigated between by selecting various options on each screen. The UI 900 may be an example implementation of the UI that may be used to identify a drone detected in the vicinity of an observer/operator (e.g. observer/operator 5 illustrated in the above discussed embodiments). The UI 900 may also be used to contact the owner/pilot of a detected drone (e.g. drone owner/pilot 10 of the drone 1 discussed above) and/or log a report with an IFF system (e.g., IFF system 15).

[00131] Screen 905 may include a listing of all drones for which a beacon has been detected within the sensor range. By selecting one of the listed drones, screen 905 may transition to screen 910 which provides information regarding the detected drone selected. The information provided may be received from a database associated with an IFF system based on a unique identifier received from a beacon attached to the drone or broadcast directly from the beacon.

[00132] The screen 910 may also provide a plurality of buttons 925, 930, 935 to perform various operations. For example, button 925 may be used to send a text to the registered owner/pilot associated with the detected drone selected. By selecting button 925, the UI 900 may transition to an integrated or independent texting application that may be used to send a text message or other short message to the registered number associated with the detected drone that was selected. In some example implementations, the registered number may be anonymized so that it is not accessible to a user using the UI 900.

[00133] Similarly, button 930 may be used to initiate a phone call, video call, or other real time communication with the registered owner/pilot associated with the detected drone that was selected to again, selecting the button 930 may transition to an integrated or independent real-time communications application that may be used to conduct the phone call, video call, or other real-time communication. In some example implementations, the registered phone number or other unique identifier used to initiate the phone call, video call, or other real-time communication may be anonymized so that it is not accessible to a user using the UI 900 or to the owner/pilot that received the communication.

[00134] Further, button 935 may be used to transition the UI 900 to screen 915 that may be used to launch or file a report regarding the detected drone that was selected. As illustrated, the screen 915 may provide options for submitting various types of reports (e.g., "trespassing", "spying", "harassing", "pilot not present", or any other commonly occurring type of report that might be apparent to a person of ordinary skill in the art). In some example implementations, the screen 915 may also include an option to select "other" and/or a text entry field 940 that may be used to draft a report for which there is not an existing type or option.

[00135] The screen 915 may also include a button 945 that is used to submit the report once it has been prepared. By selecting the button 945, the UI 900 may transition to screen 920 providing verification that the report has been sent. Once the report has been sent, the UI 900 may transition back to any one of screens 905 or 910.

[00136] As illustrated in FIG. 10, the UI 1000 includes a plurality of screens 1005-

1020 which may be navigated between by selecting various options on each screen. The UI 1000 may be an example implementation of the UI that may be used to register a drone (e.g. drone 1 discussed in example implementations above) and an owner/pilot associated with the drone (e.g., drone owner/pilot 10 discussed in example implementations above) with an IFF system (e.g. IFF system reference 15 discussed above).

[00137] Screen 1005 may provide an account creation operation by allowing a user of the UI 1000 to enter his or her name and other identification information in a series of text entry fields represented within the broken line box 1025. Further screen 1005 may also provide a creation button 1030 that may be selected to create an account and transition the UI 1000 to screen 1010.

[00138] Screen 1010 may provide a drone registration operation by allowing the user of the UI 1000 to provide identification information associated with the drone. For example, control features illustrated within broken line box 1035 may be used to enter or select the manufacturer and model of the drone as well as enter a serial number associated with the drone and either select a stock image or upload a custom image of the drone. Further, screen 1010 may also provide a button 1040 that may be selected to register the drone and transition the UI 1000 to screen 1015.

[00139] Screen 1015 may provide a beacon regi strati on/activati on operation by allowing the user of the UI 1000 to provide identification information associated with a beacon mounted on the drone. For example, control features illustrated within broken line box 1045 may be used to enter a beacon identification number or provide an FAA registration number. Further, screen 1015 may also provide a button 1050 that may be selected to activate the beacon and transition the UI 1000 to screen 1020.

[00140] Screen 1020 may provide verification that the beacon has been activated. Once the beacon has been activated, the UI 1000 may transition back to screen 1005. [00141] As illustrated in FIG. 11, the UI 11000 includes a plurality of screens 1105-

1120 which may be navigated between by selecting various options on each screen. The UI 1100 may be an example implementation of the UI that may be used by an owner/pilot associated with a drone (e.g., drone owner/pilot 10 discussed in example implementations above) to log a flight with an IFF system (e.g. IFF system reference 15 discussed above) or directly on the beacon 2 (e.g., in a situation where a network connection to the IFF system is not available).

