[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN111259437B - Operation control method based on block chain and related equipment - Google Patents

Operation control method based on block chain and related equipment Download PDF

Info

Publication number
CN111259437B
CN111259437B CN202010030298.6A CN202010030298A CN111259437B CN 111259437 B CN111259437 B CN 111259437B CN 202010030298 A CN202010030298 A CN 202010030298A CN 111259437 B CN111259437 B CN 111259437B
Authority
CN
China
Prior art keywords
target object
data
blockchain
target
limit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010030298.6A
Other languages
Chinese (zh)
Other versions
CN111259437A (en
Inventor
王星雅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202010030298.6A priority Critical patent/CN111259437B/en
Publication of CN111259437A publication Critical patent/CN111259437A/en
Application granted granted Critical
Publication of CN111259437B publication Critical patent/CN111259437B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/04Programme control other than numerical control, i.e. in sequence controllers or logic controllers

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Traffic Control Systems (AREA)

Abstract

The embodiment of the application discloses a block chain-based operation control method, which comprises the following steps: acquiring operation data of a target object to be controlled; obtaining target constraint data from a blockchain; generating a prohibition instruction of the target object according to the operation data of the target object and the target limitation data; outputting the forbidden instruction to control the operation of the target object. The application combines the actual operation data of the target object and the safe and reliable limitation data to ensure that the target object realizes the limitation operation, thereby not only timely and effectively controlling the target object, but also ensuring the operation safety of the target object.

