[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

WO2023206024A1 - 配置无人机的方法、装置、系统及存储介质 - Google Patents

配置无人机的方法、装置、系统及存储介质 Download PDF

Info

Publication number
WO2023206024A1
WO2023206024A1 PCT/CN2022/089087 CN2022089087W WO2023206024A1 WO 2023206024 A1 WO2023206024 A1 WO 2023206024A1 CN 2022089087 W CN2022089087 W CN 2022089087W WO 2023206024 A1 WO2023206024 A1 WO 2023206024A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
drone
identity information
types
base station
Prior art date
Application number
PCT/CN2022/089087
Other languages
English (en)
French (fr)
Inventor
洪伟
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to PCT/CN2022/089087 priority Critical patent/WO2023206024A1/zh
Priority to CN202280001397.9A priority patent/CN117296431A/zh
Publication of WO2023206024A1 publication Critical patent/WO2023206024A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access

Definitions

  • This application relates to the field of communications, and in particular to a method, device, system and storage medium for configuring a drone.
  • UAV is an unmanned aircraft controlled by radio remote control equipment and its own program control device.
  • the cost of drones is reduced and their functions are improved, drones can be used by different industries, different fields and different groups of people.
  • drones are often controlled and regulated, for example, the use of drones may be prohibited in no-fly zones, the use of small drones may be allowed in densely populated urban areas, and the use of large drones is prohibited.
  • Controlling and managing the drone requires configuring the drone. For example, configure the drone to report information required for control or management.
  • Embodiments of the present disclosure provide a method, device, system and storage medium for configuring a drone.
  • the technical solutions are as follows:
  • a method of configuring a drone is provided, the method is performed by the drone, and the method includes:
  • a method of configuring a drone is provided, the method is performed by a base station, the method includes:
  • the first information is used to indicate M types of identity information that the drone can send, where M is an integer greater than 0;
  • a device for configuring a drone including:
  • a sending module configured to send first information to the base station, where the first information is used to indicate M types of identity information that the drone can send, where M is an integer greater than 0;
  • a receiving module configured to receive second information sent by the base station based on the first information, where the second information is used to configure the drone.
  • a device for configuring a drone including:
  • a receiving module configured to receive the first information sent by the drone, where the first information is used to indicate M types of identity information that the drone can send, where M is an integer greater than 0;
  • a sending module configured to send second information to the UAV based on the first information, where the second information is used to configure the UAV.
  • a drone comprising:
  • transceiver coupled to said processor
  • the processor is configured to execute executable instructions to implement the method of configuring a drone as described in each aspect above.
  • a base station including:
  • transceiver coupled to said processor
  • the processor is configured to execute executable instructions to implement the method of configuring a drone as described in each aspect above.
  • a computer storage medium stores at least one instruction, at least a program, a code set or an instruction set, and the at least one instruction, the At least one program, the code set or the instruction set is loaded and executed by the processor to implement the method of configuring a drone as described in the above aspects.
  • a computer program product (or computer program) including computer instructions stored in a computer-readable storage medium;
  • the processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device performs the method of configuring a drone as described in the above aspects.
  • a chip is provided.
  • the chip includes editable logic circuits and/or program instructions. When the chip is run, it is used to implement the configuration of the UAV as described in each aspect above. Methods.
  • the drone side sends the first information to the base station.
  • the first information indicates M types of identity information in the drone.
  • the base station side sends the drone a third message based on the first information.
  • the second information is used to configure the drone, so that the base station can configure the drone. Since both drones and base stations are connected to the cellular communication network, the base station can remotely configure drones.
  • the configuration of drones is not limited by distance, improving the efficiency and flexibility of configuring drones.
  • Figure 1 is a schematic diagram of a communication system according to an exemplary embodiment
  • Figure 2 is a schematic diagram of a communication system according to another exemplary embodiment
  • Figure 3 is a flow chart of a method for configuring a drone according to an exemplary embodiment
  • Figure 4 is a first information diagram according to an exemplary embodiment
  • Figure 5 is a second information diagram according to an exemplary embodiment
  • Figure 6 is a flow chart of a method of configuring a drone according to another exemplary embodiment
  • Figure 7 is a flow chart of a method of configuring a drone according to another exemplary embodiment
  • Figure 8 is a flowchart of a method of configuring a drone according to another exemplary embodiment
  • Figure 9 is a flow chart of a method of configuring a drone according to another exemplary embodiment.
  • Figure 10 is a block diagram of a device for configuring a drone according to an exemplary embodiment
  • Figure 11 is a block diagram of an apparatus for configuring a drone according to another exemplary embodiment
  • Figure 12 is a schematic structural diagram of a drone according to an exemplary embodiment
  • Figure 13 is a schematic structural diagram of a base station according to an exemplary embodiment.
  • a drone is an unmanned aircraft that can be controlled by radio remote control equipment.
  • a drone is the abbreviation of an unmanned aerial vehicle (UAV).
  • UAVs can be divided into several types: unmanned fixed-wing aircraft, unmanned vertical take-off and landing aircraft, unmanned airships, unmanned helicopters, unmanned multi-rotor aircraft and unmanned paragliders.
  • UAV size UAVs can be divided into several types such as micro UAVs, light UAVs, small UAVs, medium UAVs and large UAVs.
  • Drones are currently widely used in fields such as aerial photography, agriculture, plant protection, micro-selfies, express transportation, news reporting, power inspections, and film and television shooting.
  • drones are often controlled and/or managed. For example, for different types of drones and/or drones in different application fields, there may be restrictions on the flying height of the drone, the area where the drone is allowed to fly, and the permissions for the drone. Factors such as the time period during which the drone is flown and/or the weather conditions that allow the drone to fly are managed and/or controlled differently.
  • the drone can be connected to a cellular communication network. Due to the wide coverage of the cellular communication network, the cellular communication network can be used to control the drone efficiently and flexibly. and/or management.
  • FIG. 1 shows a block diagram of a communication system 100 provided by an exemplary embodiment of the present disclosure.
  • the communication system 100 includes a drone 101 and a base station 102, and the drone 101 and the base station 102 can communicate.
  • Both the UAV 101 and the base station 102 are connected to the cellular communication network.
  • the UAV 101 and the base station 102 establish a communication connection in the cellular communication network to realize the communication between the UAV 101 and the base station 102.
  • the communication connection established between the drone 101 and the base station 102 includes a wireless connection and the like.
  • the UAV 101 is a UAV with cellular communication function. After the UAV 101 is powered on, it can select a base station 102 from at least one base station 102 covering the UAV 101 and access the selection. base station 102.
  • the at least one base station 102 is a base station in a cellular communication network, so that the drone 101 can access the cellular communication network.
  • the cellular communication network where the drone 101 and the base station 102 are located can be a fifth generation mobile communication technology (The Fifth Generation Mobile Communication Technology, 5G) network, or a long-term evolution (Long Term Evolution, LTE) network, or, Other cellular communication networks similar to LTE networks or 5G networks.
  • 5G Fifth Generation Mobile Communication Technology
  • LTE Long Term Evolution
  • the configuration of the UAV 101 through the cellular communication network is not limited by distance, and the UAV 101 can be configured anytime and anywhere, thereby improving the flexibility and efficiency of configuring the UAV 101.
  • the communication distance of point-to-point communication is often shorter.
  • a common point-to-point communication method is wifi communication, and the distance of wifi communication is often only tens of meters or hundreds of meters. Therefore, the UAV 101 can only be configured after approaching the UAV 101 at a close distance.
  • the efficiency and flexibility of configuring the UAV 101 are far inferior to the solution of configuring the UAV 101 through the cellular communication network provided by the embodiments of the present disclosure. .
  • the base station 102 can configure the UAV 101 to configure the UAV 101 to send the information required for operations such as controlling and/or managing the UAV 101. information.
  • the drone 101 can obtain M types of identity information, where M is an integer greater than 0, and sends first information indicating the M types of identity information to the base station 102 .
  • the base station 102 determines the M types of identity information based on the first information, and configures which identity information the drone 101 needs to send from the M types of identity information.
  • the base station 102 configures the sending method for the drone 101 to send the identity information and/or the sending conditions for sending the identity information, and/or the base station 102 can configure the take-off time for the drone 101 to take off. condition.
  • the communication system 100 also includes a control device 103 that communicates with the base station 102 .
  • the control device 103 can communicate with the drone 101 through the base station 102 to control and/or manage the drone 101.
  • control device 103 may be a console corresponding to the drone 101, a handle device with the function of controlling and/or managing the drone 101, or a terminal with the function of controlling and/or managing the drone 101. Equipment etc.
  • the above-mentioned M types of identity information include one or more of the following: equipment identification of the drone 101, location information of the drone 101, altitude information of the drone 101, movement speed of the drone 101, drone 101 The time stamp of the drone 101, the emergency state of the drone 101, the location information of the control device 103 or the altitude information of the control device 103, etc.
  • Figure 3 shows a flow chart of a method 300 for configuring a drone provided by an exemplary embodiment of the present disclosure.
  • the method 300 is applied in the communication system 100 shown in Figure 1 or 2 and is executed by the drone.
  • Method 300 includes:
  • Step 301 Send first information to the base station.
  • the first information is used to indicate M types of identity information that the drone can send, where M is an integer greater than 0.
  • the transmission here may be broadcast, that is, the first information is used to indicate M types of identity information that the drone can broadcast.
  • the UAV may send the first information to the base station under the following circumstances, so as to inform the base station of the M kinds of identity information in the UAV through the first information.
  • the M kinds of identity information are all things that the UAV can The identity information obtained. These situations include the following situations: after the drone accesses the base station, the drone sends the first information to the base station; optionally, during movement, the drone leaves the base station that the drone has accessed. When the coverage range is determined and a new base station is selected to be accessed, the first information is sent to the new base station. Alternatively, the drone periodically sends the first information to the base station. Alternatively, the drone sends the first information to the base station when triggered by the base station.
  • the base station sends a request to the drone to ask whether the drone has certain/specific identity information.
  • the drone can inform the base station of the identity information that can be sent to the base station. .
  • the drone may be other situations that cause the drone to send the first information to the base station, which will not be listed one by one here.
  • the drone determines M types of identity information that the drone can obtain and send, obtains first information indicating the M types of identity information, and sends the first information to the base station.
  • the drone sends the first signaling to the base station, the first signaling includes a first information element (Information Element, IE), and the first IE includes the first information.
  • Information Element Information Element
  • the first signaling is first Radio Resource Control (RRC) signaling
  • the first IE includes one or more of the following:
  • UE-EUTRA-Capability User Equipment Evolved Universal Terrestrial Radio Access Network Capability
  • UE-MRDC-Capability User Equipment-Multi-RAT Dual Connectivity-Capability in the first RRC signaling
  • User Equipment new air interface capability (User Equipment–New Radio-Capability, UE-NR-Capability) in the first RRC signaling, etc.
  • the drone sends the first RRC signaling to the base station, and the UE-EUTRA-Capability, UE-MRDC-Capability and/or UE-NR-Capability of the first RRC signaling includes the first information.
  • the first information may be the following types of information, which are type 1, type 2 and type 3 respectively.
  • the first information includes the information identifier of each of the M types of identity information.
  • the information identifier of the identity information includes one or more of the following: the category of the identity information, the name of the identity information, or the number of the identity information, etc.
  • Type 2 the first information includes first identification information, and the first identification information is used to identify the M types of identity information.
  • the drone stores a correspondence between the identity information set and the identification information.
  • the record includes an identity information set and identification information corresponding to the identity information set.
  • the identity The information set includes at least one identity information.
  • step 301 when the UAV determines M kinds of identity information, it composes the M kinds of identity information into a first identity information set, and obtains it from the corresponding relationship between the identity information set and the identification information based on the first identity information set.
  • the corresponding identification information is used as the first identification information.
  • the base station may also store a corresponding relationship between the identity information set and the identification information.
  • the corresponding relationship between the identity information set and the identification information stored in the base station there is a record including the first identity information set and the first identification information.
  • the UAV and the base station agree in advance on the corresponding relationship between the identity information set and the identification information, and respectively store the corresponding relationship between the agreed identity information set and the identification information.
  • the third-party device configures the corresponding relationship between the identity information set and the identification information on the drone and the base station respectively.
  • the third-party device includes a control device corresponding to the drone, etc.
  • the standard used by both the drone and the base station defines the correspondence between the identity information set and the identification information, and both the drone and the base station obtain and save the correspondence between the identity information set and the identification information based on this standard.
  • the first set of identity information includes the equipment identification of the drone, the location information of the drone, the altitude information of the drone, the movement speed of the drone, the time stamp of the drone, the emergency state of the drone, and the control Location information of the device and altitude information of the control device.
  • the drone Based on the first identity information set, the drone obtains the corresponding identification information "1" as the first identification information from the corresponding relationship between the identity information set and the identification information shown in Table 1. The drone sends the first signaling to the base station, and the first IE of the first signaling includes the first identification information "1".
  • the first information includes a plurality of bits.
  • each type of identity information in the M types of identity information corresponds to a different bit, and the value of the bit corresponding to each type of identity information is the first value.
  • the drone obtains the first-order image.
  • the number of bits included in the first-order image is greater than or equal to M.
  • Each bit in the first-order image corresponds to a kind of identity information, and each bit corresponds to an identity. The information is different.
  • the drone determines the M bits corresponding to the M types of identity information in the first map, sets the values of the M bits to the first value, and sets the M bits to the first value. The value of each bit in the bitmap except the M bits is set to the second value, and the first information is obtained.
  • the first value is a value of 1 and the second value is a value of 0; or, the first value is a value of 0 and the second value is a value of 1.
  • the drone acquires the first bit map as shown in Figure 4, and the first bit map includes eight bits.
  • the identity information corresponding to the first bit is the equipment identification of the drone
  • the identity information corresponding to the second bit is the location information of the drone
  • the identity information corresponding to the third bit is the altitude information of the drone
  • the fourth bit is the altitude information of the drone.
  • the identity information corresponding to the first bit is the movement speed of the drone
  • the identity information corresponding to the fifth bit is the time stamp of the drone
  • the identity information corresponding to the sixth bit is the emergency state of the drone
  • the identity information corresponding to the seventh bit is the emergency state of the drone.
  • the identity information corresponding to the bit is the location information of the control device
  • the identity information corresponding to the eighth bit is the altitude information of the control device.
  • the UAV determines six types of identity information.
  • the six types of identity information are the UAV's equipment identification, the UAV's location information, the UAV's altitude information, the UAV's movement speed, the UAV's Time stamps, emergencies caused by drones.
  • the six bits are respectively the first bit, the second bit, and the third bit of the first bit map. bit, fourth bit, fifth bit, and sixth bit.
  • the drone sends the first signaling to the base station, and the first IE of the first signaling includes the first information as shown in Figure 4.
  • the first information may also include other types of information, which will not be listed one by one here.
  • Step 302 Receive the second information sent by the base station based on the first information.
  • the second information is used to configure the drone.
  • the second information is used to configure the drone.
  • the examples are Example 1, Example 2 and Example 3 respectively.
  • Example 1 The second information is used to configure N types of identity information that the drone needs to send.
  • N is an integer greater than 0 and N is less than or equal to M.
  • the M types of identity information include the N types of identity information.
  • the drone determines the N types of identity information that need to be sent based on the second information.
  • the second information may be the following types of information:
  • the second information includes the information identifier of each of the N types of identity information.
  • the drone determines the N types of identity information based on the information identifiers of the N types of identity information included in the second information.
  • the second information includes second identification information, and the second identification information is used to identify the N types of identity information.
  • the drone obtains the corresponding second identity information set from the corresponding relationship between the identity information set and the identification information, and the second identity information set includes the N types of identity information.
  • the second identity information set includes five kinds of identity information.
  • the five kinds of identity information are the equipment identification of the drone, the location information of the drone, the altitude information of the drone, the movement speed of the drone and the speed of the drone. Time stamp.
  • the second information includes a plurality of bits, in the second information, each identity information among the N types of identity information corresponds to a different bit, and the value of the bit corresponding to each type of identity information is the first value.
  • the drone identifies N bits whose values are the first values in the second information, and determines the N types of identity information corresponding to the N bits.
  • the second information includes eight bits.
  • the identity information corresponding to the first bit is the device identification of the drone
  • the identity information corresponding to the second bit is the location information of the drone.
  • the identity information corresponding to the third bit is the altitude information of the drone
  • the identity information corresponding to the fourth bit is the movement speed of the drone
  • the identity information corresponding to the fifth bit is the time stamp of the drone
  • the The identity information corresponding to the six bits is the emergency state of the drone
  • the identity information corresponding to the seventh bit is the location information of the control device
  • the identity information corresponding to the eighth bit is the altitude information of the control device.
  • the drone After receiving the second information as shown in Figure 5, the drone identifies the first bit, the second bit, the third bit, and the fourth bit whose value is the first value "1" from the second information. bit and the fifth bit, based on the five bits, the five identity information corresponding to the five bits are determined.
  • the five identity information are the equipment identification of the drone, the location information of the drone, and the altitude of the drone. Information, the movement speed of the drone, and the time stamp of the drone.
  • the drone may also perform the following operation 303: obtain the information content of at least one type of identity information, and the N types of identity information include the at least one type of identity information. , sending the information content of the at least one identity information to the base station.
  • the drone sends the information content of the at least one identity information to the base station in a broadcast manner.
  • the N types of identity information include the altitude information of the drone.
  • the altitude information currently obtained by the drone is “100 meters”
  • the information content of the altitude information sent to the base station is "100 meters”.
  • the N types of identity information include the movement speed of the drone.
  • the current movement speed obtained by the drone is "50m/s”
  • the information content of the movement speed sent to the base station is "50m/s”.
  • the M kinds of identity information include first identity information
  • the second information is used to configure the sending method of the drone to send the first identity information
  • the second information is used to configure the drone to send the first identity information. conditions of delivery.
  • the method of sending the first identity information includes a method of broadcasting the first identity information.
  • the drone obtains the information content of the first identity information, it broadcasts the information content of the first identity information to the base station based on the broadcast method of the first identity information.
  • the broadcast method may be periodic broadcast or real-time broadcast.
  • the first identity information when the first identity information is the equipment identification of the drone, the first identity information may be sent by periodically broadcasting the equipment identification of the drone.
  • the first identity information is the location information of the drone, and the first identity information may be sent by broadcasting the location information of the drone in real time. In this way, when the drone obtains the information content of the first identity information, it sends the information content of the first identity information to the base station based on the sending method of the first identity information.
  • the drone when the drone obtains the information content of the first identity information and meets the sending condition, it broadcasts the information content of the first identity information to the base station.
  • the first identity information is the movement speed of the drone
  • the sending condition of the first identity information is to send it when the movement speed exceeds a specified threshold.
  • the drone obtains its own movement speed if the movement speed exceeds the specified threshold, the drone's movement speed will be broadcast to the base station.