[00142] Screen 1105 may provide welcome screen with a button 1125 that may be used to start logging of the flight with the IFF system. When the button 1125 is selected, the UI 1100 may transition to screen 1110.

[00143] Screen 1110 may include a listing of all drones that have been registered IFF system as being previously registered by the user (e.g., an owner/operator) of the UI 1100, who may be the registered owner/operator. By selecting one of the listed drones, screen 1110 may transition to screen 1115 which may be used to provide information regarding the flight to be locked using the UI 1100.

[00144] As illustrated, screen 1115 may provide options for selecting various types of flights to be logged (e.g., "a photography flight", "a filming flight", "a recreational flight", "a commercial flight", or any other type of flight purpose that may be apparent to a person of ordinary skill in the art). In some example implementations, the screen 1115 may also include an option to select "other" and/or a text entry field 1130 that may be used to define a different flight purpose to be logged which is not one of the existing available options. The screen 1115 may also include a buttoned 1135 that may be used to start the logging once the flight type or flight purpose has been defined. By selecting the button 1135, the UI 1100 may transition to screen 1120. [00145] Screen 1120 may provide an indicator 1140 providing a real-time indication of flight time since the button 1135 was pressed and logging of the flight was started. Further, in some example implementations a warning 1145 may be provided that if the device on which UI 1100 is displayed moves to a new location, the current flight log will end and a new flight log will be started. Still further, screen 1120 may also include a button 1150 that may be used to end logging of the current flight. Selection of button 1150 may cause the UI 1100 to transition back to screen 1105.

[00146] As illustrated in FIG. 12, the UI 12000 includes a plurality of screens 1205-

1220 which may be navigated between by selecting various options on each screen. The UI 1200 may be an example implementation of the UI that may be used to request an owner/pilot associated with a drone (e.g., drone owner/pilot 10 discussed in example implementations above) confirm he or she is currently controlling his or her drone.

[00147] Screen 1205 may provide the initial flight confirmation request by providing an indicator or map 1225 indicating the current detected location of the beacon associated with a drone that the owner/pilot associated with the UI 1200. Screen 1205 may also provide a pair of buttons 1230, 1235 that may be used to either confirm actual control of the detected drone or report a problem. Specifically, button 1230 may be used to confirm actual control or operation of the detected drone and cause the UI 1200 to transition to screen 1210. Conversely, button 1235 may be used to report a problem and cause the UI 1200 to transition to screen 1215.

[00148] Screen 1210, which may be used to confirm actual control or operation of the detected drone, may provide a button 1240 that may be used to log the current flight of the drone. Selection of the button 1240 may cause the UI 1200 to transition to screen 1105 of UI 1100 discussed above. Further, screen 1210 may also include an indicator 1250 informing a user of the UI 1200 of a timeframe or future time for which the current confirmation or validation will be good (e.g., "This location will remain valid for:

0:37:00") in some example implementations.

[00149] Screen 1215, which may be used to report a problem, may provide options for identifying various types of problems (e.g., "stolen drone", "stolen beacon",

"uncertain"), or any other type of problem that may be apparent to a person of ordinary skill in the art. Further, in some example implementations, the screen 1215 may also include an option to select "other" and/or a text entry field 1255 that may be used to enter a textual description of a problem for which there is not an existing type or option.

[00150] The screen 1215 may also include a button 1260 that is used to submit the problem report once it has been prepared. By selecting the button 1260, the UI 1200 may transition to screen 1220 providing verification that the report has been sent. Once the report has been sent, the UI 1200 may transition back to screen 1205.

[00151] FIG. 13 illustrates the process 1300 of identifying an inbound drone or other aerial platform is either a friend or a foe (IFF) using a system in accordance with an example implementation of the present application. As illustrated, the process 1300 involves a series of steps performed by three parties: 1. an operator/ob server (e.g.

operator/ob server 5 discussed above), 2. a beacon mounted on the drone or other aerial platform, and 3. a reader associated with an IFF system (e.g., an IFF interface device 4 illustrated in FIGS. 1-7 discussed above). In FIG. 13, arrow 1301 illustrates the direction of process flow performed by each of the three parties during the process 1300. In some example implementations, the reader associated with the IFF system may be an omnidirectional reader, or may be a directional reader which must be pointed at the drone.

[00152] As illustrated, at 1305 the beacon is in a hibernate-in-flight state, meaning that the beacon is in a hibernate mode listening for a wake-up command received via a communication signal. In parallel at 1310 the operator becomes alerted or aware that the drone is overhead, nearby, or incoming. This alert may be received by visually seeing the drone, hearing the drone, receiving some sort of warning, sensing the drone with a sensor (such as radar, for example), or any other process of receiving an alert that may be apparent to a person of ordinary skill in the art.