Description

Operation control method based on block chain and related equipment
Technical Field
The present application relates to the field of blockchain technologies, and in particular, to a blockchain-based operation control method, a blockchain-based operation control device, and a computer-readable storage medium.
Background
There are many objects in life that can be moved, including but not limited to aircraft, vehicles, boats, and even portable terminals; these movable objects may be referred to as runnability objects, and the course of movement of these runnability objects is referred to as runnability process. Services can be obtained by controlling the running process of the running object, for example: aerial photography, delivery or data acquisition and the like can be realized by controlling the flight process of an aircraft (such as an unmanned aerial vehicle); and the following steps: an LBS (Location Based Services, location based service) based service or the like can be obtained by controlling a moving process of the portable terminal. How to effectively control the operation process of an operation object becomes a current research hot spot.
Disclosure of Invention
The embodiment of the application provides a block chain-based operation control method and related equipment, which can timely and effectively control the operation process of a target object based on a block chain technology.
In one aspect, an embodiment of the present application provides a blockchain-based operation control method, including:
Acquiring operation data of a target object to be controlled;
Obtaining target constraint data from a blockchain;
generating a prohibition instruction of the target object according to the operation data of the target object and the target limit data;
Outputting the forbidden instruction to control the operation of the target object.
In one aspect, an embodiment of the present application provides a blockchain-based operation control device, including:
The system comprises an acquisition unit, a control unit and a control unit, wherein the acquisition unit is used for acquiring operation data of a target object to be controlled and acquiring target limitation data from a blockchain;
And the processing unit is used for generating a prohibition instruction of the target object according to the operation data of the target object and the target limit data, and outputting the prohibition instruction to control the operation of the target object.
In one aspect, an embodiment of the present application provides a blockchain-based operation control device, including: the system comprises a processor, a memory and a user interface, wherein the processor, the memory and the user interface are mutually connected, the memory is used for storing a computer program, the computer program comprises program instructions, and the processor is used for calling the program instructions and executing the block chain-based operation control method.
In one aspect, an embodiment of the present application provides a computer readable storage medium, where program instructions are stored, where the program instructions, when executed by a processor, implement the above-mentioned blockchain-based operation control method.
According to the embodiment of the application, the operation data of the target object to be controlled is obtained, and the target limitation data is obtained from the blockchain, and because the limitation data is stored in the blockchain, the safety and reliability of the limitation data can be ensured according to the fairness, disclosure and non-falsification characteristics of the blockchain, and the timely update of the limitation data is facilitated; in addition, a prohibition instruction of the target object is generated according to the operation data and the target restriction data of the target object, and the prohibition instruction is output to control the operation of the target object, so that the target object realizes restriction operation by combining the actual operation data and the safe and reliable restriction data of the target object, the target object is timely and effectively controlled, and the operation safety of the target object can be ensured.
Drawings
In order to more clearly illustrate the embodiments of the application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is an architecture diagram of a blockchain system provided by an exemplary embodiment of the present application;
FIG. 2 is a block chain architecture diagram provided in accordance with an exemplary embodiment of the present application;
FIG. 3 is a schematic diagram of an architecture of a blockchain-based operation control system provided by an exemplary embodiment of the present application;
FIG. 4 is a flowchart of a blockchain-based operation control method provided by an exemplary embodiment of the present application;
FIG. 5 is a flowchart of a blockchain-based operation control method provided by another exemplary embodiment of the present application;
FIG. 6a is a schematic illustration of the distance between the run position of the target object and the confinement region provided by an exemplary embodiment of the application;
FIG. 6b is a schematic illustration of the distance between the run position of the target object and the confinement region provided by another exemplary embodiment of the application;
FIG. 7 is a schematic diagram of a block chain based operation control device according to an exemplary embodiment of the present application;
Fig. 8 is a schematic structural diagram of a block chain-based operation control device according to an exemplary embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Embodiments of the present application relate to blockchain technology. The block chain is a set of basic framework which is decentralised and has the characteristic of distributed storage, in particular to a data structure which is formed by using a mode similar to a linked list for data blocks according to time sequence, can safely store data which have a precedence relationship and can be verified in a system, and ensures that the data cannot be tampered and counterfeited in a cryptography mode. FIG. 1 is an architecture diagram of a blockchain system provided by an exemplary embodiment of the present application; as shown in fig. 1, the blockchain system includes a plurality of distributed node devices (4 node devices are illustrated in the figure as an example), which may include, but are not limited to: PC (Personal Computer ), server, smart phone, tablet, mobile computer, etc. Each node device in the block chain system is networked in a P2P (Peer-to-Peer) mode, and the node devices are communicated with each other according to a P2P protocol; the blockchains are respectively stored in each node device in the blockchain system, and each node device commonly follows a broadcasting mechanism, a consensus mechanism (comprising a core mechanism such as a PoW (Proof Of Work) mechanism, a POS (Proof Of interest) mechanism and the like) so as to ensure consistency among the blockchains stored by each node device, commonly maintain the non-falsifiability and the non-falsifiability Of data on the blockchains, and simultaneously realize the characteristics Of decentralization, trust removal and the like Of the blockchains.
FIG. 2 is a block chain architecture diagram provided in accordance with an exemplary embodiment of the present application; the blockchain (Blockchain) includes a plurality of blocks that are concatenated in order of creation time stamps from small to large into a chain structure. The block is a data block, and information data is written into the block after processing. A block is created and then verified, agreed upon, and the block is allowed to be added to the blockchain after each node device in the blockchain system verifies and agrees with the block. New blocks are added at the end of the existing blockchain, and each node device in the blockchain system ensures that the newly added blocks of each node device are identical through a consensus mechanism and a broadcasting mechanism, and the new blocks are not removed once added into the blockchain. Block #1, block #2, and block #3 shown in fig. 2 are any connected three blocks on the blockchain. As shown in fig. 2, a plurality of transaction records are recorded in each block, and the transaction records contain the hash value of the previous block and the hash value of the current block, so that all the blocks store the hash value in the previous block in this way and are connected in sequence. Each chunk corresponds to a timestamp indicating the time that the chunk was created, and a larger timestamp for a chunk in the blockchain indicates a later creation of the chunk, and further indicates a later addition of the chunk to the blockchain. Because the blockchain has the characteristics of decentralization, distributed storage, non-falsification and the like of data, more and more business activities are developed based on the blockchain technology, so that fairness, openness and traceability of the business activities are ensured by utilizing the characteristics of the blockchain.
The embodiment of the application applies the blockchain technology to the field of operation control, provides a blockchain-based operation control scheme, stores limit data into a blockchain, can ensure the safety and reliability of the limit data according to the fairness, disclosure and tamper-proof characteristics of the blockchain, and is beneficial to timely updating the limit data; in the process of performing operation control on the target object, the operation data of the target object and the limitation data acquired from the blockchain are combined to generate a prohibition instruction of the target object, and the prohibition instruction is output to control the operation of the target object, so that the limitation operation of the target object is realized, the target object is timely and effectively controlled, and the operation safety of the target object can be ensured. The target object refers to a running object, namely an object capable of moving; the target object may include, but is not limited to, an aircraft, a vehicle, a ship, a portable terminal (e.g., PDA (tablet computer), a cellular phone, a smart wearable device), etc.
FIG. 3 is a schematic architecture diagram of a blockchain-based operation control system according to an exemplary embodiment of the present application, and as shown in FIG. 3, the operation control system includes at least a target object 301 and a blockchain system 303.
As shown in fig. 3, the target object 301 may include a terminal that may be an aircraft, a vehicle, or a portable terminal; the course of the target object 301 may generate operational data that may include, but is not limited to, operational altitude, operational speed, operational direction, operational position, operational acceleration, operational trajectory, and the like. The target object 301 is built with hardware devices supporting the operation of the target object 301 and hardware devices provided with sensing operation data, taking the target object 301 as an aircraft as an example, the built-in hardware devices may include, but are not limited to: sensors, GPS (Global Positioning System ) locators, communicators, running drives, engines, motors, propellers, etc.; wherein the sensor includes, but is not limited to, a gravity sensor, an acceleration sensor, etc., for sensing attitude data of the aircraft; the GPS locator may be used to locate the position of the aircraft. The operational data of the aircraft may be sensed by sensors in the aircraft and a GPS locator. The operation driving device is used for driving an engine, a motor, a propeller and the like in the aircraft to work so as to provide power to drive the aircraft to fly.