  • the conditions for sending the first identity information include at least one scenario in which the first identity information can be sent. That is, the sending conditions indicate the scenarios in which the drone can send the first identity information. In this way, when the drone obtains the information content of the first identity information, it obtains the scene in which the drone is currently located. In this scene, the drone indicated by the sending condition can send the first identity information.
  • the base station sends the information content of the first identity information.
  • the N types of identity information include the first identity information
  • the second information is used to configure the N types of identity information that the drone needs to send, and configure the first identity information.
  • delivery method and/or delivery conditions it is possible to implement Example 1 or Example 2 above separately.
  • Example 3 the second information is used to configure the take-off conditions under which the drone can take off.
  • the take-off conditions include one or more of the following: the drone can take off if it has the ability to send specified identity information, or the drone can take off if it is located in a specified environment, etc.
  • the M types of identity information may include the designated identity information, or may not include the designated identity information.
  • the M types of identity information include the designated identity information, which means that the drone has the ability to send the designated identity information. The drone starts to take off when it receives the takeoff command sent by the control device. If the M types of identity information do not include the designated identity information, it means that the drone does not have the ability to send the designated identity information. The drone refuses to take off when it receives the take-off command sent by the control device.
  • the above examples 1, 2 and 3 may be implemented at the same time, that is, the N types of identity information include the first identity information, the second information is used to configure the N types of identity information that needs to be sent by the drone, and configures the third The sending method and/or sending conditions of the identity information, and also configure the take-off conditions of the drone.
  • the above Example 1 and Example 3 at the same time, that is, the second information is used to configure the N types of identity information that needs to be sent by the drone, and also configures the take-off conditions of the drone.
  • the above examples 2 and 3 are implemented at the same time, that is, the second information is used to configure the sending method and/or sending conditions of the first identity information, and also configures the take-off conditions of the drone.
  • the drone receives second signaling sent by the base station, the second signaling includes a second IE, and the second IE includes second information.
  • the second signaling includes second RRC signaling
  • the second IE includes other configurations (OtherConfig) in the second RRC signaling. That is to say: the UAV receives the second RRC signaling sent by the base station, and the OtherConfig in the second RRC signaling includes the second information.
  • the second signaling includes Radio Resource Control Reconfiguration (RRCReconfiguration) signaling or Radio Resource Control Connection Reconfiguration (RRCConnectionReconfiguration) signaling, etc.
  • RRCReconfiguration Radio Resource Control Reconfiguration
  • RRCConnectionReconfiguration Radio Resource Control Connection Reconfiguration
  • the drone may execute the process of the embodiment of the present disclosure when triggered by the base station, that is, in step 301, the drone sends the first information to the base station when triggered by the base station.
  • the UAV receives the base station to send third information.
  • the third information is used to inquire whether the UAV has Q types of identity information.
  • the Q types of identity information include the M types of identity information.
  • Q is an integer greater than 0. .
  • the UAV determines the Q types of identity information based on the third information, and after determining the M types of identity information possessed by the UAV from the Q types of identity information, sends the first information to the base station.
  • the drone receives the third signaling sent by the base station, the third signaling includes the third IE, and the third IE includes the third information.
  • the third signaling includes third RRC signaling, etc.
  • the third IE includes user equipment capability query (UECapabilityEnquiry) in the third RRC signaling. That is to say, the UAV receives the third RRC signaling sent by the base station, and the UECapabilityEnquiry in the third RRC signaling includes the third information.
  • UECapabilityEnquiry user equipment capability query
  • third information there are three types of third information.
  • the process of determining the Q types of identity information based on the third information is introduced.
  • the third information includes the information identifier of each of the Q types of identity information. After receiving the third information, the drone determines the Q types of identity information corresponding to the Q information identifiers based on the Q information identifiers included in the third information.
  • the third information includes third identification information, and the third identification information is used to identify the Q kinds of identity information.
  • the drone After receiving the third information, the drone obtains the corresponding third identity information set from the corresponding relationship between the identity information set and the identification information based on the third identification information included in the third information.
  • the third identity information set includes the Q kinds of identities. information.
  • the third information includes a plurality of bits.
  • each type of identity information among the Q types of identity information corresponds to a different bit, and the value of the bit corresponding to each type of identity information is the first value.
  • the UAV After receiving the third information, the UAV identifies Q bits whose values are the first values in the third information, and determines the Q types of identity information corresponding to the Q bits.
  • the drone sends first information to the base station, and the first information indicates M types of identity information in the drone.
  • the receiving base station sends second information, and the second information is used to configure N types of identity information that the drone needs to send, thus solving the problem of what identity information the drone needs to report.
  • the second information is used to configure the sending method and/or sending conditions of the identity information, thus solving the problem that the drone can send the identity information according to the requirements of the base station.
  • the second information is used to configure the take-off conditions for the UAV to take off, thus solving the problem that the UAV can take off according to the requirements of the base station.
  • the base station and the drone use a cellular communication network to communicate, the drone can be configured remotely, and the drone can remotely report identity information, thereby improving the efficiency and flexibility of configuring the drone, and improving the efficiency of the drone. Efficiency and flexibility in reporting identity information.
  • Figure 7 shows a flow chart of a method 700 for configuring a drone provided by an exemplary embodiment of the present disclosure.
  • the method 700 is applied in the communication system 100 shown in Figure 1 or 2 and is executed by a base station.
  • the method 700 include:
  • Step 701 Receive the first information sent by the drone.
  • the first information is used to indicate M types of identity information that the drone can send, where M is an integer greater than 0.
  • the transmission here may be broadcast, that is, the first information is used to indicate M types of identity information that the drone can broadcast.
  • the base station receives the first signaling sent by the drone, the first signaling includes the first IE, and the first IE includes the first information.
  • the first signaling is first RRC signaling
  • the first IE includes one or more of the following:
  • the base station receives the first RRC signaling sent by the drone, and the UE-EUTRA-Capability, UE-MRDC-Capability and/or UE-NR-Capability of the first RRC signaling includes the first information.
  • the base station may also ask whether the drone has Q types of identity information.
  • the base station may also ask whether the drone has Q types of identity information.
  • the base station Before executing step 701, the base station sends third information to the drone.
  • the third information is used to inquire whether the drone has Q types of identity information, and the Q types of identity information include the M types of identity information.
  • the base station sends third signaling to the drone, the third signaling includes a third IE, and the third IE includes third information.
  • the third signaling includes third RRC signaling, etc.
  • the third IE includes UECapabilityEnquiry in the third RRC signaling. That is to say, the base station sends the third RRC signaling to the drone, and the UECapabilityEnquiry in the third RRC signaling includes the third information.
  • the third information includes three types of information. Next, the three types of third information are listed one by one.
  • the third information includes the information identifier of each of the Q types of identity information.
  • the third information includes third identification information, and the third identification information is used to identify the Q kinds of identity information.
  • the base station stores a corresponding relationship between the identity information set and the identification information.
  • the record includes an identity information set and identification information corresponding to the identity information set.
  • the identity information set include at least one piece of identifying information.
  • the base station composes the Q kinds of identity information into a third identity information set, and based on the third identity information set, obtains the corresponding identification information as the third identification information from the corresponding relationship between the identity information set and the identification information.
  • the third information includes a plurality of bits.
  • each type of identity information among the Q types of identity information corresponds to a different bit, and the value of the bit corresponding to each type of identity information is the first value.
  • the base station obtains a third bitmap, the number of bits included in the third bitmap is greater than or equal to Q, each bit in the third bitmap corresponds to a kind of identity information, and each bit corresponds to different identity information.
  • the base station determines the Q bits in the third bitmap corresponding to the Q types of identity information, sets the values of the Q bits to the first value, and sets the Q bits in the third bitmap except the Q bits.
  • the value of each other bit is set to the second value, and the third information is obtained.
  • Step 702 Determine the M types of identity information based on the first information.
  • the first information may be the following types of information.
  • the detailed process of determining the M types of identity information in the case of each type of first information will be described below.
  • the first information includes the information identifier of each of the M types of identity information.
  • the information identifier of the identity information includes one or more of the following: the category of the identity information, the name of the identity information, or the number of the identity information, etc.
  • the base station determines the M types of identity information based on the information identifiers of the M types of identity information included in the first information.
  • Type 2 the first information includes first identification information, and the first identification information is used to identify the M types of identity information.
  • the base station obtains the first identity information set corresponding to the first identification information from the corresponding relationship between the identity information set and the identification information, and the first identity information set includes the M types Identity Information.
  • the base station stores the corresponding relationship between the identity information set and the identification information shown in Table 1 below, and assume that the first identification information is "1". Based on the first identification information "1", the base station obtains the first identity information set corresponding to the first identification information "1" from the corresponding relationship between the identity information set and the identification information shown in the above Table 1.
  • the first set of identity information includes the equipment identification of the drone, the location information of the drone, the altitude information of the drone, the movement speed of the drone, the time stamp of the drone, the emergency state of the drone, and the control Location information of the device and altitude information of the control device.
  • the first information includes a plurality of bits.
  • each type of identity information in the M types of identity information corresponds to a different bit, and the value of the bit corresponding to each type of identity information is the first value.
  • the base station identifies M bits whose values are the first values from the first information, and determines M types of identity information corresponding to the M bits.
  • the first information received by the base station is as shown in Figure 4, and the first information includes eight bits.
  • the identity information corresponding to the first bit is the equipment identification of the drone
  • the identity information corresponding to the second bit is the location information of the drone
  • the identity information corresponding to the third bit is the altitude information of the drone
  • the fourth bit is the altitude information of the drone.
  • the identity information corresponding to the first bit is the movement speed of the drone
  • the identity information corresponding to the fifth bit is the time stamp of the drone
  • the identity information corresponding to the sixth bit is the emergency state of the drone
  • the identity information corresponding to the seventh bit is the emergency state of the drone.
  • the identity information corresponding to the bit is the location information of the control device
  • the identity information corresponding to the eighth bit is the altitude information of the control device.
  • the base station identifies the first bit, the second bit, the third bit, the fourth bit, the fifth bit and the sixth bit whose value is "1" from the first information. Determine the equipment identification of the drone corresponding to the first bit, the location information of the drone corresponding to the second bit, the altitude information of the drone corresponding to the third bit, and the altitude information of the drone corresponding to the fourth bit. Movement speed, the fifth bit corresponds to the time stamp of the drone, and the sixth bit corresponds to the emergency state of the drone.
  • the first information may also include other types of information, which will not be listed one by one here.
  • Step 703 Based on the M types of identity information, send second information to the drone.
  • the base station sends second signaling to the drone, the second signaling includes a second IE, and the second IE includes second information.
  • the second signaling includes second RRC signaling
  • the second IE includes OtherConfig in the second RRC signaling. That is to say: the base station sends the second RRC signaling to the drone, and the OtherConfig in the second RRC signaling includes the second information.
  • the second signaling includes Radio Resource Control Reconfiguration (RRC Reconfiguration) signaling or Radio Resource Control Connection Reconfiguration (RRC Connection Reconfiguration) signaling, etc.
  • RRC Reconfiguration Radio Resource Control Reconfiguration
  • RRC Connection Reconfiguration Radio Resource Control Connection Reconfiguration
  • the second information is used to configure the drone.
  • the second information is used to configure the drone.
  • several examples in which the second information is used to configure the drone are listed below.
  • Example 1 The second information is used to configure N types of identity information that the drone needs to send.
  • N is an integer greater than 0 and N is less than or equal to M.
  • the M types of identity information include the N types of identity information.
  • the N types of identity information are selected by the base station from the M types of identity information.
  • the base station selects N types of identity information from the M types of identity information according to the needs of the control device.
  • the control device may configure the identity information that needs to be reported by the drone on the base station in advance.
  • the base station selects N types of identity information configured by the control device that need to be reported by the drone from the M types of identity information.
  • the second information may be the following types of information:
  • the second information includes the information identifier of each of the N types of identity information.
  • the second information includes second identification information, and the second identification information is used to identify the N types of identity information.
  • the base station composes the N types of identity information into a second identity information set, and based on the second identity information set, obtains the corresponding identification information as the second identification information from the corresponding relationship between the identity information set and the identification information.
  • the base station selects five types of identity information from the M types of identity information.
  • the five types of identity information are the equipment identification of the drone, the location information of the drone, the altitude information of the drone, and the movement of the drone. Speed and time stamping of drones.
  • the five kinds of identity information are composed into a second identity information set. Based on the second identity information set, the corresponding identification information "2" is obtained as the second identification information from the corresponding relationship between the identity information set and the identification information shown in Table 1. .
  • the second information includes a plurality of bits, in the second information, each identity information among the N types of identity information corresponds to a different bit, and the value of the bit corresponding to each type of identity information is the first value.
  • the base station obtains a second bitmap, the second bitmap includes a number of bits greater than or equal to N, each bit in the second bitmap corresponds to a type of identity information, and each bit corresponds to different identity information.
  • the base station determines the N bits in the second bitmap corresponding to the N types of identity information, sets the values of the N bits to the first value, and sets the values of the N bits in the second bitmap except for the N bits. The value of each other bit is set to the second value, and the second information is obtained.
  • the base station obtains a second bitmap.
  • the second bitmap includes eight bits.
  • the identity information corresponding to the first bit in the second bitmap is the device identification of the drone, and the identity information corresponding to the second bit is The identity information is the location information of the drone.
  • the identity information corresponding to the third bit is the altitude information of the drone.
  • the identity information corresponding to the fourth bit is the movement speed of the drone.
  • the identity information corresponding to the fifth bit is is the time stamp of the drone, the identity information corresponding to the sixth bit is the emergency state of the drone, the identity information corresponding to the seventh bit is the location information of the control device, and the identity information corresponding to the eighth bit is the control The device's altitude information.
  • the base station selects five types of identity information from the M types of identity information.
  • the five types of identity information are the equipment identification of the drone, the location information of the drone, the altitude information of the drone, and the movement speed of the drone. , the time stamp of the UAV.
  • the second bitmap set the values of the first bit, the second bit, the third bit, the fourth bit and the fifth bit to the first value "1", and set the sixth bit , the values of the seventh bit and the eighth bit are both set to the second value "0", and the second information shown in Figure 5 is obtained.
  • the base station may also perform the following operation of step 704: receive the information content of at least one identity information sent by the drone, and the N kinds of identity information include the at least one Identity Information.
  • the base station may also send the information content of the at least one identity information to the control device.
  • the control device receives the information content of the at least one identity information, and controls and/or manages the drone based on the information content of the at least one identity information. For example, control the drone to avoid obstacles, control the steering of the drone, etc.
  • the M kinds of identity information include first identity information
  • the second information is used to configure the sending method of the drone to send the first identity information
  • the second information is used to configure the drone to send the first identity information. conditions of delivery.
  • the base station may store a corresponding relationship between the identity information and the transmission method. Based on the first identity information, the base station obtains the transmission method of the first identity information from the correspondence between the identity information and the transmission method.
  • the second information includes the second information. The mapping relationship between the first identity information and the sending method of the first identity information.
  • the base station may store a corresponding relationship between the identity information and the sending conditions. Based on the first identity information, the base station obtains the sending conditions of the first identity information from the corresponding relationship between the identity information and the sending conditions.
  • the second information includes the second information. A mapping relationship between one identity information and the sending conditions of the first identity information.
  • the method of sending the first identity information includes a method of broadcasting the first identity information.
  • the broadcast method may be periodic broadcast or real-time broadcast.
  • the first identity information is the equipment identification of the drone
  • the first identity information may be sent by periodically broadcasting the equipment identification of the drone.
  • the first identity information is the location information of the drone
  • the sending method of the first identity information is broadcasting the location information of the drone in real time.
  • the N types of identity information include the first identity information
  • the second information is used to configure the N types of identity information that the drone needs to send, and configure the first identity information.
  • delivery method and/or delivery conditions it is possible to implement Example 1 or Example 2 above separately.
  • Example 3 the second information is used to configure the take-off conditions under which the drone can take off.
  • the take-off conditions include one or more of the following: the drone can take off if it has the ability to send specified identity information, or the drone can take off if it is located in a specified environment, etc.
  • the M types of identity information may include the designated identity information, or may not include the designated identity information.
  • the M types of identity information include the designated identity information, indicating that the drone has the ability to send the designated identity information.
  • the M types of identity information do not include the designated identity information, which means that the drone does not have the ability to send the designated identity information.
  • the above examples 1, 2 and 3 may be implemented at the same time, that is, the N types of identity information include the first identity information, the second information is used to configure the N types of identity information that needs to be sent by the drone, and configures the third The sending method and/or sending conditions of the identity information, and also configure the take-off conditions of the drone.
  • the above Example 1 and Example 3 at the same time, that is, the second information is used to configure the N types of identity information that needs to be sent by the drone, and also configures the take-off conditions of the drone.
  • the above examples 2 and 3 are implemented at the same time, that is, the second information is used to configure the sending method and/or sending conditions of the first identity information, and also configures the take-off conditions of the drone.
  • the base station receives the first information sent by the drone, and the first information indicates M types of identity information in the drone.
  • the second information is sent to the drone, and the second information is used to configure N types of identity information that the drone needs to send, thus solving the problem of what identity information the drone needs to report.
  • the second information is used to configure the sending method and/or sending conditions of the identity information, thus solving the problem that the drone can send the identity information according to the requirements of the base station.
  • the second information is used to configure the take-off conditions for the UAV to take off, thus solving the problem that the UAV can take off according to the requirements of the base station.
  • the base station and the drone use a cellular communication network to communicate, the drone can be configured remotely, and the drone can remotely report identity information, thereby improving the efficiency and flexibility of configuring the drone, and improving the efficiency of the drone. Efficiency and flexibility in reporting identity information.