[00153] In response to the alert, the operator may react at 1315 by, for example, sheltering in place, or attempting to locate the UAV visually. In other words, the operator, uncertain of whether the drone is a friend or a foe, may hurriedly scan the sky in an attempt to locate the UAV. Simultaneously, the operator may grab the reader. At 1320, the operator may trigger a wake-up operation of the reader and wait to receive a reading from the reader.

[00154] At 1325 when the wake-up of the reader is triggered, it may transmit an encrypted signal requesting that any beacon within range prove that the drone on which it is mounted is a friend. In response to receiving the encrypted signal from the reader, the beacon may wake up, transmit a unique ID or other user specified information via a wireless signal before returning to a hibernation state at 1330.

[00155] At 1340, the reader may receive the unique ID broadcast by the beacon at 1330 and compare it to a database of known friendly drones and communicate to the operator identification information associated with the drone that has been identified as friendly. Additionally, information regarding an owner/pilot associated with the drone may also be provided by the reader to the operator. At 1335, the operator may receive the information provided by the reader and request, via the reader the drone provide a confirmation signal via a visual means (e.g., the operator may request the drone provide confirmation via a specific LED pattern which the drone will then provide in response). Finally, equipped with the knowledge of whether the drone is a friend or foe, the operator may take appropriate action at 1345. For example, the operator may decide to tolerate or allow the drone to continue its flight path ("Friend"), may avoid the drone ("unknown/soft foe"), or institute countermeasures to relocate, disable, or destroy the drone.

[00156] FIG. 14 illustrates another process 1400 of identifying if an inbound drone or other aerial platform is either a friend or a foe (IFF) using a system in accordance with an example implementation of the present application. As illustrated, the process 1400 involves a series of steps performed by three parties: 1. an operator/ob server (e.g.

operator/ob server 5 discussed above), 2. a beacon mounted on the drone or other aerial platform, and 3. a reader associated with an IFF system (e.g., an IFF interface device 4 illustrated in FIGS. 1-7 discussed above). In FIG. 14, arrow 1401 illustrates the direction of process flow performed by each of the three parties during the process 1400. In some example implementations, the reader associated with the IFF system may be an omnidirectional reader, or may be a directional reader which must be pointed at the drone.

[00157] As illustrated, at 1405 the beacon is in a hibernate-in-flight state, meaning that the beacon is in a hibernate mode listening for a wake-up command received via a communication signal. In parallel, at 1410, the operator becomes alerted or aware that the drone is overhead, nearby, or incoming. This alert may be received by visually seeing the drone, hearing the drone, receiving some sort of warning, sensing the drone with a sensor (such as radar, for example), or any other process of receiving an alert that may be apparent to a person of ordinary skill in the art. Further, at 1450 the reader may periodically transition from a standby state to a wake-up state, issue an ID request command, and listen for a reply.

[00158] In response to the ID request command from the reader, the beacon may verify that the ID request command is legitimate using an onboard database of accepted wake-up codes, and reply by establishing a secure wireless connection with the reader, followed by transmitting the beacon's own unique identification code at 1460. The reader may receive the transmitted unique identification code from the beacon, compared to an onboard database of known friendly drones, and validate the beacon and trigger a

"friendly drone detected" notification.

[00159] In response to the alert 1410, the operator may react at 1415 by, for example, sheltering in place, or attempting to locate the UAV visually. In other words, the operator, uncertain of whether the drone is a friend or a foe, may hurriedly scan the sky in an attempt to locate the UAV. Simultaneously, the operator may grab the reader and check if a "friendly drone detected" notification has been triggered. At 1420, the operator, having determined that the reader has detected and verified a nearby friendly drone, may request, via the reader, that the drone provide a confirmation signal via a visual means so that the operator can differentiate the friendly drone from other drones that might be in the vicinity. Simultaneously, the operator may target the drone with an optical scope.

[00160] At 1425, the reader may then transmit an encrypted signal requesting that the beacon prove that the drone on which it is mounted is friendly by flashing an onboard visual or Infrared (IR) light source (e.g., an LED) in an encoded, machine-readable pattern. In response to the encrypted signal, the beacon on the drone may transmit the requested encoded machine-readable pattern using an onboard visual or IR light source (e.g., an LED) at 1430.

[00161] At 1440, the reader may receive via the optical scope the encoded light pattern, decode it, and provide verification to the operator at 1435 that the UAV in view of the optical scope is friendly. This verification may be provided by a simple indicator light provided through the optical scope or through an augmented reality overlay through the optical scope.

