CN108696517A - A kind of safe communication method, the apparatus and system of unmanned vehicle information - Google Patents

A kind of safe communication method, the apparatus and system of unmanned vehicle information Download PDF

Info

Publication number
CN108696517A
CN108696517A CN201810431440.0A CN201810431440A CN108696517A CN 108696517 A CN108696517 A CN 108696517A CN 201810431440 A CN201810431440 A CN 201810431440A CN 108696517 A CN108696517 A CN 108696517A
Authority
CN
China
Prior art keywords
unmanned vehicle
information
identity
encryption
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810431440.0A
Other languages
Chinese (zh)
Inventor
郭经宇
郭刚
宋志华
成盼青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANDONG YUWENG INFORMATION TECHNOLOGY Co Ltd
Original Assignee
SHANDONG YUWENG INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANDONG YUWENG INFORMATION TECHNOLOGY Co Ltd filed Critical SHANDONG YUWENG INFORMATION TECHNOLOGY Co Ltd
Priority to CN201810431440.0A priority Critical patent/CN108696517A/en
Publication of CN108696517A publication Critical patent/CN108696517A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Traffic Control Systems (AREA)

Abstract

This application discloses a kind of safe communication methods of unmanned vehicle information, including receive the first verification information that unmanned vehicle is sent;Judge that whether true the identity of unmanned vehicle is legal according to the first verification information;If the identity of unmanned vehicle is really legal, the unmanned vehicle encryption information of unmanned vehicle transmission is received;Wherein, acquisition is encrypted to the unmanned vehicle information of acquisition by unmanned vehicle in unmanned vehicle encryption information;Unmanned vehicle encryption information is decrypted, unmanned vehicle information is obtained.This method is before carrying out unmanned vehicle information transmission, realize the identification to unmanned vehicle, effectively prevent unmanned vehicle illegally controlled and its information by leakage the problem of, the safely controllable and benign sound development of unmanned vehicle is furthermore achieved in the safe operation that ensure that unmanned vehicle.Disclosed herein as well is a kind of safety communication apparatus and systems of unmanned vehicle information, all have above-mentioned advantageous effect.