  • Figure 9 shows a flow chart of a method 900 for configuring a drone provided by an exemplary embodiment of the present disclosure.
  • the method 900 is applied in the communication system 100 shown in Figure 1 or Figure 2, and the drone interacts with the base station.
  • the method 900 includes:
  • Step 901 The base station sends third signaling to the drone, where the third signaling includes a third IE, and the third IE includes third information.
  • the third information includes three types of information. Next, the three types of third information are listed one by one.
  • the third information includes the information identifier of each of the Q types of identity information.
  • the third information includes third identification information, and the third identification information is used to identify the Q kinds of identity information.
  • the third information includes a plurality of bits.
  • each type of identity information among the Q types of identity information corresponds to a different bit, and the value of the bit corresponding to each type of identity information is the first value.
  • Step 902 The drone receives the third signaling and determines the M types of identity information that the drone can send among the Q types of identity information indicated by the third information.
  • the transmission here may be broadcast, that is, the first information is used to indicate M types of identity information that the drone can broadcast.
  • the drone receives the third signaling, determines the Q types of identity information based on the third information in the third signaling, and determines the M types of identity information that the drone can send among the Q types of identity information.
  • third information there are three types of third information.
  • the process of determining the Q types of identity information based on the third information is introduced.
  • the third information includes the information identifier of each of the Q types of identity information. Based on the Q information identifiers included in the third information, the drone determines Q types of identity information corresponding to the Q information identifiers.
  • the third information includes third identification information. Based on the third identification information included in the third information, the drone obtains the corresponding third identity information set from the corresponding relationship between the identity information set and the identification information, and the third identity information set includes the Q kinds of identity information.
  • the third information includes a plurality of bits.
  • the value of the bit corresponding to each of the Q types of identity information is the first value.
  • the drone identifies Q bits whose values are the first values in the third information, and determines the Q types of identity information corresponding to the Q bits.
  • steps 901 and 902 are optional steps, that is, step 901 and step 902 may not be performed, and the following step 903 may be performed.
  • Step 903 The drone sends the first signaling to the base station.
  • the first signaling includes the first IE, the first IE includes the first information, and the first information is used to indicate the M types of identity information.
  • the first information may be the following types of information, which are type 1, type 2 and type 3 respectively.
  • the first information includes the information identifier of each of the M types of identity information.
  • Type 2 the first information includes first identification information, and the first identification information is used to identify the M types of identity information.
  • step 903 when the UAV determines M kinds of identity information, it composes the M kinds of identity information into a first identity information set, and obtains it from the correspondence relationship between the identity information set and the identification information based on the first identity information set.
  • the corresponding identification information is used as the first identification information.
  • the first information includes a plurality of bits.
  • each type of identity information in the M types of identity information corresponds to a different bit, and the value of the bit corresponding to each type of identity information is the first value.
  • the drone determines M bits corresponding to the M types of identity information in the first map. Each bit in the first map corresponds to a different identity. Information, the number of bits included in the first bit of the image is greater than or equal to M. The values of the M bits are all set to the first value, and the values of every other bit in the first image except the M bits are set to the second value, to obtain the first information.
  • the first information may also include other types of information, which will not be listed one by one here.
  • Step 904 The base station receives the first signaling sent by the drone, and determines the M types of identity information based on the first information in the first signaling.
  • the first information may be the following types of information.
  • the detailed process of determining the M types of identity information in the case of each type of first information will be described below.
  • the first information includes the information identifier of each of the M types of identity information.
  • the base station determines the M types of identity information based on the information identifiers of the M types of identity information included in the first information.
  • the first information includes first identification information. Based on the first identification information included in the first information, the base station obtains the first identity information set corresponding to the first identification information from the correspondence relationship between the identity information set and the identification information, and the first identity information set includes the M types of identity information.
  • the first information includes a plurality of bits, and the value of the bit corresponding to each of the M types of identity information in the first information is the first value.
  • the base station identifies M bits whose values are the first values from the first information, and determines M types of identity information corresponding to the M bits.
  • Step 905 The base station sends second signaling to the drone based on the M types of identity information.
  • the second signaling includes the second IE, and the second IE includes the second information.
  • the second information is used to configure the drone.
  • the second information is used to configure the drone.
  • several examples in which the second information is used to configure the drone are listed below.
  • Example 1 the second information is used to configure N types of identity information that the drone needs to send, and the M types of identity information include the N types of identity information.
  • the second information may be the following types of information:
  • the second information includes the information identifier of each of the N types of identity information.
  • the second information includes second identification information, and the second identification information is used to identify the N types of identity information.
  • the second information includes a plurality of bits, and the value of the bit corresponding to each of the N types of identity information in the second information is the first value.
  • the M kinds of identity information include first identity information
  • the second information is used to configure the sending method of the drone to send the first identity information
  • the second information is used to configure the drone to send the first identity information. conditions of delivery.
  • Example 3 the second information is used to configure the take-off conditions under which the drone can take off.
  • the take-off conditions include one or more of the following: the drone can take off if it has the ability to send specified identity information, or the drone can take off if it is located in a specified environment, etc.
  • Step 906 The UAV receives the second signaling, and configures the UAV based on the second information included in the second signaling.
  • the second information is used to configure the drone.
  • the second information is used to configure the drone.
  • the examples are Example 1, Example 2 and Example 3 respectively.
  • Example 1 the second information is used to configure N types of identity information that the drone needs to send. Based on the second information, the drone determines the N types of identity information that need to be sent.
  • the second information may be the following types of information:
  • the second information includes the information identifier of each of the N types of identity information.
  • the drone determines the N types of identity information based on the information identifiers of the N types of identity information included in the second information.
  • the second information includes second identification information, and the second identification information is used to identify the N types of identity information. Based on the second identification information, the drone obtains the corresponding second identity information set from the corresponding relationship between the identity information set and the identification information.
  • the second identity information set includes the N types of identity information.
  • the second information includes a plurality of bits, and the value of the bit corresponding to each of the N types of identity information in the second information is the first value.
  • the drone identifies N bits whose value is the first value in the second information, and determines the N types of identity information corresponding to the N bits.
  • the M kinds of identity information include first identity information
  • the second information is used to configure the sending method of the drone to send the first identity information
  • the second information is used to configure the drone to send the first identity information.
  • conditions of delivery The drone determines the sending method for the drone to send the first identity information based on the second information, and/or the sending conditions for the drone to send the first identity information.
  • Example 3 the second information is used to configure the take-off conditions under which the drone can take off.
  • the UAV determines the take-off conditions under which the UAV can take off based on the second information.
  • the drone may also perform the following step 907.
  • Step 907 The drone sends the information content of at least one identity information to the base station, and the N kinds of identity information include the at least one identity information.
  • step 907 the drone obtains the information content of the at least one identity information, and sends the information content of the at least one identity information to the base station based on the sending method of the at least one identity information; or, when the at least one identity information is satisfied, When the sending conditions of the identity information are met, the information content of the at least one identity information is sent to the base station.
  • Step 908 The base station receives the information content of the at least one identity information.
  • the base station may also send the information content of the at least one identity information to the control device.
  • the control device receives the information content of the at least one identity information, and controls and/or manages the drone based on the information content of the at least one identity information.
  • steps 907 and 908 are optional steps, that is, steps 907 and 908 may not be executed.
  • the drone sends first information to the base station, and the first information indicates M types of identity information in the drone.
  • the base station receives the first information, obtains the second information based on the first information, and sends the second information to the drone.
  • the second information is used to configure the N types of identity information that the drone needs to send, thus solving which identities the drone needs to report.
  • the second information is used to configure the sending method and/or sending conditions of the identity information, thus solving the problem that the drone can send the identity information according to the requirements of the base station.
  • the second information is used to configure the take-off conditions for the UAV to take off, thus solving the problem that the UAV can take off according to the requirements of the base station.
  • the base station and the drone use a cellular communication network to communicate, the drone can be configured remotely, and the drone can remotely report identity information, thereby improving the efficiency and flexibility of configuring the drone, and improving the efficiency of the drone. Efficiency and flexibility in reporting identity information.
  • Figure 10 shows a block diagram of a device 1000 for configuring a drone provided by an exemplary embodiment of the present disclosure.
  • the device 1000 is deployed on the drone.
  • the device 1000 can be implemented as an unmanned aerial vehicle through software, hardware, or a combination of both. Part or all of the machine, the device 1000 includes:
  • the sending module 1001 is configured to send first information to the base station, where the first information is used to indicate M types of identity information that the drone can send, where M is an integer greater than 0;
  • the receiving module 1002 is configured to receive second information sent by the base station based on the first information, where the second information is used to configure the drone.
  • the second information is used to configure N types of identity information that the drone needs to send, where N is an integer greater than 0, and the M types of identity information include the N types of identity information.
  • the M kinds of identity information include first identity information
  • the second information is used to configure the sending method of the drone to send the first identity information, and/or,
  • the second information is used to configure the sending conditions for the drone to send the first identity information.
  • the second information is used to configure takeoff conditions under which the UAV can take off.
  • the takeoff conditions include at least one of the following:
  • the drone can take off if it has the ability to send designated identity information; or,
  • the drone can take off when located in a designated environment.
  • the sending module 1001 is configured to send first signaling to the base station, where the first signaling includes a first information unit IE, and the first IE includes the first information.
  • the first signaling includes first radio resource control RRC signaling
  • the first IE includes at least one of the following:
  • the receiving module 1002 is configured to receive second signaling sent by the base station, the second signaling includes a second IE, and the second IE includes the second information.
  • the second signaling includes second RRC signaling
  • the second IE includes other configuration OtherConfig.
  • the receiving module 1002 is also configured to receive the third information sent by the base station.
  • the third information is used to inquire whether the drone has Q types of identity information.
  • the Q types The identity information includes the M kinds of identity information, and Q is an integer greater than 0.
  • the receiving module 1002 is configured to receive the third signaling sent by the base station, the third signaling includes a third IE, and the third IE includes the third information.
  • the third signaling includes third RRC signaling
  • the third IE includes user equipment capability query UECapabilityEnquiry.
  • the sending module 1001 is further configured to send the information content of at least one of the N types of identity information to the base station.
  • the second information is used to configure the sending method of the drone to send the first identity information
  • the sending module 1001 is also configured to be based on the sending method of the first identity information. , sending the information content of the first identity information to the base station; or,
  • the second information is used to configure the sending conditions for the drone to send the first identity information
  • the sending conditions include at least one scenario in which the first identity information can be sent
  • the The sending module 1001 is further configured to send the information content of the first identity information to the base station when the at least one scene includes the scene in which the drone is currently located.
  • the device 1000 further includes a processing module 1003,
  • the processing module 1003 is configured to control the drone to take off when the M types of identity information include the specified identity information after the receiving module 1002 receives the take-off command; or,
  • the processing module 1003 is configured to control the drone to take off when the environment in which the drone is currently located is the designated environment after the receiving module 1002 receives the take-off command.
  • the M types of identity information include at least one of the following:
  • the location information of the drone is the location information of the drone.
  • the altitude information of the drone is the altitude information of the drone
  • control device is a device used to control the drone.
  • the sending module sends the first information to the base station, and the first information indicates M types of identity information in the drone.
  • the receiving module receives the second information sent by the base station, and the second information is used to configure N types of identity information that the drone needs to send. Since a cellular communication network is used for communication between the base station and the device, the drone can be configured remotely, thereby improving the efficiency and flexibility of configuring the drone.
  • Figure 11 shows a block diagram of a device 1100 for configuring a drone provided by an exemplary embodiment of the present disclosure.
  • the device 1100 can be implemented as part or all of a base station through software, hardware, or a combination of the two.
  • the device 1100 includes:
  • the receiving module 1101 is configured to receive the first information sent by the drone, where the first information is used to indicate M types of identity information that the drone can send, where M is an integer greater than 0;
  • the sending module 1102 is configured to send second information to the UAV based on the first information, where the second information is used to configure the UAV.
  • the second information is used to configure N types of identity information that the drone needs to send, where N is an integer greater than 0, and the M types of identity information include the N types of identity information.
  • the M kinds of identity information include first identity information
  • the second information is used to configure the sending method of the drone to send the first identity information, and/or,
  • the second information is used to configure the sending conditions for the drone to send the first identity information.
  • the second information is used to configure takeoff conditions under which the UAV can take off.
  • the takeoff conditions include at least one of the following:
  • the drone is able to take off if it has the ability to send designated identity information;
  • the drone can take off when located in a designated environment.
  • the receiving module 1101 is configured to receive the first signaling sent by the drone, the first signaling includes a first information unit IE, and the first IE includes the first information unit IE. a message.
  • the first signaling includes first radio resource control RRC signaling
  • the first IE includes at least one of the following:
  • the sending module 1102 is configured to send second signaling to the drone, the second signaling includes a second IE, and the second IE includes the second information.
  • the second signaling includes second RRC signaling
  • the second IE includes other configuration OtherConfig.
  • the sending module 1102 is also configured to send third information to the drone, where the third information is used to inquire whether the drone has Q types of identity information, and the Q
  • the types of identity information include the M types of identity information, and Q is an integer greater than 0.
  • the sending module 1102 is configured to send third signaling to the base station, where the third signaling includes a third IE, and the third IE includes the third information.
  • the third signaling includes third RRC signaling
  • the third IE includes user equipment capability query UECapabilityEnquiry.
  • the receiving module 1101 is configured to receive the information content of at least one of the N types of identity information sent by the drone.
  • the M types of identity information include at least one of the following:
  • the location information of the drone is the location information of the drone.
  • the altitude information of the drone is the altitude information of the drone
  • control device is a device used to control the drone.
  • the receiving module receives the first information sent by the drone, and the first information indicates M types of identity information in the drone.
  • the sending module sends second information to the drone based on the first information, and the second information is used to configure N types of identity information that the drone needs to send. Since the cellular communication network is used for communication between the device and the drone, the drone can be configured remotely, thereby improving the efficiency and flexibility of configuring the drone.
  • FIG 12 shows a schematic structural diagram of a drone 1200 provided by an exemplary embodiment of the present disclosure.
  • the drone 1200 includes: a processor 1201, a receiver 1202, a transmitter 1203, a memory 1204 and a bus 1205.
  • the processor 1201 includes one or more processing cores.
  • the processor 1201 executes various functional applications and information processing by running software programs and modules.
  • the receiver 1202 and the transmitter 1203 can be implemented as a communication component, and the communication component can be a communication chip.
  • Memory 1204 is connected to processor 1201 through bus 1205.
  • the memory 1204 can be used to store at least one instruction, and the processor 1201 is used to execute the at least one instruction to implement each step in the above method embodiment.
  • memory 1204 may be implemented by any type of volatile or non-volatile storage device, or combination thereof, including but not limited to: magnetic or optical disks, electrically erasable programmable Read-only memory (EEPROM, Electrically Erasable Programmable Read Only Memory), Erasable Programmable Read-Only Memory (EPROM, Erasable Programmable Read Only Memory), Static Random-Access Memory (SRAM, Static Random-Access Memory), Read-Only Memory (ROM, Read Only Memory), magnetic memory, flash memory, programmable read-only memory (PROM, Programmable Read Only Memory).
  • EEPROM Electrically Erasable Programmable Read Only Memory
  • EPROM Erasable Programmable Read Only Memory
  • SRAM Static Random-Access Memory
  • ROM Read-Only Memory
  • magnetic memory flash memory
  • PROM programmable read-only memory
  • a non-transitory computer-readable storage medium including instructions such as a memory including instructions, is also provided, and the instructions can be executed by a processor of the UE to complete the above method of configuring a drone.
  • the non-transitory computer-readable storage medium may be ROM, random access memory (RAM, Random-Access Memory), compact disc read-only memory (CD-ROM, Compact Disc-Read Only Memory), magnetic tape, Floppy disks and optical data storage devices, etc.
  • a non-transitory computer-readable storage medium when the instructions in the non-transitory computer storage medium are executed by the processor of the drone 1200, enable the drone 1200 to perform the above method of configuring the drone.
  • FIG. 13 is a block diagram of a base station 1300 according to an exemplary embodiment.
  • the base station 1300 may include: a processor 1301, a receiver 1302, a transmitter 1303, and a memory 1304.
  • the receiver 1302, the transmitter 1303 and the memory 1304 are respectively connected to the processor 1301 through a bus.
  • the processor 1301 includes one or more processing cores, and the processor 1301 executes the method for configuring a drone provided by embodiments of the present disclosure by running software programs and modules.
  • Memory 1304 may be used to store software programs and modules. Specifically, the memory 1304 can store the operating system 13041 and at least one application module 13042 required for the function.
  • the receiver 1302 is used to receive communication data sent by other devices, and the transmitter 1303 is used to send communication data to other devices.
  • An exemplary embodiment of the present disclosure also provides a computer-readable storage medium.
  • the computer-readable storage medium stores at least one instruction, at least a program, a code set or an instruction set.
  • the at least one instruction, the At least a program, the code set or the instruction set is loaded and executed by the processor to implement the method for configuring a drone provided by each of the above method embodiments.
  • An exemplary embodiment of the present disclosure also provides a computer program product, the computer program product includes computer instructions, the computer instructions are stored in a computer-readable storage medium; the processor of the computer device reads from the computer-readable storage medium The computer instructions are read from the medium, and the processor executes the computer instructions, so that the computer device executes the method for configuring a drone provided by each of the above method embodiments.
  • first, second, etc. are used to describe various information, but such information should not be limited to these terms. These terms are only used to distinguish information of the same type from each other and do not imply a specific order or importance. In fact, expressions such as “first” and “second” can be used interchangeably.
  • first message frame may also be called a second message frame, and similarly, the second message frame may also be called a first message frame.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本公开公开了一种配置无人机的方法、装置、系统及存储介质,属于通信领域。该方法包括:向基站发送第一信息,第一信息用于指示无人机能够发送的M种身份信息,M为大于0的整数;接收基站基于第一信息发送的第二信息,第二信息用于配置无人机。该方法能够提高配置无人机的效率和灵活性。