The operation of the target object 301 is controlled by an operation control device (not shown in the figure) of the target object 301, for example: the operation control device of the aircraft is used for controlling the flight direction, the flight track, the flight speed and the like of the aircraft; and the following steps: the running control means of the vehicle is used to control the running direction, running speed, and the like of the vehicle. In one implementation, the operation control means of the target object 301 may be provided inside the target object 301, which enables autonomous intelligent control of the target object 301; for example: the operation control device of the aircraft may be a flight control device provided inside the aircraft; the operation control device of the vehicle may be an in-vehicle control device of the vehicle interior, and the operation control device of the portable terminal may be a CPU (Central Processing Unit ) or a controller in the portable terminal. In another implementation, the operation control apparatus of the target object 301 may also be disposed in another device 302 external to the target object 301, so that remote control of the target object 301 may be implemented by the device 302. Here, device 302 is associated with target object 301, where association may refer to both being communicable. The operation control means within the associated device 302 may send a remote control instruction to the target object 301, the remote control instruction being used to control the operation process of the target object 301. In one implementation, the association device 302 may also provide a user interface in which the simulated appearance and operational data (e.g., operational location, operational trajectory, etc.) of the target object 301 can be displayed; for example: the associated device 302 of the aircraft may be a flight remote control that sends remote control instructions to the aircraft to control the flight of the aircraft; and the following steps: the associated device 302 of the vehicle may be a remote control device of the vehicle or an intelligent terminal in communication with the vehicle, controlling the operation of the vehicle by sending control instructions to hardware devices within the vehicle; and the following steps: the association device 302 of the portable terminal may be another terminal device that transmits an instruction to the portable terminal to control hardware devices within the portable terminal to operate to sense operation data of the portable terminal.
The blockchain system 303 includes a plurality of node devices that may include, but are not limited to, a node device for air travel regulation, a node device for municipal administration, a node device for traffic management, and the like. The node device may issue one or more restriction data on the blockchain according to air navigation management requirements, municipal management requirements, or traffic management requirements, each restriction data being stored in a block. In one embodiment, target object 301 may be a node device in blockchain system 303, so target object 301 may obtain constraint data from a block of the blockchain through a broadcast mechanism and a consensus mechanism. Similarly, the association device 302 of the target object 301 may also be a node device in the blockchain system 303, and may obtain constraint data from the blockchain blocks through a broadcast mechanism and a consensus mechanism. In another embodiment, the target object 301 may also be a device external to the blockchain system 303, and the target object 301 may communicate with a node device in the blockchain system 303 from which constraint data in a block of the blockchain is obtained. Similarly, the associated device 302 of the target object 301 may also be a device other than the blockchain system 303 from which restricted data in the blockchain's blocks may be obtained by communicating with the node devices in the blockchain system 303. The limitation data is data for limiting the operation of the operation target according to the specifications of the national government, the air navigation control agency, the traffic control agency, or other management agency. The limitation data may include, but is not limited to, at least one of the following: limit area, limit time, limit speed, limit altitude, limit route.
The operation control system shown in fig. 3 operates as follows: ① Acquiring operational data of the target object 301 by an operational control device, where the operational control device may obtain the operational data from a hardware device (e.g., sensor, GPS locator) of the target object 301; ② Acquiring limit data from blocks of a block chain by an operation control device, considering that the limit data can be updated, selecting a block with the largest timestamp from a plurality of blocks used for storing the limit data in the block chain in order to ensure the timely effectiveness of the operation control, so as to ensure that the limit data acquired from the selected block is updated limit data; ③ A prohibition instruction is generated by the operation control device in combination with the operation data and the limitation data, where the prohibition instruction refers to an instruction for instructing the target object 301 to adjust the operation process, for example: the disable instruction includes stop indication information, then the disable instruction is operable to indicate that the target object 301 is stopped; and the following steps: the disable instruction includes directional operation instruction information and carries a specified operation direction, and then the disable instruction may be used to instruct the target object 301 to operate in the specified operation direction. ④ Outputting, by the operation control means, the prohibition instruction to control the operation of the target object 301, thereby realizing the restricted operation of the target object 301; for example: the operation control device of the aircraft can send a prohibition instruction to the hardware device of the aircraft, wherein the prohibition instruction is used for instructing the hardware device of the aircraft to respond to the prohibition instruction and control the flight process of the aircraft so as to realize the restricted flight of the aircraft. And the following steps: the operation control device of the portable terminal can display a prohibition instruction on a user interface of the portable terminal to remind a user of the portable terminal to adjust the moving process in time so as to change the operation process of the portable terminal, thereby realizing the limitation operation control of the portable terminal. It will be appreciated that the operation control device may be a device built in the target object 301 or a device located in the association device 302.
Further, a controller (e.g., a remote control person of an aircraft, a user of a portable terminal) of the target object 301 may register in the blockchain system to become a registered user of the blockchain, and the registration process may be that the controller initiates a registration request to a node device in the blockchain system, where the registration request carries information of the controller; the identification of the controller may include at least one of an identification of the controller, information of the target object 301, information of the associated device 302 of the target object 301. The information of the associated device 302 may include an ID (Identity), a model number, an operation parameter, and other data information of the associated device, and the information of the target object 301 may include an ID, a model number, an operation parameter, a manufacturer ID, a manufacturer name, a registration time of the manufacturer, a manufacturer name, and other data information related to the target object. The identity and registration request of the controller is verified by each node device in the blockchain system, verification passing (if more than 50% or 2/3 of the node devices represent approval, verification passing) indicates successful registration, and the controller has both the public key and the private key. In this embodiment, the running data of the target object 301 may also be issued to the blockchain, specifically, the running data may be encrypted by using a private key of a controller and then issued to the blockchain, the node device in the blockchain system verifies the encrypted data by using a public key of the controller, and after the verification is passed, the running data is stored in a block and the block is added to the blockchain. Since the operation data and the limitation data of the target object 301 are stored in the blockchain and cannot be tampered, the operation process of the target object 301 can be effectively traced, that is, whether the actual operation process of the target object 301 meets the requirement of limitation operation can be supervised and controlled by the operation data and the limitation flight data in the blockchain, so that whether the operation rule of the national government, an air navigation control mechanism, a traffic control mechanism or other target object management mechanisms is violated by the target object 301 can be supervised and controlled, and effective management of the movement process of the target object 301 is realized.
According to the embodiment of the application, the limit data is stored in the block chain, and according to the fairness, disclosure and non-falsifiability characteristics of the block chain, the safety and reliability of the limit data can be ensured, and the timely update of the limit data is facilitated; in the process of performing operation control on the target object, the operation data of the target object and the limitation data acquired from the blockchain are combined to generate a prohibition instruction of the target object, and the prohibition instruction is output to control the operation of the target object, so that the limitation operation of the target object is realized, the target object is timely and effectively controlled, and the operation safety of the target object can be ensured.
It can be understood that the blockchain-based operation control system shown in fig. 3 is for more clearly describing the technical solution of the embodiment of the present application, and is not limited to the technical solution provided by the embodiment of the present application, and those skilled in the art can know that the technical solution provided by the embodiment of the present application is equally applicable to similar technical problems with the evolution of the system architecture and the occurrence of new operation control scenarios.
FIG. 4 is a flowchart of a blockchain-based operation control method provided by an exemplary embodiment of the present application; the method is performed by a run control means, which may be provided in the target object 301 and/or in the associated device 302 shown in fig. 3. The method comprises the following steps S401 to S404:
S401, acquiring operation data of a target object to be controlled.