Description

A kind of safe communication method, the apparatus and system of unmanned vehicle information
Technical field
This application involves field of computer information security, more particularly to a kind of safety communication side of unmanned vehicle information Method further relates to a kind of safety communication apparatus and system of unmanned vehicle information.
Background technology
Unmanned vehicle industry is the new industry of fast development in recent years, in personal consumption, plant protection, mapping, energy etc. Field is used widely, however while unmanned vehicle industry fast development, since industry laws standards system is endless It is apt to, detects authentication system is unsound and security control means lag etc., leading to existing unmanned vehicle, there are its correlation letters The problems such as breath is easy to be leaked and be tampered in communication process.
In the prior art, unmanned vehicle is faced with more complicated secure communication environment, acquires information, such as identity Information, location information, temporal information, monitoring information of taking photo by plane etc. and management information, such as manufacturer and manufacturer's information, purchase Place and temporal information, unmanned vehicle core part information etc., are that back-stage management end, i.e. management and control are sent in the form of plaintext Platform is handled and is controlled, and therefore, in message transmitting procedure, these information are easy to reveal and are illegally distorted and palmed off Deng, the true legitimacy of the relevant information of reception is difficult to differentiate between so as to cause management and control platform, and can not have to unmanned vehicle Effect supervision.Meanwhile unmanned vehicle is equally also difficult to its true legitimacy for the control instruction that management and control platform issues, and is easy It is interfered by the signal that pseudo- platform is sent out, the problem of unmanned vehicle is by illegal invasion and control is further resulted in, such as without criticizing It is accurate to fly without authorization, do not flown by the aircraft programs of approval, flown into restricred airspace and airspace danger area without approval etc..
Therefore, how unmanned vehicle information effectively to be avoided to be leaked and distort, to ensure the safety of unmanned vehicle Operation is those skilled in the art's urgent problem to be solved.
Invention content
The purpose of the application is to provide a kind of safe communication method of unmanned vehicle information, and in progress, nobody flies this method Before the transmission of row device information, the identification to unmanned vehicle is realized, unmanned vehicle is effectively prevented and is illegally controlled The problem of system and its information are by leakage, ensure that the safe operation of unmanned vehicle, unmanned vehicle is furthermore achieved Safely controllable and benign sound development;The another object of the application is to provide a kind of safety communication device of unmanned vehicle information And system, all have above-mentioned advantageous effect.
In order to solve the above technical problems, the application provides a kind of safe communication method of unmanned vehicle information, this method Including:
Receive the first verification information that unmanned vehicle is sent;
Judge that whether true the identity of the unmanned vehicle is legal according to first verification information;
If the identity of the unmanned vehicle is really legal, receives the unmanned vehicle that the unmanned vehicle is sent and add Confidential information;Wherein, the unmanned vehicle encryption information carries out the unmanned vehicle information of acquisition by the unmanned vehicle Encryption obtains;
The unmanned vehicle encryption information is decrypted, the unmanned vehicle information is obtained.
Preferably, first verification information is digital certificate.
Preferably, described that the whether true legal packet of the identity of the unmanned vehicle is judged according to first verification information It includes:
Whether effective verify the digital certificate;
It is true legal by the identity marks of the unmanned vehicle if the digital certificate is effective.
Preferably, the content of the verification includes the term of validity of the digital certificate, the true legitimacy of signature and is It is no to be revoked.
Preferably, the unmanned vehicle is encrypted the unmanned vehicle information using symmetric encipherment algorithm, obtains Obtain the unmanned vehicle encryption information.
Preferably, described that the unmanned vehicle encryption information is decrypted, obtain the unmanned vehicle packet It includes:
First verification information is parsed, first key is obtained;
The unmanned vehicle encryption information is decrypted using the first key, obtains the unmanned vehicle letter Breath.
Preferably, the method further includes:
Second verification information is issued to the unmanned vehicle;
The unmanned vehicle judges that whether true the identity of management and control platform is legal according to second verification information;If so, The control extension instruction that the management and control platform is sent then is received, and control extension instruction is decrypted, obtains control instruction.
Preferably, described that control extension instruction is decrypted, obtaining control instruction includes:
Second verification information is parsed, the second key is obtained;
It is decrypted using control extension instruction described in second key pair, obtains the control instruction.
In order to solve the above technical problems, the application also provides a kind of safety communication device of unmanned vehicle information, the dress Set including:
First receiving module, the first verification information for receiving unmanned vehicle transmission;
Identity judgment module, for judging whether the identity of the unmanned vehicle is true according to first verification information It is legal;
Second receiving module receives the unmanned vehicle if the identity for the unmanned vehicle is really legal The unmanned vehicle encryption information of transmission;Wherein, the unmanned vehicle encryption information by the unmanned vehicle to acquisition Acquisition is encrypted in unmanned vehicle information;
Information deciphering module obtains the unmanned vehicle for the unmanned vehicle encryption information to be decrypted Information.
In order to solve the above technical problems, the application also provides a kind of safety communication system of unmanned vehicle information, this is System includes:
Unmanned vehicle obtains unmanned vehicle encryption information for unmanned vehicle information to be encrypted;And by One verification information and the unmanned vehicle encryption information are sent to management and control platform;