[00162] At 1465, the beacon may return to the hibernate condition waiting for a subsequent identification command request. Finally, equipped with the knowledge of whether the drone is a friend or foe, the operator may take appropriate action at 1445. For example, the operator may decide to tolerate or allow the drone to continue its flight path ("Friend"), may avoid the drone ("unknown/soft foe"), or institute countermeasures to relocate, disable, or destroy the drone.

[00163] FIG. 15 illustrates another process 1500 of identifying if an inbound drone or other aerial platform is either a friend or a foe (IFF) using a system in accordance with an example implementation of the present application. As illustrated, the process 1500 involves a series of steps performed by three parties: 1. an operator/ob server (e.g.

operator/ob server 5 discussed above), 2. a beacon mounted on the drone or other aerial platform, and 3. a reader associated with an IFF system (e.g., an IFF interface device 4 illustrated in FIGS. 1-7 discussed above). In FIG. 15, arrow 1501 illustrates the direction of process flow performed by each of the three parties during the process 1500. In some example implementations, the reader associated with the IFF system may be an

omnidirectional reader, or may be a directional reader which must be pointed at the drone.

[00164] As illustrated, at 1505 the beacon continually broadcasts an encrypted signal containing its location and unique identifier and continuously listens for an LED flash command. In parallel, at 1510, the operator becomes alerted or aware that the drone is overhead, nearby, or incoming. This alert may be received by visually seeing the drone, hearing the drone, receiving some sort of warning, receiving the beacon broadcasts via the reader, sensing the drone with a sensor (such as radar, for example), or any other process of receiving an alert that may be apparent to a person of ordinary skill in the art. Further, at 1550, the reader continually listens for an encrypted signal being broadcast by a beacon, receives the broadcast signal from the beacon, and provides notification to the operator.

[00165] In response to the alert 1510, the operator may react at 1515 by, for example, sheltering in place, or attempting to locate the drone visually. In other words, the operator, uncertain of whether the drone is a friend or a foe, may hurriedly scan the sky in an attempt to locate the drone. Simultaneously, the operator may grab the reader and check if a notification has been triggered.

[00166] At 1555, the reader may compare the unique ID received from the beacon to an onboard database of known beacons. At 1525, the reader communicates the result of the comparison to the operator (e.g., "received code matches or is valid=friendly drone" or "received code does not match or is not valid= foe drone"). Additionally, information regarding the owner/pilot of the drone may be provided at 1525. Further, if the beacon provided GPS information, the location of the beacon may also be overlaid on a map associated with the reader's current location.

[00167] At 1520, the operator may review the communication provided by the reader and at 1535, the operator, having determined that the reader has detected and verified a nearby friendly drone, may request, via the reader, that the drone provide a confirmation signal via a visual means so that the operator can differentiate the friendly drone from other drones that might be in the vicinity. Simultaneously, the operator may target the drone with an optical scope.

[00168] At 1540, the reader may then transmit an encrypted signal requesting that the beacon prove that the drone on which it is mounted is friendly by flashing an onboard visual or Infrared (IR) LED in an encoded, machine-readable pattern. In response to the encrypted signal, the beacon on the drone may transmit the requested encoded machine- readable pattern using an onboard visual or IR LED at 1530.

[00169] Finally, equipped with the knowledge of whether the drone is a friend or foe, the operator may take appropriate action at 1545. For example, the operator may decide to tolerate or allow the drone to continue its flight path ("Friend"), may avoid the drone ("unknown/soft foe"), or institute countermeasures to relocate, disable, or destroy the drone.

[00170] FIG. 16 illustrates another process 1600 of identifying if an inbound drone or other aerial platform is either a friend or a foe (IFF) using a system in accordance with an example implementation of the present application. As illustrated, the process 1600 involves a series of steps performed by three parties: 1. an operator/ob server (e.g.

operator/ob server 5 discussed above), 2. a beacon mounted on the drone or other aerial platform, and 3. a reader associated with an IFF system (e.g., an IFF interface device 4 illustrated in FIGS. 1-7 discussed above). In FIG. 16, arrow 1601 illustrates the direction of process flow performed by each of the three parties during the process 1600. In some example implementations, the reader associated with the IFF system may be an omnidirectional reader, or may be a directional reader which must be pointed at the drone.

