WO2017143570A1 - Method and device for device authentication, authentication device, unmanned aerial vehicle and remote controller - Google Patents
Method and device for device authentication, authentication device, unmanned aerial vehicle and remote controller Download PDFInfo
- Publication number
- WO2017143570A1 WO2017143570A1 PCT/CN2016/074581 CN2016074581W WO2017143570A1 WO 2017143570 A1 WO2017143570 A1 WO 2017143570A1 CN 2016074581 W CN2016074581 W CN 2016074581W WO 2017143570 A1 WO2017143570 A1 WO 2017143570A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- drone
- authentication
- remote controller
- authentication device
- operation result
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08C—TRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
- G08C17/00—Arrangements for transmitting signals characterised by the use of a wireless electrical link
- G08C17/02—Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0877—Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Definitions
- the embodiments of the present invention relate to the technical field of drones, and in particular, to a device authentication method, device, authentication device, drone, and remote controller.
- the general way for the user to operate the drone is to use the remote control to realize the flight control of the drone by remote control.
- the remote control to realize the flight control of the drone by remote control.
- the smart phone can be connected with the remote controller, so that the smart phone can receive the image of the aerial image taken by the drone through the remote controller.
- the premise that the smartphone can receive the image is that the smartphone can communicate with the drone or remote controller. Therefore, in order to ensure that the user terminal device such as a smart phone can receive the image image taken by the drone or can perform flight control on the drone, first, the user terminal device needs to authenticate the drone and the remote controller to determine the user terminal. The device can communicate with it.
- the authentication method adopted is: an encryption authentication chip is implanted in both the drone and the remote controller, and based on the encryption authentication chip, the user terminal device respectively authenticates the drone and the remote controller.
- the encryption authentication chip needs to be implanted in both the UAV and the remote controller, which not only increases the hardware cost, but also the authentication processing efficiency is relatively low.
- Embodiments of the present invention provide a device authentication method, device, authentication device, a drone, and a remote controller, which enable high-efficiency authentication of different devices in the UAV system and reduce hardware costs through remote authentication.
- a first aspect of the present invention provides a device authentication method, including:
- the authentication device transmits authentication data to the drone to cause the drone to forward the authentication data to a remote controller, the authentication data being used to cause the remote controller to adopt a key pair included in the encryption authentication chip
- the authentication data is subjected to an encryption operation to obtain an operation result; wherein the remote controller is implanted There is the encryption authentication chip;
- the authentication device receives the operation result that the remote controller forwards through the drone
- the authentication device determines that communication with the drone is determined when determining that the operation result is correct.
- the determining, when determining that the operation result is correct, determining that the UAV can communicate with the UAV includes:
- the authentication device performs an operation on the authentication data according to a locally stored encryption authentication algorithm to obtain a target operation result
- the authentication device determines that communication with the drone is determined when determining that the operation result is consistent with the target operation result.
- the determining, when determining that the operation result is correct, determining that the UAV can communicate with the UAV includes:
- the authentication device determines that communication with the drone is possible when determining that the decrypted result is consistent with the authentication data.
- the method further includes:
- the authentication device authenticates the remote controller according to the encrypted authentication chip implanted in the remote controller.
- the authentication device is connected to the drone The method further includes:
- the authentication device directly receives data information sent by the drone to the authentication device, and the data information includes image data.
- the authentication device is connected to the drone The method further includes:
- the authentication device directly sends a drone upgrade command to the drone to enable the drone to execute the drone upgrade command to complete a corresponding upgrade operation.
- the authentication device is connected to the drone, and the method further includes:
- the authentication device directly sends a remote controller upgrade instruction to the drone to cause the drone to forward the remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction , complete the corresponding upgrade operation.
- a second aspect of the present invention provides a device authentication method, including:
- the drone receives the authentication data sent by the authentication device
- the drone transmits the authentication data to the remote controller, so that the remote controller encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, and the remote controller is implanted There is the encryption authentication chip;
- the drone receives the operation result sent by the remote controller, and sends the operation result to the authentication device, and when it is determined that the operation result is correct, determines that the communication device can communicate with the authentication device.
- the drone is connected to the authentication device, the method further includes:
- the drone directly transmits data information to the authentication device, the data information including image data.
- the drone is connected to the authentication device, the method further includes:
- the drone directly receives the drone upgrade command sent by the authentication device, and executes the drone upgrade command to complete the corresponding upgrade operation.
- the drone is connected to the authentication device, the method further includes:
- the drone directly receives the remote controller upgrade command sent by the authentication device, and forwards the remote controller upgrade command to the remote controller, so that the remote controller executes the remote controller upgrade command to complete the corresponding upgrade. operating.
- a third aspect of the present invention provides a device authentication method, including:
- the remote controller encrypts the authentication data by using a key included in the encryption authentication chip Calculating, obtaining the operation result, the remote controller is implanted with the encryption authentication chip;
- the remote controller transmits the operation result to the drone to cause the drone to forward the operation result to the authentication device, and the operation result is used to cause the authentication device to determine When the result of the operation is correct, it is determined that the authentication device can communicate with the drone.
- the cryptographic authentication chip implanted in the remote controller is further configured to enable the authentication device to perform the The remote control is authenticated.
- the method further includes:
- the remote controller receives a remote controller upgrade command sent from the authentication device and forwarded by the drone, and executes the remote controller upgrade command to complete a corresponding upgrade operation.
- a fourth aspect of the present invention provides another device authentication method, including:
- the authentication device transmits authentication data to the remote controller to cause the remote controller to forward the authentication data to the drone, the authentication data for causing the drone to adopt a key pair included in the encryption authentication chip
- the authentication data is subjected to an encryption operation to obtain an operation result; wherein the encryption authentication chip is implanted in the drone;
- the authentication device receives the operation result forwarded by the drone through the remote controller
- the authentication device determines that communication with the remote controller is possible when determining that the operation result is correct.
- the determining, when determining that the operation result is correct, determining that the remote controller can communicate with the remote controller includes:
- the authentication device performs an operation on the authentication data according to a locally stored encryption authentication algorithm to obtain a target operation result
- the authentication device determines that communication with the remote controller is possible when determining that the operation result is consistent with the target operation result.
- the determining, when determining that the operation result is correct, determining that the remote controller can communicate with the remote controller includes:
- the remote control communicates.
- the authentication device is connected to the remote controller, the method further includes:
- the authentication device directly sends a remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction to complete a corresponding upgrade operation.
- the authentication device is connected to the remote controller, the method further includes:
- the authentication device directly sends a drone upgrade command to the remote controller, so that the remote controller forwards the drone upgrade command to the drone, so that the drone performs the unmanned Machine upgrade instructions to complete the corresponding upgrade operation.
- the authentication device is connected to the drone, the method further includes:
- the authentication device directly receives data information sent by the drone to the authentication device, and the data information includes image data.
- the authentication device is connected to the drone, the method further includes:
- the authentication device directly sends a drone upgrade command to the drone to enable the drone to execute the drone upgrade command to complete a corresponding upgrade operation.
- the method further includes:
- the authentication device authenticates the drone according to the encrypted authentication chip implanted in the drone.
- a fifth aspect of the present invention provides a device authentication method, including:
- the remote controller receives the authentication data sent by the authentication device
- the remote controller sends the authentication data to the drone, so that the drone encrypts the authentication data by using a key included in the encryption authentication chip, and obtains an operation result, in the drone Implanted with the encrypted authentication chip;
- the remote controller receives the operation result sent by the drone, and sends the operation result to the authentication device, and determines that the communication device can communicate with the authentication device when determining that the operation result is correct.
- the remote controller is connected to the authentication device, the method further includes:
- the remote controller directly receives the remote controller upgrade command sent by the authentication device, and executes the remote controller upgrade command to complete the corresponding upgrade operation.
- the remote controller is connected to the authentication device, the method further includes:
- the remote controller directly receives the drone upgrade command sent by the authentication device, and forwards the drone upgrade command to the drone to enable the drone to execute the drone upgrade command , complete the corresponding upgrade operation.
- a sixth aspect of the present invention provides a device authentication method, including:
- the drone receives the authentication data sent by the remote controller, and the authentication data is sent by the authentication device to the remote controller and forwarded by the remote controller;
- the UAV encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted in the UAV;
- the drone transmits the operation result to the remote controller, so that the remote controller forwards the operation result to the authentication device, and the operation result is used to cause the authentication device to determine the When the result of the operation is correct, it is determined that the authentication device is capable of communicating with the remote controller.
- the cryptographic authentication chip that is implanted in the UAV is further configured to enable the authentication device to perform, according to the cryptographic authentication chip pair The drone is certified.
- the drone directly transmits data information to the authentication device, the data information including image data.
- the drone is connected to the authentication device, the method further includes:
- the drone directly receives the drone upgrade command sent by the authentication device, and executes the drone upgrade command to complete the corresponding upgrade operation.
- the remote controller is connected to the authentication device, and the method further includes:
- the drone receives the drone upgrade command sent from the authentication device and forwarded by the drone, and executes the drone upgrade command to complete a corresponding upgrade operation.
- a seventh aspect of the present invention provides a device authentication device, where the device authentication device is disposed in an authentication device, where the device authentication device includes:
- a sending module configured to send the authentication data to the drone, so that the drone forwards the authentication data to a remote controller, where the authentication data is used to enable the remote controller to adopt a key included in the encrypted authentication chip Performing an encryption operation on the authentication data to obtain an operation result; wherein the encryption authentication chip is implanted in the remote controller;
- a receiving module configured to receive the operation result that is forwarded by the remote controller by the drone
- a processing module configured to determine, when the operation result is correct, to be able to communicate with the drone.
- the processing module is configured to: perform operation on the authentication data according to a locally stored encryption authentication algorithm, to obtain a target operation result;
- the processing module is specifically configured to:
- the processing module is further configured to:
- the remote controller is authenticated according to the encrypted authentication chip implanted in the remote controller.
- the authentication device is connected to the drone
- the receiving module is further configured to:
- the authentication device is connected to the UAV, and the sending module is further configured to:
- the authentication device is connected to the drone
- the sending module is further configured to:
- An eighth aspect of the present invention provides a device authentication device, where the device authentication device is disposed in a drone, and the device authentication device includes:
- a receiving module configured to receive authentication data sent by the authentication device
- a sending module configured to send the authentication data to the remote controller, so that the remote controller performs encryption operation on the authentication data by using a key included in the encryption authentication chip, and obtains an operation result, where the remote controller is implanted There is the encryption authentication chip;
- the receiving module is further configured to receive the operation result sent by the remote controller, and send the operation result to the authentication device, and when determining that the operation result is correct, determine that the operation may be performed with the authentication device. Communication.
- the drone is connected to the authentication device, and the sending module is further configured to:
- Data information is transmitted directly to the authentication device, the data information including image data.
- the drone is connected to the authentication device, and the receiving module is further configured to:
- the device also includes:
- the processing module is configured to execute the drone upgrade command to complete a corresponding upgrade operation.
- the drone is connected to the authentication device, and the receiving module is further configured to:
- the sending module is further configured to: forward the remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction to complete a corresponding upgrade operation.
- a ninth aspect of the present invention provides a device authentication device, where the device authentication device is disposed in a remote controller, and the device authentication device includes:
- a receiving module configured to receive authentication data sent by the drone, where the authentication data is sent by the authentication device to the drone and forwarded by the drone;
- a processing module configured to perform an encryption operation on the authentication data by using a key included in the encryption authentication chip, to obtain an operation result, where the remote authentication device is embedded with the encryption authentication chip;
- a sending module configured to send the operation result to the drone, so that the drone forwards the operation result to the authentication device, where the operation result is used to make the authentication device determine When the operation result is correct, it is determined that the authentication device can communicate with the drone.
- the cryptographic authentication chip implanted in the remote controller is further configured to enable the authentication device to perform the The remote control is authenticated.
- the receiving module is further configured to:
- the processing module is further configured to: execute the remote controller upgrade instruction to complete a corresponding upgrade operation.
- a tenth aspect of the present invention provides a device authentication device, where the device authentication device is disposed in an authentication device, where the device authentication device includes:
- a sending module configured to send the authentication data to the remote controller, so that the remote controller forwards the authentication data to the drone, and the authentication data is used to enable the drone to adopt a key included in the encrypted authentication chip Performing an encryption operation on the authentication data to obtain an operation result; wherein the encryption authentication chip is implanted in the UAV;
- a receiving module configured to receive the operation result that is forwarded by the drone through the remote controller
- a processing module configured to determine to be able to communicate with the remote controller when determining that the operation result is correct.
- the processing module is specifically configured to:
- the processing module is specifically configured to:
- the authentication device is connected to the remote controller, and the sending module is further configured to:
- the authentication device is connected to the remote controller, and the sending module is further configured to:
- the authentication device is connected to the drone, and the receiving module is further configured to:
- the authentication device is connected to the UAV, and the sending module is further configured to:
- the processing module is further configured to:
- the drone is authenticated according to the encrypted authentication chip implanted in the drone.
- An eleventh aspect of the present invention provides a device authentication device in an unmanned aerial vehicle system, where the device authentication device is disposed in a remote controller, and the device authentication device includes:
- a receiving module configured to receive authentication data sent by the authentication device
- a sending module configured to send the authentication data to the drone, so that the drone encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, and the drone
- the encrypted authentication chip is implanted therein;
- the receiving module is further configured to receive the operation result sent by the UAV, and send the operation result to the authentication device, and determine that the authentication device can be used when determining that the operation result is correct Communicate.
- the remote controller is connected to the authentication device, and the receiving module is further configured to:
- the device also includes:
- the processing module is configured to execute the remote controller upgrade instruction to complete a corresponding upgrade operation.
- the remote controller is connected to the authentication device, and the receiving module is further configured to:
- the sending module is further configured to: forward the UAV upgrade instruction to the UAV, so that the UAV performs the UAV upgrade instruction to complete a corresponding upgrade operation.
- a twelfth aspect of the present invention provides a device authentication device in an unmanned aerial vehicle system, wherein the device authentication device is disposed in a drone, and the device authentication device includes:
- a receiving module configured to receive authentication data sent by the remote controller, where the authentication data is sent by the authentication device to the remote controller and forwarded by the remote controller;
- a processing module configured to perform encryption operation on the authentication data by using a key included in the encryption authentication chip, to obtain an operation result, where the encryption authentication chip is implanted in the UAV;
- a sending module configured to send the operation result to the remote controller, so that the remote controller forwards the operation result to the authentication device, where the operation result is used to cause the authentication device to determine the When the result of the operation is correct, it is determined that the authentication device is capable of communicating with the remote controller.
- the cryptographic authentication chip implanted in the drone is further configured to cause the authentication device to perform an authentication chip according to the encryption The drone is authenticated.
- the drone is connected to the authentication device, and the sending module is further configured to:
- Data information is transmitted directly to the authentication device, the data information including image data.
- the drone is connected to the authentication device, the receiving module Also used for:
- the processing module is further configured to: execute the drone upgrade instruction, and complete a corresponding upgrade operation.
- the remote controller is connected to the authentication device, and the receiving module further Used for:
- the processing module is further configured to: execute the drone upgrade instruction, and complete a corresponding upgrade operation.
- a thirteenth aspect of the present invention provides an authentication device, including:
- a receiver configured to receive the operation result that is forwarded by the remote controller by the drone
- a processor configured to determine to be able to communicate with the drone when determining that the operation result is correct.
- the processor is configured to: perform operation on the authentication data according to a locally stored encryption authentication algorithm, to obtain a target operation result;
- the processor is specifically configured to:
- Determining that the decryption result is consistent with the authentication data determining that the drone can communicate with the drone letter.
- the processor is further configured to:
- the remote controller is authenticated according to the encrypted authentication chip implanted in the remote controller.
- the authentication device and the The human machine is connected, and the receiver is also used to:
- the transmitter is also used to:
- the transmitter is also used to:
- a fourteenth aspect of the present invention provides a drone, comprising:
- a receiver configured to receive authentication data sent by the authentication device
- a transmitter configured to send the authentication data to the remote controller, so that the remote controller performs encryption operation on the authentication data by using a key included in the encryption authentication chip, and obtains an operation result, where the remote controller is implanted There is the encryption authentication chip;
- the receiver is further configured to receive the operation result sent by the remote controller, and send the operation result to the authentication device, and when determining that the operation result is correct, determine that the operation may be performed with the authentication device. Communication.
- the drone is connected to the authentication device, and the transmitter is further configured to:
- Data information is transmitted directly to the authentication device, the data information including image data.
- the drone is connected to the authentication device, and the receiver is further configured to:
- the drone further includes:
- the processor is configured to execute the drone upgrade instruction to complete a corresponding upgrade operation.
- the drone is connected to the authentication device, and the receiver is further configured to:
- the transmitter is further configured to: forward the remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction to complete a corresponding upgrade operation.
- a fifteenth aspect of the present invention provides a remote controller, including:
- a receiver configured to receive authentication data sent by the drone, where the authentication data is sent by the authentication device to the drone and forwarded by the drone;
- a processor configured to perform an encryption operation on the authentication data by using a key included in the encryption authentication chip, to obtain an operation result, where the remote authentication device is embedded with the encryption authentication chip;
- a transmitter configured to send the operation result to the drone, so that the drone forwards the operation result to the authentication device, where the operation result is used to cause the authentication device to determine When the operation result is correct, it is determined that the authentication device can communicate with the drone.
- the cryptographic authentication chip implanted in the remote controller is further configured to enable the authentication device to perform authentication according to the encrypted authentication chip pair The remote controller performs authentication.
- the receiver is further configured to:
- the processor is further configured to: execute the remote controller upgrade instruction to complete a corresponding upgrade operation.
- a sixteenth aspect of the present invention provides an authentication device, including:
- a transmitter for transmitting authentication data to the remote controller to cause the remote controller to forward the authentication data to the drone, the authentication data for causing the drone to adopt a key included in the encryption authentication chip Performing an encryption operation on the authentication data to obtain an operation result; wherein the encryption authentication chip is implanted in the UAV;
- a receiver configured to receive the operation result that is forwarded by the drone through the remote controller
- a processor configured to determine, when the operation result is correct, to be able to communicate with the remote controller.
- the processor is specifically configured to:
- the processor is specifically configured to:
- the authentication device is connected to the remote controller, and the transmitter is further configured to:
- the authentication device is connected to the remote controller, and the transmitter is further configured to:
- the authentication device is connected to the drone, and the receiver is further configured to:
- the authentication device is connected to the drone, and the transmitter is further configured to:
- the processor is further configured to:
- the drone is authenticated according to the encrypted authentication chip implanted in the drone.
- a seventeenth aspect of the present invention provides a remote controller, including:
- a receiver configured to receive authentication data sent by the authentication device
- a transmitter configured to send the authentication data to the drone, so that the drone encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, and the drone
- the encrypted authentication chip is implanted therein;
- the receiver is further configured to receive the operation result sent by the drone, and send the operation result to the authentication device, and determine that the authentication device can be used when determining that the operation result is correct Communicate.
- the remote controller is connected to the authentication device, and the receiver is further configured to:
- the remote controller further includes:
- the processor is configured to execute the remote controller upgrade instruction to complete a corresponding upgrade operation.
- the remote controller is connected to the authentication device, and the receiver is further configured to: directly receive the unsent sent by the authentication device Machine upgrade instruction;
- the transmitter is further configured to: forward the UAV upgrade instruction to the UAV, so that the UAV performs the UAV upgrade instruction to complete a corresponding upgrade operation.
- An eighteenth aspect of the present invention provides a drone, comprising:
- a receiver configured to receive authentication data sent by a remote controller, where the authentication data is sent by the authentication device to the remote controller and forwarded by the remote controller;
- a processor configured to perform an encryption operation on the authentication data by using a key included in the encryption authentication chip, to obtain an operation result, where the encryption authentication chip is implanted in the UAV;
- a transmitter configured to send the operation result to the remote controller, to cause the remote controller to forward the operation result to the authentication device, where the operation result is used to cause the authentication device to determine the When the result of the operation is correct, it is determined that the authentication device is capable of communicating with the remote controller.
- the cryptographic authentication chip implanted in the drone is further configured to cause the authentication device to perform the cryptographic authentication chip according to the cryptographic authentication chip.
- the drone is authenticated.
- the drone is connected to the authentication device, the transmitter Also used for:
- Data information is transmitted directly to the authentication device, the data information including image data.
- the drone is connected to the authentication device, the receiver Also used for:
- the processor is further configured to: execute the drone upgrade instruction to complete a corresponding upgrade operation.
- the remote controller is connected to the authentication device, and the receiver further For receiving: a drone upgrade instruction sent from the authentication device and forwarded by the drone;
- the processor is further configured to: execute the drone upgrade instruction to complete a corresponding upgrade operation.
- the device authentication method, device, authentication device, drone and remote controller provided by the invention, the authentication device sends the authentication data to the drone, so that the drone forwards the authentication data to the remote controller, and the authentication data is used to make the remote controller Encrypting the authentication data by using a key included in the encryption authentication chip to obtain an operation result; wherein the remote controller is embedded with an encryption authentication chip; the authentication device receives the operation result forwarded by the remote controller through the drone; and the authentication device When it is determined that the result of the operation is correct, it is determined that communication with the drone can be performed.
- the authentication device realizes the authentication of the drone and the remote controller by using the remote authentication method only by using the encryption authentication chip embedded in the remote controller, which saves the certification cost and improves the authentication processing efficiency.
- FIG. 1 is a schematic diagram of an authentication scenario according to an embodiment of the present invention
- FIG. 1(b) is a schematic diagram of another authentication scenario according to an embodiment of the present invention.
- Embodiment 1 of a device authentication method according to an embodiment of the present invention
- FIG. 3 is a flowchart of Embodiment 2 of a device authentication method according to an embodiment of the present disclosure
- Embodiment 4 is a flowchart of Embodiment 3 of a device authentication method according to an embodiment of the present invention.
- FIG. 5 is a flowchart of Embodiment 4 of a device authentication method according to an embodiment of the present disclosure
- FIG. 6 is a flowchart of Embodiment 5 of a device authentication method according to an embodiment of the present disclosure
- FIG. 7 is a signaling interaction diagram of Embodiment 6 of a device authentication method according to an embodiment of the present disclosure.
- FIG. 8 is a flowchart of Embodiment 7 of a device authentication method according to an embodiment of the present disclosure.
- FIG. 9 is a flowchart of Embodiment 8 of a device authentication method according to an embodiment of the present disclosure.
- FIG. 10 is a flowchart of Embodiment 9 of a device authentication method according to an embodiment of the present disclosure.
- FIG. 11 is a flowchart of Embodiment 10 of a device authentication method according to an embodiment of the present disclosure.
- FIG. 12 is a flowchart of Embodiment 11 of a device authentication method according to an embodiment of the present disclosure.
- FIG. 13 is a signaling interaction diagram of Embodiment 12 of a device authentication method according to an embodiment of the present disclosure
- FIG. 14 is a schematic structural diagram of Embodiment 1 of a device authentication apparatus according to an embodiment of the present disclosure
- FIG. 15 is a schematic structural diagram of Embodiment 2 of a device authentication apparatus according to an embodiment of the present disclosure
- FIG. 16 is a schematic structural diagram of Embodiment 3 of a device authentication apparatus according to an embodiment of the present disclosure.
- FIG. 17 is a schematic structural diagram of Embodiment 4 of a device authentication apparatus according to an embodiment of the present disclosure.
- FIG. 18 is a schematic structural diagram of Embodiment 5 of a device authentication apparatus according to an embodiment of the present disclosure.
- FIG. 19 is a schematic structural diagram of Embodiment 6 of a device authentication apparatus according to an embodiment of the present disclosure.
- FIG. 20 is a schematic structural diagram of Embodiment 1 of an authentication device according to an embodiment of the present disclosure.
- FIG. 21 is a schematic structural diagram of Embodiment 1 of a drone according to an embodiment of the present invention.
- FIG. 22 is a schematic structural diagram of Embodiment 1 of a remote controller according to an embodiment of the present disclosure
- FIG. 23 is a schematic structural diagram of Embodiment 2 of an authentication device according to an embodiment of the present disclosure.
- FIG. 24 is a schematic structural diagram of Embodiment 2 of a remote controller according to an embodiment of the present disclosure.
- FIG. 25 is a schematic structural diagram of Embodiment 2 of a drone according to an embodiment of the present invention.
- the unmanned aerial vehicle system includes an authentication device and an authenticated device, wherein the authenticated device includes a remote controller and a drone.
- the authentication device is, for example, a terminal device such as a PC, a smart phone terminal, or a tablet computer.
- an encrypted authentication chip is implanted only in one authenticated device.
- connection relationship between the two authenticated devices and the authentication device is: the authentication device can be connected to the two authenticated devices through physical connection, and the two authenticated devices can be connected by wireless or wired communication.
- the physical connection manner is, for example, connected through a serial bus.
- FIG. 1(a) is a schematic diagram of an authentication scenario according to an embodiment of the present invention.
- an encryption authentication chip is embedded in a remote controller, wherein the authentication device and the drone pass physical
- the connection mode is connected, for example, through a serial port connection, and the wireless connection can be established by establishing a wireless link between the drone and the remote controller.
- the authentication device can also establish a physical connection with the remote controller, so that in the authentication scenario, only by installing An encrypted authentication chip in the remote control can authenticate the drone and remote control.
- FIG. 1(b) is a schematic diagram of another authentication scenario according to an embodiment of the present invention.
- an encryption authentication chip is embedded in a drone, wherein the authentication device and the remote controller are physically connected.
- the wireless connection between the drone and the remote can be established by establishing a wireless link.
- the authentication device can also establish a physical connection with the drone, so that in the authentication scenario, only by installing An encrypted authentication chip in the drone can be used to authenticate the drone and remote control.
- the device authentication method is described with reference to the embodiments shown in FIG. 2 to FIG. 7
- the authentication scenario illustrated in FIG. 1( b ) referring to the authentication scenario illustrated in FIG. 1( b ), and FIG. 8 to FIG.
- the embodiment shown in Fig. 13 describes a device authentication method.
- FIG. 2 is a flowchart of Embodiment 1 of a device authentication method according to an embodiment of the present invention. As shown in FIG. 2, an execution body of the solution is an authentication device, and the method includes the following steps:
- Step 101 The authentication device sends the authentication data to the drone, so that the drone forwards the authentication data to the remote controller, where the authentication data is used to enable the remote controller to perform encryption operation on the authentication data by using a key included in the encryption authentication chip. Get the result of the operation.
- Step 102 The authentication device receives an operation result forwarded by the remote controller through the drone.
- Step 103 When determining that the operation result is correct, the authentication device determines that communication with the drone can be performed.
- the solution provided by the embodiment is described in conjunction with FIG. 1( a ), so that the authentication device is physically connected to the drone, and the drone is wirelessly connected to the remote controller, and the remote controller is embedded with the encryption authentication chip.
- the authentication device implements the authentication of the drone through the encryption authentication chip in the remote controller. Since there is no encryption authentication chip in the drone, the method of authenticating the UAV through the encryption authentication chip in the remote controller is a remote authentication method.
- the authentication device can send authentication data to the drone through a physical connection with the drone, and the authentication data can be a string. random number.
- the drone forwards the authentication data to the remote controller.
- the authentication device may carry the authentication data in the authentication request by sending an authentication request to the drone, so that the drone obtains the authentication data when receiving the authentication request carrying the authentication data, and The authentication data is forwarded to the remote controller.
- An encryption authentication chip is embedded in the remote controller, and an encryption key is stored in the encryption authentication chip. Therefore, when receiving the authentication data, the remote controller performs encryption operation on the received authentication data using the key to obtain an operation result, and feeds back the operation result to the drone.
- the drone forwards the received calculation result to the authentication device, and the authentication device verifies the correctness of the operation result. If the operation result is correct, the drone passes the authentication and can communicate with the authentication device.
- the correctness verification method may be: the authentication device performs the operation on the sent authentication data according to the locally stored encryption authentication algorithm, and obtains the target operation result, if the operation result received from the drone and the target operation The results are consistent, it is determined that the drone has passed the certification and can The drone communicates.
- the correctness verification mode may be implemented by using an asymmetric signature authentication method: the remote controller performs encryption operation processing on the authentication data based on a key (private key) included in the encryption authentication chip, at the authentication device.
- the operation result may be decrypted according to the public key stored locally. If the authentication data obtained by the decryption is consistent with the authentication data sent by the decryption, it is determined that the drone has passed the authentication, and can and cannot The human machine communicates.
- the authentication device can complete the authentication of the drone based on the encrypted authentication chip in the remote controller.
- the drone and the remote controller have a pairing relationship, that is, the drone and the remote controller have a one-to-one correspondence. Therefore, in the case where the wireless communication link has been established between the drone and the remote controller, it can be considered that the drone and the remote controller have completed the pairing connection. Therefore, when the authentication device receives and verifies that the operation result forwarded by the drone is correct, the authentication device can determine that the drone has passed the authentication, and can also determine that the remote controller has passed the authentication, thereby simultaneously completing the unmanned aerial vehicle and the remote controller. Certification to improve the efficiency of certification processing.
- the authentication of the remote controller by the authentication device may also be directly implemented based on the encryption authentication chip in the remote controller, that is, the authentication device is implanted according to the remote controller. Encrypt the authentication chip to authenticate the remote controller.
- the authentication device can also be connected to the remote controller through a physical connection.
- the authentication device can send the authentication data to the remote controller, and the remote controller encrypts the authentication data by using the key included in the encryption authentication chip, obtains the operation result, and feeds back to the authentication device.
- the authentication device verifies that the result of the operation is correct, it is determined that the remote controller has passed the authentication.
- the drone is equivalent to remotely using the operation result of the encrypted authentication chip in the remote controller, so that the authentication device realizes remote authentication of the drone and the remote controller.
- the authentication device uses only one encryption authentication chip to implement authentication for different authenticated devices, thereby effectively reducing the hardware cost and improving the authentication processing efficiency of different authenticated devices.
- FIG. 3 is a flowchart of Embodiment 2 of a device authentication method according to an embodiment of the present invention. As shown in FIG. 3, on the basis of the embodiment shown in FIG. 2, after the authentication device determines that it can communicate with the UAV, The method can also include the following steps:
- Step 201 The authentication device is connected to the UAV, and the authentication device directly receives the data information sent by the UAV to the authentication device, where the data information includes image data.
- the smartphone receives/downloads data information such as images taken by the drone by means of the drone transmitting the data information to the remote controller through a wireless link with the remote controller. Further, the remote controller forwards the data information to the smart phone based on the connection with the smart phone, which is inconvenient to operate, and the data transmission of the data received by the smart phone has a high delay due to factors such as the limitation of the bandwidth of the wireless link. .
- the smart phone when the smart phone realizes remote authentication for the drone, the smart phone can be directly connected (physical connection or wireless connection) with the drone, thereby transmitting data information. Therefore, the drone can directly transmit data information such as image data to the smartphone, so that the smartphone can download the data information of the drone more quickly.
- Embodiment 3 is a flowchart of Embodiment 3 of a device authentication method according to an embodiment of the present invention. As shown in FIG. 4, on the basis of the embodiment shown in FIG. 2, after the authentication device determines that it can communicate with the UAV, The method may further include the following step 301 or step 302:
- Step 301 The authentication device is connected to the drone, and the authentication device directly sends the drone upgrade instruction to the drone to enable the drone to execute the drone upgrade command to complete the corresponding upgrade operation.
- the smartphone is still used as the authentication device as an example.
- the smart phone and the drone are directly connected (wireless connection or wireless connection), thereby realizing the intelligence. Communication between the mobile phone and the drone.
- the software upgrade of the drone can be directly and conveniently completed through the smart phone.
- the corresponding APP can be installed in the smart phone, so that the corresponding upgrade package can be directly sent to the drone in the drone upgrade instruction by triggering the APP, so that the drone performs the drone upgrade.
- the instruction completes the corresponding upgrade operation.
- the remote authentication of the drone based on the smart phone not only saves the certification cost, but also enables the upgrade of the drone directly and conveniently through the smart phone.
- Step 302 The authentication device is connected to the drone, and the authentication device directly sends a remote controller upgrade instruction to the drone, so that the drone forwards the remote controller upgrade command to the remote controller, so that the remote controller executes the remote controller upgrade instruction. Complete the corresponding upgrade operation.
- the software upgrade of the drone can be completed directly and conveniently through the smart phone, and the software upgrade of the remote controller can be completed through the forwarding of the drone.
- the upgrade package for the remote controller is directly sent to the remote control in the remote control upgrade instruction, and the drone recognizes that the upgrade instruction is for the remote controller, Forwarding the remote controller upgrade command to the remote controller, so that the remote controller executes the remote controller upgrade command to complete the corresponding upgrade operation.
- the remote authentication of the drone based on the smart phone not only saves the certification cost, but also enables the smart phone to conveniently upgrade the remote controller through the forwarding of the drone.
- FIG. 5 is a flowchart of Embodiment 4 of a device authentication method according to an embodiment of the present invention. The embodiment is described by using a drone as an execution subject. As shown in FIG. 5, the method includes the following steps:
- Step 401 The drone receives the authentication data sent by the authentication device.
- Step 402 The UAV sends the authentication data to the remote controller, so that the remote controller encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, and the remote authentication device is embedded with the encryption authentication chip.
- Step 403 The UAV receives the operation result sent by the remote controller, and sends the operation result to the authentication device. When determining that the operation result is correct, it is determined that the operation can be performed with the authentication device.
- the authentication scenario applied in this embodiment is still the authentication scenario shown in FIG. 1(a): the remote authentication device is embedded with an encryption authentication chip, the authentication device is physically connected with the drone, and the drone establishes a wireless chain with the remote controller. road.
- the authentication device can send authentication data to the drone through a physical connection with the drone, and the authentication data can be a string. random number.
- the encryption authentication chip Since the encryption authentication chip is not installed in the drone, the authentication process cannot be completed by itself. Therefore, when receiving the authentication data transmitted by the authentication device, the drone forwards the authentication data to the remote controller.
- the authentication device may carry the authentication data in the authentication request by sending an authentication request to the drone, so that the drone obtains the authentication data when receiving the authentication request carrying the authentication data, and The authentication data is forwarded to the remote controller.
- the drone and the remote controller have a pairing relationship, that is, the drone and the remote controller have a one-to-one correspondence. Therefore, the drone and the remote control will first establish a wireless communication link, which can be recognized. The pairing connection has been completed for the drone and the remote control first. Therefore, after the drone receives the authentication data sent by the authentication device, the authentication data is forwarded to the corresponding remote controller based on the established pairing relationship.
- An encryption authentication chip is embedded in the remote controller, and a key is stored in the encryption authentication chip. Therefore, when receiving the authentication data, the remote controller performs encryption operation on the received authentication data using the key to obtain an operation result, and feeds back the operation result to the drone.
- the drone forwards the received calculation result to the authentication device, and the authentication device verifies the correctness of the operation result. If the operation result is correct, the drone passes the authentication and can communicate with the authentication device.
- the correctness verification method may be: the authentication device performs the operation on the sent authentication data according to the locally stored encryption authentication algorithm, and obtains the target operation result, if the operation result received from the drone and the target operation The results are consistent, then it is determined that the drone has passed the authentication and the drone is capable of communicating with the authentication device.
- the encryption authentication chip is not installed in the drone, when the authentication device needs to be authenticated, it needs to be remotely completed by means of the encryption authentication chip installed in the remote controller. Therefore, based on the above-mentioned remote authentication method and based on the pairing relationship between the drone and the remote controller, the authentication device can complete the simultaneous authentication of the drone and the remote controller based on the encrypted authentication chip in the remote controller, thereby saving cost and saving cost. Improve the efficiency of authentication processing.
- the method may further include the following steps 404, 405 and 406. These three steps have no timing constraints.
- Step 404 The drone is connected to the authentication device, and the drone directly sends data information to the authentication device, where the data information includes image data.
- the smart phone when the smart phone realizes remote authentication for the drone, the smart phone can be directly connected (physical connection or wireless connection) to the drone, thereby transmitting data information, so no one
- the machine can directly send data information such as image data to the smart phone, so that the smart phone can download the data information of the drone more quickly without the forwarding of the remote controller, thereby improving the data information transmission efficiency and shortening the transmission time.
- Step 405 The drone is connected to the authentication device, and the drone directly receives the drone upgrade command sent by the authentication device, and executes the drone upgrade command to complete the corresponding upgrade operation.
- the corresponding APP can be installed in the smart phone, so that the corresponding upgrade package can be directly sent to the drone in the drone upgrade instruction by triggering the APP, so that the drone can execute the drone upgrade instruction. , complete the corresponding upgrade operation.
- the remote authentication of the drone based on the smart phone not only saves the certification cost, but also enables the upgrade of the drone directly and conveniently through the smart phone.
- Step 406 The drone is connected to the authentication device, and the drone directly receives the remote controller upgrade command sent by the authentication device, and forwards the remote controller upgrade command to the remote controller, so that the remote controller executes the remote controller upgrade command to complete the corresponding upgrade operation. .
- the smart phone when the drone has passed the authentication of the smart phone and the smart phone and the drone are directly connected, the smart phone can not only directly complete the software upgrade of the drone, but also pass the smart phone. The forwarding of the drone completes the software upgrade of the remote controller.
- the upgrade package for the remote controller is directly sent to the remote control in the remote control upgrade instruction, and the drone recognizes that the upgrade instruction is for the remote controller, Forwarding the remote controller upgrade command to the remote controller, so that the remote controller executes the remote controller upgrade command to complete the corresponding upgrade operation.
- the remote authentication of the drone based on the smart phone not only saves the certification cost, but also enables the smart phone to conveniently upgrade the remote controller through the forwarding of the drone.
- FIG. 6 is a flowchart of Embodiment 5 of a device authentication method according to an embodiment of the present invention.
- a remote controller is used as an execution subject. As shown in FIG. 6, the method includes the following steps:
- Step 501 The remote controller receives the authentication data sent by the drone, and the authentication data is sent by the authentication device to the drone and forwarded by the drone.
- Step 502 The remote controller encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted in the remote controller.
- Step 503 The remote controller sends the operation result to the drone, so that the drone forwards the operation result to the authentication device, and the operation result is used to enable the authentication device to determine that the authentication device can be connected to the drone when determining the operation result is correct. Communicate.
- the authentication scenario applied in this embodiment is still the authentication scenario shown in FIG. 1(a): the remote authentication device is embedded with an encryption authentication chip, the authentication device is physically connected with the drone, and the drone establishes a wireless chain with the remote controller. road.
- the authentication device can send authentication data to the drone through a physical connection with the drone, and the authentication data can be a string. random number.
- the encryption authentication chip Since the encryption authentication chip is not installed in the drone, the authentication process cannot be completed by itself. Therefore, when receiving the authentication data transmitted by the authentication device, the drone forwards the authentication data to the remote controller.
- the drone and the remote controller have a pairing relationship, that is, the drone and the remote controller have a one-to-one correspondence. Therefore, the drone and the remote controller will first establish a wireless communication link, and it can be considered that the drone and the remote controller have first completed the pairing connection. Therefore, after the drone receives the authentication data sent by the authentication device, the authentication data is forwarded to the corresponding remote controller based on the established pairing relationship.
- An encryption authentication chip is embedded in the remote controller, and a key is stored in the encryption authentication chip. Therefore, when receiving the authentication data, the remote controller performs encryption operation on the received authentication data using the key to obtain an operation result, and feeds back the operation result to the drone.
- the drone forwards the received calculation result to the authentication device, and the authentication device verifies the correctness of the operation result. If the operation result is correct, the drone passes the authentication and can communicate with the authentication device.
- the correctness verification mode may be: when the authentication device receives the operation result, the operation result may be decrypted according to the public key stored locally, and if the authentication data obtained by the decryption is consistent with the authentication data sent by the authentication device, Make sure the drone is certified to communicate with the drone.
- the encryption authentication chip is not installed in the drone, when the authentication device needs to be authenticated, it needs to be remotely completed by means of the encryption authentication chip installed in the remote controller. Therefore, based on the above-mentioned remote authentication method and based on the pairing relationship between the drone and the remote controller, the authentication device can complete the simultaneous authentication of the drone and the remote controller based on the encrypted authentication chip in the remote controller, thereby saving cost and saving cost. Improve the efficiency of authentication processing.
- the authentication of the remote controller by the authentication device may also be directly implemented based on the encryption authentication chip in the remote controller, that is, authentication.