The operational data of the target object is the relevant data representing the operational process of the target object sensed by the hardware devices (e.g., sensors, GPS locators) of the target object during the operational process. The operation control means may acquire the operation data of the target object from the hardware means of the target object. The operational data herein may include, but is not limited to, at least one of the following: running state, running altitude, running speed, running direction, running position, running track, etc. The operation state includes an operation start state, an operation in progress state, or an operation stop state. If the target object is a vehicle such as an aircraft or a vehicle, the running start state is used for representing a state that an engine, a motor and the like in the target object are about to run to generate power, and the target object is about to start but not yet started to run; the running state is used for representing the state that an engine, a motor and the like in a target object are in normal operation to generate power so as to push the target object to run; the operation stop state is a state in which the engine, motor, and the like in the target object stop and the target object is kept stationary. If the target object is a passive running portable terminal, the running starting state refers to a state that a hardware device in the portable terminal senses the action of external force and the action of external force is about to drive the portable terminal to run and output; the running state is used for representing a state that a hardware device in the portable terminal senses running data changing in real time and outputs; the operation stop state is used to represent a state in which a hardware device in the portable terminal senses that operation data of the portable terminal is output when no change occurs for a certain time.
S402, obtaining target limit data from a block chain.
The limitation data is data for limiting the operation process of the target object according to the specifications of the national government, an air navigation control agency, a traffic control agency, or other management agency. The limitation data may be classified into fixed limitation data, which may be limitation data related to an airport, a nuclear power plant, a government agency, a management area, and temporary limitation data, which may be limitation data having timeliness due to a race, an event, a fire, or the like. Specifically, the limitation data may include any one or more of a limitation area, a limitation time, a limitation speed, a limitation height, and a limitation route. At least one constraint data is included in the blockchain; the blockchain employing at least one block to store at least one set of constraint data; one group of limit data corresponds to one block, and one block is provided with a time stamp; the target constraint data is constraint data stored in a target block having a largest time stamp of the at least one block. The node device in the blockchain system can issue limit data to the blockchain at regular or irregular time according to actual needs (such as games, activities and the like), so that the limit data in the blockchain is updated, and in order to ensure timely effectiveness of flight control, the target limit data obtained by the flight control device in the step is the limit data stored in the block with the largest timestamp in a plurality of blocks used for storing the limit data in the blockchain, so that the target limit data is the updated limit data, and timely effectiveness of the limit control is ensured.
S403, generating a prohibition instruction of the target object according to the operation data of the target object and the target restriction data.
The prohibition instruction refers to an instruction for instructing the target object to adjust the running process, for example: the disable instruction includes stop indication information, then the disable instruction is operable to indicate that the target object is stopped; and the following steps: the prohibition instruction comprises directional operation instruction information and carries a specified operation direction, and then the prohibition instruction can be used for controlling the target object to operate along the specified operation direction; and the following steps: if the target object is an aircraft, the prohibition instruction comprises height limiting operation indication information and the carrying operation height is 150 meters, and the prohibition instruction is used for indicating the aircraft to fly at the height less than 150 meters.
S404, outputting a prohibition instruction to control the operation of the target object.
Outputting, by the operation control means, the prohibition instruction to control the operation of the target object 301, thereby realizing the restricted operation of the target object 301; for example: the operation control device of the aircraft can send a prohibition instruction to the hardware device of the aircraft, wherein the prohibition instruction is used for instructing the hardware device of the aircraft to respond to the prohibition instruction and control the flight process of the aircraft so as to realize the restricted flight of the aircraft. And the following steps: the operation control device of the portable terminal can display a prohibition instruction on a user interface of the portable terminal to remind a user of the portable terminal to adjust the moving process in time so as to change the operation process of the portable terminal, thereby realizing the limitation operation control of the portable terminal. Taking a target object as an aircraft as an example, the prohibition instruction comprises height-limiting operation instruction information, the height of the vehicle is 150 meters, and the operation data of the aircraft indicates that the current flight height is 160 meters, and then the operation control device sends the prohibition instruction to a hardware device in the aircraft to control the hardware device in the aircraft to descend the flight height to a height lower than 150 meters for flight.
According to the embodiment of the application, the limit data is stored in the block chain, and according to the fairness, disclosure and non-falsifiability characteristics of the block chain, the safety and reliability of the limit data can be ensured, and the timely update of the limit data is facilitated; in the process of performing operation control on the target object, the operation data of the target object and the limitation data acquired from the blockchain are combined to generate a prohibition instruction of the target object, and the prohibition instruction is output to control the operation of the target object, so that the limitation operation of the target object is realized, the target object is timely and effectively controlled, and the operation safety of the target object can be ensured.
FIG. 5 is a flowchart of a blockchain-based operation control method provided by another exemplary embodiment of the present application; the method is performed by a run control means, which may be provided in the target object 301 and/or in the associated device 302 shown in fig. 3. The method comprises the following steps S501 to S506:
s501, acquiring operation data of a target object to be controlled.
S502, obtaining target limit data from a block chain.
S503, generating a prohibition instruction of the target object according to the operation data of the target object and the target limitation data.
In one implementation, the operational data includes an operational state and an operational area; the target constraint data includes a constraint area; step S503 may specifically include: if the running state indicates that the target object is in a running starting state, judging whether the running area and the limiting area are overlapped or not; and if the target object is not overlapped, generating a first prohibition instruction, wherein the first prohibition instruction is used for indicating the target object to start running.
The restricted area refers to an area of restricted operation planned by a national government, an air navigation regulatory agency, a traffic regulatory agency, or other regulatory agency. The restricted area may include, but is not limited to: school area, banking area, etc. When the target object runs in the restricted area, the running process of the target object is restricted, for example: the running speed is limited, for example, the running speed of the vehicle when running to the school district cannot exceed 5 km/h, etc. The operation area and the limit area are overlapped, and the target object is in an operation starting state, which means that the target object is currently in the limit area and is not allowed to start operation. If the operation area does not overlap with the limit area, it is indicated that the current target object is not in the limit area, and operation can be started. For example, if the current target object is in an operation start state, its operation area is a town in a district in a city, and the specific area of the limitation area indicated in the target limitation data is the entire area of the district in the city, the operation area of the operation target object overlaps with the fly-limited area, and the operation target object does not allow the start of operation.
In one implementation, the operational data includes an operational state, an operational direction, and an operational position; the target constraint data includes a constraint area; step S503 may specifically include: if the running state indicates that the target object is in the running state, acquiring the distance between the running position and the limiting area; if the distance between the running position and the limiting area is smaller than the first distance threshold value and the running direction is the running direction close to the limiting area, generating a second prohibiting instruction, wherein the second prohibiting instruction is used for controlling the target object to run in the direction far away from the limiting area. The second disable instruction may also be used to control the target object to hover in the operational position when the target object is an aircraft.
FIG. 6a is a schematic illustration of the distance between the run position of the target object and the confinement region provided by an exemplary embodiment of the application; the present embodiment will be described taking a target object as an aircraft as an example. As shown in fig. 6a, the distance between the operating position and the limiting region can be determined as follows: ① Connecting the operating position with a central point of the limiting area; ② Determining an intersection point at which the connecting line intersects with the contour line of the limiting region; ③ Calculating the distance r between the running position and the intersection point; this distance r can be used to represent the distance between the operating position and the limit area.