[00171] As illustrated, at 1605 the beacon continually broadcasts an encrypted signal containing its location and unique identifier. In parallel, at 1610, the operator becomes alerted or aware that the drone is overhead, nearby, or incoming. This alert may be received by visually seeing the drone, hearing the drone, receiving some sort of warning, receiving the beacon broadcasts via the reader, sensing the drone with a sensor (such as radar, for example), or any other process of receiving an alert that may be apparent to a person of ordinary skill in the art.

[00172] In response to the alert 1610, the operator may react at 1615 by, for example, sheltering in place, or attempting to locate the drone visually. In other words, the operator, uncertain of whether the drone is a cooperative or non-cooperative, may hurriedly scan the sky in an attempt to locate the drone. Further, at 1620, the operator may grab the reader, aim the reader at the drone in question, and wait for the reader to determine if an authorized code is being broadcast by the beacon. [00173] At 1625, the reader may be powered on, listen for an identifier or secure code to be transmitted to the reader by the beacon. At 1640, the reader may compare the received identifier to an onboard database of known drones and communicate the result of the comparison to the operator (e.g., "received code matches or is valid=friendly drone" or "received code does not match or is not valid= non-cooperative drone"). Additionally, information regarding the owner/pilot of the drone may be provided at 1640. Further, if the beacon provided GPS information, the location of the beacon may also be overlaid on a map associated with the reader's current location. If no legitimate code is received, the reader may continue to search.

[00174] At 1635, the operator may receive and review the result of the comparison provided by the reader.

[00175] Finally, equipped with the knowledge of whether the drone is a friend or foe, the operator may take appropriate action at 1645. For example, the operator may decide to tolerate or allow the drone to continue its flight path ("Friend"), may contact authorities (e.g., Police, FAA, etc.) ("unknown/soft foe"), ground other aircraft in the area to prevent collisions, or institute countermeasures to relocate, disable, or destroy the drone.

[00176] FIG. 17 illustrates another process 1700 of identifying if an inbound drone or other aerial platform is either a friend or a foe (IFF) using a system in accordance with an example implementation of the present application. As illustrated, the process 1700 involves a series of steps performed by three parties: 1. an operator/ob server (e.g.

operator/ob server 5 discussed above), 2. a beacon mounted on the drone or other aerial platform, and 3. a reader associated with an IFF system (e.g., an IFF interface device 4 illustrated in FIGS. 1-7 discussed above). In FIG. 17, arrow 1701 illustrates the direction of process flow performed by each of the three parties during the process 1700. In some example implementations, the reader associated with the IFF system may be an omnidirectional reader, or may be a directional reader which must be pointed at the drone.

[00177] As illustrated, at 1705 the beacon is in a hibernate-in-flight state, meaning that the beacon is in a hibernate mode listening for a wake-up command received via a communication signal. In parallel at 1710 the operator becomes alerted or aware that the drone is overhead, nearby, or incoming. This alert may be received by visually seeing the drone, hearing the drone, receiving some sort of warning, sensing the drone with a sensor (such as radar, for example), or any other process of receiving an alert that may be apparent to a person of ordinary skill in the art.

[00178] In response to the alert 1710, the operator may react at 1715 by, for example, sheltering in place, or attempting to locate the drone visually. In other words, the operator, uncertain of whether the drone is a cooperative or non-cooperative, may hurriedly scan the sky in an attempt to locate the drone. Further, at 1720, the operator may grab the reader, aim the reader at the drone in question, and wake-up the reader to send an encrypted signal requesting the drone or beacon provide its unique identification code.

[00179] At 1725, when the wake-up of the reader is triggered, it may transmit an encrypted signal requesting that any beacon within range prove that the drone on which the beacon is mounted is a friend. In response to receiving the encrypted signal from the reader, the beacon may wake up, and transmit a unique ID via a wireless signal before returning to a hibernation state at 1730.

[00180] At 1740, the reader may receive the unique identifier and compare the received identifier to an onboard database of known drones and communicate the result of the comparison overseas (e.g., "received code matches or is valid=friendly drone" or "received code does not match or is not valid= non-cooperative drone"). Additionally, information regarding the owner/pilot of the drone may be provided at 1740. Further, if the beacon provided GPS information, the location of the beacon may also be overlaid on a map associated with the reader's current location. If no legitimate code is received, the reader may continue to search.

[00181] At 1735, the operator may receive and review the result of the comparison provided by the reader.

[00182] Finally, equipped with the knowledge of whether the drone is a friend or foe, the operator may take appropriate action at 1745. For example, the operator may decide to tolerate or allow the drone to continue its flight path ("Friend"), contact the drone owner/pilot, ground other aircraft in the area to prevent collisions, search for the owner/pilot or institute countermeasures to relocate, disable, or destroy the drone.