- the device authenticates the remote controller according to the encryption authentication chip implanted in the remote controller.
- the authentication device can also be connected to the remote controller through a physical connection.
- the authentication device can send the authentication data to the remote controller, and the remote controller encrypts the authentication data by using the key included in the encryption authentication chip, obtains the operation result, and feeds back to the authentication device.
- the authentication device verifies that the result of the operation is correct, it is determined that the remote controller has passed the authentication.
- step 503 the following step 504 is further included:
- Step 504 The drone is connected to the authentication device, and the remote controller receives the remote controller upgrade instruction sent from the authentication device and forwarded by the drone, and executes the remote controller upgrade instruction to complete the corresponding upgrade operation.
- the authentication device is still used as a smart phone.
- the UAV has passed the authentication of the smart phone based on the encryption authentication chip in the remote controller, and the smart phone and the drone are directly connected, Software upgrades to the remote control can be done via a smartphone.
- the software upgrade of the smart phone to the remote controller is performed by the drone, that is, the software upgrade of the remote controller is completed by the forwarding of the drone.
- the upgrade package for the remote controller can be directly sent to the drone by directly triggering the upgrade package for the remote controller, and the drone recognizes that the upgrade command is for the remote controller. Then, the remote controller upgrade instruction is forwarded to the remote controller, so that the remote controller executes the remote controller upgrade instruction to complete the corresponding upgrade operation.
- the remote authentication of the drone based on the smart phone not only saves the certification cost, but also enables the smart phone to conveniently upgrade the remote controller through the forwarding of the drone.
- the above method embodiments are based on the authentication scenario of FIG. 1(a), and the device authentication method is introduced from the perspective of different execution entities.
- the signaling interaction is introduced.
- FIG. 7 is a signaling diagram of Embodiment 6 of a device authentication method according to an embodiment of the present invention. As shown in FIG. 7, the method includes the following steps:
- Step 601 The authentication device sends the authentication data to the drone.
- Step 602 The drone forwards the authentication data to the remote controller.
- Step 603 The remote controller performs encryption operation on the authentication data by using a key included in the encrypted authentication chip installed therein to obtain an operation result.
- Step 604 The remote controller sends the operation result to the drone.
- Step 605 The drone forwards the operation result to the authentication device.
- Step 606 When the authentication device determines that the operation result is correct, it is determined that the UAV can communicate with the UAV.
- the device authentication method provided by the present invention is introduced in combination with the following method embodiments.
- FIG. 8 is a flowchart of Embodiment 7 of a device authentication method according to an embodiment of the present invention. The embodiment is described by using an authentication device as an execution subject. As shown in FIG. 8, the method includes the following steps:
- Step 701 The authentication device sends the authentication data to the remote controller, so that the remote controller forwards the authentication data to the drone, and the authentication data is used to enable the drone to perform encryption operation on the authentication data by using a key included in the encryption authentication chip.
- the operation result is obtained; wherein the encryption authentication chip is implanted in the drone.
- Step 702 The authentication device receives an operation result forwarded by the drone through the remote controller.
- Step 703 The authentication device determines that communication with the remote controller is possible when determining that the operation result is correct.
- the authentication device authenticates the remote controller through the encryption authentication chip in the drone. Since there is no encryption authentication chip in the remote controller, the method of authenticating the remote controller by using the encryption authentication chip in the drone is a remote authentication method.
- the authentication device When the authentication device needs to authenticate the remote controller to determine whether it can communicate with the remote controller, the authentication device can transmit authentication data to the remote controller through a physical connection with the remote controller, and the authentication data can be a string of random numbers.
- the remote controller forwards the authentication data to the drone.
- the authentication device may carry the authentication data in the authentication request by sending the authentication request to the remote controller, so that the remote controller analyzes and obtains the authentication data when receiving the authentication request carrying the authentication data, and the The authentication data is forwarded to the drone.
- An encryption authentication chip is embedded in the drone, and an encryption key is stored in the encryption authentication chip. Therefore, when the drone receives the authentication data, the host uses the key to encrypt the received authentication data. Calculate to obtain the result of the operation and feed back the result of the operation to the remote controller.
- the remote controller forwards the received calculation result to the authentication device, and the authentication device verifies the correctness of the operation result. If the calculation result is correct, the remote controller passes the authentication and can communicate with the authentication device.
- the correctness verification method may be: the authentication device performs the operation on the sent authentication data according to the locally stored encryption authentication algorithm, and obtains the target operation result, if the operation result received from the remote controller and the target operation result Consistent, it is determined that the remote controller is authenticated and can communicate with the remote controller.
- the correctness verification mode may be implemented by using an asymmetric signature authentication method: the UAV encrypts the authentication data based on a key (private key) included in the encryption authentication chip, and the authentication device is used in the authentication device. Wherein, when it receives the operation result, the operation result may be decrypted according to the public key stored locally. If the authentication data obtained by the decryption is consistent with the authentication data sent by the decryption, it is determined that the remote controller passes the authentication, and can be remotely controlled. Communicate.
- an asymmetric signature authentication method the UAV encrypts the authentication data based on a key (private key) included in the encryption authentication chip, and the authentication device is used in the authentication device.
- the operation result may be decrypted according to the public key stored locally. If the authentication data obtained by the decryption is consistent with the authentication data sent by the decryption, it is determined that the remote controller passes the authentication, and can be remotely controlled. Communicate.
- the authentication device can complete the authentication of the remote controller based on the encrypted authentication chip in the drone.
- the drone and the remote controller have a pairing relationship, that is, the drone and the remote controller have a one-to-one correspondence. Therefore, in the case where the wireless communication link has been established between the drone and the remote controller, it can be considered that the drone and the remote controller have completed the pairing connection. Therefore, when the authentication device receives and verifies that the operation result forwarded by the remote controller is correct, the authentication device can determine that the remote controller has passed the authentication, and can also determine that the drone has passed the authentication, thereby completing the operation of the drone and the remote controller at the same time. Certification to improve the efficiency of certification processing.
- the authentication of the UAV to the authentication device can also be directly implemented based on the encryption authentication chip in the UAV, that is, the authentication device is based on the UAV.
- the embedded authentication chip is used to authenticate the drone.
- the authentication device can also be connected to the drone by means of a physical connection.
- the authentication device can send the authentication data to the drone, and the drone encrypts the authentication data using the key included in the encryption authentication chip, obtains the operation result, and feeds back to the authentication device.
- the authentication device verifies that the result of the operation is correct, it is determined that the drone has passed the authentication.
- the remote control is equivalent to remotely using the operation result of the encrypted authentication chip in the drone, so that the authentication device realizes remote authentication of the drone and the remote controller.
- Certified device through the above remote In the authentication mode only one encryption authentication chip is used to implement authentication of different authenticated devices, thereby effectively reducing the hardware cost and improving the authentication processing efficiency of different authenticated devices.
- FIG. 9 is a flowchart of Embodiment 8 of a device authentication method according to an embodiment of the present invention. As shown in FIG. 9 , on the basis of the embodiment shown in FIG. 8 , after the UAV passes the authentication of the authentication device, the method further The following steps 801, 802, 803, and 804 may be included. These four steps have no timing relationship and are optional for parallel.
- Step 801 The authentication device is connected to the UAV, and the authentication device directly receives the data information sent by the UAV to the authentication device, where the data information includes image data.
- the smartphone receives/downloads data information such as images taken by the drone by means of the drone transmitting the data information to the remote controller through a wireless link with the remote controller. Further, the remote controller forwards the data information to the smart phone based on the connection with the smart phone, which is inconvenient to operate, and the data transmission of the data received by the smart phone has a high time due to factors such as the limitation of the bandwidth of the wireless link. Delay.
- the smart phone when the smart phone realizes remote authentication for the drone, the smart phone can be directly connected (physical connection or wireless connection) with the drone, thereby transmitting data information. Therefore, the drone can directly transmit data information such as image data to the smartphone, so that the smartphone can download the data information of the drone more quickly.
- Step 802 The authentication device is connected to the drone, and the authentication device directly sends the drone upgrade instruction to the drone to enable the drone to execute the drone upgrade command to complete the corresponding upgrade operation.
- the smartphone is still used as the authentication device as an example.
- the smart phone and the drone can be directly connected (wireless connection or wireless connection), thereby realizing Communication between the smartphone and the drone.
- the software upgrade of the drone can be directly and conveniently completed through the smart phone.
- the corresponding APP can be installed in the smart phone, so that the corresponding upgrade package can be directly sent to the drone in the drone upgrade instruction by triggering the APP, so that the drone can execute the drone upgrade instruction. , complete the corresponding upgrade operation.
- the remote authentication of the drone based on the smart phone not only saves the certification cost, but also enables the upgrade of the drone directly and conveniently through the smart phone.
- Step 803 The authentication device is connected to the remote controller, and the authentication device directly sends the drone upgrade command to the remote controller, so that the remote controller forwards the drone upgrade command to the drone, so that the drone performs the drone upgrade command. Complete the corresponding upgrade operation.
- the smart phone when the remote controller has passed the authentication of the smart phone based on the encryption authentication chip in the drone, and the smart phone is directly connected with the remote controller at this time, the smart phone can also complete the pair by using the remote controller.
- the software upgrade of the smartphone to the drone is performed by the remote controller, that is, the software upgrade of the drone is completed by the forwarding of the remote controller.
- the upgrade package for the drone can be directly sent to the remote controller by triggering the upgrade package for the drone, and the remote controller recognizes that the upgrade instruction is for the drone. Then, the drone upgrade command is forwarded to the drone, so that the drone executes the drone upgrade instruction and completes the corresponding upgrade operation.
- Step 804 The authentication device is connected to the remote controller, and the authentication device directly sends a remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction to complete the corresponding upgrade operation.
- the remote controller when the remote controller has passed the authentication of the smart phone, the smart phone and the remote controller can be directly connected (wireless connection or wireless connection), thereby realizing communication between the smart phone and the remote controller.
- the remote controller has an upgrade requirement, the software upgrade of the remote controller can be directly and conveniently completed through the smart phone.
- the corresponding APP can be installed in the smart phone, so that the corresponding upgrade package can be directly sent to the remote controller through the remote control upgrade instruction by triggering the APP, so that the remote controller executes the remote controller upgrade instruction to complete the corresponding Upgrade operation.
- the remote authentication based on the smart phone to the remote controller not only saves the certification cost, but also enables the remote controller to be upgraded directly and conveniently through the smart phone.
- FIG. 10 is a flowchart of Embodiment 9 of a device authentication method according to an embodiment of the present invention. The present embodiment is described from the perspective of a remote controller as an execution subject. As shown in FIG. 10, the method includes the following steps:
- Step 901 The remote controller receives the authentication data sent by the authentication device.
- Step 902 The remote controller sends the authentication data to the drone to enable the drone to adopt the encryption authentication.
- the key included in the chip encrypts the authentication data to obtain an operation result, and the encrypted authentication chip is implanted in the drone.
- Step 903 The remote controller receives the operation result sent by the drone, and sends the operation result to the authentication device, and determines that the communication device can communicate with the authentication device when the operation result is determined to be correct.
- the authentication scenario applied in this embodiment is still the authentication scenario shown in FIG. 1(b): the encryption authentication chip is embedded in the drone, the authentication device is physically connected with the remote controller, and the wireless link is established between the drone and the remote controller. road.
- the authentication device When the authentication device needs to authenticate the remote controller to determine whether it can communicate with the remote controller, the authentication device can transmit authentication data to the remote controller through a physical connection with the remote controller, and the authentication data can be a string of random numbers.
- the remote controller forwards the authentication data to the drone.
- the authentication device may carry the authentication data in the authentication request by sending the authentication request to the remote controller, so that the remote controller analyzes and obtains the authentication data when receiving the authentication request carrying the authentication data, and the The authentication data is forwarded to the drone.
- the drone and the remote controller have a pairing relationship, that is, the drone and the remote controller have a one-to-one correspondence. Therefore, the drone and the remote controller will first establish a wireless communication link, and it can be considered that the drone and the remote controller have first completed the pairing connection. Therefore, after the remote controller receives the authentication data sent by the authentication device, the authentication data is forwarded to the corresponding drone based on the established pairing relationship.
- An encryption authentication chip is embedded in the drone, and a key is stored in the encryption authentication chip. Therefore, when receiving the authentication data, the drone encrypts the received authentication data using the key to obtain an operation result, and feeds back the operation result to the remote controller.
- the remote controller forwards the received calculation result to the authentication device, and the authentication device verifies the correctness of the operation result. If the calculation result is correct, the remote controller passes the authentication and can communicate with the authentication device.
- the correctness verification method may be: the authentication device performs the operation on the sent authentication data according to the locally stored encryption authentication algorithm, and obtains the target operation result, if the operation result received from the remote controller and the target operation result Consistent, it is determined that the remote controller is authenticated and can communicate with the remote controller.
- the encryption authentication chip is not installed in the remote controller, when the authentication device needs to be authenticated, it needs to be remotely completed by using the encryption authentication chip installed in the drone. Therefore, based on the above remote authentication method and based on the pairing relationship between the drone and the remote controller, the authentication device can complete the simultaneous authentication of the drone and the remote controller based on the encrypted authentication chip in the drone, thereby saving cost. It also improves the efficiency of authentication processing.
- step 903 the following steps 904 and 905 are further included, where the two steps have no timing defined relationship.
- Step 904 The remote controller is connected to the authentication device, and the remote controller directly receives the remote controller upgrade instruction sent by the authentication device, and executes the remote controller upgrade instruction to complete the corresponding upgrade operation.
- the remote controller when the remote controller has passed the authentication of the smart phone, the smart phone and the remote controller can be directly connected (wireless connection or wireless connection), thereby realizing communication between the smart phone and the remote controller.
- the remote controller has an upgrade requirement, the software upgrade of the remote controller can be directly and conveniently completed through the smart phone.
- the corresponding APP can be installed in the smart phone, so that the corresponding upgrade package can be directly sent to the remote controller by means of triggering the APP, and the remote controller receives and executes the remote controller upgrade instruction to complete the corresponding Upgrade operation.
- the remote authentication based on the smart phone to the remote controller not only saves the certification cost, but also enables the remote controller to be upgraded directly and conveniently through the smart phone.
- Step 905 The remote controller is connected to the authentication device, and the remote controller directly receives the drone upgrade command sent by the authentication device, and forwards the drone upgrade command to the drone, so that the drone performs the drone upgrade instruction and completes Corresponding upgrade operation.
- the smart phone when the remote controller has passed the authentication of the smart phone based on the encryption authentication chip in the drone, and the smart phone is directly connected with the remote controller at this time, the smart phone can also complete the pair by using the remote controller.
- the software upgrade of the smartphone to the drone is performed by the remote controller, that is, the software upgrade of the drone is completed by the forwarding of the remote controller.
- the upgrade package for the drone can be directly sent to the remote controller by triggering the upgrade package for the drone, and the remote controller recognizes that the upgrade instruction is for the drone. Then, the drone upgrade command is forwarded to the drone, so that the drone executes the drone upgrade instruction and completes the corresponding upgrade operation.
- FIG. 11 is a flowchart of Embodiment 10 of a device authentication method according to an embodiment of the present invention. The embodiment is described from the perspective of an unmanned aircraft as an execution subject. As shown in FIG. 11, the method includes the following steps:
- Step 1001 The drone receives the authentication data sent by the remote controller, and the authentication data is sent by the authentication device to the remote controller and forwarded by the remote controller.
- Step 1002 The UAV encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted in the UAV.
- Step 1003 The drone sends the operation result to the remote controller, so that the remote controller forwards the operation result to the authentication device, and the operation result is used to enable the authentication device to determine that the authentication device can communicate with the remote controller when determining the operation result is correct.
- the authentication scenario applied in this embodiment is still the authentication scenario shown in FIG. 1(b): the encryption authentication chip is embedded in the drone, the authentication device is physically connected with the remote controller, and the wireless link is established between the drone and the remote controller. road.
- the authentication device When the authentication device needs to authenticate the remote controller to determine whether it can communicate with the remote controller, the authentication device can transmit authentication data to the remote controller through a physical connection with the remote controller, and the authentication data can be a string of random numbers.
- the remote controller forwards the authentication data to the drone.
- the drone and the remote controller have a pairing relationship, that is, the drone and the remote controller have a one-to-one correspondence. Therefore, the drone and the remote controller will first establish a wireless communication link, and it can be considered that the drone and the remote controller have first completed the pairing connection. Therefore, after the remote controller receives the authentication data sent by the authentication device, the authentication data is forwarded to the corresponding drone based on the established pairing relationship.
- An encryption authentication chip is embedded in the drone, and a key is stored in the encryption authentication chip. Therefore, when receiving the authentication data, the drone encrypts the received authentication data using the key to obtain an operation result, and feeds back the operation result to the remote controller.
- the remote controller forwards the received operation result to the authentication device, and the authentication device verifies the correctness of the operation result. If the operation result is correct, the remote controller passes the authentication and can Enough to communicate with the authentication device.
- the correctness verification mode may be: when the authentication device receives the operation result, the operation result may be decrypted according to the public key stored locally, and if the authentication data obtained by the decryption is consistent with the authentication data sent by the authentication device, Make sure the remote is certified and able to communicate with the remote.
- the encryption authentication chip is not installed in the remote controller, when the authentication device needs to be authenticated, it needs to be remotely completed by using the encryption authentication chip installed in the drone. Therefore, based on the above remote authentication method and based on the pairing relationship between the drone and the remote controller, the authentication device can complete the simultaneous authentication of the drone and the remote controller based on the encrypted authentication chip in the drone, thereby saving cost. It also improves the efficiency of authentication processing.
- the authentication of the UAV to the authentication device can also be directly implemented based on the encryption authentication chip in the UAV, that is, the authentication device is based on the UAV.
- the embedded encryption authentication chip authenticates the drone.
- the authentication device can also be connected to the drone by means of a physical connection.
- the authentication device can send the authentication data to the drone, and the drone encrypts the authentication data using the key included in the encryption authentication chip, obtains the operation result, and feeds back to the authentication device.
- the authentication device verifies that the result of the operation is correct, it is determined that the drone has passed the authentication.
- FIG. 12 is a flowchart of Embodiment 11 of a device authentication method according to an embodiment of the present invention. As shown in FIG. 12, on the basis of the embodiment shown in FIG. 11, after the UAV passes the authentication of the authentication device, the method is The following steps 1101, 1102, and 1103 may also be included. These three steps have no timing constraints.
- Step 1101 The drone is connected to the authentication device, and the drone directly sends data information to the authentication device, where the data information includes image data.
- the smart phone when the smart phone realizes remote authentication for the drone, the smart phone can be directly connected (physical connection or wireless connection) to the drone, thereby transmitting data information, so no one
- the machine can send data information such as image data directly to the smartphone, so that the smart phone can download the data information of the drone more quickly without forwarding through the remote controller.
- Step 1102 The UAV is connected to the authentication device, and the UAV directly receives the UAV upgrade command sent by the authentication device, and executes the UAV upgrade command to complete the corresponding upgrade operation.
- the drone is directly connected to the authentication device.
- the smart phone and the drone can communicate with each other.
- the software upgrade of the drone can be directly and conveniently completed through the smart phone.
- the corresponding APP can be installed in the smart phone, so that the corresponding upgrade package can be carried in the drone upgrade command and sent to the drone by triggering the APP, so that the drone can execute the drone upgrade command. Complete the corresponding upgrade operation.
- the remote authentication of the drone based on the smart phone not only saves the certification cost, but also enables the upgrade of the drone directly and conveniently through the smart phone.
- Step 1103 The remote controller is connected to the authentication device, and the drone receives the drone upgrade command sent from the authentication device and forwarded by the drone, and executes the drone upgrade command to complete the corresponding upgrade operation.
- the smart phone when the remote controller has passed the authentication of the smart phone based on the encryption authentication chip in the drone, and the smart phone is directly connected with the remote controller at this time, the smart phone can also complete the pair by using the remote controller.
- the software upgrade of the smartphone to the drone is performed by the remote controller, that is, the software upgrade of the drone is completed by the forwarding of the remote controller.
- the upgrade package for the drone can be directly sent to the remote controller by triggering the upgrade package for the drone, and the remote controller recognizes that the upgrade instruction is for the drone. Then, the drone upgrade command is forwarded to the drone, so that the drone executes the drone upgrade instruction and completes the corresponding upgrade operation.
- the above method embodiments are based on the authentication scenario of FIG. 1(b), and the device authentication method is introduced from the perspective of different execution entities.
- the signaling interaction is introduced.
- FIG. 13 is a signaling interaction diagram of Embodiment 12 of a device authentication method according to an embodiment of the present invention. As shown in FIG. 13, the method includes the following steps:
- Step 1201 The authentication device sends the authentication data to the remote controller.
- Step 1202 The remote controller forwards the authentication data to the drone.
- Step 1203 The drone encrypts the authentication data by using a key included in the encrypted authentication chip installed therein to obtain an operation result.
- Step 1204 The drone sends the operation result to the remote controller.
- Step 1205 The remote controller forwards the operation result to the authentication device.
- Step 1206 When the authentication device determines that the operation result is correct, it is determined that the remote controller can communicate with the remote controller.
- FIG. 14 is a schematic structural diagram of Embodiment 1 of a device authentication apparatus according to an embodiment of the present invention.
- the device authentication device is configured in an authentication device, such as a smart phone, a tablet computer, and the like, as shown in FIG. 14 .
- the device authentication device includes: a sending module 11, a receiving module 12, and a processing module 13.
- the sending module 11 is configured to send the authentication data to the drone to cause the drone to forward the authentication data to the remote controller, where the authentication data is used to enable the remote controller to adopt the encryption included in the encryption authentication chip
- the key performs an encryption operation on the authentication data to obtain an operation result, wherein the encryption authentication chip is implanted in the remote controller.
- the receiving module 12 is configured to receive the operation result that the remote controller forwards through the drone.
- the processing module 13 is configured to determine that the UAV can communicate with the UAV when determining that the operation result is correct.
- the processing module 13 is configured to: perform operation on the authentication data according to a locally stored encryption authentication algorithm to obtain a target operation result; and determine, when determining that the operation result is consistent with the target operation result, determining It is capable of communicating with the drone.
- the processing module 13 is specifically configured to: decrypt the operation result; and determine to be able to communicate with the drone when determining that the decryption result is consistent with the authentication data.
- processing module 13 is further configured to: authenticate the remote controller according to the encrypted authentication chip implanted in the remote controller.
- the authentication device is connected to the UAV, and the receiving module 12 is further configured to: directly receive data information sent by the UAV, where the data information includes image data.
- the authentication device is connected to the drone, and the sending module 11 is further configured to: directly send a drone upgrade instruction to the drone, so that the drone performs the Man-machine upgrade The instruction completes the corresponding upgrade operation.
- the authentication device is connected to the drone, and the sending module 11 is further configured to:
- the device authentication device provided by this embodiment may be used to perform the technical solution of the authentication device in the method embodiment shown in any one of FIG. 2 to FIG. 7.
- the implementation principle and technical effects are similar, and details are not described herein again.
- FIG. 15 is a schematic structural diagram of Embodiment 2 of a device authentication apparatus according to an embodiment of the present invention.
- the device authentication apparatus is disposed in a UAV.
- the device authentication apparatus includes: a receiving module 21, a sending module 22, Processing module 23.
- the receiving module 21 is configured to receive authentication data sent by the authentication device.
- the sending module 22 is configured to send the authentication data to the remote controller, so that the remote controller performs encryption operation on the authentication data by using a key included in the encryption authentication chip to obtain an operation result, where the remote controller is implanted
- the encrypted authentication chip is included.
- the receiving module 21 is further configured to receive the operation result sent by the remote controller, and send the operation result to the authentication device, and determine that the authentication device can be used when determining that the operation result is correct. Communicate.
- the UAV is connected to the authentication device, and the sending module 22 is further configured to: directly send data information to the authentication device, where the data information includes image data.
- the UAV is connected to the authentication device, and the receiving module 21 is further configured to: directly receive the UAV upgrade command sent by the authentication device.
- the device further includes: a processing module 23, configured to execute the drone upgrade command, and complete a corresponding upgrade operation.
- the drone is connected to the authentication device, and the receiving module 21 is further configured to: directly receive a remote controller upgrade command sent by the authentication device.
- the sending module 22 is further configured to: forward the remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction to complete a corresponding upgrade operation.
- the device authentication apparatus provided in this embodiment may be used to perform the implementation shown in any one of FIG. 2 to FIG. 7.
- the technical solution of the UAV is similar in its implementation principle and technical effects, and will not be described again.
- FIG. 16 is a schematic structural diagram of Embodiment 3 of a device authentication apparatus according to an embodiment of the present invention.
- the device authentication apparatus is disposed in a remote controller.
- the device authentication apparatus includes: a receiving module 31, a processing module 32, and a sending Module 33.
- the receiving module 31 is configured to receive authentication data sent by the drone, and the authentication data is sent by the authentication device to the drone and forwarded by the drone.
- the processing module 32 is configured to perform an encryption operation on the authentication data by using a key included in the encryption authentication chip, and obtain an operation result, where the encryption authentication chip is implanted in the remote controller.
- a sending module 33 configured to send the operation result to the drone, so that the drone forwards the operation result to the authentication device, where the operation result is used to make the authentication device
- the authentication device is capable of communicating with the drone.
- the cryptographic authentication chip embedded in the remote controller is further configured to enable the authentication device to authenticate the remote controller according to the cryptographic authentication chip.
- the receiving module 31 is further configured to: receive a remote controller upgrade instruction sent from the authentication device and forwarded by the drone.
- the processing module 32 is further configured to: execute the remote controller upgrade instruction to complete a corresponding upgrade operation.
- the device authentication device provided in this embodiment may be used to implement the technical solution of the remote controller in the embodiment shown in any of FIG. 2 to FIG. 7.
- the implementation principle and technical effects are similar, and details are not described herein again.
- FIG. 17 is a schematic structural diagram of Embodiment 4 of a device authentication apparatus according to an embodiment of the present invention.
- the device authentication device is configured in an authentication device, such as a smart phone, a tablet computer, and the like, as shown in FIG.
- the device authentication device includes a sending module 41, a receiving module 42, and a processing module 43.
- the sending module 41 is configured to send the authentication data to the remote controller, so that the remote controller forwards the authentication data to the drone, and the authentication data is used to enable the drone to adopt the encryption included in the encryption authentication chip.
- the key performs an encryption operation on the authentication data to obtain an operation result, wherein the encryption authentication chip is implanted in the drone.
- the receiving module 42 is configured to receive the operation result that is forwarded by the drone through the remote controller.
- the processing module 43 is configured to determine that the remote controller can communicate with the remote controller when determining that the operation result is correct.
- the processing module 43 is specifically configured to: perform operation on the authentication data according to a locally stored encryption authentication algorithm to obtain a target operation result; and determine, when determining that the operation result is consistent with the target operation result, determine Communicate with the remote controller.
- the processing module 43 is specifically configured to: decrypt the operation result; and determine to be able to communicate with the remote controller when determining that the decryption result is consistent with the authentication data.
- the authentication device is connected to the remote controller, and the sending module 41 is further configured to: directly send a remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade command, Complete the corresponding upgrade operation.
- the authentication device is connected to the remote controller, and the sending module 41 is further configured to: directly send a drone upgrade instruction to the remote controller, so that the remote controller upgrades the drone The instruction is forwarded to the drone, so that the drone executes the drone upgrade instruction to complete a corresponding upgrade operation.
- the authentication device is connected to the UAV, and the receiving module 42 is further configured to: directly receive data information sent by the UAV to the authentication device, where the data information includes image data.
- the authentication device is connected to the drone, and the sending module 41 is further configured to: directly send a drone upgrade instruction to the drone, so that the drone performs the The man-machine upgrade instruction completes the corresponding upgrade operation.
- processing module 43 is further configured to: authenticate the drone according to the encrypted authentication chip implanted in the drone.
- the device authentication device provided in this embodiment may be used to perform the technical solution of the authentication device in the embodiment shown in any of FIG. 8 to FIG. 13 , and the implementation principle and technical effects are similar, and details are not described herein again.
- FIG. 18 is a schematic structural diagram of Embodiment 5 of a device authentication apparatus according to an embodiment of the present invention.
- the device authentication apparatus is disposed in a remote controller. As shown in FIG. 18, the device authentication apparatus includes: a receiving module 51 and a sending module 52.
- the receiving module 51 is configured to receive authentication data sent by the authentication device.
- a sending module 52 configured to send the authentication data to the drone to enable the drone to adopt
- the key included in the encryption authentication chip performs an encryption operation on the authentication data to obtain a calculation result, and the encryption authentication chip is implanted in the drone.
- the receiving module 51 is further configured to receive the operation result sent by the UAV, and send the operation result to the authentication device, and determine that the authentication can be performed when determining that the operation result is correct.
- the device communicates.
- the remote controller is connected to the authentication device, and the receiving module 51 is further configured to: directly receive a remote controller upgrade instruction sent by the authentication device.
- the device further includes: a processing module 53 configured to execute the remote controller upgrade instruction to complete a corresponding upgrade operation.
- the remote controller is connected to the authentication device, and the receiving module 51 is further configured to: directly receive the drone upgrade command sent by the authentication device.
- the sending module 52 is further configured to: forward the drone upgrade command to the drone, so that the drone performs the drone upgrade command to complete a corresponding upgrade operation.
- the device authentication device provided in this embodiment may be used to implement the technical solution of the remote controller in the embodiment shown in any of FIG. 8 to FIG. 13 , and the implementation principle and technical effects are similar, and details are not described herein.
- FIG. 19 is a schematic structural diagram of Embodiment 6 of a device authentication apparatus according to an embodiment of the present invention.
- the device authentication apparatus is disposed in a UAV.
- the device authentication apparatus includes: a receiving module 61, a processing module 62, Send module 63.
- the receiving module 61 is configured to receive authentication data sent by the remote controller, where the authentication data is sent by the authentication device to the remote controller and forwarded by the remote controller.
- the processing module 62 is configured to perform an encryption operation on the authentication data by using a key included in the encryption authentication chip to obtain an operation result, where the encryption authentication chip is implanted in the UAV.
- a sending module 63 configured to send the operation result to the remote controller, so that the remote controller forwards the operation result to the authentication device, where the operation result is used to cause the authentication device to determine When the result of the operation is correct, it is determined that the authentication device can communicate with the remote controller.
- the cryptographic authentication chip implanted in the UAV is further configured to enable the authentication device to authenticate the UAV according to the cryptographic authentication chip.
- the UAV is connected to the authentication device, and the sending module 63 is further configured to: directly send data information to the authentication device, where the data information includes image data.
- the drone is connected to the authentication device, and the receiving module 61 is further configured to: directly receive the drone upgrade command sent by the authentication device.
- the processing module 62 is further configured to: execute the drone upgrade instruction to complete a corresponding upgrade operation.
- the remote controller is connected to the authentication device, and the receiving module 61 is further configured to: receive a drone upgrade command sent from the authentication device and forwarded by the drone.
- the processing module 62 is further configured to: execute the drone upgrade instruction to complete a corresponding upgrade operation.
- the device authentication device provided in this embodiment may be used to implement the technical solution of the UAV in the embodiment shown in any of FIG. 8 to FIG. 13 , and the implementation principle and technical effects are similar, and details are not described herein again.
- FIG. 20 is a schematic structural diagram of Embodiment 1 of an authentication device according to an embodiment of the present invention. As shown in FIG. 20, the authentication device includes: a transmitter 71, a receiver 72, and a processor 73.
- a transmitter 71 configured to send authentication data to the drone to cause the drone to forward the authentication data to a remote controller, where the authentication data is used to enable the remote controller to adopt a secret included in the encryption authentication chip
- the key performs an encryption operation on the authentication data to obtain an operation result, wherein the encryption authentication chip is implanted in the remote controller.
- the receiver 72 is configured to receive the operation result that is forwarded by the remote controller by the drone.
- the processor 73 is configured to determine that the UAV can communicate with the UAV when determining that the operation result is correct.
- the processor 73 is configured to: perform operation on the authentication data according to a locally stored encryption authentication algorithm to obtain a target operation result; and determine, when determining that the operation result is consistent with the target operation result, determining It is capable of communicating with the drone.
- the processor 73 is specifically configured to: decrypt the operation result; and determine to be able to communicate with the drone when determining that the decryption result is consistent with the authentication data.
- the processor 73 is further configured to: authenticate the remote controller according to the encrypted authentication chip implanted in the remote controller.
- the authentication device is connected to the UAV, and the receiver 72 is further configured to: directly receive data information sent by the UAV, where the data information includes image data.
- the authentication device is connected to the drone, and the transmitter 71 is further configured to: directly Sending a drone upgrade command to the drone to cause the drone to execute the drone upgrade command to complete a corresponding upgrade operation.
- the authentication device is connected to the drone, and the transmitter 71 is further configured to: directly send a remote controller upgrade instruction to the drone, so that the drone will use the remote controller
- the upgrade instruction is forwarded to the remote controller, so that the remote controller executes the remote controller upgrade instruction to complete a corresponding upgrade operation.
- the authentication device provided in this embodiment may be used to perform the technical solution in the method embodiment shown in any one of FIG. 2 to FIG. 7.
- the implementation principle and technical effects are similar, and details are not described herein again.
- FIG. 21 is a schematic structural diagram of Embodiment 1 of a drone according to an embodiment of the present invention. As shown in FIG. 21, the UAV includes a receiver 81, a transmitter 82, and a processor 83.
- the receiver 81 is configured to receive authentication data sent by the authentication device.
- the transmitter 82 is configured to send the authentication data to the remote controller, so that the remote controller encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, where the remote controller is implanted
- the encrypted authentication chip is included.
- the receiver 81 is further configured to receive the operation result sent by the remote controller, and send the operation result to the authentication device, and determine that the authentication device can be used when determining that the operation result is correct. Communicate.
- the drone is connected to the authentication device, and the transmitter 82 is further configured to: directly send data information to the authentication device, where the data information includes image data.
- the drone is connected to the authentication device, and the receiver 81 is further configured to: directly receive the UAV upgrade command sent by the authentication device;
- the processor 83 is configured to execute the drone upgrade command to complete a corresponding upgrade operation.
- the drone is connected to the authentication device, and the receiver 81 is further configured to: directly receive a remote controller upgrade instruction sent by the authentication device.
- the transmitter 82 is further configured to: forward the remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction to complete a corresponding upgrade operation.
- the unmanned aerial vehicle provided in this embodiment can be used to perform the technical solution in the method embodiment shown in any one of FIG. 2 to FIG. 7.
- the implementation principle and technical effects are similar, and details are not described herein again.
- FIG. 22 is a schematic structural diagram of Embodiment 1 of a remote controller according to an embodiment of the present invention. As shown in FIG. 22, the remote controller includes a receiver 91, a processor 92, and a transmitter 93.
- the receiver 91 is configured to receive authentication data sent by the drone, and the authentication data is sent by the authentication device to the drone and forwarded by the drone.
- the processor 92 is configured to perform an encryption operation on the authentication data by using a key included in the encryption authentication chip, and obtain an operation result, where the encryption authentication chip is implanted in the remote controller.
- a transmitter 93 configured to send the operation result to the drone, so that the drone forwards the operation result to the authentication device, where the operation result is used to make the authentication device
- the authentication device is capable of communicating with the drone.
- the cryptographic authentication chip implanted in the remote controller is further configured to enable the authentication device to authenticate the remote controller according to the cryptographic authentication chip.
- the receiver 91 is further configured to: receive a remote controller upgrade instruction sent from the authentication device and forwarded by the drone.
- the processor 92 is further configured to: execute the remote controller upgrade instruction to complete a corresponding upgrade operation.
- the remote controller provided in this embodiment may be used to perform the technical solution in the method embodiment shown in any one of FIG. 2 to FIG. 7.
- the implementation principle and technical effects are similar, and details are not described herein again.
- FIG. 23 is a schematic structural diagram of Embodiment 2 of an authentication device according to an embodiment of the present invention. As shown in FIG. 23, the authentication device includes: a transmitter 1011, a receiver 1012, and a processor 1013.
- the transmitter 1011 is configured to send authentication data to the remote controller, so that the remote controller forwards the authentication data to the drone, and the authentication data is used to enable the drone to adopt a secret included in the encryption authentication chip.
- the key performs an encryption operation on the authentication data to obtain an operation result, wherein the encryption authentication chip is implanted in the drone.
- the receiver 1012 is configured to receive the operation result that is forwarded by the drone through the remote controller.
- the processor 1013 is configured to determine that the remote controller can communicate with the remote controller when determining that the operation result is correct.
- the processor 1013 is specifically configured to:
- the authentication data is calculated according to a locally stored encryption authentication algorithm to obtain a target operation result; when it is determined that the operation result is consistent with the target operation result, it is determined that the remote controller can communicate with the remote controller.
- the processor 1013 is specifically configured to:
- Decrypting the operation result determining that communication with the remote controller is possible when determining that the decryption result is consistent with the authentication data.
- the processor 1013 is further configured to: authenticate the drone according to the encrypted authentication chip implanted in the drone.
- the authentication device is connected to the remote controller, and the transmitter 1011 is further configured to: directly send a remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction, Complete the corresponding upgrade operation.
- the authentication device is connected to the remote controller, and the transmitter 1011 is further configured to: directly send a drone upgrade instruction to the remote controller, so that the remote controller upgrades the drone The instruction is forwarded to the drone, so that the drone executes the drone upgrade instruction to complete a corresponding upgrade operation.
- the authentication device is connected to the UAV, and the receiver 1012 is further configured to: directly receive data information sent by the UAV to the authentication device, where the data information includes image data.
- the authentication device is connected to the drone, and the transmitter 1011 is further configured to: directly send a drone upgrade instruction to the drone, so that the drone performs the The man-machine upgrade instruction completes the corresponding upgrade operation.
- the authentication device provided in this embodiment may be used to perform the technical solution in the embodiment shown in any of FIG. 8 to FIG. 13 , and the implementation principle and technical effects are similar, and details are not described herein again.
- FIG. 24 is a schematic structural diagram of Embodiment 2 of a remote controller according to an embodiment of the present invention. As shown in FIG. 24, the remote controller includes: a receiver 1111 and a transmitter 1112.
- the receiver 1111 is configured to receive authentication data sent by the authentication device.
- the transmitter 1112 is configured to send the authentication data to the drone, so that the drone encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, where the unmanned person The encrypted authentication chip is implanted in the machine.
- the receiver 1111 is further configured to receive the operation result sent by the UAV, and send the operation result to the authentication device, and when determining that the operation result is correct, determine that the operation result is The authentication device communicates.
- the remote controller is connected to the authentication device, and the receiver 1111 is further configured to: directly receive a remote controller upgrade instruction sent by the authentication device.
- the remote controller further includes a processor 1113, configured to execute the remote controller upgrade instruction, and complete a corresponding upgrade operation.
- the remote controller is connected to the authentication device, and the receiver 1111 is further configured to: directly receive the drone upgrade command sent by the authentication device.
- the transmitter 1112 is further configured to: forward the UAV upgrade instruction to the UAV, so that the UAV performs the UAV upgrade instruction to complete a corresponding upgrade operation.
- the remote controller provided in this embodiment may be used to perform the technical solution in the embodiment shown in any of FIG. 8 to FIG. 13 , and the implementation principle and technical effects are similar, and details are not described herein again.
- FIG. 25 is a schematic structural diagram of Embodiment 2 of a UAV according to an embodiment of the present invention. As shown in FIG. 25, the UAV includes: a receiver 1211, a processor 1212, and a transmitter 1213.
- the receiver 1211 is configured to receive authentication data sent by the remote controller, where the authentication data is sent by the authentication device to the remote controller and forwarded by the remote controller.
- the processor 1212 is configured to perform an encryption operation on the authentication data by using a key included in the encryption authentication chip to obtain an operation result, where the encryption authentication chip is implanted in the UAV.
- a transmitter 1213 configured to send the operation result to the remote controller, so that the remote controller forwards the operation result to the authentication device, where the operation result is used to cause the authentication device to determine When the result of the operation is correct, it is determined that the authentication device can communicate with the remote controller.
- the cryptographic authentication chip implanted in the UAV is further configured to enable the authentication device to authenticate the UAV according to the cryptographic authentication chip.
- the drone is connected to the authentication device, and the transmitter 1213 is further configured to: directly send data information to the authentication device, where the data information includes image data.
