WO2018094554A1 - Method for improving security of unmanned aerial vehicle transportation, and unmanned aerial vehicle, terminal, server and computer program product - Google Patents
Method for improving security of unmanned aerial vehicle transportation, and unmanned aerial vehicle, terminal, server and computer program product Download PDFInfo
- Publication number
- WO2018094554A1 WO2018094554A1 PCT/CN2016/106749 CN2016106749W WO2018094554A1 WO 2018094554 A1 WO2018094554 A1 WO 2018094554A1 CN 2016106749 W CN2016106749 W CN 2016106749W WO 2018094554 A1 WO2018094554 A1 WO 2018094554A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- encrypted
- drone
- order
- encrypted information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
- G06Q10/083—Shipping
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05D—SYSTEMS FOR CONTROLLING OR REGULATING NON-ELECTRIC VARIABLES
- G05D1/00—Control of position, course, altitude or attitude of land, water, air or space vehicles, e.g. using automatic pilots
- G05D1/10—Simultaneous control of position or course in three dimensions
- G05D1/101—Simultaneous control of position or course in three dimensions specially adapted for aircraft
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Definitions
- the invention relates to the field of logistics and transportation, in particular to a method for improving the safety of drone transportation, a drone, a terminal and a computer program product.
- the embodiment of the invention provides a method for improving the transportation safety of the drone, a drone, a terminal, a server and a computer program product, which helps to improve the safety of the drone when carrying out cargo transportation.
- the drone acquires transportation order information and first encrypted information for safety certification, and the transportation order information includes transportation location information;
- the first encrypted information is sent to the terminal where the transportation order information corresponds to the user account, and the feedback information sent by the terminal is received, according to the feedback.
- the information determines whether the security authentication is successful, and after determining the success, controlling the warehouse corresponding to the transportation order information to be opened; or
- the drone After the drone arrives at the transportation location according to the transportation location information, the second encryption information sent by the terminal corresponding to the user account registration is received by the transportation order information, and the drone separates the first encrypted information and the second encrypted information respectively. Decrypting and comparing, determining whether the security authentication is successful according to the comparison result, and after determining the success, controlling the warehouse corresponding to the transportation order information to be opened; or
- the drone further receives third encrypted information for security authentication, and after the drone arrives at the transportation location according to the transportation location information, the first encrypted information is sent to the corresponding user account of the transportation order information.
- Receiving, by the terminal, feedback information sent by the terminal for the first encrypted information, and receiving second encrypted information sent by the terminal, the third encrypted information and the second encrypted information by the drone Decrypting and comparing respectively, determining whether the security authentication is successful according to the comparison result and the feedback information, and after determining the success, controlling the warehouse corresponding to the transportation order information to be opened.
- the terminal acquires the shipping order information and the fourth encrypted information for the secure authentication from the server according to the account information of the user;
- the terminal When the terminal communicates with the drone corresponding to the transportation order information, the terminal sends the fourth encrypted information to the drone, and receives feedback information sent by the drone, according to the The feedback information determines whether the security authentication is successful and displays information indicating whether the security authentication is successful; or
- the terminal further acquires sixth encrypted information for security authentication from the server, and the terminal sends the fourth encrypted information to the drone when communicating with the drone corresponding to the transportation order information. And receiving the feedback information sent by the drone, and receiving the fifth encrypted information sent by the drone, the terminal decrypting and comparing the fifth encrypted information and the sixth encrypted information respectively And determining, according to the comparison result and the feedback information, whether the security authentication is successful, and displaying information that the security authentication is successful.
- the shipping order information includes transportation location information
- the first type of drone provided by the embodiment of the present invention includes a communication unit, a processing unit and a storage unit, wherein the communication unit and the storage unit communicate with the processing unit through a bus;
- the communication unit is configured to receive information from an external device through the processing unit, or send the information to the external device;
- the storage unit is configured to store information according to an instruction of the processing unit
- the processing unit is configured to receive, by the communication unit, transportation order information and first encrypted information for secure authentication, where the transportation order information includes transportation location information, and is stored to the storage unit;
- the first encrypted information in the storage unit is read, sent to the terminal in which the transportation order information corresponds to the user account by the communication unit, and the terminal is received through the communication unit.
- the drone after confirming that the drone arrives at the transportation place, receiving, by the communication unit, the second encrypted information sent by the terminal corresponding to the user account registration of the transportation order information, and reading the stored first encrypted information, and Decrypting and comparing the first encrypted information and the second encrypted information respectively, determining whether the security authentication is successful according to the comparison result, and after the determining is successful, issuing an instruction to control the opening of the warehouse corresponding to the transportation order information; or
- the communication unit is further configured to receive, by the communication unit, third encrypted information for secure authentication, after confirming that the drone arrives at the transportation location, reading the first encrypted information from the storage unit, by using the communication
- the unit sends the first encrypted information to the terminal that the transport order information corresponds to the user account, and receives the feedback information sent by the terminal for the first encrypted information through the communication unit, and receives the information through the communication unit.
- the second encrypted information sent by the terminal Decrypting and comparing the third encrypted information and the second encrypted information respectively, determining whether the security authentication is successful according to the comparison result and the feedback information, and after determining the success, issuing a warehouse corresponding to controlling the transportation order information to be opened instruction.
- the first terminal provided by the embodiment of the present invention includes a communication unit, a processing unit, a storage unit, and a display unit, wherein the communication unit, the storage unit, and the display unit communicate with the processing unit through a bus;
- the communication unit is configured to receive information from an external device through the processing unit, or send the information to the external device;
- the storage unit is configured to store information according to an instruction of the processing unit
- the display unit is configured to display information according to an instruction of the processing unit
- the processing unit is configured to acquire, by the communication unit, the shipping order information and the fourth encrypted information for secure authentication from the server, and store the same to the storage unit;
- the fourth encrypted information in the storage unit is read, and the fourth encrypted information is sent to the drone through the communication unit.
- the processing unit is further configured to acquire, by the communication unit, sixth encrypted information for secure authentication from the server, and read the storage in the storage unit when communicating with the drone corresponding to the transportation order information through the communication unit
- the fourth encrypted information is sent to the drone by the communication unit, and the feedback information sent by the drone is received by the communication unit.
- the first server provided by the embodiment of the present invention includes: a communication unit, a processing unit, and a storage unit, wherein the communication unit and the storage unit communicate with the processing unit through a bus;
- the communication unit is configured to receive information from an external device through the processing unit, or send the information to the external device;
- the storage unit is configured to store information according to an instruction of the processing unit
- the processing unit is configured to generate a transportation order including transportation location information for the drone, and generate first encrypted information for secure authentication, or generate second and third encrypted information for secure authentication, and pass the communication unit Sending the generated shipping order to the drone, and transmitting the generated encrypted information to a terminal registered by a drone or a user account corresponding to the shipping order through a communication unit.
- a second type of drone provided by an embodiment of the present invention includes a memory, one or more processors, and one or more modules, wherein the one or more modules are stored in the memory and configured to be configured by Executing by the one or more processors, the one or more modules include instructions for performing the various steps in the first method of lifting a drone transport security described above.
- a second terminal provided by the embodiment of the present invention includes a display, a memory, a transceiver, one or more processors, and one or more modules, wherein the one or more modules are stored in the memory and are Configured to be executed by the one or more processors, the one or more modules including instructions for performing the various steps in the second enhanced drone transport security method described above.
- a second server provided by the embodiment of the present invention includes: a memory, a transceiver, one or more processors; and one or more modules, wherein the one or more modules are stored in the memory and configured The execution is performed by the one or more processors, the one or more modules including instructions for performing the steps of the third method of lifting the drone transport security of the fir tree.
- Embodiments of the present invention also provide a computer program product for use with a drone, including A computer readable storage medium and computer program mechanism embodied therein, the computer program mechanism comprising instructions for performing the various steps of the first method of upgrading a drone transport security described above.
- Embodiments of the present invention also provide a computer program product for use in conjunction with an electronic device, the computer program product comprising a computer readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising The above second instruction for improving each step in the drone transport security method.
- the embodiment of the invention further provides a computer program product for use in combination with a server, the computer program product comprising a computer readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising A third instruction to improve the various steps in the drone transport safety method.
- the drone acquires the encrypted information, and performs security authentication by interacting with the terminal according to the encrypted information. Only after the safety certification is passed, the warehouse is opened to complete the transportation task. Because the encrypted information is used for security authentication, the risk of intercepting the security authentication information is reduced, and the possibility that the terminal is impersonated, or misplaced or misdirected is reduced. Improve the safety of drone transportation.
- the terminal acquires the encrypted information according to the user account information, and performs security by interacting with the drone according to the encrypted information.
- the authentication and the notification of the result of the authentication are notified to the user.
- the use of the encrypted information for security authentication reduces the risk of the interception of the security authentication information, reduces the possibility of the drone being impersonated or misreported, and the wrong delivery of the goods.
- the safety of drone transportation is a requirement that the drone being impersonated or misreported, and the wrong delivery of the goods.
- the server generates the encrypted information and sends it to the user account login terminal and/or the drone, so that the subsequent Transport security certification can be carried out by encrypting information, thereby reducing the risk of interception of safety certification information, reducing the possibility of drones being impersonated or misreceived, and sending goods wrongly, improving the safety of drone transportation.
- FIG. 1 is a schematic flow chart showing a first method for improving the transportation safety of a drone according to an embodiment of the present invention
- FIG. 2 is a schematic flow chart of a second method for improving the transportation safety of a drone according to an embodiment of the present invention
- FIG. 3 is a schematic flow chart showing a second method for improving the transportation safety of a drone according to an embodiment of the present invention
- FIG. 4 is a schematic structural view of a first type of drone provided in addition to an embodiment of the present invention.
- FIG. 5 is a schematic structural diagram of a first terminal according to an embodiment of the present invention.
- FIG. 6 is a schematic structural diagram of a first server according to an embodiment of the present invention.
- FIG. 7 is a schematic structural diagram of a second type of drone provided by an embodiment of the present invention.
- FIG. 8 is a schematic structural diagram of a second terminal according to an embodiment of the present invention.
- FIG. 9 is a schematic structural diagram of a second server according to an embodiment of the present invention.
- FIG. 10 is a schematic flow chart showing a preferred embodiment of the unmanned aerial vehicle pickup according to the present invention.
- Figure 11 is a flow chart showing another preferred embodiment of the unmanned aerial vehicle pickup according to the present invention.
- FIG. 12 is a schematic flow chart showing a specific implementation manner of a drone delivery method according to the present invention.
- Figure 13 is a flow chart showing another embodiment of the drone delivery method
- Figure 14 is a flow chart showing still another embodiment of the drone delivery method
- Figure 15 is a block diagram showing the structure of an exemplary embodiment of the drone of the present invention.
- Figure 16 is a block diagram showing a specific implementation of an exemplary embodiment of the drone shown in Figure 15;
- Figure 17 is a schematic view showing the structure of still another embodiment of the drone of the present invention.
- FIG. 18 is a schematic structural diagram of a terminal implementation manner of the present invention.
- Figure 19 is a block diagram showing the structure of a server embodiment of the present invention.
- the two-way verification is performed by the time stamp of the time when the user generates the online logistics order and the time stamp of the time when the drone is assigned the pick-up time, or one-way verification based on at least one time stamp. Verify that the drone is to verify whether the user is the actual applicant for the logistics order. The user wants to verify whether the drone is the correct drone that is agreed to pick up the goods to prevent misuse or malicious impersonation. User item.
- the drone adopts a voice question and answer method, and compares the user's answer with the logistics order information to determine whether it is the recipient, and simultaneously takes a photo or video.
- the two-way verification may be performed by using the time stamp of the online logistics order generation time and the time stamp of the drone being assigned the picking time, or based on at least one time stamp.
- the drone wants to verify whether the user is the correct consignee, and the consignee wants to verify whether the drone is a drone that is agreed to deliver, in order to prevent others from pretending to swindle the user. Or the drone is misrouted, and the user misplaces other people's items.
- the unmanned aerial vehicle of the present invention may be an unmanned aerial vehicle, or may be an unmanned vehicle or other unmanned transportation vehicle.
- the description is based on the scenario in which the unmanned aerial vehicle performs the transportation task.
- the procedures for order interaction and authentication are the same except for the specific transportation methods.
- the first method for improving the transportation safety of the drone provided by the embodiment of the present invention includes:
- Step 101 The drone acquires the transportation order information and the first encrypted information for the security authentication, where the transportation order information includes the transportation location information;
- Step 102 After the drone arrives at the transportation location according to the transportation location information, the first encryption information is sent to the terminal where the transportation order information corresponds to the user account, and the feedback information sent by the terminal is received, according to The feedback information determines whether the security authentication is successful, after the success is determined, Controlling the warehouse corresponding to the transportation order information to be turned on; or,
- the drone After the drone arrives at the transportation location according to the transportation location information, the second encryption information sent by the terminal corresponding to the user account registration is received by the transportation order information, and the drone separates the first encrypted information and the second encrypted information respectively. Decrypting and comparing, determining whether the security authentication is successful according to the comparison result, and after determining the success, controlling the warehouse corresponding to the transportation order information to be opened; or
- the drone further receives third encrypted information for security authentication, and after the drone arrives at the transportation location according to the transportation location information, the first encrypted information is sent to the corresponding user account of the transportation order information.
- Receiving, by the terminal, feedback information sent by the terminal for the first encrypted information, and receiving second encrypted information sent by the terminal, the third encrypted information and the second encrypted information by the drone Decrypting and comparing respectively, determining whether the security authentication is successful according to the comparison result and the feedback information, and after determining the success, controlling the warehouse corresponding to the transportation order information to be opened.
- the foregoing feedback information for the first encrypted information includes: information for verifying whether the first encrypted information is passed;
- the feedback information of the first encrypted information includes: the information after the first encrypted information is decrypted; and after receiving the feedback information, the method further includes: sending the decrypted information of the first encrypted information to a server, And determining, by the server, information for verifying whether the encrypted information is passed; determining whether the security authentication succeeds according to the feedback information comprises: determining whether the security authentication is successful according to the information that is verified by the verification of the server.
- the first encrypted information sent to the terminal includes: information encrypted by using a public key of the transport account corresponding to the user account;
- the second encrypted information includes: information encrypted by a public key of the drone;
- the first encrypted information or the third encrypted information decrypted by the drone includes information encrypted by a public key of the drone.
- the shipping order is a pick-up order or a delivery order; preferably,
- the encrypted information in each encrypted information may include: the time when the transportation order is generated Stamp, or the server confirms the timestamp of the user logistics order time corresponding to the shipping order.
- the second method for improving the transportation safety of the drone provided by the embodiment of the present invention includes:
- Step 201 The terminal acquires, according to the account information of the user, the transportation order information and the fourth encrypted information used for the security authentication.
- Step 202 The terminal sends the fourth encrypted information to the drone when receiving communication with the drone corresponding to the transportation order information, and receives feedback information sent by the drone. Determining, according to the feedback information, whether the security authentication is successful, and displaying information that the security authentication is successful; or
- the terminal further acquires sixth encrypted information for security authentication from the server, and the terminal sends the fourth encrypted information to the drone when communicating with the drone corresponding to the transportation order information. And receiving the feedback information sent by the drone, and receiving the fifth encrypted information sent by the drone, the terminal decrypting and comparing the fifth encrypted information and the sixth encrypted information respectively And determining, according to the comparison result and the feedback information, whether the security authentication is successful, and displaying information that the security authentication is successful.
- the feedback information for the fourth encrypted information includes: information for verifying whether the fourth encrypted information is passed;
- the feedback information about the fourth encrypted information includes: the information after the fourth encrypted information is decrypted; and after receiving the feedback information, the method further includes: sending the information after decrypting the fourth encrypted information to a server, And determining, by the server, information for verifying whether the encrypted information is passed; determining whether the security authentication succeeds according to the feedback information comprises: determining whether the security authentication is successful according to the information that is verified by the verification of the server.
- the fourth encrypted information sent to the drone includes: information encrypted by the public key of the drone;
- the fifth encrypted information includes: information encrypted with a public key of the user account;
- the fourth encrypted information and the sixth encrypted information decrypted by the terminal include: information encrypted with a public key of the user account.
- the transportation order may be a pick-up order, or a delivery order; preferably, the encrypted information in each encrypted information may include: a time stamp of the transportation order generation time, or the server confirms that the transportation order corresponds to The timestamp of the user's logistics order time.
- the third method for improving the transportation safety of the drone provided by the embodiment of the present invention includes:
- Step 301 Generate transportation order information for the drone, where the transportation order information includes transportation location information;
- Step 302 Generate first encrypted information for secure authentication, or generate second encrypted information and third encrypted information for secure encryption;
- Step 303 Send the generated transport order to the drone, and send the generated encrypted information to the drone, or send the terminal to the user account corresponding to the transport order.
- the method further includes: receiving the decryption information sent by the drone or the terminal, performing security authentication on the decrypted information, and then feeding back the security authentication to the drone or the terminal. result.
- the first encrypted information sent to the drone may include: information encrypted with a public key of the user account;
- the first encrypted information of the terminal that is sent to the user account to log in may include: information encrypted by the public key of the drone;
- the second encrypted information and the third encrypted information may respectively include information encrypted with a public key of the drone and information encrypted with a public key of the user account.
- the transportation order is a pickup order, or a delivery order; preferably, the encrypted information in each encrypted information includes: a time stamp of the transportation order generation time, or the server confirms the user corresponding to the transportation order The timestamp of the logistics order time.
- the first type of drone provided by the embodiment of the present invention includes a processing unit 41, a communication unit 42, and a storage unit 43, wherein the communication unit 42 and the storage unit 43 communicate with the processing unit 41 through a bus;
- the communication unit 42 is used by the processing unit 41 to receive information from an external device or send information to an external device;
- the storage unit 43 is configured to store information according to an instruction of the processing unit 41;
- the processing unit 41 is configured to receive, by the communication unit 42, transport order information and first encrypted information for secure authentication, where the transport order information includes transport location information, and is stored to the storage unit 43;
- the first encrypted information in the storage unit 43 is read, and is sent to the terminal in which the transportation order information is registered with the user account through the communication unit 42 and received by the communication unit 42.
- the feedback information sent by the terminal determines whether the security authentication is successful according to the feedback information, and after determining the success, issuing an instruction to control the opening of the warehouse corresponding to the transportation order information;
- the communication unit 42 receives the second encrypted information sent by the terminal corresponding to the user account registration of the transportation order information, and reads the stored first encrypted information, and Decrypting and comparing the first encrypted information and the second encrypted information respectively, determining whether the security authentication is successful according to the comparison result, and after the determining is successful, issuing an instruction to control the opening of the warehouse corresponding to the transportation order information; or
- the communication unit 42 is further configured to receive, by the communication unit 42, third encrypted information for secure authentication, and after confirming that the drone arrives at the transportation location, the first encrypted information is read from the storage unit 43. Transmitting, by the communication unit 42, the first encrypted information to the terminal that the transport order information corresponds to the user account, and receiving the pin sent by the terminal through the communication unit 42 And the second encrypted information and the second encrypted information are respectively decrypted and compared by the feedback information of the first encrypted information, and the second encrypted information sent by the terminal is received by the communication unit 42 according to the comparison result. And the feedback information determines whether the security authentication is successful, and after determining the success, issuing an instruction to control the opening of the warehouse corresponding to the transportation order information.
- the feedback information for the first encrypted information may include: information for verifying whether the first encrypted information is passed;
- the feedback information for the first encrypted information may also include: the information after the first encrypted information is decrypted; then the processing unit 41 is further used by the communication unit 42 to: use the communication unit 42 to The information obtained by decrypting the first encrypted information is sent to the server, and the information fed back by the server for verifying whether the encrypted information is verified is received by the communication unit 42.
- the communication unit 42 is configured to determine whether the security authentication is successful according to the feedback information.
- the communication unit 42 is configured to determine whether the security authentication is successful according to the information that the verification of the server feedback is passed.
- the first encrypted information sent to the terminal includes: information encrypted by using a public key of the transport account corresponding to the user account;
- the second encrypted information includes: information encrypted by a public key of the drone;
- the first encrypted information or the third encrypted information decrypted by the processing unit 41 includes information encrypted by the public key of the drone.
- the transportation order may be a pickup order or a delivery order; preferably, the encrypted information in each encrypted information includes: a time stamp of the transportation order generation time, or the server confirms that the transportation order corresponds to The timestamp of the user's logistics order time.
- FIG. 5 shows a first terminal provided by an embodiment of the present invention.