FIG. 6b is a schematic illustration of the distance between the run position of the target object and the confinement region provided by another exemplary embodiment of the application; the present embodiment will be described taking a target object as an aircraft as an example. As shown in fig. 6b, the distance between the operating position and the limiting region can be determined as follows: drawing a circle by taking the running position of the target object (namely the current position point of the target object) as the center of a circle, wherein the drawn circle is tangent to the contour line of the limiting area; the smallest radius r is selected from all circles tangent to the edge of the limiting area as the distance between the running position of the target object and the limiting area.
The direction of travel of the target object may be a direction of travel closer to the limit area or a direction of travel farther from the limit area. The first distance threshold is a distance threshold set according to actual needs, and may be, for example, 30 meters, 60 meters, 10 meters, etc.
When the target object is stopped at the operation position outside the limit area, if an instruction to accelerate to the limit area is received, the operation control means refuses to execute the acceleration instruction and outputs warning information for prompting that the acceleration fails through the association device 302.
In one implementation, the operational data includes operational parameters; the target limit data includes a parameter limit range; step S503 may specifically include: detecting whether the operation parameters exceed the parameter limiting range; if the operation parameter exceeds the parameter limit range, a third prohibition instruction is generated, and the third prohibition instruction is used for instructing the target object to adjust the operation parameter within the parameter limit range, so that the operation of the target object can be prevented from violating the limit rule, and the effective control of the operation of the target object is realized. The operating parameters herein may include, but are not limited to, operating altitude, operating speed, etc., and accordingly, the parameter limit ranges may include an operating altitude limit range, an operating speed limit range, etc. The parameter limit range may be set according to actual situations, for example, the operation height limit range may be [90 meters, 102 meters ], [0, 120 meters), etc., and the operation speed limit range may be [60 km/hr ], 81 km/hr ], [0 km/hr, 120 km/hr), etc. Taking the target object as an aircraft as an example, setting the flying height of the aircraft as 150 meters and the limit range of the flying height as [0, 120 meters ], when the operating parameter exceeds the limit range of the parameter, generating a third prohibiting instruction, wherein the third prohibiting instruction is used for indicating that the flying height of the aircraft needs to be reduced to be within the limit range of the flying height to continue to operate, otherwise, the limit flying rule is violated. In addition, taking the target object as the portable terminal as an example, the set operation speed limit range may be [60 km/h, 81 km/h ], and the operation speed of the portable terminal is set to be 50 km/h, the operation parameter exceeds the parameter limit range, and a third prohibition instruction is generated, wherein the third prohibition instruction is used for indicating that the portable terminal needs to increase the operation speed to be within the parameter limit range, otherwise, the limit regulation is violated.
In one implementation, the operational data includes an operational location; the target restriction data includes a forbidden zone region; step S503 may specifically include: acquiring the distance between the running position and the forbidden zone area; if the distance between the running position and the forbidden zone area is smaller than a second distance threshold value, acquiring the associated position of the target object; a fourth inhibit instruction is generated, the fourth inhibit instruction being for indicating that the target object is to be run to the associated location.
The restricted area refers to an area of restricted operation planned by a national government, an air navigation regulatory agency, a traffic regulatory agency, or other regulatory agency, for example: the exclusion zone area may include an area where an event is located, an area where an outsider event is located, and the like. The calculation manner of the distance between the operation position and the forbidden region may refer to the calculation manner of the distance between the operation position and the restricted region, which is not described herein. The second distance threshold is a distance threshold set according to actual needs, and may be, for example, 10 meters, 20 meters, 5 meters, etc. The first distance threshold may be equal to or different from the second distance threshold. Here, the associated position of the target object may refer to a running start position of the target object, for example: the associated position carried by the fourth prohibition instruction is the flight starting point position of the aircraft, and the fourth prohibition instruction indicates that the aircraft returns to the flight starting point position. The associated position of the target object may refer to any position away from the exclusion zone region, where a distance between the any position and the exclusion zone region is greater than a second distance threshold, for example: the associated position carried by the fourth prohibition instruction is a position far away from the forbidden area, and the fourth prohibition instruction indicates that the portable terminal needs to operate to the corresponding position far away from the forbidden area. By the fourth forbidden instruction, the target object can be prevented from intruding into the forbidden area to violate the corresponding forbidden instruction.
S504, outputting a prohibition instruction to control the operation of the target object.
The manner of outputting the prohibition instruction may include sending, displaying, etc., which is not limited by the embodiment of the present application; for example: the operation control device of the aircraft can send a prohibition instruction to the hardware device of the aircraft, wherein the prohibition instruction is used for instructing the hardware device of the aircraft to respond to the prohibition instruction and control the flight process of the aircraft so as to realize the restricted flight of the aircraft; and the following steps: the operation control device of the portable terminal may display a prohibition instruction on a user interface of the portable terminal, and at this time, the prohibition instruction may be "the front is a restricted area, please turn to operate", "the front is a restricted area, please operate to an associated location", etc., to remind a user of the portable terminal to adjust the moving process in time to change the operation process of the portable terminal, so as to implement the restricted operation control of the portable terminal.
In the embodiment of the application, the operation control device can also generate and output some prompt information according to the operation process of the target object, and the prompt information can be, for example, "you have entered the restricted area, please carefully operate-! "" about to enter the forbidden region, need to get away from-! "etc., the hint information may be output directly in the target object, for example: if the target object is a portable terminal, the prompt information can be directly displayed in the portable terminal; and the following steps: if the target object is an aircraft or a vehicle, the prompt information can be output on the target object in a voice mode. The presentation information may be transmitted to the association device 302 of the target object to be output. The intelligent of man-machine interaction in the operation control process can be improved through the output of the prompt information.
S505, uploading the operation data of the target object to the blockchain.
The running data of the target object may also be issued to the blockchain, specifically, the running data may be encrypted by using a private key of the controller and then issued to the blockchain, the node device in the blockchain system verifies the encrypted data by using a public key of the controller, and after the verification, the running data is stored in a block and the block is added to the blockchain. Because the operation data and the limitation data of the target object are stored in the blockchain and cannot be tampered, the operation process of the target object can be effectively traced, namely, whether the actual operation process of the target object accords with the requirement of limitation operation or not can be supervised and controlled through the operation data and the limitation data in the blockchain, and therefore whether the operation regulation of the national government, an air navigation control mechanism, a traffic control mechanism or other management mechanisms is violated by the target object can be supervised and controlled, and the effective management of the operation process of the target object is realized.
According to the embodiment of the application, the limit data is stored in the block chain, and according to the fairness, disclosure and non-falsifiability characteristics of the block chain, the safety and reliability of the limit data can be ensured, and the timely update of the limit data is facilitated; in the process of performing operation control on the target object, the operation data of the target object and the limitation data acquired from the blockchain are combined to generate a prohibition instruction of the target object, and the prohibition instruction is output to control the operation of the target object, so that the limitation operation of the target object is realized, the target object is timely and effectively controlled, and the operation safety of the target object can be ensured.
Based on the description of the embodiment of the operation control method based on the blockchain, the application also discloses a structural schematic diagram of an operation control device based on the blockchain, which is provided by an exemplary embodiment. The operation control means may be provided in the target object 301 and/or in the associated terminal 302 shown in fig. 3; and the operation control means may be used to perform the method shown in fig. 4 or fig. 5. Referring to fig. 7, the operation control device may operate the following units:
An acquiring unit 701, configured to acquire operation data of a target object to be controlled, and to acquire target constraint data from a blockchain;
the processing unit 702 is configured to generate a prohibition instruction of the target object according to the operation data of the target object and the target constraint data, and to output the prohibition instruction to control the operation of the target object.
In one implementation, at least one constraint data may be included in a blockchain; the blockchain employing at least one block to store at least one constraint data; one limit data corresponds to one block, and one block is provided with a time stamp; the target constraint data is constraint data stored in a target block having a largest time stamp of the at least one block.
In one implementation, the processing unit 702 is also configured to upload the operational data of the target object into the blockchain.