- the drone is connected to the authentication device, and the receiver 1211 is further configured to: directly receive the UAV upgrade command sent by the authentication device.
- the processor 1212 is further configured to: execute the drone upgrade instruction to complete a corresponding upgrade operation.
- the remote controller is connected to the authentication device, and the receiver 1211 is further configured to: Receiving a drone upgrade command issued by the authentication device and forwarded by the drone.
- the processor 1212 is further configured to: execute the drone upgrade instruction to complete a corresponding upgrade operation.
- the unmanned aerial vehicle provided in this embodiment can be used to implement the technical solution in the embodiment shown in any of FIG. 8 to FIG. 13 , and the implementation principle and technical effects are similar, and details are not described herein again.
- the processor may be a central processing unit (English: Central Processing Unit, CPU for short), or may be other general-purpose processors, digital signals. Processor (English: Digital Signal Processor, DSP for short), Application Specific Integrated Circuit (ASIC), etc.
- the general purpose processor may be a microprocessor or the processor or any conventional processor or the like. The steps of the method disclosed in the embodiments of the present invention may be directly implemented as a hardware processor, or may be performed by a combination of hardware and software modules in the processor.
- the aforementioned program can be stored in a computer readable storage medium.
- the steps including the foregoing method embodiments are performed; and the foregoing storage medium includes: read-only memory (English: read-only memory, abbreviation: ROM), RAM, flash memory, hard disk, solid state hard disk, Magnetic tape (English: magnetic tape), floppy disk (English: floppy disk), optical disc (English: optical disc) and any combination thereof.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Selective Calling Equipment (AREA)
- Telephonic Communication Services (AREA)
Abstract
The present invention provides a method and device for device authentication, an authentication device, an unmanned aerial vehicle and a remote controller. The method comprises: the authentication device sends authentication data to the unmanned aerial vehicle so that the unmanned aerial vehicle forwards the authentication data to the remote controller, the authentication data being used for enabling the remote controller to encrypt the authentication data using a key contained in an encryption authentication chip to obtain an operation result, wherein the remote controller is embedded with the encryption authentication chip; the authentication device receives the operation result forwarded by the remote controller via the unmanned aerial vehicle; and the authentication device determines that it is possible to communicate with the unmanned aerial vehicle when determining that the operation result is correct. Through the remote authentication mode, the authentication device can realize authentication of the unmanned aerial vehicle and the remote controller only by using the encryption authentication chip embedded in the remote controller, thus saving the cost of authentication, and improving the efficiency of authentication processing.
Description
本发明实施例涉及无人机技术领域,尤其涉及一种设备认证方法、装置、认证设备、无人机和遥控器。The embodiments of the present invention relate to the technical field of drones, and in particular, to a device authentication method, device, authentication device, drone, and remote controller.
目前,用户一般操作无人机的方式是使用遥控器,通过遥控的方式实现对无人机的飞行控制。以无人机的一种主要应用——航拍为例,为了便于用户能够通过比如智能手机、PC机、平板电脑等用户终端设备实时观看到无人机航拍到的图像画面,以智能手机为例,目前可以将智能手机与遥控器建立连接,从而智能手机可以通过遥控器接收到无人机航拍到的图像画面。At present, the general way for the user to operate the drone is to use the remote control to realize the flight control of the drone by remote control. Taking aerial photography as an example, one of the main applications of drones, in order to facilitate users to view the images of aerial images taken by drones in real time through user terminal devices such as smart phones, PCs, and tablets, taking smartphones as an example. At present, the smart phone can be connected with the remote controller, so that the smart phone can receive the image of the aerial image taken by the drone through the remote controller.
而智能手机能够接收到该图像画面的前提是,智能手机能够与无人机、遥控器通信。因此,为了保证智能手机等用户终端设备能够接收到无人机拍得的图像画面或者能够对无人机进行飞行控制,首先用户终端设备需要对无人机、遥控器进行认证,以确定用户终端设备能够与之进行通信。The premise that the smartphone can receive the image is that the smartphone can communicate with the drone or remote controller. Therefore, in order to ensure that the user terminal device such as a smart phone can receive the image image taken by the drone or can perform flight control on the drone, first, the user terminal device needs to authenticate the drone and the remote controller to determine the user terminal. The device can communicate with it.
目前所采用的认证方式是:在无人机和遥控器中都植入加密认证芯片,基于该加密认证芯片,从而用户终端设备分别实现对无人机和遥控器的认证。At present, the authentication method adopted is: an encryption authentication chip is implanted in both the drone and the remote controller, and based on the encryption authentication chip, the user terminal device respectively authenticates the drone and the remote controller.
上述认证方式中,无人机和遥控器中均需植入加密认证芯片,不仅会增加硬件成本,而且这种逐个分别认证的方式,认证处理效率也比较低。In the above authentication method, the encryption authentication chip needs to be implanted in both the UAV and the remote controller, which not only increases the hardware cost, but also the authentication processing efficiency is relatively low.
发明内容Summary of the invention
本发明实施例提供一种设备认证方法、装置、认证设备、无人机和遥控器,通过远程认证的方式,实现对无人机系统中不同设备的高效认证,降低硬件成本。Embodiments of the present invention provide a device authentication method, device, authentication device, a drone, and a remote controller, which enable high-efficiency authentication of different devices in the UAV system and reduce hardware costs through remote authentication.
本发明第一方面提供一种设备认证方法,包括:A first aspect of the present invention provides a device authentication method, including:
认证设备向无人机发送认证数据,以使所述无人机将所述认证数据转发至遥控器,所述认证数据用于使得所述遥控器采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果;其中,所述遥控器中植入
有所述加密认证芯片;The authentication device transmits authentication data to the drone to cause the drone to forward the authentication data to a remote controller, the authentication data being used to cause the remote controller to adopt a key pair included in the encryption authentication chip The authentication data is subjected to an encryption operation to obtain an operation result; wherein the remote controller is implanted
There is the encryption authentication chip;
所述认证设备接收所述遥控器通过所述无人机转发的所述运算结果;The authentication device receives the operation result that the remote controller forwards through the drone;
所述认证设备在确定所述运算结果正确时,确定能够与所述无人机进行通信。The authentication device determines that communication with the drone is determined when determining that the operation result is correct.
结合第一方面,在第一方面的第一种可能的实施方式中,所述认证设备在确定所述运算结果正确时,确定能够与所述无人机进行通信,包括:In conjunction with the first aspect, in a first possible implementation manner of the first aspect, the determining, when determining that the operation result is correct, determining that the UAV can communicate with the UAV, includes:
所述认证设备根据本地存储的加密认证算法对所述认证数据进行运算,获得目标运算结果;The authentication device performs an operation on the authentication data according to a locally stored encryption authentication algorithm to obtain a target operation result;
所述认证设备在确定所述运算结果与所述目标运算结果一致时,确定能够与所述无人机进行通信。The authentication device determines that communication with the drone is determined when determining that the operation result is consistent with the target operation result.
结合第一方面,在第一方面的第二种可能的实施方式中,所述认证设备在确定所述运算结果正确时,确定能够与所述无人机进行通信,包括:In conjunction with the first aspect, in a second possible implementation manner of the first aspect, the determining, when determining that the operation result is correct, determining that the UAV can communicate with the UAV includes:
所述认证设备对所述运算结果进行解密;Decrypting the operation result by the authentication device;
所述认证设备在确定解密结果与所述认证数据一致时,确定能够与所述无人机进行通信。The authentication device determines that communication with the drone is possible when determining that the decrypted result is consistent with the authentication data.
结合第一方面,在第一方面的第三种可能的实施方式中,所述方法还包括:In conjunction with the first aspect, in a third possible implementation manner of the first aspect, the method further includes:
所述认证设备根据所述遥控器中植入的所述加密认证芯片,对所述遥控器进行认证。The authentication device authenticates the remote controller according to the encrypted authentication chip implanted in the remote controller.
结合第一方面,第一方面的第一种、第二种或第三种可能的实现方式,在第一方面的第四种可能的实施方式中,所述认证设备与所述无人机连接,所述方法还包括:With reference to the first aspect, the first, second or third possible implementation of the first aspect, in a fourth possible implementation of the first aspect, the authentication device is connected to the drone The method further includes:
所述认证设备直接接收所述无人机向所述认证设备发送的数据信息,所述数据信息包括图像数据。The authentication device directly receives data information sent by the drone to the authentication device, and the data information includes image data.
结合第一方面,第一方面的第一种、第二种或第三种可能的实现方式,在第一方面的第五种可能的实施方式中,所述认证设备与所述无人机连接,所述方法还包括:With reference to the first aspect, the first, second or third possible implementation of the first aspect, in a fifth possible implementation manner of the first aspect, the authentication device is connected to the drone The method further includes:
所述认证设备直接向所述无人机发送无人机升级指令,以使所述无人机执行所述无人机升级指令,完成对应的升级操作。The authentication device directly sends a drone upgrade command to the drone to enable the drone to execute the drone upgrade command to complete a corresponding upgrade operation.
结合第一方面,第一方面的第一种、第二种或第三种可能的实现方式,
在第一方面的第六种可能的实施方式中,所述认证设备与所述无人机连接,所述方法还包括:With reference to the first aspect, the first, second or third possible implementation of the first aspect,
In a sixth possible implementation manner of the first aspect, the authentication device is connected to the drone, and the method further includes:
所述认证设备直接向所述无人机发送遥控器升级指令,以使所述无人机将所述遥控器升级指令转发至所述遥控器,使得所述遥控器执行所述遥控器升级指令,完成对应的升级操作。The authentication device directly sends a remote controller upgrade instruction to the drone to cause the drone to forward the remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction , complete the corresponding upgrade operation.
本发明第二方面提供一种设备认证方法,包括:A second aspect of the present invention provides a device authentication method, including:
无人机接收认证设备发送的认证数据;The drone receives the authentication data sent by the authentication device;
所述无人机将所述认证数据发送至遥控器,以使所述遥控器采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果,所述遥控器中植入有所述加密认证芯片;The drone transmits the authentication data to the remote controller, so that the remote controller encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, and the remote controller is implanted There is the encryption authentication chip;
所述无人机接收所述遥控器发送的所述运算结果,并将所述运算结果发送至所述认证设备,在确定所述运算结果正确时,确定能够与所述认证设备进行通信。The drone receives the operation result sent by the remote controller, and sends the operation result to the authentication device, and when it is determined that the operation result is correct, determines that the communication device can communicate with the authentication device.
结合第二方面,在第二方面的第一种可能的实施方式中,所述无人机与所述认证设备连接,所述方法还包括:In conjunction with the second aspect, in a first possible implementation of the second aspect, the drone is connected to the authentication device, the method further includes:
所述无人机直接向所述认证设备发送数据信息,所述数据信息包括图像数据。The drone directly transmits data information to the authentication device, the data information including image data.
结合第二方面,在第二方面的第二种可能的实施方式中,所述无人机与所述认证设备连接,所述方法还包括:In conjunction with the second aspect, in a second possible implementation of the second aspect, the drone is connected to the authentication device, the method further includes:
所述无人机直接接收所述认证设备发送的无人机升级指令,并执行所述无人机升级指令,完成对应的升级操作。The drone directly receives the drone upgrade command sent by the authentication device, and executes the drone upgrade command to complete the corresponding upgrade operation.
结合第二方面,在第二方面的第三种可能的实施方式中,所述无人机与所述认证设备连接,所述方法还包括:In conjunction with the second aspect, in a third possible implementation of the second aspect, the drone is connected to the authentication device, the method further includes:
所述无人机直接接收所述认证设备发送的遥控器升级指令,并将所述遥控器升级指令转发至所述遥控器,使得所述遥控器执行所述遥控器升级指令,完成对应的升级操作。The drone directly receives the remote controller upgrade command sent by the authentication device, and forwards the remote controller upgrade command to the remote controller, so that the remote controller executes the remote controller upgrade command to complete the corresponding upgrade. operating.
本发明第三方面提供一种设备认证方法,包括:A third aspect of the present invention provides a device authentication method, including:
遥控器接收无人机发送的认证数据,所述认证数据是认证设备发送给所述无人机并由所述无人机转发的;Receiving, by the remote controller, authentication data sent by the drone, the authentication data being sent by the authentication device to the drone and forwarded by the drone;
所述遥控器采用加密认证芯片中包含的密钥对所述认证数据进行加密运
算,获得运算结果,所述遥控器中植入有所述加密认证芯片;The remote controller encrypts the authentication data by using a key included in the encryption authentication chip
Calculating, obtaining the operation result, the remote controller is implanted with the encryption authentication chip;
所述遥控器将所述运算结果发送至所述无人机,以使所述无人机将所述运算结果转发至所述认证设备,所述运算结果用于使得所述认证设备在确定所述运算结果正确时,确定所述认证设备能够与所述无人机进行通信。The remote controller transmits the operation result to the drone to cause the drone to forward the operation result to the authentication device, and the operation result is used to cause the authentication device to determine When the result of the operation is correct, it is determined that the authentication device can communicate with the drone.
结合第三方面,在第三方面的第一种可能的实施方式中,所述遥控器中植入的所述加密认证芯片,还用于使得所述认证设备根据所述加密认证芯片对所述遥控器进行认证。In conjunction with the third aspect, in a first possible implementation manner of the third aspect, the cryptographic authentication chip implanted in the remote controller is further configured to enable the authentication device to perform the The remote control is authenticated.
结合第三方面,在第三方面的第二种可能的实施方式中,所述方法还包括:In conjunction with the third aspect, in a second possible implementation manner of the third aspect, the method further includes:
所述遥控器接收从所述认证设备发出的并经所述无人机转发的遥控器升级指令,并执行所述遥控器升级指令,完成对应的升级操作。The remote controller receives a remote controller upgrade command sent from the authentication device and forwarded by the drone, and executes the remote controller upgrade command to complete a corresponding upgrade operation.
本发明第四方面提供另一种设备认证方法,包括:A fourth aspect of the present invention provides another device authentication method, including:
认证设备向遥控器发送认证数据,以使所述遥控器将所述认证数据转发至无人机,所述认证数据用于使得所述无人机采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果;其中,所述无人机中植入有所述加密认证芯片;The authentication device transmits authentication data to the remote controller to cause the remote controller to forward the authentication data to the drone, the authentication data for causing the drone to adopt a key pair included in the encryption authentication chip The authentication data is subjected to an encryption operation to obtain an operation result; wherein the encryption authentication chip is implanted in the drone;
所述认证设备接收所述无人机通过所述遥控器转发的所述运算结果;The authentication device receives the operation result forwarded by the drone through the remote controller;
所述认证设备在确定所述运算结果正确时,确定能够与所述遥控器进行通信。The authentication device determines that communication with the remote controller is possible when determining that the operation result is correct.
结合第四方面,在第四方面的第一种可能的实施方式中,所述认证设备在确定所述运算结果正确时,确定能够与所述遥控器进行通信,包括:With reference to the fourth aspect, in a first possible implementation manner of the fourth aspect, the determining, when determining that the operation result is correct, determining that the remote controller can communicate with the remote controller, includes:
所述认证设备根据本地存储的加密认证算法对所述认证数据进行运算,获得目标运算结果;The authentication device performs an operation on the authentication data according to a locally stored encryption authentication algorithm to obtain a target operation result;
所述认证设备在确定所述运算结果与所述目标运算结果一致时,确定能够与所述遥控器进行通信。The authentication device determines that communication with the remote controller is possible when determining that the operation result is consistent with the target operation result.
结合第四方面,在第四方面的第二种可能的实施方式中,所述认证设备在确定所述运算结果正确时,确定能够与所述遥控器进行通信,包括:With reference to the fourth aspect, in a second possible implementation manner of the fourth aspect, the determining, when determining that the operation result is correct, determining that the remote controller can communicate with the remote controller, includes:
所述认证设备对所述运算结果进行解密;Decrypting the operation result by the authentication device;
所述认证设备在确定解密结果与所述认证数据一致时,确定能够与所述
遥控器进行通信。Determining, by the authentication device, that the decryption result is consistent with the authentication data,
The remote control communicates.
结合第四方面,在第四方面的第三种可能的实施方式中,所述认证设备与所述遥控器连接,所述方法还包括:In conjunction with the fourth aspect, in a third possible implementation of the fourth aspect, the authentication device is connected to the remote controller, the method further includes:
所述认证设备直接向所述遥控器发送遥控器升级指令,以使所述遥控器执行所述遥控器升级指令,完成对应的升级操作。The authentication device directly sends a remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction to complete a corresponding upgrade operation.
结合第四方面,在第四方面的第四种可能的实施方式中,所述认证设备与所述遥控器连接,所述方法还包括:In conjunction with the fourth aspect, in a fourth possible implementation of the fourth aspect, the authentication device is connected to the remote controller, the method further includes:
所述认证设备直接向所述遥控器发送无人机升级指令,以使所述遥控器将所述无人机升级指令转发至所述无人机,使得所述无人机执行所述无人机升级指令,完成对应的升级操作。The authentication device directly sends a drone upgrade command to the remote controller, so that the remote controller forwards the drone upgrade command to the drone, so that the drone performs the unmanned Machine upgrade instructions to complete the corresponding upgrade operation.
结合第四方面,在第四方面的第五种可能的实施方式中,所述认证设备与所述无人机连接,所述方法还包括:In conjunction with the fourth aspect, in a fifth possible implementation of the fourth aspect, the authentication device is connected to the drone, the method further includes:
所述认证设备直接接收所述无人机向所述认证设备发送的数据信息,所述数据信息包括图像数据。The authentication device directly receives data information sent by the drone to the authentication device, and the data information includes image data.
结合第四方面,在第四方面的第六种可能的实施方式中,所述认证设备与所述无人机连接,所述方法还包括:In conjunction with the fourth aspect, in a sixth possible implementation of the fourth aspect, the authentication device is connected to the drone, the method further includes:
所述认证设备直接向所述无人机发送无人机升级指令,以使所述无人机执行所述无人机升级指令,完成对应的升级操作。The authentication device directly sends a drone upgrade command to the drone to enable the drone to execute the drone upgrade command to complete a corresponding upgrade operation.
结合第四方面,在第四方面的第七种可能的实施方式中,所述方法还包括:With reference to the fourth aspect, in a seventh possible implementation manner of the fourth aspect, the method further includes:
所述认证设备根据所述无人机中植入的所述加密认证芯片,对所述无人机进行认证。The authentication device authenticates the drone according to the encrypted authentication chip implanted in the drone.
本发明第五方面提供一种设备认证方法,包括:A fifth aspect of the present invention provides a device authentication method, including:
遥控器接收认证设备发送的认证数据;The remote controller receives the authentication data sent by the authentication device;
所述遥控器将所述认证数据发送至无人机,以使所述无人机采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果,所述无人机中植入有所述加密认证芯片;The remote controller sends the authentication data to the drone, so that the drone encrypts the authentication data by using a key included in the encryption authentication chip, and obtains an operation result, in the drone Implanted with the encrypted authentication chip;
所述遥控器接收所述无人机发送的所述运算结果,并将所述运算结果发送至所述认证设备,在确定所述运算结果正确时,确定能够与所述认证设备进行通信。
The remote controller receives the operation result sent by the drone, and sends the operation result to the authentication device, and determines that the communication device can communicate with the authentication device when determining that the operation result is correct.
结合第五方面,在第五方面的第一种可能的实现方式中,所述遥控器与所述认证设备连接,所述方法还包括:In conjunction with the fifth aspect, in a first possible implementation manner of the fifth aspect, the remote controller is connected to the authentication device, the method further includes:
所述遥控器直接接收所述认证设备发送的遥控器升级指令,并执行所述遥控器升级指令,完成对应的升级操作。The remote controller directly receives the remote controller upgrade command sent by the authentication device, and executes the remote controller upgrade command to complete the corresponding upgrade operation.
结合第五方面,在第五方面的第二种可能的实现方式中,所述遥控器与所述认证设备连接,所述方法还包括:With reference to the fifth aspect, in a second possible implementation manner of the fifth aspect, the remote controller is connected to the authentication device, the method further includes:
所述遥控器直接接收所述认证设备发送的无人机升级指令,并将所述无人机升级指令转发至所述无人机,以使所述无人机执行所述无人机升级指令,完成对应的升级操作。The remote controller directly receives the drone upgrade command sent by the authentication device, and forwards the drone upgrade command to the drone to enable the drone to execute the drone upgrade command , complete the corresponding upgrade operation.
本发明第六方面提供一种设备认证方法,包括:A sixth aspect of the present invention provides a device authentication method, including:
无人机接收遥控器发送的认证数据,所述认证数据是认证设备发送给所述遥控器并由所述遥控器转发的;The drone receives the authentication data sent by the remote controller, and the authentication data is sent by the authentication device to the remote controller and forwarded by the remote controller;
所述无人机采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果,所述无人机中植入有所述加密认证芯片;The UAV encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted in the UAV;
所述无人机将所述运算结果发送至所述遥控器,以使所述遥控器将所述运算结果转发至所述认证设备,所述运算结果用于使得所述认证设备在确定所述运算结果正确时,确定所述认证设备能够与所述遥控器进行通信。The drone transmits the operation result to the remote controller, so that the remote controller forwards the operation result to the authentication device, and the operation result is used to cause the authentication device to determine the When the result of the operation is correct, it is determined that the authentication device is capable of communicating with the remote controller.
结合第六方面,在第六方面的第一种可能的实施方式中,所述无人机中植入的所述加密认证芯片,还用于使得所述认证设备根据所述加密认证芯片对所述无人机进行认证。In conjunction with the sixth aspect, in a first possible implementation manner of the sixth aspect, the cryptographic authentication chip that is implanted in the UAV is further configured to enable the authentication device to perform, according to the cryptographic authentication chip pair The drone is certified.
结合第六方面或第六方面的第一种可能的实施方式,在第六方面的第二种可能的实施方式中,所述无人机与所述认证设备连接,所述方法还包括:In conjunction with the sixth aspect, or the first possible implementation manner of the sixth aspect, in the second possible implementation manner of the sixth aspect, the
所述无人机直接向所述认证设备发送数据信息,所述数据信息包括图像数据。The drone directly transmits data information to the authentication device, the data information including image data.
结合第六方面或第六方面的第一种可能的实施方式,在第六方面的第三种可能的实施方式中,所述无人机与所述认证设备连接,所述方法还包括:With reference to the sixth aspect, or the first possible implementation manner of the sixth aspect, in a third possible implementation manner of the sixth aspect, the the drone is connected to the authentication device, the method further includes:
所述无人机直接接收所述认证设备发送的无人机升级指令,并执行所述无人机升级指令,完成对应的升级操作。The drone directly receives the drone upgrade command sent by the authentication device, and executes the drone upgrade command to complete the corresponding upgrade operation.
结合第六方面或第六方面的第一种可能的实施方式,在第六方面的第四
种可能的实施方式中,所述遥控器与所述认证设备连接,所述方法还包括:In combination with the sixth aspect or the first possible implementation of the sixth aspect, the fourth aspect of the sixth aspect
In a possible implementation, the remote controller is connected to the authentication device, and the method further includes:
所述无人机接收从所述认证设备发出的并经所述无人机转发的无人机升级指令,并执行所述无人机升级指令,完成对应的升级操作。The drone receives the drone upgrade command sent from the authentication device and forwarded by the drone, and executes the drone upgrade command to complete a corresponding upgrade operation.
本发明第七方面提供一种设备认证装置,所述设备认证装置设置在认证设备中,所述设备认证装置包括:A seventh aspect of the present invention provides a device authentication device, where the device authentication device is disposed in an authentication device, where the device authentication device includes:
发送模块,用于向无人机发送认证数据,以使所述无人机将所述认证数据转发至遥控器,所述认证数据用于使得所述遥控器采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果;其中,所述遥控器中植入有所述加密认证芯片;a sending module, configured to send the authentication data to the drone, so that the drone forwards the authentication data to a remote controller, where the authentication data is used to enable the remote controller to adopt a key included in the encrypted authentication chip Performing an encryption operation on the authentication data to obtain an operation result; wherein the encryption authentication chip is implanted in the remote controller;
接收模块,用于接收所述遥控器通过所述无人机转发的所述运算结果;a receiving module, configured to receive the operation result that is forwarded by the remote controller by the drone;
处理模块,用于在确定所述运算结果正确时,确定能够与所述无人机进行通信。And a processing module, configured to determine, when the operation result is correct, to be able to communicate with the drone.
结合第七方面,在第七方面的第一种可能的实现方式中,所述处理模块,具体用于:根据本地存储的加密认证算法对所述认证数据进行运算,获得目标运算结果;With reference to the seventh aspect, in a first possible implementation manner of the seventh aspect, the processing module is configured to: perform operation on the authentication data according to a locally stored encryption authentication algorithm, to obtain a target operation result;
在确定所述运算结果与所述目标运算结果一致时,确定能够与所述无人机进行通信。When it is determined that the operation result is consistent with the target operation result, it is determined that communication with the drone can be performed.
结合第七方面,在第七方面的第二种可能的实现方式中,所述处理模块,具体用于:With reference to the seventh aspect, in a second possible implementation manner of the seventh aspect, the processing module is specifically configured to:
对所述运算结果进行解密;Decrypting the operation result;
在确定解密结果与所述认证数据一致时,确定能够与所述无人机进行通信。When it is determined that the decrypted result is consistent with the authentication data, it is determined that communication with the drone is possible.
结合第七方面,在第七方面的第三种可能的实现方式中,所述处理模块还用于:In conjunction with the seventh aspect, in a third possible implementation manner of the seventh aspect, the processing module is further configured to:
根据所述遥控器中植入的所述加密认证芯片,对所述遥控器进行认证。The remote controller is authenticated according to the encrypted authentication chip implanted in the remote controller.
结合第七方面,第七方面的第一种、第二种或第三种可能的实现方式,在第七方面的第四种可能的实现方式中,所述认证设备与所述无人机连接,所述接收模块还用于:With reference to the seventh aspect, the first, second or third possible implementation manner of the seventh aspect, in a fourth possible implementation manner of the seventh aspect, the authentication device is connected to the drone The receiving module is further configured to:
直接接收所述无人机发送的数据信息,所述数据信息包括图像数据。Directly receiving data information transmitted by the drone, the data information including image data.
结合第七方面,第七方面的第一种、第二种或第三种可能的实现方式,
在第七方面的第五种可能的实现方式中,所述认证设备与所述无人机连接,所述发送模块还用于:With reference to the seventh aspect, the first, second or third possible implementation of the seventh aspect,
In a fifth possible implementation manner of the seventh aspect, the authentication device is connected to the UAV, and the sending module is further configured to:
直接向所述无人机发送无人机升级指令,以使所述无人机执行所述无人机升级指令,完成对应的升级操作。Directly sending a drone upgrade command to the drone to cause the drone to execute the drone upgrade command to complete a corresponding upgrade operation.
结合第七方面,第七方面的第一种、第二种或第三种可能的实现方式,在第七方面的第六种可能的实现方式中,所述认证设备与所述无人机连接,所述发送模块还用于:With reference to the seventh aspect, the first, second or third possible implementation manner of the seventh aspect, in a sixth possible implementation manner of the seventh aspect, the authentication device is connected to the drone The sending module is further configured to:
直接向所述无人机发送遥控器升级指令,以使所述无人机将所述遥控器升级指令转发至所述遥控器,使得所述遥控器执行所述遥控器升级指令,完成对应的升级操作。Sending a remote controller upgrade instruction directly to the drone to cause the drone to forward the remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction to complete the corresponding Upgrade operation.
本发明第八方面提供一种设备认证装置,所述设备认证装置设置在无人机中,所述设备认证装置包括:An eighth aspect of the present invention provides a device authentication device, where the device authentication device is disposed in a drone, and the device authentication device includes:
接收模块,用于接收认证设备发送的认证数据;a receiving module, configured to receive authentication data sent by the authentication device;
发送模块,用于将所述认证数据发送至遥控器,以使所述遥控器采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果,所述遥控器中植入有所述加密认证芯片;a sending module, configured to send the authentication data to the remote controller, so that the remote controller performs encryption operation on the authentication data by using a key included in the encryption authentication chip, and obtains an operation result, where the remote controller is implanted There is the encryption authentication chip;
所述接收模块,还用于接收所述遥控器发送的所述运算结果,并将所述运算结果发送至所述认证设备,在确定所述运算结果正确时,确定能够与所述认证设备进行通信。The receiving module is further configured to receive the operation result sent by the remote controller, and send the operation result to the authentication device, and when determining that the operation result is correct, determine that the operation may be performed with the authentication device. Communication.
结合第八方面,在第八方面的第一种可能的实现方式中,所述无人机与所述认证设备连接,所述发送模块还用于:In conjunction with the eighth aspect, in a first possible implementation of the eighth aspect, the drone is connected to the authentication device, and the sending module is further configured to:
直接向所述认证设备发送数据信息,所述数据信息包括图像数据。Data information is transmitted directly to the authentication device, the data information including image data.
结合第八方面,在第八方面的第二种可能的实现方式中,所述无人机与所述认证设备连接,所述接收模块还用于:In conjunction with the eighth aspect, in a second possible implementation of the eighth aspect, the drone is connected to the authentication device, and the receiving module is further configured to:
直接接收所述认证设备发送的无人机升级指令;Directly receiving the drone upgrade instruction sent by the authentication device;
所述装置还包括:The device also includes:
处理模块,用于执行所述无人机升级指令,完成对应的升级操作。The processing module is configured to execute the drone upgrade command to complete a corresponding upgrade operation.
结合第八方面,在第八方面的第三种可能的实现方式中,所述无人机与所述认证设备连接,所述接收模块还用于:In conjunction with the eighth aspect, in a third possible implementation of the eighth aspect, the drone is connected to the authentication device, and the receiving module is further configured to:
直接接收所述认证设备发送的遥控器升级指令;
Directly receiving a remote controller upgrade instruction sent by the authentication device;
所述发送模块还用于:将所述遥控器升级指令转发至所述遥控器,使得所述遥控器执行所述遥控器升级指令,完成对应的升级操作。The sending module is further configured to: forward the remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction to complete a corresponding upgrade operation.
本发明第九方面提供一种设备认证装置,所述设备认证装置设置在遥控器中,所述设备认证装置包括:A ninth aspect of the present invention provides a device authentication device, where the device authentication device is disposed in a remote controller, and the device authentication device includes:
接收模块,用于接收无人机发送的认证数据,所述认证数据是认证设备发送给所述无人机并由所述无人机转发的;a receiving module, configured to receive authentication data sent by the drone, where the authentication data is sent by the authentication device to the drone and forwarded by the drone;
处理模块,用于采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果,所述遥控器中植入有所述加密认证芯片;a processing module, configured to perform an encryption operation on the authentication data by using a key included in the encryption authentication chip, to obtain an operation result, where the remote authentication device is embedded with the encryption authentication chip;
发送模块,用于将所述运算结果发送至所述无人机,以使所述无人机将所述运算结果转发至所述认证设备,所述运算结果用于使得所述认证设备在确定所述运算结果正确时,确定所述认证设备能够与所述无人机进行通信。a sending module, configured to send the operation result to the drone, so that the drone forwards the operation result to the authentication device, where the operation result is used to make the authentication device determine When the operation result is correct, it is determined that the authentication device can communicate with the drone.
结合第九方面,在第九方面的第一种可能的实现方式中,所述遥控器中植入的所述加密认证芯片,还用于使得所述认证设备根据所述加密认证芯片对所述遥控器进行认证。In conjunction with the ninth aspect, in a first possible implementation manner of the ninth aspect, the cryptographic authentication chip implanted in the remote controller is further configured to enable the authentication device to perform the The remote control is authenticated.
结合第九方面,在第九方面的第二种可能的实现方式中,所述接收模块还用于:In conjunction with the ninth aspect, in a second possible implementation manner of the ninth aspect, the receiving module is further configured to:
接收从所述认证设备发出的并经所述无人机转发的遥控器升级指令;Receiving a remote controller upgrade command sent from the authentication device and forwarded by the drone;
所述处理模块还用于:执行所述遥控器升级指令,完成对应的升级操作。The processing module is further configured to: execute the remote controller upgrade instruction to complete a corresponding upgrade operation.
本发明第十方面提供一种设备认证装置,所述设备认证装置设置在认证设备中,所述设备认证装置包括:A tenth aspect of the present invention provides a device authentication device, where the device authentication device is disposed in an authentication device, where the device authentication device includes:
发送模块,用于向遥控器发送认证数据,以使所述遥控器将所述认证数据转发至无人机,所述认证数据用于使得所述无人机采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果;其中,所述无人机中植入有所述加密认证芯片;a sending module, configured to send the authentication data to the remote controller, so that the remote controller forwards the authentication data to the drone, and the authentication data is used to enable the drone to adopt a key included in the encrypted authentication chip Performing an encryption operation on the authentication data to obtain an operation result; wherein the encryption authentication chip is implanted in the UAV;
接收模块,用于接收所述无人机通过所述遥控器转发的所述运算结果;a receiving module, configured to receive the operation result that is forwarded by the drone through the remote controller;
处理模块,用于在确定所述运算结果正确时,确定能够与所述遥控器进行通信。And a processing module, configured to determine to be able to communicate with the remote controller when determining that the operation result is correct.
结合第十方面,在第十方面的第一种可能的实现方式中,所述处理模块具体用于:With reference to the tenth aspect, in a first possible implementation manner of the tenth aspect, the processing module is specifically configured to:
根据本地存储的加密认证算法对所述认证数据进行运算,获得目标运算
结果;Performing operation on the authentication data according to a locally stored encryption authentication algorithm to obtain a target operation
result;
在确定所述运算结果与所述目标运算结果一致时,确定能够与所述遥控器进行通信。When it is determined that the operation result is consistent with the target operation result, it is determined that communication with the remote controller is possible.
结合第十方面,在第十方面的第二种可能的实现方式中,所述所述处理模块具体用于:With reference to the tenth aspect, in a second possible implementation manner of the tenth aspect, the processing module is specifically configured to:
对所述运算结果进行解密;Decrypting the operation result;
在确定解密结果与所述认证数据一致时,确定能够与所述遥控器进行通信。When it is determined that the decrypted result is consistent with the authentication data, it is determined that communication with the remote controller is possible.
结合第十方面,在第十方面的第三种可能的实现方式中,所述认证设备与所述遥控器连接,所述发送模块还用于:In conjunction with the tenth aspect, in a third possible implementation of the tenth aspect, the authentication device is connected to the remote controller, and the sending module is further configured to:
直接向所述遥控器发送遥控器升级指令,以使所述遥控器执行所述遥控器升级指令,完成对应的升级操作。Sending a remote controller upgrade instruction directly to the remote controller, so that the remote controller executes the remote controller upgrade command to complete a corresponding upgrade operation.
结合第十方面,在第十方面的第四种可能的实现方式中,所述认证设备与所述遥控器连接,所述发送模块还用于:In conjunction with the tenth aspect, in a fourth possible implementation of the tenth aspect, the authentication device is connected to the remote controller, and the sending module is further configured to:
直接向所述遥控器发送无人机升级指令,以使所述遥控器将所述无人机升级指令转发至所述无人机,使得所述无人机执行所述无人机升级指令,完成对应的升级操作。Sending a drone upgrade command directly to the remote controller, so that the remote controller forwards the drone upgrade command to the drone, so that the drone performs the drone upgrade command, Complete the corresponding upgrade operation.
结合第十方面,在第十方面的第五种可能的实现方式中,所述认证设备与所述无人机连接,所述接收模块还用于:In conjunction with the tenth aspect, in a fifth possible implementation of the tenth aspect, the authentication device is connected to the drone, and the receiving module is further configured to:
直接接收所述无人机向所述认证设备发送的数据信息,所述数据信息包括图像数据。Directly receiving data information sent by the drone to the authentication device, the data information including image data.
结合第十方面,在第十方面的第六种可能的实现方式中,所述认证设备与所述无人机连接,所述发送模块还用于:In conjunction with the tenth aspect, in a sixth possible implementation of the tenth aspect, the authentication device is connected to the UAV, and the sending module is further configured to:
直接向所述无人机发送无人机升级指令,以使所述无人机执行所述无人机升级指令,完成对应的升级操作。Directly sending a drone upgrade command to the drone to cause the drone to execute the drone upgrade command to complete a corresponding upgrade operation.
结合第十方面,在第十方面的第七种可能的实现方式中,所述处理模块还用于:In conjunction with the tenth aspect, in a seventh possible implementation of the tenth aspect, the processing module is further configured to:
根据所述无人机中植入的所述加密认证芯片,对所述无人机进行认证。The drone is authenticated according to the encrypted authentication chip implanted in the drone.
本发明第十一方面提供一种无人机系统中设备认证装置,所述设备认证装置设置在遥控器中,所述设备认证装置包括:
An eleventh aspect of the present invention provides a device authentication device in an unmanned aerial vehicle system, where the device authentication device is disposed in a remote controller, and the device authentication device includes:
接收模块,用于接收认证设备发送的认证数据;a receiving module, configured to receive authentication data sent by the authentication device;
发送模块,用于将所述认证数据发送至无人机,以使所述无人机采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果,所述无人机中植入有所述加密认证芯片;a sending module, configured to send the authentication data to the drone, so that the drone encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, and the drone The encrypted authentication chip is implanted therein;
所述接收模块,还用于接收所述无人机发送的所述运算结果,并将所述运算结果发送至所述认证设备,在确定所述运算结果正确时,确定能够与所述认证设备进行通信。The receiving module is further configured to receive the operation result sent by the UAV, and send the operation result to the authentication device, and determine that the authentication device can be used when determining that the operation result is correct Communicate.
结合第十一方面,在第十一方面的第一种可能的实现方式中,所述遥控器与所述认证设备连接,所述接收模块还用于:In conjunction with the eleventh aspect, in a first possible implementation of the eleventh aspect, the remote controller is connected to the authentication device, and the receiving module is further configured to:
直接接收所述认证设备发送的遥控器升级指令;Directly receiving a remote controller upgrade instruction sent by the authentication device;
所述装置还包括:The device also includes:
处理模块,用于执行所述遥控器升级指令,完成对应的升级操作。The processing module is configured to execute the remote controller upgrade instruction to complete a corresponding upgrade operation.
结合第十一方面,在第十一方面的第二种可能的实现方式中,所述遥控器与所述认证设备连接,所述接收模块还用于:In conjunction with the eleventh aspect, in a second possible implementation of the eleventh aspect, the remote controller is connected to the authentication device, and the receiving module is further configured to:
直接接收所述认证设备发送的无人机升级指令;Directly receiving the drone upgrade instruction sent by the authentication device;
所述发送模块还用于:将所述无人机升级指令转发至所述无人机,以使所述无人机执行所述无人机升级指令,完成对应的升级操作。The sending module is further configured to: forward the UAV upgrade instruction to the UAV, so that the UAV performs the UAV upgrade instruction to complete a corresponding upgrade operation.
本发明第十二方面提供一种无人机系统中设备认证装置,所述设备认证装置设置在无人机中,所述设备认证装置包括:A twelfth aspect of the present invention provides a device authentication device in an unmanned aerial vehicle system, wherein the device authentication device is disposed in a drone, and the device authentication device includes:
接收模块,用于接收遥控器发送的认证数据,所述认证数据是认证设备发送给所述遥控器并由所述遥控器转发的;a receiving module, configured to receive authentication data sent by the remote controller, where the authentication data is sent by the authentication device to the remote controller and forwarded by the remote controller;
处理模块,用于采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果,所述无人机中植入有所述加密认证芯片;a processing module, configured to perform encryption operation on the authentication data by using a key included in the encryption authentication chip, to obtain an operation result, where the encryption authentication chip is implanted in the UAV;
发送模块,用于将所述运算结果发送至所述遥控器,以使所述遥控器将所述运算结果转发至所述认证设备,所述运算结果用于使得所述认证设备在确定所述运算结果正确时,确定所述认证设备能够与所述遥控器进行通信。a sending module, configured to send the operation result to the remote controller, so that the remote controller forwards the operation result to the authentication device, where the operation result is used to cause the authentication device to determine the When the result of the operation is correct, it is determined that the authentication device is capable of communicating with the remote controller.
结合第十二方面,在第十二方面的第一种可能的实现方式中,所述无人机中植入的所述加密认证芯片,还用于使得所述认证设备根据所述加密认证芯片对所述无人机进行认证。In conjunction with the twelfth aspect, in a first possible implementation of the twelfth aspect, the cryptographic authentication chip implanted in the drone is further configured to cause the authentication device to perform an authentication chip according to the encryption The drone is authenticated.