- the terminal includes a communication unit 52, a processing unit 51, a storage unit 53, and a display unit 54, wherein the communication unit 52, the storage unit 53 and The display unit 54 communicates with the processing unit 51 via a bus;
- the communication unit 52 is configured by the processing unit 51 to receive information from an external device or send information to an external device;
- the storage unit 53 is configured to store information according to an instruction of the processing unit 51;
- the display unit 54 is configured to display information according to an instruction of the processing unit 51;
- the processing unit 51 is configured to acquire transport order information and fourth encrypted information for secure authentication from the server through the communication unit 52, and store the same to the storage unit 53;
- the fourth encrypted information in the storage unit 53 is read, and the fourth encrypted information is sent to the none through the communication unit 52.
- the fifth encrypted information sent by the drone is received by the communication unit 52, and the fourth encrypted information stored in the storage unit 53 is read. Decrypting and comparing the fourth encrypted information and the fifth encrypted information respectively, determining whether the security authentication is successful according to the comparison result, and instructing the display unit 54 to display information indicating whether the security authentication is successful; or
- the processing unit 51 is further configured to acquire sixth encrypted information for secure authentication from the server through the communication unit 52, and read the storage unit when communicating with the drone corresponding to the transport order information through the communication unit 52.
- the fourth encrypted information stored in the fifth encrypted information is sent to the drone through the communication unit 52, and the feedback information sent by the drone is received through the communication unit 52, and through the communication unit.
- Receiving the fifth encrypted information sent by the drone, decrypting and comparing the fifth encrypted information and the sixth encrypted information, determining whether the security authentication is successful according to the comparison result and the feedback information, and indicating the display Unit 54 displays information as to whether the security authentication was successful.
- the feedback information for the fourth encrypted information includes: information for verifying whether the fourth encrypted information is passed;
- the feedback information for the fourth encrypted information includes: the information after the fourth encrypted information is decrypted; and the communication unit 52 is further configured to: pass the information after decrypting the fourth encrypted information by using the communication Unit 52 sends to the server and receives server feedback via communication unit 52. And determining, by the communication unit 52, whether the security authentication succeeds according to the feedback information, where the communication unit 52 is configured to: use, according to the information fed back by the server, whether the verification is passed. Determine if the security certification is successful.
- the fourth encrypted information sent to the drone includes: information encrypted by the public key of the drone;
- the fifth encrypted information includes: information encrypted with a public key of the user account;
- the fourth encrypted information or the sixth encrypted information decrypted by the terminal includes: information encrypted by a public key of the user account.
- the transportation order may be a pickup order or a delivery order; preferably, the encrypted information in the fourth encrypted information includes: a time stamp of the transportation order generation time, or the server confirms the transportation The timestamp of the user's logistics order time corresponding to the order;
- the information encrypted in the fifth encrypted information includes: a time stamp of the time when the transportation order is generated, or a time stamp of the time when the server confirms the user logistics order corresponding to the transportation order;
- the information encrypted in the sixth encrypted information includes: a time stamp of the time when the transportation order is generated, or a time stamp of the time when the server confirms the user logistics order corresponding to the transportation order.
- FIG. 6 shows a first type of server provided by an embodiment of the present invention.
- the server includes: a processing unit 61, a communication unit 62, and a storage unit 63, wherein the communication unit 62 and the storage unit 63 are both connected to each other through a bus.
- Processing unit 61 communicates;
- the communication unit 62 is used by the processing unit 61 to receive information from an external device or send information to an external device;
- the storage unit 63 is configured to store information according to an instruction of the processing unit 61;
- the processing unit 61 is configured to generate a transportation order including transportation location information for the drone, and generate first encrypted information for secure authentication, or generate second and third encrypted information for secure authentication, and communicate
- the unit 62 transmits the generated shipping order to the drone, and transmits the generated encrypted information to the terminal registered by the drone or the user account corresponding to the shipping order through the communication unit 62.
- the processing unit 61 of the server is further configured to receive the decryption information sent by the drone or the terminal through the communication unit 62, perform security authentication on the decrypted information, and then go through the communication unit 62.
- the drone or the terminal feeds back the security certification result.
- the first encrypted information sent to the drone is: information encrypted with a public key of the user account;
- the first encrypted information of the terminal that is sent to the user account to log in includes: information encrypted by the public key of the drone;
- the second encrypted information and the third encrypted information respectively include information encrypted with a public key of the drone and information encrypted with a public key of the user account.
- the shipping order is a pickup order, or a delivery order.
- the encrypted information in the first encrypted information includes: a timestamp of the time when the transportation order is generated, or a timestamp of the time when the server confirms the user logistics order corresponding to the transportation order;
- the encrypted information in the second encrypted information includes: a time stamp of the time when the transportation order is generated, or a time stamp of the time when the server confirms the user logistics order corresponding to the transportation order;
- the information encrypted in the third encrypted information includes: a time stamp of the time when the transportation order is generated, or a time stamp of the time when the server confirms the user logistics order corresponding to the transportation order.
- FIG. 7 shows a second type of drone provided by an embodiment of the present invention.
- the drone includes a memory 71, a transceiver 72, one or more processors 73, and one or more modules.
- the one or more modules are stored in the memory 71 and configured to be executed by the one or more processors 73, the one or more modules including for performing the first boost described above Instructions for each step in the human-machine transportation safety method.
- FIG. 8 shows a second terminal according to an embodiment of the present invention.
- the terminal includes a display 81, a memory 82, a transceiver 83, one or more processors 84, and one or more modules.
- the one or more modules are stored in the memory 82 and configured to be executed by the one or more processors 84, the one or more modules including for performing the second boost described above Instructions for each step in the drone transport safety method.
- FIG. 9 shows a second server according to an embodiment of the present invention.
- the server includes: a memory 91, a transceiver 92, one or more processors 93, and one or more modules.
- One or more modules are stored in the memory 91 and configured to be executed by the one or more processors 93, the one or more modules including for performing the third elevated drone transport described above Instructions for each step in the security method.
- the embodiment of the invention further provides a computer program product for use in combination with a drone, comprising a computer readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising: Instructions to enhance the various steps in the drone transport safety method.
- Embodiments of the present invention also provide a computer program product for use in conjunction with an electronic device, the computer program product comprising a computer readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising The above second instruction for improving each step in the drone transport security method.
- the embodiment of the invention further provides a computer program product for use in combination with a server, the computer program product comprising a computer readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising A third instruction to improve the various steps in the drone transport safety method.
- FIG. 10 shows a preferred unmanned vehicle pick-up implementation.
- the shipping user authenticates with the unmanned aircraft through the registered terminal and improves the transportation security.
- the implementation specifically includes the following steps:
- Step 1001 The terminal acquires related information of the logistics order, including the original logistics information such as the shipper address, the consignee address, the cargo information, the contact information, and generates a logistics order according to the operation performed by the user in the client application (APP). Presented to the user for confirmation by the user to submit to the server on the network side.
- the original logistics information such as the shipper address, the consignee address, the cargo information, the contact information.
- the user can also provide other common parties such as web pages provided by the logistics system. Carry out related logistics operations.
- the user needs to log in the account before submitting, and the terminal and the server on the network side can complete the login interaction before submitting the order information.
- the server on the network side may be a network side server of the logistics system, and is used for exchanging logistics related information, order information, assigning drones, and the like with the terminal that the user logs in.
- the service unit for interacting with the terminal, the service unit of the order information, and the service unit for assigning the drone may be integrated into one physical server, or may be independent physical servers, or may use technologies such as cloud computing. Through the distributed server implementation, these specific implementation methods are common technologies in the field of computer networks, and will not be described here.
- the service unit interacting with the terminal can also be integrated with a server unit that provides a merchandise sales service, and the service unit of the drone is assigned separately.
- these service units can also be implemented through distributed servers through technologies such as cloud computing.
- Step 1002 After receiving the user logistics order and confirming the successful order, the server on the network side generates a timestamp T1 of the successful time of confirming the order.
- Step 1003 The server, according to the user logistics order, assigns a drone that picks up the goods to generate a pickup order, and records a time stamp T2 of the time when the drone is assigned.
- the server When the server assigns a drone, it generates a transport order based on the user's logistics order. In each embodiment of the pick-up, it is referred to as a pick-up order for clarity, and sends the pick-up order information to the dispatch command.
- the pick-up order information includes at least the transport location information, and in each embodiment of the pick-up, it is referred to as the shipper address information.
- the pick-up order information or delivery order information sent by the server to the drone does not need to include the transport type.
- Information (used to identify the pick-up or delivery information for the transport task); if the drone is used for pick-up and for delivery, the pick-up order information or delivery order information sent by the server to the drone It also includes transportation type information.
- the time stamp of the time when the drone is assigned that is, the time stamp of the time when the order is picked up.
- Step 1004 The server adopts asymmetric encryption, encrypts the timestamp T1 with the public key of the assigned drone, encrypts the timestamp T2 with the public key of the user account, and then encrypts the encrypted timestamp T1 and the encryption respectively.
- the subsequent time stamp T2 is sent to the assigned drone and the terminal to which the above user logs in.
- the encrypted timestamp sent to the drone can be sent along with the dispatch instruction of the drone, or can be delivered separately through a special message.
- the information about the terminal that is sent to the user can be delivered by a separate message or sent along with other messages in the process.
- the timestamp T1 and the timestamp T2 may also be exchanged, that is, T1 is encrypted with the public key of the user account, and T2 is encrypted by the public key of the drone, and only needs to be exchanged during the authentication process. can.
- the server when the user registers to the server through a client application or a webpage on the terminal, or when the drone is registered to the server, the server may be a user account or The UAV configures and saves the public key private key pair, and sends the private key configured for the user account to the user registered terminal and the subsequent login terminal, and sends the private key configured for the drone to the corresponding drone.
- Step 1005 The assigned drone picks up the goods according to the location information and time information in the logistics order, and feeds back the location information to the server, and the server initiates the location query of the drone at the terminal through which the user logs in.
- the location and time information of the drone is sent to the terminal where the user is logged in at the time.
- the UAV may carry a GPS or other special positioning module, or may be located through a wireless communication network to acquire its own location information.
- Step 1006 After the drone arrives at the pick-up location, the encrypted timestamp T2 is transmitted to The user logs in to the terminal, and the user transmits the encrypted timestamp T1 to the drone through the logged-in terminal, and performs identity authentication according to the received encrypted time stamp.
- the drone After the drone arrives at the pick-up location, the drone starts to take a picture or record, and the terminal that the user logs in acquires the order number information from the drone, and verifies whether the arrived drone is the user.
- the drone assigned to the corresponding order after the drone arrives at the pick-up location, the drone starts to take a picture or record, and the terminal that the user logs in acquires the order number information from the drone, and verifies whether the arrived drone is the user.
- the drone assigned to the corresponding order after the drone arrives at the pick-up location, the drone starts to take a picture or record, and the terminal that the user logs in acquires the order number information from the drone, and verifies whether the arrived drone is the user.
- the drone assigned to the corresponding order after the drone arrives at the pick-up location, the drone starts to take a picture or record, and the terminal that the user logs in acquires the order number information from the drone, and verifies whether the arrived drone is the user.
- the drone assigned to the corresponding order after the drone arrives
- the terminal After verifying the success of the drone, the terminal transmits the encrypted time stamp T1 to the drone, and the drone transmits the encrypted time stamp T2 to the terminal.
- the terminal and the drone After receiving the encrypted timestamp sent by the other party, the terminal and the drone decrypt the received encrypted timestamp with its own private key, and compare it with the decrypted corresponding timestamp from the server. If they are consistent, then The other party is authenticated.
- the terminal uses its own private key to unlock the T2 information that it has obtained from the server and the T2 information that has just been received and compares it. If the timestamp is the same, the terminal is considered to be the drone assigned to the terminal. . At the same time, the drone uses its own private key to unlock the T1 information it has obtained from the server and the T1 information it just received, and compares it. If the timestamp is the same, the user is considered to be the originator of this logistics order. If the terminal verifies that T2 does not pass, it is determined that the drone is not a system assigned drone, and it is likely to be maliciously defrauded by another person's drone.
- step 1008 the pickup process is ended; if the drone verifies that T1 does not pass or the terminal If the T1 information is not provided, it is determined that the terminal is not the order originating terminal, and the goods should not be picked up at this time, and the picking process is also terminated in step 1008.
- the communication between the terminal and the drone can be completed by various wireless communication methods.
- a Bluetooth, a contactless radio frequency identification (NFC) method, or a direct interaction mode by scanning an identification code (such as a two-dimensional code or a barcode) may be used, which is performed by using a wireless communication network.
- Communication can further improve security.
- Step 1007 After the mutual authentication is passed, the drone automatically unlocks and opens the warehouse corresponding to the transportation order information, and the user puts the item into the designated space position, confirms that the loading is completed, the storage warehouse is closed, and the pickup is completed. .
- the drone In this step, if the drone has only one warehouse, it means to open the warehouse. If there are multiple warehouses, And corresponding to different transportation orders, only the warehouse corresponding to the transportation order information is opened.
- the drone can fly to the logistics collection point, the next pickup point, or directly when the destination is in the same city and the distance is relatively close.
- Step 1008 If the identity verification of both parties fails, the pickup process ends.
- the terminal verifies that T2 does not pass, the failed information is fed back to the server and waits for the correct drone to arrive; if the drone verifies that T1 does not pass or does not receive the encrypted T1 information from the terminal, then no The man-machine returns the verification failure information to the server, and returns to the logistics collection point, the next pickup point, or the place to wait according to the instructions fed back by the server.
- the flow related to the logistics order operation and the related logistics processing such as the drone assignment may be any existing implementation manner, which is not limited in the present invention.
- the terminal or the drone and the server can communicate with each other through various wireless communication networks such as 5G, 4G, 3G, GPRS, or WiFi, and are not limited herein.
- the timestamp T1 and the timestamp T2 are preferred implementations in the present embodiment and other embodiments, and the security information can be better matched with the order.
- the two timestamps can also be replaced by other timestamps. As long as the server generates two different timestamps, the terminal and the drone's public key are encrypted and sent to two devices for verification. The technical effect of safety.
- FIG. 11 shows another preferred drone pickup implementation in which the identity authentication of the user's terminal and the drone is completed by the server to improve the transportation security.
- Steps 1101 to 1103 in this embodiment are the same as steps 1001 to 1003, and are not described here. After step 1103, the following steps are included:
- Step 1104 The server adopts asymmetric encryption, encrypts the timestamp T1 by the public key of the user account, encrypts the timestamp T2 with the public key of the assigned drone, and then sends the encrypted timestamp T1 to the local
- the assigned drone sends the encrypted timestamp T2 to the end of the user's login. end.
- the timestamp T1 and the timestamp T2 may be exchanged, that is, the T1 is encrypted by the UAV public key, and the T2 is encrypted by the terminal public key, and the encrypted timestamp T1 is sent to the terminal that the user logs in.
- the encrypted timestamp T2 is sent to the drone, and similar switching is performed in the subsequent authentication process, which will not be described here.
- Step 1105 The assigned drone picks up the goods according to the location information and time information in the logistics order, and feeds back the location information to the server, and the server initiates the drone location query by the user through the login terminal.
- the location and time information of the drone is sent to the terminal where the user is logged in at the time.
- Step 1106 After the drone arrives at the pick-up location, the encrypted timestamp T1 is transmitted to the terminal that the user logs in, and the terminal that the user logs in transmits the encrypted timestamp T2 to the drone.
- the drone After the drone arrives at the pick-up location, the drone starts to take a picture or record, and the user obtains the order number information from the drone through the registered terminal, and verifies whether the arrived drone is for the The drone assigned by the user to the corresponding order.
- the terminal After verifying the success of the drone, the terminal transmits the encrypted time stamp T2 to the drone, and the drone transmits the encrypted time stamp T1 to the terminal.
- Step 1107 After receiving the encrypted timestamp sent by the other party, the terminal and the drone decrypt the received encrypted timestamp by using the corresponding private key in the same, and feed back the decrypted timestamp to the other party.
- one of the terminal and the drone directly ends the picking process, or feeds back the decryption failure information to the other party and/or uploads to the server, and ends the process.
- the pickup process is ended.
- Step 1108 After receiving the decrypted timestamp, the terminal and the drone respectively upload the decrypted timestamp to the server.
- Step 1109 The server compares the received decryption timestamp with the timestamp of the record itself. Verify that the timestamps uploaded by the terminal and the drone are correct to authenticate the two and feed back the authentication results to the drone and the terminal.
- the terminal is considered to be the terminal of the originating user of the logistics order, and the drone is indeed assigned the drone; if the timestamp T1 is correct, the timestamp T2 is incorrect.
- the drone is correct but the terminal is disguised as the sender, and the terminal has obtained the private key of the decryption timestamp T1; if the timestamp T1 is wrong (or missing) and the timestamp T2 is correct, then the discriminant
- the drone is maliciously defrauded, and the drone has acquired the private key of the decryption timestamp T2; if both the timestamp T1 and the timestamp T2 are wrong or missing, the drone can be basically determined to be maliciously defrauded, and also small. Part of it may be that the drone is correct but the user disguised as the sender. In this case, the message should be sent to the correct user terminal immediately to remind the order user that the drone is maliciously defrauded or someone else pretends to be the sender.
- Step 1110 After receiving the message that the two parties have passed the identity authentication sent by the server, the drone and the terminal complete the picking process according to the description of step 1007.
- the terminal and the drone decrypt the received encrypted timestamp by using the corresponding private key in the terminal.
- the timestamp is sent to the server directly, and the server directly authenticates the authentication result and sends the authentication result to both parties.
- the specific authentication mode and the result delivery method are sent. The same as in the previous preferred embodiment, and details are not described herein again.
- Embodiments of the present invention also provide a method for improving the security of drone delivery.
- FIG. 12 shows a specific implementation manner of the drone delivery method.
- the drone uses a voice question and answer method to compare the user's answer with the logistics order information to determine whether it is actually received.
- the embodiment includes the following steps:
- Step 1201 The server assigns a drone, and after receiving the instruction including the transportation order, the drone flies to the delivery target location according to the instruction after the loading of the cargo is completed.
- the transportation order includes the transportation location information, that is, the delivery item. Location information.
- Step 1202 After the consignee appears, the drone takes a picture or starts recording.
- the drone can automatically start timing or start recording after the delivery destination is reached.
- the drone can determine the appearance of the consignee through image recognition, and can also determine the presence of the consignee by the operation of the consignee on the drone.
- Step 1203 The drone uses voice to query the consignee's name and/or address information.
- Step 1204 The drone detects whether the information answered by the consignee is correct, provides the goods after the verification is correct, and then performs step 1205.
- the drone can obtain the content of the consignee's answer through voice recognition, and then compare the content of the answer with the information of the logistics order. If the same, the location is considered correct, the lock is automatically unlocked, and the consignee takes the item; If they are similar, they need to be further intelligently verified (such as by means of the mobile phone number, saying the first few people let the consignee say the next few, etc.) until the verification is automatically unlocked after the pass, the user takes the item; if it is completely different or the verification cannot be If it is considered that the location is wrong or someone is taking the lead, the drone should return the message to the logistics company to communicate with the recipient and then deliver it.
- step 1205 the drone completes the delivery, ends the photographing or video recording when leaving, flies to the next delivery point or returns to the flight.
- FIG. 13 illustrates another embodiment of the drone delivery method.
- the unmanned aircraft and the consignee perform two-way verification.
- the implementation specifically includes the following steps:
- Step 1301 The server assigns a drone that delivers the delivery to the consignee according to the user logistics order, that is, generates a transportation order and delivers the transportation order to the drone, and records the time stamp of the time when the drone is assigned. T2, and obtain the timestamp T1 of the time at which the user's logistics order is generated.
- Step 1302 The server adopts asymmetric encryption, encrypts the timestamp T2 with the public key of the receiver user account, encrypts the public key of the time stamp T1 user drone, and then encrypts the timestamps T1 and T2.
- T1 and T2 are interchangeable here, and can be replaced with other ones. Timestamp.
- Step 1303 The assigned drone loads the goods and delivers the goods according to the location information in the logistics order, and feeds back the location information to the server, and the server will not have the location when the user initiates the drone location query through the login terminal.
- the location and time information of the man-machine is sent to the terminal that the user is logged in at the time, and the user here may be the shipper or the consignee.
- the time when the drone loads the goods may be after the time when the server sends the encrypted time stamp, or before.
- Step 1304 After the drone arrives at the delivery location, the encrypted timestamp T2 is transmitted to the terminal that the consignee user logs in, and the terminal that the consignee user logs in transmits the encrypted timestamp T1 to the terminal. The drone is authenticated according to the received encrypted timestamp.
- the mobile phone can also take a photo or video recording, and before transmitting the encrypted time stamp, the receiver user obtains the order number information from the drone through the registered terminal. Verifying whether the arriving drone is a drone assigned to the corresponding order of the user, or as described in the above embodiment, whether the drone correctly verifies the consignee, and then performs the steps in this step. Key interaction.
