This page presents innovative patents for protecting drones from GPS spoofing, jamming, and cyber attacks, using:

  • Multi-Modal Spoofing Detection Systems – Fog computing networks with machine learning, 3-axis magnetometer signal integrity monitoring, and signal fingerprint comparison against known databases for GPS spoofing identification.
  • Active Electronic Countermeasures – Adaptive jamming and counter spoofing transmission systems for drone interception, neutralization, and controlled landing without physical destruction.
  • Tamper Resistant Communication Protocols – Dual-transmitter/receiver architectures with frequency diversity, encryption using dynamic feature parameters, and payload integrity verification for secure command transmission.
  • Distributed Trust and Verification Frameworks – State machine replication protocols for peer to peer trustworthiness assessment and position verification using signal fingerprinting in GPS denied environments.

1. Fog Computing Network for Analyzing Drone GPS Signals with Machine Learning-Based Spoofing Detection

INTELLIGENT FUSION TECH INC, 2025

Detecting GPS spoofing attacks on drones using a fog computing network. The method involves sending drone signals to a fog node for analysis. The fog node uses machine learning models to detect slow shifting patterns indicative of spoofing attacks. This allows fog nodes to detect spoofing attacks on drones in a decentralized network.

US2025200172A1-patent-drawing

2. Drone Interception System Utilizing Spoofing and Jamming Signal Transmission for Controlled Landing

SWATTER COMPANY LDA, 2025

Intercepting and controlling drones without damaging them by redirecting them to land using spoofing signals. The method involves detecting unauthorized drones near restricted areas, deploying police drones to intercept them, and transmitting signals to program new flight paths to land. The redirecting signals include spoofing GPS signals to simulate satellite constellations and jamming signals to disable the target drone's controls. The police drones position themselves close to the targets and then transmit the redirect signals to safely guide the intruders to designated landing areas.

3. UAVs with Onboard Neural Networks for Real-Time Sensor Data Analysis and Autonomous Electronic Attack Mitigation

DROBOTICS LLC, 2025

UAVs equipped with neural networks to resist electronic attacks that try to hijack or interfere with their flight. The UAVs have onboard neural networks that analyze real-time sensor data to detect cyber attacks and respond appropriately. The networks analyze images, GPS, and communications to identify attacks like spoofing, jamming, or disorientation. They can then autonomously mitigate the attacks, like continuing the flight path or seeking better connectivity, without being compromised.

4. AI-Assisted UAV Detection and Control System with Adaptive Signal Conditioning, Jamming, and Spoofing

AVGARDE SYSTEMS PRIVATE LTD, 2025

Detecting and taking countermeasures against unmanned aerial vehicles (UAVs) using AI-assisted object classification and adaptive jamming/spoofing. The system receives signals reflected by objects, conditions them to improve resolution and SNR, then uses AI to classify if the object is a UAV. If so, it takes over control using jamming and spoofing. Jamming disorients the UAV for a time, then spoofing establishes communication to remotely maneuver it. The jamming and spoofing parameters adapt based on range and velocity.

US2025060450A1-patent-drawing

5. UAV with Integrated GPS Spoofing Detection Using 3-Axis Magnetometer for Signal Integrity Monitoring

SNAP INC, 2025

A UAV with a GPS spoofing detection system that enables autonomous flight control by monitoring GPS signal integrity. The system employs a 3-axis magnetometer to measure aircraft orientation and compare it with GPS heading data. When the two measurements do not match, the system detects potential GPS spoofing and triggers corrective actions, such as returning to a safe location. This integrated GPS and magnetometer system provides a comprehensive solution to GPS spoofing protection in UAVs.

6. Unmanned Aerial Vehicle Position Verification Using Signal Fingerprint Comparison and Spoofing Detection

INTEL CORP, 2024

Verifying the position of unmanned aerial vehicles (UAVs) to improve security and accuracy in situations where GPS signals are unreliable. The techniques include: comparing reported positions against known signal fingerprints at that location, measuring signals from the UAV and comparing to known fingerprints, requesting the UAV to transmit signals from its location, and detecting GPS spoofing by comparing UAV-reported signals to known fingerprints.