结合第十二方面或第十二方面的第一种可能的实现方式,在第十二方面
的第二种可能的实现方式中,所述无人机与所述认证设备连接,所述发送模块还用于:In combination with the twelfth aspect or the first possible implementation of the twelfth aspect, in the twelfth aspect
In a second possible implementation manner, the drone is connected to the authentication device, and the sending module is further configured to:
直接向所述认证设备发送数据信息,所述数据信息包括图像数据。Data information is transmitted directly to the authentication device, the data information including image data.
结合第十二方面或第十二方面的第一种可能的实现方式,在第十二方面的第二种可能的实现方式中,所述无人机与所述认证设备连接,所述接收模块还用于:In conjunction with the twelfth aspect or the first possible implementation of the twelfth aspect, in a second possible implementation of the twelfth aspect, the drone is connected to the authentication device, the receiving module Also used for:
直接接收所述认证设备发送的无人机升级指令;Directly receiving the drone upgrade instruction sent by the authentication device;
所述处理模块还用于:执行所述无人机升级指令,完成对应的升级操作。The processing module is further configured to: execute the drone upgrade instruction, and complete a corresponding upgrade operation.
结合第十二方面或第十二方面的第一种可能的实现方式,在第十二方面的第三种可能的实现方式中,所述遥控器与所述认证设备连接,所述接收模块还用于:In conjunction with the twelfth aspect or the first possible implementation of the twelfth aspect, in a third possible implementation of the twelfth aspect, the remote controller is connected to the authentication device, and the receiving module further Used for:
接收从所述认证设备发出的并经所述无人机转发的无人机升级指令;Receiving a drone upgrade command sent from the authentication device and forwarded by the drone;
所述处理模块还用于:执行所述无人机升级指令,完成对应的升级操作。The processing module is further configured to: execute the drone upgrade instruction, and complete a corresponding upgrade operation.
本发明第十三方面提供一种认证设备,包括:A thirteenth aspect of the present invention provides an authentication device, including:
发送器,用于向无人机发送认证数据,以使所述无人机将所述认证数据转发至遥控器,所述认证数据用于使得所述遥控器采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果;其中,所述遥控器中植入有所述加密认证芯片;a transmitter for transmitting authentication data to the drone to cause the drone to forward the authentication data to a remote controller, the authentication data being used to cause the remote controller to adopt a key included in the encryption authentication chip Performing an encryption operation on the authentication data to obtain an operation result; wherein the encryption authentication chip is implanted in the remote controller;
接收器,用于接收所述遥控器通过所述无人机转发的所述运算结果;a receiver, configured to receive the operation result that is forwarded by the remote controller by the drone;
处理器,用于在确定所述运算结果正确时,确定能够与所述无人机进行通信。And a processor, configured to determine to be able to communicate with the drone when determining that the operation result is correct.
结合第十三方面,在第十三方面的第一种可能的实现方式中,所述处理器,具体用于:根据本地存储的加密认证算法对所述认证数据进行运算,获得目标运算结果;With reference to the thirteenth aspect, in a first possible implementation manner of the thirteenth aspect, the processor is configured to: perform operation on the authentication data according to a locally stored encryption authentication algorithm, to obtain a target operation result;
在确定所述运算结果与所述目标运算结果一致时,确定能够与所述无人机进行通信。When it is determined that the operation result is consistent with the target operation result, it is determined that communication with the drone can be performed.
结合第十三方面,在第十三方面的第二种可能的实现方式中,所述处理器,具体用于:In conjunction with the thirteenth aspect, in a second possible implementation manner of the thirteenth aspect, the processor is specifically configured to:
对所述运算结果进行解密;Decrypting the operation result;
在确定解密结果与所述认证数据一致时,确定能够与所述无人机进行通
信。Determining that the decryption result is consistent with the authentication data, determining that the drone can communicate with the drone
letter.
结合第十三方面,在第十三方面的第三种可能的实现方式中,所述处理器还用于:In conjunction with the thirteenth aspect, in a third possible implementation of the thirteenth aspect, the processor is further configured to:
根据所述遥控器中植入的所述加密认证芯片,对所述遥控器进行认证。The remote controller is authenticated according to the encrypted authentication chip implanted in the remote controller.
结合第十三方面,第十三方面的第一种、第二种或第三种可能的实现方式,在第十三方面的第四种可能的实现方式中,所述认证设备与所述无人机连接,所述接收器还用于:With reference to the thirteenth aspect, the first, second or third possible implementation manner of the thirteenth aspect, in the fourth possible implementation manner of the thirteenth aspect, the authentication device and the The human machine is connected, and the receiver is also used to:
直接接收所述无人机发送的数据信息,所述数据信息包括图像数据。Directly receiving data information transmitted by the drone, the data information including image data.
结合第十三方面,第十三方面的第一种、第二种或第三种可能的实现方式,在第十三方面的第五种可能的实现方式中,所述认证设备与所述无人机连接,所述发送器还用于:With reference to the thirteenth aspect, the first, second or third possible implementation manner of the thirteenth aspect, in a fifth possible implementation manner of the thirteenth aspect, Human machine connection, the transmitter is also used to:
直接向所述无人机发送无人机升级指令,以使所述无人机执行所述无人机升级指令,完成对应的升级操作。Directly sending a drone upgrade command to the drone to cause the drone to execute the drone upgrade command to complete a corresponding upgrade operation.
结合第十三方面,第十三方面的第一种、第二种或第三种可能的实现方式,在第十三方面的第六种可能的实现方式中,所述认证设备与所述无人机连接,所述发送器还用于:With reference to the thirteenth aspect, the first, second or third possible implementation manner of the thirteenth aspect, in the sixth possible implementation manner of the thirteenth aspect, the authentication device and the Human machine connection, the transmitter is also used to:
直接向所述无人机发送遥控器升级指令,以使所述无人机将所述遥控器升级指令转发至所述遥控器,使得所述遥控器执行所述遥控器升级指令,完成对应的升级操作。Sending a remote controller upgrade instruction directly to the drone to cause the drone to forward the remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction to complete the corresponding Upgrade operation.
本发明第十四方面提供一种无人机,包括:A fourteenth aspect of the present invention provides a drone, comprising:
接收器,用于接收认证设备发送的认证数据;a receiver, configured to receive authentication data sent by the authentication device;
发送器,用于将所述认证数据发送至遥控器,以使所述遥控器采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果,所述遥控器中植入有所述加密认证芯片;a transmitter, configured to send the authentication data to the remote controller, so that the remote controller performs encryption operation on the authentication data by using a key included in the encryption authentication chip, and obtains an operation result, where the remote controller is implanted There is the encryption authentication chip;
所述接收器,还用于接收所述遥控器发送的所述运算结果,并将所述运算结果发送至所述认证设备,在确定所述运算结果正确时,确定能够与所述认证设备进行通信。The receiver is further configured to receive the operation result sent by the remote controller, and send the operation result to the authentication device, and when determining that the operation result is correct, determine that the operation may be performed with the authentication device. Communication.
结合第十四方面,在第十四方面的第一种可能的实现方式中,所述无人机与所述认证设备连接,所述发送器还用于:In conjunction with the fourteenth aspect, in a first possible implementation of the fourteenth aspect, the drone is connected to the authentication device, and the transmitter is further configured to:
直接向所述认证设备发送数据信息,所述数据信息包括图像数据。
Data information is transmitted directly to the authentication device, the data information including image data.
结合第十四方面,在第十四方面的第二种可能的实现方式中,所述无人机与所述认证设备连接,所述接收器还用于:In conjunction with the fourteenth aspect, in a second possible implementation of the fourteenth aspect, the drone is connected to the authentication device, and the receiver is further configured to:
直接接收所述认证设备发送的无人机升级指令;Directly receiving the drone upgrade instruction sent by the authentication device;
所述无人机还包括:The drone further includes:
处理器,用于执行所述无人机升级指令,完成对应的升级操作。The processor is configured to execute the drone upgrade instruction to complete a corresponding upgrade operation.
结合第十四方面,在第十四方面的第三种可能的实现方式中,所述无人机与所述认证设备连接,所述接收器还用于:In conjunction with the fourteenth aspect, in a third possible implementation of the fourteenth aspect, the drone is connected to the authentication device, and the receiver is further configured to:
直接接收所述认证设备发送的遥控器升级指令;Directly receiving a remote controller upgrade instruction sent by the authentication device;
所述发送器还用于:将所述遥控器升级指令转发至所述遥控器,使得所述遥控器执行所述遥控器升级指令,完成对应的升级操作。The transmitter is further configured to: forward the remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction to complete a corresponding upgrade operation.
本发明第十五方面提供一种遥控器,包括:A fifteenth aspect of the present invention provides a remote controller, including:
接收器,用于接收无人机发送的认证数据,所述认证数据是认证设备发送给所述无人机并由所述无人机转发的;a receiver, configured to receive authentication data sent by the drone, where the authentication data is sent by the authentication device to the drone and forwarded by the drone;
处理器,用于采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果,所述遥控器中植入有所述加密认证芯片;a processor, configured to perform an encryption operation on the authentication data by using a key included in the encryption authentication chip, to obtain an operation result, where the remote authentication device is embedded with the encryption authentication chip;
发送器,用于将所述运算结果发送至所述无人机,以使所述无人机将所述运算结果转发至所述认证设备,所述运算结果用于使得所述认证设备在确定所述运算结果正确时,确定所述认证设备能够与所述无人机进行通信。a transmitter, configured to send the operation result to the drone, so that the drone forwards the operation result to the authentication device, where the operation result is used to cause the authentication device to determine When the operation result is correct, it is determined that the authentication device can communicate with the drone.
结合第十五方面,在第十五方面的第一种可能的实现方式中,所述遥控器中植入的所述加密认证芯片,还用于使得所述认证设备根据所述加密认证芯片对所述遥控器进行认证。In conjunction with the fifteenth aspect, in a first possible implementation manner of the fifteenth aspect, the cryptographic authentication chip implanted in the remote controller is further configured to enable the authentication device to perform authentication according to the encrypted authentication chip pair The remote controller performs authentication.
结合第十五方面,在第十五方面的第二种可能的实现方式中,所述接收器还用于:In conjunction with the fifteenth aspect, in a second possible implementation manner of the fifteenth aspect, the receiver is further configured to:
接收从所述认证设备发出的并经所述无人机转发的遥控器升级指令;Receiving a remote controller upgrade command sent from the authentication device and forwarded by the drone;
所述处理器还用于:执行所述遥控器升级指令,完成对应的升级操作。The processor is further configured to: execute the remote controller upgrade instruction to complete a corresponding upgrade operation.
本发明第十六方面提供一种认证设备,包括:A sixteenth aspect of the present invention provides an authentication device, including:
发送器,用于向遥控器发送认证数据,以使所述遥控器将所述认证数据转发至无人机,所述认证数据用于使得所述无人机采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果;其中,所述无人机中植入有所述加密认证芯片;
a transmitter for transmitting authentication data to the remote controller to cause the remote controller to forward the authentication data to the drone, the authentication data for causing the drone to adopt a key included in the encryption authentication chip Performing an encryption operation on the authentication data to obtain an operation result; wherein the encryption authentication chip is implanted in the UAV;
接收器,用于接收所述无人机通过所述遥控器转发的所述运算结果;a receiver, configured to receive the operation result that is forwarded by the drone through the remote controller;
处理器,用于在确定所述运算结果正确时,确定能够与所述遥控器进行通信。And a processor, configured to determine, when the operation result is correct, to be able to communicate with the remote controller.
结合第十六方面,在第十六方面的第一种可能的实现方式中,所述处理器具体用于:In conjunction with the sixteenth aspect, in a first possible implementation manner of the sixteenth aspect, the processor is specifically configured to:
根据本地存储的加密认证算法对所述认证数据进行运算,获得目标运算结果;Performing an operation on the authentication data according to a locally stored encryption authentication algorithm to obtain a target operation result;
在确定所述运算结果与所述目标运算结果一致时,确定能够与所述遥控器进行通信。When it is determined that the operation result is consistent with the target operation result, it is determined that communication with the remote controller is possible.
结合第十六方面,在第十六方面的第二种可能的实现方式中,所述处理器具体用于:In conjunction with the sixteenth aspect, in a second possible implementation manner of the sixteenth aspect, the processor is specifically configured to:
对所述运算结果进行解密;Decrypting the operation result;
在确定解密结果与所述认证数据一致时,确定能够与所述遥控器进行通信。When it is determined that the decrypted result is consistent with the authentication data, it is determined that communication with the remote controller is possible.
结合第十六方面,在第十六方面的第三种可能的实现方式中,所述认证设备与所述遥控器连接,所述发送器还用于:In conjunction with the sixteenth aspect, in a third possible implementation of the sixteenth aspect, the authentication device is connected to the remote controller, and the transmitter is further configured to:
直接向所述遥控器发送遥控器升级指令,以使所述遥控器执行所述遥控器升级指令,完成对应的升级操作。Sending a remote controller upgrade instruction directly to the remote controller, so that the remote controller executes the remote controller upgrade command to complete a corresponding upgrade operation.
结合第十六方面,在第十六方面的第四种可能的实现方式中,所述认证设备与所述遥控器连接,所述发送器还用于:In conjunction with the sixteenth aspect, in a fourth possible implementation of the sixteenth aspect, the authentication device is connected to the remote controller, and the transmitter is further configured to:
直接向所述遥控器发送无人机升级指令,以使所述遥控器将所述无人机升级指令转发至所述无人机,使得所述无人机执行所述无人机升级指令,完成对应的升级操作。Sending a drone upgrade command directly to the remote controller, so that the remote controller forwards the drone upgrade command to the drone, so that the drone performs the drone upgrade command, Complete the corresponding upgrade operation.
结合第十六方面,在第十六方面的第五种可能的实现方式中,所述认证设备与所述无人机连接,所述接收器还用于:In conjunction with the sixteenth aspect, in a fifth possible implementation of the sixteenth aspect, the authentication device is connected to the drone, and the receiver is further configured to:
直接接收所述无人机向所述认证设备发送的数据信息,所述数据信息包括图像数据。Directly receiving data information sent by the drone to the authentication device, the data information including image data.
结合第十六方面,在第十六方面的第六种可能的实现方式中,所述认证设备与所述无人机连接,所述发送器还用于:In conjunction with the sixteenth aspect, in a sixth possible implementation of the sixteenth aspect, the authentication device is connected to the drone, and the transmitter is further configured to:
直接向所述无人机发送无人机升级指令,以使所述无人机执行所述无人
机升级指令,完成对应的升级操作。Sending a drone upgrade instruction directly to the drone to cause the drone to execute the unmanned
Machine upgrade instructions to complete the corresponding upgrade operation.
结合第十六方面,在第十六方面的第七种可能的实现方式中,所述处理器还用于:In conjunction with the sixteenth aspect, in a seventh possible implementation of the sixteenth aspect, the processor is further configured to:
根据所述无人机中植入的所述加密认证芯片,对所述无人机进行认证。The drone is authenticated according to the encrypted authentication chip implanted in the drone.
本发明第十七方面提供一种遥控器,包括:A seventeenth aspect of the present invention provides a remote controller, including:
接收器,用于接收认证设备发送的认证数据;a receiver, configured to receive authentication data sent by the authentication device;
发送器,用于将所述认证数据发送至无人机,以使所述无人机采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果,所述无人机中植入有所述加密认证芯片;a transmitter, configured to send the authentication data to the drone, so that the drone encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, and the drone The encrypted authentication chip is implanted therein;
所述接收器,还用于接收所述无人机发送的所述运算结果,并将所述运算结果发送至所述认证设备,在确定所述运算结果正确时,确定能够与所述认证设备进行通信。The receiver is further configured to receive the operation result sent by the drone, and send the operation result to the authentication device, and determine that the authentication device can be used when determining that the operation result is correct Communicate.
结合第十七方面,在第十七方面的第一种可能的实现方式中,所述遥控器与所述认证设备连接,所述接收器还用于:In conjunction with the seventeenth aspect, in a first possible implementation of the seventeenth aspect, the remote controller is connected to the authentication device, and the receiver is further configured to:
直接接收所述认证设备发送的遥控器升级指令;Directly receiving a remote controller upgrade instruction sent by the authentication device;
所述遥控器还包括:The remote controller further includes:
处理器,用于执行所述遥控器升级指令,完成对应的升级操作。The processor is configured to execute the remote controller upgrade instruction to complete a corresponding upgrade operation.
结合第十七方面,在第十七方面的第二种可能的实现方式中,所述遥控器与所述认证设备连接,所述接收器还用于:直接接收所述认证设备发送的无人机升级指令;In conjunction with the seventeenth aspect, in a second possible implementation of the seventeenth aspect, the remote controller is connected to the authentication device, and the receiver is further configured to: directly receive the unsent sent by the authentication device Machine upgrade instruction;
所述发送器还用于:将所述无人机升级指令转发至所述无人机,以使所述无人机执行所述无人机升级指令,完成对应的升级操作。The transmitter is further configured to: forward the UAV upgrade instruction to the UAV, so that the UAV performs the UAV upgrade instruction to complete a corresponding upgrade operation.
本发明第十八方面一种无人机,其特征在于,包括:An eighteenth aspect of the present invention provides a drone, comprising:
接收器,用于接收遥控器发送的认证数据,所述认证数据是认证设备发送给所述遥控器并由所述遥控器转发的;a receiver, configured to receive authentication data sent by a remote controller, where the authentication data is sent by the authentication device to the remote controller and forwarded by the remote controller;
处理器,用于采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果,所述无人机中植入有所述加密认证芯片;a processor, configured to perform an encryption operation on the authentication data by using a key included in the encryption authentication chip, to obtain an operation result, where the encryption authentication chip is implanted in the UAV;
发送器,用于将所述运算结果发送至所述遥控器,以使所述遥控器将所述运算结果转发至所述认证设备,所述运算结果用于使得所述认证设备在确定所述运算结果正确时,确定所述认证设备能够与所述遥控器进行通信。
a transmitter, configured to send the operation result to the remote controller, to cause the remote controller to forward the operation result to the authentication device, where the operation result is used to cause the authentication device to determine the When the result of the operation is correct, it is determined that the authentication device is capable of communicating with the remote controller.
结合第十八方面,在第十八方面的第一种可能的实现方式中,所述无人机中植入的所述加密认证芯片,还用于使得所述认证设备根据所述加密认证芯片对所述无人机进行认证。In conjunction with the eighteenth aspect, in a first possible implementation of the eighteenth aspect, the cryptographic authentication chip implanted in the drone is further configured to cause the authentication device to perform the cryptographic authentication chip according to the cryptographic authentication chip. The drone is authenticated.
结合第十八方面或第十八方面的第一种可能的实现方式,在第十八方面的第二种可能的实现方式中,所述无人机与所述认证设备连接,所述发送器还用于:In conjunction with the eighteenth aspect, or the first possible implementation of the eighteenth aspect, in a second possible implementation of the eighteenth aspect, the drone is connected to the authentication device, the transmitter Also used for:
直接向所述认证设备发送数据信息,所述数据信息包括图像数据。Data information is transmitted directly to the authentication device, the data information including image data.
结合第十八方面或第十八方面的第一种可能的实现方式,在第十八方面的第三种可能的实现方式中,所述无人机与所述认证设备连接,所述接收器还用于:In conjunction with the eighteenth aspect or the first possible implementation of the eighteenth aspect, in a third possible implementation of the eighteenth aspect, the drone is connected to the authentication device, the receiver Also used for:
直接接收所述认证设备发送的无人机升级指令;Directly receiving the drone upgrade instruction sent by the authentication device;
所述处理器还用于:执行所述无人机升级指令,完成对应的升级操作。The processor is further configured to: execute the drone upgrade instruction to complete a corresponding upgrade operation.
结合第十八方面或第十八方面的第一种可能的实现方式,在第十八方面的第四种可能的实现方式中,所述遥控器与所述认证设备连接,所述接收器还用于:接收从所述认证设备发出的并经所述无人机转发的无人机升级指令;In conjunction with the eighteenth aspect, or the first possible implementation of the eighteenth aspect, in a fourth possible implementation of the eighteenth aspect, the remote controller is connected to the authentication device, and the receiver further For receiving: a drone upgrade instruction sent from the authentication device and forwarded by the drone;
所述处理器还用于:执行所述无人机升级指令,完成对应的升级操作。The processor is further configured to: execute the drone upgrade instruction to complete a corresponding upgrade operation.
本发明提供的设备认证方法、装置、认证设备、无人机和遥控器,认证设备向无人机发送认证数据,以使无人机将认证数据转发至遥控器,认证数据用于使得遥控器采用加密认证芯片中包含的密钥对认证数据进行加密运算,获得运算结果;其中,遥控器中植入有加密认证芯片;认证设备接收遥控器通过无人机转发的所述运算结果;认证设备在确定该运算结果正确时,确定能够与无人机进行通信。认证设备通过远程认证方式,只使用植入在遥控器中的加密认证芯片便实现了对无人机和遥控器的认证,节省了认证成本,且提高了认证处理效率。The device authentication method, device, authentication device, drone and remote controller provided by the invention, the authentication device sends the authentication data to the drone, so that the drone forwards the authentication data to the remote controller, and the authentication data is used to make the remote controller Encrypting the authentication data by using a key included in the encryption authentication chip to obtain an operation result; wherein the remote controller is embedded with an encryption authentication chip; the authentication device receives the operation result forwarded by the remote controller through the drone; and the authentication device When it is determined that the result of the operation is correct, it is determined that communication with the drone can be performed. The authentication device realizes the authentication of the drone and the remote controller by using the remote authentication method only by using the encryption authentication chip embedded in the remote controller, which saves the certification cost and improves the authentication processing efficiency.
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作一简单地介绍,显而易见地,下面描述中的附图是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, a brief description of the drawings used in the embodiments or the prior art description will be briefly described below. Obviously, the drawings in the following description It is a certain embodiment of the present invention, and other drawings can be obtained from those skilled in the art without any inventive labor.
图1(a)为本发明实施例提供的一种认证场景示意图;FIG. 1 is a schematic diagram of an authentication scenario according to an embodiment of the present invention;
图1(b)为本发明实施例提供的另一种认证场景示意图;FIG. 1(b) is a schematic diagram of another authentication scenario according to an embodiment of the present invention;
图2为本发明实施例提供的设备认证方法实施例一的流程图;2 is a flowchart of Embodiment 1 of a device authentication method according to an embodiment of the present invention;
图3为本发明实施例提供的设备认证方法实施例二的流程图;FIG. 3 is a flowchart of Embodiment 2 of a device authentication method according to an embodiment of the present disclosure;
图4为本发明实施例提供的设备认证方法实施例三的流程图;4 is a flowchart of Embodiment 3 of a device authentication method according to an embodiment of the present invention;
图5为本发明实施例提供的设备认证方法实施例四的流程图;FIG. 5 is a flowchart of Embodiment 4 of a device authentication method according to an embodiment of the present disclosure;
图6为本发明实施例提供的设备认证方法实施例五的流程图;FIG. 6 is a flowchart of Embodiment 5 of a device authentication method according to an embodiment of the present disclosure;
图7为本发明实施例提供的设备认证方法实施例六的信令交互图;FIG. 7 is a signaling interaction diagram of Embodiment 6 of a device authentication method according to an embodiment of the present disclosure;
图8为本发明实施例提供的设备认证方法实施例七的流程图;FIG. 8 is a flowchart of Embodiment 7 of a device authentication method according to an embodiment of the present disclosure;
图9为本发明实施例提供的设备认证方法实施例八的流程图;FIG. 9 is a flowchart of Embodiment 8 of a device authentication method according to an embodiment of the present disclosure;
图10为本发明实施例提供的设备认证方法实施例九的流程图;FIG. 10 is a flowchart of Embodiment 9 of a device authentication method according to an embodiment of the present disclosure;
图11为本发明实施例提供的设备认证方法实施例十的流程图;FIG. 11 is a flowchart of Embodiment 10 of a device authentication method according to an embodiment of the present disclosure;
图12为本发明实施例提供的设备认证方法实施例十一的流程图;FIG. 12 is a flowchart of Embodiment 11 of a device authentication method according to an embodiment of the present disclosure;
图13为本发明实施例提供的设备认证方法实施例十二的信令交互图;FIG. 13 is a signaling interaction diagram of Embodiment 12 of a device authentication method according to an embodiment of the present disclosure;
图14为本发明实施例提供的设备认证装置实施例一的结构示意图;FIG. 14 is a schematic structural diagram of Embodiment 1 of a device authentication apparatus according to an embodiment of the present disclosure;
图15为本发明实施例提供的设备认证装置实施例二的结构示意图;FIG. 15 is a schematic structural diagram of Embodiment 2 of a device authentication apparatus according to an embodiment of the present disclosure;
图16为本发明实施例提供的设备认证装置实施例三的结构示意图;FIG. 16 is a schematic structural diagram of Embodiment 3 of a device authentication apparatus according to an embodiment of the present disclosure;
图17为本发明实施例提供的设备认证装置实施例四的结构示意图;FIG. 17 is a schematic structural diagram of Embodiment 4 of a device authentication apparatus according to an embodiment of the present disclosure;
图18为本发明实施例提供的设备认证装置实施例五的结构示意图;FIG. 18 is a schematic structural diagram of Embodiment 5 of a device authentication apparatus according to an embodiment of the present disclosure;
图19为本发明实施例提供的设备认证装置实施例六的结构示意图;FIG. 19 is a schematic structural diagram of Embodiment 6 of a device authentication apparatus according to an embodiment of the present disclosure;
图20为本发明实施例提供的认证设备实施例一的结构示意图;FIG. 20 is a schematic structural diagram of Embodiment 1 of an authentication device according to an embodiment of the present disclosure;
图21为本发明实施例提供的无人机实施例一的结构示意图;FIG. 21 is a schematic structural diagram of Embodiment 1 of a drone according to an embodiment of the present invention;
图22为本发明实施例提供的遥控器实施例一的结构示意图;FIG. 22 is a schematic structural diagram of Embodiment 1 of a remote controller according to an embodiment of the present disclosure;
图23为本发明实施例提供的认证设备实施例二的结构示意图;FIG. 23 is a schematic structural diagram of Embodiment 2 of an authentication device according to an embodiment of the present disclosure;
图24为本发明实施例提供的遥控器实施例二的结构示意图;FIG. 24 is a schematic structural diagram of Embodiment 2 of a remote controller according to an embodiment of the present disclosure;
图25为本发明实施例提供的无人机实施例二的结构示意图。FIG. 25 is a schematic structural diagram of Embodiment 2 of a drone according to an embodiment of the present invention.
为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,
显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention are clearly and completely described in the following with reference to the accompanying drawings in the embodiments of the present invention.
It is apparent that the described embodiments are a part of the embodiments of the invention, and not all of the embodiments. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention without creative efforts are within the scope of the present invention.
首先结合图1(a)和图1(b)对本发明实施例适用的认证场景进行说明,假设无人机系统中包括认证设备和被认证设备,其中被认证设备包括遥控器和无人机。认证设备比如为PC机、智能手机终端、平板电脑等终端设备。在本发明实施例中的认证场景中,仅在一个被认证设备中植入有加密认证芯片。First, the authentication scenario to which the embodiment of the present invention is applied will be described with reference to FIG. 1(a) and FIG. 1(b). It is assumed that the unmanned aerial vehicle system includes an authentication device and an authenticated device, wherein the authenticated device includes a remote controller and a drone. The authentication device is, for example, a terminal device such as a PC, a smart phone terminal, or a tablet computer. In the authentication scenario in the embodiment of the present invention, an encrypted authentication chip is implanted only in one authenticated device.
上述两个被认证设备与认证设备的连接关系为:认证设备可以分别与两个被认证设备通过物理连接的方式进行连接,两个被认证设备之间可以通过无线或者有线的通信方式进行连接。其中,上述物理连接方式比如为通过串口总线方式连接。The connection relationship between the two authenticated devices and the authentication device is: the authentication device can be connected to the two authenticated devices through physical connection, and the two authenticated devices can be connected by wireless or wired communication. The physical connection manner is, for example, connected through a serial bus.
具体地,图1(a)为本发明实施例提供的一种认证场景示意图,在图1(a)中,在遥控器中植入有加密认证芯片,其中,认证设备与无人机通过物理连接方式进行连接,比如通过串口连接,无人机与遥控器间可以通过建立无线链路进行无线连接。值得说明的是,图1(a)中仅示意出认证设备与无人机的物理连接,实际上,认证设备也可以与遥控器间建立物理连接,从而在该认证场景下,仅通过安装在遥控器中的一个加密认证芯片便可以实现对无人机和遥控器的认证。Specifically, FIG. 1(a) is a schematic diagram of an authentication scenario according to an embodiment of the present invention. In FIG. 1(a), an encryption authentication chip is embedded in a remote controller, wherein the authentication device and the drone pass physical The connection mode is connected, for example, through a serial port connection, and the wireless connection can be established by establishing a wireless link between the drone and the remote controller. It should be noted that only the physical connection between the authentication device and the UAV is illustrated in FIG. 1(a). In fact, the authentication device can also establish a physical connection with the remote controller, so that in the authentication scenario, only by installing An encrypted authentication chip in the remote control can authenticate the drone and remote control.
图1(b)为本发明实施例提供的另一种认证场景示意图,在图1(b)中,在无人机中植入有加密认证芯片,其中,认证设备与遥控器通过物理连接方式进行连接,比如通过串口连接,无人机与遥控器间可以通过建立无线链路进行无线连接。值得说明的是,图1(b)中仅示意出认证设备与遥控器的物理连接,实际上,认证设备也可以与无人机间建立物理连接,从而在该认证场景下,仅通过安装在无人机中的一个加密认证芯片便可以实现对无人机和遥控器的认证。FIG. 1(b) is a schematic diagram of another authentication scenario according to an embodiment of the present invention. In FIG. 1(b), an encryption authentication chip is embedded in a drone, wherein the authentication device and the remote controller are physically connected. To make a connection, such as through a serial port, the wireless connection between the drone and the remote can be established by establishing a wireless link. It should be noted that only the physical connection between the authentication device and the remote controller is illustrated in FIG. 1(b). In fact, the authentication device can also establish a physical connection with the drone, so that in the authentication scenario, only by installing An encrypted authentication chip in the drone can be used to authenticate the drone and remote control.
以下,分别参考图1(a)和图1(b),结合几个具体的实施例对本发明提供的设备认证方法进行说明。具体的,参考图1(a)所示意的认证场景,结合图2至图7所示的实施例对设备认证方法进行说明,参考图1(b)所示意的认证场景,结合图8至图13所示的实施例对设备认证方法进行说明。
Hereinafter, the device authentication method provided by the present invention will be described with reference to FIG. 1(a) and FIG. 1(b), respectively, in conjunction with several specific embodiments. Specifically, referring to the authentication scenario illustrated in FIG. 1( a ), the device authentication method is described with reference to the embodiments shown in FIG. 2 to FIG. 7 , referring to the authentication scenario illustrated in FIG. 1( b ), and FIG. 8 to FIG. The embodiment shown in Fig. 13 describes a device authentication method.
图2为本发明实施例提供的设备认证方法实施例一的流程图,如图2所示,该方案的执行主体为认证设备,该方法包括如下步骤:FIG. 2 is a flowchart of Embodiment 1 of a device authentication method according to an embodiment of the present invention. As shown in FIG. 2, an execution body of the solution is an authentication device, and the method includes the following steps:
步骤101、认证设备向无人机发送认证数据,以使无人机将认证数据转发至遥控器,该认证数据用于使得遥控器采用加密认证芯片中包含的密钥对认证数据进行加密运算,获得运算结果。Step 101: The authentication device sends the authentication data to the drone, so that the drone forwards the authentication data to the remote controller, where the authentication data is used to enable the remote controller to perform encryption operation on the authentication data by using a key included in the encryption authentication chip. Get the result of the operation.
步骤102、认证设备接收遥控器通过无人机转发的运算结果。Step 102: The authentication device receives an operation result forwarded by the remote controller through the drone.
步骤103、认证设备在确定运算结果正确时,确定能够与无人机进行通信。Step 103: When determining that the operation result is correct, the authentication device determines that communication with the drone can be performed.
结合图1(a)对本实施例提供的方案进行说明,从而,认证设备与无人机物理连接,无人机与遥控器无线连接,遥控器中植入有加密认证芯片。The solution provided by the embodiment is described in conjunction with FIG. 1( a ), so that the authentication device is physically connected to the drone, and the drone is wirelessly connected to the remote controller, and the remote controller is embedded with the encryption authentication chip.
下面具体介绍认证设备如何通过遥控器中的加密认证芯片实现对无人机的认证。由于无人机中没有加密认证芯片,因此可以视通过遥控器中的加密认证芯片进行无人机的认证的方式为一种远程认证方式。The following describes in detail how the authentication device implements the authentication of the drone through the encryption authentication chip in the remote controller. Since there is no encryption authentication chip in the drone, the method of authenticating the UAV through the encryption authentication chip in the remote controller is a remote authentication method.
认证设备需要对无人机进行认证,以确定是否能够与无人机进行通信时,认证设备可以通过与无人机间的物理连接,向无人机发送认证数据,该认证数据可以是一串随机数。When the authentication device needs to authenticate the drone to determine whether it can communicate with the drone, the authentication device can send authentication data to the drone through a physical connection with the drone, and the authentication data can be a string. random number.
由于无人机中并没有安装加密认证芯片,无法独自完成认证过程。因此,无人机在接收到认证设备发送的认证数据时,向遥控器转发该认证数据。具体实现时,认证设备可以通过向无人机发送认证请求的方式,将认证数据携带于认证请求中,从而无人机在接收到携带有认证数据的认证请求时,解析获得该认证数据,并将该认证数据转发至遥控器中。Since the encryption authentication chip is not installed in the drone, the authentication process cannot be completed by itself. Therefore, when receiving the authentication data transmitted by the authentication device, the drone forwards the authentication data to the remote controller. In a specific implementation, the authentication device may carry the authentication data in the authentication request by sending an authentication request to the drone, so that the drone obtains the authentication data when receiving the authentication request carrying the authentication data, and The authentication data is forwarded to the remote controller.
遥控器中植入有加密认证芯片,该加密认证芯片中存有加密密钥。从而,遥控器在接收到该认证数据时,使用该密钥对接收到的认证数据进行加密运算,以获得运算结果,并将该运算结果反馈给无人机。An encryption authentication chip is embedded in the remote controller, and an encryption key is stored in the encryption authentication chip. Therefore, when receiving the authentication data, the remote controller performs encryption operation on the received authentication data using the key to obtain an operation result, and feeds back the operation result to the drone.
从而,无人机将接收到的运算结果再转发至认证设备,认证设备对该运算结果进行正确性验证,如果运算结果正确,则说明无人机通过了认证,能够与认证设备进行通信。Therefore, the drone forwards the received calculation result to the authentication device, and the authentication device verifies the correctness of the operation result. If the operation result is correct, the drone passes the authentication and can communicate with the authentication device.
可选的,正确性验证方式可以是:认证设备根据其本地存储的加密认证算法对发送出的认证数据进行运算,获得目标运算结果,如果从无人机中接收到的运算结果与该目标运算结果一致,则确定无人机通过了认证,能够与
无人机进行通信。Optionally, the correctness verification method may be: the authentication device performs the operation on the sent authentication data according to the locally stored encryption authentication algorithm, and obtains the target operation result, if the operation result received from the drone and the target operation The results are consistent, it is determined that the drone has passed the certification and can
The drone communicates.
可选的,该正确性验证方式还可以是基于非对称的签名认证方式实现的:遥控器对认证数据进行基于加密认证芯片中包含的密钥(私钥)的加密运算处理,在认证设备处,当其接收到运算结果时,可以根据其本地存储的公钥,对运算结果进行解密,如果解密获得的认证数据与其发送出的认证数据一致,则确定无人机通过了认证,能够与无人机进行通信。Optionally, the correctness verification mode may be implemented by using an asymmetric signature authentication method: the remote controller performs encryption operation processing on the authentication data based on a key (private key) included in the encryption authentication chip, at the authentication device. When receiving the operation result, the operation result may be decrypted according to the public key stored locally. If the authentication data obtained by the decryption is consistent with the authentication data sent by the decryption, it is determined that the drone has passed the authentication, and can and cannot The human machine communicates.
基于上述远程认证方式,认证设备可以基于遥控器中的加密认证芯片,完成对无人机的认证。同时,由于在实际应用中,无人机与遥控器是具有配对关系的,即无人机与遥控器一一对应。因此,在无人机与遥控器已经建立了无线通信链路的情况下,可以认为无人机与遥控器已经完成了配对连接。因此,当认证设备接收并验证无人机转发的运算结果正确时,认证设备既可以确定无人机通过了认证,也可以确定遥控器通过了认证,从而同时完成了对无人机和遥控器的认证,以提高认证处理效率。Based on the above remote authentication method, the authentication device can complete the authentication of the drone based on the encrypted authentication chip in the remote controller. At the same time, since in the actual application, the drone and the remote controller have a pairing relationship, that is, the drone and the remote controller have a one-to-one correspondence. Therefore, in the case where the wireless communication link has been established between the drone and the remote controller, it can be considered that the drone and the remote controller have completed the pairing connection. Therefore, when the authentication device receives and verifies that the operation result forwarded by the drone is correct, the authentication device can determine that the drone has passed the authentication, and can also determine that the remote controller has passed the authentication, thereby simultaneously completing the unmanned aerial vehicle and the remote controller. Certification to improve the efficiency of certification processing.
另外,可选的,为进一步提高对遥控器认证结果的可靠性,对于认证设备对遥控器的认证,还可以直接基于遥控器中的加密认证芯片实现,即认证设备根据遥控器中植入的加密认证芯片,对遥控器进行认证。In addition, in order to further improve the reliability of the remote controller authentication result, the authentication of the remote controller by the authentication device may also be directly implemented based on the encryption authentication chip in the remote controller, that is, the authentication device is implanted according to the remote controller. Encrypt the authentication chip to authenticate the remote controller.
具体来说,前述对于图1(a)示意的认证场景的描述中提到,认证设备也可以通过物理连接的方式与遥控器进行连接。通过该物理连接,认证设备可以向遥控器发送认证数据,遥控器使用加密认证芯片中包含的密钥对该认证数据进行加密运算,获得运算结果,并反馈给认证设备。认证设备验证该运算结果正确时,确定遥控器通过了认证。Specifically, the foregoing description of the authentication scenario illustrated in FIG. 1(a) mentions that the authentication device can also be connected to the remote controller through a physical connection. Through the physical connection, the authentication device can send the authentication data to the remote controller, and the remote controller encrypts the authentication data by using the key included in the encryption authentication chip, obtains the operation result, and feeds back to the authentication device. When the authentication device verifies that the result of the operation is correct, it is determined that the remote controller has passed the authentication.
综上,无人机相当于远程使用了遥控器中的加密认证芯片的运算结果,使得认证设备实现了对无人机和遥控器的远程认证。认证设备通过上述远程认证的方式,只使用了一个加密认证芯片实现了对不同被认证设备的认证,从而在有效降低了硬件成本的同时,提高了对不同被认证设备的认证处理效率。In summary, the drone is equivalent to remotely using the operation result of the encrypted authentication chip in the remote controller, so that the authentication device realizes remote authentication of the drone and the remote controller. Through the above-mentioned remote authentication, the authentication device uses only one encryption authentication chip to implement authentication for different authenticated devices, thereby effectively reducing the hardware cost and improving the authentication processing efficiency of different authenticated devices.
图3为本发明实施例提供的设备认证方法实施例二的流程图,如图3所示,在图2所示实施例的基础上,当认证设备确定能够与无人机进行通信之后,该方法还可以包括如下步骤:
FIG. 3 is a flowchart of Embodiment 2 of a device authentication method according to an embodiment of the present invention. As shown in FIG. 3, on the basis of the embodiment shown in FIG. 2, after the authentication device determines that it can communicate with the UAV, The method can also include the following steps:
步骤201、认证设备与无人机连接,认证设备直接接收无人机向认证设备发送的数据信息,数据信息包括图像数据。Step 201: The authentication device is connected to the UAV, and the authentication device directly receives the data information sent by the UAV to the authentication device, where the data information includes image data.