- the terminal and the drone After receiving the encrypted timestamp sent by the other party, the terminal and the drone decrypt the received encrypted timestamp with its own private key, and compare it with the decrypted corresponding timestamp from the server. If they are consistent, then The other party is authenticated.
- the communication between the terminal and the drone can be completed by various wireless communication methods.
- a Bluetooth, a contactless radio frequency identification (NFC) method, or a direct interaction mode by scanning an identification code (such as a two-dimensional code or a barcode) may be used, which is performed by using a wireless communication network.
- Communication can further improve security.
- Step 1305 after the mutual authentication is passed, the drone is automatically unlocked, and the consignee user takes out the item, confirms that after the pickup is completed, the warehouse is locked, and the drone delivery is completed; if the identity verification of both parties fails, End the picking process.
- the drone can fly to the logistics collection point, the next delivery point, or Pick up point.
- the terminal verifies that T2 does not pass, the information that fails is fed back to the server, and waits for the correct drone to arrive; if the drone verifies that T1 does not pass or does not receive the encrypted T1 information from the terminal, then The drone feeds back the verification failure information to the server and flies back to the logistics collection point, flies to the next pickup point, or waits in place according to the instructions fed back by the server.
- FIG. 14 shows a further embodiment of the drone delivery method.
- the unmanned aircraft performs one-way verification on the consignee.
- the implementation specifically includes the following steps:
- Step 1401 The server assigns a drone that delivers the goods according to the user logistics order, when the need to deliver the goods to the consignee, that is, generates a transport order and delivers the time to the drone, and records the time stamp of the time when the drone is assigned. T2.
- Step 1402 The server adopts asymmetric encryption, and encrypts the timestamp T2 with the public key of the consignee user account, and then sends the encrypted timestamp T2 to the assigned drone.
- the server may also encrypt the timestamp T2 with the public key of the drone itself and send it to the assigned drone.
- Step 1403 The assigned drone loads the goods, delivers the goods according to the location information in the logistics order, and feeds back the location information to the server, and the server does not query the location of the drone when the user logs in through the terminal.
- the location and time information of the man-machine is sent to the terminal that the user is logged in at the time, and the user here may be the shipper or the consignee.
- the time when the drone loads the goods may be after the time when the server sends the encrypted time stamp, or before.
- Step 1404 After the drone arrives at the delivery location, the timestamp T2 encrypted by the user account public key in the user is transmitted to the terminal registered by the consignee user.
- the drone After the drone arrives at the pick-up location, the drone starts to take a picture or record, and the user obtains the order number information from the drone through the terminal, and verifies whether the arrived drone is corresponding to the user. The drone assigned to the order, and then the step of transmitting the encrypted timestamp.
- Step 1405 The UAV receives the decrypted T2 information fed back by the terminal, according to the decrypted T2. The information authenticates the terminal.
- the server sends the T2 encrypted by the unmanned public key to the drone in step 1402, the unmanned machine decrypts the encrypted information, and then performs the decrypted T2 and the T2 from the terminal.
- the terminal is verified to pass the identity. If they are inconsistent, the verification fails.
- the drone receives the T2 information and the transport order related information after receiving the decrypted T2 information fed back by the terminal. If the order number is sent to the server, the server verifies the decrypted T2 correctly, and feeds the verification result back to the drone. The drone determines whether to verify the identity of the terminal according to the verification result.
- the decrypted T2 information is compared with the T2 in the self or the T2 obtained by decrypting the private key to determine whether the T2 fed back by the terminal is correct, so as to authenticate the terminal.
- Step 1406 After the UAV passes the terminal identity verification, the UAV automatically unlocks, and the consignee user takes out the item, confirms that after the pickup is completed, the cargo bin is locked, and the drone delivery is completed; if the identity verification is not completed Pass, end the pickup process.
- the drone can fly to the logistics collection point, the next delivery point, or the pickup point.
- the unmanned aircraft performs a one-way verification process on the consignee, or the server may simultaneously transmit the T2 encrypted by the drone public key to the drone and the user to log in.
- the U2 obtains the T2 of the UAV public key encryption from the terminal that the user logs in, and then decrypts the T2 and the previous server to its own encrypted T2 and decrypts it with its own private key. If the agreement is the same, the terminal authentication is passed, and the inconsistent authentication is passed.
- the structure of an exemplary embodiment of the drone of the present invention is as shown in FIG.
- the unmanned aerial vehicle and the terminal registered by the user mutually authenticate each other, thereby improving the safety of the drone pickup.
- the drone includes: a communication unit 151, a processing unit 152, and a storage unit 153, wherein the communication unit 151 and the storage unit 153 each communicate with the processing unit 152 via a bus.
- the communication unit 151, the storage unit 153, and the like can also communicate with the processing unit 152 through other internal computer communication methods if other internal communication modes of the computer occur.
- the communication unit 151 is configured to receive a transportation task and a transportation place from the server, order information, and first encrypted information for secure authentication, and send the same to the processing unit 152; and, according to an instruction of the processing unit 152, the first The encrypted information is sent to the terminal corresponding to the order information, and receives the second encrypted information from the terminal, and sends it to the processing unit 152; and the receiving terminal verifies the notification passed by the drone and sends it to the processing.
- Unit 152 is configured to receive a transportation task and a transportation place from the server, order information, and first encrypted information for secure authentication, and send the same to the processing unit 152; and, according to an instruction of the processing unit 152, the first The encrypted information is sent to the terminal corresponding to the order information, and receives the second encrypted information from the terminal, and sends it to the processing unit 152; and the receiving terminal verifies the notification passed by the drone and sends it to the processing.
- Unit 152 is configured to receive a transportation task and a transportation place from the server,
- the processing unit 152 is configured to receive the transportation task and the transportation location, the order information, the first encryption information, and store the information in the storage unit 153; and after confirming that the drone arrives at the transportation location, read the first in the storage unit 153.
- An encrypted information indicating that the communication unit 151 sends to the terminal; and determining that the terminal is legal according to the received second encrypted information, and receiving the notification that the terminal verifies that the drone passes, controlling the drone to perform the Transport mission
- the storage unit 153 is configured to store or provide information according to an instruction of the processing unit 152.
- the second encrypted information may also be stored in the storage unit 153 first, and read from the storage unit 153 when the processing unit 152 is used.
- the second encrypted information is information encrypted by a public key of the drone
- the determining, by the communication unit 151, that the terminal is legal according to the second encryption information includes:
- the processing unit 152 is configured to read the private key of the drone from the storage unit 153, and after decrypting the second encrypted information, determine that the decrypted information matches the corresponding information stored in the storage unit 153. .
- the communication unit 151 is further operable to receive second encrypted information from the server;
- the communication unit 151 is further configured to store the second encrypted information from the server to the storage unit 153;
- the determining, by the communication unit 151, that the terminal is legal according to the second encryption information includes:
- the processing unit 152 is configured to read the private key of the drone from the storage unit 153 and come from The second encrypted information of the server decrypts the second encrypted information from the terminal and the second encrypted information from the server, respectively, and determines that the decrypted information matches.
- the encrypted information is an encrypted timestamp.
- the timestamp in the first encrypted information is generated according to a time when the server sends a transport task to the drone, and the timestamp in the second encrypted information is generated according to a time when the server generates the order; or
- the timestamp in the first encrypted information is generated according to the time when the server generates the order, and the timestamp in the second encrypted information is generated according to the time when the server delivers the transport task to the drone.
- the first encryption information is information encrypted by the public key of the terminal user account; and the receiving, by the communication unit 151, the notification that the terminal verifies that the drone passes the notification may include:
- the communication unit 151 is configured to receive a verification pass message sent by the terminal after decrypting the user account private key in the first encrypted information utilization terminal and verifying the success.
- the communication unit 151 includes a first communication unit 1511 and a second communication unit 1512.
- the first communication unit 1511 is used by the processing unit 152 of the drone to perform wireless communication with a server or other device through a wireless communication network.
- the first communication unit 1511 may be a 5G, 4G, 3G, GPRS or WiFi communication unit, or integrate any two or more of the above communication functions.
- the second communication unit 1512 is used by the processing unit 152 of the drone to wirelessly communicate with the user's terminal.
- the second communication unit 1512 can be a communication unit that can directly communicate wirelessly with the terminal, such as a Bluetooth communication unit, a radio frequency identification unit, and the like, without going through a communication network.
- the terminal that is logged in by the drone and the user is authenticated by the server to improve the security of the drone pickup. Sex.
- the difference from the previous embodiment mainly lies in how the processing unit controls the legal verification part of the terminal and the drone to receive the information verified by the terminal, and the rest is the same as the previous drone implementation. The same part is not traced here.
- the processing unit may determine that the terminal is legal based on the second encryption information, and may also The terminal is determined to be legal by the first encrypted information.
- the manner of the processing unit determining that the terminal is legal according to the second encryption information comprises: the processing unit is configured to read the private key of the drone from the storage unit, and after decrypting the second encrypted information, indicating The communication unit transmits the decrypted information to the server, and receives an authentication success message fed back by the server through the communication unit.
- the processing unit Determining, by the processing unit, that the terminal is legal according to the first encryption information, the processing unit is configured to receive, by using a communication unit, the decrypted first encrypted information fed back by the terminal, and pass the decrypted information
- the communication unit sends to the server, and after receiving the feedback from the communication unit to confirm that the decrypted information is successfully verified, it is determined that the terminal is legal.
- Figure 17 is a block diagram showing still another embodiment of the drone of the present invention, the drone comprising: a memory 171, a transceiver 173 and one or more processors 172; and one or more software modules,
- the one or more software modules are stored in the memory 171 and configured to be executed by the one or more processors, the one or more software modules including for performing the above-described drone pickup And/or instructions for the various steps performed by the drone in the delivery embodiment.
- FIG. 15 and the embodiment shown in FIG. 17 may be the same, and are described herein only from different technical perspectives.
- Embodiments of the present invention also provide a computer program product for use with a drone, the computer program product comprising a computer readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising The instructions of the various steps performed by the drone in the above-described drone pick-up and/or delivery implementation are performed.
- FIG. 18 is a schematic structural diagram of an embodiment of a terminal of the present invention, the terminal comprising: a display 181, a memory 182, a transceiver 183, one or more processors 184; and one or more software modules, the one or more A software module is stored in the memory and configured to be executed by the one or more processors, the one or more software modules including an implementation for performing the above-described drone pickup and/or shipping The instructions for each step performed by the terminal.
- one or more software modules may be client application software.
- FIG. 19 is a block diagram showing an embodiment of a server according to the present invention, the server comprising: the server comprising: a memory 191, a transceiver 192, one or more processors 193; and one or more modules, the one or more Modules are stored in the memory 191 and are configured to be executed by the one or more processors 193, the one or more modules including implementations for performing the above-described drone pickup and/or shipping The instructions for each step performed by the server.
- Embodiments of the present invention also provide a computer program product for use in conjunction with an electronic device, the computer program product comprising a computer readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising The instructions of the various steps performed by the terminal in the above-described drone pick-up and/or delivery implementation.
- the computer program product can be a client application software.
- the embodiment of the invention further provides a computer program product for use in combination with a server, the computer program product comprising a computer readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising Instructions for the various steps performed by the server in the drone pick-up and/or shipping implementation.
- the UAV after the UAV and the terminal both authenticate each other, the UAV continues to perform the transportation task, or the user can determine whether to deliver the goods through the information verified by both parties presented on the terminal.
- Picking up the goods improves the safety of drone transportation.
- the invention largely avoids the error extraction when the drone is picked up, the fraud by other drones, the wrong location of picking up, etc., and also avoids the problem of fraud or location error when the drone is delivered, etc.
- the safety of goods/delivery has been greatly improved, which will greatly help the establishment of the automated logistics system for the future.
- embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
- computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
- the present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (system), and computer program products according to embodiments of the invention. It should be understood that the flow chart can be implemented by computer program instructions And/or a combination of the processes and/or blocks in the block diagrams, and the flowcharts and/or blocks in the flowcharts. These computer program instructions can be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing device to produce a machine for the execution of instructions for execution by a processor of a computer or other programmable data processing device. Means for implementing the functions specified in one or more of the flow or in a block or blocks of the flow chart.
- the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
- the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
- These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
- the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Economics (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Development Economics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Quality & Reliability (AREA)
- Human Resources & Organizations (AREA)
- Tourism & Hospitality (AREA)
- Entrepreneurship & Innovation (AREA)
- Operations Research (AREA)
- Accounting & Taxation (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Finance (AREA)
- Aviation & Aerospace Engineering (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Automation & Control Theory (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Forklifts And Lifting Vehicles (AREA)
Abstract
Description
本发明涉及物流运输领域,特别涉及提升无人机运输安全的方法、无人机、终端和计算机程序产品。The invention relates to the field of logistics and transportation, in particular to a method for improving the safety of drone transportation, a drone, a terminal and a computer program product.
随着物流业的发展和自动化的发展,采用无人机送货的方式已经初露端倪。然而,实验性质和大规模商用还有较远的距离,比如细化到取货送货的安全性方面,当前的方案还考虑的比较少,无法应对送货时冒领等事件。With the development of the logistics industry and the development of automation, the use of drone delivery has begun to emerge. However, there are still far distances between the experimental nature and large-scale commercial use, such as the refinement to the security of pick-up and delivery. The current plan also considers less, and cannot cope with incidents such as shipping.
发明内容Summary of the invention
本发明实施例提出了提升无人机运输安全的方法、无人机、终端、服务器和计算机程序产品,有助于提高无人机在进行货物运输时的安全性。The embodiment of the invention provides a method for improving the transportation safety of the drone, a drone, a terminal, a server and a computer program product, which helps to improve the safety of the drone when carrying out cargo transportation.
本发明实施例提供的第一种提升无人机运输安全的方法,包括:The first method for improving the transportation safety of the drone provided by the embodiment of the invention includes:
无人机获取运输订单信息和用于安全认证的第一加密信息,所述运输订单信息中包括运输地点信息;The drone acquires transportation order information and first encrypted information for safety certification, and the transportation order information includes transportation location information;
无人机根据所述运输地点信息到达运输地点后,将所述第一加密信息发送给所述运输订单信息对应用户账户登录的终端,并接收所述终端发来的反馈信息,根据所述反馈信息确定安全认证是否成功,在确定成功后,控制所述运输订单信息对应的货仓开启;或,After the drone arrives at the transportation location according to the transportation location information, the first encrypted information is sent to the terminal where the transportation order information corresponds to the user account, and the feedback information sent by the terminal is received, according to the feedback. The information determines whether the security authentication is successful, and after determining the success, controlling the warehouse corresponding to the transportation order information to be opened; or
无人机根据所述运输地点信息到达运输地点后,接收所述运输订单信息对应用户账户登录的终端发来的第二加密信息,无人机对所述第一加密信息和第二加密信息分别解密并进行对比,根据对比结果确定安全认证是否成功,在确定成功后,控制所述运输订单信息对应的货仓开启;或, After the drone arrives at the transportation location according to the transportation location information, the second encryption information sent by the terminal corresponding to the user account registration is received by the transportation order information, and the drone separates the first encrypted information and the second encrypted information respectively. Decrypting and comparing, determining whether the security authentication is successful according to the comparison result, and after determining the success, controlling the warehouse corresponding to the transportation order information to be opened; or
所述无人机进一步接收用于安全认证的第三加密信息,无人机根据所述运输地点信息到达运输地点后,将所述第一加密信息发送给所述运输订单信息对应用户账户登录的终端,并接收所述终端发来的针对所述第一加密信息的反馈信息,以及,接收所述终端发来的第二加密信息,无人机对所述第三加密信息和第二加密信息分别解密并进行对比,根据对比结果和所述反馈信息确定安全认证是否成功,在确定成功后,控制所述运输订单信息对应的货仓开启。The drone further receives third encrypted information for security authentication, and after the drone arrives at the transportation location according to the transportation location information, the first encrypted information is sent to the corresponding user account of the transportation order information. Receiving, by the terminal, feedback information sent by the terminal for the first encrypted information, and receiving second encrypted information sent by the terminal, the third encrypted information and the second encrypted information by the drone Decrypting and comparing respectively, determining whether the security authentication is successful according to the comparison result and the feedback information, and after determining the success, controlling the warehouse corresponding to the transportation order information to be opened.
本发明实施例提供的第二种提升无人机运输安全的方法包括:The second method for improving the transportation safety of the drone provided by the embodiment of the present invention includes:
终端根据用户的账户信息从服务器获取运输订单信息和用于安全认证的第四加密信息;The terminal acquires the shipping order information and the fourth encrypted information for the secure authentication from the server according to the account information of the user;
所述终端在与所述运输订单信息对应的无人机进行通讯时,将所述第四加密信息发送给所述无人机,并接收所述无人机发来的反馈信息,根据所述反馈信息确定安全认证是否成功,并显示安全认证是否成功的信息;或,When the terminal communicates with the drone corresponding to the transportation order information, the terminal sends the fourth encrypted information to the drone, and receives feedback information sent by the drone, according to the The feedback information determines whether the security authentication is successful and displays information indicating whether the security authentication is successful; or
所述终端在与所述运输订单信息对应的无人机进行通讯时,接收所述无人机发来的第五加密信息,所述终端对所述第四加密信息和第五加密信息分别解密并进行对比,根据对比结果确定安全认证是否成功,并显示安全认证是否成功的信息;或,Receiving, by the terminal, the fifth encrypted information sent by the drone when the terminal communicates with the drone corresponding to the transportation order information, and the terminal decrypts the fourth encrypted information and the fifth encrypted information respectively And comparing, determining whether the safety certification is successful according to the comparison result, and displaying information on whether the safety certification is successful; or
所述终端进一步从服务器获取用于安全认证的第六加密信息,所述终端在与所述运输订单信息对应的无人机进行通讯时,将所述第四加密信息发送给所述无人机,并接收所述无人机发来的反馈信息,以及,接收所述无人机发来的第五加密信息,所述终端对所述第五加密信息和第六加密信息分别解密并进行对比,根据对比结果和所述反馈信息确定安全认证是否成功,并显示安全认证是否成功的信息。The terminal further acquires sixth encrypted information for security authentication from the server, and the terminal sends the fourth encrypted information to the drone when communicating with the drone corresponding to the transportation order information. And receiving the feedback information sent by the drone, and receiving the fifth encrypted information sent by the drone, the terminal decrypting and comparing the fifth encrypted information and the sixth encrypted information respectively And determining, according to the comparison result and the feedback information, whether the security authentication is successful, and displaying information that the security authentication is successful.
本发明实施例提供的第三种提升无人机运输安全的方法包括:The third method for improving the transportation safety of the drone provided by the embodiment of the present invention includes:
为无人机生成运输订单信息,所述运输订单信息中包括运输地点信息;Generating shipping order information for the drone, wherein the shipping order information includes transportation location information;
生成用于安全认证的第一加密信息,或生成用于安全加密的第二加密信 息和第三加密信息;Generating first encrypted information for secure authentication or generating a second encrypted letter for secure encryption Information and third encrypted information;
将所述生成的运输订单发送给所述无人机,并将所述生成的加密信息发送给所述无人机,或发送给所述运输订单对应的用户账户登录的终端。Sending the generated shipping order to the drone, and transmitting the generated encrypted information to the drone, or to a terminal that is logged in by a user account corresponding to the shipping order.