Description

配置无人机的方法、装置、系统及存储介质 技术领域
本申请涉及通信领域,特别涉及一种配置无人机的方法、装置、系统及存储介质。
背景技术
无人机是利用无线电遥控设备和自备的程序控制装置操纵的不载人飞行器。随着无人机技术的快速发展,无人机的成本降低和功能的完善,无人机可以被不同的行业,不同的领域和不同的人群所使用。
无人机的使用往往受到控制和管理,例如,在禁飞区域内可能禁止无人机的使用,在人口密集的城市区域内可能允许小型无人机使用,并禁止大型无人机使用。对无人机的控制和管理之前需要对无人机进行配置。例如配置无人机上报用于控制或管理所需的信息。
当前用户可以使用点对点通信方式对无人机进行配置,但是点对点通信方式的通信距离短,只能近距离的对无人机进行配置,这种配置方式的效率和灵活性低下。
发明内容
本公开实施例提供了一种配置无人机的方法、装置、系统及存储介质。所述技术方案如下:
根据本公开实施例的一个方面,提供了一种配置无人机的方法,所述方法由无人机执行,所述方法包括:
向基站发送第一信息,所述第一信息用于指示所述无人机能够发送的M种身份信息,M为大于0的整数;
接收所述基站基于所述第一信息发送的第二信息,所述第二信息用于配置所述无人机。
根据本公开实施例的另一方面,提供了一种配置无人机的方法,所述方法由基站执行,所述方法包括:
接收无人机发送的第一信息,所述第一信息用于指示所述无人机能够发送的M种身份信息,M为大于0的整数;
基于所述第一信息向所述无人机发送第二信息,所述第二信息用于配置所述无人机。
根据本公开实施例的另一方面,提供了一种配置无人机的装置,所述装置部署在无人机上,包括:
发送模块,被配置为向基站发送第一信息,所述第一信息用于指示所述无人机能够发送的M种身份信息,M为大于0的整数;
接收模块,被配置为接收所述基站基于所述第一信息发送的第二信息,所述第二信息用于配置所述无人机。
根据本公开实施例的另一方面,提供了一种配置无人机的装置,所述装置包括:
接收模块,被配置为接收无人机发送的第一信息,所述第一信息用于指示所述无人机能够发送的M种身份信息,M为大于0的整数;
发送模块,被配置为基于所述第一信息向所述无人机发送第二信息,所述第二信息用于配置所述无人机。
根据本公开实施例的另一方面,提供了一种无人机,所述无人机包括:
处理器;
与所述处理器相连的收发器;
其中,所述处理器被配置执行可执行指令以实现如上各个方面所述的配置无人机的方法。
根据本公开实施例的另一方面,提供了一种基站,所述基站包括:
处理器;
与所述处理器相连的收发器;
其中,所述处理器被配置执行可执行指令以实现如上各个方面所述的配置无人机的方法。
根据本公开实施例的另一方面,提供了一种计算机存储介质,所述计算机可读存储介质中存储有至少一条指令、至少一段程序、代码集或指令集,所述至少一条指令、所述至少一段程序、所述代码集或指令集由处理器加载并执行以实现如上述各个方面所述的配置无人机的方法。
根据本公开实施例的另一方面,提供了一种计算机程序产品(或者计算机程序),所述计算机程序产品(或者计算机程序)包括计算机指令,所述计算机 指令存储在计算机可读存储介质中;计算机设备的处理器从所述计算机可读存储介质中读取所述计算机指令,所述处理器执行所述计算机指令,使得所述计算机设备执行如上各个方面所述的配置无人机的方法。
根据本公开实施例的另一方面,提供了一种芯片,所述芯片包括可编辑逻辑电路和/或程序指令,当所述芯片运行时,用于实现如上各个方面所述的配置无人机的方法。
本公开实施例提供的技术方案可以包括以下有益效果:
在上述配置无人机的方法中,无人机一侧向基站发送第一信息,第一信息指示无人机中的M种身份信息,在基站一侧基于第一信息向无人机发送第二信息,第二信息用于配置无人机,这样实现由基站配置无人机。由于无人机和基站均接入蜂窝通信网络,基站能够远程配置无人机,对无人机的配置不受距离的限制,提高配置无人机的效率和灵活性。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开。
附图说明
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是根据一示例性实施例示出的通信系统的示意图;
图2是根据另一示例性实施例示出的通信系统的示意图;
图3是根据一示例性实施例示出的配置无人机的方法的流程图;
图4是根据一示例性实施例示出的第一信息示意图;
图5是根据一示例性实施例示出的第二信息示意图;
图6是根据另一示例性实施例示出的配置无人机的方法的流程图;
图7是根据另一示例性实施例示出的配置无人机的方法的流程图;
图8是根据另一示例性实施例示出的配置无人机的方法的流程图;
图9是根据另一示例性实施例示出的配置无人机的方法的流程图;
图10是根据一示例性实施例示出的配置无人机的装置的框图;
图11是根据另一示例性实施例示出的配置无人机的装置的框图;
图12是根据一示例性实施例示出的无人机的结构示意图;
图13是根据一示例性实施例示出的基站的结构示意图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本公开相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本公开的一些方面相一致的装置和方法的例子。
无人机是一种可以利用无线电遥控设备进行操纵的不载人飞行器,无人机是无人驾驶飞机(unmanned aerial vehicle,UAV)的简称。从技术角度无人机可以分为无人固定翼机、无人垂直起降机、无人飞艇、无人直升机、无人多旋翼飞行器和无人伞翼机等几种类型。从无人机的大小角度无人机可以分为微型无人机、轻型无人机、小型无人机、中型无人机和大型无人机等几种类型。
随着无人机技术的快速发展,无人机的成本降低以及无人机的功能越来越完善,无人机应用的领域越来越广。而无人机+行业应用是无机应用的主流。目前无人机在航拍、农业、植保、微型自拍、快递运输、新闻报道、电力巡检和影视拍摄等领域得到广泛使用。
无人机的使用往往受到控制和/或管理,例如对于不同类型的无人机和/或不同应用领域的无人机,可能对无人机的飞行高度、允许无人机飞行的区域、允许无人机飞行的时间段和/或允许无人机飞行的天气条件等因素进行不同地管理和/或控制。为了能够高效地对无人机进行控制和/或管理,无人机可以接入蜂窝通信网络,由于蜂窝通信网络的覆盖范围广,这样可以利用蜂窝通信网络高效且灵活地对无人机进行控制和/或管理。
图1示出了本公开一个示例性实施例提供的通信系统100的框图,该通信系统100包括无人机101和基站102,无人机101和基站102可以通信。
无人机101和基站102均接入该蜂窝通信网络。可选地,无人机101和基站102在蜂窝通信网络中建立通信连接,以实现无人机101和基站102通信,当然还可能有其他实现无人机101和基站102通信的方式,在此不再一一列举。
可选地,无人机101和基站102之间建立的通信连接包括无线连接等。
可选地,无人机101为具有蜂窝通信功能的无人机,该无人机101在开机 启动后,能够从覆盖该无人机101的至少一个基站102中选择一个基站102,接入选择的基站102。该至少一个基站102为蜂窝通信网络中的基站,如此该无人机101实现接入蜂窝通信网络。
其中,无人机101和基站102所在的蜂窝通信网络可以为第五代移动通信技术(The Fifth Generation Mobile Communication Technology,5G)网络,也可以为长期演进(Long Term Evolution,LTE)网络,或者,其他的与LTE网络或5G网络类似的蜂窝通信网络。
由于蜂窝通信网络覆盖范围广,通过蜂窝通信网络对无人机101进行配制不受距离的限制,随时随地的配置无人机101,从而提高配置无人机101的灵活性和效率。
而对于使用点对点通信方式来配置无人机101的方案,点对点通信方式的通信距离往往较短,例如常见的点对点通信方式为wifi通信,wifi通信的距离往往只有几十米或百米。所以只能近距离靠近无人机101后,才能配置无人机101,配置无人机101的效率和灵活性远不如本公开实施例提供的通过蜂窝通信网络对无人机101进行配置的方案。
可选地,对于无人机101接入基站102,基站102能够对无人机101进行配置,以配置无人机101发送用于对无人机101进行控制和/或管理等操作所需的信息。
例如,无人机101能够获取到M种身份信息,M为大于0的整数,向基站102发送用于指示该M种身份信息的第一信息。基站102基于第一信息确定该M种身份信息,从该M种身份信息中配置无人机101需要发送的哪些身份信息。对于需要发送的身份信息,基站102配置无人机101发送该身份信息的发送方式和/或发送该身份信息的发送条件等内容,和/或,基站102能够配置无人机101能够起飞的起飞条件。
可选地,参见图2,该通信系统100还包括控制设备103,控制设备103与基站102通信。控制设备103能够通过基站102与无人机101通信,以实现控制和/或管理无人机101。
可选地,控制设备103可能为无人机101对应的控制台,具有控制和/或管理无人机101的功能的手柄设备,或者,具有控制和/或管理无人机101的功能的终端设备等。
可选地,上述M种身份信息包括如下一个或多个:无人机101的设备标识、无人机101的位置信息、无人机101的海拔信息、无人机101的运动速度、无 人机101的时间标记、无人机101发生的紧急状态、控制设备103的位置信息或控制设备103的海拔信息等。
接下来,将通过如下任一实施例来描述对无人机101的配置过程,详见如下描述的任一实施例。
图3示出了本公开一个示例性实施例提供的配置无人机的方法300的流程图,该方法300应用于图1或图2所示的通信系统100中,由无人机执行,该方法300包括:
步骤301:向基站发送第一信息,第一信息用于指示无人机能够发送的M种身份信息,M为大于0的整数。
可选地,此处的发送可能是广播,即第一信息用于指示无人机能够广播的M种身份信息。
可选地,无人机可能在如下几种情况下向基站发送第一信息,以通过第一信息向基站告知无人机中的M种身份信息,该M种身份信息均是无人机能够获取到的身份信息。该几种情况包括如下情况:在无人机接入基站后,无人机向基站发送第一信息;可选地,无人机在移动的过程中在离开无人机已接入的基站的覆盖范围并选择接入一个新的基站时,向该新的基站发送第一信息。或者,无人机周期性地向基站发送第一信息。或者,无人机在基站的触发下向基站发送第一信息。例如基站向无人机发送请求,以询问该无人机是否具有某种/某些特定的身份信息,相应于接收到基站发送的请求,无人机可以将能够发送给基站的身份信息告知基站。当然,还可能有其他使无人机向基站发送第一信息的情况,在此不再一一列举说明。
在步骤301中,无人机确定无人机能够获取到且能发送的M种身份信息,获取用于指示该M种身份信息的第一信息,向基站发送第一信息。
可选地,无人机向基站发送第一信令,第一信令包括第一信息单元(Information Element,IE),第一IE包括第一信息。
示例性地,第一信令为第一无线资源控制(Radio Resource Control,RRC)信令,第一IE包括如下一个或多个:
第一RRC信令中的用户设备演进的通用地面无线电接入网能力(User Equipment–Evolved Universal Terrestrial Radio Access Network,UE-EUTRA-Capability);
第一RRC信令中的用户设备多制式双向连接能力(User Equipment-Multi-RAT Dual Connectivity-Capability,UE-MRDC-Capability);或者,
第一RRC信令中的用户设备新空口能力(User Equipment–New Radio-Capability,UE-NR-Capability)等。
也就是说:无人机向基站发送第一RRC信令,第一RRC信令的UE-EUTRA-Capability、UE-MRDC-Capability和/或UE-NR-Capability包括第一信息。
可选地,第一信息可能是如下几种类型的信息,该几种类型分别为如下类型1、类型2和类型3。
类型1,第一信息包括该M种身份信息中的每种身份信息的信息标识。
对于该M种身份信息中的任一种身份信息,该身份信息的信息标识包括如下一个或多个:该身份信息的类别、该身份信息的名称或者该身份信息的编号等。
类型2,第一信息包括第一标识信息,第一标识信息用于标识该M种身份信息。
可选地,无人机中保存有身份信息集合与标识信息的对应关系,对于该对应关系中任一条记录,该条记录包括一个身份信息集合和与身份信息集合相对应的标识信息,该身份信息集合包括至少一种身份信息。
在步骤301中,无人机在确定出M种身份信息时,将该M种身份信息组成第一身份信息集合,基于第一身份信息集合,从该身份信息集合与标识信息的对应关系中获取对应的标识信息作为第一标识信息。
可选地,基站中也可能保存有身份信息集合与标识信息的对应关系,在基站保存的身份信息集合与标识信息的对应关系中存在包括第一身份信息集合和第一标识信息的记录。
示例性的,无人机与基站事先约定身份信息集合与标识信息的对应关系,并分别保存约定的身份信息集合与标识信息的对应关系。或者,第三方设备分别在无人机和基站上配置该身份信息集合与标识信息的对应关系,可选地,第三方设备包括无人机对应的控制设备等。或者,无人机与基站均使用的标准定义了身份信息集合与标识信息的对应关系,无人机和基站均基于该标准均获取并保存该身份信息集合与标识信息的对应关系。
例如,参见下表1所示的身份信息集合与标识信息的对应关系,无人机和基站中均保存有如表1所示的身份信息集合与标识信息的对应关系。以及,假 设无人机确定出8种身份信息,将该8种身份信息组成第一身份信息集合。第一身份信息集合包括无人机的设备标识、无人机的位置信息、无人机的海拔信息、无人机的运动速度、无人机的时间标记、无人机发生的紧急状态、控制设备的位置信息和控制设备的海拔信息。
无人机基于第一身份信息集合,从如表1所示的身份信息集合与标识信息的对应关系中获取对应的标识信息“1”作为第一标识信息。无人机向基站发送第一信令,第一信令的第一IE包括第一标识信息“1”。
表1
Figure PCTCN2022089087-appb-000001
类型3,第一信息包括多个比特,在第一信息中该M种身份信息中的每种身份信息对应不同的比特,该每种身份信息对应的比特的取值为第一取值。