[00183] FIG. 18 illustrates another process 1800 of identifying if an inbound drone or other aerial platform is either a friend or a foe (IFF) using a system in accordance with an example implementation of the present application. As illustrated, the process 1800 involves a series of steps performed by three parties: 1. an operator/ob server (e.g.

operator/ob server 5 discussed above), 2. a beacon mounted on the drone or other aerial platform, and 3. a reader associated with an IFF system (e.g., an IFF interface device 4 illustrated in FIGS. 1-7 discussed above). In FIG. 18, arrow 1801 illustrates the direction of process flow performed by each of the three parties during the process 1800. In some example implementations, the reader associated with the IFF system may be an omnidirectional reader, or may be a directional reader which must be pointed at the drone.

[00184] As illustrated, at 1805 the beacon continually broadcasts an encrypted signal containing its location and unique identifier. In parallel, at 1810, the operator becomes alerted or aware that the drone is overhead, nearby, or incoming. This alert may be received by visually seeing the drone, hearing the drone, receiving some sort of warning, receiving the beacon broadcasts via the reader, sensing the drone with a sensor (such as radar, for example), or any other process of receiving an alert that may be apparent to a person of ordinary skill in the art.

[00185] In response to the alert 1810, the operator may react at 1815 by, for example, sheltering in place, or attempting to locate the drone visually. In other words, the operator, uncertain of whether the drone is a cooperative or non-cooperative, may hurriedly scan the sky in an attempt to locate the drone. Further, at 1820, the operator may grab the reader, power the reader on, aim the reader at the drone in question, and wait for the reader connect to the beacon. At the 1825 A/1825B, the reader may connect to the beacon as a Wi-Fi access point. If the reader is unable to connect or does not detect an access point, the reader may continue to search.

[00186] At 1830, the beacon may serve the reader with a stored website, containing information regarding the owner/pilot, current activity, and contact information. Further, if the beacon provides GPS information, the location of the beacon may also be overlaid on a map associated with the reader's current location.

[00187] At the 1840, the reader may receive the website provided by the drone and may display it to the operator. At 1835, the operator may receive and review the website and determine if the drone is a friend or foe, or may contact the drone owner/pilot using the provided information.

[00188] Finally, equipped with the knowledge of whether the drone is a friend or foe, the operator may take appropriate action at 1845. For example, the operator may decide to tolerate or allow the drone to continue its flight path ("Friend") may contact owner/operator, may contact authorities (e.g., Police, FAA, etc.) ("unknown/soft foe"), ground other aircraft in the area to prevent collisions, or institute countermeasures to relocate, disable, or destroy the drone. [00189] FIG. 19A illustrates a perspective view of a beacon 2 in accordance with an example implementation of the present application. In FIG. 19A, the beacon 2 is illustrated with a quarter 1905 for scale reference purposes. The beacon 2 may have different models, depending on the type of the sUAS to which it will be attached and its planned operational use. The data broadcast by any model of beacons 2 may be received and read by any reader. All models of beacon 2 may have built-in power and can also be connected to, and powered by, the main sUAS power.

[00190] Different models of beacon 2 may use different types of communication links. For consumer sUAS less than 2 lbs., the beacon 2 may be as light as possible with little maintenance necessary. For example, a lightweight (13g) Bluetooth model may be used that has a non-rechargeable battery life of at least 2 years. For heavier, more capable consumer sUAS used by professional pilots the beacon 2 may be a Wi-Fi (or any other wireless protocol) model. This type of beacon 2 may allow the beacon 2 to store and share 128kb of data containing all the info about the pilot, sUAS, flight, etc. The battery of this type of beacon may need to be recharged after 1 hour of flight, in the cases where the beacon 2 is not externally powered.

[00191] In the enterprise market for sUAS less than 55 lbs., the beacon 2 may have both Wi-Fi + GPS capabilities, in which the position is also transmitted, allowing an IFF enabled detection system to easily locate all beacon-enabled sUAS within the monitored airspace. Some beacon 2 modes may transmit the GPS data exclusively through Wi-Fi (or any other wireless protocol), while the other beacons 2 may also send the data through the cell phone network to a cloud-based server.

[00192] Any sUAS that co-exist with manned aircraft may need to communicate through an ADS-B protocol developed to avoid mid-air collisions. A beacon 2 may be equipped with an ADS-B transceiver that sends and receives position and identification data using the ADS-B. Further, in some example implementations, a unique IFF ID code may be appended to the ADS-B transmission, thereby utilizing the ADS-B frequency and protocol for IFF purposes.