本发明实施例提供的第一种无人机,包括通信单元、处理单元和存储单元,其中通信单元和存储单元均通过总线与处理单元通讯;The first type of drone provided by the embodiment of the present invention includes a communication unit, a processing unit and a storage unit, wherein the communication unit and the storage unit communicate with the processing unit through a bus;
所述通信单元用于处理单元通过其接收来自外部设备的信息,或向外部设备发送信息;The communication unit is configured to receive information from an external device through the processing unit, or send the information to the external device;
所述存储单元用于根据处理单元的指令存储信息;The storage unit is configured to store information according to an instruction of the processing unit;
所述处理单元用于通过所述通信单元接收运输订单信息和用于安全认证的第一加密信息,所述运输订单信息中包括运输地点信息,并存储至存储单元;以及,The processing unit is configured to receive, by the communication unit, transportation order information and first encrypted information for secure authentication, where the transportation order information includes transportation location information, and is stored to the storage unit;
在确认所述无人机到达运输地点后,读取存储单元中的第一加密信息,通过通信单元发送给所述运输订单信息对应用户账户登录的终端,并通过所述通信单元接收所述终端发来的反馈信息,根据所述反馈信息确定安全认证是否成功,在确定成功后,发出控制所述运输订单信息对应的货仓开启的指令;After confirming that the drone arrives at the transportation location, the first encrypted information in the storage unit is read, sent to the terminal in which the transportation order information corresponds to the user account by the communication unit, and the terminal is received through the communication unit. Sending feedback information, determining whether the security authentication is successful according to the feedback information, and after determining the success, issuing an instruction to control the opening of the warehouse corresponding to the transportation order information;
或者,在确认所述无人机到达运输地点后,通过通信单元接收所述运输订单信息对应用户账户登录的终端发来的第二加密信息,读取所述存储的第一加密信息,并将所述第一加密信息和第二加密信息分别解密和进行对比,根据对比结果确定安全认证是否成功,在确定成功后,发出控制所述运输订单信息对应的货仓开启的指令;或,Alternatively, after confirming that the drone arrives at the transportation place, receiving, by the communication unit, the second encrypted information sent by the terminal corresponding to the user account registration of the transportation order information, and reading the stored first encrypted information, and Decrypting and comparing the first encrypted information and the second encrypted information respectively, determining whether the security authentication is successful according to the comparison result, and after the determining is successful, issuing an instruction to control the opening of the warehouse corresponding to the transportation order information; or
或者,所述通信单元进一步用于通过通信单元接收用于安全认证的第三加密信息,在确认所述无人机到达运输地点后,从存储单元中读取所述第一加密信息,通过通信单元将所述第一加密信息发送给所述运输订单信息对应用户账户登录的终端,并通过通信单元接收所述终端发来的针对所述第一加密信息的反馈信息,以及,通过通信单元接收所述终端发来的第二加密信息, 将所述第三加密信息和第二加密信息分别解密并进行对比,根据对比结果和所述反馈信息确定安全认证是否成功,在确定成功后,发出控制所述运输订单信息对应的货仓开启的指令。Alternatively, the communication unit is further configured to receive, by the communication unit, third encrypted information for secure authentication, after confirming that the drone arrives at the transportation location, reading the first encrypted information from the storage unit, by using the communication The unit sends the first encrypted information to the terminal that the transport order information corresponds to the user account, and receives the feedback information sent by the terminal for the first encrypted information through the communication unit, and receives the information through the communication unit. The second encrypted information sent by the terminal, Decrypting and comparing the third encrypted information and the second encrypted information respectively, determining whether the security authentication is successful according to the comparison result and the feedback information, and after determining the success, issuing a warehouse corresponding to controlling the transportation order information to be opened instruction.
本发明实施例提供的第一种终端,包括通信单元、处理单元、存储单元和显示单元,其中通信单元、存储单元和显示单元均通过总线与处理单元通讯;The first terminal provided by the embodiment of the present invention includes a communication unit, a processing unit, a storage unit, and a display unit, wherein the communication unit, the storage unit, and the display unit communicate with the processing unit through a bus;
所述通信单元用于处理单元通过其接收来自外部设备的信息,或向外部设备发送信息;The communication unit is configured to receive information from an external device through the processing unit, or send the information to the external device;
所述存储单元用于根据处理单元的指令存储信息;The storage unit is configured to store information according to an instruction of the processing unit;
所述显示单元用于根据处理单元的指令显示信息;The display unit is configured to display information according to an instruction of the processing unit;
所述处理单元用于通过通信单元从服务器获取运输订单信息和用于安全认证的第四加密信息,并存储至存储单元;以及,The processing unit is configured to acquire, by the communication unit, the shipping order information and the fourth encrypted information for secure authentication from the server, and store the same to the storage unit;
在通过通信单元与所述运输订单信息对应的无人机进行通讯时,读取存储单元中的所述第四加密信息,通过通信单元将所述第四加密信息发送给所述无人机,并通过通信单元接收所述无人机发来的反馈信息,根据所述反馈信息确定安全认证是否成功,指示显示单元显示安全认证是否成功的信息;或,And when the communication unit communicates with the drone corresponding to the transportation order information, the fourth encrypted information in the storage unit is read, and the fourth encrypted information is sent to the drone through the communication unit. Receiving, by the communication unit, feedback information sent by the drone, determining whether the security authentication is successful according to the feedback information, and instructing the display unit to display information indicating whether the security authentication is successful; or
在通过通信单元与所述运输订单信息对应的无人机进行通讯时,通过通信单元接收所述无人机发来的第五加密信息,读取存储单元中存储的第四加密信息,将所述第四加密信息和第五加密信息分别解密并进行对比,根据对比结果确定安全认证是否成功,并指示显示单元显示安全认证是否成功的信息;或,Receiving, by the communication unit, the fifth encrypted information sent by the drone by the communication unit, and reading the fourth encrypted information stored in the storage unit, Decoding and comparing the fourth encrypted information and the fifth encrypted information respectively, determining whether the security authentication is successful according to the comparison result, and instructing the display unit to display information indicating whether the security authentication is successful; or
所述处理单元进一步用于通过通信单元从服务器获取用于安全认证的第六加密信息,以及在通过通信单元与所述运输订单信息对应的无人机进行通讯时,读取存储单元中存储的第四加密信息,通过通信单元将所述第四加密信息发送给所述无人机,并通过通信单元接收所述无人机发来的反馈信息, 以及,通过通信单元接收所述无人机发来的第五加密信息,对所述第五加密信息和第六加密信息分别解密并进行对比,根据对比结果和所述反馈信息确定安全认证是否成功,并指示显示单元显示安全认证是否成功的信息。The processing unit is further configured to acquire, by the communication unit, sixth encrypted information for secure authentication from the server, and read the storage in the storage unit when communicating with the drone corresponding to the transportation order information through the communication unit The fourth encrypted information is sent to the drone by the communication unit, and the feedback information sent by the drone is received by the communication unit. And receiving, by the communication unit, the fifth encrypted information sent by the drone, respectively decrypting and comparing the fifth encrypted information and the sixth encrypted information, and determining whether the security authentication is successful according to the comparison result and the feedback information. And instruct the display unit to display information on whether the security authentication was successful.
本发明实施例提供的第一种服务器,包括:通信单元、处理单元和存储单元,其中通信单元和存储单元均通过总线与处理单元通讯;The first server provided by the embodiment of the present invention includes: a communication unit, a processing unit, and a storage unit, wherein the communication unit and the storage unit communicate with the processing unit through a bus;
所述通信单元用于处理单元通过其接收来自外部设备的信息,或向外部设备发送信息;The communication unit is configured to receive information from an external device through the processing unit, or send the information to the external device;
所述存储单元用于根据处理单元的指令存储信息;The storage unit is configured to store information according to an instruction of the processing unit;
所述处理单元用于为无人机生成包括运输地点信息的运输订单,并生成用于安全认证的第一加密信息,或生成用于安全认证的第二和第三加密信息,并通过通信单元将所述生成的运输订单发送给所述无人机,以及通过通信单元将所述生成的加密信息发送给无人机或所述运输订单对应的用户账户登录的终端。The processing unit is configured to generate a transportation order including transportation location information for the drone, and generate first encrypted information for secure authentication, or generate second and third encrypted information for secure authentication, and pass the communication unit Sending the generated shipping order to the drone, and transmitting the generated encrypted information to a terminal registered by a drone or a user account corresponding to the shipping order through a communication unit.
本发明实施例提供的第二种无人机,包括存储器、一个或多个处理器;以及一个或多个模块,所述一个或多个模块被存储在所述存储器中,并被配置成由所述一个或多个处理器执行,所述一个或多个模块包括用于执行上述第一种提升无人机运输安全方法中各个步骤的指令。A second type of drone provided by an embodiment of the present invention includes a memory, one or more processors, and one or more modules, wherein the one or more modules are stored in the memory and configured to be configured by Executing by the one or more processors, the one or more modules include instructions for performing the various steps in the first method of lifting a drone transport security described above.
本发明实施例提供的第二种终端,包括显示器,存储器,收发器,一个或多个处理器;以及一个或多个模块,所述一个或多个模块被存储在所述存储器中,并被配置成由所述一个或多个处理器执行,所述一个或多个模块包括用于执行上述第二种提升无人机运输安全方法中各个步骤的指令。A second terminal provided by the embodiment of the present invention includes a display, a memory, a transceiver, one or more processors, and one or more modules, wherein the one or more modules are stored in the memory and are Configured to be executed by the one or more processors, the one or more modules including instructions for performing the various steps in the second enhanced drone transport security method described above.
本发明实施例提供的第二种服务器,包括:存储器,收发器,一个或多个处理器;以及一个或多个模块,所述一个或多个模块被存储在所述存储器中,并被配置成由所述一个或多个处理器执行,所述一个或多个模块包括用于执行杉树第三种提升无人机运输安全方法中各个步骤的指令。A second server provided by the embodiment of the present invention includes: a memory, a transceiver, one or more processors; and one or more modules, wherein the one or more modules are stored in the memory and configured The execution is performed by the one or more processors, the one or more modules including instructions for performing the steps of the third method of lifting the drone transport security of the fir tree.
本发明实施例还提供了一种与无人机结合使用的计算机程序产品,包括 计算机可读的存储介质和内嵌于其中的计算机程序机制,所述计算机程序机制包括用于执行上述第一种提升无人机运输安全方法中各个步骤的指令。Embodiments of the present invention also provide a computer program product for use with a drone, including A computer readable storage medium and computer program mechanism embodied therein, the computer program mechanism comprising instructions for performing the various steps of the first method of upgrading a drone transport security described above.
本发明实施例还提供了一种与电子设备结合使用的计算机程序产品,所述计算机程序产品包括计算机可读的存储介质和内嵌于其中的计算机程序机制,所述计算机程序机制包括用于执行上述第二种提升无人机运输安全方法中各个步骤的指令。Embodiments of the present invention also provide a computer program product for use in conjunction with an electronic device, the computer program product comprising a computer readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising The above second instruction for improving each step in the drone transport security method.
本发明实施例还提供了一种与服务器结合使用的计算机程序产品,所述计算机程序产品包括计算机可读的存储介质和内嵌于其中的计算机程序机制,所述计算机程序机制包括用于执行上述第三种提升无人机运输安全方法中各个步骤的指令。The embodiment of the invention further provides a computer program product for use in combination with a server, the computer program product comprising a computer readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising A third instruction to improve the various steps in the drone transport safety method.
通过上述第一种提升无人机运输安全方法、各种无人机,和与无人机结合的计算机程序产品的方案中,无人机获取加密信息,并根据加密信息与终端交互进行安全认证,只有在安全认证通过后才开启货仓完成运输任务,由于采用加密信息进行安全认证,降低了安全认证信息被截获的风险,也降低了终端被冒充,或者错取、错送的可能性,提高了无人机运输的安全性。Through the above-mentioned first scheme for improving the safety of the drone transportation, various drones, and computer program products combined with the drone, the drone acquires the encrypted information, and performs security authentication by interacting with the terminal according to the encrypted information. Only after the safety certification is passed, the warehouse is opened to complete the transportation task. Because the encrypted information is used for security authentication, the risk of intercepting the security authentication information is reduced, and the possibility that the terminal is impersonated, or misplaced or misdirected is reduced. Improve the safety of drone transportation.
通过上述第二种提升无人机运输安全方法、各种终端,和与电子设备结合的计算机程序产品的方案中,终端根据用户账户信息获取加密信息,并根据加密信息与无人机交互进行安全认证,以及将认证结果信息通知给用户,由于采用加密信息进行安全认证,降低了安全认证信息被截获的风险,降低了无人机被冒充或者错收、错发货物的可能性,提高了无人机运输的安全性。Through the above second scheme for improving the drone transportation security method, various terminals, and computer program products combined with the electronic device, the terminal acquires the encrypted information according to the user account information, and performs security by interacting with the drone according to the encrypted information. The authentication and the notification of the result of the authentication are notified to the user. The use of the encrypted information for security authentication reduces the risk of the interception of the security authentication information, reduces the possibility of the drone being impersonated or misreported, and the wrong delivery of the goods. The safety of drone transportation.
通过上述第三种提升无人机运输安全方法、各种服务器,和与服务器结合的计算机程序产品的方案中,服务器生成加密信息并下发给用户账户登录终端和/或无人机,使得后续可以通过加密信息进行运输安全认证,从而降低了安全认证信息被截获的风险,降低了无人机被冒充或者错收、错发货物的可能性,提高了无人机运输的安全性。Through the above-mentioned third scheme for improving the drone transportation security method, various servers, and computer program products combined with the server, the server generates the encrypted information and sends it to the user account login terminal and/or the drone, so that the subsequent Transport security certification can be carried out by encrypting information, thereby reducing the risk of interception of safety certification information, reducing the possibility of drones being impersonated or misreceived, and sending goods wrongly, improving the safety of drone transportation.
下面将参照附图描述本发明的具体实施例,其中:Specific embodiments of the present invention will be described below with reference to the accompanying drawings, in which:
图1示出了本发明实施例提供的第一种提升无人机运输安全的方法的流程示意图;1 is a schematic flow chart showing a first method for improving the transportation safety of a drone according to an embodiment of the present invention;
图2示出了本发明实施例提供的第二种提升无人机运输安全的方法的流程示意图;2 is a schematic flow chart of a second method for improving the transportation safety of a drone according to an embodiment of the present invention;
图3示出了本发明实施例提供的第二种提升无人机运输安全的方法的流程示意图;FIG. 3 is a schematic flow chart showing a second method for improving the transportation safety of a drone according to an embodiment of the present invention;
图4示除了本发明实施例提供的第一种无人机的结构示意图;4 is a schematic structural view of a first type of drone provided in addition to an embodiment of the present invention;
图5示出了本发明实施例提供的第一种终端的结构示意图;FIG. 5 is a schematic structural diagram of a first terminal according to an embodiment of the present invention;
图6示出了本发明实施例提供的第一种服务器的结构示意图;FIG. 6 is a schematic structural diagram of a first server according to an embodiment of the present invention;
图7示出了本发明实施例提供的第二种无人机的结构示意图;FIG. 7 is a schematic structural diagram of a second type of drone provided by an embodiment of the present invention;
图8示出了本发明实施例提供的第二种终端的结构示意图;FIG. 8 is a schematic structural diagram of a second terminal according to an embodiment of the present invention;
图9示出了本发明实施例提供的第二种服务器的结构示意图;FIG. 9 is a schematic structural diagram of a second server according to an embodiment of the present invention;
图10示出了本发明一种较佳的无人机取货实施方式的流程示意图;FIG. 10 is a schematic flow chart showing a preferred embodiment of the unmanned aerial vehicle pickup according to the present invention; FIG.
图11示出了本发明另一种较佳的无人机取货实施方式的流程示意图;Figure 11 is a flow chart showing another preferred embodiment of the unmanned aerial vehicle pickup according to the present invention;
图12示出了本发明一种无人机送货方法的具体实施方式的流程示意图;12 is a schematic flow chart showing a specific implementation manner of a drone delivery method according to the present invention;
图13示出了无人机送货方法的另一种具体实施方式的流程示意图;Figure 13 is a flow chart showing another embodiment of the drone delivery method;
图14示出了无人机送货方法的再一种具体实施方式的流程示意图;Figure 14 is a flow chart showing still another embodiment of the drone delivery method;
图15示出了本发明无人机的一个示例性实施方式的结构示意图;Figure 15 is a block diagram showing the structure of an exemplary embodiment of the drone of the present invention;
图16示出了图15所示的无人机的示例性实施方式的一种具体实现方案的结构示意图;Figure 16 is a block diagram showing a specific implementation of an exemplary embodiment of the drone shown in Figure 15;
图17示出了本发明无人机的再一种实施方式的结构示意图;Figure 17 is a schematic view showing the structure of still another embodiment of the drone of the present invention;
图18示出了本发明一种终端实施方式的结构示意图;FIG. 18 is a schematic structural diagram of a terminal implementation manner of the present invention; FIG.
图19示出了本发明一种服务器实施方式的结构示意图。Figure 19 is a block diagram showing the structure of a server embodiment of the present invention.
为了使本发明的技术方案及优点更加清楚明白,以下结合附图对本发明 的示例性实施例进行进一步详细的说明,显然,所描述的实施例仅是本发明的一部分实施例,而不是所有实施例的穷举。并且在不冲突的情况下,本说明中的实施例及实施例中的特征可以互相结合。In order to make the technical solutions and advantages of the present invention more clear, the present invention will be described below with reference to the accompanying drawings. The exemplary embodiments are described in further detail, and it is obvious that the described embodiments are only a part of the embodiments of the invention, and not all of the embodiments. And in the case of no conflict, the features in the embodiments and the embodiments in the description can be combined with each other.
本发明实施例中,在取货时,通过用户在线物流订单生成时刻的时间戳和无人机被指派取货时刻的时间戳两个信息进行双向验证,或基于其中至少一个时间戳进行单向验证,无人机要验证的是用户是否为物流订单的真实申请方,用户要验证的是无人机是否为约定取货的正确无人机,以防止误取件或者恶意冒充无人机骗取用户物品。In the embodiment of the present invention, when picking up the goods, the two-way verification is performed by the time stamp of the time when the user generates the online logistics order and the time stamp of the time when the drone is assigned the pick-up time, or one-way verification based on at least one time stamp. Verify that the drone is to verify whether the user is the actual applicant for the logistics order. The user wants to verify whether the drone is the correct drone that is agreed to pick up the goods to prevent misuse or malicious impersonation. User item.
在送货时,一种实施方式中,无人机采用语音问答的方式,以用户的答案和物流订单信息进行比对验证,以确定确实为收件人,同时拍照或录像。In the delivery mode, in one embodiment, the drone adopts a voice question and answer method, and compares the user's answer with the logistics order information to determine whether it is the recipient, and simultaneously takes a photo or video.
另一种实施方式中,与取货类似,也可以通过在线物流订单生成时刻的时间戳和无人机被指派取货时刻的时间戳两个信息进行双向验证,或基于其中至少一个时间戳进行单向验证,无人机要验证的是用户是否为正确的收货人,收货人要验证的是此无人机是否为约定送货的无人机,以防止他人冒充用户骗收物品,或无人机错送,用户错收他人物品。In another embodiment, similar to the picking up, the two-way verification may be performed by using the time stamp of the online logistics order generation time and the time stamp of the drone being assigned the picking time, or based on at least one time stamp. One-way verification, the drone wants to verify whether the user is the correct consignee, and the consignee wants to verify whether the drone is a drone that is agreed to deliver, in order to prevent others from pretending to swindle the user. Or the drone is misrouted, and the user misplaces other people's items.
本发明中的无人机可以是无人飞行器,也可以是无人驾驶汽车或其他无人驾驶的运输工具,后续各较佳实施方式中,均是以无人飞行器执行运输任务的场景所描述的,在应用于其他无人驾驶等场景中时,除具体的运输方式不同外,其余涉及订单交互和认证的流程均相同。The unmanned aerial vehicle of the present invention may be an unmanned aerial vehicle, or may be an unmanned vehicle or other unmanned transportation vehicle. In the subsequent preferred embodiments, the description is based on the scenario in which the unmanned aerial vehicle performs the transportation task. When applied to other unmanned scenes, the procedures for order interaction and authentication are the same except for the specific transportation methods.
较佳地,如图1所示,本发明实施例提供的第一种提升无人机运输安全的方法,包括:Preferably, as shown in FIG. 1 , the first method for improving the transportation safety of the drone provided by the embodiment of the present invention includes:
步骤101、无人机获取运输订单信息和用于安全认证的第一加密信息,所述运输订单信息中包括运输地点信息;Step 101: The drone acquires the transportation order information and the first encrypted information for the security authentication, where the transportation order information includes the transportation location information;
步骤102、无人机根据所述运输地点信息到达运输地点后,将所述第一加密信息发送给所述运输订单信息对应用户账户登录的终端,并接收所述终端发来的反馈信息,根据所述反馈信息确定安全认证是否成功,在确定成功后, 控制所述运输订单信息对应的货仓开启;或,Step 102: After the drone arrives at the transportation location according to the transportation location information, the first encryption information is sent to the terminal where the transportation order information corresponds to the user account, and the feedback information sent by the terminal is received, according to The feedback information determines whether the security authentication is successful, after the success is determined, Controlling the warehouse corresponding to the transportation order information to be turned on; or,
无人机根据所述运输地点信息到达运输地点后,接收所述运输订单信息对应用户账户登录的终端发来的第二加密信息,无人机对所述第一加密信息和第二加密信息分别解密并进行对比,根据对比结果确定安全认证是否成功,在确定成功后,控制所述运输订单信息对应的货仓开启;或,After the drone arrives at the transportation location according to the transportation location information, the second encryption information sent by the terminal corresponding to the user account registration is received by the transportation order information, and the drone separates the first encrypted information and the second encrypted information respectively. Decrypting and comparing, determining whether the security authentication is successful according to the comparison result, and after determining the success, controlling the warehouse corresponding to the transportation order information to be opened; or
所述无人机进一步接收用于安全认证的第三加密信息,无人机根据所述运输地点信息到达运输地点后,将所述第一加密信息发送给所述运输订单信息对应用户账户登录的终端,并接收所述终端发来的针对所述第一加密信息的反馈信息,以及,接收所述终端发来的第二加密信息,无人机对所述第三加密信息和第二加密信息分别解密并进行对比,根据对比结果和所述反馈信息确定安全认证是否成功,在确定成功后,控制所述运输订单信息对应的货仓开启。The drone further receives third encrypted information for security authentication, and after the drone arrives at the transportation location according to the transportation location information, the first encrypted information is sent to the corresponding user account of the transportation order information. Receiving, by the terminal, feedback information sent by the terminal for the first encrypted information, and receiving second encrypted information sent by the terminal, the third encrypted information and the second encrypted information by the drone Decrypting and comparing respectively, determining whether the security authentication is successful according to the comparison result and the feedback information, and after determining the success, controlling the warehouse corresponding to the transportation order information to be opened.