以认证设备为智能手机为例,目前,智能手机接收/下载无人机拍摄的诸如图像等数据信息的方式是:无人机将数据信息通过与遥控器间的无线链路发送至遥控器,进而遥控器基于与智能手机间的连接将数据信息转发给智能手机,操作不方便,且由于无线链路带宽的限制等影响因素,使得智能手机接收到数据信息的数据传递具有较高的时延。Taking the authentication device as a smart phone as an example, at present, the smartphone receives/downloads data information such as images taken by the drone by means of the drone transmitting the data information to the remote controller through a wireless link with the remote controller. Further, the remote controller forwards the data information to the smart phone based on the connection with the smart phone, which is inconvenient to operate, and the data transmission of the data received by the smart phone has a high delay due to factors such as the limitation of the bandwidth of the wireless link. .
而在采用图2所示实施例的方案,智能手机对无人机实现了远程认证的情况下,智能手机可以与无人机直接连接(物理连接或无线连接),从而进行数据信息的传输,故而无人机能够将诸如图像数据等数据信息直接发送至智能手机,从而智能手机能够更快地下载无人机的数据信息。In the case of the embodiment shown in FIG. 2, when the smart phone realizes remote authentication for the drone, the smart phone can be directly connected (physical connection or wireless connection) with the drone, thereby transmitting data information. Therefore, the drone can directly transmit data information such as image data to the smartphone, so that the smartphone can download the data information of the drone more quickly.
图4为本发明实施例提供的设备认证方法实施例三的流程图,如图4所示,在图2所示实施例的基础上,当认证设备确定能够与无人机进行通信之后,该方法还可以包括如下步骤301或步骤302:4 is a flowchart of Embodiment 3 of a device authentication method according to an embodiment of the present invention. As shown in FIG. 4, on the basis of the embodiment shown in FIG. 2, after the authentication device determines that it can communicate with the UAV, The method may further include the following step 301 or step 302:
步骤301、认证设备与无人机连接,认证设备直接向无人机发送无人机升级指令,以使无人机执行无人机升级指令,完成对应的升级操作。Step 301: The authentication device is connected to the drone, and the authentication device directly sends the drone upgrade instruction to the drone to enable the drone to execute the drone upgrade command to complete the corresponding upgrade operation.
本实施例中,仍以智能手机作为认证设备为例,当无人机已经通过了智能手机的认证时,智能手机与无人机之间直接连接(无线连接或无线连接),从而实现了智能手机与无人机之间进行通信。此时,如果无人机有升级需求,则可以通过智能手机直接方便地完成对无人机的软件升级。In this embodiment, the smartphone is still used as the authentication device as an example. When the drone has passed the authentication of the smart phone, the smart phone and the drone are directly connected (wireless connection or wireless connection), thereby realizing the intelligence. Communication between the mobile phone and the drone. At this time, if the drone has an upgrade requirement, the software upgrade of the drone can be directly and conveniently completed through the smart phone.
可以在智能手机中安装相应的APP,从而可以通过触发该APP的方式,将相应的升级包携带于无人机升级指令中直接发送至无人机,以使无人机执行该无人机升级指令,完成对应的升级操作。The corresponding APP can be installed in the smart phone, so that the corresponding upgrade package can be directly sent to the drone in the drone upgrade instruction by triggering the APP, so that the drone performs the drone upgrade. The instruction completes the corresponding upgrade operation.
因此,基于智能手机对无人机的远程认证,不但节省了认证成本,还使得能够通过智能手机直接方便地完成对无人机的升级。Therefore, the remote authentication of the drone based on the smart phone not only saves the certification cost, but also enables the upgrade of the drone directly and conveniently through the smart phone.
步骤302、认证设备与无人机连接,认证设备直接向无人机发送遥控器升级指令,以使无人机将遥控器升级指令转发至遥控器,使得遥控器执行所述遥控器升级指令,完成对应的升级操作。Step 302: The authentication device is connected to the drone, and the authentication device directly sends a remote controller upgrade instruction to the drone, so that the drone forwards the remote controller upgrade command to the remote controller, so that the remote controller executes the remote controller upgrade instruction. Complete the corresponding upgrade operation.
本实施例中,当无人机已经通过了智能手机的认证,且智能手机与无人
机之间直接连接时,通过智能手机不但能够直接方便地完成对无人机的软件升级,还可以通过无人机的转发,完成对遥控器的软件升级。In this embodiment, when the drone has passed the authentication of the smart phone, and the smart phone and the unmanned person
When the machines are directly connected, the software upgrade of the drone can be completed directly and conveniently through the smart phone, and the software upgrade of the remote controller can be completed through the forwarding of the drone.
同样地,可以通过触发智能手机中安装相应的APP,将针对遥控器的升级包携带于遥控器升级指令中直接发送至无人机,无人机识别出该升级指令是针对遥控器的,则将遥控器升级指令转发至遥控器,使得遥控器执行该遥控器升级指令,完成对应的升级操作。Similarly, by triggering the corresponding APP installed in the smart phone, the upgrade package for the remote controller is directly sent to the remote control in the remote control upgrade instruction, and the drone recognizes that the upgrade instruction is for the remote controller, Forwarding the remote controller upgrade command to the remote controller, so that the remote controller executes the remote controller upgrade command to complete the corresponding upgrade operation.
因此,基于智能手机对无人机的远程认证,不但节省了认证成本,还使得能够通过无人机的转发,智能手机方便地完成对遥控器的升级。Therefore, the remote authentication of the drone based on the smart phone not only saves the certification cost, but also enables the smart phone to conveniently upgrade the remote controller through the forwarding of the drone.
图5为本发明实施例提供的设备认证方法实施例四的流程图,本实施例以无人机为执行主体进行说明。如图5所示,该方法包括如下步骤:FIG. 5 is a flowchart of Embodiment 4 of a device authentication method according to an embodiment of the present invention. The embodiment is described by using a drone as an execution subject. As shown in FIG. 5, the method includes the following steps:
步骤401、无人机接收认证设备发送的认证数据。Step 401: The drone receives the authentication data sent by the authentication device.
步骤402、无人机将认证数据发送至遥控器,以使遥控器采用加密认证芯片中包含的密钥对认证数据进行加密运算,获得运算结果,遥控器中植入有加密认证芯片。Step 402: The UAV sends the authentication data to the remote controller, so that the remote controller encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, and the remote authentication device is embedded with the encryption authentication chip.
步骤403、无人机接收遥控器发送的运算结果,并将运算结果发送至认证设备,当确定运算结果正确时,确定能够与认证设备进行通信。Step 403: The UAV receives the operation result sent by the remote controller, and sends the operation result to the authentication device. When determining that the operation result is correct, it is determined that the operation can be performed with the authentication device.
本实施例所适用的认证场景仍是图1(a)所示的认证场景:遥控器中植入有加密认证芯片,认证设备与无人机物理连接,无人机与遥控器建立了无线链路。The authentication scenario applied in this embodiment is still the authentication scenario shown in FIG. 1(a): the remote authentication device is embedded with an encryption authentication chip, the authentication device is physically connected with the drone, and the drone establishes a wireless chain with the remote controller. road.
认证设备需要对无人机进行认证,以确定是否能够与无人机进行通信时,认证设备可以通过与无人机间的物理连接,向无人机发送认证数据,该认证数据可以是一串随机数。When the authentication device needs to authenticate the drone to determine whether it can communicate with the drone, the authentication device can send authentication data to the drone through a physical connection with the drone, and the authentication data can be a string. random number.
由于无人机中并没有安装加密认证芯片,无法独自完成认证过程。因此,无人机在接收到认证设备发送的认证数据时,向遥控器转发该认证数据。Since the encryption authentication chip is not installed in the drone, the authentication process cannot be completed by itself. Therefore, when receiving the authentication data transmitted by the authentication device, the drone forwards the authentication data to the remote controller.
具体实现时,认证设备可以通过向无人机发送认证请求的方式,将认证数据携带于认证请求中,从而无人机在接收到携带有认证数据的认证请求时,解析获得该认证数据,并将该认证数据转发至遥控器中。In a specific implementation, the authentication device may carry the authentication data in the authentication request by sending an authentication request to the drone, so that the drone obtains the authentication data when receiving the authentication request carrying the authentication data, and The authentication data is forwarded to the remote controller.
由于在实际应用中,无人机与遥控器是具有配对关系的,即无人机与遥控器一一对应。因此,无人机与遥控器会先建立无线通信链路,可以认
为无人机与遥控器首先已经完成了配对连接。从而,当无人机接收到认证设备发送的认证数据后,基于已经建立的配对关系,从而将认证数据转发至对应的遥控器。In practical applications, the drone and the remote controller have a pairing relationship, that is, the drone and the remote controller have a one-to-one correspondence. Therefore, the drone and the remote control will first establish a wireless communication link, which can be recognized.
The pairing connection has been completed for the drone and the remote control first. Therefore, after the drone receives the authentication data sent by the authentication device, the authentication data is forwarded to the corresponding remote controller based on the established pairing relationship.
遥控器中植入有加密认证芯片,该加密认证芯片中存有密钥。从而,遥控器在接收到该认证数据时,使用该密钥对接收到的认证数据进行加密运算,以获得运算结果,并将该运算结果反馈给无人机。An encryption authentication chip is embedded in the remote controller, and a key is stored in the encryption authentication chip. Therefore, when receiving the authentication data, the remote controller performs encryption operation on the received authentication data using the key to obtain an operation result, and feeds back the operation result to the drone.
从而,无人机将接收到的运算结果再转发至认证设备,认证设备对该运算结果进行正确性验证,如果运算结果正确,则说明无人机通过了认证,能够与认证设备进行通信。Therefore, the drone forwards the received calculation result to the authentication device, and the authentication device verifies the correctness of the operation result. If the operation result is correct, the drone passes the authentication and can communicate with the authentication device.
可选的,正确性验证方式可以是:认证设备根据其本地存储的加密认证算法对发送出的认证数据进行运算,获得目标运算结果,如果从无人机中接收到的运算结果与该目标运算结果一致,则确定无人机通过了认证,所述无人机能够与所述认证设备进行通信。Optionally, the correctness verification method may be: the authentication device performs the operation on the sent authentication data according to the locally stored encryption authentication algorithm, and obtains the target operation result, if the operation result received from the drone and the target operation The results are consistent, then it is determined that the drone has passed the authentication and the drone is capable of communicating with the authentication device.
本实施例中,由于无人机中没有安装加密认证芯片,当认证设备需要对其进行认证时,需要远程借助遥控器中安装的加密认证芯片来完成。因此,基于上述远程认证方式以及基于无人机与遥控器间的配对关系,认证设备可以基于遥控器中的加密认证芯片,完成对无人机和遥控器的同时认证,既节约了成本,还提高了认证处理效率。In this embodiment, since the encryption authentication chip is not installed in the drone, when the authentication device needs to be authenticated, it needs to be remotely completed by means of the encryption authentication chip installed in the remote controller. Therefore, based on the above-mentioned remote authentication method and based on the pairing relationship between the drone and the remote controller, the authentication device can complete the simultaneous authentication of the drone and the remote controller based on the encrypted authentication chip in the remote controller, thereby saving cost and saving cost. Improve the efficiency of authentication processing.
进一步可选的,当认证设备确定无人机通过了认证之后,所述方法还可以包括如下步骤404、步骤405和步骤406。这三个步骤没有时序限定关系。Further optionally, after the authentication device determines that the drone has passed the authentication, the method may further include the following steps 404, 405 and 406. These three steps have no timing constraints.
步骤404、无人机与认证设备连接,无人机直接向认证设备发送数据信息,数据信息包括图像数据。Step 404: The drone is connected to the authentication device, and the drone directly sends data information to the authentication device, where the data information includes image data.
以认证设备为智能手机为例,智能手机对无人机实现了远程认证的情况下,智能手机可以与无人机直接连接(物理连接或无线连接),从而进行数据信息的传输,故而无人机能够将诸如图像数据等数据信息直接发送至智能手机,从而无需经过遥控器的转发,使得智能手机能够更快地下载无人机的数据信息,提高了数据信息传输效率,缩短了传输时间。Taking the authentication device as a smart phone as an example, when the smart phone realizes remote authentication for the drone, the smart phone can be directly connected (physical connection or wireless connection) to the drone, thereby transmitting data information, so no one The machine can directly send data information such as image data to the smart phone, so that the smart phone can download the data information of the drone more quickly without the forwarding of the remote controller, thereby improving the data information transmission efficiency and shortening the transmission time.
步骤405、无人机与认证设备连接,无人机直接接收认证设备发送的无人机升级指令,并执行无人机升级指令,完成对应的升级操作。Step 405: The drone is connected to the authentication device, and the drone directly receives the drone upgrade command sent by the authentication device, and executes the drone upgrade command to complete the corresponding upgrade operation.
仍以智能手机作为认证设备为例,当无人机已经通过了智能手机的认证
时,智能手机与无人机之间直接连接(无线连接或无线连接),从而实现了智能手机与无人机之间进行通信。此时,如果无人机有升级需求,则可以通过智能手机方便地完成对无人机的软件升级。Still taking a smartphone as an authentication device, when the drone has passed the authentication of the smartphone.
When the smartphone is connected directly to the drone (wireless or wireless), communication between the smartphone and the drone is achieved. At this time, if the drone has an upgrade requirement, the software upgrade of the drone can be conveniently completed through the smart phone.
可以在智能手机中安装相应的APP,从而可以通过触发该APP的方式,将相应的升级包携带于无人机升级指令中直接发送至无人机,以使无人机执行无人机升级指令,完成对应的升级操作。The corresponding APP can be installed in the smart phone, so that the corresponding upgrade package can be directly sent to the drone in the drone upgrade instruction by triggering the APP, so that the drone can execute the drone upgrade instruction. , complete the corresponding upgrade operation.
因此,基于智能手机对无人机的远程认证,不但节省了认证成本,还使得能够通过智能手机直接方便地完成对无人机的升级。Therefore, the remote authentication of the drone based on the smart phone not only saves the certification cost, but also enables the upgrade of the drone directly and conveniently through the smart phone.
步骤406、无人机与认证设备连接,无人机直接接收认证设备发送的遥控器升级指令,并将遥控器升级指令转发至遥控器,使得遥控器执行遥控器升级指令,完成对应的升级操作。Step 406: The drone is connected to the authentication device, and the drone directly receives the remote controller upgrade command sent by the authentication device, and forwards the remote controller upgrade command to the remote controller, so that the remote controller executes the remote controller upgrade command to complete the corresponding upgrade operation. .
本实施例中,当无人机已经通过了智能手机的认证,且智能手机与无人机之间直接连接时,通过智能手机不但能够直接方便地完成对无人机的软件升级,还可以通过无人机的转发,完成对遥控器的软件升级。In this embodiment, when the drone has passed the authentication of the smart phone and the smart phone and the drone are directly connected, the smart phone can not only directly complete the software upgrade of the drone, but also pass the smart phone. The forwarding of the drone completes the software upgrade of the remote controller.
同样地,可以通过触发智能手机中安装相应的APP,将针对遥控器的升级包携带于遥控器升级指令中直接发送至无人机,无人机识别出该升级指令是针对遥控器的,则将遥控器升级指令转发至遥控器,使得遥控器执行该遥控器升级指令,完成对应的升级操作。Similarly, by triggering the corresponding APP installed in the smart phone, the upgrade package for the remote controller is directly sent to the remote control in the remote control upgrade instruction, and the drone recognizes that the upgrade instruction is for the remote controller, Forwarding the remote controller upgrade command to the remote controller, so that the remote controller executes the remote controller upgrade command to complete the corresponding upgrade operation.
因此,基于智能手机对无人机的远程认证,不但节省了认证成本,还使得能够通过无人机的转发,智能手机方便地完成对遥控器的升级。Therefore, the remote authentication of the drone based on the smart phone not only saves the certification cost, but also enables the smart phone to conveniently upgrade the remote controller through the forwarding of the drone.
图6为本发明实施例提供的设备认证方法实施例五的流程图,本实施例以遥控器为执行主体进行说明。如图6所示,该方法包括如下步骤:FIG. 6 is a flowchart of Embodiment 5 of a device authentication method according to an embodiment of the present invention. In this embodiment, a remote controller is used as an execution subject. As shown in FIG. 6, the method includes the following steps:
步骤501、遥控器接收无人机发送的认证数据,该认证数据是认证设备发送给无人机并由无人机转发的。Step 501: The remote controller receives the authentication data sent by the drone, and the authentication data is sent by the authentication device to the drone and forwarded by the drone.
步骤502、遥控器采用加密认证芯片中包含的密钥对认证数据进行加密运算,获得运算结果,遥控器中植入有所述加密认证芯片。Step 502: The remote controller encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted in the remote controller.
步骤503、遥控器将运算结果发送至无人机,以使无人机将运算结果转发至认证设备,该运算结果用于使得认证设备在确定运算结果正确时,确定认证设备能够与无人机进行通信。
Step 503: The remote controller sends the operation result to the drone, so that the drone forwards the operation result to the authentication device, and the operation result is used to enable the authentication device to determine that the authentication device can be connected to the drone when determining the operation result is correct. Communicate.
本实施例所适用的认证场景仍是图1(a)所示的认证场景:遥控器中植入有加密认证芯片,认证设备与无人机物理连接,无人机与遥控器建立了无线链路。The authentication scenario applied in this embodiment is still the authentication scenario shown in FIG. 1(a): the remote authentication device is embedded with an encryption authentication chip, the authentication device is physically connected with the drone, and the drone establishes a wireless chain with the remote controller. road.
认证设备需要对无人机进行认证,以确定是否能够与无人机进行通信时,认证设备可以通过与无人机间的物理连接,向无人机发送认证数据,该认证数据可以是一串随机数。When the authentication device needs to authenticate the drone to determine whether it can communicate with the drone, the authentication device can send authentication data to the drone through a physical connection with the drone, and the authentication data can be a string. random number.
由于无人机中并没有安装加密认证芯片,无法独自完成认证过程。因此,无人机在接收到认证设备发送的认证数据时,向遥控器转发该认证数据。Since the encryption authentication chip is not installed in the drone, the authentication process cannot be completed by itself. Therefore, when receiving the authentication data transmitted by the authentication device, the drone forwards the authentication data to the remote controller.
由于在实际应用中,无人机与遥控器是具有配对关系的,即无人机与遥控器一一对应。因此,无人机与遥控器会先建立无线通信链路,可以认为无人机与遥控器首先已经完成了配对连接。从而,当无人机接收到认证设备发送的认证数据后,基于已经建立的配对关系,从而将认证数据转发至对应的遥控器。In practical applications, the drone and the remote controller have a pairing relationship, that is, the drone and the remote controller have a one-to-one correspondence. Therefore, the drone and the remote controller will first establish a wireless communication link, and it can be considered that the drone and the remote controller have first completed the pairing connection. Therefore, after the drone receives the authentication data sent by the authentication device, the authentication data is forwarded to the corresponding remote controller based on the established pairing relationship.
遥控器中植入有加密认证芯片,该加密认证芯片中存有密钥。从而,遥控器在接收到该认证数据时,使用该密钥对接收到的认证数据进行加密运算,以获得运算结果,并将该运算结果反馈给无人机。An encryption authentication chip is embedded in the remote controller, and a key is stored in the encryption authentication chip. Therefore, when receiving the authentication data, the remote controller performs encryption operation on the received authentication data using the key to obtain an operation result, and feeds back the operation result to the drone.
从而,无人机将接收到的运算结果再转发至认证设备,认证设备对该运算结果进行正确性验证,如果运算结果正确,则说明无人机通过了认证,能够与认证设备进行通信。Therefore, the drone forwards the received calculation result to the authentication device, and the authentication device verifies the correctness of the operation result. If the operation result is correct, the drone passes the authentication and can communicate with the authentication device.
可选的,正确性验证方式可以是:认证设备在接收到运算结果时,可以根据其本地存储的公钥,对运算结果进行解密,如果解密获得的认证数据与其发送出的认证数据一致,则确定无人机通过了认证,能够与无人机进行通信。Optionally, the correctness verification mode may be: when the authentication device receives the operation result, the operation result may be decrypted according to the public key stored locally, and if the authentication data obtained by the decryption is consistent with the authentication data sent by the authentication device, Make sure the drone is certified to communicate with the drone.
本实施例中,由于无人机中没有安装加密认证芯片,当认证设备需要对其进行认证时,需要远程借助遥控器中安装的加密认证芯片来完成。因此,基于上述远程认证方式以及基于无人机与遥控器间的配对关系,认证设备可以基于遥控器中的加密认证芯片,完成对无人机和遥控器的同时认证,既节约了成本,还提高了认证处理效率。In this embodiment, since the encryption authentication chip is not installed in the drone, when the authentication device needs to be authenticated, it needs to be remotely completed by means of the encryption authentication chip installed in the remote controller. Therefore, based on the above-mentioned remote authentication method and based on the pairing relationship between the drone and the remote controller, the authentication device can complete the simultaneous authentication of the drone and the remote controller based on the encrypted authentication chip in the remote controller, thereby saving cost and saving cost. Improve the efficiency of authentication processing.
进一步可选的,为进一步提高对遥控器认证结果的可靠性,对于认证设备对遥控器的认证,还可以直接基于遥控器中的加密认证芯片实现,即认证
设备根据遥控器中植入的加密认证芯片,对遥控器进行认证。Further, in order to further improve the reliability of the remote controller authentication result, the authentication of the remote controller by the authentication device may also be directly implemented based on the encryption authentication chip in the remote controller, that is, authentication.
The device authenticates the remote controller according to the encryption authentication chip implanted in the remote controller.
具体来说,前述对于图1(a)示意的认证场景的描述中提到,认证设备也可以通过物理连接的方式与遥控器进行连接。通过该物理连接,认证设备可以向遥控器发送认证数据,遥控器使用加密认证芯片中包含的密钥对该认证数据进行加密运算,获得运算结果,并反馈给认证设备。认证设备验证该运算结果正确时,确定遥控器通过了认证。Specifically, the foregoing description of the authentication scenario illustrated in FIG. 1(a) mentions that the authentication device can also be connected to the remote controller through a physical connection. Through the physical connection, the authentication device can send the authentication data to the remote controller, and the remote controller encrypts the authentication data by using the key included in the encryption authentication chip, obtains the operation result, and feeds back to the authentication device. When the authentication device verifies that the result of the operation is correct, it is determined that the remote controller has passed the authentication.
可选的,步骤503之后,还可以包括如下步骤504:Optionally, after step 503, the following step 504 is further included:
步骤504、无人机与认证设备连接,遥控器接收从认证设备发出的并经无人机转发的遥控器升级指令,并执行遥控器升级指令,完成对应的升级操作。Step 504: The drone is connected to the authentication device, and the remote controller receives the remote controller upgrade instruction sent from the authentication device and forwarded by the drone, and executes the remote controller upgrade instruction to complete the corresponding upgrade operation.
本实施例中,仍以认证设备为智能手机为例,当基于遥控器中的加密认证芯片,无人机已经通过了智能手机的认证,且智能手机与无人机之间直接连接时,还可以通过智能手机完成对遥控器的软件升级。In this embodiment, the authentication device is still used as a smart phone. When the UAV has passed the authentication of the smart phone based on the encryption authentication chip in the remote controller, and the smart phone and the drone are directly connected, Software upgrades to the remote control can be done via a smartphone.
此时,智能手机对遥控器的软件升级是通过无人机进行的,即通过无人机的转发,完成对遥控器的软件升级。At this point, the software upgrade of the smart phone to the remote controller is performed by the drone, that is, the software upgrade of the remote controller is completed by the forwarding of the drone.
具体来说,可以通过触发智能手机中安装相应的APP,将针对遥控器的升级包携带于遥控器升级指令中直接发送至无人机,无人机识别出该升级指令是针对遥控器的,则将遥控器升级指令转发至遥控器,使得遥控器执行该遥控器升级指令,完成对应的升级操作。Specifically, the upgrade package for the remote controller can be directly sent to the drone by directly triggering the upgrade package for the remote controller, and the drone recognizes that the upgrade command is for the remote controller. Then, the remote controller upgrade instruction is forwarded to the remote controller, so that the remote controller executes the remote controller upgrade instruction to complete the corresponding upgrade operation.
因此,基于智能手机对无人机的远程认证,不但节省了认证成本,还使得能够通过无人机的转发,智能手机方便地完成对遥控器的升级。Therefore, the remote authentication of the drone based on the smart phone not only saves the certification cost, but also enables the smart phone to conveniently upgrade the remote controller through the forwarding of the drone.
以上几个方法实施例基于图1(a)的认证场景,从不同执行主体的角度对设备认证方法进行了介绍,下面,结合图7,从信令交互角度进行介绍。The above method embodiments are based on the authentication scenario of FIG. 1(a), and the device authentication method is introduced from the perspective of different execution entities. Hereinafter, with reference to FIG. 7, the signaling interaction is introduced.
图7为本发明实施例提供的设备认证方法实施例六的信令图,如图7所示,包括如下步骤:FIG. 7 is a signaling diagram of Embodiment 6 of a device authentication method according to an embodiment of the present invention. As shown in FIG. 7, the method includes the following steps:
步骤601、认证设备向无人机发送认证数据。Step 601: The authentication device sends the authentication data to the drone.
步骤602、无人机向遥控器转发认证数据。Step 602: The drone forwards the authentication data to the remote controller.
步骤603、遥控器采用其中安装的加密认证芯片中所包含的密钥对认证数据进行加密运算,获得运算结果。
Step 603: The remote controller performs encryption operation on the authentication data by using a key included in the encrypted authentication chip installed therein to obtain an operation result.
步骤604、遥控器向无人机发送运算结果。Step 604: The remote controller sends the operation result to the drone.
步骤605、无人机向认证设备转发运算结果。Step 605: The drone forwards the operation result to the authentication device.
步骤606、认证设备确定运算结果正确时,确定能够与无人机进行通信。Step 606: When the authentication device determines that the operation result is correct, it is determined that the UAV can communicate with the UAV.
下面参照图1(b)所示的认证场景,结合以下几个方法实施例,对本发明提供的设备认证方法进行介绍。Referring to the authentication scenario shown in FIG. 1(b), the device authentication method provided by the present invention is introduced in combination with the following method embodiments.
图8为本发明实施例提供的设备认证方法实施例七的流程图,本实施例以认证设备为执行主体进行说明。如图8所示,该方法包括如下步骤:FIG. 8 is a flowchart of Embodiment 7 of a device authentication method according to an embodiment of the present invention. The embodiment is described by using an authentication device as an execution subject. As shown in FIG. 8, the method includes the following steps:
步骤701、认证设备向遥控器发送认证数据,以使遥控器将认证数据转发至无人机,该认证数据用于使得无人机采用加密认证芯片中包含的密钥对认证数据进行加密运算,获得运算结果;其中,无人机中植入有加密认证芯片。Step 701: The authentication device sends the authentication data to the remote controller, so that the remote controller forwards the authentication data to the drone, and the authentication data is used to enable the drone to perform encryption operation on the authentication data by using a key included in the encryption authentication chip. The operation result is obtained; wherein the encryption authentication chip is implanted in the drone.
步骤702、认证设备接收无人机通过遥控器转发的运算结果。Step 702: The authentication device receives an operation result forwarded by the drone through the remote controller.
步骤703、认证设备在确定运算结果正确时,确定能够与遥控器进行通信。Step 703: The authentication device determines that communication with the remote controller is possible when determining that the operation result is correct.
结合图1(b)对本实施例提供的方案进行说明,从而,认证设备与遥控器物理连接,无人机与遥控器无线连接,无人机中植入有加密认证芯片。The solution provided by the embodiment is described in conjunction with FIG. 1(b), so that the authentication device is physically connected to the remote controller, and the drone is wirelessly connected to the remote controller, and the encryption authentication chip is implanted in the drone.
下面具体介绍认证设备如何通过无人机中的加密认证芯片实现对遥控器的认证。由于遥控器中没有加密认证芯片,因此可以视通过无人机中的加密认证芯片进行遥控器的认证的方式为一种远程认证方式。The following describes in detail how the authentication device authenticates the remote controller through the encryption authentication chip in the drone. Since there is no encryption authentication chip in the remote controller, the method of authenticating the remote controller by using the encryption authentication chip in the drone is a remote authentication method.
认证设备需要对遥控器进行认证,以确定是否能够与遥控器进行通信时,认证设备可以通过与遥控器间的物理连接,向遥控器发送认证数据,该认证数据可以是一串随机数。When the authentication device needs to authenticate the remote controller to determine whether it can communicate with the remote controller, the authentication device can transmit authentication data to the remote controller through a physical connection with the remote controller, and the authentication data can be a string of random numbers.
由于遥控器中并没有安装加密认证芯片,无法独自完成认证过程。因此,遥控器在接收到认证设备发送的认证数据时,向无人机转发该认证数据。Since the encryption authentication chip is not installed in the remote controller, the authentication process cannot be completed by itself. Therefore, when receiving the authentication data transmitted by the authentication device, the remote controller forwards the authentication data to the drone.
具体实现时,认证设备可以通过向遥控器发送认证请求的方式,将认证数据携带于认证请求中,从而遥控器在接收到携带有认证数据的认证请求时,解析获得该认证数据,并将该认证数据转发至无人机。In a specific implementation, the authentication device may carry the authentication data in the authentication request by sending the authentication request to the remote controller, so that the remote controller analyzes and obtains the authentication data when receiving the authentication request carrying the authentication data, and the The authentication data is forwarded to the drone.
无人机中植入有加密认证芯片,该加密认证芯片中存有加密密钥。从而,无人机在接收到该认证数据时,使用该密钥对接收到的认证数据进行加密运
算,以获得运算结果,并将该运算结果反馈给遥控器。An encryption authentication chip is embedded in the drone, and an encryption key is stored in the encryption authentication chip. Therefore, when the drone receives the authentication data, the host uses the key to encrypt the received authentication data.
Calculate to obtain the result of the operation and feed back the result of the operation to the remote controller.
从而,遥控器将接收到的运算结果再转发至认证设备,认证设备对该运算结果进行正确性验证,如果运算结果正确,则说明遥控器通过了认证,能够与认证设备进行通信。Therefore, the remote controller forwards the received calculation result to the authentication device, and the authentication device verifies the correctness of the operation result. If the calculation result is correct, the remote controller passes the authentication and can communicate with the authentication device.
可选的,正确性验证方式可以是:认证设备根据其本地存储的加密认证算法对发送出的认证数据进行运算,获得目标运算结果,如果从遥控器中接收到的运算结果与该目标运算结果一致,则确定遥控器通过了认证,能够与遥控器进行通信。Optionally, the correctness verification method may be: the authentication device performs the operation on the sent authentication data according to the locally stored encryption authentication algorithm, and obtains the target operation result, if the operation result received from the remote controller and the target operation result Consistent, it is determined that the remote controller is authenticated and can communicate with the remote controller.
可选的,该正确性验证方式还可以是基于非对称的签名认证方式实现的:无人机对认证数据进行基于加密认证芯片中包含的密钥(私钥)的加密运算处理,在认证设备处,当其接收到运算结果时,可以根据其本地存储的公钥,对运算结果进行解密,如果解密获得的认证数据与其发送出的认证数据一致,则确定遥控器通过了认证,能够与遥控器进行通信。Optionally, the correctness verification mode may be implemented by using an asymmetric signature authentication method: the UAV encrypts the authentication data based on a key (private key) included in the encryption authentication chip, and the authentication device is used in the authentication device. Wherein, when it receives the operation result, the operation result may be decrypted according to the public key stored locally. If the authentication data obtained by the decryption is consistent with the authentication data sent by the decryption, it is determined that the remote controller passes the authentication, and can be remotely controlled. Communicate.
基于上述远程认证方式,认证设备可以基于无人机中的加密认证芯片,完成对遥控器的认证。同时,由于在实际应用中,无人机与遥控器是具有配对关系的,即无人机与遥控器一一对应。因此,在无人机与遥控器已经建立了无线通信链路的情况下,可以认为无人机与遥控器已经完成了配对连接。因此,当认证设备接收并验证遥控器转发的运算结果正确时,认证设备既可以确定遥控器通过了认证,也可以确定无人机通过了认证,从而同时完成了对无人机和遥控器的认证,以提高认证处理效率。Based on the above remote authentication method, the authentication device can complete the authentication of the remote controller based on the encrypted authentication chip in the drone. At the same time, since in the actual application, the drone and the remote controller have a pairing relationship, that is, the drone and the remote controller have a one-to-one correspondence. Therefore, in the case where the wireless communication link has been established between the drone and the remote controller, it can be considered that the drone and the remote controller have completed the pairing connection. Therefore, when the authentication device receives and verifies that the operation result forwarded by the remote controller is correct, the authentication device can determine that the remote controller has passed the authentication, and can also determine that the drone has passed the authentication, thereby completing the operation of the drone and the remote controller at the same time. Certification to improve the efficiency of certification processing.
另外,可选的,为进一步提高对无人机认证结果的可靠性,对于认证设备对无人机的认证,还可以直接基于无人机中的加密认证芯片实现,即认证设备根据无人机中植入的加密认证芯片,对无人机进行认证。In addition, in order to further improve the reliability of the UAV certification result, the authentication of the UAV to the authentication device can also be directly implemented based on the encryption authentication chip in the UAV, that is, the authentication device is based on the UAV. The embedded authentication chip is used to authenticate the drone.
具体来说,前述对于图1(b)示意的认证场景的描述中提到,认证设备也可以通过物理连接的方式与无人机进行连接。通过该物理连接,认证设备可以向无人机发送认证数据,无人机使用加密认证芯片中包含的密钥对该认证数据进行加密运算,获得运算结果,并反馈给认证设备。认证设备验证该运算结果正确时,确定无人机通过了认证。Specifically, the foregoing description of the authentication scenario illustrated in FIG. 1(b) mentions that the authentication device can also be connected to the drone by means of a physical connection. Through the physical connection, the authentication device can send the authentication data to the drone, and the drone encrypts the authentication data using the key included in the encryption authentication chip, obtains the operation result, and feeds back to the authentication device. When the authentication device verifies that the result of the operation is correct, it is determined that the drone has passed the authentication.
综上,遥控器相当于远程使用了无人机中的加密认证芯片的运算结果,使得认证设备实现了对无人机和遥控器的远程认证。认证设备通过上述远程
认证的方式,只使用了一个加密认证芯片实现了对不同被认证设备的认证,从而在有效降低了硬件成本的同时,提高了对不同被认证设备的认证处理效率。In summary, the remote control is equivalent to remotely using the operation result of the encrypted authentication chip in the drone, so that the authentication device realizes remote authentication of the drone and the remote controller. Certified device through the above remote
In the authentication mode, only one encryption authentication chip is used to implement authentication of different authenticated devices, thereby effectively reducing the hardware cost and improving the authentication processing efficiency of different authenticated devices.
图9为本发明实施例提供的设备认证方法实施例八的流程图,如图9所示,在图8所示实施例基础上,当无人机通过了认证设备的认证后,该方法还可以包括如下步骤801、步骤802、步骤803和步骤804,这四个步骤没有时序关系,为并列可选的。FIG. 9 is a flowchart of Embodiment 8 of a device authentication method according to an embodiment of the present invention. As shown in FIG. 9 , on the basis of the embodiment shown in FIG. 8 , after the UAV passes the authentication of the authentication device, the method further The following steps 801, 802, 803, and 804 may be included. These four steps have no timing relationship and are optional for parallel.
步骤801、认证设备与无人机连接,认证设备直接接收无人机向认证设备发送的数据信息,数据信息包括图像数据。Step 801: The authentication device is connected to the UAV, and the authentication device directly receives the data information sent by the UAV to the authentication device, where the data information includes image data.
以认证设备为智能手机为例,目前,智能手机接收/下载无人机拍摄的诸如图像等数据信息的方式是:无人机将数据信息通过与遥控器间的无线链路发送至遥控器,进而遥控器基于与智能手机间的连接将数据信息转发给智能手机,操作不方便,且由于无线链路带宽的限制等影响因素,,使得智能手机接收到数据信息的数据传递具有较高的时延。Taking the authentication device as a smart phone as an example, at present, the smartphone receives/downloads data information such as images taken by the drone by means of the drone transmitting the data information to the remote controller through a wireless link with the remote controller. Further, the remote controller forwards the data information to the smart phone based on the connection with the smart phone, which is inconvenient to operate, and the data transmission of the data received by the smart phone has a high time due to factors such as the limitation of the bandwidth of the wireless link. Delay.
而在采用图8所示实施例的方案,智能手机对无人机实现了远程认证的情况下,智能手机可以与无人机直接连接(物理连接或无线连接),从而进行数据信息的传输,故而无人机能够将诸如图像数据等数据信息直接发送至智能手机,从而智能手机能够更快地下载无人机的数据信息。In the case of adopting the embodiment shown in FIG. 8, when the smart phone realizes remote authentication for the drone, the smart phone can be directly connected (physical connection or wireless connection) with the drone, thereby transmitting data information. Therefore, the drone can directly transmit data information such as image data to the smartphone, so that the smartphone can download the data information of the drone more quickly.
步骤802、认证设备与无人机连接,认证设备直接向无人机发送无人机升级指令,以使无人机执行无人机升级指令,完成对应的升级操作。Step 802: The authentication device is connected to the drone, and the authentication device directly sends the drone upgrade instruction to the drone to enable the drone to execute the drone upgrade command to complete the corresponding upgrade operation.
本实施例中,仍以智能手机作为认证设备为例,当无人机已经通过了智能手机的认证时,智能手机与无人机之间可以直接连接(无线连接或无线连接),从而实现了智能手机与无人机之间进行通信。此时,如果无人机有升级需求,则可以通过智能手机直接方便地完成对无人机的软件升级。In this embodiment, the smartphone is still used as the authentication device as an example. When the drone has passed the authentication of the smart phone, the smart phone and the drone can be directly connected (wireless connection or wireless connection), thereby realizing Communication between the smartphone and the drone. At this time, if the drone has an upgrade requirement, the software upgrade of the drone can be directly and conveniently completed through the smart phone.
可以在智能手机中安装相应的APP,从而可以通过触发该APP的方式,将相应的升级包携带于无人机升级指令中直接发送至无人机,以使无人机执行无人机升级指令,完成对应的升级操作。The corresponding APP can be installed in the smart phone, so that the corresponding upgrade package can be directly sent to the drone in the drone upgrade instruction by triggering the APP, so that the drone can execute the drone upgrade instruction. , complete the corresponding upgrade operation.
因此,基于智能手机对无人机的远程认证,不但节省了认证成本,还使得能够通过智能手机直接方便地完成对无人机的升级。
Therefore, the remote authentication of the drone based on the smart phone not only saves the certification cost, but also enables the upgrade of the drone directly and conveniently through the smart phone.
步骤803、认证设备与遥控器连接,认证设备直接向遥控器发送无人机升级指令,以使遥控器将无人机升级指令转发至无人机,使得无人机执行无人机升级指令,完成对应的升级操作。Step 803: The authentication device is connected to the remote controller, and the authentication device directly sends the drone upgrade command to the remote controller, so that the remote controller forwards the drone upgrade command to the drone, so that the drone performs the drone upgrade command. Complete the corresponding upgrade operation.
本实施例中,当基于无人机中的加密认证芯片,遥控器已经通过了智能手机的认证,且智能手机此时与遥控器之间直接连接时,智能手机还可以借助遥控器,完成对无人机的软件升级。In this embodiment, when the remote controller has passed the authentication of the smart phone based on the encryption authentication chip in the drone, and the smart phone is directly connected with the remote controller at this time, the smart phone can also complete the pair by using the remote controller. Software upgrade for drones.
此时,智能手机对无人机的软件升级是通过遥控器进行的,即通过遥控器的转发,完成对无人机的软件升级。At this point, the software upgrade of the smartphone to the drone is performed by the remote controller, that is, the software upgrade of the drone is completed by the forwarding of the remote controller.
具体来说,可以通过触发智能手机中安装相应的APP,将针对无人机的升级包携带于无人机升级指令中直接发送至遥控器,遥控器识别出该升级指令是针对无人机的,则将无人机升级指令转发至无人机,使得无人机执行该无人机升级指令,完成对应的升级操作。Specifically, the upgrade package for the drone can be directly sent to the remote controller by triggering the upgrade package for the drone, and the remote controller recognizes that the upgrade instruction is for the drone. Then, the drone upgrade command is forwarded to the drone, so that the drone executes the drone upgrade instruction and completes the corresponding upgrade operation.