[00193] FIG. 19B illustrates a perspective view of an IFF reader or IFF interface unit 4 in accordance with an example implementation of the present application. The IFF reader 4 may support any model of beacon and may include one of at least three models or types. The first type of IFF reader 4 may be a small, Omni-directional detector that receives data from all beacons within a particular range (up to 300ft) and sends the received data through wireless (e.g., Wi-Fi, cellular, satellite communication, ZigBee, Bluetooth, or any other wireless frequency or protocol that might be apparent to a person of ordinary skill in the art) or wired connection to a server. The second type of IFF reader 4 (illustrated in FIG. 19B) may have a phone cradle 1910 that utilizes a portable computing device or smartphone (e.g., an Android smartphone, an Apple smart phone, or any other type of smartphone) that might be apparent to a person of ordinary skill in the art. The smart phone may provide a main user interface and internet connection. The phone-based user interface may display all beacons detected in the area. This type of IFF 4 reader may provide a high-gain, directional antenna, allowing it to detect beacons 200 ft., and in some cases, up to 2000 ft., away from the IFF reader 4. Both of these types of IFF readers 4 may be battery powered or may optionally have an external power capability. The third type of IFF reader 4 may be a complex directional antenna array assembly that provides 360 degree coverage with the capability to detect the location from where a beacon 2 is transmitting. In some example implementations, the IFF reader 4 may also include a PTZ camera and such integration of a PTZ camera enables visual confirmation and collection of live footage. [00194] FIGS. 20 A and 20B illustrate images of a beacon 2 in accordance with example implementations of the present application. As discussed above, the beacon 2 may have the capability to transmit wireless signals using a variety of methodologies including, Wi-Fi, cellular, satellite communication, ZigBee, Bluetooth, RF or any other wireless frequency or protocol that might be apparent to a person of ordinary skill in the art. Additionally, it may also have an integrated GPS sensing or other location detection capabilities. Further, as illustrated in FIGS. 20A and 20B, the beacon may also include visual or IR signaling capabilities. For example, the beacon 2 may include a transparent or translucent dome structure 2005 that covers one or more visible or IR emitting LEDs 2010 that may be controlled by the beacon 2 to emit a human or machine-readable pattern. In some example implementations control of the LEDs 2010 may be used to provide a final confirmation that a drone that is being communicated with using wireless communication signals is the same drone that can be visually observed. For example, a wireless communication signal may be used to instruct the beacon 2 to display a particular light or IR pattern, which can be visually recognized by an observer when performed by the beacon 2.

[00195] Further, in some example implementations control of the LEDs 2010 may be used to distinguish a drone that is being communicated with using wireless

communication signals from other drones in the same visual proximity. Again, a wireless communication signal may be used to instruct the beacon 2 to display a particular light or IR pattern, which can be visually recognized by an observer or read by a machine when performed by the beacon 2 to identify which drone is being communicated with using the wireless communication signals. This can provide an additional layer of identification as discussed above with respect to FIGS.

[00196] EXAMPLE COMPUTING ENVIRONMENT [00197] FIG. 21 illustrates an example computing environment 2100 with an example computer device 2105 suitable for use in some example implementations. In some example implementations, the computer device 2105 may function as a beacon coupled to a UAS. In other example implementations, the computer device 2105 may function as the IFF system performing an IFF operation consistent with the example implementations of the present application. In still other example implementations, the computer device 2105 may function as an operator/ob server associated device, or an IFF interface unit. In still other example implementations, the computer device 2105 may function as a drone owner/pilot associated device.

[00198] Computing device 2105 in computing environment 2100 can include one or more processing units, cores, or processors 2110, memory 2115 (e.g., RAM, ROM, and/or the like), internal storage 2120 (e.g., magnetic, optical, solid state storage, and/or organic), and/or I/O interface 2125, any of which can be coupled on a communication mechanism or bus 2130 for communicating information or embedded in the computing device 2105.

[00199] Computing device 2105 can be communicatively coupled to input/interface

2135 and output device/interface 2140. Either one or both of input/interface 2135 and output device/interface 2140 can be a wired or wireless interface and can be detachable. Input/interface 2135 may include any device, component, sensor, or interface, physical or virtual, which can be used to provide input (e.g., buttons, touch-screen interface, keyboard, a pointing/cursor control, microphone, camera, braille, motion sensor, optical reader, and/or the like).