The management and control platform, for receiving first verification information;According to first verification information judge it is described nobody Whether the identity of aircraft is true legal;If the identity of the unmanned vehicle is really legal, the unmanned vehicle is received Encryption information;And the unmanned vehicle encryption information is decrypted, obtain the unmanned vehicle information.
A kind of safe communication method of unmanned vehicle information provided herein, including receive unmanned vehicle and send The first verification information;Judge that whether true the identity of the unmanned vehicle is legal according to first verification information;If institute The identity for stating unmanned vehicle is really legal, then receives the unmanned vehicle encryption information that the unmanned vehicle is sent;Wherein, Acquisition is encrypted to the unmanned vehicle information of acquisition by the unmanned vehicle in the unmanned vehicle encryption information;To institute It states unmanned vehicle encryption information to be decrypted, obtains the unmanned vehicle information.
As it can be seen that technical solution provided herein carries out the body of unmanned vehicle first before carrying out information communication Part verification, under the premise of ensureing that its identity is true legal, the unmanned vehicle information of acquisition is encrypted unmanned vehicle, And encrypted unmanned vehicle information is sent to management and control platform, then it is decrypted by management and control platform and obtains above-mentioned unmanned flight For device information to be managed and control, authentication and the encrypted combination of information effectively avoid unmanned vehicle information logical The problem of being leaked and distort during news further avoids the problem of unmanned vehicle is by illegal control, improves nothing The transmission security and its protective capability of people's aircraft information improve the product safety performance of unmanned vehicle, effectively meet The security management and control requirement of supervision department, form unmanned vehicle can recognize that, can monitor, retrospective technology management and control system, The safe operation that ensure that unmanned vehicle realizes the safely controllable and benign sound development of unmanned vehicle, further pushes away Moved unmanned vehicle each relevant industries field security application.
Present invention also provides a kind of safety communication apparatus and systems of unmanned vehicle information, all have above-mentioned beneficial to effect Fruit, details are not described herein.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow diagram of the safe communication method of unmanned vehicle information provided herein;
Fig. 2 is a kind of schematic diagram of the safety communication device of unmanned vehicle information provided herein;
Fig. 3 is a kind of schematic diagram of the safety communication system of unmanned vehicle information provided herein.
Specific implementation mode
The core of the application is to provide a kind of safe communication method of unmanned vehicle information, and in progress, nobody flies this method Before the transmission of row device information, the identification to unmanned vehicle is realized, unmanned vehicle is effectively prevented and is illegally controlled The problem of system and its information are by leakage, ensure that the safe operation of unmanned vehicle, unmanned vehicle is furthermore achieved Safely controllable and benign sound development;Another core of the application is to provide a kind of safety communication device of unmanned vehicle information And system, all have above-mentioned advantageous effect.
To keep the purpose, technical scheme and advantage of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, technical solutions in the embodiments of the present application is clearly and completely described, it is clear that described embodiment is Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art The all other embodiment obtained without making creative work, shall fall in the protection scope of this application.
Referring to FIG. 1, the flow that Fig. 1 is a kind of safe communication method of unmanned vehicle information provided herein is shown It is intended to, this method may include:
S101:Receive the first verification information that unmanned vehicle is sent;
Specifically, to ensure the safety of unmanned vehicle information, unmanned flight is carried out in unmanned vehicle and management and control platform Before the transmission of device information, the authentication of unmanned vehicle can be carried out first, and the nothing is sent from unmanned vehicle to management and control platform The authentication information of people's aircraft, i.e., above-mentioned first verification information, by management and control platform, according to the first verification information, to this, nobody flies The identity of row device carries out true legitimate verification.Wherein, above-mentioned first verification information may include the correlation of the unmanned vehicle Characteristic information, such as manufacturer's information, core part information, particular content the application do not limit;It is of course also possible to utilize Digital certificate realizes that above-mentioned authentication process itself, the application do not do unique restriction for the mode of unmanned vehicle authentication.
Preferably, above-mentioned first verification information can be digital certificate.
Specifically, in a kind of embodiment of the application, the identity of unmanned vehicle is carried out in the form of digital certificate Verification.First, before carrying out authentication, certificate request is generated by unmanned vehicle, management and control platform then can be according to reception Certificate request is that unmanned vehicle provides corresponding digital certificate, is preserved, is specifically can save to nobody by unmanned vehicle In the corresponding safety certification device of aircraft, certainly, for its save location, the application does not do unique restriction, in addition, for number Particular content the application of word certificate is also not specifically limited;Further, unmanned flight is carried out in unmanned vehicle and management and control platform When the communication of device information, for example, when unmanned vehicle needs to report position or other information to management and control platform, unmanned vehicle can be first Digital certificate is sent to management and control platform, management and control platform then can carry out authentication according to the digital certificate to the unmanned vehicle.