In one implementation, the operational data includes an operational state and an operational area; the target constraint data includes a constraint area; the processing unit 702 is specifically configured to generate a prohibition instruction of the target object according to the operation data of the target object and the target constraint data, and may specifically include: if the running state indicates that the target object is in a running starting state, judging whether the running area and the limiting area are overlapped or not; and if the target object is not overlapped, generating a first prohibition instruction, wherein the first prohibition instruction is used for indicating the target object to start running.
In one implementation, the operational data includes an operational state, an operational direction, and an operational position; the target constraint data includes a constraint area; the processing unit 702 is specifically configured to: if the running state indicates that the target object is in the running state, acquiring the distance between the running position and the limiting area; if the distance between the running position and the limiting area is smaller than the first distance threshold value and the running direction is the running direction close to the limiting area, generating a second prohibiting instruction, wherein the second prohibiting instruction is used for controlling the running target object to run in the direction far away from the limiting area.
In one implementation, the operational data includes operational parameters; the target limit data includes a parameter limit range; the processing unit 702 is specifically configured to: detecting whether the operation parameters exceed the parameter limiting range; and if the operating parameter exceeds the parameter limiting range, generating a third prohibiting instruction, wherein the third prohibiting instruction is used for indicating the target object to adjust the operating parameter to be within the parameter limiting range.
In one implementation, the operating parameters include an operating altitude, and the parameter limit range may include an operating altitude limit range; or the operating parameter may include an operating speed and the parameter limit range includes an operating speed limit range.
In one implementation, the operational data includes an operational location; the target restriction data includes a forbidden zone region; the processing unit 702 is specifically configured to: acquiring the distance between the running position and the forbidden zone area; if the distance between the running position and the forbidden zone area is smaller than a second distance threshold value, acquiring the associated position of the target object; a fourth inhibit instruction is generated, the fourth inhibit instruction being for indicating that the target object is to be run to the associated location.
According to the embodiment of the application, the operation data of the target object to be controlled is obtained, and the target limitation data is obtained from the blockchain, and because the limitation data is stored in the blockchain, the safety and reliability of the limitation data can be ensured according to the fairness, disclosure and non-falsification characteristics of the blockchain, and the timely update of the limitation data is facilitated; in addition, a prohibition instruction of the target object is generated according to the operation data and the target restriction data of the target object, and the prohibition instruction is output to control the operation of the target object, so that the target object realizes restriction operation by combining the actual operation data and the safe and reliable restriction data of the target object, the target object is timely and effectively controlled, and the operation safety of the target object can be ensured.
Referring to fig. 8, fig. 8 is a schematic structural diagram of a blockchain-based operation control device according to an exemplary embodiment of the present application, where the device includes a processor 801 and a memory 802, and the processor 801 and the memory 802 are connected by one or more communication buses.
The processor 801 is configured to support blockchain-based operation control devices in performing the corresponding functions of the blockchain-based operation control devices in the methods of fig. 4 and 5. The processor 801 may be a central processing unit (centralprocessingunit, CPU), a network processor (networkprocessor, NP), a hardware chip, or any combination thereof.
The memory 802 is used for storing program codes and the like. The memory 802 may include volatile memory (volatilememory), such as Random Access Memory (RAM); the memory 802 may also include non-volatile memory (non-volatilememory), such as read-only memory (ROM), flash memory (flashmemory), hard disk (HDD) or Solid State Drive (SSD); memory 802 may also include combinations of the above types of memory.
In an embodiment of the present application, the processor 801 may call program code stored in the memory 802 to perform the following operations:
Acquiring operation data of a target object to be controlled;
Obtaining target constraint data from a blockchain;
generating a prohibition instruction of the target object according to the operation data of the target object and the target limitation data;
and outputting a prohibition instruction to control the operation of the target object.
In one implementation, at least one constraint data may be included in a blockchain; the blockchain employing at least one block to store at least one constraint data; one limit data corresponds to one block, and one block is provided with a time stamp; the target constraint data is constraint data stored in a target block having a largest time stamp of the at least one block.
In one implementation, the processor 801 may also upload the running data of the target object into the blockchain.
In one implementation, the operational data includes an operational state and an operational area; the target constraint data includes a constraint area; the processor 801 generates a prohibition instruction of the target object according to the operation data of the target object and the target limitation data, which may specifically include: if the running state indicates that the target object is in a running starting state, judging whether the running area and the limiting area are overlapped or not; and if the target object is not overlapped, generating a first prohibition instruction, wherein the first prohibition instruction is used for indicating the target object to start running.
In one implementation, the operational data includes an operational state, an operational direction, and an operational position; the target constraint data includes a constraint area; the processor 801 generates a prohibition instruction of the target object according to the operation data of the target object and the target limitation data, which may specifically include: if the running state indicates that the target object is in the running state, acquiring the distance between the running position and the limiting area; if the distance between the running position and the limiting area is smaller than the first distance threshold value and the running direction is the running direction close to the limiting area, generating a second prohibiting instruction, wherein the second prohibiting instruction is used for controlling the target object to run in the direction far away from the limiting area.
In one implementation, the operational data includes operational parameters; the target limit data includes a parameter limit range; the processor 801 generates a prohibition instruction of the target object according to the operation data of the target object and the target limitation data, which may specifically include: detecting whether the operation parameters exceed the parameter limiting range; if the operating parameter exceeds the parameter limiting range, a third prohibiting instruction is generated, and the third prohibiting instruction is used for indicating the target object to adjust the operating parameter to be within the parameter limiting range.
In one implementation, the operating parameters include an operating altitude, and the parameter limit ranges include an operating altitude limit range; or the operating parameter comprises an operating speed and the parameter limit range comprises an operating speed limit range.
In one implementation, the operational data includes an operational location; the target restriction data includes a forbidden zone region; the processor 801 generates a prohibition instruction of the target object according to the operation data of the target object and the target limitation data, which may specifically include: acquiring the distance between the running position and the forbidden zone area; if the distance between the running position and the forbidden zone area is smaller than a second distance threshold value, acquiring the associated position of the target object; a fourth inhibit instruction is generated, the fourth inhibit instruction being for indicating that the target object is to be run to the associated location.
According to the embodiment of the application, the limit data is stored in the block chain, and according to the fairness, disclosure and non-falsifiability characteristics of the block chain, the safety and reliability of the limit data can be ensured, and the timely update of the limit data is facilitated; in the process of performing operation control on the target object, the operation data of the target object and the limitation data acquired from the blockchain are combined to generate a prohibition instruction of the target object, and the prohibition instruction is output to control the operation of the target object, so that the limitation operation of the target object is realized, the target object is timely and effectively controlled, and the operation safety of the target object can be ensured.
Embodiments of the present application also provide a computer readable storage medium, which may be used to store computer program instructions for implementing the blockchain-based operation control method in the embodiments shown in fig. 4 and 5, where the computer readable storage medium includes, but is not limited to, a flash memory, a hard disk, and a solid state disk.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the processes or functions in accordance with embodiments of the present application are produced in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in or transmitted across a computer-readable storage medium. The computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by a wired (e.g., coaxial cable, fiber optic, digital Subscriber Line (DSL)), or wireless (e.g., infrared, wireless, microwave, etc.). Computer readable storage media can be any available media that can be accessed by a computer or data storage devices, such as servers, data centers, etc., that contain an integration of one or more available media. Usable media may be magnetic media (e.g., floppy disks, hard disks, magnetic tape), optical media (e.g., DVD), or semiconductor media (e.g., solid state disk (SolidStateDisk, SSD)), or the like.
The foregoing is merely illustrative embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think about variations or substitutions within the technical scope of the present application, and the application should be covered. Therefore, the protection scope of the application is subject to the protection scope of the claims.