US11984034B2-patent-drawing

7. Datalink Communication System with Dual-Transmitter and Dual-Receiver Architecture for Frequency Diverse Signal Duplication

CALECTIVE LLC, 2022

Tamper-resistant datalink communications system for drones that detects and prevents unauthorized interference and hacking through a dual-transmitter, dual-receiver architecture with frequency diversity and signal duplication. The system converts and duplicates control signals transmitted from a ground controller to a drone, with verification signals sent back to the ground station to confirm successful receipt. This architecture provides enhanced security and reliability for drone operations.

US2022360993A1-patent-drawing

8. State Machine Replication-Based Distributed Trust Management System for Mobile Computing Devices

NOKIA TECHNOLOGIES OY, 2022

Distributed trust management for mobile computers like drones operating in sensitive environments to prevent attacks like false updates, malicious commands, and joining by imposter drones. The method involves each drone using a state machine replication protocol to locally assess the trustworthiness of other drones. When a drone wants to perform a sensitive operation, it requests approval from other drones. The requester's trust level is determined based on the assessments. The requester's trust level is updated based on the global assessment. This allows distributed trust verification without central coordination.

US2022337438A1-patent-drawing

9. Autonomous UAV Cyber Attack Detection and Neutralization System Using Machine Learning-Based Sensor Signal Analysis

GENERAL ELECTRIC CO, 2021

A system and method for autonomous cyber attack detection, localization and neutralization in UAVs to protect them from cyber attacks without major redesigns, additional sensors or redundant systems. It uses machine learning to detect attacks by monitoring key sensor signals and looking for abnormal behavior outside normal operating ranges.

10. Anti-Drone System with Drone Feature Analysis and GPS Spoofing Signal Injection Mechanism

KOREA ADVANCED INSTITUTE OF SCIENCE AND TECHNOLOGY, 2021

Anti-drone system that enables precise and efficient drone neutralization through GPS spoofing analysis. The system analyzes drone features, such as safety mechanisms and flight algorithms, to determine the most effective hijacking strategy. It then injects a GPS spoofing signal to the target drone, which automatically adjusts its flight path based on the identified strategy. This approach ensures accurate and precise neutralization of drones without disrupting their normal operation, while minimizing collateral damage and maintaining situational awareness.

US2021047034A1-patent-drawing

11. Encryption Method for Secure Command Transmission Between UAVs Using Fixed and Dynamic Feature Parameters

SZ DJI SOFTWARE TECHNOLOGY CO LTD, 2020

Secure command transmission between unmanned aerial vehicles (UAVs) through a novel encryption approach that preserves the unique characteristics of each UAV while maintaining command integrity. The method employs fixed and dynamic feature parameters for encryption, enabling secure command transmission between UAVs without compromising their operational capabilities. Each UAV stores its unique feature parameters in an external device, which establishes wireless communication. The external device encrypts commands using the UAV's fixed parameters, while the UAV verifies the commands through its dynamic parameters. This approach ensures secure command transmission while preventing replay attacks and maintaining accurate execution.

12. UAV Controller with Secure Processor for Encrypted Communication Using Shared Secret Key and Payload Integrity Verification

DRONE DELIVERY CANADA CORP, 2020

Secure communication between a remote computing system and an unmanned aerial vehicle (UAV) through a novel cryptographic approach. The system employs a UAV controller with a secure processor and communications module to establish encrypted communication channels between the controller and the flight management system. The controller extracts UAV-specific data from messages, computes a shared secret key, and maintains a database of encrypted keys. When receiving a message, the controller verifies the message's integrity by comparing its encrypted payload with a computed hash. This ensures secure data transmission between the controller and the flight management system, enabling real-time control of the UAV while maintaining confidentiality.

US2020153634A1-patent-drawing

13. Aircraft Flight Control System with Deviation-Based GPS Spoofing Detection

SUBARU CORP, 2020

Aircraft flight control system detects GPS spoofing by monitoring deviation from scheduled flight route. The system continuously measures aircraft position and compares it to planned route, triggering spoofing detection when deviation exceeds a threshold. This enables early identification of GPS signal tampering, allowing prompt corrective action to prevent navigation errors.

14. Networked IoT System for GNSS Signal Spoofing Detection Using Comparative Averaging

QUALCOMM INC, 2025

A system for detecting GNSS signal spoofing using static IoT devices. The system comprises a network of static IoT devices that continuously monitor GNSS signals and compare short-term and long-term averages of GNSS fixes. When a device detects a discrepancy between the two averages, it sends a warning message to a server, which analyzes the data to determine if a spoofing condition is present. If confirmed, the server sends a spoofing alert message to affected user equipment, providing location information of the spoofer and a spoofed zone.