[00200] Output device/interface 2140 may include a display, television, monitor, printer, speaker, braille, or the like. In some example implementations, input/interface 2135 (e.g., user interface) and output device/interface 2140 can be embedded with, or physically coupled to, the computing device 2105. In other example implementations, other computing devices may function as, or provide the functions of, an input/interface 2135 and output device/interface 2140 for a computing device 2105. These elements may include, but are not limited to, well-known AR hardware inputs so as to permit a user to interact with an AR environment.

[00201] Examples of computing device 2105 may include, but are not limited to, highly mobile devices (e.g., smartphones, devices in vehicles and other machines, devices carried by humans and animals, and the like), mobile devices (e.g., tablets, notebooks, laptops, personal computers, portable televisions, radios, and the like), and devices not designed for mobility (e.g., desktop computers, server devices, other computers, information kiosks, televisions with one or more processors embedded therein and/or coupled thereto, radios, and the like).

[00202] Computing device 2105 can be communicatively coupled (e.g., via I/O interface 2125) to external storage 2145 and network 2150 for communicating with any number of networked components, devices, and systems, including one or more computing devices of the same or different configuration. Computing device 2105 or any connected computing device can be functioning as, providing services of, or referred to as a server, client, thin server, general machine, special-purpose machine, or another label.

[00203] I/O interface 2125 can include, but is not limited to, wired and/or wireless interfaces using any communication or I/O protocols or standards (e.g., Ethernet,

802.1 lxs, Universal System Bus, WiMAX, modem, a cellular network protocol, and the like) for communicating information to and/or from at least all the connected components, devices, and network in computing environment 2100. Network 2150 can be any network or combination of networks (e.g., the Internet, local area network, wide area network, a telephonic network, a cellular network, satellite network, and the like). [00204] Computing device 2105 can use and/or communicate using computer- usable or computer-readable media, including transitory media and non-transitory media. Transitory media includes transmission media (e.g., metal cables, fiber optics), signals, carrier waves, and the like. Non-transitory media includes magnetic media (e.g., disks and tapes), optical media (e.g., CD ROM, digital video disks, Blu-ray disks), solid state media (e.g., RAM, ROM, flash memory, solid-state storage), and other non-volatile storage or memory.

[00205] Computing device 2105 can be used to implement techniques, methods, applications, processes, or computer-executable instructions in some example computing environments. Computer-executable instructions can be retrieved from transitory media, and stored on and retrieved from non-transitory media. The executable instructions can originate from one or more of any programming, scripting, and machine languages (e.g., C, C++, C#, Java, Visual Basic, Python, Perl, JavaScript, and others).

[00206] Processor(s) 2110 can execute under any operating system (OS) (not shown), in a native or virtual environment. One or more applications can be deployed that include logic unit 2155, application programming interface (API) unit 2160, input unit 2165, output unit 2170, requesting unit 2175, identification unit 2180, verification unit 2185, reply unit 2190, and inter-unit communication mechanism 2195 for the different units to communicate with each other, with the OS, and with other applications (not shown).

[00207] For example, requesting unit 2175, identification unit 2180, verification unit 2185, and reply unit 2190 may implement part or all of each of the processes shown in FIGS. 13-18. The described units and elements can be varied in design, function, configuration, or implementation and are not limited to the descriptions provided. [00208] In some example implementations, when information or an execution instruction is received by API unit 2160, it may be communicated to one or more other units (e.g., requesting unit 2175, identification unit 2180, verification unit 2185, and reply unit 2190). For example, the requesting unit 2175 may generate a request for

identification or verification that is transmitted to another computing device via the network 2150. Further, the identification unit 2180 may retrieve a unique identifier in response to a received inquiry or request, received through the network 2150, and provide a reply including the unique identifier to the reply unit 2190 to send to another computing device through the network 2150. Further, the verification unit 2185 may evaluate a received reply or received request and generate verification information to indicate whether verification has been achieved.

[00209] In some instances, the logic unit 2155 may be configured to control the information flow among the units and direct the services provided by API unit 2160, input unit 2165, requesting unit 2175, identification unit 2180, verification unit 2185, and reply unit 2190 in some example implementations described above. For example, the flow of one or more processes or implementations may be controlled by logic unit 2155 alone or in conjunction with API unit 2160.

[00210] Although a few example implementations have been shown and described, these example implementations are provided to convey the subject matter described herein to people who are familiar with this field. It should be understood that the subject matter described herein may be implemented in various forms without being limited to the described example implementations. The subject matter described herein can be practiced without those specifically defined or described matters or with other or different elements or matters not described. It will be appreciated by those familiar with this field that changes may be made in these example implementations without departing from the subject matter described herein as defined in the appended claims and their equivalents.