因此,基于智能手机对遥控器的远程认证,不但节省了认证成本,还使得能够通过遥控器的转发,智能手机方便地完成对无人机的升级。Therefore, based on the remote authentication of the remote controller by the smart phone, not only the certification cost is saved, but also the forwarding of the remote controller enables the smart phone to conveniently upgrade the drone.
步骤804、认证设备与遥控器连接,认证设备直接向遥控器发送遥控器升级指令,以使遥控器执行遥控器升级指令,完成对应的升级操作。Step 804: The authentication device is connected to the remote controller, and the authentication device directly sends a remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction to complete the corresponding upgrade operation.
本实施例中,当遥控器已经通过了智能手机的认证时,智能手机与遥控器之间可以直接连接(无线连接或无线连接),从而实现了智能手机与遥控器之间进行通信。此时,如果遥控器有升级需求,则可以通过智能手机直接方便地完成对遥控器的软件升级。In this embodiment, when the remote controller has passed the authentication of the smart phone, the smart phone and the remote controller can be directly connected (wireless connection or wireless connection), thereby realizing communication between the smart phone and the remote controller. At this time, if the remote controller has an upgrade requirement, the software upgrade of the remote controller can be directly and conveniently completed through the smart phone.
可以在智能手机中安装相应的APP,从而可以通过触发该APP的方式,将相应的升级包携带于遥控器升级指令中直接发送至遥控器,以使遥控器执行遥控器升级指令,完成对应的升级操作。The corresponding APP can be installed in the smart phone, so that the corresponding upgrade package can be directly sent to the remote controller through the remote control upgrade instruction by triggering the APP, so that the remote controller executes the remote controller upgrade instruction to complete the corresponding Upgrade operation.
因此,基于智能手机对遥控器的远程认证,不但节省了认证成本,还使得能够通过智能手机直接方便地完成对遥控器的升级。Therefore, the remote authentication based on the smart phone to the remote controller not only saves the certification cost, but also enables the remote controller to be upgraded directly and conveniently through the smart phone.
图10为本发明实施例提供的设备认证方法实施例九的流程图,本实施例从遥控器为执行主体的角度来描述。如图10所示,该方法包括如下步骤:FIG. 10 is a flowchart of Embodiment 9 of a device authentication method according to an embodiment of the present invention. The present embodiment is described from the perspective of a remote controller as an execution subject. As shown in FIG. 10, the method includes the following steps:
步骤901、遥控器接收认证设备发送的认证数据。Step 901: The remote controller receives the authentication data sent by the authentication device.
步骤902、遥控器将认证数据发送至无人机,以使无人机采用加密认证
芯片中包含的密钥对认证数据进行加密运算,获得运算结果,无人机中植入有所述加密认证芯片。Step 902: The remote controller sends the authentication data to the drone to enable the drone to adopt the encryption authentication.
The key included in the chip encrypts the authentication data to obtain an operation result, and the encrypted authentication chip is implanted in the drone.
步骤903、遥控器接收无人机发送的运算结果,并将运算结果发送至认证设备,在确定运算结果正确时,确定能够与认证设备进行通信。Step 903: The remote controller receives the operation result sent by the drone, and sends the operation result to the authentication device, and determines that the communication device can communicate with the authentication device when the operation result is determined to be correct.
本实施例所适用的认证场景仍是图1(b)所示的认证场景:无人机中植入有加密认证芯片,认证设备与遥控器物理连接,无人机与遥控器建立了无线链路。The authentication scenario applied in this embodiment is still the authentication scenario shown in FIG. 1(b): the encryption authentication chip is embedded in the drone, the authentication device is physically connected with the remote controller, and the wireless link is established between the drone and the remote controller. road.
认证设备需要对遥控器进行认证,以确定是否能够与遥控器进行通信时,认证设备可以通过与遥控器间的物理连接,向遥控器发送认证数据,该认证数据可以是一串随机数。When the authentication device needs to authenticate the remote controller to determine whether it can communicate with the remote controller, the authentication device can transmit authentication data to the remote controller through a physical connection with the remote controller, and the authentication data can be a string of random numbers.
由于遥控器中并没有安装加密认证芯片,无法独自完成认证过程。因此,遥控器在接收到认证设备发送的认证数据时,向无人机转发该认证数据。Since the encryption authentication chip is not installed in the remote controller, the authentication process cannot be completed by itself. Therefore, when receiving the authentication data transmitted by the authentication device, the remote controller forwards the authentication data to the drone.
具体实现时,认证设备可以通过向遥控器发送认证请求的方式,将认证数据携带于认证请求中,从而遥控器在接收到携带有认证数据的认证请求时,解析获得该认证数据,并将该认证数据转发至无人机。In a specific implementation, the authentication device may carry the authentication data in the authentication request by sending the authentication request to the remote controller, so that the remote controller analyzes and obtains the authentication data when receiving the authentication request carrying the authentication data, and the The authentication data is forwarded to the drone.
由于在实际应用中,无人机与遥控器是具有配对关系的,即无人机与遥控器一一对应。因此,无人机与遥控器会先建立无线通信链路,可以认为无人机与遥控器首先已经完成了配对连接。从而,当遥控器接收到认证设备发送的认证数据后,基于已经建立的配对关系,从而将认证数据转发至对应的无人机。In practical applications, the drone and the remote controller have a pairing relationship, that is, the drone and the remote controller have a one-to-one correspondence. Therefore, the drone and the remote controller will first establish a wireless communication link, and it can be considered that the drone and the remote controller have first completed the pairing connection. Therefore, after the remote controller receives the authentication data sent by the authentication device, the authentication data is forwarded to the corresponding drone based on the established pairing relationship.
无人机中植入有加密认证芯片,该加密认证芯片中存有密钥。从而,无人机在接收到该认证数据时,使用该密钥对接收到的认证数据进行加密运算,以获得运算结果,并将该运算结果反馈给遥控器。An encryption authentication chip is embedded in the drone, and a key is stored in the encryption authentication chip. Therefore, when receiving the authentication data, the drone encrypts the received authentication data using the key to obtain an operation result, and feeds back the operation result to the remote controller.
从而,遥控器将接收到的运算结果再转发至认证设备,认证设备对该运算结果进行正确性验证,如果运算结果正确,则说明遥控器通过了认证,能够与认证设备进行通信。Therefore, the remote controller forwards the received calculation result to the authentication device, and the authentication device verifies the correctness of the operation result. If the calculation result is correct, the remote controller passes the authentication and can communicate with the authentication device.
可选的,正确性验证方式可以是:认证设备根据其本地存储的加密认证算法对发送出的认证数据进行运算,获得目标运算结果,如果从遥控器中接收到的运算结果与该目标运算结果一致,则确定遥控器通过了认证,能够与遥控器进行通信。
Optionally, the correctness verification method may be: the authentication device performs the operation on the sent authentication data according to the locally stored encryption authentication algorithm, and obtains the target operation result, if the operation result received from the remote controller and the target operation result Consistent, it is determined that the remote controller is authenticated and can communicate with the remote controller.
本实施例中,由于遥控器中没有安装加密认证芯片,当认证设备需要对其进行认证时,需要远程借助无人机中安装的加密认证芯片来完成。因此,基于上述远程认证方式以及基于无人机与遥控器间的配对关系,认证设备可以基于无人机中的加密认证芯片,完成对无人机和遥控器的同时认证,既节约了成本,还提高了认证处理效率。In this embodiment, since the encryption authentication chip is not installed in the remote controller, when the authentication device needs to be authenticated, it needs to be remotely completed by using the encryption authentication chip installed in the drone. Therefore, based on the above remote authentication method and based on the pairing relationship between the drone and the remote controller, the authentication device can complete the simultaneous authentication of the drone and the remote controller based on the encrypted authentication chip in the drone, thereby saving cost. It also improves the efficiency of authentication processing.
可选的,在步骤903之后,还可以包括如下步骤904和步骤905,这两个步骤没有时序限定关系。Optionally, after step 903, the following steps 904 and 905 are further included, where the two steps have no timing defined relationship.
步骤904、遥控器与认证设备连接,遥控器直接接收认证设备发送的遥控器升级指令,并执行遥控器升级指令,完成对应的升级操作。Step 904: The remote controller is connected to the authentication device, and the remote controller directly receives the remote controller upgrade instruction sent by the authentication device, and executes the remote controller upgrade instruction to complete the corresponding upgrade operation.
本实施例中,当遥控器已经通过了智能手机的认证时,智能手机与遥控器之间可以直接连接(无线连接或无线连接),从而实现了智能手机与遥控器之间进行通信。此时,如果遥控器有升级需求,则可以通过智能手机直接方便地完成对遥控器的软件升级。In this embodiment, when the remote controller has passed the authentication of the smart phone, the smart phone and the remote controller can be directly connected (wireless connection or wireless connection), thereby realizing communication between the smart phone and the remote controller. At this time, if the remote controller has an upgrade requirement, the software upgrade of the remote controller can be directly and conveniently completed through the smart phone.
可以在智能手机中安装相应的APP,从而可以通过触发该APP的方式,将相应的升级包携带于遥控器升级指令中直接发送至遥控器,遥控器接收并执行该遥控器升级指令,完成对应的升级操作。The corresponding APP can be installed in the smart phone, so that the corresponding upgrade package can be directly sent to the remote controller by means of triggering the APP, and the remote controller receives and executes the remote controller upgrade instruction to complete the corresponding Upgrade operation.
因此,基于智能手机对遥控器的远程认证,不但节省了认证成本,还使得能够通过智能手机直接方便地完成对遥控器的升级。Therefore, the remote authentication based on the smart phone to the remote controller not only saves the certification cost, but also enables the remote controller to be upgraded directly and conveniently through the smart phone.
步骤905、遥控器与认证设备连接,遥控器直接接收认证设备发送的无人机升级指令,并将无人机升级指令转发至无人机,以使无人机执行无人机升级指令,完成对应的升级操作。Step 905: The remote controller is connected to the authentication device, and the remote controller directly receives the drone upgrade command sent by the authentication device, and forwards the drone upgrade command to the drone, so that the drone performs the drone upgrade instruction and completes Corresponding upgrade operation.
本实施例中,当基于无人机中的加密认证芯片,遥控器已经通过了智能手机的认证,且智能手机此时与遥控器之间直接连接时,智能手机还可以借助遥控器,完成对无人机的软件升级。In this embodiment, when the remote controller has passed the authentication of the smart phone based on the encryption authentication chip in the drone, and the smart phone is directly connected with the remote controller at this time, the smart phone can also complete the pair by using the remote controller. Software upgrade for drones.
此时,智能手机对无人机的软件升级是通过遥控器进行的,即通过遥控器的转发,完成对无人机的软件升级。At this point, the software upgrade of the smartphone to the drone is performed by the remote controller, that is, the software upgrade of the drone is completed by the forwarding of the remote controller.
具体来说,可以通过触发智能手机中安装相应的APP,将针对无人机的升级包携带于无人机升级指令中直接发送至遥控器,遥控器识别出该升级指令是针对无人机的,则将无人机升级指令转发至无人机,使得无人机执行该无人机升级指令,完成对应的升级操作。
Specifically, the upgrade package for the drone can be directly sent to the remote controller by triggering the upgrade package for the drone, and the remote controller recognizes that the upgrade instruction is for the drone. Then, the drone upgrade command is forwarded to the drone, so that the drone executes the drone upgrade instruction and completes the corresponding upgrade operation.
因此,基于智能手机对遥控器的远程认证,不但节省了认证成本,还使得能够通过遥控器的转发,智能手机方便地完成对无人机的升级。Therefore, based on the remote authentication of the remote controller by the smart phone, not only the certification cost is saved, but also the forwarding of the remote controller enables the smart phone to conveniently upgrade the drone.
图11为本发明实施例提供的设备认证方法实施例十的流程图,本实施例从无人机为执行主体的角度来描述。如图11所示,该方法包括如下步骤:FIG. 11 is a flowchart of Embodiment 10 of a device authentication method according to an embodiment of the present invention. The embodiment is described from the perspective of an unmanned aircraft as an execution subject. As shown in FIG. 11, the method includes the following steps:
步骤1001、无人机接收遥控器发送的认证数据,认证数据是认证设备发送给遥控器并由遥控器转发的。Step 1001: The drone receives the authentication data sent by the remote controller, and the authentication data is sent by the authentication device to the remote controller and forwarded by the remote controller.
步骤1002、无人机采用加密认证芯片中包含的密钥对认证数据进行加密运算,获得运算结果,无人机中植入有加密认证芯片。Step 1002: The UAV encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted in the UAV.
步骤1003、无人机将运算结果发送至遥控器,以使遥控器将运算结果转发至认证设备,运算结果用于使得认证设备在确定运算结果正确时,确定认证设备能够与遥控器进行通信。Step 1003: The drone sends the operation result to the remote controller, so that the remote controller forwards the operation result to the authentication device, and the operation result is used to enable the authentication device to determine that the authentication device can communicate with the remote controller when determining the operation result is correct.
本实施例所适用的认证场景仍是图1(b)所示的认证场景:无人机中植入有加密认证芯片,认证设备与遥控器物理连接,无人机与遥控器建立了无线链路。The authentication scenario applied in this embodiment is still the authentication scenario shown in FIG. 1(b): the encryption authentication chip is embedded in the drone, the authentication device is physically connected with the remote controller, and the wireless link is established between the drone and the remote controller. road.
认证设备需要对遥控器进行认证,以确定是否能够与遥控器进行通信时,认证设备可以通过与遥控器间的物理连接,向遥控器发送认证数据,该认证数据可以是一串随机数。When the authentication device needs to authenticate the remote controller to determine whether it can communicate with the remote controller, the authentication device can transmit authentication data to the remote controller through a physical connection with the remote controller, and the authentication data can be a string of random numbers.
由于遥控器中并没有安装加密认证芯片,无法独自完成认证过程。因此,遥控器在接收到认证设备发送的认证数据时,向无人机转发该认证数据。Since the encryption authentication chip is not installed in the remote controller, the authentication process cannot be completed by itself. Therefore, when receiving the authentication data transmitted by the authentication device, the remote controller forwards the authentication data to the drone.
由于在实际应用中,无人机与遥控器是具有配对关系的,即无人机与遥控器一一对应。因此,无人机与遥控器会先建立无线通信链路,可以认为无人机与遥控器首先已经完成了配对连接。从而,当遥控器接收到认证设备发送的认证数据后,基于已经建立的配对关系,从而将认证数据转发至对应的无人机。In practical applications, the drone and the remote controller have a pairing relationship, that is, the drone and the remote controller have a one-to-one correspondence. Therefore, the drone and the remote controller will first establish a wireless communication link, and it can be considered that the drone and the remote controller have first completed the pairing connection. Therefore, after the remote controller receives the authentication data sent by the authentication device, the authentication data is forwarded to the corresponding drone based on the established pairing relationship.
无人机中植入有加密认证芯片,该加密认证芯片中存有密钥。从而,无人机在接收到该认证数据时,使用该密钥对接收到的认证数据进行加密运算,以获得运算结果,并将该运算结果反馈给遥控器。An encryption authentication chip is embedded in the drone, and a key is stored in the encryption authentication chip. Therefore, when receiving the authentication data, the drone encrypts the received authentication data using the key to obtain an operation result, and feeds back the operation result to the remote controller.
从而,遥控器将接收到的运算结果再转发至认证设备,认证设备对该运算结果进行正确性验证,如果运算结果正确,则说明遥控器通过了认证,能
够与认证设备进行通信。Therefore, the remote controller forwards the received operation result to the authentication device, and the authentication device verifies the correctness of the operation result. If the operation result is correct, the remote controller passes the authentication and can
Enough to communicate with the authentication device.
可选的,正确性验证方式可以是:认证设备在接收到运算结果时,可以根据其本地存储的公钥,对运算结果进行解密,如果解密获得的认证数据与其发送出的认证数据一致,则确定遥控器通过了认证,能够与遥控器进行通信。Optionally, the correctness verification mode may be: when the authentication device receives the operation result, the operation result may be decrypted according to the public key stored locally, and if the authentication data obtained by the decryption is consistent with the authentication data sent by the authentication device, Make sure the remote is certified and able to communicate with the remote.
本实施例中,由于遥控器中没有安装加密认证芯片,当认证设备需要对其进行认证时,需要远程借助无人机中安装的加密认证芯片来完成。因此,基于上述远程认证方式以及基于无人机与遥控器间的配对关系,认证设备可以基于无人机中的加密认证芯片,完成对无人机和遥控器的同时认证,既节约了成本,还提高了认证处理效率。In this embodiment, since the encryption authentication chip is not installed in the remote controller, when the authentication device needs to be authenticated, it needs to be remotely completed by using the encryption authentication chip installed in the drone. Therefore, based on the above remote authentication method and based on the pairing relationship between the drone and the remote controller, the authentication device can complete the simultaneous authentication of the drone and the remote controller based on the encrypted authentication chip in the drone, thereby saving cost. It also improves the efficiency of authentication processing.
进一步可选的,为进一步提高对无人机认证结果的可靠性,对于认证设备对无人机的认证,还可以直接基于无人机中的加密认证芯片实现,即认证设备根据无人机中植入的加密认证芯片,对无人机进行认证。Further, in order to further improve the reliability of the UAV certification result, the authentication of the UAV to the authentication device can also be directly implemented based on the encryption authentication chip in the UAV, that is, the authentication device is based on the UAV. The embedded encryption authentication chip authenticates the drone.
具体来说,前述对于图1(b)示意的认证场景的描述中提到,认证设备也可以通过物理连接的方式与无人机进行连接。通过该物理连接,认证设备可以向无人机发送认证数据,无人机使用加密认证芯片中包含的密钥对该认证数据进行加密运算,获得运算结果,并反馈给认证设备。认证设备验证该运算结果正确时,确定无人机通过了认证。Specifically, the foregoing description of the authentication scenario illustrated in FIG. 1(b) mentions that the authentication device can also be connected to the drone by means of a physical connection. Through the physical connection, the authentication device can send the authentication data to the drone, and the drone encrypts the authentication data using the key included in the encryption authentication chip, obtains the operation result, and feeds back to the authentication device. When the authentication device verifies that the result of the operation is correct, it is determined that the drone has passed the authentication.
图12为本发明实施例提供的设备认证方法实施例十一的流程图,如图12所示,在图11所示实施例基础上,当无人机通过了认证设备的认证后,该方法还可以包括如下步骤1101、步骤1102和步骤1103。这三个步骤没有时序限定关系。FIG. 12 is a flowchart of Embodiment 11 of a device authentication method according to an embodiment of the present invention. As shown in FIG. 12, on the basis of the embodiment shown in FIG. 11, after the UAV passes the authentication of the authentication device, the method is The following steps 1101, 1102, and 1103 may also be included. These three steps have no timing constraints.
步骤1101、无人机与认证设备连接,无人机直接向认证设备发送数据信息,数据信息包括图像数据。Step 1101: The drone is connected to the authentication device, and the drone directly sends data information to the authentication device, where the data information includes image data.
以认证设备为智能手机为例,智能手机对无人机实现了远程认证的情况下,智能手机可以与无人机直接连接(物理连接或无线连接),从而进行数据信息的传输,故而无人机能够将诸如图像数据等数据信息直接发送至智能手机,从而无需经过遥控器的转发,使得智能手机能够更快地下载无人机的数据信息。
Taking the authentication device as a smart phone as an example, when the smart phone realizes remote authentication for the drone, the smart phone can be directly connected (physical connection or wireless connection) to the drone, thereby transmitting data information, so no one The machine can send data information such as image data directly to the smartphone, so that the smart phone can download the data information of the drone more quickly without forwarding through the remote controller.
步骤1102、无人机与认证设备连接,无人机直接接收认证设备发送的无人机升级指令,并执行无人机升级指令,完成对应的升级操作。Step 1102: The UAV is connected to the authentication device, and the UAV directly receives the UAV upgrade command sent by the authentication device, and executes the UAV upgrade command to complete the corresponding upgrade operation.
仍以智能手机作为认证设备为例,无人机直接与认证设备物理连接,当无人机已经通过了智能手机的认证时,智能手机与无人机之间可以之间进行通信。此时,如果无人机有升级需求,则可以通过智能手机直接方便地完成对无人机的软件升级。Taking the smart phone as the authentication device as an example, the drone is directly connected to the authentication device. When the drone has passed the authentication of the smart phone, the smart phone and the drone can communicate with each other. At this time, if the drone has an upgrade requirement, the software upgrade of the drone can be directly and conveniently completed through the smart phone.
可以在智能手机中安装相应的APP,从而可以通过触发该APP的方式,将相应的升级包携带于无人机升级指令中发送至无人机,以使无人机执行无人机升级指令,完成对应的升级操作。The corresponding APP can be installed in the smart phone, so that the corresponding upgrade package can be carried in the drone upgrade command and sent to the drone by triggering the APP, so that the drone can execute the drone upgrade command. Complete the corresponding upgrade operation.
因此,基于智能手机对无人机的远程认证,不但节省了认证成本,还使得能够通过智能手机直接方便地完成对无人机的升级。Therefore, the remote authentication of the drone based on the smart phone not only saves the certification cost, but also enables the upgrade of the drone directly and conveniently through the smart phone.
步骤1103、遥控器与认证设备连接,无人机接收从认证设备发出的并经无人机转发的无人机升级指令,并执行无人机升级指令,完成对应的升级操作。Step 1103: The remote controller is connected to the authentication device, and the drone receives the drone upgrade command sent from the authentication device and forwarded by the drone, and executes the drone upgrade command to complete the corresponding upgrade operation.
本实施例中,当基于无人机中的加密认证芯片,遥控器已经通过了智能手机的认证,且智能手机此时与遥控器之间直接连接时,智能手机还可以借助遥控器,完成对无人机的软件升级。In this embodiment, when the remote controller has passed the authentication of the smart phone based on the encryption authentication chip in the drone, and the smart phone is directly connected with the remote controller at this time, the smart phone can also complete the pair by using the remote controller. Software upgrade for drones.
此时,智能手机对无人机的软件升级是通过遥控器进行的,即通过遥控器的转发,完成对无人机的软件升级。At this point, the software upgrade of the smartphone to the drone is performed by the remote controller, that is, the software upgrade of the drone is completed by the forwarding of the remote controller.
具体来说,可以通过触发智能手机中安装相应的APP,将针对无人机的升级包携带于无人机升级指令中直接发送至遥控器,遥控器识别出该升级指令是针对无人机的,则将无人机升级指令转发至无人机,使得无人机执行该无人机升级指令,完成对应的升级操作。Specifically, the upgrade package for the drone can be directly sent to the remote controller by triggering the upgrade package for the drone, and the remote controller recognizes that the upgrade instruction is for the drone. Then, the drone upgrade command is forwarded to the drone, so that the drone executes the drone upgrade instruction and completes the corresponding upgrade operation.
因此,基于智能手机对遥控器的远程认证,不但节省了认证成本,还使得能够通过遥控器的转发,智能手机方便地完成对无人机的升级。Therefore, based on the remote authentication of the remote controller by the smart phone, not only the certification cost is saved, but also the forwarding of the remote controller enables the smart phone to conveniently upgrade the drone.
以上几个方法实施例基于图1(b)的认证场景,从不同执行主体的角度对设备认证方法进行了介绍,下面,结合图13,从信令交互角度进行介绍。The above method embodiments are based on the authentication scenario of FIG. 1(b), and the device authentication method is introduced from the perspective of different execution entities. Hereinafter, with reference to FIG. 13, the signaling interaction is introduced.
图13为本发明实施例提供的设备认证方法实施例十二的信令交互图,如图13所示,该方法包括如下步骤:
FIG. 13 is a signaling interaction diagram of Embodiment 12 of a device authentication method according to an embodiment of the present invention. As shown in FIG. 13, the method includes the following steps:
步骤1201、认证设备向遥控器发送认证数据。Step 1201: The authentication device sends the authentication data to the remote controller.
步骤1202、遥控器向无人机转发认证数据。Step 1202: The remote controller forwards the authentication data to the drone.
步骤1203、无人机采用其中安装的加密认证芯片中所包含的密钥对认证数据进行加密运算,获得运算结果。Step 1203: The drone encrypts the authentication data by using a key included in the encrypted authentication chip installed therein to obtain an operation result.
步骤1204、无人机向遥控器发送运算结果。Step 1204: The drone sends the operation result to the remote controller.
步骤1205、遥控器向认证设备转发运算结果。Step 1205: The remote controller forwards the operation result to the authentication device.
步骤1206、认证设备确定运算结果正确时,确定能够与遥控器进行通信。Step 1206: When the authentication device determines that the operation result is correct, it is determined that the remote controller can communicate with the remote controller.
图14为本发明实施例提供的设备认证装置实施例一的结构示意图,该设备认证装置设置在认证设备中,该认证设备比如为智能手机、平板电脑等终端设备,如图14所示,该设备认证装置包括:发送模块11、接收模块12、处理模块13。FIG. 14 is a schematic structural diagram of Embodiment 1 of a device authentication apparatus according to an embodiment of the present invention. The device authentication device is configured in an authentication device, such as a smart phone, a tablet computer, and the like, as shown in FIG. 14 . The device authentication device includes: a sending module 11, a receiving module 12, and a processing module 13.
发送模块11,用于向无人机发送认证数据,以使所述无人机将所述认证数据转发至遥控器,所述认证数据用于使得所述遥控器采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果;其中,所述遥控器中植入有所述加密认证芯片。The sending module 11 is configured to send the authentication data to the drone to cause the drone to forward the authentication data to the remote controller, where the authentication data is used to enable the remote controller to adopt the encryption included in the encryption authentication chip The key performs an encryption operation on the authentication data to obtain an operation result, wherein the encryption authentication chip is implanted in the remote controller.
接收模块12,用于接收所述遥控器通过所述无人机转发的所述运算结果。The receiving module 12 is configured to receive the operation result that the remote controller forwards through the drone.
处理模块13,用于在确定所述运算结果正确时,确定能够与所述无人机进行通信。The processing module 13 is configured to determine that the UAV can communicate with the UAV when determining that the operation result is correct.
可选的,所述处理模块13,具体用于:根据本地存储的加密认证算法对所述认证数据进行运算,获得目标运算结果;在确定所述运算结果与所述目标运算结果一致时,确定能够与所述无人机进行通信。Optionally, the processing module 13 is configured to: perform operation on the authentication data according to a locally stored encryption authentication algorithm to obtain a target operation result; and determine, when determining that the operation result is consistent with the target operation result, determining It is capable of communicating with the drone.
可选的,所述处理模块13,具体用于:对所述运算结果进行解密;在确定解密结果与所述认证数据一致时,确定能够与所述无人机进行通信。Optionally, the processing module 13 is specifically configured to: decrypt the operation result; and determine to be able to communicate with the drone when determining that the decryption result is consistent with the authentication data.
可选的,所述处理模块13还用于:根据所述遥控器中植入的所述加密认证芯片,对所述遥控器进行认证。Optionally, the processing module 13 is further configured to: authenticate the remote controller according to the encrypted authentication chip implanted in the remote controller.
可选的,所述认证设备与所述无人机连接,所述接收模块12还用于:直接接收所述无人机发送的数据信息,所述数据信息包括图像数据。Optionally, the authentication device is connected to the UAV, and the receiving module 12 is further configured to: directly receive data information sent by the UAV, where the data information includes image data.
可选的,所述认证设备与所述无人机连接,所述发送模块11还用于:直接向所述无人机发送无人机升级指令,以使所述无人机执行所述无人机升级
指令,完成对应的升级操作。Optionally, the authentication device is connected to the drone, and the sending module 11 is further configured to: directly send a drone upgrade instruction to the drone, so that the drone performs the Man-machine upgrade
The instruction completes the corresponding upgrade operation.
可选的,所述认证设备与所述无人机连接,所述发送模块11还用于:Optionally, the authentication device is connected to the drone, and the sending module 11 is further configured to:
直接向所述无人机发送遥控器升级指令,以使所述无人机将所述遥控器升级指令转发至所述遥控器,使得所述遥控器执行所述遥控器升级指令,完成对应的升级操作。Sending a remote controller upgrade instruction directly to the drone to cause the drone to forward the remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction to complete the corresponding Upgrade operation.
本实施例提供的设备认证装置可以用于执行图2至图7中任一所示方法实施例中认证设备的技术方案,其实现原理和技术效果类似,在此不再赘述。The device authentication device provided by this embodiment may be used to perform the technical solution of the authentication device in the method embodiment shown in any one of FIG. 2 to FIG. 7. The implementation principle and technical effects are similar, and details are not described herein again.
图15为本发明实施例提供的设备认证装置实施例二的结构示意图,该设备认证装置设置在无人机中,如图15所示,该设备认证装置包括:接收模块21、发送模块22、处理模块23。FIG. 15 is a schematic structural diagram of Embodiment 2 of a device authentication apparatus according to an embodiment of the present invention. The device authentication apparatus is disposed in a UAV. As shown in FIG. 15, the device authentication apparatus includes: a receiving module 21, a sending module 22, Processing module 23.
接收模块21,用于接收认证设备发送的认证数据。The receiving module 21 is configured to receive authentication data sent by the authentication device.
发送模块22,用于将所述认证数据发送至遥控器,以使所述遥控器采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果,所述遥控器中植入有所述加密认证芯片。The sending module 22 is configured to send the authentication data to the remote controller, so that the remote controller performs encryption operation on the authentication data by using a key included in the encryption authentication chip to obtain an operation result, where the remote controller is implanted The encrypted authentication chip is included.
所述接收模块21,还用于接收所述遥控器发送的所述运算结果,并将所述运算结果发送至所述认证设备,在确定所述运算结果正确时,确定能够与所述认证设备进行通信。The receiving module 21 is further configured to receive the operation result sent by the remote controller, and send the operation result to the authentication device, and determine that the authentication device can be used when determining that the operation result is correct. Communicate.
可选的,所述无人机与所述认证设备连接,所述发送模块22还用于:直接向所述认证设备发送数据信息,所述数据信息包括图像数据。Optionally, the UAV is connected to the authentication device, and the sending module 22 is further configured to: directly send data information to the authentication device, where the data information includes image data.
可选的,所述无人机与所述认证设备连接,所述接收模块21还用于:直接接收所述认证设备发送的无人机升级指令。Optionally, the UAV is connected to the authentication device, and the receiving module 21 is further configured to: directly receive the UAV upgrade command sent by the authentication device.
所述装置还包括:处理模块23,用于执行所述无人机升级指令,完成对应的升级操作。The device further includes: a processing module 23, configured to execute the drone upgrade command, and complete a corresponding upgrade operation.
可选的,所述无人机与所述认证设备连接,所述接收模块21还用于:直接接收所述认证设备发送的遥控器升级指令。Optionally, the drone is connected to the authentication device, and the receiving module 21 is further configured to: directly receive a remote controller upgrade command sent by the authentication device.
所述发送模块22还用于:将所述遥控器升级指令转发至所述遥控器,使得所述遥控器执行所述遥控器升级指令,完成对应的升级操作。The sending module 22 is further configured to: forward the remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction to complete a corresponding upgrade operation.
本实施例提供的设备认证装置可以用于执行图2至图7中任一所示实施
例中无人机的技术方案,其实现原理和技术效果类似,不再赘述。The device authentication apparatus provided in this embodiment may be used to perform the implementation shown in any one of FIG. 2 to FIG. 7.
In the example, the technical solution of the UAV is similar in its implementation principle and technical effects, and will not be described again.
图16为本发明实施例提供的设备认证装置实施例三的结构示意图,该设备认证装置设置在遥控器中,如图16所示,该设备认证装置包括:接收模块31、处理模块32、发送模块33。FIG. 16 is a schematic structural diagram of Embodiment 3 of a device authentication apparatus according to an embodiment of the present invention. The device authentication apparatus is disposed in a remote controller. As shown in FIG. 16, the device authentication apparatus includes: a receiving module 31, a processing module 32, and a sending Module 33.
接收模块31,用于接收无人机发送的认证数据,所述认证数据是认证设备发送给所述无人机并由所述无人机转发的。The receiving module 31 is configured to receive authentication data sent by the drone, and the authentication data is sent by the authentication device to the drone and forwarded by the drone.
处理模块32,用于采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果,所述遥控器中植入有所述加密认证芯片。The processing module 32 is configured to perform an encryption operation on the authentication data by using a key included in the encryption authentication chip, and obtain an operation result, where the encryption authentication chip is implanted in the remote controller.
发送模块33,用于将所述运算结果发送至所述无人机,以使所述无人机将所述运算结果转发至所述认证设备,所述运算结果用于使得所述认证设备在确定所述运算结果正确时,确定所述认证设备能够与所述无人机进行通信。a sending module 33, configured to send the operation result to the drone, so that the drone forwards the operation result to the authentication device, where the operation result is used to make the authentication device When it is determined that the operation result is correct, it is determined that the authentication device is capable of communicating with the drone.
其中,所述遥控器中植入的所述加密认证芯片,还用于使得所述认证设备根据所述加密认证芯片对所述遥控器进行认证。The cryptographic authentication chip embedded in the remote controller is further configured to enable the authentication device to authenticate the remote controller according to the cryptographic authentication chip.
可选的,所述接收模块31还用于:接收从所述认证设备发出的并经所述无人机转发的遥控器升级指令。Optionally, the receiving module 31 is further configured to: receive a remote controller upgrade instruction sent from the authentication device and forwarded by the drone.
所述处理模块32还用于:执行所述遥控器升级指令,完成对应的升级操作。The processing module 32 is further configured to: execute the remote controller upgrade instruction to complete a corresponding upgrade operation.
本实施例提供的设备认证装置可以用于执行图2至图7任一所示实施例中遥控器的技术方案,其实现原理和技术效果类似,不再赘述。The device authentication device provided in this embodiment may be used to implement the technical solution of the remote controller in the embodiment shown in any of FIG. 2 to FIG. 7. The implementation principle and technical effects are similar, and details are not described herein again.
图17为本发明实施例提供的设备认证装置实施例四的结构示意图,该设备认证装置设置在认证设备中,该认证设备比如为智能手机、平板电脑等终端设备,如图17所示,该设备认证装置包括:发送模块41、接收模块42、处理模块43。FIG. 17 is a schematic structural diagram of Embodiment 4 of a device authentication apparatus according to an embodiment of the present invention. The device authentication device is configured in an authentication device, such as a smart phone, a tablet computer, and the like, as shown in FIG. The device authentication device includes a sending module 41, a receiving module 42, and a processing module 43.
发送模块41,用于向遥控器发送认证数据,以使所述遥控器将所述认证数据转发至无人机,所述认证数据用于使得所述无人机采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果;其中,所述无人机中植入有所述加密认证芯片。The sending module 41 is configured to send the authentication data to the remote controller, so that the remote controller forwards the authentication data to the drone, and the authentication data is used to enable the drone to adopt the encryption included in the encryption authentication chip. The key performs an encryption operation on the authentication data to obtain an operation result, wherein the encryption authentication chip is implanted in the drone.
接收模块42,用于接收所述无人机通过所述遥控器转发的所述运算结果。
The receiving module 42 is configured to receive the operation result that is forwarded by the drone through the remote controller.
处理模块43,用于在确定所述运算结果正确时,确定能够与所述遥控器进行通信。The processing module 43 is configured to determine that the remote controller can communicate with the remote controller when determining that the operation result is correct.
可选的,所述处理模块43具体用于:根据本地存储的加密认证算法对所述认证数据进行运算,获得目标运算结果;在确定所述运算结果与所述目标运算结果一致时,确定能够与所述遥控器进行通信。Optionally, the processing module 43 is specifically configured to: perform operation on the authentication data according to a locally stored encryption authentication algorithm to obtain a target operation result; and determine, when determining that the operation result is consistent with the target operation result, determine Communicate with the remote controller.
可选的,所述所述处理模块43具体用于:对所述运算结果进行解密;在确定解密结果与所述认证数据一致时,确定能够与所述遥控器进行通信。Optionally, the processing module 43 is specifically configured to: decrypt the operation result; and determine to be able to communicate with the remote controller when determining that the decryption result is consistent with the authentication data.
可选的,所述认证设备与所述遥控器连接,所述发送模块41还用于:直接向所述遥控器发送遥控器升级指令,以使所述遥控器执行所述遥控器升级指令,完成对应的升级操作。Optionally, the authentication device is connected to the remote controller, and the sending module 41 is further configured to: directly send a remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade command, Complete the corresponding upgrade operation.
可选的,所述认证设备与所述遥控器连接,所述发送模块41还用于:直接向所述遥控器发送无人机升级指令,以使所述遥控器将所述无人机升级指令转发至所述无人机,使得所述无人机执行所述无人机升级指令,完成对应的升级操作。Optionally, the authentication device is connected to the remote controller, and the sending module 41 is further configured to: directly send a drone upgrade instruction to the remote controller, so that the remote controller upgrades the drone The instruction is forwarded to the drone, so that the drone executes the drone upgrade instruction to complete a corresponding upgrade operation.
可选的,所述认证设备与所述无人机连接,所述接收模块42还用于:直接接收所述无人机向所述认证设备发送的数据信息,所述数据信息包括图像数据。Optionally, the authentication device is connected to the UAV, and the receiving module 42 is further configured to: directly receive data information sent by the UAV to the authentication device, where the data information includes image data.
可选的,所述认证设备与所述无人机连接,所述发送模块41还用于:直接向所述无人机发送无人机升级指令,以使所述无人机执行所述无人机升级指令,完成对应的升级操作。Optionally, the authentication device is connected to the drone, and the sending module 41 is further configured to: directly send a drone upgrade instruction to the drone, so that the drone performs the The man-machine upgrade instruction completes the corresponding upgrade operation.
可选的,所述处理模块43还用于:根据所述无人机中植入的所述加密认证芯片,对所述无人机进行认证。Optionally, the processing module 43 is further configured to: authenticate the drone according to the encrypted authentication chip implanted in the drone.
本实施例提供的设备认证装置可以用于执行图8至图13任一所示实施例中认证设备的技术方案,其实现原理和技术效果类似,不再赘述。The device authentication device provided in this embodiment may be used to perform the technical solution of the authentication device in the embodiment shown in any of FIG. 8 to FIG. 13 , and the implementation principle and technical effects are similar, and details are not described herein again.
图18为本发明实施例提供的设备认证装置实施例五的结构示意图,该设备认证装置设置在遥控器中,如图18所示,该设备认证装置包括:接收模块51、发送模块52。FIG. 18 is a schematic structural diagram of Embodiment 5 of a device authentication apparatus according to an embodiment of the present invention. The device authentication apparatus is disposed in a remote controller. As shown in FIG. 18, the device authentication apparatus includes: a receiving module 51 and a sending module 52.
接收模块51,用于接收认证设备发送的认证数据。The receiving module 51 is configured to receive authentication data sent by the authentication device.
发送模块52,用于将所述认证数据发送至无人机,以使所述无人机采用
加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果,所述无人机中植入有所述加密认证芯片。a sending module 52, configured to send the authentication data to the drone to enable the drone to adopt
The key included in the encryption authentication chip performs an encryption operation on the authentication data to obtain a calculation result, and the encryption authentication chip is implanted in the drone.
所述接收模块51,还用于接收所述无人机发送的所述运算结果,并将所述运算结果发送至所述认证设备,在确定所述运算结果正确时,确定能够与所述认证设备进行通信。The receiving module 51 is further configured to receive the operation result sent by the UAV, and send the operation result to the authentication device, and determine that the authentication can be performed when determining that the operation result is correct. The device communicates.
可选的,所述遥控器与所述认证设备连接,所述接收模块51还用于:直接接收所述认证设备发送的遥控器升级指令。Optionally, the remote controller is connected to the authentication device, and the receiving module 51 is further configured to: directly receive a remote controller upgrade instruction sent by the authentication device.
所述装置还包括:处理模块53,用于执行所述遥控器升级指令,完成对应的升级操作。The device further includes: a processing module 53 configured to execute the remote controller upgrade instruction to complete a corresponding upgrade operation.
可选的,所述遥控器与所述认证设备连接,所述接收模块51还用于:直接接收所述认证设备发送的无人机升级指令。Optionally, the remote controller is connected to the authentication device, and the receiving module 51 is further configured to: directly receive the drone upgrade command sent by the authentication device.
所述发送模块52还用于:将所述无人机升级指令转发至所述无人机,以使所述无人机执行所述无人机升级指令,完成对应的升级操作。The sending module 52 is further configured to: forward the drone upgrade command to the drone, so that the drone performs the drone upgrade command to complete a corresponding upgrade operation.