在步骤301中,无人机获取第一位图,第一位图包括的比特个数大于或等于M,第一位图中的每个比特对应一种身份信息,且每个比特对应的身份信息不同。无人机在确定出M种身份信息后,在第一位图中确定与该M种身份信息相对应的M个比特,将该M个比特的取值均设置为第一取值,将第一位图中除该M个比特之外的其他每个比特的取值均设置为第二取值,得到第一信息。
可选地,第一取值为数值1,第二取值为数值0;或者,第一取值为数值0,第二取值为数值1。
例如,参见图4,假设无人机获取如图4所示的第一位图,第一位图包括八个比特。第一个比特对应的身份信息为无人机的设备标识,第二个比特对应的身份信息为无人机的位置信息,第三个比特对应的身份信息为无人机的海拔信息,第四个比特对应的身份信息为无人机的运动速度,第五个比特对应的身份信息为无人机的时间标记,第六个比特对应的身份信息为无人机发生的紧急状 态,第七个比特对应的身份信息为控制设备的位置信息,第八个比特对应的身份信息为控制设备的海拔信息。
假设无人机确定出六种身份信息,该六种身份信息分别为无人机的设备标识、无人机的位置信息、无人机的海拔信息、无人机的运动速度、无人机的时间标记、无人机发生的紧急状态。在如图4所示的第一位图中确定与该六种身份信息相对应的六个比特,该六个比特分别为第一位图的第一个比特、第二个比特、第三个比特、第四个比特、第五个比特和第六个比特。将第一个比特、第二个比特、第三个比特、第四个比特、第五个比特和第六个比特的取值均设置为第一取值“1”,将第一位图中的第七个比特和第八个比特的取值均设置为第二取值“0”,得到如图4所示的第一信息。无人机向基站发送第一信令,第一信令的第一IE包括如图4所示的第一信息。
第一信息除了上述列举的类型1、类型2和类型3三种外,还可能有其他类型的信息,在此不再一一列举。
步骤302:接收基站基于第一信息发送的第二信息。
可选地,第二信息用于配置无人机。示例性的,接下来列举了第二信息用于配置无人机的几个示例,该几个示例分别为如下示例1、示例2和示例3。
示例1,第二信息用于配置无人机需要发送的N种身份信息,N为大于0的整数且N小于或等于M,该M种身份信息包括该N种身份信息。
可选地,无人机基于第二信息,确定需要发送的该N种身份信息。
可选地,在示例1的情况,第二信息可能是如下几种类型的信息:
类型a,第二信息包括该N种身份信息中的每种身份信息的信息标识。
可选地,无人机基于第二信息包括的N种身份信息的信息标识,确定该N种身份信息。
类型b,第二信息包括第二标识信息,第二标识信息用于标识该N种身份信息。
可选地,无人机基于第二标识信息,从身份信息集合与标识信息的对应关系中获取对应的第二身份信息集合,第二身份信息集合包括该N种身份信息。
例如,假设第二标识信息为“2”,无人机基于第二标识信息“2”,从上述表1所示的身份信息集合与标识信息的对应关系中获取对应的第二身份信息集合,第二身份信息集合包括五种身份信息,该五种身份信息分别为无人机的设备标识、无人机的位置信息、无人机的海拔信息、无人机的运动速度和无人机的时 间标记。
类型c,第二信息包括多个比特,在第二信息中该N种身份信息中的每种身份信息对应不同比特,该每种身份信息对应的比特的取值为第一取值。
可选地,无人机在第二信息中识别出取值为第一取值的N个比特,确定该N个比特对应的N种身份信息。
例如,参见图5,第二信息包括八个比特,在第二信息中第一个比特对应的身份信息为无人机的设备标识,第二个比特对应的身份信息为无人机的位置信息,第三个比特对应的身份信息为无人机的海拔信息,第四个比特对应的身份信息为无人机的运动速度,第五个比特对应的身份信息为无人机的时间标记,第六个比特对应的身份信息为无人机发生的紧急状态,第七个比特对应的身份信息为控制设备的位置信息,第八个比特对应的身份信息为控制设备的海拔信息。
参见图5,假设,第二信息中的第一个比特、第二个比特、第三个比特、第四个比特和第五个比特的取值均为第一取值“1”,第六个比特、第七个比特和第八个比特的取值均为第二取值“0”。无人机接收如图5所示的第二信息后,从第二信息中识别取值为第一取值“1”的第一个比特、第二个比特、第三个比特、第四个比特和第五个比特,基于该五个比特确定该五个比特对应的五种身份信息,该五种身份信息分别为无人机的设备标识,无人机的位置信息,无人机的海拔信息,无人机的运动速度,无人机的时间标记。
可选地,参见图6,在确定该N种身份信息后,无人机还可能执行如下303的操作:获取至少一种身份信息的信息内容,该N种身份信息包括该至少一种身份信息,向基站发送该至少一种身份信息的信息内容。
可选地,无人机采用广播方式向基站发送该至少一种身份信息的信息内容。
例如,假设该N种身份信息包括无人机的海拔信息,无人机在当前获取的海拔信息为“100米”,向基站发送该海拔信息的信息内容为“100米”。再例如,假设该N种身份信息包括无人机的运动速度,无人机在当前获取的运动速度为“50m/s”,向基站发送该运动速度的信息内容为“50m/s”。
示例2,该M种身份信息包括第一身份信息,第二信息用于配置无人机发送第一身份信息的发送方式,和/或,第二信息用于配置无人机发送第一身份信息的发送条件。
可选地,第一身份信息的发送方式包括第一身份信息的广播方式。这样无人机在获取到第一身份信息的信息内容时,基于第一身份信息的广播方式,向 基站广播第一身份信息的信息内容。
可选地,该广播方式可能为周期性广播或实时广播等。例如,第一身份信息为无人机的设备标识时,第一身份信息的发送方式可能为周期性广播无人机的设备标识。再例如,第一身份信息为无人机的位置信息,第一身份信息的发送方式可能为实时广播无人机的位置信息。这样无人机在获取到第一身份信息的信息内容时,基于第一身份信息的发送方式向基站发送第一身份信息的信息内容。
可选地,对于第一身份信息的发送条件,无人机在获取到第一身份信息的信息内容时,在满足该发送条件时,向基站广播第一身份信息的信息内容。
例如,假设第一身份信息为无人机的运动速度,第一身份信息的发送条件为在运动速度超过指定阈值时发送。这样无人机在获取到其自身的运动速度时,如果该运动速度超过指定阈值,向基站广播无人机的运动速度。
可选地,第一身份信息的发送条件包括能够发送第一身份信息的至少一个场景。即该发送条件指示无人机在哪些场景下可以发送第一身份信息。这样无人机在获取到第一身份信息的信息内容时,获取无人机当前处于的场景,在该场景是该发送条件指示的无人机能够发送第一身份信息的场景,无人机向基站发送所述第一身份信息的信息内容。
可选地,可能同时实现上述示例1和示例2,即该N种身份信息包括第一身份信息,第二信息即用于配置无人机需要发送的N种身份信息,又配置第一身份信息的发送方式和/或发送条件。或者,也可能单独实现上述示例1或示例2。
示例3,第二信息用于配置无人机能够起飞的起飞条件。
可选地,该起飞条件包括如下一个或多个,无人机在具有发送指定身份信息的能力的情况下能够起飞,或者,无人机在位于指定环境的情况下能够起飞等。
该M种身份信息可能包括该指定身份信息,也可能不包括该指定身份信息。在该M种身份信息包括该指定身份信息,表示无人机具有发送该指定身份信息的能力,无人机在接收到控制设备发送的起飞命令时,开始起飞。在该M种身份信息不包括该指定身份信息,表示无人机不具有发送该指定身份信息的能力,无人机在接收到控制设备发送的起飞命令时,拒绝起飞。
可选地,可能同时实现上述示例1、示例2和示例3,即该N种身份信息包括第一身份信息,第二信息即用于配置无人机需要发送的N种身份信息,又配 置第一身份信息的发送方式和/或发送条件,还配置无人机的起飞条件。或者,同时实现上述示例1和示例3,也就是第二信息即用于配置无人机需要发送的N种身份信息,又配置无人机的起飞条件。或者,同时实现上述示例2和示例3,也就是第二信息即用于配置第一身份信息的发送方式和/或发送条件,又配置无人机的起飞条件。或者,也可能单独实现上述示例1、示例2或示例3。
可选地,在步骤302中,无人机接收基站发送的第二信令,第二信令包括第二IE,第二IE包括第二信息。
可选地,第二信令包括第二RRC信令,第二IE包括第二RRC信令中的其他配置(OtherConfig)。也就是说:无人机接收基站发送的第二RRC信令,第二RRC信令中的OtherConfig包括第二信息。
可选地,第二信令包括无线资源控制重配置(RRCReconfiguration)信令或无线资源控制连接重配置(RRCConnectionReconfiguration)信令等。
可选的,无人机可能在基站的触发下执行本公开实施例的流程,即在步骤301中,无人机在基站的触发向基站发送第一信息。在执行步骤301之前,无人机接收基站发送第三信息,第三信息用于询问无人机是否具有Q种身份信息,该Q种身份信息包括该M种身份信息,Q为大于0的整数。无人机基于第三信息确定该Q种身份信息,从该Q种身份信息中确定无人机中具有的M种身份信息后,向基站发送第一信息。
可选地,无人机接收基站发送的第三信令,第三信令包括第三IE,第三IE包括第三信息。
可选地,第三信令包括第三RRC信令等,第三IE包括第三RRC信令中的用户设备能力查询(UECapabilityEnquiry)。也就是说,无人机接收基站发送的第三RRC信令,第三RRC信令中的UECapabilityEnquiry包括第三信息。
示例性的,第三信息有三种类型的信息,接下来针对每种类型的第三信息,分别介绍基于第三信息确定该Q种身份信息的过程。
1、第三信息包括该Q种身份信息中的每种身份信息的信息标识。无人机接收第三信息后,基于第三信息包括的Q个信息标识,确定该Q个信息标识对应的Q种身份信息。
2、第三信息包括第三标识信息,第三标识信息用于标识该Q种身份信息。无人机接收第三信息后,基于第三信息包括的第三标识信息,从身份信息集合与标识信息的对应关系中获取对应的第三身份信息集合,第三身份信息集合包括该Q种身份信息。
3、第三信息包括多个比特,在第三信息中该Q种身份信息中的每种身份信息对应不同比特,该每种身份信息对应的比特的取值均为第一取值。无人机接收第三信息后,在第三信息中识别出取值为第一取值的Q个比特,确定该Q个比特对应的Q种身份信息。
综上所述,本公开实施例提供的配置无人机的方法,无人机向基站发送第一信息,第一信息指示无人机中的M种身份信息。接收基站发送第二信息,第二信息用于配置无人机需要发送的N种身份信息,这样解决无人机需要上报哪些身份信息的问题。第二信息用于配置身份信息的发送方式和/或发送条件,这样解决无人机能够根据基站的要求来发送身份信息的问题。第二信息用于配置无人机起飞的起飞条件,这样解决无人机能够根据基站的要求来起飞的问题。又由于基站与无人机之间采用蜂窝通信网络进行通信,这样可以远程配置无人机,无人机可以远程上报身份信息,从而提高配置无人机的效率和灵活性,以及提高无人机上报身份信息的效率和灵活性。
图7示出了本公开一个示例性实施例提供的配置无人机的方法700的流程图,该方法700应用于图1或图2所示的通信系统100中,由基站执行,该方法700包括:
步骤701:接收无人机发送的第一信息,第一信息用于指示无人机能够发送的M种身份信息,M为大于0的整数。
可选地,此处的发送可能为广播,即第一信息用于指示无人机能够广播的M种身份信息。
可选地,基站接收无人机发送的第一信令,第一信令包括第一IE,第一IE包括第一信息。
示例性的,第一信令为第一RRC信令,第一IE包括如下一个或多个:
第一RRC信令中的UE-EUTRA-Capability;
第一RRC信令中的UE-MRDC-Capability;或者,
第一RRC信令中的UE-NR-Capability等。
也就是说:基站接收无人机发送的第一RRC信令,第一RRC信令的UE-EUTRA-Capability、UE-MRDC-Capability和/或UE-NR-Capability包括第一信息。
可选的,基站在接收第一信息之前,还可能询问无人机是否具有Q种身份信息。在实现时,
在执行步骤701之前,基站向无人机发送第三信息,第三信息用于询问无人机是否具有Q种身份信息,该Q种身份信息包括该M种身份信息。
可选地,基站向无人机发送第三信令,第三信令包括第三IE,第三IE包括第三信息。
可选地,第三信令包括第三RRC信令等,第三IE包括第三RRC信令中的UECapabilityEnquiry。也就是说,基站向无人机发送第三RRC信令,第三RRC信令中的UECapabilityEnquiry包括第三信息。
示例性的,第三信息有三种类型的信息,接下来一一列举该三种类型的第三信息。
1、第三信息包括该Q种身份信息中的每种身份信息的信息标识。
2、第三信息包括第三标识信息,第三标识信息用于标识该Q种身份信息。
可选地,基站中保存有身份信息集合与标识信息的对应关系,对于该对应关系中任一条记录,该条记录包括一个身份信息集合和与身份信息集合相对应的标识信息,该身份信息集合包括至少一种身份信息。
基站将该Q种身份信息组成第三身份信息集合,基于第三身份信息集合,从该身份信息集合与标识信息的对应关系中获取对应的标识信息作为第三标识信息。
3、第三信息包括多个比特,在第三信息中该Q种身份信息中的每种身份信息对应不同比特,该每种身份信息对应的比特的取值为第一取值。
可选地,基站获取第三位图,第三位图包括的比特个数大于或等于Q,第三位图中的每个比特对应一种身份信息,且每个比特对应的身份信息不同。基站确定第三位图中的与该Q种身份信息相对应的Q个比特,将该Q个比特的取值均设置为第一取值,将第三位图中除该Q个比特之外的其他每个比特的取值均设置为第二取值,得到第三信息。
步骤702:基于第一信息确定该M种身份信息。
可选地,第一信息可能是如下几种类型的信息,接下来分别说明在每种类型的第一信息的情况下,确定该M种身份信息的详细过程。
类型1,第一信息包括该M种身份信息中的每种身份信息的信息标识。
对于该M种身份信息中的任一种身份信息,该身份信息的信息标识包括如下一个或多个:该身份信息的类别、该身份信息的名称或者该身份信息的编号等。
可选地,基站基于第一信息包括的M种身份信息的信息标识,确定该M种 身份信息。
类型2,第一信息包括第一标识信息,第一标识信息用于标识该M种身份信息。
示例性的,基站基于第一信息包括的第一标识信息,从该身份信息集合与标识信息的对应关系中获取第一标识信息对应的第一身份信息集合,第一身份信息集合包括该M种身份信息。