Claims (7)

1. A blockchain-based operation control method, comprising:
Uploading the running data of the target object to be controlled into the blockchain, including: encrypting the operation data of the target object by adopting a private key of a controller and then issuing the operation data into the blockchain, so that node equipment in a blockchain system verifies the encrypted operation data by adopting the public key of the controller, after the verification is passed, storing the operation data of the target object into a preset block, and adding the preset block into the blockchain; wherein, the controller of the target object is a registered user of the blockchain, and the operation data comprises an operation state and an operation area;
acquiring operation data of the target object from the blockchain;
Obtaining target constraint data from the blockchain; wherein the blockchain includes at least one constraint data therein; the blockchain employing at least one block to store the at least one constraint data; one of the limit data corresponds to one of the blocks, and one of the blocks is provided with a time stamp; the target limit data is limit data stored in a target block with the largest timestamp in the at least one block, and the target limit data comprises at least one of a limit area, a limit time, a limit speed, a limit height and a limit route;
generating a prohibition instruction of the target object according to the operation data of the target object and the target limitation data;
Outputting the forbidden instruction to control the operation of the target object;
The target limitation data includes a limitation area, and the generation of the prohibition instruction of the target object according to the operation data of the target object and the target limitation data includes: if the running state indicates that the target object is in a starting state, judging whether the running area and the limiting area are overlapped, and if not, generating a first prohibition instruction, wherein the first prohibition instruction is used for indicating the target object to start running.
2. The method of claim 1, wherein the operational data comprises an operational status, an operational direction, and an operational location; the target limit data includes a limit area;
the generating a prohibition instruction of the target object according to the operation data of the target object and the target limitation data includes:
if the running state indicates that the target object is in the running state, acquiring the distance between the running position and the limiting area;
And if the distance between the running position and the limiting area is smaller than a first distance threshold value and the running direction is the running direction close to the limiting area, generating a second prohibiting instruction, wherein the second prohibiting instruction is used for indicating the target object to run in the direction far away from the limiting area.
3. The method of claim 1, wherein the operational data comprises operational parameters; the target limit data includes a parameter limit range;
the generating a prohibition instruction of the target object according to the operation data of the target object and the target limitation data includes:
detecting whether the operating parameter exceeds the parameter limit range;
And if the operating parameter exceeds the parameter limiting range, generating a third prohibiting instruction, wherein the third prohibiting instruction is used for indicating the target object to adjust the operating parameter to be within the parameter limiting range.
4. A method according to claim 3, wherein the operating parameter comprises an operating altitude, and the parameter limit range comprises an operating altitude limit range; or the operating parameter comprises an operating speed and the parameter limit range comprises an operating speed limit range.
5. The method of claim 1, wherein the operational data comprises an operational location; the target limit data includes a forbidden zone region;
the generating a prohibition instruction of the target object according to the operation data of the target object and the target limitation data includes:
acquiring the distance between the running position and the forbidden zone area;
if the distance between the running position and the forbidden zone area is smaller than a second distance threshold value, acquiring the associated position of the target object;
And generating a fourth prohibiting instruction, wherein the fourth prohibiting instruction is used for indicating the target object to run to the associated position.
6. A blockchain-based operation control device, the operation control device comprising: a processor, a memory and a user interface, the processor, the memory and the user interface being interconnected, wherein the memory is for storing a computer program comprising program instructions, the processor being configured to invoke the program instructions to perform the blockchain-based operation control method of any of claims 1 to 5.
7. A computer readable storage medium having stored therein program instructions which, when executed by a processor, implement the blockchain-based operation control method of any of claims 1 to 5.
CN202010030298.6A 2020-01-09 2020-01-09 Operation control method based on block chain and related equipment Active CN111259437B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010030298.6A CN111259437B (en) 2020-01-09 2020-01-09 Operation control method based on block chain and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010030298.6A CN111259437B (en) 2020-01-09 2020-01-09 Operation control method based on block chain and related equipment