较佳地,上述针对所述第一加密信息的反馈信息包括:对所述第一加密信息验证是否通过的信息;Preferably, the foregoing feedback information for the first encrypted information includes: information for verifying whether the first encrypted information is passed;
或者,针对所述第一加密信息的反馈信息包括:所述第一加密信息解密后的信息;则接收所述反馈信息后进一步包括:将所述第一加密信息解密后的信息发送给服务器,并接收服务器反馈的针对所述加密后的信息验证是否通过的信息;则所述根据反馈信息确定安全认证是否成功包括:根据所述服务器反馈的验证是否通过的信息确定安全认证是否成功。Or the feedback information of the first encrypted information includes: the information after the first encrypted information is decrypted; and after receiving the feedback information, the method further includes: sending the decrypted information of the first encrypted information to a server, And determining, by the server, information for verifying whether the encrypted information is passed; determining whether the security authentication succeeds according to the feedback information comprises: determining whether the security authentication is successful according to the information that is verified by the verification of the server.
较佳地,所述发送给终端的第一加密信息包括:用所述运输订单对应用户账户的公钥加密的信息;Preferably, the first encrypted information sent to the terminal includes: information encrypted by using a public key of the transport account corresponding to the user account;
所述第二加密信息包括:用所述无人机的公钥加密的信息;The second encrypted information includes: information encrypted by a public key of the drone;
所述无人机解密的第一加密信息或第三加密信息包括:用所述无人机的公钥加密的信息。The first encrypted information or the third encrypted information decrypted by the drone includes information encrypted by a public key of the drone.
所述运输订单为取货订单或送货订单;较佳地,The shipping order is a pick-up order or a delivery order; preferably,
各加密信息中被加密的信息均可以包括:所述运输订单生成时刻的时间 戳,或服务器确认所述运输订单对应的用户物流订单时刻的时间戳。The encrypted information in each encrypted information may include: the time when the transportation order is generated Stamp, or the server confirms the timestamp of the user logistics order time corresponding to the shipping order.
较佳地,如图2所示,本发明实施例提供的第二种提升无人机运输安全的方法包括:Preferably, as shown in FIG. 2, the second method for improving the transportation safety of the drone provided by the embodiment of the present invention includes:
步骤201、终端根据用户的账户信息从服务器获取运输订单信息和用于安全认证的第四加密信息;Step 201: The terminal acquires, according to the account information of the user, the transportation order information and the fourth encrypted information used for the security authentication.
步骤202、所述终端在与所述运输订单信息对应的无人机进行通讯时,将所述第四加密信息发送给所述无人机,并接收所述无人机发来的反馈信息,根据所述反馈信息确定安全认证是否成功,并显示安全认证是否成功的信息;或,Step 202: The terminal sends the fourth encrypted information to the drone when receiving communication with the drone corresponding to the transportation order information, and receives feedback information sent by the drone. Determining, according to the feedback information, whether the security authentication is successful, and displaying information that the security authentication is successful; or
所述终端在与所述运输订单信息对应的无人机进行通讯时,接收所述无人机发来的第五加密信息,所述终端对所述第四加密信息和第五加密信息分别解密并进行对比,根据对比结果确定安全认证是否成功,并显示安全认证是否成功的信息;或,Receiving, by the terminal, the fifth encrypted information sent by the drone when the terminal communicates with the drone corresponding to the transportation order information, and the terminal decrypts the fourth encrypted information and the fifth encrypted information respectively And comparing, determining whether the safety certification is successful according to the comparison result, and displaying information on whether the safety certification is successful; or
所述终端进一步从服务器获取用于安全认证的第六加密信息,所述终端在与所述运输订单信息对应的无人机进行通讯时,将所述第四加密信息发送给所述无人机,并接收所述无人机发来的反馈信息,以及,接收所述无人机发来的第五加密信息,所述终端对所述第五加密信息和第六加密信息分别解密并进行对比,根据对比结果和所述反馈信息确定安全认证是否成功,并显示安全认证是否成功的信息。The terminal further acquires sixth encrypted information for security authentication from the server, and the terminal sends the fourth encrypted information to the drone when communicating with the drone corresponding to the transportation order information. And receiving the feedback information sent by the drone, and receiving the fifth encrypted information sent by the drone, the terminal decrypting and comparing the fifth encrypted information and the sixth encrypted information respectively And determining, according to the comparison result and the feedback information, whether the security authentication is successful, and displaying information that the security authentication is successful.
所述针对所述第四加密信息的反馈信息包括:对所述第四加密信息验证是否通过的信息;The feedback information for the fourth encrypted information includes: information for verifying whether the fourth encrypted information is passed;
或者,针对所述第四加密信息的反馈信息包括:所述第四加密信息解密后的信息;则接收所述反馈信息后进一步包括:将所述第四加密信息解密后的信息发送给服务器,并接收服务器反馈的针对所述加密后的信息验证是否通过的信息;则所述根据反馈信息确定安全认证是否成功包括:根据所述服务器反馈的验证是否通过的信息确定安全认证是否成功。 Or the feedback information about the fourth encrypted information includes: the information after the fourth encrypted information is decrypted; and after receiving the feedback information, the method further includes: sending the information after decrypting the fourth encrypted information to a server, And determining, by the server, information for verifying whether the encrypted information is passed; determining whether the security authentication succeeds according to the feedback information comprises: determining whether the security authentication is successful according to the information that is verified by the verification of the server.
较佳地,所述发送给无人机的第四加密信息包括:用所述无人机的公钥加密的信息;Preferably, the fourth encrypted information sent to the drone includes: information encrypted by the public key of the drone;
所述第五加密信息包括:用所述用户账户的公钥加密的信息;The fifth encrypted information includes: information encrypted with a public key of the user account;
所述终端解密的第四加密信息和第六加密信息包括:用所述用户账户的公钥加密的信息。The fourth encrypted information and the sixth encrypted information decrypted by the terminal include: information encrypted with a public key of the user account.
所述运输订单可以为取货订单,或送货订单;较佳地,各加密信息中被加密的信息均可以包括:所述运输订单生成时刻的时间戳,或服务器确认所述运输订单对应的用户物流订单时刻的时间戳。The transportation order may be a pick-up order, or a delivery order; preferably, the encrypted information in each encrypted information may include: a time stamp of the transportation order generation time, or the server confirms that the transportation order corresponds to The timestamp of the user's logistics order time.
如图3所示,本发明实施例提供的第三种提升无人机运输安全的方法包括:As shown in FIG. 3, the third method for improving the transportation safety of the drone provided by the embodiment of the present invention includes:
步骤301、为无人机生成运输订单信息,所述运输订单信息中包括运输地点信息;Step 301: Generate transportation order information for the drone, where the transportation order information includes transportation location information;
步骤302、生成用于安全认证的第一加密信息,或生成用于安全加密的第二加密信息和第三加密信息;Step 302: Generate first encrypted information for secure authentication, or generate second encrypted information and third encrypted information for secure encryption;
步骤303、将所述生成的运输订单发送给所述无人机,并将所述生成的加密信息发送给所述无人机,或发送给所述运输订单对应的用户账户登录的终端。Step 303: Send the generated transport order to the drone, and send the generated encrypted information to the drone, or send the terminal to the user account corresponding to the transport order.
所述发送加密信息的步骤后,进一步可以包括:接收所述无人机或所述终端发送的解密信息,并对解密信息进行安全认证,然后向所述无人机或所述终端反馈安全认证结果。After the step of transmitting the encrypted information, the method further includes: receiving the decryption information sent by the drone or the terminal, performing security authentication on the decrypted information, and then feeding back the security authentication to the drone or the terminal. result.
所述发送给无人机的第一加密信息可以包括:用所述用户账户的公钥加密的信息;The first encrypted information sent to the drone may include: information encrypted with a public key of the user account;
所述发送给用户账户登录的终端的第一加密信息可以包括:用所述无人机的公钥加密的信息;The first encrypted information of the terminal that is sent to the user account to log in may include: information encrypted by the public key of the drone;
所述第二加密信息和第三加密信息可以分别包括用所述无人机的公钥加密的信息和用所述用户账户的公钥加密的信息。 The second encrypted information and the third encrypted information may respectively include information encrypted with a public key of the drone and information encrypted with a public key of the user account.
所述运输订单为取货订单,或送货订单;较佳地,各加密信息中被加密的信息包括:所述运输订单生成时刻的时间戳,或所述服务器确认所述运输订单对应的用户物流订单时刻的时间戳。The transportation order is a pickup order, or a delivery order; preferably, the encrypted information in each encrypted information includes: a time stamp of the transportation order generation time, or the server confirms the user corresponding to the transportation order The timestamp of the logistics order time.
如图4所示,本发明实施例提供的第一种无人机,包括处理单元41、通信单元42和存储单元43,其中通信单元42和存储单元43均通过总线与处理单元41通讯;As shown in FIG. 4, the first type of drone provided by the embodiment of the present invention includes a
所述通信单元42用于处理单元41通过其接收来自外部设备的信息,或向外部设备发送信息;The
所述存储单元43用于根据处理单元41的指令存储信息;The
所述处理单元41用于通过所述通信单元42接收运输订单信息和用于安全认证的第一加密信息,所述运输订单信息中包括运输地点信息,并存储至存储单元43;以及,The
在确认所述无人机到达运输地点后,读取存储单元43中的第一加密信息,通过通信单元42发送给所述运输订单信息对应用户账户登录的终端,并通过所述通信单元42接收所述终端发来的反馈信息,根据所述反馈信息确定安全认证是否成功,在确定成功后,发出控制所述运输订单信息对应的货仓开启的指令;After confirming that the drone arrives at the transportation location, the first encrypted information in the
或者,在确认所述无人机到达运输地点后,通过通信单元42接收所述运输订单信息对应用户账户登录的终端发来的第二加密信息,读取所述存储的第一加密信息,并将所述第一加密信息和第二加密信息分别解密和进行对比,根据对比结果确定安全认证是否成功,在确定成功后,发出控制所述运输订单信息对应的货仓开启的指令;或,Alternatively, after confirming that the drone arrives at the transportation location, the
或者,所述通信单元42进一步用于通过通信单元42接收用于安全认证的第三加密信息,在确认所述无人机到达运输地点后,从存储单元43中读取所述第一加密信息,通过通信单元42将所述第一加密信息发送给所述运输订单信息对应用户账户登录的终端,并通过通信单元42接收所述终端发来的针
对所述第一加密信息的反馈信息,以及,通过通信单元42接收所述终端发来的第二加密信息,将所述第三加密信息和第二加密信息分别解密并进行对比,根据对比结果和所述反馈信息确定安全认证是否成功,在确定成功后,发出控制所述运输订单信息对应的货仓开启的指令。Alternatively, the
较佳地,所述针对所述第一加密信息的反馈信息可以包括:对所述第一加密信息验证是否通过的信息;Preferably, the feedback information for the first encrypted information may include: information for verifying whether the first encrypted information is passed;
或者,针对所述第一加密信息的反馈信息也可以包括:所述第一加密信息解密后的信息;则所述处理单元41通过所述通信单元42进一步用于:通过通信单元42将所述第一加密信息解密后的信息发送给服务器,并通过通信单元42接收服务器反馈的针对所述加密后的信息验证是否通过的信息;则所述通信单元42用于根据反馈信息确定安全认证是否成功包括:所述通信单元42用于根据所述服务器反馈的验证是否通过的信息确定安全认证是否成功。Alternatively, the feedback information for the first encrypted information may also include: the information after the first encrypted information is decrypted; then the
较佳地,所述发送给终端的第一加密信息包括:用所述运输订单对应用户账户的公钥加密的信息;Preferably, the first encrypted information sent to the terminal includes: information encrypted by using a public key of the transport account corresponding to the user account;
所述第二加密信息包括:用所述无人机的公钥加密的信息;The second encrypted information includes: information encrypted by a public key of the drone;
所述处理单元41解密的第一加密信息或第三加密信息包括:用所述无人机的公钥加密的信息。The first encrypted information or the third encrypted information decrypted by the
所述运输订单可以为取货订单,也可以为送货订单;较佳地,各加密信息中被加密的信息包括:所述运输订单生成时刻的时间戳,或服务器确认所述运输订单对应的用户物流订单时刻的时间戳。The transportation order may be a pickup order or a delivery order; preferably, the encrypted information in each encrypted information includes: a time stamp of the transportation order generation time, or the server confirms that the transportation order corresponds to The timestamp of the user's logistics order time.
图5示出了本发明实施例提供的第一种终端,如图5所示,该终端包括通信单元52、处理单元51、存储单元53和显示单元54,其中通信单元52、存储单元53和显示单元54均通过总线与处理单元51通讯;FIG. 5 shows a first terminal provided by an embodiment of the present invention. As shown in FIG. 5, the terminal includes a
所述通信单元52用于处理单元51通过其接收来自外部设备的信息,或向外部设备发送信息;The
所述存储单元53用于根据处理单元51的指令存储信息;
The
所述显示单元54用于根据处理单元51的指令显示信息;The
所述处理单元51用于通过通信单元52从服务器获取运输订单信息和用于安全认证的第四加密信息,并存储至存储单元53;以及,The
在通过通信单元52与所述运输订单信息对应的无人机进行通讯时,读取存储单元53中的所述第四加密信息,通过通信单元52将所述第四加密信息发送给所述无人机,并通过通信单元52接收所述无人机发来的反馈信息,根据所述反馈信息确定安全认证是否成功,指示显示单元54显示安全认证是否成功的信息;或,When communicating with the drone corresponding to the transport order information by the
在通过通信单元52与所述运输订单信息对应的无人机进行通讯时,通过通信单元52接收所述无人机发来的第五加密信息,读取存储单元53中存储的第四加密信息,将所述第四加密信息和第五加密信息分别解密并进行对比,根据对比结果确定安全认证是否成功,并指示显示单元54显示安全认证是否成功的信息;或,When communicating with the drone corresponding to the transport order information by the
所述处理单元51进一步用于通过通信单元52从服务器获取用于安全认证的第六加密信息,以及在通过通信单元52与所述运输订单信息对应的无人机进行通讯时,读取存储单元53中存储的第四加密信息,通过通信单元52将所述第四加密信息发送给所述无人机,并通过通信单元52接收所述无人机发来的反馈信息,以及,通过通信单元52接收所述无人机发来的第五加密信息,对所述第五加密信息和第六加密信息分别解密并进行对比,根据对比结果和所述反馈信息确定安全认证是否成功,并指示显示单元54显示安全认证是否成功的信息。The
较佳地,所述针对所述第四加密信息的反馈信息包括:对所述第四加密信息验证是否通过的信息;Preferably, the feedback information for the fourth encrypted information includes: information for verifying whether the fourth encrypted information is passed;
或者,针对所述第四加密信息的反馈信息包括:所述第四加密信息解密后的信息;则所述通信单元52进一步用于:将所述第四加密信息解密后的信息通过所述通信单元52发送给服务器,并通过通信单元52接收服务器反馈
的针对所述加密后的信息验证是否通过的信息;则所述通信单元52用于根据反馈信息确定安全认证是否成功包括:所述通信单元52用于根据所述服务器反馈的验证是否通过的信息确定安全认证是否成功。Or the feedback information for the fourth encrypted information includes: the information after the fourth encrypted information is decrypted; and the
较佳地,所述发送给无人机的第四加密信息包括:用所述无人机的公钥加密的信息;Preferably, the fourth encrypted information sent to the drone includes: information encrypted by the public key of the drone;
所述第五加密信息包括:用所述用户账户的公钥加密的信息;The fifth encrypted information includes: information encrypted with a public key of the user account;
所述终端解密的第四加密信息或第六加密信息包括:用所述用户账户的公钥加密的信息。The fourth encrypted information or the sixth encrypted information decrypted by the terminal includes: information encrypted by a public key of the user account.
所述运输订单可以为取货订单,也可以为送货订单;较佳地,所述第四加密信息中被加密的信息包括:所述运输订单生成时刻的时间戳,或服务器确认所述运输订单对应的用户物流订单时刻的时间戳;The transportation order may be a pickup order or a delivery order; preferably, the encrypted information in the fourth encrypted information includes: a time stamp of the transportation order generation time, or the server confirms the transportation The timestamp of the user's logistics order time corresponding to the order;
所述第五加密信息中被加密的信息包括:所述运输订单生成时刻的时间戳,或服务器确认所述运输订单对应的用户物流订单时刻的时间戳;The information encrypted in the fifth encrypted information includes: a time stamp of the time when the transportation order is generated, or a time stamp of the time when the server confirms the user logistics order corresponding to the transportation order;
所述第六加密信息中被加密的信息包括:所述运输订单生成时刻的时间戳,或服务器确认所述运输订单对应的用户物流订单时刻的时间戳。The information encrypted in the sixth encrypted information includes: a time stamp of the time when the transportation order is generated, or a time stamp of the time when the server confirms the user logistics order corresponding to the transportation order.
图6示出了本发明实施例提供的第一种服务器,如图6所示,该服务器包括:处理单元61、通信单元62和存储单元63,其中通信单元62和存储单元63均通过总线与处理单元61通讯;FIG. 6 shows a first type of server provided by an embodiment of the present invention. As shown in FIG. 6, the server includes: a processing
所述通信单元62用于处理单元61通过其接收来自外部设备的信息,或向外部设备发送信息;The
所述存储单元63用于根据处理单元61的指令存储信息;The
所述处理单元61用于为无人机生成包括运输地点信息的运输订单,并生成用于安全认证的第一加密信息,或生成用于安全认证的第二和第三加密信息,并通过通信单元62将所述生成的运输订单发送给所述无人机,以及通过通信单元62将所述生成的加密信息发送给无人机或所述运输订单对应的用户账户登录的终端。
The
较佳地,所述服务器的处理单元61进一步用于通过通信单元62接收所述无人机或所述终端发送的解密信息,并对解密信息进行安全认证,然后通过所述通信单元62向所述无人机或所述终端反馈安全认证结果。Preferably, the
较佳地,所述发送给无人机的第一加密信息为:用所述用户账户的公钥加密的信息;Preferably, the first encrypted information sent to the drone is: information encrypted with a public key of the user account;
所述发送给用户账户登录的终端的第一加密信息包括:用所述无人机的公钥加密的信息;The first encrypted information of the terminal that is sent to the user account to log in includes: information encrypted by the public key of the drone;
所述第二加密信息和第三加密信息分别包括用所述无人机的公钥加密的信息和用所述用户账户的公钥加密的信息。The second encrypted information and the third encrypted information respectively include information encrypted with a public key of the drone and information encrypted with a public key of the user account.
所述运输订单为取货订单,或送货订单。The shipping order is a pickup order, or a delivery order.
较佳地,所述第一加密信息中被加密的信息包括:所述运输订单生成时刻的时间戳,或所述服务器确认所述运输订单对应的用户物流订单时刻的时间戳;Preferably, the encrypted information in the first encrypted information includes: a timestamp of the time when the transportation order is generated, or a timestamp of the time when the server confirms the user logistics order corresponding to the transportation order;
所述第二加密信息中被加密的信息包括:所述运输订单生成时刻的时间戳,或服务器确认所述运输订单对应的用户物流订单时刻的时间戳;The encrypted information in the second encrypted information includes: a time stamp of the time when the transportation order is generated, or a time stamp of the time when the server confirms the user logistics order corresponding to the transportation order;
所述第三加密信息中被加密的信息包括:所述运输订单生成时刻的时间戳,或服务器确认所述运输订单对应的用户物流订单时刻的时间戳。The information encrypted in the third encrypted information includes: a time stamp of the time when the transportation order is generated, or a time stamp of the time when the server confirms the user logistics order corresponding to the transportation order.