15. Signal Authentication System Utilizing Doppler Nulling for Temporal Spatial Parameter Analysis

ROCKWELL COLLINS INC, 2024

Authenticating signals using Doppler nulling to improve resilience against spoofing and Denial of Service attacks compared to conventional methods. The technique involves scanning for signals using Doppler nulling to determine their parameters like time of arrival and frequency. By resolving the temporal spatial characteristics of the transmitter's radiation, it provides spatial awareness of relative speeds and directions. This information can then be used to authenticate received signals by comparing their parameters to the expected ones determined during the scanning. The technique allows low susceptibility to spoofing and Denial of Service attacks since it relies on the specific temporal characteristics of the transmitter's motion.

US11977173B2-patent-drawing

16. System and Method for Anomaly Detection in GNSS Satellite Signal Monitoring

HONEYWELL INT INC, 2024

A method and system for detecting and mitigating GNSS spoofing threats in aircraft navigation systems. The system monitors satellite signals and compares predicted orbital information with actual values to detect anomalies indicative of spoofing. Spoofing alerts are generated and displayed to pilots, enabling corrective action to prevent navigation system failures and ensure safe flight operations.

17. GNSS Receiver with Beamformer-Based Signal Authentication and Replication System

L3HARRIS INTERSTATE ELECTRONICS CORP, 2024

A GNSS receiver with anti-spoofing capability that uses a beamformer to generate multiple down converted signals, a processor to identify authentic signals, and GNSS signal replicators to generate replicas of authentic signals based on timing settings used to track them. The processor determines which signals are authentic by analyzing the signal strength variation when the beam pattern is dithered.

US11927678B2-patent-drawing

18. GNSS Spoofing Detection System with Receiver Stations and Master Control for Aircraft Alerting

ROCKWELL COLLINS INC, 2024

A system and method for detecting and alerting aircraft to potential GNSS spoofing threats in a protected airspace surrounding an airport. The system comprises multiple receiver stations with GNSS receivers and antennas at surveyed locations, which continuously monitor GNSS signals and compare their determined positions to their true locations. If a receiver station detects a nonzero probability of spoofing, it reports to a master control station, which transmits regular updates to aircraft within range, enabling them to adjust their protection levels accordingly. The system can also detect spoofing sources and provide directional information to aircraft.

19. GNSS Receiver with Reduced Operational Mode for Spoofing Detection and Mitigation

QUALCOMM INC, 2023

Reducing GNSS signal processing power to prevent positioning errors caused by satellite spoofing. The technique operates the receiver in reduced operational mode when spoofing is detected, specifically disabling critical processing functions like data demodulation, time setting, and error recovery. This enables the receiver to operate in a reduced state with respect to the GNSS bands most likely to be spoofed, thereby mitigating the adverse effects of spoofing on positioning and timing applications.

20. GNSS Receiver with CRPA-Based Digital Beamforming for Spoofing Signal Isolation

L3HARRIS INTERSTATE ELECTRONICS CORP, 2023

A GNSS receiver that detects and mitigates spoofing attacks using a controlled reception pattern antenna (CRPA) with digital beamforming. The CRPA generates multiple survey beams that simultaneously steer a null towards the spoofing source and a beam towards the true GNSS signals. The receiver determines the presence of a spoofer by analyzing the carrier-to-noise ratio (C/No) signatures of multiple GNSS signals, and uses the CRPA's beamforming capabilities to isolate and reject the spoofing signals.

21. GNSS Receiver with Digital Beamforming and Null Steering for Spoofing Detection and Mitigation

22. GNSS Spoofing Detection via Carrier-to-Noise Ratio Anomaly Monitoring

23. Integrated Secure Device Manager System with Module-Based Cryptographic Authentication for Cyber-Physical Vehicles

24. Method for Identifying Falsified GNSS Signals Using Temporal Dither Characteristic Analysis

25. Triangle-Based Signal Processing for Spoofing Detection in GPS Receivers Using Sparse Optimization and Pre-Computed Waveform Functions

Get Full Report

Access our comprehensive collection of 34 documents related to this technology