例如,假设基站保存上述下表1所示的身份信息集合与标识信息的对应关系,以及假设第一标识信息为“1”。基站基于第一标识信息“1”,从上述表1所示的身份信息集合与标识信息的对应关系中获取第一标识信息“1”对应的第一身份信息集合。第一身份信息集合包括无人机的设备标识、无人机的位置信息、无人机的海拔信息、无人机的运动速度、无人机的时间标记、无人机发生的紧急状态、控制设备的位置信息和控制设备的海拔信息。
类型3,第一信息包括多个比特,在第一信息中该M种身份信息中的每种身份信息对应不同的比特,该每种身份信息对应的比特的取值为第一取值。
可选地,基站从第一信息中识别取值为第一取值的M个比特,确定该M个比特对应的M种身份信息。
例如,基站接收的第一信息如图4所示,第一信息包括八个比特。第一个比特对应的身份信息为无人机的设备标识,第二个比特对应的身份信息为无人机的位置信息,第三个比特对应的身份信息为无人机的海拔信息,第四个比特对应的身份信息为无人机的运动速度,第五个比特对应的身份信息为无人机的时间标记,第六个比特对应的身份信息为无人机发生的紧急状态,第七个比特对应的身份信息为控制设备的位置信息,第八个比特对应的身份信息为控制设备的海拔信息。
基站从第一信息中识别取值为“1”的第一个比特、第二个比特、第三个比特、第四个比特、第五个比特和第六个比特。确定第一个比特对应的无人机的设备标识,第二个比特对应的无人机的位置信息,第三个比特对应的无人机的海拔信息,第四个比特对应的无人机的运动速度,第五个比特对应的无人机的时间标记,第六个比特对应的无人机发生的紧急状态。
第一信息除了上述列举的类型1、类型2和类型3三种外,还可能有其他类型的信息,在此不再一一列举。
步骤703:基于该M种身份信息,向无人机发送第二信息。
可选地,在步骤703中,基站向无人机发送第二信令,第二信令包括第二IE,第二IE包括第二信息。
可选地,第二信令包括第二RRC信令,第二IE包括第二RRC信令中的OtherConfig。也就是说:基站向无人机发送第二RRC信令,第二RRC信令中的OtherConfig包括第二信息。
可选地,第二信令包括无线资源控制重配置(RRC Reconfiguration)信令或无线资源控制连接重配置(RRC Connection Reconfiguration)信令等。
可选地,第二信息用于配置无人机。示例性的,接下来列举了第二信息用于配置无人机的几个示例。
示例1,第二信息用于配置无人机需要发送的N种身份信息,N为大于0的整数且N小于或等于M,该M种身份信息包括该N种身份信息。
可选地,该N种身份信息是基站从该M种身份信息中选择得到的。例如,基站根据控制设备的需求从该M种身份信息中选择N种身份信息。在一些实施例中,控制设备可能事先在基站上配置需要无人机上报的身份信息。基站在该M种身份信息中选择控制设备配置的需要无人机上报的N种身份信息。
可选地,在示例1的情况,第二信息可能是如下几种类型的信息:
类型a,第二信息包括该N种身份信息中的每种身份信息的信息标识。
类型b,第二信息包括第二标识信息,第二标识信息用于标识该N种身份信息。
可选地,基站将该N种身份信息组成第二身份信息集合,基于第二身份信息集合,从身份信息集合与标识信息的对应关系中获取对应的标识信息作为第二标识信息。
例如,假设基站从该M种身份信息中选择五种身份信息,该五种身份信息分别为无人机的设备标识、无人机的位置信息、无人机的海拔信息、无人机的运动速度和无人机的时间标记。将该五种身份信息组成第二身份信息集合,基于第二身份信息集合,从上述表1所示的身份信息集合与标识信息的对应关系中获取对应的标识信息“2”作为第二标识信息。
类型c,第二信息包括多个比特,在第二信息中该N种身份信息中的每种身份信息对应不同的比特,该每种身份信息对应的比特的取值为第一取值。
可选地,基站获取第二位图,第二位图包括的比特个数大于或等于N,第二位图中的每个比特对应一种身份信息,且每个比特对应的身份信息不同。基站确定第二位图中的与该N种身份信息相对应的N个比特,将该N个比特的取 值均设置为第一取值,将第二位图中除该N个比特之外的其他每个比特的取值均设置为第二取值,得到第二信息。
例如,参见图5,基站获取第二位图,第二位图包括八个比特,在第二位图中第一个比特对应的身份信息为无人机的设备标识,第二个比特对应的身份信息为无人机的位置信息,第三个比特对应的身份信息为无人机的海拔信息,第四个比特对应的身份信息为无人机的运动速度,第五个比特对应的身份信息为无人机的时间标记,第六个比特对应的身份信息为无人机发生的紧急状态,第七个比特对应的身份信息为控制设备的位置信息,第八个比特对应的身份信息为控制设备的海拔信息。
假设,基站从该M种身份信息中选择五种身份信息,该五种身份信息分别为无人机的设备标识,无人机的位置信息,无人机的海拔信息,无人机的运动速度,无人机的时间标记。在第二位图中将第一个比特、第二个比特、第三个比特、第四个比特和第五个比特的取值均设置为第一取值“1”,将第六个比特、第七个比特和第八个比特的取值均设置为第二取值“0”,得到如图5所示的第二信息。
可选地,参见图8,在发送第二信息后,基站还可能执行如下步骤704的操作:接收无人机发送的至少一种身份信息的信息内容,该N种身份信息包括该至少一种身份信息。
可选地,基站还可能向控制设备发送该至少一种身份信息的信息内容。控制设备接收该至少一种身份信息的信息内容,基于该至少一种身份信息的信息内容,控制和/或管理无人机。例如,控制无人机避开障碍物,控制无人机转向等。
示例2,该M种身份信息包括第一身份信息,第二信息用于配置无人机发送第一身份信息的发送方式,和/或,第二信息用于配置无人机发送第一身份信息的发送条件。
可选地,基站中可能保存有身份信息与发送方式的对应关系,基站基于第一身份信息,从该身份信息与发送方式的对应关系中获取第一身份信息的发送方式,第二信息包括第一身份信息与第一身份信息的发送方式之间的映射关系。
可选地,基站中可能保存有身份信息与发送条件的对应关系,基站基于第一身份信息,从该身份信息与发送条件的对应关系中获取第一身份信息的发送条件,第二信息包括第一身份信息与第一身份信息的发送条件之间的映射关系。
可选地,第一身份信息的发送方式包括第一身份信息的广播方式。
可选地,该广播方式可能为周期性广播或实时广播等。例如,第一身份信息为无人机的设备标识时,第一身份信息的发送方式可能为周期性广播无人机的设备标识。再例如,第一身份信息为无人机的位置信息,第一身份信息的发送方式为实时广播无人机的位置信息。
可选地,可能同时实现上述示例1和示例2,即该N种身份信息包括第一身份信息,第二信息即用于配置无人机需要发送的N种身份信息,又配置第一身份信息的发送方式和/或发送条件。或者,也可能单独实现上述示例1或示例2。
示例3,第二信息用于配置无人机能够起飞的起飞条件。
可选地,该起飞条件包括如下一个或多个,无人机在具有发送指定身份信息的能力的情况下能够起飞,或者,无人机在位于指定环境的情况下能够起飞等。
该M种身份信息可能包括该指定身份信息,也可能不包括该指定身份信息。在该M种身份信息包括该指定身份信息,表示无人机具有发送该指定身份信息的能力。在该M种身份信息不包括该指定身份信息,表示无人机不具有发送该指定身份信息的能力。
可选地,可能同时实现上述示例1、示例2和示例3,即该N种身份信息包括第一身份信息,第二信息即用于配置无人机需要发送的N种身份信息,又配置第一身份信息的发送方式和/或发送条件,还配置无人机的起飞条件。或者,同时实现上述示例1和示例3,也就是第二信息即用于配置无人机需要发送的N种身份信息,又配置无人机的起飞条件。或者,同时实现上述示例2和示例3,也就是第二信息即用于配置第一身份信息的发送方式和/或发送条件,又配置无人机的起飞条件。或者,也可能单独实现上述示例1、示例2或示例3。
综上所述,本公开实施例提供的配置无人机的方法,基站接收无人机发送的第一信息,第一信息指示无人机中的M种身份信息。向无人机发送第二信息,第二信息用于配置无人机需要发送的N种身份信息,这样解决无人机需要上报哪些身份信息的问题。第二信息用于配置身份信息的发送方式和/或发送条件,这样解决无人机能够根据基站的要求来发送身份信息的问题。第二信息用于配置无人机起飞的起飞条件,这样解决无人机能够根据基站的要求来起飞的问题。又由于基站与无人机之间采用蜂窝通信网络进行通信,这样可以远程配置无人机,无人机可以远程上报身份信息,从而提高配置无人机的效率和灵活性,以及提高无人机上报身份信息的效率和灵活性。
图9示出了本公开一个示例性实施例提供的配置无人机的方法900的流程图,该方法900应用于图1或图2所示的通信系统100中,由无人机和基站交互实现,该方法900包括:
步骤901:基站向无人机发送第三信令,第三信令包括第三IE,第三IE包括第三信息。
示例性的,第三信息有三种类型的信息,接下来一一列举该三种类型的第三信息。
1、第三信息包括该Q种身份信息中的每种身份信息的信息标识。
2、第三信息包括第三标识信息,第三标识信息用于标识该Q种身份信息。
3、第三信息包括多个比特,在第三信息中该Q种身份信息中的每种身份信息对应不同比特,该每种身份信息对应的比特的取值为第一取值。
步骤902:无人机接收第三信令,在第三信息指示的该Q种身份信息中确定无人机能够发送的M种身份信息。
可选地,此处的发送可能是广播,即第一信息用于指示无人机能够广播的M种身份信息。
在步骤902中,无人机接收第三信令,基于第三信令中的第三信息确定该Q种身份信息,在该Q种身份信息中确定无人机能够发送的M种身份信息。
示例性的,第三信息有三种类型的信息,接下来针对每种类型的第三信息,分别介绍基于第三信息确定该Q种身份信息的过程。
1、第三信息包括该Q种身份信息中的每种身份信息的信息标识。无人机基于第三信息包括的Q个信息标识,确定该Q个信息标识对应的Q种身份信息。
2、第三信息包括第三标识信息。无人机基于第三信息包括的第三标识信息,从身份信息集合与标识信息的对应关系中获取对应的第三身份信息集合,第三身份信息集合包括该Q种身份信息。
3、第三信息包括多个比特,在第三信息中该Q种身份信息中的每种身份信息对应的比特的取值均为第一取值。无人机在第三信息中识别出取值为第一取值的Q个比特,确定该Q个比特对应的Q种身份信息。
上述步骤901和902是可选的步骤,即可以不执行步骤901和步骤902,执行如下步骤903。
步骤903:无人机向基站发送第一信令,第一信令包括第一IE,第一IE包括第一信息,第一信息用于指示该M种身份信息。
可选地,第一信息可能是如下几种类型的信息,该几种类型分别为如下类型1、类型2和类型3。
类型1,第一信息包括该M种身份信息中的每种身份信息的信息标识。
类型2,第一信息包括第一标识信息,第一标识信息用于标识该M种身份信息。
在步骤903中,无人机在确定出M种身份信息时,将该M种身份信息组成第一身份信息集合,基于第一身份信息集合,从该身份信息集合与标识信息的对应关系中获取对应的标识信息作为第一标识信息。
类型3,第一信息包括多个比特,在第一信息中该M种身份信息中的每种身份信息对应不同的比特,该每种身份信息对应的比特的取值为第一取值。
在步骤903中,无人机在确定出M种身份信息后,在第一位图中确定与该M种身份信息相对应的M个比特,第一位图中的每个比特对应不同的身份信息,第一位图包括的比特个数大于或等于M。将该M个比特的取值均设置为第一取值,将第一位图中除该M个比特之外的其他每个比特的取值均设置为第二取值,得到第一信息。
第一信息除了上述列举的类型1、类型2和类型3三种外,还可能有其他类型的信息,在此不再一一列举。
步骤904:基站接收无人机发送的第一信令,基于第一信令中的第一信息确定该M种身份信息。
可选地,第一信息可能是如下几种类型的信息,接下来分别说明在每种类型的第一信息的情况下,确定该M种身份信息的详细过程。
类型1,第一信息包括该M种身份信息中的每种身份信息的信息标识。基站基于第一信息包括的M种身份信息的信息标识,确定该M种身份信息。
类型2,第一信息包括第一标识信息。基站基于第一信息包括的第一标识信息,从该身份信息集合与标识信息的对应关系中获取第一标识信息对应的第一身份信息集合,第一身份信息集合包括该M种身份信息。
类型3,第一信息包括多个比特,在第一信息中该M种身份信息中的每种身份信息对应的比特的取值为第一取值。基站从第一信息中识别取值为第一取值的M个比特,确定该M个比特对应的M种身份信息。
步骤905:基站基于该M种身份信息,向无人机发送第二信令,第二信令包括第二IE,第二IE包括第二信息。
可选地,第二信息用于配置无人机。示例性的,接下来列举了第二信息用于配置无人机的几个示例。
示例1,第二信息用于配置无人机需要发送的N种身份信息,该M种身份信息包括该N种身份信息。
可选地,在示例1的情况,第二信息可能是如下几种类型的信息:
类型a,第二信息包括该N种身份信息中的每种身份信息的信息标识。
类型b,第二信息包括第二标识信息,第二标识信息用于标识该N种身份信息。
类型c,第二信息包括多个比特,在第二信息中该N种身份信息中的每种身份信息对应的比特的取值均为第一取值。
示例2,该M种身份信息包括第一身份信息,第二信息用于配置无人机发送第一身份信息的发送方式,和/或,第二信息用于配置无人机发送第一身份信息的发送条件。
示例3,第二信息用于配置无人机能够起飞的起飞条件。
可选地,该起飞条件包括如下一个或多个,无人机在具有发送指定身份信息的能力的情况下能够起飞,或者,无人机在位于指定环境的情况下能够起飞等。
步骤906:无人机接收第二信令,基于第二信令包括的第二信息配置无人机。
可选地,第二信息用于配置无人机。示例性的,接下来列举了第二信息用于配置无人机的几个示例,该几个示例分别为如下示例1、示例2和示例3。
示例1,第二信息用于配置无人机需要发送的N种身份信息。无人机基于第二信息,确定需要发送的该N种身份信息。
可选地,在示例1的情况,第二信息可能是如下几种类型的信息:
类型a,第二信息包括该N种身份信息中的每种身份信息的信息标识。无人机基于第二信息包括的N种身份信息的信息标识,确定该N种身份信息。
类型b,第二信息包括第二标识信息,第二标识信息用于标识该N种身份信息。无人机基于第二标识信息,从身份信息集合与标识信息的对应关系中获取对应的第二身份信息集合,第二身份信息集合包括该N种身份信息。
类型c,第二信息包括多个比特,在第二信息中该N种身份信息中的每种身份信息对应的比特的取值为第一取值。无人机在第二信息中识别出取值为第一取值的N个比特,确定该N个比特对应的N种身份信息。