图7示出了本发明实施例提供的第二种无人机,如图7所示,该无人机包括存储器71、收发器72、一个或多个处理器73;以及一个或多个模块,所述一个或多个模块被存储在所述存储器71中,并被配置成由所述一个或多个处理器73执行,所述一个或多个模块包括用于执行上述第一种提升无人机运输安全方法中各个步骤的指令。FIG. 7 shows a second type of drone provided by an embodiment of the present invention. As shown in FIG. 7, the drone includes a memory 71, a
图8示出了本发明实施例提供的第二种终端,如图8所示,该终端包括显示器81,存储器82,收发器83,一个或多个处理器84;以及一个或多个模块,所述一个或多个模块被存储在所述存储器82中,并被配置成由所述一个或多个处理器84执行,所述一个或多个模块包括用于执行上述第二种提升
无人机运输安全方法中各个步骤的指令。FIG. 8 shows a second terminal according to an embodiment of the present invention. As shown in FIG. 8, the terminal includes a
图9示出了本发明实施例提供的第二种服务器,如图9所示,该服务器包括:存储器91,收发器92,一个或多个处理器93;以及一个或多个模块,所述一个或多个模块被存储在所述存储器91中,并被配置成由所述一个或多个处理器93执行,所述一个或多个模块包括用于执行上述第三种提升无人机运输安全方法中各个步骤的指令。FIG. 9 shows a second server according to an embodiment of the present invention. As shown in FIG. 9, the server includes: a memory 91, a
本发明实施例还提供了一种与无人机结合使用的计算机程序产品,包括计算机可读的存储介质和内嵌于其中的计算机程序机制,所述计算机程序机制包括用于执行上述第一种提升无人机运输安全方法中各个步骤的指令。The embodiment of the invention further provides a computer program product for use in combination with a drone, comprising a computer readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising: Instructions to enhance the various steps in the drone transport safety method.
本发明实施例还提供了一种与电子设备结合使用的计算机程序产品,所述计算机程序产品包括计算机可读的存储介质和内嵌于其中的计算机程序机制,所述计算机程序机制包括用于执行上述第二种提升无人机运输安全方法中各个步骤的指令。Embodiments of the present invention also provide a computer program product for use in conjunction with an electronic device, the computer program product comprising a computer readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising The above second instruction for improving each step in the drone transport security method.
本发明实施例还提供了一种与服务器结合使用的计算机程序产品,所述计算机程序产品包括计算机可读的存储介质和内嵌于其中的计算机程序机制,所述计算机程序机制包括用于执行上述第三种提升无人机运输安全方法中各个步骤的指令。The embodiment of the invention further provides a computer program product for use in combination with a server, the computer program product comprising a computer readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising A third instruction to improve the various steps in the drone transport safety method.
以下分别通过较佳实施方式对本发明实施例的技术方案进一步阐明。The technical solutions of the embodiments of the present invention are further clarified by the preferred embodiments.
图10示出了一个较佳的无人机取货实施方式,该实施方式中,由发货用户通过登录的终端与无人机进行相互认证,提高运输安全性。该实施方式具体包括如下步骤:FIG. 10 shows a preferred unmanned vehicle pick-up implementation. In this embodiment, the shipping user authenticates with the unmanned aircraft through the registered terminal and improves the transportation security. The implementation specifically includes the following steps:
步骤1001、终端根据用户通过在客户端应用(APP)进行的操作,获取物流订单的相关信息,包括发货人地址、收货人地址,货物信息,联系方式等传统物流信息,并生成物流订单呈现给用户,供用户确认提交至网络侧的服务器。Step 1001: The terminal acquires related information of the logistics order, including the original logistics information such as the shipper address, the consignee address, the cargo information, the contact information, and generates a logistics order according to the operation performed by the user in the client application (APP). Presented to the user for confirmation by the user to submit to the server on the network side.
在替代实现方式中,用户也可以通过物流系统提供的网页等其他常见方 式进行相关的物流操作。In an alternative implementation, the user can also provide other common parties such as web pages provided by the logistics system. Carry out related logistics operations.
当然,无论是用户通过网页方式操作,或者通过客户端方式操作,用户都需在提交前进行账户登录,终端与网络侧的服务器完成登录交互后,才能提交订单信息。Of course, whether the user operates through the webpage or through the client mode, the user needs to log in the account before submitting, and the terminal and the server on the network side can complete the login interaction before submitting the order information.
这里网络侧的服务器可以是物流系统的网络侧服务器,用于与用户登录的终端交互物流相关信息、订单信息、指派无人机等。其中,用于与终端交互的物流相关信息、订单信息的服务单元与指派无人机的服务单元可以集成于一个物理的服务器中,也可以分别是独立的物理服务器,也可以利用云计算等技术,通过分布式服务器实现,这些具体的实现方式均为计算机网络领域的通用技术,这里不再赘述。Here, the server on the network side may be a network side server of the logistics system, and is used for exchanging logistics related information, order information, assigning drones, and the like with the terminal that the user logs in. The service unit for interacting with the terminal, the service unit of the order information, and the service unit for assigning the drone may be integrated into one physical server, or may be independent physical servers, or may use technologies such as cloud computing. Through the distributed server implementation, these specific implementation methods are common technologies in the field of computer networks, and will not be described here.
当然,当本发明应用于除提供物流服务器还提供商品销售服务的网络侧系统时,与终端交互的服务单元也可以与提供商品销售服务的服务器单元集成在一起,指派无人机的服务单元单独设置,同样,这些服务单元也均可以通过云计算等技术,通过分布式服务器实现。Of course, when the present invention is applied to a network side system that provides a merchandise sales service in addition to providing a logistics server, the service unit interacting with the terminal can also be integrated with a server unit that provides a merchandise sales service, and the service unit of the drone is assigned separately. Settings, too, these service units can also be implemented through distributed servers through technologies such as cloud computing.
步骤1002、网络侧的服务器在接收到用户物流订单,并确认订单成功后,生成该确认订单成功时刻的时间戳T1。Step 1002: After receiving the user logistics order and confirming the successful order, the server on the network side generates a timestamp T1 of the successful time of confirming the order.
步骤1003、服务器根据用户物流订单,指派进行取货的无人机生成取货订单,并记录无人机被指派时刻的时间戳T2。Step 1003: The server, according to the user logistics order, assigns a drone that picks up the goods to generate a pickup order, and records a time stamp T2 of the time when the drone is assigned.
服务器在指派无人机时,会根据用户物流订单生成运输订单,在取货的各个实施例中,为清楚起见,将其称为取货订单,并在指派指令中将取货订单信息发送给无人机,该取货订单信息中至少包括运输地点信息,在取货的各个实施例中,将其称为发货人地址信息。另外,本实施例和本发明的其他实施例中,若无人机专用于取货或专用于送货,则服务器发送给无人机的取货订单信息或送货订单信息中无需包括运输类型信息(用于标识该运输任务时取货或送货的信息);若无人机即用于取货又用于送货,则服务器发送给无人机的取货订单信息或送货订单信息中还包括运输类型信息。 When the server assigns a drone, it generates a transport order based on the user's logistics order. In each embodiment of the pick-up, it is referred to as a pick-up order for clarity, and sends the pick-up order information to the dispatch command. The drone, the pick-up order information includes at least the transport location information, and in each embodiment of the pick-up, it is referred to as the shipper address information. In addition, in this embodiment and other embodiments of the present invention, if the drone is dedicated to picking up or dedicated to delivery, the pick-up order information or delivery order information sent by the server to the drone does not need to include the transport type. Information (used to identify the pick-up or delivery information for the transport task); if the drone is used for pick-up and for delivery, the pick-up order information or delivery order information sent by the server to the drone It also includes transportation type information.
本步骤中,无人机被指派时刻的时间戳,也即取货订单生成时刻的时间戳。In this step, the time stamp of the time when the drone is assigned, that is, the time stamp of the time when the order is picked up.
步骤1004、服务器采用非对称加密方式,将时间戳T1用所指派的无人机的公钥加密,将时间戳T2用上述用户账户的公钥加密,然后分别将加密后的时间戳T1和加密后的时间戳T2发送给所指派的无人机和上述用户登录的终端。Step 1004: The server adopts asymmetric encryption, encrypts the timestamp T1 with the public key of the assigned drone, encrypts the timestamp T2 with the public key of the user account, and then encrypts the encrypted timestamp T1 and the encryption respectively. The subsequent time stamp T2 is sent to the assigned drone and the terminal to which the above user logs in.
本步骤,下发给无人机的加密时间戳可以随同对无人机的指派指令一同下发,也可以通过专门的消息另行下发。下发给用户登录的终端的信息,可以通过单独的消息下发,也可以随同该流程执行过程中的其他与终端的消息一同下发。In this step, the encrypted timestamp sent to the drone can be sent along with the dispatch instruction of the drone, or can be delivered separately through a special message. The information about the terminal that is sent to the user can be delivered by a separate message or sent along with other messages in the process.
在替代实施方式中,也可以将时间戳T1和时间戳T2进行调换,即T1用用户账户的公钥加密,T2用无人机的公钥加密,只需在认证过程中也同样进行调换即可。In an alternative embodiment, the timestamp T1 and the timestamp T2 may also be exchanged, that is, T1 is encrypted with the public key of the user account, and T2 is encrypted by the public key of the drone, and only needs to be exchanged during the authentication process. can.
较佳地,本实施方式和本发明的其他各实施方式中,在用户通过终端上的客户端应用或者网页注册至服务器时,或者无人机注册至上述服务器时,服务器均可以为用户账户或无人机配置和保存公钥私钥对,并将为用户账户配置的私钥发送给用户注册的终端和后续登录的终端,将为无人机配置的私钥发送给对应的无人机。Preferably, in this embodiment and other embodiments of the present invention, when the user registers to the server through a client application or a webpage on the terminal, or when the drone is registered to the server, the server may be a user account or The UAV configures and saves the public key private key pair, and sends the private key configured for the user account to the user registered terminal and the subsequent login terminal, and sends the private key configured for the drone to the corresponding drone.
步骤1005、所指派的无人机按照物流订单中的地点信息和时间信息至取货地点取货,并将自身的位置信息反馈给服务器,同时服务器在用户通过登录的终端发起无人机位置查询时,将无人机的位置、时间信息发送给用户当时登录的终端。Step 1005: The assigned drone picks up the goods according to the location information and time information in the logistics order, and feeds back the location information to the server, and the server initiates the location query of the drone at the terminal through which the user logs in. When the location and time information of the drone is sent to the terminal where the user is logged in at the time.
本实施方式和本发明的其他各实施方式中,无人机上可以携带GPS或其他专门的定位模块,或者也可以通过无线通信网络进行定位,以获取自身的位置信息。In this embodiment and other embodiments of the present invention, the UAV may carry a GPS or other special positioning module, or may be located through a wireless communication network to acquire its own location information.
步骤1006、无人机到达取货地点后,将自身中加密后的时间戳T2传送给 用户登录的终端,同时用户通过登录的终端将自身中加密后的时间戳T1传送给无人机,并分别根据接收到的加密时间戳进行身份认证。Step 1006: After the drone arrives at the pick-up location, the encrypted timestamp T2 is transmitted to The user logs in to the terminal, and the user transmits the encrypted timestamp T1 to the drone through the logged-in terminal, and performs identity authentication according to the received encrypted time stamp.
具体地,本步骤中,在无人机到达取货地点后,无人机开始拍照或录像,用户登录的终端从无人机获取订单号信息,验证该到达的无人机是否是为该用户相应订单指派的无人机。Specifically, in this step, after the drone arrives at the pick-up location, the drone starts to take a picture or record, and the terminal that the user logs in acquires the order number information from the drone, and verifies whether the arrived drone is the user. The drone assigned to the corresponding order.
终端在验证无人机成功后,将加密后的时间戳T1传送给无人机,同时无人机将加密后的时间戳T2传送给终端。After verifying the success of the drone, the terminal transmits the encrypted time stamp T1 to the drone, and the drone transmits the encrypted time stamp T2 to the terminal.
终端和无人机在收到对方发来的加密时间戳后,利用自身的私钥解密接收的加密时间戳,并将其与解密后的来自服务器的相应时间戳进行比对,如果一致,则对方通过身份验证。After receiving the encrypted timestamp sent by the other party, the terminal and the drone decrypt the received encrypted timestamp with its own private key, and compare it with the decrypted corresponding timestamp from the server. If they are consistent, then The other party is authenticated.
即,终端用自身的私钥解开自己之前从服务器得到的T2信息和刚刚接收到的T2信息并进行比对,如果时间戳相同,则认为此无人机就是指派给该终端的无人机。同时,无人机用自己的私钥解开自己之前从服务器得到的T1信息和刚刚接收到的T1信息并进行比对,如果时间戳相同,则认为此用户就是此物流订单的发起人。如果终端验证T2不通过,则判定此无人机并非系统指派无人机,很可能为其他人的无人机恶意骗取,在步骤1008结束取货流程;如果无人机验证T1不通过或终端提供不了T1信息,则判定此终端并非此订单发起终端,此时不应取货,也在步骤1008结束取货流程。That is, the terminal uses its own private key to unlock the T2 information that it has obtained from the server and the T2 information that has just been received and compares it. If the timestamp is the same, the terminal is considered to be the drone assigned to the terminal. . At the same time, the drone uses its own private key to unlock the T1 information it has obtained from the server and the T1 information it just received, and compares it. If the timestamp is the same, the user is considered to be the originator of this logistics order. If the terminal verifies that T2 does not pass, it is determined that the drone is not a system assigned drone, and it is likely to be maliciously defrauded by another person's drone. In step 1008, the pickup process is ended; if the drone verifies that T1 does not pass or the terminal If the T1 information is not provided, it is determined that the terminal is not the order originating terminal, and the goods should not be picked up at this time, and the picking process is also terminated in step 1008.
较佳地,本步骤中,终端和无人机的之间的通信可以通过各种无线通信方式完成。在本实施方式中,较佳地,可以采用蓝牙、非接触式射频识别(NFC)方式,或者通过扫描识别编码(如二维码或条形码)等直接交互方式,其相对于通过无线通信网络进行通信可以进一步提升安全性。Preferably, in this step, the communication between the terminal and the drone can be completed by various wireless communication methods. In this embodiment, preferably, a Bluetooth, a contactless radio frequency identification (NFC) method, or a direct interaction mode by scanning an identification code (such as a two-dimensional code or a barcode) may be used, which is performed by using a wireless communication network. Communication can further improve security.
步骤1007、双方身份验证通过后,则无人机自动解锁并开启该运输订单信息对应的货仓,由用户将物品放入指定空间位置,确认完成放入后,锁闭货仓,取货完成。Step 1007: After the mutual authentication is passed, the drone automatically unlocks and opens the warehouse corresponding to the transportation order information, and the user puts the item into the designated space position, confirms that the loading is completed, the storage warehouse is closed, and the pickup is completed. .
本步骤中,若无人机只有一个货仓,则指开启该货仓,若存在多个货仓, 且分别对应不同的运输订单,则只开启该运输订单信息对应的货仓。In this step, if the drone has only one warehouse, it means to open the warehouse. If there are multiple warehouses, And corresponding to different transportation orders, only the warehouse corresponding to the transportation order information is opened.
本步骤中,取货完成后无人机可以飞往物流集散点、下一个取货点,或者在判断出目的地同城且距离较近时,可直接送货。In this step, after the pickup is completed, the drone can fly to the logistics collection point, the next pickup point, or directly when the destination is in the same city and the distance is relatively close.
步骤1008、若双方身份验证未通过,结束取货流程。Step 1008: If the identity verification of both parties fails, the pickup process ends.
本步骤中,若终端验证T2不通过,将不通过的信息反馈给服务器,并等待正确的无人机到达;若无人机验证T1不通过或未接收到来自终端的加密T1信息,则无人机将验证失败信息反馈给服务器,并根据服务器反馈的指令飞回物流集散点、飞往下一个取货点,或者原地等待。In this step, if the terminal verifies that T2 does not pass, the failed information is fed back to the server and waits for the correct drone to arrive; if the drone verifies that T1 does not pass or does not receive the encrypted T1 information from the terminal, then no The man-machine returns the verification failure information to the server, and returns to the logistics collection point, the next pickup point, or the place to wait according to the instructions fed back by the server.
以上本实施方式以及本发明其他实施方式中,涉及到物流订单操作,以及无人机指派等相关物流处理的流程可以采用现有的任意实现方式,本发明中对其不进行限定。In the above embodiments and other embodiments of the present invention, the flow related to the logistics order operation and the related logistics processing such as the drone assignment may be any existing implementation manner, which is not limited in the present invention.
本实施方式以及本发明其他各实施方式中,终端或无人机与服务器之间可以通过5G、4G、3G、GPRS或WiFi等各种无线通信网络进行通信,在此不做限定。In the present embodiment and other embodiments of the present invention, the terminal or the drone and the server can communicate with each other through various wireless communication networks such as 5G, 4G, 3G, GPRS, or WiFi, and are not limited herein.
另外,上述时间戳T1和时间戳T2是本实施方式和其他实施方式中的较佳实现方案,采用该方案可以使安全信息与订单吻合度更好。该两时间戳也可以采用其他时间戳替代,只要服务器生成两个不同的时间戳,分别用上述终端和无人机的公钥加密发送给两个设备以供验证即可实现提高无人机运输安全性的技术效果。In addition, the timestamp T1 and the timestamp T2 are preferred implementations in the present embodiment and other embodiments, and the security information can be better matched with the order. The two timestamps can also be replaced by other timestamps. As long as the server generates two different timestamps, the terminal and the drone's public key are encrypted and sent to two devices for verification. The technical effect of safety.
图11示出了另一较佳的无人机取货实施方式,该方式中,由服务器完成对用户的终端和无人机的身份认证,提升运输安全性。该实施方式中的步骤1101至步骤1103与步骤1001至步骤1003相同,这里不再赘述,在步骤1103后,包括以下步骤:FIG. 11 shows another preferred drone pickup implementation in which the identity authentication of the user's terminal and the drone is completed by the server to improve the transportation security. Steps 1101 to 1103 in this embodiment are the same as steps 1001 to 1003, and are not described here. After step 1103, the following steps are included:
步骤1104、服务器采用非对称加密方式,将时间戳T1通过用户账户的公钥加密,将时间戳T2用所指派的无人机的公钥加密,然后分别将加密后的时间戳T1发送给所指派的无人机,将加密后的时间戳T2发送给用户登录的终 端。Step 1104: The server adopts asymmetric encryption, encrypts the timestamp T1 by the public key of the user account, encrypts the timestamp T2 with the public key of the assigned drone, and then sends the encrypted timestamp T1 to the local The assigned drone sends the encrypted timestamp T2 to the end of the user's login. end.
在替代实施方式中,也可以将时间戳T1和时间戳T2进行调换,即T1用无人机公钥加密,T2用终端公钥加密,则加密后的时间戳T1发送给用户登录的终端,加密后的时间戳T2发送给无人机,后续认证过程中也进行类似调换,这里不再赘述。In an alternative embodiment, the timestamp T1 and the timestamp T2 may be exchanged, that is, the T1 is encrypted by the UAV public key, and the T2 is encrypted by the terminal public key, and the encrypted timestamp T1 is sent to the terminal that the user logs in. The encrypted timestamp T2 is sent to the drone, and similar switching is performed in the subsequent authentication process, which will not be described here.
步骤1105、所指派的无人机按照物流订单中的地点信息和时间信息至取货地点取货,并将自身的位置信息反馈给服务器,同时服务器在用户通过登录的终端发起无人机位置查询时,将无人机的位置、时间信息发送给用户当时登录的终端。Step 1105: The assigned drone picks up the goods according to the location information and time information in the logistics order, and feeds back the location information to the server, and the server initiates the drone location query by the user through the login terminal. When the location and time information of the drone is sent to the terminal where the user is logged in at the time.
步骤1106、无人机到达取货地点后,将自身中加密后的时间戳T1传送给用户登录的终端,同时用户登录的终端将自身中加密后的时间戳T2传送给无人机。Step 1106: After the drone arrives at the pick-up location, the encrypted timestamp T1 is transmitted to the terminal that the user logs in, and the terminal that the user logs in transmits the encrypted timestamp T2 to the drone.
具体地,本步骤中,在无人机到达取货地点后,无人机开始拍照或录像,用户通过登录的终端从无人机获取订单号信息,验证该到达的无人机是否是为该用户相应订单指派的无人机。Specifically, in this step, after the drone arrives at the pick-up location, the drone starts to take a picture or record, and the user obtains the order number information from the drone through the registered terminal, and verifies whether the arrived drone is for the The drone assigned by the user to the corresponding order.
终端在验证无人机成功后,将加密后的时间戳T2传送给无人机,同时无人机将加密后的时间戳T1传送给终端。After verifying the success of the drone, the terminal transmits the encrypted time stamp T2 to the drone, and the drone transmits the encrypted time stamp T1 to the terminal.
步骤1107、终端和无人机在收到对方发来的加密时间戳后,利用自身中的相应私钥解密接收的加密时间戳,并将解密后的时间戳反馈给对方。Step 1107: After receiving the encrypted timestamp sent by the other party, the terminal and the drone decrypt the received encrypted timestamp by using the corresponding private key in the same, and feed back the decrypted timestamp to the other party.