本实施例提供的设备认证装置可以用于执行图8至图13任一所示实施例中遥控器的技术方案,其实现原理和技术效果类似,不再赘述。The device authentication device provided in this embodiment may be used to implement the technical solution of the remote controller in the embodiment shown in any of FIG. 8 to FIG. 13 , and the implementation principle and technical effects are similar, and details are not described herein.
图19为本发明实施例提供的设备认证装置实施例六的结构示意图,该设备认证装置设置在无人机中,如图19所示,该设备认证装置包括:接收模块61、处理模块62、发送模块63。FIG. 19 is a schematic structural diagram of Embodiment 6 of a device authentication apparatus according to an embodiment of the present invention. The device authentication apparatus is disposed in a UAV. As shown in FIG. 19, the device authentication apparatus includes: a receiving module 61, a processing module 62, Send module 63.
接收模块61,用于接收遥控器发送的认证数据,所述认证数据是认证设备发送给所述遥控器并由所述遥控器转发的。The receiving module 61 is configured to receive authentication data sent by the remote controller, where the authentication data is sent by the authentication device to the remote controller and forwarded by the remote controller.
处理模块62,用于采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果,所述无人机中植入有所述加密认证芯片。The processing module 62 is configured to perform an encryption operation on the authentication data by using a key included in the encryption authentication chip to obtain an operation result, where the encryption authentication chip is implanted in the UAV.
发送模块63,用于将所述运算结果发送至所述遥控器,以使所述遥控器将所述运算结果转发至所述认证设备,所述运算结果用于使得所述认证设备在确定所述运算结果正确时,确定所述认证设备能够与所述遥控器进行通信。a sending module 63, configured to send the operation result to the remote controller, so that the remote controller forwards the operation result to the authentication device, where the operation result is used to cause the authentication device to determine When the result of the operation is correct, it is determined that the authentication device can communicate with the remote controller.
可选的,所述无人机中植入的所述加密认证芯片,还用于使得所述认证设备根据所述加密认证芯片对所述无人机进行认证。Optionally, the cryptographic authentication chip implanted in the UAV is further configured to enable the authentication device to authenticate the UAV according to the cryptographic authentication chip.
可选的,所述无人机与所述认证设备连接,所述发送模块63还用于:直接向所述认证设备发送数据信息,所述数据信息包括图像数据。
Optionally, the UAV is connected to the authentication device, and the sending module 63 is further configured to: directly send data information to the authentication device, where the data information includes image data.
可选的,所述无人机与所述认证设备连接,所述接收模块61还用于:直接接收所述认证设备发送的无人机升级指令。Optionally, the drone is connected to the authentication device, and the receiving module 61 is further configured to: directly receive the drone upgrade command sent by the authentication device.
所述处理模块62还用于:执行所述无人机升级指令,完成对应的升级操作。The processing module 62 is further configured to: execute the drone upgrade instruction to complete a corresponding upgrade operation.
可选的,所述遥控器与所述认证设备连接,所述接收模块61还用于:接收从所述认证设备发出的并经所述无人机转发的无人机升级指令。Optionally, the remote controller is connected to the authentication device, and the receiving module 61 is further configured to: receive a drone upgrade command sent from the authentication device and forwarded by the drone.
所述处理模块62还用于:执行所述无人机升级指令,完成对应的升级操作。The processing module 62 is further configured to: execute the drone upgrade instruction to complete a corresponding upgrade operation.
本实施例提供的设备认证装置可以用于执行图8至图13任一所示实施例中无人机的技术方案,其实现原理和技术效果类似,不再赘述。The device authentication device provided in this embodiment may be used to implement the technical solution of the UAV in the embodiment shown in any of FIG. 8 to FIG. 13 , and the implementation principle and technical effects are similar, and details are not described herein again.
图20为本发明实施例提供的认证设备实施例一的结构示意图,如图20所示,该认证设备包括:发送器71、接收器72、处理器73。FIG. 20 is a schematic structural diagram of Embodiment 1 of an authentication device according to an embodiment of the present invention. As shown in FIG. 20, the authentication device includes: a transmitter 71, a receiver 72, and a processor 73.
发送器71,用于向无人机发送认证数据,以使所述无人机将所述认证数据转发至遥控器,所述认证数据用于使得所述遥控器采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果;其中,所述遥控器中植入有所述加密认证芯片。a transmitter 71, configured to send authentication data to the drone to cause the drone to forward the authentication data to a remote controller, where the authentication data is used to enable the remote controller to adopt a secret included in the encryption authentication chip The key performs an encryption operation on the authentication data to obtain an operation result, wherein the encryption authentication chip is implanted in the remote controller.
接收器72,用于接收所述遥控器通过所述无人机转发的所述运算结果。The receiver 72 is configured to receive the operation result that is forwarded by the remote controller by the drone.
处理器73,用于在确定所述运算结果正确时,确定能够与所述无人机进行通信。The processor 73 is configured to determine that the UAV can communicate with the UAV when determining that the operation result is correct.
可选的,所述处理器73,具体用于:根据本地存储的加密认证算法对所述认证数据进行运算,获得目标运算结果;在确定所述运算结果与所述目标运算结果一致时,确定能够与所述无人机进行通信。Optionally, the processor 73 is configured to: perform operation on the authentication data according to a locally stored encryption authentication algorithm to obtain a target operation result; and determine, when determining that the operation result is consistent with the target operation result, determining It is capable of communicating with the drone.
可选的,所述处理器73,具体用于:对所述运算结果进行解密;在确定解密结果与所述认证数据一致时,确定能够与所述无人机进行通信。Optionally, the processor 73 is specifically configured to: decrypt the operation result; and determine to be able to communicate with the drone when determining that the decryption result is consistent with the authentication data.
可选的,所述处理器73还用于:根据所述遥控器中植入的所述加密认证芯片,对所述遥控器进行认证。Optionally, the processor 73 is further configured to: authenticate the remote controller according to the encrypted authentication chip implanted in the remote controller.
可选的,所述认证设备与所述无人机连接,所述接收器72还用于:直接接收所述无人机发送的数据信息,所述数据信息包括图像数据。Optionally, the authentication device is connected to the UAV, and the receiver 72 is further configured to: directly receive data information sent by the UAV, where the data information includes image data.
可选的,所述认证设备与所述无人机连接,所述发送器71还用于:直接
向所述无人机发送无人机升级指令,以使所述无人机执行所述无人机升级指令,完成对应的升级操作。Optionally, the authentication device is connected to the drone, and the transmitter 71 is further configured to: directly
Sending a drone upgrade command to the drone to cause the drone to execute the drone upgrade command to complete a corresponding upgrade operation.
可选的,所述认证设备与所述无人机连接,所述发送器71还用于:直接向所述无人机发送遥控器升级指令,以使所述无人机将所述遥控器升级指令转发至所述遥控器,使得所述遥控器执行所述遥控器升级指令,完成对应的升级操作。Optionally, the authentication device is connected to the drone, and the transmitter 71 is further configured to: directly send a remote controller upgrade instruction to the drone, so that the drone will use the remote controller The upgrade instruction is forwarded to the remote controller, so that the remote controller executes the remote controller upgrade instruction to complete a corresponding upgrade operation.
本实施例提供的认证设备可以用于执行图2至图7中任一所示方法实施例中的技术方案,其实现原理和技术效果类似,在此不再赘述。The authentication device provided in this embodiment may be used to perform the technical solution in the method embodiment shown in any one of FIG. 2 to FIG. 7. The implementation principle and technical effects are similar, and details are not described herein again.
图21为本发明实施例提供的无人机实施例一的结构示意图,如图21所示,该无人机包括:接收器81、发送器82、处理器83。FIG. 21 is a schematic structural diagram of Embodiment 1 of a drone according to an embodiment of the present invention. As shown in FIG. 21, the UAV includes a receiver 81, a transmitter 82, and a processor 83.
接收器81,用于接收认证设备发送的认证数据。The receiver 81 is configured to receive authentication data sent by the authentication device.
发送器82,用于将所述认证数据发送至遥控器,以使所述遥控器采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果,所述遥控器中植入有所述加密认证芯片。The transmitter 82 is configured to send the authentication data to the remote controller, so that the remote controller encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, where the remote controller is implanted The encrypted authentication chip is included.
所述接收器81,还用于接收所述遥控器发送的所述运算结果,并将所述运算结果发送至所述认证设备,在确定所述运算结果正确时,确定能够与所述认证设备进行通信。The receiver 81 is further configured to receive the operation result sent by the remote controller, and send the operation result to the authentication device, and determine that the authentication device can be used when determining that the operation result is correct. Communicate.
可选的,所述无人机与所述认证设备连接,所述发送器82还用于:直接向所述认证设备发送数据信息,所述数据信息包括图像数据。Optionally, the drone is connected to the authentication device, and the transmitter 82 is further configured to: directly send data information to the authentication device, where the data information includes image data.
可选的,所述无人机与所述认证设备连接,所述接收器81还用于:直接接收所述认证设备发送的无人机升级指令;Optionally, the drone is connected to the authentication device, and the receiver 81 is further configured to: directly receive the UAV upgrade command sent by the authentication device;
处理器83,用于执行所述无人机升级指令,完成对应的升级操作。The processor 83 is configured to execute the drone upgrade command to complete a corresponding upgrade operation.
可选的,所述无人机与所述认证设备连接,所述接收器81还用于:直接接收所述认证设备发送的遥控器升级指令。Optionally, the drone is connected to the authentication device, and the receiver 81 is further configured to: directly receive a remote controller upgrade instruction sent by the authentication device.
所述发送器82还用于:将所述遥控器升级指令转发至所述遥控器,使得所述遥控器执行所述遥控器升级指令,完成对应的升级操作。The transmitter 82 is further configured to: forward the remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction to complete a corresponding upgrade operation.
本实施例提供的无人机可以用于执行图2至图7中任一所示方法实施例中的技术方案,其实现原理和技术效果类似,在此不再赘述。
The unmanned aerial vehicle provided in this embodiment can be used to perform the technical solution in the method embodiment shown in any one of FIG. 2 to FIG. 7. The implementation principle and technical effects are similar, and details are not described herein again.
图22为本发明实施例提供的遥控器实施例一的结构示意图,如图22所示,该遥控器包括:接收器91、处理器92、发送器93。FIG. 22 is a schematic structural diagram of Embodiment 1 of a remote controller according to an embodiment of the present invention. As shown in FIG. 22, the remote controller includes a receiver 91, a processor 92, and a transmitter 93.
接收器91,用于接收无人机发送的认证数据,所述认证数据是认证设备发送给所述无人机并由所述无人机转发的。The receiver 91 is configured to receive authentication data sent by the drone, and the authentication data is sent by the authentication device to the drone and forwarded by the drone.
处理器92,用于采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果,所述遥控器中植入有所述加密认证芯片。The processor 92 is configured to perform an encryption operation on the authentication data by using a key included in the encryption authentication chip, and obtain an operation result, where the encryption authentication chip is implanted in the remote controller.
发送器93,用于将所述运算结果发送至所述无人机,以使所述无人机将所述运算结果转发至所述认证设备,所述运算结果用于使得所述认证设备在确定所述运算结果正确时,确定所述认证设备能够与所述无人机进行通信。a transmitter 93, configured to send the operation result to the drone, so that the drone forwards the operation result to the authentication device, where the operation result is used to make the authentication device When it is determined that the operation result is correct, it is determined that the authentication device is capable of communicating with the drone.
可选的,所述遥控器中植入的所述加密认证芯片,还用于使得所述认证设备根据所述加密认证芯片对所述遥控器进行认证。Optionally, the cryptographic authentication chip implanted in the remote controller is further configured to enable the authentication device to authenticate the remote controller according to the cryptographic authentication chip.
可选的,所述接收器91还用于:接收从所述认证设备发出的并经所述无人机转发的遥控器升级指令。Optionally, the receiver 91 is further configured to: receive a remote controller upgrade instruction sent from the authentication device and forwarded by the drone.
所述处理器92还用于:执行所述遥控器升级指令,完成对应的升级操作。The processor 92 is further configured to: execute the remote controller upgrade instruction to complete a corresponding upgrade operation.
本实施例提供的遥控器可以用于执行图2至图7中任一所示方法实施例中的技术方案,其实现原理和技术效果类似,在此不再赘述。The remote controller provided in this embodiment may be used to perform the technical solution in the method embodiment shown in any one of FIG. 2 to FIG. 7. The implementation principle and technical effects are similar, and details are not described herein again.
图23为本发明实施例提供的认证设备实施例二的结构示意图,如图23所示,该认证设备包括:发送器1011、接收器1012、处理器1013。FIG. 23 is a schematic structural diagram of Embodiment 2 of an authentication device according to an embodiment of the present invention. As shown in FIG. 23, the authentication device includes: a transmitter 1011, a receiver 1012, and a processor 1013.
发送器1011,用于向遥控器发送认证数据,以使所述遥控器将所述认证数据转发至无人机,所述认证数据用于使得所述无人机采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果;其中,所述无人机中植入有所述加密认证芯片。The transmitter 1011 is configured to send authentication data to the remote controller, so that the remote controller forwards the authentication data to the drone, and the authentication data is used to enable the drone to adopt a secret included in the encryption authentication chip. The key performs an encryption operation on the authentication data to obtain an operation result, wherein the encryption authentication chip is implanted in the drone.
接收器1012,用于接收所述无人机通过所述遥控器转发的所述运算结果。The receiver 1012 is configured to receive the operation result that is forwarded by the drone through the remote controller.
处理器1013,用于在确定所述运算结果正确时,确定能够与所述遥控器进行通信。The processor 1013 is configured to determine that the remote controller can communicate with the remote controller when determining that the operation result is correct.
可选的,所述处理器1013具体用于:Optionally, the processor 1013 is specifically configured to:
根据本地存储的加密认证算法对所述认证数据进行运算,获得目标运算结果;在确定所述运算结果与所述目标运算结果一致时,确定能够与所述遥控器进行通信。
The authentication data is calculated according to a locally stored encryption authentication algorithm to obtain a target operation result; when it is determined that the operation result is consistent with the target operation result, it is determined that the remote controller can communicate with the remote controller.
可选的,所述处理器1013具体用于:Optionally, the processor 1013 is specifically configured to:
对所述运算结果进行解密;在确定解密结果与所述认证数据一致时,确定能够与所述遥控器进行通信。Decrypting the operation result; determining that communication with the remote controller is possible when determining that the decryption result is consistent with the authentication data.
可选的,所述处理器1013还用于:根据所述无人机中植入的所述加密认证芯片,对所述无人机进行认证。Optionally, the processor 1013 is further configured to: authenticate the drone according to the encrypted authentication chip implanted in the drone.
可选的,所述认证设备与所述遥控器连接,所述发送器1011还用于:直接向所述遥控器发送遥控器升级指令,以使所述遥控器执行所述遥控器升级指令,完成对应的升级操作。Optionally, the authentication device is connected to the remote controller, and the transmitter 1011 is further configured to: directly send a remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction, Complete the corresponding upgrade operation.
可选的,所述认证设备与所述遥控器连接,所述发送器1011还用于:直接向所述遥控器发送无人机升级指令,以使所述遥控器将所述无人机升级指令转发至所述无人机,使得所述无人机执行所述无人机升级指令,完成对应的升级操作。Optionally, the authentication device is connected to the remote controller, and the transmitter 1011 is further configured to: directly send a drone upgrade instruction to the remote controller, so that the remote controller upgrades the drone The instruction is forwarded to the drone, so that the drone executes the drone upgrade instruction to complete a corresponding upgrade operation.
可选的,所述认证设备与所述无人机连接,所述接收器1012还用于:直接接收所述无人机向所述认证设备发送的数据信息,所述数据信息包括图像数据。Optionally, the authentication device is connected to the UAV, and the receiver 1012 is further configured to: directly receive data information sent by the UAV to the authentication device, where the data information includes image data.
可选的,所述认证设备与所述无人机连接,所述发送器1011还用于:直接向所述无人机发送无人机升级指令,以使所述无人机执行所述无人机升级指令,完成对应的升级操作。Optionally, the authentication device is connected to the drone, and the transmitter 1011 is further configured to: directly send a drone upgrade instruction to the drone, so that the drone performs the The man-machine upgrade instruction completes the corresponding upgrade operation.
本实施例提供的认证设备可以用于执行图8至图13任一所示实施例中的技术方案,其实现原理和技术效果类似,不再赘述。The authentication device provided in this embodiment may be used to perform the technical solution in the embodiment shown in any of FIG. 8 to FIG. 13 , and the implementation principle and technical effects are similar, and details are not described herein again.
图24为本发明实施例提供的遥控器实施例二的结构示意图,如图24所示,该遥控器包括:接收器1111、发送器1112。FIG. 24 is a schematic structural diagram of Embodiment 2 of a remote controller according to an embodiment of the present invention. As shown in FIG. 24, the remote controller includes: a receiver 1111 and a transmitter 1112.
接收器1111,用于接收认证设备发送的认证数据。The receiver 1111 is configured to receive authentication data sent by the authentication device.
发送器1112,用于将所述认证数据发送至无人机,以使所述无人机采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果,所述无人机中植入有所述加密认证芯片。The transmitter 1112 is configured to send the authentication data to the drone, so that the drone encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, where the unmanned person The encrypted authentication chip is implanted in the machine.
所述接收器1111,还用于接收所述无人机发送的所述运算结果,并将所述运算结果发送至所述认证设备,在确定所述运算结果正确时,确定能够与
所述认证设备进行通信。The receiver 1111 is further configured to receive the operation result sent by the UAV, and send the operation result to the authentication device, and when determining that the operation result is correct, determine that the operation result is
The authentication device communicates.
可选的,所述遥控器与所述认证设备连接,所述接收器1111还用于:直接接收所述认证设备发送的遥控器升级指令。Optionally, the remote controller is connected to the authentication device, and the receiver 1111 is further configured to: directly receive a remote controller upgrade instruction sent by the authentication device.
所述遥控器还包括:处理器1113,用于执行所述遥控器升级指令,完成对应的升级操作。The remote controller further includes a processor 1113, configured to execute the remote controller upgrade instruction, and complete a corresponding upgrade operation.
可选的,所述遥控器与所述认证设备连接,所述接收器1111还用于:直接接收所述认证设备发送的无人机升级指令。Optionally, the remote controller is connected to the authentication device, and the receiver 1111 is further configured to: directly receive the drone upgrade command sent by the authentication device.
所述发送器1112还用于:将所述无人机升级指令转发至所述无人机,以使所述无人机执行所述无人机升级指令,完成对应的升级操作。The transmitter 1112 is further configured to: forward the UAV upgrade instruction to the UAV, so that the UAV performs the UAV upgrade instruction to complete a corresponding upgrade operation.
本实施例提供的遥控器可以用于执行图8至图13任一所示实施例中的技术方案,其实现原理和技术效果类似,不再赘述。The remote controller provided in this embodiment may be used to perform the technical solution in the embodiment shown in any of FIG. 8 to FIG. 13 , and the implementation principle and technical effects are similar, and details are not described herein again.
图25为本发明实施例提供的无人机实施例二的结构示意图,如图25所示,该无人机包括:接收器1211、处理器1212、发送器1213。FIG. 25 is a schematic structural diagram of Embodiment 2 of a UAV according to an embodiment of the present invention. As shown in FIG. 25, the UAV includes: a receiver 1211, a processor 1212, and a transmitter 1213.
接收器1211,用于接收遥控器发送的认证数据,所述认证数据是认证设备发送给所述遥控器并由所述遥控器转发的。The receiver 1211 is configured to receive authentication data sent by the remote controller, where the authentication data is sent by the authentication device to the remote controller and forwarded by the remote controller.
处理器1212,用于采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果,所述无人机中植入有所述加密认证芯片。The processor 1212 is configured to perform an encryption operation on the authentication data by using a key included in the encryption authentication chip to obtain an operation result, where the encryption authentication chip is implanted in the UAV.
发送器1213,用于将所述运算结果发送至所述遥控器,以使所述遥控器将所述运算结果转发至所述认证设备,所述运算结果用于使得所述认证设备在确定所述运算结果正确时,确定所述认证设备能够与所述遥控器进行通信。a transmitter 1213, configured to send the operation result to the remote controller, so that the remote controller forwards the operation result to the authentication device, where the operation result is used to cause the authentication device to determine When the result of the operation is correct, it is determined that the authentication device can communicate with the remote controller.
可选的,所述无人机中植入的所述加密认证芯片,还用于使得所述认证设备根据所述加密认证芯片对所述无人机进行认证。Optionally, the cryptographic authentication chip implanted in the UAV is further configured to enable the authentication device to authenticate the UAV according to the cryptographic authentication chip.
可选的,所述无人机与所述认证设备连接,所述发送器1213还用于:直接向所述认证设备发送数据信息,所述数据信息包括图像数据。Optionally, the drone is connected to the authentication device, and the transmitter 1213 is further configured to: directly send data information to the authentication device, where the data information includes image data.
可选的,所述无人机与所述认证设备连接,所述接收器1211还用于:直接接收所述认证设备发送的无人机升级指令。Optionally, the drone is connected to the authentication device, and the receiver 1211 is further configured to: directly receive the UAV upgrade command sent by the authentication device.
所述处理器1212还用于:执行所述无人机升级指令,完成对应的升级操作。The processor 1212 is further configured to: execute the drone upgrade instruction to complete a corresponding upgrade operation.
可选的,所述遥控器与所述认证设备连接,所述接收器1211还用于:接
收从所述认证设备发出的并经所述无人机转发的无人机升级指令。Optionally, the remote controller is connected to the authentication device, and the receiver 1211 is further configured to:
Receiving a drone upgrade command issued by the authentication device and forwarded by the drone.
所述处理器1212还用于:执行所述无人机升级指令,完成对应的升级操作。The processor 1212 is further configured to: execute the drone upgrade instruction to complete a corresponding upgrade operation.
本实施例提供的无人机可以用于执行图8至图13任一所示实施例中的技术方案,其实现原理和技术效果类似,不再赘述。The unmanned aerial vehicle provided in this embodiment can be used to implement the technical solution in the embodiment shown in any of FIG. 8 to FIG. 13 , and the implementation principle and technical effects are similar, and details are not described herein again.
在上述认证设备、无人机、遥控器的各实施例中,应理解,该处理器可以是中央处理单元(英文:Central Processing Unit,简称:CPU),还可以是其他通用处理器、数字信号处理器(英文:Digital Signal Processor,简称:DSP)、专用集成电路(英文:Application Specific Integrated Circuit,简称:ASIC)等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本发明实施例所公开的方法的步骤可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成。In the foregoing embodiments of the authentication device, the drone, and the remote controller, it should be understood that the processor may be a central processing unit (English: Central Processing Unit, CPU for short), or may be other general-purpose processors, digital signals. Processor (English: Digital Signal Processor, DSP for short), Application Specific Integrated Circuit (ASIC), etc. The general purpose processor may be a microprocessor or the processor or any conventional processor or the like. The steps of the method disclosed in the embodiments of the present invention may be directly implemented as a hardware processor, or may be performed by a combination of hardware and software modules in the processor.
本领域普通技术人员可以理解:实现上述各方法实施例的全部或部分步骤可以通过程序指令相关的硬件来完成。前述的程序可以存储于一计算机可读取存储介质中。该程序在执行时,执行包括上述各方法实施例的步骤;而前述的存储介质包括:只读存储器(英文:read-only memory,缩写:ROM)、RAM、快闪存储器、硬盘、固态硬盘、磁带(英文:magnetic tape)、软盘(英文:floppy disk)、光盘(英文:optical disc)及其任意组合。One of ordinary skill in the art will appreciate that all or part of the steps to implement the various method embodiments described above may be accomplished by hardware associated with the program instructions. The aforementioned program can be stored in a computer readable storage medium. When the program is executed, the steps including the foregoing method embodiments are performed; and the foregoing storage medium includes: read-only memory (English: read-only memory, abbreviation: ROM), RAM, flash memory, hard disk, solid state hard disk, Magnetic tape (English: magnetic tape), floppy disk (English: floppy disk), optical disc (English: optical disc) and any combination thereof.
最后应说明的是:以上各实施例仅用以说明本发明的技术方案,而非对其限制;尽管参照前述各实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分或者全部技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明各实施例技术方案的范围。
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, and are not intended to be limiting; although the present invention has been described in detail with reference to the foregoing embodiments, those skilled in the art will understand that The technical solutions described in the foregoing embodiments may be modified, or some or all of the technical features may be equivalently replaced; and the modifications or substitutions do not deviate from the technical solutions of the embodiments of the present invention. range.
Claims (90)
- 一种设备认证方法,其特征在于,包括:A device authentication method, comprising:认证设备向无人机发送认证数据,以使所述无人机将所述认证数据转发至遥控器,所述认证数据用于使得所述遥控器采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果;其中,所述遥控器中植入有所述加密认证芯片;The authentication device transmits authentication data to the drone to cause the drone to forward the authentication data to a remote controller, the authentication data being used to cause the remote controller to adopt a key pair included in the encryption authentication chip The authentication data is subjected to an encryption operation to obtain an operation result; wherein the encryption authentication chip is implanted in the remote controller;所述认证设备接收所述遥控器通过所述无人机转发的所述运算结果;The authentication device receives the operation result that the remote controller forwards through the drone;所述认证设备在确定所述运算结果正确时,确定能够与所述无人机进行通信。The authentication device determines that communication with the drone is determined when determining that the operation result is correct.
- 根据权利要求1所述的方法,其特征在于,所述认证设备在确定所述运算结果正确时,确定能够与所述无人机进行通信,包括:The method according to claim 1, wherein the determining, when determining that the operation result is correct, determining that the UAV can communicate with the UAV includes:所述认证设备根据本地存储的加密认证算法对所述认证数据进行运算,获得目标运算结果;The authentication device performs an operation on the authentication data according to a locally stored encryption authentication algorithm to obtain a target operation result;所述认证设备在确定所述运算结果与所述目标运算结果一致时,确定能够与所述无人机进行通信。The authentication device determines that communication with the drone is determined when determining that the operation result is consistent with the target operation result.
- 根据权利要求1所述的方法,其特征在于,所述认证设备在确定所述运算结果正确时,确定能够与所述无人机进行通信,包括:The method according to claim 1, wherein the determining, when determining that the operation result is correct, determining that the UAV can communicate with the UAV includes:所述认证设备对所述运算结果进行解密;Decrypting the operation result by the authentication device;所述认证设备在确定解密结果与所述认证数据一致时,确定能够与所述无人机进行通信。The authentication device determines that communication with the drone is possible when determining that the decrypted result is consistent with the authentication data.
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:The method of claim 1 further comprising:所述认证设备根据所述遥控器中植入的所述加密认证芯片,对所述遥控器进行认证。The authentication device authenticates the remote controller according to the encrypted authentication chip implanted in the remote controller.
- 根据权利要求1至4中任一项所述的方法,其特征在于,所述认证设备与所述无人机连接,所述方法还包括:The method according to any one of claims 1 to 4, wherein the authentication device is connected to the drone, the method further comprising:所述认证设备直接接收所述无人机向所述认证设备发送的数据信息,所述数据信息包括图像数据。The authentication device directly receives data information sent by the drone to the authentication device, and the data information includes image data.
- 根据权利要求1至4中任一项所述的方法,其特征在于,所述认证设备与所述无人机连接,所述方法还包括:The method according to any one of claims 1 to 4, wherein the authentication device is connected to the drone, the method further comprising:所述认证设备直接向所述无人机发送无人机升级指令,以使所述无人机 执行所述无人机升级指令,完成对应的升级操作。The authentication device directly sends a drone upgrade instruction to the drone to make the drone The drone upgrade instruction is executed to complete the corresponding upgrade operation.
- 根据权利要求1至4中任一项所述的方法,其特征在于,所述认证设备与所述无人机连接,所述方法还包括:The method according to any one of claims 1 to 4, wherein the authentication device is connected to the drone, the method further comprising:所述认证设备直接向所述无人机发送遥控器升级指令,以使所述无人机将所述遥控器升级指令转发至所述遥控器,使得所述遥控器执行所述遥控器升级指令,完成对应的升级操作。The authentication device directly sends a remote controller upgrade instruction to the drone to cause the drone to forward the remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction , complete the corresponding upgrade operation.
- 一种设备认证方法,其特征在于,包括:A device authentication method, comprising:无人机接收认证设备发送的认证数据;The drone receives the authentication data sent by the authentication device;所述无人机将所述认证数据发送至遥控器,以使所述遥控器采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果,所述遥控器中植入有所述加密认证芯片;The drone transmits the authentication data to the remote controller, so that the remote controller encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, and the remote controller is implanted There is the encryption authentication chip;所述无人机接收所述遥控器发送的所述运算结果,并将所述运算结果发送至所述认证设备,在确定所述运算结果正确时,确定能够与所述认证设备进行通信。The drone receives the operation result sent by the remote controller, and sends the operation result to the authentication device, and when it is determined that the operation result is correct, determines that the communication device can communicate with the authentication device.
- 根据权利要求8所述的方法,其特征在于,所述无人机与所述认证设备连接,所述方法还包括:The method of claim 8, wherein the drone is connected to the authentication device, the method further comprising:所述无人机直接向所述认证设备发送数据信息,所述数据信息包括图像数据。The drone directly transmits data information to the authentication device, the data information including image data.
- 根据权利要求8所述的方法,其特征在于,所述无人机与所述认证设备连接,所述方法还包括:The method of claim 8, wherein the drone is connected to the authentication device, the method further comprising:所述无人机直接接收所述认证设备发送的无人机升级指令,并执行所述无人机升级指令,完成对应的升级操作。The drone directly receives the drone upgrade command sent by the authentication device, and executes the drone upgrade command to complete the corresponding upgrade operation.
- 根据权利要求8所述的方法,其特征在于,所述无人机与所述认证设备连接,所述方法还包括:The method of claim 8, wherein the drone is connected to the authentication device, the method further comprising:所述无人机直接接收所述认证设备发送的遥控器升级指令,并将所述遥控器升级指令转发至所述遥控器,使得所述遥控器执行所述遥控器升级指令,完成对应的升级操作。The drone directly receives the remote controller upgrade command sent by the authentication device, and forwards the remote controller upgrade command to the remote controller, so that the remote controller executes the remote controller upgrade command to complete the corresponding upgrade. operating.
- 一种设备认证方法,其特征在于,包括: A device authentication method, comprising:遥控器接收无人机发送的认证数据,所述认证数据是认证设备发送给所述无人机并由所述无人机转发的;Receiving, by the remote controller, authentication data sent by the drone, the authentication data being sent by the authentication device to the drone and forwarded by the drone;所述遥控器采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果,所述遥控器中植入有所述加密认证芯片;The remote controller encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted in the remote controller;所述遥控器将所述运算结果发送至所述无人机,以使所述无人机将所述运算结果转发至所述认证设备,所述运算结果用于使得所述认证设备在确定所述运算结果正确时,确定所述认证设备能够与所述无人机进行通信。The remote controller transmits the operation result to the drone to cause the drone to forward the operation result to the authentication device, and the operation result is used to cause the authentication device to determine When the result of the operation is correct, it is determined that the authentication device can communicate with the drone.
- 根据权利要求12所述的方法,其特征在于,所述遥控器中植入的所述加密认证芯片,还用于使得所述认证设备根据所述加密认证芯片对所述遥控器进行认证。The method according to claim 12, wherein the encrypted authentication chip implanted in the remote controller is further configured to cause the authentication device to authenticate the remote controller according to the encrypted authentication chip.
- 根据权利要求12所述的方法,其特征在于,所述方法还包括:The method of claim 12, wherein the method further comprises:所述遥控器接收从所述认证设备发出的并经所述无人机转发的遥控器升级指令,并执行所述遥控器升级指令,完成对应的升级操作。The remote controller receives a remote controller upgrade command sent from the authentication device and forwarded by the drone, and executes the remote controller upgrade command to complete a corresponding upgrade operation.
- 一种设备认证方法,其特征在于,包括:A device authentication method, comprising:认证设备向遥控器发送认证数据,以使所述遥控器将所述认证数据转发至无人机,所述认证数据用于使得所述无人机采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果;其中,所述无人机中植入有所述加密认证芯片;The authentication device transmits authentication data to the remote controller to cause the remote controller to forward the authentication data to the drone, the authentication data for causing the drone to adopt a key pair included in the encryption authentication chip The authentication data is subjected to an encryption operation to obtain an operation result; wherein the encryption authentication chip is implanted in the drone;所述认证设备接收所述无人机通过所述遥控器转发的所述运算结果;The authentication device receives the operation result forwarded by the drone through the remote controller;所述认证设备在确定所述运算结果正确时,确定能够与所述遥控器进行通信。The authentication device determines that communication with the remote controller is possible when determining that the operation result is correct.
- 根据权利要求15所述的方法,其特征在于,所述认证设备在确定所述运算结果正确时,确定能够与所述遥控器进行通信,包括:The method according to claim 15, wherein the determining, when determining that the operation result is correct, determining that the remote controller can communicate with the remote controller comprises:所述认证设备根据本地存储的加密认证算法对所述认证数据进行运算,获得目标运算结果;The authentication device performs an operation on the authentication data according to a locally stored encryption authentication algorithm to obtain a target operation result;所述认证设备在确定所述运算结果与所述目标运算结果一致时,确定能够与所述遥控器进行通信。The authentication device determines that communication with the remote controller is possible when determining that the operation result is consistent with the target operation result.
- 根据权利要求15所述的方法,其特征在于,所述认证设备在确定所述运算结果正确时,确定能够与所述遥控器进行通信,包括: The method according to claim 15, wherein the determining, when determining that the operation result is correct, determining that the remote controller can communicate with the remote controller comprises:所述认证设备对所述运算结果进行解密;Decrypting the operation result by the authentication device;所述认证设备在确定解密结果与所述认证数据一致时,确定能够与所述遥控器进行通信。The authentication device determines that communication with the remote controller is possible when determining that the decrypted result is consistent with the authentication data.
- 根据权利要求15所述的方法,其特征在于,所述认证设备与所述遥控器连接,所述方法还包括:The method according to claim 15, wherein the authentication device is connected to the remote controller, the method further comprising:所述认证设备直接向所述遥控器发送遥控器升级指令,以使所述遥控器执行所述遥控器升级指令,完成对应的升级操作。The authentication device directly sends a remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction to complete a corresponding upgrade operation.
- 根据权利要求15所述的方法,其特征在于,所述认证设备与所述遥控器连接,所述方法还包括:The method according to claim 15, wherein the authentication device is connected to the remote controller, the method further comprising:所述认证设备直接向所述遥控器发送无人机升级指令,以使所述遥控器将所述无人机升级指令转发至所述无人机,使得所述无人机执行所述无人机升级指令,完成对应的升级操作。The authentication device directly sends a drone upgrade command to the remote controller, so that the remote controller forwards the drone upgrade command to the drone, so that the drone performs the unmanned Machine upgrade instructions to complete the corresponding upgrade operation.
- 根据权利要求15所述的方法,其特征在于,所述认证设备与所述无人机连接,所述方法还包括:The method according to claim 15, wherein the authentication device is connected to the drone, the method further comprising:所述认证设备直接接收所述无人机向所述认证设备发送的数据信息,所述数据信息包括图像数据。The authentication device directly receives data information sent by the drone to the authentication device, and the data information includes image data.
- 根据权利要求15所述的方法,其特征在于,所述认证设备与所述无人机连接,所述方法还包括:The method according to claim 15, wherein the authentication device is connected to the drone, the method further comprising:所述认证设备直接向所述无人机发送无人机升级指令,以使所述无人机执行所述无人机升级指令,完成对应的升级操作。The authentication device directly sends a drone upgrade command to the drone to enable the drone to execute the drone upgrade command to complete a corresponding upgrade operation.
- 根据权利要求15所述的方法,其特征在于,所述方法还包括:The method of claim 15 wherein the method further comprises:所述认证设备根据所述无人机中植入的所述加密认证芯片,对所述无人机进行认证。The authentication device authenticates the drone according to the encrypted authentication chip implanted in the drone.
- 一种设备认证方法,其特征在于,包括:A device authentication method, comprising:遥控器接收认证设备发送的认证数据;The remote controller receives the authentication data sent by the authentication device;所述遥控器将所述认证数据发送至无人机,以使所述无人机采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果,所述无人机中植入有所述加密认证芯片; The remote controller sends the authentication data to the drone, so that the drone encrypts the authentication data by using a key included in the encryption authentication chip, and obtains an operation result, in the drone Implanted with the encrypted authentication chip;所述遥控器接收所述无人机发送的所述运算结果,并将所述运算结果发送至所述认证设备,在确定所述运算结果正确时,确定能够与所述认证设备进行通信。The remote controller receives the operation result sent by the drone, and sends the operation result to the authentication device, and determines that the communication device can communicate with the authentication device when determining that the operation result is correct.
- 根据权利要求23所述的方法,其特征在于,所述遥控器与所述认证设备连接,所述方法还包括:The method of claim 23, wherein the remote controller is connected to the authentication device, the method further comprising:所述遥控器直接接收所述认证设备发送的遥控器升级指令,并执行所述遥控器升级指令,完成对应的升级操作。The remote controller directly receives the remote controller upgrade command sent by the authentication device, and executes the remote controller upgrade command to complete the corresponding upgrade operation.
- 根据权利要求23所述的方法,其特征在于,所述遥控器与所述认证设备连接,所述方法还包括:The method of claim 23, wherein the remote controller is connected to the authentication device, the method further comprising:所述遥控器直接接收所述认证设备发送的无人机升级指令,并将所述无人机升级指令转发至所述无人机,以使所述无人机执行所述无人机升级指令,完成对应的升级操作。The remote controller directly receives the drone upgrade command sent by the authentication device, and forwards the drone upgrade command to the drone to enable the drone to execute the drone upgrade command , complete the corresponding upgrade operation.
- 一种设备认证方法,其特征在于,包括:A device authentication method, comprising:无人机接收遥控器发送的认证数据,所述认证数据是认证设备发送给所述遥控器并由所述遥控器转发的;The drone receives the authentication data sent by the remote controller, and the authentication data is sent by the authentication device to the remote controller and forwarded by the remote controller;所述无人机采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果,所述无人机中植入有所述加密认证芯片;The UAV encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted in the UAV;所述无人机将所述运算结果发送至所述遥控器,以使所述遥控器将所述运算结果转发至所述认证设备,所述运算结果用于使得所述认证设备在确定所述运算结果正确时,确定所述认证设备能够与所述遥控器进行通信。The drone transmits the operation result to the remote controller, so that the remote controller forwards the operation result to the authentication device, and the operation result is used to cause the authentication device to determine the When the result of the operation is correct, it is determined that the authentication device is capable of communicating with the remote controller.
- 根据权利要求26所述的方法,其特征在于,所述无人机中植入的所述加密认证芯片,还用于使得所述认证设备根据所述加密认证芯片对所述无人机进行认证。The method according to claim 26, wherein said encrypted authentication chip implanted in said drone is further configured to cause said authentication device to authenticate said drone according to said encrypted authentication chip .
- 根据权利要求26或27所述的方法,其特征在于,所述无人机与所述认证设备连接,所述方法还包括:The method according to claim 26 or 27, wherein the drone is connected to the authentication device, the method further comprising:所述无人机直接向所述认证设备发送数据信息,所述数据信息包括图像数据。The drone directly transmits data information to the authentication device, the data information including image data.
- 根据权利要求26或27所述的方法,其特征在于,所述无人机与所述认证设备连接,所述方法还包括:The method according to claim 26 or 27, wherein the drone is connected to the authentication device, the method further comprising:所述无人机直接接收所述认证设备发送的无人机升级指令,并执行所述 无人机升级指令,完成对应的升级操作。The drone directly receives the drone upgrade instruction sent by the authentication device, and executes the The drone upgrade instruction completes the corresponding upgrade operation.
- 根据权利要求26或27所述的方法,其特征在于,所述遥控器与所述认证设备连接,所述方法还包括:The method according to claim 26 or 27, wherein the remote controller is connected to the authentication device, the method further comprising:所述无人机接收从所述认证设备发出的并经所述无人机转发的无人机升级指令,并执行所述无人机升级指令,完成对应的升级操作。The drone receives the drone upgrade command sent from the authentication device and forwarded by the drone, and executes the drone upgrade command to complete a corresponding upgrade operation.