示例2,该M种身份信息包括第一身份信息,第二信息用于配置无人机发 送第一身份信息的发送方式,和/或,第二信息用于配置无人机发送第一身份信息的发送条件。无人机基于第二信息确定无人机发送第一身份信息的发送方式,和/或,无人机发送第一身份信息的发送条件。
示例3,第二信息用于配置无人机能够起飞的起飞条件。无人机基于第二信息确定无人机在哪些起飞条件可以起飞。
在第二信息用于配置无人机需要发送的身份信息、配置该身份信息的发送方式和/或发送条件的情况下,无人机还可能执行如下步骤907。
步骤907:无人机向基站发送至少一种身份信息的信息内容,该N种身份信息包括该至少一种身份信息。
在步骤907中,无人机获取该至少一种身份信息的信息内容,基于该至少一种身份信息的发送方式,向基站发送该至少一种身份信息的信息内容;或者,在满足该至少一种身份信息的发送条件时,向基站发送该至少一种身份信息的信息内容。
步骤908:基站接收该至少一种身份信息的信息内容。
可选地,基站还可能向控制设备发送该至少一种身份信息的信息内容。控制设备接收该至少一种身份信息的信息内容,基于该至少一种身份信息的信息内容,控制和/或管理无人机。
上述步骤907和908是可选的步骤,即可以不执行步骤907和步骤908。
综上所述,本公开实施例提供的配置无人机的方法,无人机向基站发送第一信息,第一信息指示无人机中的M种身份信息。基站接收第一信息,基于第一信息获取第二信息,向无人机发送第二信息,第二信息用于配置无人机需要发送的N种身份信息,这样解决无人机需要上报哪些身份信息的问题。第二信息用于配置身份信息的发送方式和/或发送条件,这样解决无人机能够根据基站的要求来发送身份信息的问题。第二信息用于配置无人机起飞的起飞条件,这样解决无人机能够根据基站的要求来起飞的问题。又由于基站与无人机之间采用蜂窝通信网络进行通信,这样可以远程配置无人机,无人机可以远程上报身份信息,从而提高配置无人机的效率和灵活性,以及提高无人机上报身份信息的效率和灵活性。
图10示出了本公开一个示例性实施例提供的配置无人机的装置1000的框图,该装置1000部署在无人机上,该装置1000可以通过软件、硬件或者二者 的结合实现成为无人机的一部分或者全部,该装置1000包括:
发送模块1001,被配置为向基站发送第一信息,所述第一信息用于指示所述无人机能够发送的M种身份信息,M为大于0的整数;
接收模块1002,被配置为接收所述基站基于所述第一信息发送的第二信息,所述第二信息用于配置所述无人机。
在一些实施例中,所述第二信息用于配置所述无人机需要发送的N种身份信息,N为大于0的整数,所述M种身份信息包括所述N种身份信息。
在一些实施例中,所述M种身份信息包括第一身份信息;并且
所述第二信息用于配置所述无人机发送所述第一身份信息的发送方式,和/或,
所述第二信息用于配置所述无人机发送所述第一身份信息的发送条件。
在一些实施例中,所述第二信息用于配置所述无人机能够起飞的起飞条件。
在一些实施例中,所述起飞条件包括以下中的至少一个:
所述无人机在具有发送指定身份信息的能力的情况下能够起飞;或者,
所述无人机在位于指定环境的情况下能够起飞。
在一些实施例中,所述发送模块1001,被配置为向所述基站发送第一信令,所述第一信令包括第一信息单元IE,所述第一IE包括所述第一信息。
在一些实施例中,所述第一信令包括第一无线资源控制RRC信令,所述第一IE包括以下中的至少一个:
用户设备演进的通用地面无线电接入网能力UE-EUTRA-Capability;
用户设备多制式双向连接能力UE-MRDC-Capability;
用户设备新空口能力UE-NR-Capability。
在一些实施例中,所述接收模块1002,被配置为接收所述基站发送的第二信令,所述第二信令包括第二IE,所述第二IE包括所述第二信息。
在一些实施例中,所述第二信令包括第二RRC信令,所述第二IE包括其他配置OtherConfig。
在一些实施例中,所述接收模块1002,还被配置为接收所述基站发送的第三信息,所述第三信息用于询问所述无人机是否具有Q种身份信息,所述Q种身份信息包括所述M种身份信息,Q为大于0的整数。
在一些实施例中,所述接收模块1002,被配置为接收所述基站发送的第三信令,所述第三信令包括第三IE,所述第三IE包括所述第三信息。
在一些实施例中,所述第三信令包括第三RRC信令,所述第三IE包括用 户设备能力查询UECapabilityEnquiry。
在一些实施例中,所述发送模块1001,还被配置为向所述基站发送所述N种身份信息中的至少一种身份信息的信息内容。
在一些实施例中,所述第二信息用于配置所述无人机发送所述第一身份信息的发送方式,所述发送模块1001,还被配置为基于所述第一身份信息的发送方式,向所述基站发送所述第一身份信息的信息内容;或者,
在一些实施例中,所述第二信息用于配置所述无人机发送所述第一身份信息的发送条件,所述发送条件包括能够发送所述第一身份信息的至少一个场景,所述发送模块1001,还被配置为在所述至少一个场景包括所述无人机当前处于的场景时,向所述基站发送所述第一身份信息的信息内容。
在一些实施例中,所述装置1000还包括处理模块1003,
处理模块1003,被配置为在接收模块1002接收起飞命令后,在所述M种身份信息包括所述指定身份信息时,控制所述无人机起飞;或者,
处理模块1003,被配置为在接收模块1002接收起飞命令后,在所述无人机当前处于的环境为所述指定环境时,控制所述无人机起飞。
在一些实施例中,所述M种身份信息包括以下中的至少一个:
所述无人机的设备标识;
所述无人机的位置信息;
所述无人机的海拔信息;
所述无人机的运动速度;
所述无人机的时间标记;
所述无人机发生的紧急状态;
控制设备的位置信息或所述控制设备的海拔信息,其中,所述控制设备为用于控制所述无人机的设备。
综上所述,本公开实施例提供的配置无人机的装置,发送模块向基站发送第一信息,第一信息指示无人机中的M种身份信息。接收模块接收基站发送的第二信息,第二信息用于配置无人机需要发送的N种身份信息。由于基站与所述装置之间采用蜂窝通信网络进行通信,这样可以远程配置无人机,从而提高配置无人机的效率和灵活性。
图11示出了本公开一个示例性实施例提供的配置无人机的装置1100的框图,该装置1100可以通过软件、硬件或者二者的结合实现成为基站的一部分或 者全部,该装置1100包括:
接收模块1101,被配置为接收无人机发送的第一信息,所述第一信息用于指示所述无人机能够发送的M种身份信息,M为大于0的整数;
发送模块1102,被配置为基于所述第一信息向所述无人机发送第二信息,所述第二信息用于配置所述无人机。
在一些实施例中,所述第二信息用于配置所述无人机需要发送的N种身份信息,N为大于0的整数,所述M种身份信息包括所述N种身份信息。
在一些实施例中,所述M种身份信息包括第一身份信息;并且
所述第二信息用于配置所述无人机发送所述第一身份信息的发送方式,和/或,
所述第二信息用于配置所述无人机发送所述第一身份信息的发送条件。
在一些实施例中,所述第二信息用于配置所述无人机能够起飞的起飞条件。
在一些实施例中,所述起飞条件包括以下中的至少一个:
所述无人机在具有发送指定身份信息的能力的情况下能够起飞;或者
所述无人机在位于指定环境的情况下能够起飞。
在一些实施例中,所述接收模块1101,被配置为接收所述无人机发送的第一信令,所述第一信令包括第一信息单元IE,所述第一IE包括所述第一信息。
在一些实施例中,所述第一信令包括第一无线资源控制RRC信令,所述第一IE包括以下中的至少一个:
用户设备演进的通用地面无线电接入网能力UE-EUTRA-Capability;
用户设备多制式双向连接能力UE-MRDC-Capability;
用户设备新空口能力UE-NR-Capability。
在一些实施例中,所述发送模块1102,被配置为向所述无人机发送第二信令,所述第二信令包括第二IE,所述第二IE包括所述第二信息。
在一些实施例中,所述第二信令包括第二RRC信令,所述第二IE包括其他配置OtherConfig。
在一些实施例中,所述发送模块1102,还被配置为向所述无人机发送第三信息,所述第三信息用于询问所述无人机是否具有Q种身份信息,所述Q种身份信息包括所述M种身份信息,Q为大于0的整数。
在一些实施例中,所述发送模块1102,被配置为向所述基站发送第三信令,所述第三信令包括第三IE,所述第三IE包括所述第三信息。
在一些实施例中,所述第三信令包括第三RRC信令,所述第三IE包括用 户设备能力查询UECapabilityEnquiry。
在一些实施例中,所述接收模块1101,被配置为接收所述无人机发送的所述N种身份信息中的至少一种身份信息的信息内容。
在一些实施例中,所述M种身份信息包括以下中的至少一个:
所述无人机的设备标识;
所述无人机的位置信息;
所述无人机的海拔信息;
所述无人机的运动速度;
所述无人机的时间标记;
所述无人机发生的紧急状态;
控制设备的位置信息或所述控制设备的海拔信息,其中,所述控制设备为用于控制所述无人机的设备。
综上所述,本公开实施例提供的配置无人机的装置,接收模块接收无人机发送的第一信息,第一信息指示无人机中的M种身份信息。发送模块基于第一信息向无人机发送第二信息,第二信息用于配置无人机需要发送的N种身份信息。由于所述装置与所述无人机之间采用蜂窝通信网络进行通信,这样可以远程配置无人机,从而提高配置无人机的效率和灵活性。
图12示出了本公开一个示例性实施例提供的无人机1200的结构示意图,该无人机1200包括:处理器1201、接收器1202、发射器1203、存储器1204和总线1205。
处理器1201包括一个或者一个以上处理核心,处理器1201通过运行软件程序以及模块,从而执行各种功能应用以及信息处理。
接收器1202和发射器1203可以实现为一个通信组件,该通信组件可以是一块通信芯片。
存储器1204通过总线1205与处理器1201相连。
存储器1204可用于存储至少一个指令,处理器1201用于执行该至少一个指令,以实现上述方法实施例中的各个步骤。
此外,存储器1204可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,易失性或非易失性存储设备包括但不限于:磁盘或光盘,电可擦除可编程只读存储器(EEPROM,Electrically Erasable Programmable Read Only Memory),可擦除可编程只读存储器(EPROM,Erasable Programmable Read Only  Memory),静态随时存取存储器(SRAM,Static Random-Access Memory),只读存储器(ROM,Read Only Memory),磁存储器,快闪存储器,可编程只读存储器(PROM,Programmable Read Only Memory)。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器,上述指令可由UE的处理器执行以完成上述配置无人机的方法。例如,所述非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM,Random-Access Memory)、紧凑型光盘只读存储器(CD-ROM,Compact Disc-Read Only Memory)、磁带、软盘和光数据存储设备等。
一种非临时性计算机可读存储介质,当所述非临时性计算机存储介质中的指令由无人机1200的处理器执行时,使得无人机1200能够执行上述配置无人机的方法。
图13是根据一示例性实施例示出的一种基站1300的框图。该基站1300可以包括:处理器1301、接收机1302、发射机1303和存储器1304。接收机1302、发射机1303和存储器1304分别通过总线与处理器1301连接。
其中,处理器1301包括一个或者一个以上处理核心,处理器1301通过运行软件程序以及模块以执行本公开实施例提供的配置无人机的方法。存储器1304可用于存储软件程序以及模块。具体的,存储器1304可存储操作系统13041、至少一个功能所需的应用程序模块13042。接收机1302用于接收其他设备发送的通信数据,发射机1303用于向其他设备发送通信数据。
本公开一示例性实施例还提供了一种计算机可读存储介质,所述计算机可读存储介质中存储有至少一条指令、至少一段程序、代码集或指令集,所述至少一条指令、所述至少一段程序、所述代码集或指令集由所述处理器加载并执行以实现上述各个方法实施例提供的配置无人机的方法。
本公开一示例性实施例还提供了一种计算机程序产品,所述计算机程序产品包括计算机指令,所述计算机指令存储在计算机可读存储介质中;计算机设备的处理器从所述计算机可读存储介质中读取所述计算机指令,所述处理器执行所述计算机指令,使得所述计算机设备执行如上述各个方法实施例提供的配置无人机的方法。
应当理解的是,在本文中提及的“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示: 单独存在A,同时存在A和B,单独存在B这三种情况。字符“/”一般表示前后关联对象是一种“或”的关系。
进一步可以理解的是,术语“第一”、“第二”等用于描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开,并不表示特定的顺序或者重要程度。实际上,“第一”、“第二”等表述完全可以互换使用。例如,在不脱离本公开范围的情况下,第一消息帧也可以被称为第二消息帧,类似地,第二消息帧也可以被称为第一消息帧。
进一步可以理解的是,本公开实施例中尽管在附图中以特定的顺序描述操作,但是不应将其理解为要求按照所示的特定顺序或是串行顺序来执行这些操作,或是要求执行全部所示的操作。
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本公开的其它实施方案。本公开旨在涵盖本公开的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本公开的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本公开的真正范围和精神由下面的权利要求指出。
应当理解的是,本公开并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本公开的范围仅由所附的权利要求来限制。