Publications (2)

Publication Number Publication Date
CN111259437A CN111259437A (en) 2020-06-09
CN111259437B true CN111259437B (en) 2024-10-15

Family

ID=70950416

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010030298.6A Active CN111259437B (en) 2020-01-09 2020-01-09 Operation control method based on block chain and related equipment

Country Status (1)

Country Link
CN (1) CN111259437B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113835390B (en) * 2021-08-16 2023-09-05 国网新源控股有限公司 Distributed control method and related equipment for pumped storage power station based on block chain

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104991564A (en) * 2015-05-27 2015-10-21 杨珊珊 Flight control method and device for unmanned aerial vehicle
CN109885629A (en) * 2019-01-14 2019-06-14 平安科技(深圳)有限公司 A kind of unmanned plane management method, device, computer system and readable storage medium storing program for executing
CN110024013A (en) * 2017-11-08 2019-07-16 深圳市大疆创新科技有限公司 Air traffic control method, equipment and the unmanned vehicle of unmanned vehicle

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015157883A1 (en) * 2014-04-17 2015-10-22 SZ DJI Technology Co., Ltd. Flight control for flight-restricted regions
CN107132852B (en) * 2017-03-31 2019-10-25 西安戴森电子技术有限公司 A kind of unmanned plane supervision cloud platform based on Beidou geography fence Differential positioning module
CN107748679A (en) * 2017-09-28 2018-03-02 努比亚技术有限公司 A kind of run-limiting method, terminal and computer-readable recording medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104991564A (en) * 2015-05-27 2015-10-21 杨珊珊 Flight control method and device for unmanned aerial vehicle
CN110024013A (en) * 2017-11-08 2019-07-16 深圳市大疆创新科技有限公司 Air traffic control method, equipment and the unmanned vehicle of unmanned vehicle
CN109885629A (en) * 2019-01-14 2019-06-14 平安科技(深圳)有限公司 A kind of unmanned plane management method, device, computer system and readable storage medium storing program for executing

Also Published As

Publication number Publication date
CN111259437A (en) 2020-06-09

Similar Documents

Publication Publication Date Title
Maple et al. A connected and autonomous vehicle reference architecture for attack surface analysis
CN107615359B (en) Authentication system and method for detecting unauthorized unmanned aerial vehicle activity
CN107408352B (en) System and method for geo-fencing device communication
CN107430403B (en) System and method with geo-fencing device level
CN107533331B (en) Geo-fencing device with dynamic characteristics
CN107531324B (en) System and method for mobile geofencing
CN107409174B (en) System and method for regulating operation of an unmanned aerial vehicle
CN110015418B (en) Authentication system and method for generating flight controls
CN107409051B (en) Authentication system and method for generating flight controls
CN107615785B (en) System and method for displaying geofence device information
KR20180063789A (en) Method and system for integrated managing vehicle operation status
US9947233B2 (en) Method and system to improve safety concerning drones
US11501640B2 (en) Processing device, processing method, and processing program
CN107430402B (en) System and method for identifying and authenticating geo-fence devices
CN107408351B (en) Authentication system and method for generating flight controls
EP2710574B1 (en) Aircraft navigation system
CN101385057A (en) Apparatus and methods for speed management and control
CN109756548B (en) Data processing method, system and device for intelligent networked automobile cloud control basic platform
CN107209018A (en) Method and apparatus for providing of interest information
US12079343B2 (en) Tamper-resistant geo-fence system for drones
US20210109538A1 (en) Restricted area autonomous vehicle control techniques
WO2022113584A1 (en) Information processing device, information processing system, and information processing method
KR102054550B1 (en) Apparatus and method for providing road construction information
CN111259437B (en) Operation control method based on block chain and related equipment
Hernandez et al. Applications of Cloud Computing in Intelligent Vehicles: A Survey

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40024196

Country of ref document: HK

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TG01 Patent term adjustment