- 一种设备认证装置,其特征在于,所述设备认证装置设置在认证设备中,所述设备认证装置包括:A device authentication device, wherein the device authentication device is disposed in an authentication device, and the device authentication device includes:发送模块,用于向无人机发送认证数据,以使所述无人机将所述认证数据转发至遥控器,所述认证数据用于使得所述遥控器采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果;其中,所述遥控器中植入有所述加密认证芯片;a sending module, configured to send the authentication data to the drone, so that the drone forwards the authentication data to a remote controller, where the authentication data is used to enable the remote controller to adopt a key included in the encrypted authentication chip Performing an encryption operation on the authentication data to obtain an operation result; wherein the encryption authentication chip is implanted in the remote controller;接收模块,用于接收所述遥控器通过所述无人机转发的所述运算结果;a receiving module, configured to receive the operation result that is forwarded by the remote controller by the drone;处理模块,用于在确定所述运算结果正确时,确定能够与所述无人机进行通信。And a processing module, configured to determine, when the operation result is correct, to be able to communicate with the drone.
- 根据权利要求31所述的装置,其特征在于,所述处理模块,具体用于:根据本地存储的加密认证算法对所述认证数据进行运算,获得目标运算结果;The device according to claim 31, wherein the processing module is configured to: perform operation on the authentication data according to a locally stored encryption authentication algorithm to obtain a target operation result;在确定所述运算结果与所述目标运算结果一致时,确定能够与所述无人机进行通信。When it is determined that the operation result is consistent with the target operation result, it is determined that communication with the drone can be performed.
- 根据权利要求31所述的装置,其特征在于,所述处理模块,具体用于:The device according to claim 31, wherein the processing module is specifically configured to:对所述运算结果进行解密;Decrypting the operation result;在确定解密结果与所述认证数据一致时,确定能够与所述无人机进行通信。When it is determined that the decrypted result is consistent with the authentication data, it is determined that communication with the drone is possible.
- 根据权利要求31所述的装置,其特征在于,所述处理模块还用于:The device according to claim 31, wherein the processing module is further configured to:根据所述遥控器中植入的所述加密认证芯片,对所述遥控器进行认证。The remote controller is authenticated according to the encrypted authentication chip implanted in the remote controller.
- 根据权利要求31至34中任一项所述的装置,其特征在于,所述认证设备与所述无人机连接,所述接收模块还用于:The device according to any one of claims 31 to 34, wherein the authentication device is connected to the drone, and the receiving module is further configured to:直接接收所述无人机发送的数据信息,所述数据信息包括图像数据。Directly receiving data information transmitted by the drone, the data information including image data.
- 根据权利要31至34中任一项所述的装置,其特征在于,所述认证 设备与所述无人机连接,所述发送模块还用于:Apparatus according to any one of claims 31 to 34, wherein said authentication The device is connected to the drone, and the sending module is further configured to:直接向所述无人机发送无人机升级指令,以使所述无人机执行所述无人机升级指令,完成对应的升级操作。Directly sending a drone upgrade command to the drone to cause the drone to execute the drone upgrade command to complete a corresponding upgrade operation.
- 根据权利要31至34中任一项所述的装置,其特征在于,所述认证设备与所述无人机连接,所述发送模块还用于:The device according to any one of claims 31 to 34, wherein the authentication device is connected to the drone, and the transmitting module is further configured to:直接向所述无人机发送遥控器升级指令,以使所述无人机将所述遥控器升级指令转发至所述遥控器,使得所述遥控器执行所述遥控器升级指令,完成对应的升级操作。Sending a remote controller upgrade instruction directly to the drone to cause the drone to forward the remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction to complete the corresponding Upgrade operation.
- 一种设备认证装置,其特征在于,所述设备认证装置设置在无人机中,所述设备认证装置包括:A device authentication device, wherein the device authentication device is disposed in a drone, and the device authentication device includes:接收模块,用于接收认证设备发送的认证数据;a receiving module, configured to receive authentication data sent by the authentication device;发送模块,用于将所述认证数据发送至遥控器,以使所述遥控器采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果,所述遥控器中植入有所述加密认证芯片;a sending module, configured to send the authentication data to the remote controller, so that the remote controller performs encryption operation on the authentication data by using a key included in the encryption authentication chip, and obtains an operation result, where the remote controller is implanted There is the encryption authentication chip;所述接收模块,还用于接收所述遥控器发送的所述运算结果,并将所述运算结果发送至所述认证设备,在确定所述运算结果正确时,确定能够与所述认证设备进行通信。The receiving module is further configured to receive the operation result sent by the remote controller, and send the operation result to the authentication device, and when determining that the operation result is correct, determine that the operation may be performed with the authentication device. Communication.
- 根据权利要求38所述的装置,其特征在于,所述无人机与所述认证设备连接,所述发送模块还用于:The device according to claim 38, wherein the drone is connected to the authentication device, and the sending module is further configured to:直接向所述认证设备发送数据信息,所述数据信息包括图像数据。Data information is transmitted directly to the authentication device, the data information including image data.
- 根据权利要求38所述的装置,其特征在于,所述无人机与所述认证设备连接,所述接收模块还用于:The device according to claim 38, wherein the drone is connected to the authentication device, and the receiving module is further configured to:直接接收所述认证设备发送的无人机升级指令;Directly receiving the drone upgrade instruction sent by the authentication device;所述装置还包括:The device also includes:处理模块,用于执行所述无人机升级指令,完成对应的升级操作。The processing module is configured to execute the drone upgrade command to complete a corresponding upgrade operation.
- 根据权利要求38所述的装置,其特征在于,所述无人机与所述认证设备连接,所述接收模块还用于:The device according to claim 38, wherein the drone is connected to the authentication device, and the receiving module is further configured to:直接接收所述认证设备发送的遥控器升级指令;Directly receiving a remote controller upgrade instruction sent by the authentication device;所述发送模块还用于:将所述遥控器升级指令转发至所述遥控器,使得 所述遥控器执行所述遥控器升级指令,完成对应的升级操作。The sending module is further configured to: forward the remote controller upgrade instruction to the remote controller, so that The remote controller executes the remote controller upgrade instruction to complete a corresponding upgrade operation.
- 一种设备认证装置,其特征在于,所述设备认证装置设置在遥控器中,所述设备认证装置包括:A device authentication device, wherein the device authentication device is disposed in a remote controller, and the device authentication device includes:接收模块,用于接收无人机发送的认证数据,所述认证数据是认证设备发送给所述无人机并由所述无人机转发的;a receiving module, configured to receive authentication data sent by the drone, where the authentication data is sent by the authentication device to the drone and forwarded by the drone;处理模块,用于采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果,所述遥控器中植入有所述加密认证芯片;a processing module, configured to perform an encryption operation on the authentication data by using a key included in the encryption authentication chip, to obtain an operation result, where the remote authentication device is embedded with the encryption authentication chip;发送模块,用于将所述运算结果发送至所述无人机,以使所述无人机将所述运算结果转发至所述认证设备,所述运算结果用于使得所述认证设备在确定所述运算结果正确时,确定所述认证设备能够与所述无人机进行通信。a sending module, configured to send the operation result to the drone, so that the drone forwards the operation result to the authentication device, where the operation result is used to make the authentication device determine When the operation result is correct, it is determined that the authentication device can communicate with the drone.
- 根据权利要求42所述的装置,其特征在于,所述遥控器中植入的所述加密认证芯片,还用于使得所述认证设备根据所述加密认证芯片对所述遥控器进行认证。The device according to claim 42, wherein the encrypted authentication chip implanted in the remote controller is further configured to cause the authentication device to authenticate the remote controller according to the encrypted authentication chip.
- 根据权利要求42所述的装置,其特征在于,所述接收模块还用于:The device according to claim 42, wherein the receiving module is further configured to:接收从所述认证设备发出的并经所述无人机转发的遥控器升级指令;Receiving a remote controller upgrade command sent from the authentication device and forwarded by the drone;所述处理模块还用于:执行所述遥控器升级指令,完成对应的升级操作。The processing module is further configured to: execute the remote controller upgrade instruction to complete a corresponding upgrade operation.
- 一种设备认证装置,其特征在于,所述设备认证装置设置在认证设备中,所述设备认证装置包括:A device authentication device, wherein the device authentication device is disposed in an authentication device, and the device authentication device includes:发送模块,用于向遥控器发送认证数据,以使所述遥控器将所述认证数据转发至无人机,所述认证数据用于使得所述无人机采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果;其中,所述无人机中植入有所述加密认证芯片;a sending module, configured to send the authentication data to the remote controller, so that the remote controller forwards the authentication data to the drone, and the authentication data is used to enable the drone to adopt a key included in the encrypted authentication chip Performing an encryption operation on the authentication data to obtain an operation result; wherein the encryption authentication chip is implanted in the UAV;接收模块,用于接收所述无人机通过所述遥控器转发的所述运算结果;a receiving module, configured to receive the operation result that is forwarded by the drone through the remote controller;处理模块,用于在确定所述运算结果正确时,确定能够与所述遥控器进行通信。And a processing module, configured to determine to be able to communicate with the remote controller when determining that the operation result is correct.
- 根据权利要求45所述的装置,其特征在于,所述处理模块具体用于:The device according to claim 45, wherein the processing module is specifically configured to:根据本地存储的加密认证算法对所述认证数据进行运算,获得目标运算结果;Performing an operation on the authentication data according to a locally stored encryption authentication algorithm to obtain a target operation result;在确定所述运算结果与所述目标运算结果一致时,确定能够与所述遥控器进行通信。 When it is determined that the operation result is consistent with the target operation result, it is determined that communication with the remote controller is possible.
- 根据权利要求45所述的装置,其特征在于,所述所述处理模块具体用于:The device according to claim 45, wherein the processing module is specifically configured to:对所述运算结果进行解密;Decrypting the operation result;在确定解密结果与所述认证数据一致时,确定能够与所述遥控器进行通信。When it is determined that the decrypted result is consistent with the authentication data, it is determined that communication with the remote controller is possible.
- 根据权利要求45所述的装置,其特征在于,所述认证设备与所述遥控器连接,所述发送模块还用于:The device according to claim 45, wherein the authentication device is connected to the remote controller, and the sending module is further configured to:直接向所述遥控器发送遥控器升级指令,以使所述遥控器执行所述遥控器升级指令,完成对应的升级操作。Sending a remote controller upgrade instruction directly to the remote controller, so that the remote controller executes the remote controller upgrade command to complete a corresponding upgrade operation.
- 根据权利要求45所述的装置,其特征在于,所述认证设备与所述遥控器连接,所述发送模块还用于:The device according to claim 45, wherein the authentication device is connected to the remote controller, and the sending module is further configured to:直接向所述遥控器发送无人机升级指令,以使所述遥控器将所述无人机升级指令转发至所述无人机,使得所述无人机执行所述无人机升级指令,完成对应的升级操作。Sending a drone upgrade command directly to the remote controller, so that the remote controller forwards the drone upgrade command to the drone, so that the drone performs the drone upgrade command, Complete the corresponding upgrade operation.
- 根据权利要求45所述的装置,其特征在于,所述认证设备与所述无人机连接,所述接收模块还用于:The device according to claim 45, wherein the authentication device is connected to the drone, and the receiving module is further configured to:直接接收所述无人机向所述认证设备发送的数据信息,所述数据信息包括图像数据。Directly receiving data information sent by the drone to the authentication device, the data information including image data.
- 根据权利要求45所述的装置,其特征在于,所述认证设备与所述无人机连接,所述发送模块还用于:The device according to claim 45, wherein the authentication device is connected to the drone, and the sending module is further configured to:直接向所述无人机发送无人机升级指令,以使所述无人机执行所述无人机升级指令,完成对应的升级操作。Directly sending a drone upgrade command to the drone to cause the drone to execute the drone upgrade command to complete a corresponding upgrade operation.
- 根据权利要求45所述的装置,其特征在于,所述处理模块还用于:The device according to claim 45, wherein the processing module is further configured to:根据所述无人机中植入的所述加密认证芯片,对所述无人机进行认证。The drone is authenticated according to the encrypted authentication chip implanted in the drone.
- 一种设备认证装置,其特征在于,所述设备认证装置设置在遥控器中,所述设备认证装置包括:A device authentication device, wherein the device authentication device is disposed in a remote controller, and the device authentication device includes:接收模块,用于接收认证设备发送的认证数据;a receiving module, configured to receive authentication data sent by the authentication device;发送模块,用于将所述认证数据发送至无人机,以使所述无人机采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果,所述无人机中植入有所述加密认证芯片; a sending module, configured to send the authentication data to the drone, so that the drone encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, and the drone The encrypted authentication chip is implanted therein;所述接收模块,还用于接收所述无人机发送的所述运算结果,并将所述运算结果发送至所述认证设备,在确定所述运算结果正确时,确定能够与所述认证设备进行通信。The receiving module is further configured to receive the operation result sent by the UAV, and send the operation result to the authentication device, and determine that the authentication device can be used when determining that the operation result is correct Communicate.
- 根据权利要求53所述的装置,其特征在于,所述遥控器与所述认证设备连接,所述接收模块还用于:The device according to claim 53, wherein the remote controller is connected to the authentication device, and the receiving module is further configured to:直接接收所述认证设备发送的遥控器升级指令;Directly receiving a remote controller upgrade instruction sent by the authentication device;所述装置还包括:The device also includes:处理模块,用于执行所述遥控器升级指令,完成对应的升级操作。The processing module is configured to execute the remote controller upgrade instruction to complete a corresponding upgrade operation.
- 根据权利要求53所述的装置,其特征在于,所述遥控器与所述认证设备连接,所述接收模块还用于:The device according to claim 53, wherein the remote controller is connected to the authentication device, and the receiving module is further configured to:直接接收所述认证设备发送的无人机升级指令;Directly receiving the drone upgrade instruction sent by the authentication device;所述发送模块还用于:将所述无人机升级指令转发至所述无人机,以使所述无人机执行所述无人机升级指令,完成对应的升级操作。The sending module is further configured to: forward the UAV upgrade instruction to the UAV, so that the UAV performs the UAV upgrade instruction to complete a corresponding upgrade operation.
- 一种设备认证装置,其特征在于,所述设备认证装置设置在无人机中,所述设备认证装置包括:A device authentication device, wherein the device authentication device is disposed in a drone, and the device authentication device includes:接收模块,用于接收遥控器发送的认证数据,所述认证数据是认证设备发送给所述遥控器并由所述遥控器转发的;a receiving module, configured to receive authentication data sent by the remote controller, where the authentication data is sent by the authentication device to the remote controller and forwarded by the remote controller;处理模块,用于采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果,所述无人机中植入有所述加密认证芯片;a processing module, configured to perform encryption operation on the authentication data by using a key included in the encryption authentication chip, to obtain an operation result, where the encryption authentication chip is implanted in the UAV;发送模块,用于将所述运算结果发送至所述遥控器,以使所述遥控器将所述运算结果转发至所述认证设备,所述运算结果用于使得所述认证设备在确定所述运算结果正确时,确定所述认证设备能够与所述遥控器进行通信。a sending module, configured to send the operation result to the remote controller, so that the remote controller forwards the operation result to the authentication device, where the operation result is used to cause the authentication device to determine the When the result of the operation is correct, it is determined that the authentication device is capable of communicating with the remote controller.
- 根据权利要求56所述的装置,其特征在于,所述无人机中植入的所述加密认证芯片,还用于使得所述认证设备根据所述加密认证芯片对所述无人机进行认证。The device according to claim 56, wherein said encrypted authentication chip implanted in said drone is further configured to cause said authentication device to authenticate said drone according to said encrypted authentication chip .
- 根据权利要求55或56所述的装置,其特征在于,所述无人机与所述认证设备连接,所述发送模块还用于:The device according to claim 55 or 56, wherein the drone is connected to the authentication device, and the sending module is further configured to:直接向所述认证设备发送数据信息,所述数据信息包括图像数据。Data information is transmitted directly to the authentication device, the data information including image data.
- 根据权利要求55或56所述的装置,其特征在于,所述无人机与所 述认证设备连接,所述接收模块还用于:Device according to claim 55 or 56, wherein said drone and station The authentication device is connected, and the receiving module is further configured to:直接接收所述认证设备发送的无人机升级指令;Directly receiving the drone upgrade instruction sent by the authentication device;所述处理模块还用于:执行所述无人机升级指令,完成对应的升级操作。The processing module is further configured to: execute the drone upgrade instruction, and complete a corresponding upgrade operation.
- 根据权利要求55或56所述的装置,其特征在于,所述遥控器与所述认证设备连接,所述接收模块还用于:The device according to claim 55 or 56, wherein the remote controller is connected to the authentication device, and the receiving module is further configured to:接收从所述认证设备发出的并经所述无人机转发的无人机升级指令;Receiving a drone upgrade command sent from the authentication device and forwarded by the drone;所述处理模块还用于:执行所述无人机升级指令,完成对应的升级操作。The processing module is further configured to: execute the drone upgrade instruction, and complete a corresponding upgrade operation.
- 一种认证设备,其特征在于,包括:An authentication device, comprising:发送器,用于向无人机发送认证数据,以使所述无人机将所述认证数据转发至遥控器,所述认证数据用于使得所述遥控器采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果;其中,所述遥控器中植入有所述加密认证芯片;a transmitter for transmitting authentication data to the drone to cause the drone to forward the authentication data to a remote controller, the authentication data being used to cause the remote controller to adopt a key included in the encryption authentication chip Performing an encryption operation on the authentication data to obtain an operation result; wherein the encryption authentication chip is implanted in the remote controller;接收器,用于接收所述遥控器通过所述无人机转发的所述运算结果;a receiver, configured to receive the operation result that is forwarded by the remote controller by the drone;处理器,用于在确定所述运算结果正确时,确定能够与所述无人机进行通信。And a processor, configured to determine to be able to communicate with the drone when determining that the operation result is correct.
- 根据权利要求61所述的认证设备,其特征在于,所述处理器,具体用于:根据本地存储的加密认证算法对所述认证数据进行运算,获得目标运算结果;The authentication device according to claim 61, wherein the processor is configured to: perform operation on the authentication data according to a locally stored encryption authentication algorithm to obtain a target operation result;在确定所述运算结果与所述目标运算结果一致时,确定能够与所述无人机进行通信。When it is determined that the operation result is consistent with the target operation result, it is determined that communication with the drone can be performed.
- 根据权利要求61所述的认证设备,其特征在于,所述处理器,具体用于:The authentication device according to claim 61, wherein the processor is specifically configured to:对所述运算结果进行解密;Decrypting the operation result;在确定解密结果与所述认证数据一致时,确定能够与所述无人机进行通信。When it is determined that the decrypted result is consistent with the authentication data, it is determined that communication with the drone is possible.
- 根据权利要求61所述的认证设备,其特征在于,所述处理器还用于:The authentication device according to claim 61, wherein the processor is further configured to:根据所述遥控器中植入的所述加密认证芯片,对所述遥控器进行认证。The remote controller is authenticated according to the encrypted authentication chip implanted in the remote controller.
- 根据权利要求61至64中任一项所述的认证设备,其特征在于,所述认证设备与所述无人机连接,所述接收器还用于:The authentication device according to any one of claims 61 to 64, wherein the authentication device is connected to the drone, and the receiver is further configured to:直接接收所述无人机发送的数据信息,所述数据信息包括图像数据。 Directly receiving data information transmitted by the drone, the data information including image data.
- 根据权利要61至64中任一项所述的认证设备,其特征在于,所述认证设备与所述无人机连接,所述发送器还用于:The authentication device according to any one of claims 61 to 64, wherein the authentication device is connected to the drone, and the transmitter is further configured to:直接向所述无人机发送无人机升级指令,以使所述无人机执行所述无人机升级指令,完成对应的升级操作。Directly sending a drone upgrade command to the drone to cause the drone to execute the drone upgrade command to complete a corresponding upgrade operation.
- 根据权利要61至64中任一项所述的认证设备,其特征在于,所述认证设备与所述无人机连接,所述发送器还用于:The authentication device according to any one of claims 61 to 64, wherein the authentication device is connected to the drone, and the transmitter is further configured to:直接向所述无人机发送遥控器升级指令,以使所述无人机将所述遥控器升级指令转发至所述遥控器,使得所述遥控器执行所述遥控器升级指令,完成对应的升级操作。Sending a remote controller upgrade instruction directly to the drone to cause the drone to forward the remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction to complete the corresponding Upgrade operation.
- 一种无人机,其特征在于,包括:A drone, characterized in that it comprises:接收器,用于接收认证设备发送的认证数据;a receiver, configured to receive authentication data sent by the authentication device;发送器,用于将所述认证数据发送至遥控器,以使所述遥控器采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果,所述遥控器中植入有所述加密认证芯片;a transmitter, configured to send the authentication data to the remote controller, so that the remote controller performs encryption operation on the authentication data by using a key included in the encryption authentication chip, and obtains an operation result, where the remote controller is implanted There is the encryption authentication chip;所述接收器,还用于接收所述遥控器发送的所述运算结果,并将所述运算结果发送至所述认证设备,在确定所述运算结果正确时,确定能够与所述认证设备进行通信。The receiver is further configured to receive the operation result sent by the remote controller, and send the operation result to the authentication device, and when determining that the operation result is correct, determine that the operation may be performed with the authentication device. Communication.
- 根据权利要求68所述的无人机,其特征在于,所述无人机与所述认证设备连接,所述发送器还用于:The drone according to claim 68, wherein the drone is connected to the authentication device, and the transmitter is further configured to:直接向所述认证设备发送数据信息,所述数据信息包括图像数据。Data information is transmitted directly to the authentication device, the data information including image data.
- 根据权利要求68所述的无人机,其特征在于,所述无人机与所述认证设备连接,所述接收器还用于:The drone according to claim 68, wherein the drone is connected to the authentication device, and the receiver is further configured to:直接接收所述认证设备发送的无人机升级指令;Directly receiving the drone upgrade instruction sent by the authentication device;所述无人机还包括:The drone further includes:处理器,用于执行所述无人机升级指令,完成对应的升级操作。The processor is configured to execute the drone upgrade instruction to complete a corresponding upgrade operation.
- 根据权利要求68所述的无人机,其特征在于,所述无人机与所述认证设备连接,所述接收器还用于:The drone according to claim 68, wherein the drone is connected to the authentication device, and the receiver is further configured to:直接接收所述认证设备发送的遥控器升级指令;Directly receiving a remote controller upgrade instruction sent by the authentication device;所述发送器还用于:将所述遥控器升级指令转发至所述遥控器,使得所述遥控器执行所述遥控器升级指令,完成对应的升级操作。 The transmitter is further configured to: forward the remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction to complete a corresponding upgrade operation.
- 一种遥控器,其特征在于,包括:A remote controller, comprising:接收器,用于接收无人机发送的认证数据,所述认证数据是认证设备发送给所述无人机并由所述无人机转发的;a receiver, configured to receive authentication data sent by the drone, where the authentication data is sent by the authentication device to the drone and forwarded by the drone;处理器,用于采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果,所述遥控器中植入有所述加密认证芯片;a processor, configured to perform an encryption operation on the authentication data by using a key included in the encryption authentication chip, to obtain an operation result, where the remote authentication device is embedded with the encryption authentication chip;发送器,用于将所述运算结果发送至所述无人机,以使所述无人机将所述运算结果转发至所述认证设备,所述运算结果用于使得所述认证设备在确定所述运算结果正确时,确定所述认证设备能够与所述无人机进行通信。a transmitter, configured to send the operation result to the drone, so that the drone forwards the operation result to the authentication device, where the operation result is used to cause the authentication device to determine When the operation result is correct, it is determined that the authentication device can communicate with the drone.
- 根据权利要求72所述的遥控器,其特征在于,所述遥控器中植入的所述加密认证芯片,还用于使得所述认证设备根据所述加密认证芯片对所述遥控器进行认证。The remote controller according to claim 72, wherein the encrypted authentication chip implanted in the remote controller is further configured to cause the authentication device to authenticate the remote controller according to the encrypted authentication chip.
- 根据权利要求72所述的遥控器,其特征在于,所述接收器还用于:The remote controller according to claim 72, wherein the receiver is further configured to:接收从所述认证设备发出的并经所述无人机转发的遥控器升级指令;Receiving a remote controller upgrade command sent from the authentication device and forwarded by the drone;所述处理器还用于:执行所述遥控器升级指令,完成对应的升级操作。The processor is further configured to: execute the remote controller upgrade instruction to complete a corresponding upgrade operation.
- 一种认证设备,其特征在于,包括:An authentication device, comprising:发送器,用于向遥控器发送认证数据,以使所述遥控器将所述认证数据转发至无人机,所述认证数据用于使得所述无人机采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果;其中,所述无人机中植入有所述加密认证芯片;a transmitter for transmitting authentication data to the remote controller to cause the remote controller to forward the authentication data to the drone, the authentication data for causing the drone to adopt a key included in the encryption authentication chip Performing an encryption operation on the authentication data to obtain an operation result; wherein the encryption authentication chip is implanted in the UAV;接收器,用于接收所述无人机通过所述遥控器转发的所述运算结果;a receiver, configured to receive the operation result that is forwarded by the drone through the remote controller;处理器,用于在确定所述运算结果正确时,确定能够与所述遥控器进行通信。And a processor, configured to determine, when the operation result is correct, to be able to communicate with the remote controller.
- 根据权利要求75所述的认证设备,其特征在于,所述处理器具体用于:The authentication device according to claim 75, wherein the processor is specifically configured to:根据本地存储的加密认证算法对所述认证数据进行运算,获得目标运算结果;Performing an operation on the authentication data according to a locally stored encryption authentication algorithm to obtain a target operation result;在确定所述运算结果与所述目标运算结果一致时,确定能够与所述遥控器进行通信。When it is determined that the operation result is consistent with the target operation result, it is determined that communication with the remote controller is possible.
- 根据权利要求75所述的认证设备,其特征在于,所述处理器具体用于: The authentication device according to claim 75, wherein the processor is specifically configured to:对所述运算结果进行解密;Decrypting the operation result;在确定解密结果与所述认证数据一致时,确定能够与所述遥控器进行通信。When it is determined that the decrypted result is consistent with the authentication data, it is determined that communication with the remote controller is possible.
- 根据权利要求75所述的认证设备,其特征在于,所述认证设备与所述遥控器连接,所述发送器还用于:The authentication device according to claim 75, wherein the authentication device is connected to the remote controller, and the transmitter is further configured to:直接向所述遥控器发送遥控器升级指令,以使所述遥控器执行所述遥控器升级指令,完成对应的升级操作。Sending a remote controller upgrade instruction directly to the remote controller, so that the remote controller executes the remote controller upgrade command to complete a corresponding upgrade operation.
- 根据权利要求75所述的认证设备,其特征在于,所述认证设备与所述遥控器连接,所述发送器还用于:The authentication device according to claim 75, wherein the authentication device is connected to the remote controller, and the transmitter is further configured to:直接向所述遥控器发送无人机升级指令,以使所述遥控器将所述无人机升级指令转发至所述无人机,使得所述无人机执行所述无人机升级指令,完成对应的升级操作。Sending a drone upgrade command directly to the remote controller, so that the remote controller forwards the drone upgrade command to the drone, so that the drone performs the drone upgrade command, Complete the corresponding upgrade operation.
- 根据权利要求75所述的认证设备,其特征在于,所述认证设备与所述无人机连接,所述接收器还用于:The authentication device according to claim 75, wherein the authentication device is connected to the drone, and the receiver is further configured to:直接接收所述无人机向所述认证设备发送的数据信息,所述数据信息包括图像数据。Directly receiving data information sent by the drone to the authentication device, the data information including image data.
- 根据权利要求75所述的认证设备,其特征在于,所述认证设备与所述无人机连接,所述发送器还用于:The authentication device according to claim 75, wherein the authentication device is connected to the drone, and the transmitter is further configured to:直接向所述无人机发送无人机升级指令,以使所述无人机执行所述无人机升级指令,完成对应的升级操作。Directly sending a drone upgrade command to the drone to cause the drone to execute the drone upgrade command to complete a corresponding upgrade operation.
- 根据权利要求75所述的认证设备,其特征在于,所述处理器还用于:The authentication device according to claim 75, wherein the processor is further configured to:根据所述无人机中植入的所述加密认证芯片,对所述无人机进行认证。The drone is authenticated according to the encrypted authentication chip implanted in the drone.
- 一种遥控器,其特征在于,包括:A remote controller, comprising:接收器,用于接收认证设备发送的认证数据;a receiver, configured to receive authentication data sent by the authentication device;发送器,用于将所述认证数据发送至无人机,以使所述无人机采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果,所述无人机中植入有所述加密认证芯片;a transmitter, configured to send the authentication data to the drone, so that the drone encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, and the drone The encrypted authentication chip is implanted therein;所述接收器,还用于接收所述无人机发送的所述运算结果,并将所述运算结果发送至所述认证设备,在确定所述运算结果正确时,确定能够与所述认证设备进行通信。 The receiver is further configured to receive the operation result sent by the drone, and send the operation result to the authentication device, and determine that the authentication device can be used when determining that the operation result is correct Communicate.
- 根据权利要求83所述的遥控器,其特征在于,所述遥控器与所述认证设备连接,所述接收器还用于:The remote controller according to claim 83, wherein the remote controller is connected to the authentication device, and the receiver is further configured to:直接接收所述认证设备发送的遥控器升级指令;Directly receiving a remote controller upgrade instruction sent by the authentication device;所述遥控器还包括:The remote controller further includes:处理器,用于执行所述遥控器升级指令,完成对应的升级操作。The processor is configured to execute the remote controller upgrade instruction to complete a corresponding upgrade operation.
- 根据权利要求83所述的遥控器,其特征在于,所述遥控器与所述认证设备连接,所述接收器还用于:直接接收所述认证设备发送的无人机升级指令;The remote controller according to claim 83, wherein the remote controller is connected to the authentication device, and the receiver is further configured to: directly receive a drone upgrade command sent by the authentication device;所述发送器还用于:将所述无人机升级指令转发至所述无人机,以使所述无人机执行所述无人机升级指令,完成对应的升级操作。The transmitter is further configured to: forward the UAV upgrade instruction to the UAV, so that the UAV performs the UAV upgrade instruction to complete a corresponding upgrade operation.
- 一种无人机,其特征在于,包括:A drone, characterized in that it comprises:接收器,用于接收遥控器发送的认证数据,所述认证数据是认证设备发送给所述遥控器并由所述遥控器转发的;a receiver, configured to receive authentication data sent by a remote controller, where the authentication data is sent by the authentication device to the remote controller and forwarded by the remote controller;处理器,用于采用加密认证芯片中包含的密钥对所述认证数据进行加密运算,获得运算结果,所述无人机中植入有所述加密认证芯片;a processor, configured to perform an encryption operation on the authentication data by using a key included in the encryption authentication chip, to obtain an operation result, where the encryption authentication chip is implanted in the UAV;发送器,用于将所述运算结果发送至所述遥控器,以使所述遥控器将所述运算结果转发至所述认证设备,所述运算结果用于使得所述认证设备在确定所述运算结果正确时,确定所述认证设备能够与所述遥控器进行通信。a transmitter, configured to send the operation result to the remote controller, to cause the remote controller to forward the operation result to the authentication device, where the operation result is used to cause the authentication device to determine the When the result of the operation is correct, it is determined that the authentication device is capable of communicating with the remote controller.
- 根据权利要求86所述的无人机,其特征在于,所述无人机中植入的所述加密认证芯片,还用于使得所述认证设备根据所述加密认证芯片对所述无人机进行认证。The unmanned aerial vehicle according to claim 86, wherein the encrypted authentication chip implanted in the drone is further configured to cause the authentication device to pair the drone according to the encrypted authentication chip Certify.
- 根据权利要求86或87所述的无人机,其特征在于,所述无人机与所述认证设备连接,所述发送器还用于:The drone according to claim 86 or 87, wherein the drone is connected to the authentication device, and the transmitter is further configured to:直接向所述认证设备发送数据信息,所述数据信息包括图像数据。Data information is transmitted directly to the authentication device, the data information including image data.
- 根据权利要求86或87所述的无人机,其特征在于,所述无人机与所述认证设备连接,所述接收器还用于:The drone according to claim 86 or 87, wherein the drone is connected to the authentication device, and the receiver is further configured to:直接接收所述认证设备发送的无人机升级指令;Directly receiving the drone upgrade instruction sent by the authentication device;所述处理器还用于:执行所述无人机升级指令,完成对应的升级操作。The processor is further configured to: execute the drone upgrade instruction to complete a corresponding upgrade operation.
- 根据权利要求86或87所述的无人机,其特征在于,所述遥控器与所述认证设备连接,所述接收器还用于:接收从所述认证设备发出的并经所 述无人机转发的无人机升级指令;The drone according to claim 86 or 87, wherein said remote controller is connected to said authentication device, and said receiver is further configured to: receive and transmit from said authentication device The UAV upgrade instruction forwarded by the drone;所述处理器还用于:执行所述无人机升级指令,完成对应的升级操作。 The processor is further configured to: execute the drone upgrade instruction to complete a corresponding upgrade operation.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201680002825.4A CN106797387B (en) | 2016-02-25 | 2016-02-25 | Equipment authentication method and device, authentication equipment, unmanned aerial vehicle and remote controller |
PCT/CN2016/074581 WO2017143570A1 (en) | 2016-02-25 | 2016-02-25 | Method and device for device authentication, authentication device, unmanned aerial vehicle and remote controller |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2016/074581 WO2017143570A1 (en) | 2016-02-25 | 2016-02-25 | Method and device for device authentication, authentication device, unmanned aerial vehicle and remote controller |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017143570A1 true WO2017143570A1 (en) | 2017-08-31 |
Family
ID=58952265
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2016/074581 WO2017143570A1 (en) | 2016-02-25 | 2016-02-25 | Method and device for device authentication, authentication device, unmanned aerial vehicle and remote controller |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106797387B (en) |
WO (1) | WO2017143570A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109298874A (en) * | 2017-07-24 | 2019-02-01 | 深圳市中兴微电子技术有限公司 | A system and method for upgrading UAV software |
WO2019183915A1 (en) * | 2018-03-30 | 2019-10-03 | 深圳市大疆创新科技有限公司 | Unmanned aerial vehicle control method and control device |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140372774A1 (en) * | 2013-06-12 | 2014-12-18 | Convida Wireless, Llc | Context And Power Control Information Management For Proximity Services |
CN104809918A (en) * | 2015-05-27 | 2015-07-29 | 张忠义 | Flight management method of unmanned aerial vehicle |
KR101541359B1 (en) * | 2013-10-21 | 2015-08-03 | 동국대학교 산학협력단 | Method and system for unmanned delivery service |
CN104898654A (en) * | 2015-05-19 | 2015-09-09 | 吴晗 | Unmanned plane remote control system and method |
CN104918020A (en) * | 2015-06-17 | 2015-09-16 | 宋克凡 | Unmanned plane driving simulation display unit |
CN104980210A (en) * | 2015-06-26 | 2015-10-14 | 陈昊 | Unmanned aerial vehicle matched with authentication communication mechanism, ground station matched with authentication communication mechanism and authentication method |
CN104993928A (en) * | 2015-05-11 | 2015-10-21 | 昆明理工大学 | Unmanned plane safe communication link encryption method based on real-time embedded control system |
CN104994112A (en) * | 2015-07-23 | 2015-10-21 | 陈昊 | Method for encrypting communication data chain between unmanned aerial vehicle and ground station |
CN105139693A (en) * | 2015-07-28 | 2015-12-09 | 顺丰科技有限公司 | Unmanned aerial vehicle monitoring method and unmanned aerial vehicle management platform |
CN105261189A (en) * | 2015-11-16 | 2016-01-20 | 英华达(上海)科技有限公司 | Unmanned aerial vehicle flight control method and system |
CN105353700A (en) * | 2015-10-30 | 2016-02-24 | 周丽娜 | Unmanned aerial vehicle with safety control system |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103914076B (en) * | 2014-03-28 | 2017-02-15 | 浙江吉利控股集团有限公司 | Cargo transferring system and method based on unmanned aerial vehicle |
CN105206116B (en) * | 2015-10-10 | 2017-09-22 | 杨珊珊 | Unmanned vehicle flight range verifies device and its verification method |
-
2016
- 2016-02-25 WO PCT/CN2016/074581 patent/WO2017143570A1/en active Application Filing
- 2016-02-25 CN CN201680002825.4A patent/CN106797387B/en not_active Expired - Fee Related
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140372774A1 (en) * | 2013-06-12 | 2014-12-18 | Convida Wireless, Llc | Context And Power Control Information Management For Proximity Services |
KR101541359B1 (en) * | 2013-10-21 | 2015-08-03 | 동국대학교 산학협력단 | Method and system for unmanned delivery service |
CN104993928A (en) * | 2015-05-11 | 2015-10-21 | 昆明理工大学 | Unmanned plane safe communication link encryption method based on real-time embedded control system |
CN104898654A (en) * | 2015-05-19 | 2015-09-09 | 吴晗 | Unmanned plane remote control system and method |
CN104809918A (en) * | 2015-05-27 | 2015-07-29 | 张忠义 | Flight management method of unmanned aerial vehicle |
CN104918020A (en) * | 2015-06-17 | 2015-09-16 | 宋克凡 | Unmanned plane driving simulation display unit |
CN104980210A (en) * | 2015-06-26 | 2015-10-14 | 陈昊 | Unmanned aerial vehicle matched with authentication communication mechanism, ground station matched with authentication communication mechanism and authentication method |
CN104994112A (en) * | 2015-07-23 | 2015-10-21 | 陈昊 | Method for encrypting communication data chain between unmanned aerial vehicle and ground station |
CN105139693A (en) * | 2015-07-28 | 2015-12-09 | 顺丰科技有限公司 | Unmanned aerial vehicle monitoring method and unmanned aerial vehicle management platform |
CN105353700A (en) * | 2015-10-30 | 2016-02-24 | 周丽娜 | Unmanned aerial vehicle with safety control system |
CN105261189A (en) * | 2015-11-16 | 2016-01-20 | 英华达(上海)科技有限公司 | Unmanned aerial vehicle flight control method and system |
Also Published As
Publication number | Publication date |
---|---|
CN106797387B (en) | 2020-12-18 |
CN106797387A (en) | 2017-05-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112987581B (en) | Control method for smart home equipment and its medium and terminal | |
EP3513525B1 (en) | Trusted execution environment secure element communication | |
TWI643508B (en) | Smart routing system for IoT smart devices | |
US12041169B2 (en) | Electronic device and method, performed by electronic device, of transmitting control command to target device | |
WO2019029471A1 (en) | Bluetooth network and network configuration method | |
JP7024980B2 (en) | Remote control of computing devices | |
CN104661219B (en) | A kind of means of communication of wireless device, wireless device and server | |
CN106850680B (en) | Intelligent identity authentication method and device for rail transit equipment | |
EP3001351A1 (en) | User identity authentication method, terminal and service terminal | |
WO2018019069A1 (en) | Resource operation method and apparatus | |
US10372656B2 (en) | System, apparatus and method for providing trusted input/output communications | |
WO2019007252A1 (en) | Control method and apparatus | |
WO2017167188A1 (en) | Secure communication method and apparatus for vehicle, multimedia system for vehicle, and vehicle | |
JP2020078067A5 (en) | ||
TW201719476A (en) | Method and device for authorizing between devices | |
US9058500B2 (en) | Method and apparatus for inputting data | |
WO2023279897A1 (en) | Secure binding method and system, storage medium, and electronic apparatus | |
WO2017152875A1 (en) | Secure communication method and apparatus for vehicle, vehicle multimedia system, and vehicle | |
TW201712590A (en) | A cloud encryption system and method | |
WO2020133085A1 (en) | Information transmission method, storage medium, information transmission system and unmanned aerial vehicle | |
KR102026375B1 (en) | Apparatus and method for supporting communication of wearable device | |
WO2017143570A1 (en) | Method and device for device authentication, authentication device, unmanned aerial vehicle and remote controller | |
WO2019120231A1 (en) | Method and device for determining trust state of tpm, and storage medium | |
WO2014173222A1 (en) | Security device and display system | |
CN114285585B (en) | Smart home device remote upgrade method, trusted authentication method and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16891024 Country of ref document: EP Kind code of ref document: A1 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 16891024 Country of ref document: EP Kind code of ref document: A1 |