Claims (36)

  1. 一种配置无人机的方法,所述方法由无人机执行,其特征在于,所述方法包括:
    向基站发送第一信息,所述第一信息用于指示所述无人机能够发送的M种身份信息,M为大于0的整数;
    接收所述基站基于所述第一信息发送的第二信息,所述第二信息用于配置所述无人机。
  2. 如权利要求1所述的方法,其特征在于,所述第二信息用于配置所述无人机需要发送的N种身份信息,N为大于0的整数,所述M种身份信息包括所述N种身份信息。
  3. 如权利要求1所述的方法,其特征在于,
    所述M种身份信息包括第一身份信息;并且
    所述第二信息用于配置所述无人机发送所述第一身份信息的发送方式,和/或
    所述第二信息用于配置所述无人机发送所述第一身份信息的发送条件。
  4. 如权利要求1所述的方法,其特征在于,所述第二信息用于配置所述无人机能够起飞的起飞条件。
  5. 如权利要求4所述的方法,其特征在于,所述起飞条件包括以下中的至少一个:
    所述无人机在具有发送指定身份信息的能力的情况下能够起飞;或者
    所述无人机在位于指定环境的情况下能够起飞。
  6. 如权利要求1-5任一项所述的方法,其特征在于,所述向基站发送第一信息,包括:
    向所述基站发送第一信令,所述第一信令包括第一信息单元IE,所述第一IE包括所述第一信息。
  7. 如权利要求5所述的方法,其特征在于,所述第一信令包括第一无线资源控制RRC信令,所述第一IE包括以下中的至少一个:
    用户设备演进的通用地面无线电接入网能力UE-EUTRA-Capability;
    用户设备多制式双向连接能力UE-MRDC-Capability;
    用户设备新空口能力UE-NR-Capability。
  8. 如权利要求1-5任一项所述的方法,其特征在于,所述接收所述基站发送的第二信息,包括:
    接收所述基站发送的第二信令,所述第二信令包括第二IE,所述第二IE包括所述第二信息。
  9. 如权利要求8所述的方法,其特征在于,所述第二信令包括第二RRC信令,所述第二IE包括其他配置OtherConfig。
  10. 如权利要求1-5任一项所述的方法,其特征在于,所述方法还包括:
    接收所述基站发送的第三信息,所述第三信息用于询问所述无人机是否具有Q种身份信息,所述Q种身份信息包括所述M种身份信息,Q为大于0的整数。
  11. 如权利要求10所述的方法,其特征在于,所述接收所述基站发送第三信息,包括:
    接收所述基站发送的第三信令,所述第三信令包括第三IE,所述第三IE包括所述第三信息。
  12. 如权利要求11所述的方法,其特征在于,所述第三信令包括第三RRC信令,所述第三IE包括用户设备能力查询UECapabilityEnquiry。
  13. 如权利要求2所述的方法,其特征在于,所述方法还包括:
    向所述基站发送所述N种身份信息中的至少一种身份信息的信息内容。
  14. 如权利要求3所述的方法,其特征在于,所述方法还包括:
    所述第二信息用于配置所述无人机发送所述第一身份信息的发送方式,基 于所述第一身份信息的发送方式,向所述基站发送所述第一身份信息的信息内容;或者,
    所述第二信息用于配置所述无人机发送所述第一身份信息的发送条件,所述发送条件包括能够发送所述第一身份信息的至少一个场景,在所述至少一个场景包括所述无人机当前处于的场景时,向所述基站发送所述第一身份信息的信息内容。
  15. 如权利要求5所述的方法,其特征在于,所述方法还包括:
    接收起飞命令,在所述M种身份信息包括所述指定身份信息时,控制所述无人机起飞;或者,
    接收起飞命令,在所述无人机当前处于的环境为所述指定环境时,控制所述无人机起飞。
  16. 如权利要求1-5任一项所述的方法,其特征在于,所述M种身份信息包括以下中的至少一个:
    所述无人机的设备标识;
    所述无人机的位置信息;
    所述无人机的海拔信息;
    所述无人机的运动速度;
    所述无人机的时间标记;
    所述无人机发生的紧急状态;
    控制设备的位置信息或所述控制设备的海拔信息,其中,所述控制设备为用于控制所述无人机的设备。
  17. 一种配置无人机的方法,所述方法由基站执行,其特征在于,所述方法包括:
    接收无人机发送的第一信息,所述第一信息用于指示所述无人机能够发送的M种身份信息,M为大于0的整数;
    基于所述第一信息向所述无人机发送第二信息,所述第二信息用于配置所述无人机。
  18. 如权利要求17所述的方法,其特征在于,所述第二信息用于配置所述无 人机需要发送的N种身份信息,N为大于0的整数,所述M种身份信息包括所述N种身份信息。
  19. 如权利要求17所述的方法,其特征在于,所述M种身份信息包括第一身份信息;并且
    所述第二信息用于配置所述无人机发送所述第一身份信息的发送方式,和/或
    所述第二信息用于配置所述无人机发送所述第一身份信息的发送条件。
  20. 如权利要求17所述的方法,其特征在于,所述第二信息用于配置所述无人机能够起飞的起飞条件。
  21. 如权利要求20所述的方法,其特征在于,所述起飞条件包括以下中的至少一个:
    所述无人机在具有发送指定身份信息的能力的情况下能够起飞;或者
    所述无人机在位于指定环境的情况下能够起飞。
  22. 如权利要求17-21任一项所述的方法,其特征在于,所述接收无人机发送的第一信息,包括:
    接收所述无人机发送的第一信令,所述第一信令包括第一信息单元IE,所述第一IE包括所述第一信息。
  23. 如权利要求22所述的方法,其特征在于,所述第一信令包括第一无线资源控制RRC信令,所述第一IE包括以下中的至少一个:
    用户设备演进的通用地面无线电接入网能力UE-EUTRA-Capability;
    用户设备多制式双向连接能力UE-MRDC-Capability;
    用户设备新空口能力UE-NR-Capability。
  24. 如权利要求17-21任一项所述的方法,其特征在于,所述向所述无人机发送的第二信息,包括:
    向所述无人机发送第二信令,所述第二信令包括第二IE,所述第二IE包括所述第二信息。
  25. 如权利要求24所述的方法,其特征在于,所述第二信令包括第二RRC信令,所述第二IE包括其他配置OtherConfig。
  26. 如权利要求17-21任一项所述的方法,其特征在于,所述方法还包括:
    向所述无人机发送第三信息,所述第三信息用于询问所述无人机是否具有Q种身份信息,所述Q种身份信息包括所述M种身份信息,Q为大于0的整数。
  27. 如权利要求26所述的方法,其特征在于,所述向所述无人机发送第三信息,包括:
    向所述基站发送第三信令,所述第三信令包括第三IE,所述第三IE包括所述第三信息。
  28. 如权利要求27所述的方法,其特征在于,所述第三信令包括第三RRC信令,所述第三IE包括用户设备能力查询UECapabilityEnquiry。
  29. 如权利要求18所述的方法,其特征在于,所述方法还包括:
    接收所述无人机发送的所述N种身份信息中的至少一种身份信息的信息内容。
  30. 如权利要求17-21任一项所述的方法,其特征在于,所述M种身份信息包括以下中的至少一个:
    所述无人机的设备标识;
    所述无人机的位置信息;
    所述无人机的海拔信息;
    所述无人机的运动速度;
    所述无人机的时间标记;
    所述无人机发生的紧急状态;
    控制设备的位置信息或所述控制设备的海拔信息,其中,所述控制设备为用于控制所述无人机的设备。
  31. 一种配置无人机的装置,所述装置部署在无人机上,其特征在于,包括:
    发送模块,被配置为向基站发送第一信息,所述第一信息用于指示所述无人机能够发送的M种身份信息,M为大于0的整数;
    接收模块,被配置为接收所述基站基于所述第一信息发送的第二信息,所述第二信息用于配置所述无人机。
  32. 一种配置无人机的装置,其特征在于,所述装置包括:
    接收模块,被配置为接收无人机发送的第一信息,所述第一信息用于指示所述无人机能够发送的M种身份信息,M为大于0的整数;
    发送模块,被配置为基于所述第一信息向所述无人机发送第二信息,所述第二信息用于配置所述无人机。
  33. 一种无人机,其特征在于,所述无人机包括:
    处理器;
    与所述处理器相连的收发器;
    其中,所述处理器被配置执行可执行指令以实现如权利要求1至16任一项所述的配置无人机的方法。
  34. 一种基站,其特征在于,所述基站包括:
    处理器;
    与所述处理器相连的收发器;
    其中,所述处理器被配置执行可执行指令以实现如权利要求17至30任一项所述的配置无人机的方法。
  35. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有至少一条指令、至少一段程序、代码集或指令集,所述至少一条指令、所述至少一段程序、所述代码集或指令集由处理器加载并执行以实现如权利要求1至16任一项所述的方法,或者,如权利要求17至30任一项所述的方法。
  36. 一种配置无人机的系统,其特征在于,所述系统包括无人机和基站,所述无人机用于执行如权利要求1-16任一项所述的方法,所述基站用于执行如权利要求17-30任一项所述的方法。
PCT/CN2022/089087 2022-04-25 2022-04-25 配置无人机的方法、装置、系统及存储介质 WO2023206024A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2022/089087 WO2023206024A1 (zh) 2022-04-25 2022-04-25 配置无人机的方法、装置、系统及存储介质
CN202280001397.9A CN117296431A (zh) 2022-04-25 2022-04-25 配置无人机的方法、装置、系统及存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/089087 WO2023206024A1 (zh) 2022-04-25 2022-04-25 配置无人机的方法、装置、系统及存储介质

Publications (1)

Publication Number Publication Date
WO2023206024A1 true WO2023206024A1 (zh) 2023-11-02

Family

ID=88516485

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/089087 WO2023206024A1 (zh) 2022-04-25 2022-04-25 配置无人机的方法、装置、系统及存储介质

Country Status (2)

Country Link
CN (1) CN117296431A (zh)
WO (1) WO2023206024A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118068853A (zh) * 2024-04-24 2024-05-24 辽宁高比科技有限公司 一种室内变电站gis室无人机自主飞行巡检方法

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105608931A (zh) * 2016-02-26 2016-05-25 陈昊 无人飞行器的管理方法及管理装置
CN105892473A (zh) * 2016-03-30 2016-08-24 中测新图(北京)遥感技术有限责任公司 基于移动通讯技术的无人机监管方法、装置、终端及系统
CN108700894A (zh) * 2018-05-22 2018-10-23 北京小米移动软件有限公司 无人机控制方法、装置、基站和无人机
CN108810941A (zh) * 2017-05-05 2018-11-13 华为技术有限公司 一种网络接入方法、网络设备及终端
CN110024013A (zh) * 2017-11-08 2019-07-16 深圳市大疆创新科技有限公司 无人飞行器的飞行管制方法、设备及无人飞行器
US20200260242A1 (en) * 2017-11-03 2020-08-13 Beijing Xiaomi Mobile Software Co., Ltd. Unmanned aerial vehicle authentication method and apparatus
WO2022013601A1 (en) * 2020-07-15 2022-01-20 Telefonaktiebolaget Lm Ericsson (Publ) Provisioning drone flight in 5g networks

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105608931A (zh) * 2016-02-26 2016-05-25 陈昊 无人飞行器的管理方法及管理装置
CN105892473A (zh) * 2016-03-30 2016-08-24 中测新图(北京)遥感技术有限责任公司 基于移动通讯技术的无人机监管方法、装置、终端及系统
CN108810941A (zh) * 2017-05-05 2018-11-13 华为技术有限公司 一种网络接入方法、网络设备及终端
US20200260242A1 (en) * 2017-11-03 2020-08-13 Beijing Xiaomi Mobile Software Co., Ltd. Unmanned aerial vehicle authentication method and apparatus
CN110024013A (zh) * 2017-11-08 2019-07-16 深圳市大疆创新科技有限公司 无人飞行器的飞行管制方法、设备及无人飞行器
CN108700894A (zh) * 2018-05-22 2018-10-23 北京小米移动软件有限公司 无人机控制方法、装置、基站和无人机
WO2022013601A1 (en) * 2020-07-15 2022-01-20 Telefonaktiebolaget Lm Ericsson (Publ) Provisioning drone flight in 5g networks

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118068853A (zh) * 2024-04-24 2024-05-24 辽宁高比科技有限公司 一种室内变电站gis室无人机自主飞行巡检方法

Also Published As

Publication number Publication date
CN117296431A (zh) 2023-12-26

Similar Documents

Publication Publication Date Title
CN110546700B (zh) 无线通信的方法、网络设备和终端设备
CN107968692B (zh) 一种无人机的通信方法、通信装置及无人机
CN111435257B (zh) 一种移动路线确定方法及相关设备
US11760480B2 (en) Information sending and receiving method and apparatus, device, and storage medium
WO2020220820A1 (zh) 一种建立通信承载的方法、设备及系统
WO2021044863A1 (ja) 第1の無線局、第2の無線局、コアネットワークノード、移動端末、システム、方法、及びコンピュータに読み取り可能な非一時的記録媒体
WO2023206024A1 (zh) 配置无人机的方法、装置、系统及存储介质
US11984037B2 (en) Method for providing flight route to unmanned aerial vehicle, acquisition method and device, and system
WO2020042117A1 (zh) 无人机飞行路径提供方法、获取方法、装置及系统
WO2021044864A1 (ja) 管制装置、第1のコアネットワークノード、無線局、第2のコアネットワークノード、移動端末、システム、方法、プログラム、及び、コンピュータに読み取り可能な非一時的記録媒体
WO2023201538A1 (zh) 信息传输方法及装置、存储介质
US20220348325A1 (en) Uncrewed aerial vehicle control method, apparatus, and system
WO2020133259A1 (zh) 通信控制方法及装置
WO2023206026A1 (zh) 配置无人机的方法、装置、系统及存储介质
WO2023201539A1 (zh) 信息传输方法及装置、存储介质
WO2023216854A1 (zh) 无人机通信方法、装置及系统
Park et al. Structure design for unmanned aircraft traffic management system
WO2022156627A1 (zh) 一种无人机通信管理方法及装置
WO2023225820A1 (zh) 信息传输方法及装置、存储介质
WO2023201540A1 (zh) 信息传输方法及装置、存储介质
US20230189190A1 (en) Method and apparatus for communication services
WO2023201646A1 (zh) 信息传输方法及装置、存储介质
WO2024208085A1 (zh) 一种通信方法及装置
WO2023201644A1 (zh) 信息传输方法及装置、存储介质
WO2022206532A1 (zh) 一种服务质量QoS更新的方法、装置和系统

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 202280001397.9

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22938881

Country of ref document: EP

Kind code of ref document: A1