本步骤中,终端和无人机之一如果解密不成功,则直接结束该次取货流程,或者将解密失败信息反馈给对方和/或上传给服务器,并结束该流程。In this step, if the decryption is unsuccessful, one of the terminal and the drone directly ends the picking process, or feeds back the decryption failure information to the other party and/or uploads to the server, and ends the process.
若终端和无人机一方解密成功,但收到另一方解密失败的消息,或通过服务器接收到对方解密失败的消息,则结束该取货流程。If the terminal and the unmanned party decrypted successfully, but received the message that the other party failed to decrypt, or received the message that the other party failed to decrypt through the server, the pickup process is ended.
步骤1108、终端和无人机接收到解密后的时间戳后,分别将解密后的时间戳上传给服务器。Step 1108: After receiving the decrypted timestamp, the terminal and the drone respectively upload the decrypted timestamp to the server.
步骤1109、服务器将接收到的解密时间戳与自身记录的时间戳进行比对, 检验终端和无人机上传的时间戳是否正确,以对两者进行身份认证,并将认证结果反馈给无人机和终端。Step 1109: The server compares the received decryption timestamp with the timestamp of the record itself. Verify that the timestamps uploaded by the terminal and the drone are correct to authenticate the two and feed back the authentication results to the drone and the terminal.
本步骤中,如果终端和无人机上传的时间戳均正确则认为此终端就是此物流订单的发起用户的终端,且无人机确实为指派无人机;如果时间戳T1正确时间戳T2错误(或缺失),则无人机正确但有终端伪装成发件方,且此终端已经获取到了解密时间戳T1的私钥;如果时间戳T1错误(或缺失),时间戳T2正确,则判别无人机为恶意骗取,且此无人机已经获取到了解密时间戳T2的私钥;如果时间戳T1和时间戳T2都错误或缺失,则基本可判定此无人机为恶意骗取,也有小部分可能是无人机正确但有用户伪装成发件人,此时应立刻发送消息至正确的用户终端,提醒订单用户无人机恶意骗取或有其他人伪装成发件人。In this step, if the timestamps uploaded by the terminal and the drone are correct, the terminal is considered to be the terminal of the originating user of the logistics order, and the drone is indeed assigned the drone; if the timestamp T1 is correct, the timestamp T2 is incorrect. (or missing), the drone is correct but the terminal is disguised as the sender, and the terminal has obtained the private key of the decryption timestamp T1; if the timestamp T1 is wrong (or missing) and the timestamp T2 is correct, then the discriminant The drone is maliciously defrauded, and the drone has acquired the private key of the decryption timestamp T2; if both the timestamp T1 and the timestamp T2 are wrong or missing, the drone can be basically determined to be maliciously defrauded, and also small. Part of it may be that the drone is correct but the user disguised as the sender. In this case, the message should be sent to the correct user terminal immediately to remind the order user that the drone is maliciously defrauded or someone else pretends to be the sender.
步骤1110、无人机和终端接收到服务器发来的双方身份认证通过的消息后,按照步骤1007的描述完成取货流程。Step 1110: After receiving the message that the two parties have passed the identity authentication sent by the server, the drone and the terminal complete the picking process according to the description of step 1007.
在本发明的另一与图11整体流程相似的较佳实施方式中,终端和无人机在收到对方发来的加密时间戳后,利用自身中的相应私钥解密接收的加密时间戳后,可以不将解密后的时间戳发给对方,而是直接将解密后的时间戳发送给服务器,直接由服务器进行认证,并分别下发认证结果给双方,具体的认证方式和结果下发方式与上一较佳实施方式中相同,这里不再赘述。In another preferred embodiment of the present invention, similar to the overall flow of FIG. 11, after receiving the encrypted timestamp sent by the other party, the terminal and the drone decrypt the received encrypted timestamp by using the corresponding private key in the terminal. Instead of sending the decrypted timestamp to the other party, the timestamp is sent to the server directly, and the server directly authenticates the authentication result and sends the authentication result to both parties. The specific authentication mode and the result delivery method are sent. The same as in the previous preferred embodiment, and details are not described herein again.
以上是针对本发明无人机取货方法实施例的描述。本发明实施例还提供了提升无人机送货安全性的方法。The above is a description of an embodiment of the unmanned pickup method of the present invention. Embodiments of the present invention also provide a method for improving the security of drone delivery.
图12示出了无人机送货方法的一种具体实施方式,该实施方式中,无人机采用语音问答的方式,以用户的答案和物流订单信息进行比对验证,以确定确实为收件人,具体地,该实施方式包括如下步骤:FIG. 12 shows a specific implementation manner of the drone delivery method. In this embodiment, the drone uses a voice question and answer method to compare the user's answer with the logistics order information to determine whether it is actually received. Specifically, the embodiment includes the following steps:
步骤1201、服务器指派无人机,无人机接收包括运输订单的指令后,完成货物加载后,根据指令飞往送货目标地点。Step 1201: The server assigns a drone, and after receiving the instruction including the transportation order, the drone flies to the delivery target location according to the instruction after the loading of the cargo is completed.
本实施例及下述各实施例中,运输订单中包括运输地点信息,即送货目 的地点信息。In this embodiment and the following embodiments, the transportation order includes the transportation location information, that is, the delivery item. Location information.
步骤1202、收货人出现后,无人机拍照或开始录像。Step 1202: After the consignee appears, the drone takes a picture or starts recording.
本步骤中,也可以是无人机到达送货目标地点后,即自动开始定时拍照或开始录像。In this step, the drone can automatically start timing or start recording after the delivery destination is reached.
此外,本步骤中,无人机可以通过图像识别确定收货人出现,也可以通过收货人的对无人机的操作确定收货人出现。In addition, in this step, the drone can determine the appearance of the consignee through image recognition, and can also determine the presence of the consignee by the operation of the consignee on the drone.
步骤1203、无人机采用语音的方式询问收货人姓名和/或地址信息。Step 1203: The drone uses voice to query the consignee's name and/or address information.
步骤1204、无人机检测收货人回答的信息是否正确,在检验正确后提供货物,然后执行步骤1205。Step 1204: The drone detects whether the information answered by the consignee is correct, provides the goods after the verification is correct, and then performs
本步骤中,无人机可以通过语音识别,获取收货人回答的内容,然后将回答的内容与物流订单的信息比对,如果相同则认为地点正确,自动开锁,收货人取走物品;如果比较相似则需要进一步智能验证(如通过手机号的方式,说出前几位让收货人说出后面几位等方式)直到验证通过后自动解锁,用户取走物品;如果完全不同或者验证无法通过则认为地点错误或者有人冒领,无人机应返回消息待物流公司人工与收件人进行沟通后再去投递。In this step, the drone can obtain the content of the consignee's answer through voice recognition, and then compare the content of the answer with the information of the logistics order. If the same, the location is considered correct, the lock is automatically unlocked, and the consignee takes the item; If they are similar, they need to be further intelligently verified (such as by means of the mobile phone number, saying the first few people let the consignee say the next few, etc.) until the verification is automatically unlocked after the pass, the user takes the item; if it is completely different or the verification cannot be If it is considered that the location is wrong or someone is taking the lead, the drone should return the message to the logistics company to communicate with the recipient and then deliver it.
步骤1205、无人机完成送货,离开时结束拍照或录像,飞往下一个投递点或返航。In
图13示出了无人机送货方法的另一种具体实施方式,该实施方式中,无人机与收货人进行双向验证,该实施方式具体包括如下步骤:FIG. 13 illustrates another embodiment of the drone delivery method. In this embodiment, the unmanned aircraft and the consignee perform two-way verification. The implementation specifically includes the following steps:
步骤1301、服务器根据用户物流订单,在需要给收货人送货时,指派进行送货的无人机,即生成运输订单下发给无人机,并记录无人机被指派时刻的时间戳T2,并获取该用户物流订单生成时刻的时间戳T1。Step 1301: The server assigns a drone that delivers the delivery to the consignee according to the user logistics order, that is, generates a transportation order and delivers the transportation order to the drone, and records the time stamp of the time when the drone is assigned. T2, and obtain the timestamp T1 of the time at which the user's logistics order is generated.
步骤1302、服务器采用非对称加密方式,将时间戳T2用上述收货人用户账户的公钥加密,并将时间戳T1用户无人机的公钥加密,然后将加密后的时间戳T1和T2分别发送给无人机和收货人用户账户登录的终端。Step 1302: The server adopts asymmetric encryption, encrypts the timestamp T2 with the public key of the receiver user account, encrypts the public key of the time stamp T1 user drone, and then encrypts the timestamps T1 and T2. The terminals that are sent to the drone and the consignee user account respectively.
如上各实施例所描述,这里的T1和T2可以互换,也可以替换为其他的 时间戳。As described in the above embodiments, T1 and T2 are interchangeable here, and can be replaced with other ones. Timestamp.
步骤1303、所指派的无人机加载货物并按照物流订单中的地点信息送货,并将自身的位置信息反馈给服务器,同时服务器在用户通过登录的终端发起无人机位置查询时,将无人机的位置、时间信息发送给用户当时登录的终端,这里的用户可以是发货人也可以是收货人。Step 1303: The assigned drone loads the goods and delivers the goods according to the location information in the logistics order, and feeds back the location information to the server, and the server will not have the location when the user initiates the drone location query through the login terminal. The location and time information of the man-machine is sent to the terminal that the user is logged in at the time, and the user here may be the shipper or the consignee.
本实施方式中,无人机加载货物的时间可以在服务器下发加密时间戳的时间之后,也可以在其之前。In this embodiment, the time when the drone loads the goods may be after the time when the server sends the encrypted time stamp, or before.
步骤1304、无人机到达送货地点后,将自身中加密后的时间戳T2传送给收货人用户登录的终端,同时收货人用户登录的终端将自身中加密后的时间戳T1传送给无人机,并分别根据接收到的加密时间戳进行身份认证。Step 1304: After the drone arrives at the delivery location, the encrypted timestamp T2 is transmitted to the terminal that the consignee user logs in, and the terminal that the consignee user logs in transmits the encrypted timestamp T1 to the terminal. The drone is authenticated according to the received encrypted timestamp.
具体地,本步骤中,在无人机到达送货地点后,还可以拍照或录像,并在传送加密后的时间戳之前,收货人用户通过登录的终端从无人机获取订单号信息,验证该到达的无人机是否是为该用户相应订单指派的无人机,或者也可以如上一实施方式中所描述,无人机对收货人是否正确进行验证,然后再执行本步骤中的密钥交互操作。Specifically, in this step, after the drone arrives at the delivery location, the mobile phone can also take a photo or video recording, and before transmitting the encrypted time stamp, the receiver user obtains the order number information from the drone through the registered terminal. Verifying whether the arriving drone is a drone assigned to the corresponding order of the user, or as described in the above embodiment, whether the drone correctly verifies the consignee, and then performs the steps in this step. Key interaction.
终端和无人机在收到对方发来的加密时间戳后,利用自身的私钥解密接收的加密时间戳,并将其与解密后的来自服务器的相应时间戳进行比对,如果一致,则对方通过身份验证。After receiving the encrypted timestamp sent by the other party, the terminal and the drone decrypt the received encrypted timestamp with its own private key, and compare it with the decrypted corresponding timestamp from the server. If they are consistent, then The other party is authenticated.
较佳地,本步骤中,终端和无人机的之间的通信可以通过各种无线通信方式完成。在本实施方式中,较佳地,可以采用蓝牙、非接触式射频识别(NFC)方式,或者通过扫描识别编码(如二维码或条形码)等直接交互方式,其相对于通过无线通信网络进行通信可以进一步提升安全性。Preferably, in this step, the communication between the terminal and the drone can be completed by various wireless communication methods. In this embodiment, preferably, a Bluetooth, a contactless radio frequency identification (NFC) method, or a direct interaction mode by scanning an identification code (such as a two-dimensional code or a barcode) may be used, which is performed by using a wireless communication network. Communication can further improve security.
步骤1305、双方身份验证通过后,则无人机自动解锁,由收货人用户将物品取出,确认完成取货后,锁闭货仓,无人机送货完成;若双方身份验证未通过,结束取货流程。
本步骤中,取货完成后无人机可以飞往物流集散点、下一个送货点,或 取货点。In this step, after the pickup is completed, the drone can fly to the logistics collection point, the next delivery point, or Pick up point.
本实施例中,若终端验证T2不通过,将不通过的信息反馈给服务器,并等待正确的无人机到达;若无人机验证T1不通过或未接收到来自终端的加密T1信息,则无人机将验证失败信息反馈给服务器,并根据服务器反馈的指令飞回物流集散点、飞往下一个取货点,或者原地等待。In this embodiment, if the terminal verifies that T2 does not pass, the information that fails is fed back to the server, and waits for the correct drone to arrive; if the drone verifies that T1 does not pass or does not receive the encrypted T1 information from the terminal, then The drone feeds back the verification failure information to the server and flies back to the logistics collection point, flies to the next pickup point, or waits in place according to the instructions fed back by the server.
图14示出了无人机送货方法的再一种具体实施方式,该实施方式中,无人机对收货人进行单向验证,该实施方式具体包括如下步骤:FIG. 14 shows a further embodiment of the drone delivery method. In this embodiment, the unmanned aircraft performs one-way verification on the consignee. The implementation specifically includes the following steps:
步骤1401、服务器根据用户物流订单,在需要给收货人送货时,指派进行送货的无人机,即生成运输订单下发给无人机,并记录无人机被指派时刻的时间戳T2。Step 1401: The server assigns a drone that delivers the goods according to the user logistics order, when the need to deliver the goods to the consignee, that is, generates a transport order and delivers the time to the drone, and records the time stamp of the time when the drone is assigned. T2.
步骤1402、服务器采用非对称加密方式,将时间戳T2用上述收货人用户账户的公钥加密,然后加密后的时间戳T2发送给所指派的无人机。Step 1402: The server adopts asymmetric encryption, and encrypts the timestamp T2 with the public key of the consignee user account, and then sends the encrypted timestamp T2 to the assigned drone.
本步骤中,服务器还可以将时间戳T2用无人机自身的公钥加密后发给所指派的无人机。In this step, the server may also encrypt the timestamp T2 with the public key of the drone itself and send it to the assigned drone.
步骤1403、所指派的无人机加载货物,按照物流订单中的地点信息送货,并将自身的位置信息反馈给服务器,同时服务器在用户通过登录的终端发起无人机位置查询时,将无人机的位置、时间信息发送给用户当时登录的终端,这里的用户可以是发货人也可以是收货人。Step 1403: The assigned drone loads the goods, delivers the goods according to the location information in the logistics order, and feeds back the location information to the server, and the server does not query the location of the drone when the user logs in through the terminal. The location and time information of the man-machine is sent to the terminal that the user is logged in at the time, and the user here may be the shipper or the consignee.
本实施方式中,无人机加载货物的时间可以在服务器下发加密时间戳的时间之后,也可以在其之前。In this embodiment, the time when the drone loads the goods may be after the time when the server sends the encrypted time stamp, or before.
步骤1404、无人机到达送货地点后,将自身中用户账户公钥加密后的时间戳T2传送给收货人用户登录的终端。Step 1404: After the drone arrives at the delivery location, the timestamp T2 encrypted by the user account public key in the user is transmitted to the terminal registered by the consignee user.
具体地,本步骤中,在无人机到达取货地点后,无人机开始拍照或录像,用户通过终端从无人机获取订单号信息,验证该到达的无人机是否是为该用户相应订单指派的无人机,此后再执行传送加密时间戳的步骤。Specifically, in this step, after the drone arrives at the pick-up location, the drone starts to take a picture or record, and the user obtains the order number information from the drone through the terminal, and verifies whether the arrived drone is corresponding to the user. The drone assigned to the order, and then the step of transmitting the encrypted timestamp.
步骤1405、无人机接收终端反馈的解密后的T2信息,根据解密后的T2 信息对终端进行认证。Step 1405: The UAV receives the decrypted T2 information fed back by the terminal, according to the decrypted T2. The information authenticates the terminal.
本步骤中,如果在步骤1402中,服务器向无人机下发了用无人机公钥加密的T2,则无人机对该加密信息解密后,将解密后的T2与来自终端的T2进行对比,如果一致,则对终端验证身份通过,如果不一致,则验证不通过。In this step, if the server sends the T2 encrypted by the unmanned public key to the drone in
如果在步骤1402中,服务器没有向无人机下发用无人机公钥加密的T2,则无人机在接收到终端反馈的解密后的T2信息后,将该T2信息和运输订单相关信息,如订单号,发送给服务器,由服务器对解密后的T2是否正确进行验证,并将验证结果反馈给无人机,无人机根据验证结果确定是否对终端验证身份通过。If the server does not send the T2 encrypted by the drone public key to the drone in
并将解密后的T2信息与自身中的T2,或用自身私钥解密后得到的T2进行对比,确定终端反馈的T2是否正确,以对终端进行身份认证。The decrypted T2 information is compared with the T2 in the self or the T2 obtained by decrypting the private key to determine whether the T2 fed back by the terminal is correct, so as to authenticate the terminal.
步骤1406、无人机对终端身份验证通过后,无人机自动解锁,由收货人用户将物品取出,确认完成取货后,锁闭货仓,无人机送货完成;若身份验证未通过,结束取货流程。Step 1406: After the UAV passes the terminal identity verification, the UAV automatically unlocks, and the consignee user takes out the item, confirms that after the pickup is completed, the cargo bin is locked, and the drone delivery is completed; if the identity verification is not completed Pass, end the pickup process.
本步骤中,取货完成后无人机可以飞往物流集散点、下一个送货点,或取货点。In this step, after the pickup is completed, the drone can fly to the logistics collection point, the next delivery point, or the pickup point.
在图14所示实施例的替代方式中,无人机对收货人进行单向验证过程,也可以是:服务器将用无人机公钥加密的T2同时发送给无人机和用户登录的终端,无人机在到达送货地点后,从用户登录的终端获取无人机公钥加密的T2后,将该T2和此前服务器发给自身的加密T2同时利用自身私钥解密,解密后对比,若一致则对终端认证通过,不一致认证通过。In the alternative manner of the embodiment shown in FIG. 14, the unmanned aircraft performs a one-way verification process on the consignee, or the server may simultaneously transmit the T2 encrypted by the drone public key to the drone and the user to log in. After the terminal arrives at the delivery location, the U2 obtains the T2 of the UAV public key encryption from the terminal that the user logs in, and then decrypts the T2 and the previous server to its own encrypted T2 and decrypts it with its own private key. If the agreement is the same, the terminal authentication is passed, and the inconsistent authentication is passed.
本发明无人机的一个示例性实施方式的结构如图15所示。本实施方式中,当无人机用于取货时,通过无人机与用户登录的终端相互认证,提高无人机取货的安全性。The structure of an exemplary embodiment of the drone of the present invention is as shown in FIG. In the embodiment, when the drone is used for picking up the goods, the unmanned aerial vehicle and the terminal registered by the user mutually authenticate each other, thereby improving the safety of the drone pickup.
本实施例中,无人机包括:通信单元151、处理单元152和存储单元153,其中通信单元151和存储单元153均通过总线与处理单元152通讯。当然,
随着技术进步,若出现其他的计算机内部通信方式,通信单元151和存储单元153等也可以通过其他的计算机内部通信方式与处理单元152通讯。In this embodiment, the drone includes: a
所述通信单元151用于接收来自服务器的运输任务及运输地点、订单信息和用于安全认证的第一加密信息,将其发送给处理单元152;和,根据处理单元152的指令,将第一加密信息发送给所述订单信息对应的终端,并接收来自所述终端的第二加密信息,将其发送给处理单元152;以及,接收终端验证无人机通过的通知,并将其发送给处理单元152;The
所述处理单元152用于接收所述运输任务及运输地点、订单信息、第一加密信息,并存储至存储单元153;并在确认无人机到达运输地点后,读取存储单元153中的第一加密信息,指示通信单元151发送给所述终端;以及根据接收的所述第二加密信息确定终端合法,并接收到终端验证无人机通过的通知后,控制所述无人机执行所述运输任务;The
所述存储单元153用于根据处理单元152的指令存储或提供信息。The
上述第二加密信息也可以先存储于存储单元153中,在处理单元152使用时,再从存储单元153读取。The second encrypted information may also be stored in the
所述第二加密信息为用所述无人机的公钥加密的信息;The second encrypted information is information encrypted by a public key of the drone;
所述通信单元151用于根据所述第二加密信息确定所述终端合法包括:The determining, by the
所述处理单元152用于从存储单元153中读取所述无人机的私钥,对所述第二加密信息解密后,确定所述解密后的信息与存储单元153中存储的对应信息匹配。The
所述通信单元151进一步可以用于从接收来自所述服务器的第二加密信息;The
所述通信单元151进一步用于将所述来自服务器的第二加密信息存储至存储单元153;The
所述通信单元151用于根据所述第二加密信息确定所述终端合法包括:The determining, by the
所述处理单元152用于从存储单元153中读取所述无人机的私钥和来自
服务器的第二加密信息,对来自所述终端的第二加密信息和来自所述服务器的第二加密信息分别解密后,确定解密后的信息相匹配。The
较佳地,所述加密信息为加密的时间戳。其中,所述第一加密信息中的时间戳根据服务器向无人机下发运输任务的时刻生成,所述第二加密信息中的时间戳根据服务器生成所述订单的时刻生成;或者,所述第一加密信息中的时间戳根据服务器生成所述订单的时刻生成,所述第二加密信息中的时间戳根据服务器向无人机下发运输任务的时刻生成。Preferably, the encrypted information is an encrypted timestamp. The timestamp in the first encrypted information is generated according to a time when the server sends a transport task to the drone, and the timestamp in the second encrypted information is generated according to a time when the server generates the order; or The timestamp in the first encrypted information is generated according to the time when the server generates the order, and the timestamp in the second encrypted information is generated according to the time when the server delivers the transport task to the drone.
较佳地,所述第一加密信息为用所述终端用户账户的公钥加密的信息;则所述通信单元151用于接收终端验证无人机通过的通知可以包括:Preferably, the first encryption information is information encrypted by the public key of the terminal user account; and the receiving, by the
所述通信单元151用于接收所述终端对所述第一加密信息利用终端中所述用户账户私钥解密并验证成功后,发送的验证通过消息。The
较佳地,如图16所示,本实施方式中,通信单元151包括第一通信单元1511和第二通信单元1512。其中,第一通信单元1511用于无人机的处理单元152通过无线通信网络与服务器或其他设备进行无线通信。较佳地,该第一通信单元1511具体可以是5G、4G、3G、GPRS或WiFi通信单元,或者是集成了以上任意两种或两种以上通信功能。Preferably, as shown in FIG. 16, in the present embodiment, the
第二通信单元1512用于无人机的处理单元152通过其与用户的终端进行无线通信。较佳地,该第二通信单元1512可以是蓝牙通信单元、射频识别单元等可以直接与终端进行无线通信,无需通过通信网络的通信单元。The
在本发明的另一个无人机的较佳实施方式中,当无人机用于取货时,通过无人机与用户登录的终端通过服务器进行对方身份认证,提高无人机取货的安全性。In a preferred embodiment of another drone according to the present invention, when the drone is used for picking up the goods, the terminal that is logged in by the drone and the user is authenticated by the server to improve the security of the drone pickup. Sex.
本实施方式中,与上一实施方式的区别之处主要在于,处理单元对终端的合法验证部分和无人机如何接收终端对其验证通过的信息,其余部分与上一无人机实施方式相同,相同的部分这里不再追溯。In this embodiment, the difference from the previous embodiment mainly lies in how the processing unit controls the legal verification part of the terminal and the drone to receive the information verified by the terminal, and the rest is the same as the previous drone implementation. The same part is not traced here.
本实施方式中,处理单元可以基于第二加密信息确定终端合法,也可以 通过第一加密信息确定终端合法。In this implementation manner, the processing unit may determine that the terminal is legal based on the second encryption information, and may also The terminal is determined to be legal by the first encrypted information.
处理单元用于根据第二加密信息确定所述终端合法的方式包括:所述处理单元用于从存储单元中读取所述无人机的私钥,对所述第二加密信息解密后,指示通信单元将所述解密后的信息发送给服务器,并通过通信单元接收到所述服务器反馈的认证成功消息。The manner of the processing unit determining that the terminal is legal according to the second encryption information comprises: the processing unit is configured to read the private key of the drone from the storage unit, and after decrypting the second encrypted information, indicating The communication unit transmits the decrypted information to the server, and receives an authentication success message fed back by the server through the communication unit.
所述处理单元用于根据所述第一加密信息确定所述终端合法包括:所述处理单元用于通过通信单元接收所述终端反馈的解密后的第一加密信息,并将解密后的信息通过通信单元发送给服务器,在通过通信单元接收到服务器反馈确认所述解密后的信息验证成功后,确定所述终端合法。Determining, by the processing unit, that the terminal is legal according to the first encryption information, the processing unit is configured to receive, by using a communication unit, the decrypted first encrypted information fed back by the terminal, and pass the decrypted information The communication unit sends to the server, and after receiving the feedback from the communication unit to confirm that the decrypted information is successfully verified, it is determined that the terminal is legal.
图17示出了本发明无人机的再一种实施方式的结构示意图,所述无人机包括:存储器171,收发器173和一个或多个处理器172;以及一个或多个软件模块,所述一个或多个软件模块被存储在所述存储器171中,并被配置成由所述一个或多个处理器执行,所述一个或多个软件模块包括用于执行上述无人机取货和/或送货实施方式中无人机所执行的各个步骤的指令。Figure 17 is a block diagram showing still another embodiment of the drone of the present invention, the drone comprising: a
本领域技术人员公知的,图15所示的实施方式和图17所示的实施方式可以是相同的,这里仅是从不同的技术角度进行描述。As is known to those skilled in the art, the embodiment shown in FIG. 15 and the embodiment shown in FIG. 17 may be the same, and are described herein only from different technical perspectives.
本发明实施例还提供了一种与无人机结合使用的计算机程序产品,所述计算机程序产品包括计算机可读的存储介质和内嵌于其中的计算机程序机制,所述计算机程序机制包括用于执行上述无人机取货和/或送货实施方式中无人机所执行的各个步骤的指令。Embodiments of the present invention also provide a computer program product for use with a drone, the computer program product comprising a computer readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising The instructions of the various steps performed by the drone in the above-described drone pick-up and/or delivery implementation are performed.
图18示出了本发明终端实施方式的结构示意图,该终端包括:显示器181,存储器182,收发器183,一个或多个处理器184;以及一个或多个软件模块,所述一个或多个软件模块被存储在所述存储器中,并被配置成由所述一个或多个处理器执行,所述一个或多个软件模块包括用于执行上述无人机取货和/或送货实施方式中终端所执行的各个步骤的指令。本实施方式中,一个或多个软件模块可以是客户端应用软件。
18 is a schematic structural diagram of an embodiment of a terminal of the present invention, the terminal comprising: a
图19示出了本发明服务器实施方式的结构示意图,该服务器包括:该服务器包括:存储器191,收发器192,一个或多个处理器193;以及一个或多个模块,所述一个或多个模块被存储在所述存储器191中,并被配置成由所述一个或多个处理器193执行,所述一个或多个模块包括用于执行上述无人机取货和/或送货实施方式中服务器所执行的各个步骤的指令。19 is a block diagram showing an embodiment of a server according to the present invention, the server comprising: the server comprising: a
本发明实施例还提供了一种与电子设备结合使用的计算机程序产品,所述计算机程序产品包括计算机可读的存储介质和内嵌于其中的计算机程序机制,所述计算机程序机制包括用于执行上述无人机取货和/或送货实施方式中终端所执行的各个步骤的指令。该计算机程序产品可以是客户端应用软件。Embodiments of the present invention also provide a computer program product for use in conjunction with an electronic device, the computer program product comprising a computer readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising The instructions of the various steps performed by the terminal in the above-described drone pick-up and/or delivery implementation. The computer program product can be a client application software.
本发明实施例还提供了一种与服务器结合使用的计算机程序产品,所述计算机程序产品包括计算机可读的存储介质和内嵌于其中的计算机程序机制,所述计算机程序机制包括用于执行上述无人机取货和/或送货实施方式中服务器所执行的各个步骤的指令。The embodiment of the invention further provides a computer program product for use in combination with a server, the computer program product comprising a computer readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising Instructions for the various steps performed by the server in the drone pick-up and/or shipping implementation.
本发明通过上述各实施方式,在无人机与终端双方均对对方身份认证通过后,无人机才继续执行运输任务,或者用户可以通过终端上呈现的双方验证通过的信息确定是否发货或取货,提升了无人机运输的安全性。本发明很大程度上避免了无人机取货时的错误提取、被其他无人机骗取、取货地点错误等,也避免了无人机送货时的冒领或地点错误等问题,取货/送货安全性得到了很大的提升,为未来无人机自动化物流体系的建立有很大帮助。According to the foregoing embodiments, after the UAV and the terminal both authenticate each other, the UAV continues to perform the transportation task, or the user can determine whether to deliver the goods through the information verified by both parties presented on the terminal. Picking up the goods improves the safety of drone transportation. The invention largely avoids the error extraction when the drone is picked up, the fraud by other drones, the wrong location of picking up, etc., and also avoids the problem of fraud or location error when the drone is delivered, etc. The safety of goods/delivery has been greatly improved, which will greatly help the establishment of the automated logistics system for the future.
本领域内的技术人员应明白,本发明的实施例可提供为方法、系统、或计算机程序产品。因此,本发明可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art will appreciate that embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
本发明是参照根据本发明实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图 和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (system), and computer program products according to embodiments of the invention. It should be understood that the flow chart can be implemented by computer program instructions And/or a combination of the processes and/or blocks in the block diagrams, and the flowcharts and/or blocks in the flowcharts. These computer program instructions can be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing device to produce a machine for the execution of instructions for execution by a processor of a computer or other programmable data processing device. Means for implementing the functions specified in one or more of the flow or in a block or blocks of the flow chart.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。The computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device. The apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device. The instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
尽管已描述了本发明的优选实施例,但本领域内的技术人员一旦得知了基本创造性概念,则可对这些实施例作出另外的变更和修改。所以,所附权利要求意欲解释为包括优选实施例以及落入本发明范围的所有变更和修改。 While the preferred embodiment of the invention has been described, it will be understood that Therefore, the appended claims are intended to be interpreted as including the preferred embodiments and the modifications and
Claims (30)
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2016/106749 WO2018094554A1 (en) | 2016-11-22 | 2016-11-22 | Method for improving security of unmanned aerial vehicle transportation, and unmanned aerial vehicle, terminal, server and computer program product |
| CN201680002950.5A CN107004177B (en) | 2016-11-22 | 2016-11-22 | Methods, drones, terminals, servers and computer program products to improve drone transportation safety |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2016/106749 WO2018094554A1 (en) | 2016-11-22 | 2016-11-22 | Method for improving security of unmanned aerial vehicle transportation, and unmanned aerial vehicle, terminal, server and computer program product |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2018094554A1 true WO2018094554A1 (en) | 2018-05-31 |
Family
ID=59431135
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2016/106749 Ceased WO2018094554A1 (en) | 2016-11-22 | 2016-11-22 | Method for improving security of unmanned aerial vehicle transportation, and unmanned aerial vehicle, terminal, server and computer program product |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN107004177B (en) |
| WO (1) | WO2018094554A1 (en) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2020117110A1 (en) * | 2018-12-07 | 2020-06-11 | Scania Cv Ab | Methods, control devices and vehicles for authentication of transport missions |
| US20220141042A1 (en) * | 2018-12-29 | 2022-05-05 | Intel Corporation | Automatically verifying vehicle identity and validating vehicle presence |
| CN115473725A (en) * | 2022-09-08 | 2022-12-13 | 深圳市凯利华电子有限公司 | Security management method and system for network big data |
| US12091170B2 (en) * | 2020-04-17 | 2024-09-17 | Dish Network L.L.C. | Autonomous servicing of network devices |
Families Citing this family (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CA3040271A1 (en) | 2016-10-11 | 2018-04-19 | Whitefox Defense Technologies, Inc. | Systems and methods for cyber-physical vehicle management, detection and control |
| US11134380B2 (en) | 2016-10-11 | 2021-09-28 | Whitefox Defense Technologies, Inc. | Systems and methods for cyber-physical vehicle management, detection and control |
| CN107516181A (en) * | 2017-08-30 | 2017-12-26 | 亿航智能设备(广州)有限公司 | Order allocator, device and system |
| US11186368B2 (en) | 2017-12-21 | 2021-11-30 | Wing Aviation Llc | Methods and systems for door-enabled loading and release of payloads in an unmanned aerial vehicle (UAV) |
| CN108132676A (en) * | 2017-12-24 | 2018-06-08 | 广西南宁英凡达科技有限公司 | Aerial system for conveying goods |
| CN107945582B (en) * | 2017-12-24 | 2020-09-15 | 广西南宁英凡达科技有限公司 | Cargo carrying and transmission system based on low-altitude flight unmanned aerial vehicle |
| CN110278717B (en) * | 2018-01-22 | 2022-08-02 | 深圳市大疆创新科技有限公司 | Method and device for controlling the flight of an aircraft |
| CN108334106A (en) * | 2018-01-25 | 2018-07-27 | 芜湖应天光电科技有限责任公司 | A kind of UAV system and control method launched for express delivery |
| CN110517374A (en) * | 2018-05-22 | 2019-11-29 | 杭州海康威视数字技术股份有限公司 | Material turnover management system and method |
| US11558743B2 (en) | 2018-09-05 | 2023-01-17 | Whitefox Defense Technologies, Inc. | Integrated secure device manager systems and methods for cyber-physical vehicles |
| CN109345728A (en) * | 2018-09-14 | 2019-02-15 | 深圳市丰巢科技有限公司 | Method of reseptance, device, storage medium and the express delivery box of unmanned plane delivery |
| CN115285715A (en) * | 2022-08-19 | 2022-11-04 | 江铃汽车股份有限公司 | Intelligent cargo loading and unloading method and system |
| CN118761581B (en) * | 2024-06-27 | 2025-12-16 | 沃可空天科技(苏州)有限责任公司 | Shared unmanned aerial vehicle dispatching system and shared unmanned aerial vehicle dispatching method |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN204776032U (en) * | 2015-06-03 | 2015-11-18 | 朱威 | Many rotor unmanned aerial vehicle that transport safely |
| TW201545111A (en) * | 2014-05-29 | 2015-12-01 | xiao-zhong Li | Unmanned aerial vehicle for transporting commodity and method thereof |
| US20160068265A1 (en) * | 2014-09-10 | 2016-03-10 | International Business Machines Corporation | Package transport by unmanned aerial vehicles |
| WO2016134193A1 (en) * | 2015-02-19 | 2016-08-25 | Amazon Technologies, Inc. | Collective unmanned aerial vehicle configurations |
| US20160257423A1 (en) * | 2014-09-09 | 2016-09-08 | Joseph Martin | Unmanned Aerial Delivery System |
| WO2016140988A1 (en) * | 2015-03-02 | 2016-09-09 | Amazon Technologies, Inc. | Landing of unmanned aerial vehicles on moving transportation vehicles for transport |
Family Cites Families (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102685749B (en) * | 2012-05-30 | 2014-09-03 | 杭州师范大学 | Wireless safety authentication method orienting to mobile terminal |
| US20160012393A1 (en) * | 2014-07-14 | 2016-01-14 | Nutex Communications Corp. | Parcel delivery method using an unmanned aerial vehicle |
| US9359074B2 (en) * | 2014-09-08 | 2016-06-07 | Qualcomm Incorporated | Methods, systems and devices for delivery drone security |
| WO2016082177A1 (en) * | 2014-11-28 | 2016-06-02 | 深圳市大疆创新科技有限公司 | Unmanned aerial vehicle, and unmanned aerial vehicle delivery method and system |
| KR102175995B1 (en) * | 2015-02-23 | 2020-11-06 | 전대연 | Smart unmanned-transportation-object-used delivery completion system |
| CN104657842A (en) * | 2015-03-03 | 2015-05-27 | 付飞泉 | Intelligent logistics signing method and system |
| CN105160505A (en) * | 2015-07-24 | 2015-12-16 | 刘擂 | Unmanned aerial vehicle logistics transport system |
| CN105139178A (en) * | 2015-09-15 | 2015-12-09 | 余江 | Express delivery method and system based on unmanned aerial vehicle |
| CN205256665U (en) * | 2015-12-21 | 2016-05-25 | 谭圆圆 | Point -to -point system that reachs based on unmanned vehicles |
-
2016
- 2016-11-22 CN CN201680002950.5A patent/CN107004177B/en active Active
- 2016-11-22 WO PCT/CN2016/106749 patent/WO2018094554A1/en not_active Ceased
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TW201545111A (en) * | 2014-05-29 | 2015-12-01 | xiao-zhong Li | Unmanned aerial vehicle for transporting commodity and method thereof |
| US20160257423A1 (en) * | 2014-09-09 | 2016-09-08 | Joseph Martin | Unmanned Aerial Delivery System |
| US20160068265A1 (en) * | 2014-09-10 | 2016-03-10 | International Business Machines Corporation | Package transport by unmanned aerial vehicles |
| WO2016134193A1 (en) * | 2015-02-19 | 2016-08-25 | Amazon Technologies, Inc. | Collective unmanned aerial vehicle configurations |
| WO2016140988A1 (en) * | 2015-03-02 | 2016-09-09 | Amazon Technologies, Inc. | Landing of unmanned aerial vehicles on moving transportation vehicles for transport |
| CN204776032U (en) * | 2015-06-03 | 2015-11-18 | 朱威 | Many rotor unmanned aerial vehicle that transport safely |
Cited By (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2020117110A1 (en) * | 2018-12-07 | 2020-06-11 | Scania Cv Ab | Methods, control devices and vehicles for authentication of transport missions |
| SE544037C2 (en) * | 2018-12-07 | 2021-11-16 | Scania Cv Ab | Methods, control devices and vehicles for authentication of transport missions |
| US12050473B2 (en) | 2018-12-07 | 2024-07-30 | Scania Cv Ab | Methods, control devices and vehicles for authentication of transport missions |
| US20220141042A1 (en) * | 2018-12-29 | 2022-05-05 | Intel Corporation | Automatically verifying vehicle identity and validating vehicle presence |
| US12081680B2 (en) * | 2018-12-29 | 2024-09-03 | Intel Corporation | Automatically verifying vehicle identity and validating vehicle presence |
| US12091170B2 (en) * | 2020-04-17 | 2024-09-17 | Dish Network L.L.C. | Autonomous servicing of network devices |
| CN115473725A (en) * | 2022-09-08 | 2022-12-13 | 深圳市凯利华电子有限公司 | Security management method and system for network big data |
Also Published As
| Publication number | Publication date |
|---|---|
| CN107004177B (en) | 2024-03-19 |
| CN107004177A (en) | 2017-08-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2018094554A1 (en) | Method for improving security of unmanned aerial vehicle transportation, and unmanned aerial vehicle, terminal, server and computer program product | |
| US10504313B2 (en) | Locker system access control | |
| US20180130017A1 (en) | System and method to enable delivery and pick up of packages using pods and unmanned vehicles | |
| US11238679B2 (en) | Automated physical package delivery with end-to-end package security | |
| EP3304431B1 (en) | Open registry for identity of things | |
| US11074542B2 (en) | Automated delivery device and method for delivering a package | |
| EP3192059B1 (en) | First entry notification | |
| US7287693B2 (en) | Proximity validation system and method | |
| US20200160304A1 (en) | Systems and methods for secure remote data retrieval for key duplication | |
| CN110461658A (en) | Systems and methods for data storage in keyed devices | |
| US11265313B2 (en) | Authentication control device and authentication control method | |
| CN107231331A (en) | Implementation method and device for obtaining and issuing electronic certificates | |
| US20200067709A1 (en) | Methods, apparatuses, and computer program products for frictionlesscustody chain management | |
| WO2019229736A1 (en) | System and a method for granting ad-hoc access and controlling privileges to physical devices | |
| US11838422B1 (en) | User authentication method and unmanned delivery system based on user authentication | |
| CN116743850B (en) | Equipment discovery method and device based on Internet of things platform, computer equipment and storage medium | |
| CN106452516A (en) | NFC security system for logistics distribution system | |
| JP2023538860A (en) | System and method for verified messaging over short-range transceivers | |
| CN112492041B (en) | Article conveying method, user side, service cloud platform and internet unmanned aerial vehicle | |
| CN204707130U (en) | Unmanned vehicle send part Apparatus and system | |
| US11496296B2 (en) | Method of authentication for delivery of a product | |
| JP6387284B2 (en) | Authentication system, authentication device and authentication management server using position information | |
| KR101357180B1 (en) | Method and System for Relaying Contents by Using Messenger Service | |
| CN108830957B (en) | Intelligent article interaction system and method applied to private space entrance | |
| CN113439259A (en) | Providing virtual machines for centralized integration with peripheral devices including biometric devices |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WWE | Wipo information: entry into national phase |
Ref document number: 201680002950.5 Country of ref document: CN |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16922552 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 04/09/2019) |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 16922552 Country of ref document: EP Kind code of ref document: A1 |