In addition, when management and control platform needs to send corresponding control instruction to unmanned vehicle, it can also be by the number of oneself Certificate is sent to unmanned vehicle, its true legitimacy is verified by the relevant safety certification device of unmanned vehicle, then into The transmission of row relevant control instruction, hereby it is achieved that the bidirectional safe certification between unmanned vehicle and management and control platform.
S102:Judge that whether true the identity of unmanned vehicle is legal according to the first verification information;
Specifically, after the first verification information that management and control platform receives unmanned vehicle transmission, you can first tested according to this Card information judges the true legitimacy of unmanned vehicle identity, the content that can included according to above-mentioned first verification information specifically, The correlated characteristic information of such as unmanned vehicle is judged.
Preferably, it is above-mentioned according to the first verification information judge the identity of unmanned vehicle it is whether true it is legal may include testing Whether effective demonstrate,prove digital certificate;It is true legal by the identity marks of unmanned vehicle if digital certificate is effective.
Specifically, when carrying out the true legitimate verification of unmanned vehicle identity using digital certificate, can first verify The validity of the digital certificate, if the digital certificate is effective, you can illustrate the identity of the unmanned vehicle be it is true legal, Can be true legal by the identity marks of the unmanned vehicle, in order to carry out the transmission of follow-up unmanned vehicle information.
Preferably, the content of above-mentioned verification may include the term of validity of digital certificate, the true legitimacy of signature and be It is no to be revoked.
Specifically, when being verified to digital certificate, it can verify whether it exceeds the term of validity, whether signature is true It is legal and whether it is in being revoked state, since the digital certificate is sent out from management and control platform to unmanned vehicle, therefore its The relevant information of the digital certificate is preserved in inside, specifically can mutually be compareed, to obtain corresponding verification result.If should Digital certificate is true legal without departing from the term of validity, signature, and is not revoked, you can illustrate the digital certificate be it is effective, Further illustrate that the identity of the unmanned vehicle is true legal.Certainly, above-mentioned verification content is only provided herein A kind of preferred embodiment uniquely can also not include other related contents, can specifically be carried out according to actual conditions true Fixed, the application does not limit.
S103:If the identity of unmanned vehicle is really legal, the unmanned vehicle encryption of unmanned vehicle transmission is received Information;Wherein, acquisition is encrypted to the unmanned vehicle information of acquisition by unmanned vehicle in unmanned vehicle encryption information;
S104:If the identity of unmanned vehicle is untrue legal, without any processing;
Specifically, when carrying out the true validity judgement of unmanned vehicle identity, if as a result, the unmanned flight The identity of device is really legal, then can further receive the unmanned vehicle encryption information sent by unmanned vehicle, to carry out Subsequent processing;If as a result the identity of the unmanned vehicle is untrue legal, then illustrate that the unmanned vehicle may not belong to It has been leaked and has distorted in the management and control range of the management and control platform or the relevant information of the unmanned vehicle, illegally controlled, At this point, not allowing any information for continuing to the unmanned vehicle then, that is, no longer need to do any relevant treatment.
Wherein, above-mentioned unmanned vehicle encryption information is added to the unmanned vehicle information of acquisition by unmanned vehicle What close processing obtained, specifically, unmanned vehicle is after collecting relevant unmanned vehicle information, by these information to pipe Before controlling platform transmission, the unmanned vehicle information can be encrypted by corresponding built-in encryption device first, for example, The ciphering process can be realized by corresponding Encryption Algorithm, such as can generate symmetric key by symmetric encipherment algorithm, or by non- Symmetric encipherment algorithm generates public key and private key or the two is combined, and the application does not do the realization method of its ciphering process It is specific to limit.Wherein, above-mentioned encryption device may include the processor that unmanned vehicle information is encrypted, storage it is related plus The memory and crystal oscillator of close algorithm, all kinds of interfaces, power supply, time service/omniselector etc., the timing to realize unmanned vehicle are fixed The services such as position, information storage, safety certification and information encryption and decryption.Certainly, for above-mentioned encryption device in unmanned vehicle Specific location is installed, the application does not limit.
In addition, the content of above-mentioned unmanned vehicle information is not unique, such as may include real time information and the phase of acquisition Close hardware information etc., wherein real time information may include the identity information of unmanned vehicle, location information, temporal information, manipulation Information etc., related hardware information may include manufacturer's information, user information, time buying and the place letter of unmanned vehicle Breath, core part information etc..
Preferably, unmanned vehicle can be encrypted unmanned vehicle information using symmetric encipherment algorithm, obtain nothing People's aircraft encryption information.
Specifically, management and control platform can first generate a pair of of symmetric key, and by one of symmetric key together with digital certificate one It rises and is sent to unmanned vehicle, unmanned vehicle is encrypted unmanned vehicle information using the symmetric key, obtains Unmanned vehicle encryption information, and management and control platform is sent it to, management and control platform is that can utilize another symmetric key oneself preserved The unmanned vehicle encryption information is decrypted, unmanned vehicle information is obtained.Certainly, which is only the application institute A kind of embodiment provided, it is not unique, it can be achieved that encryption function to unmanned vehicle information, such as asymmetric encryption Algorithm etc., the application do not do unique restriction.
Further, the method that symmetric encipherment algorithm is combined with rivest, shamir, adelman can also be used to unmanned vehicle Information is encrypted, the safety communication of unmanned vehicle information is effectively ensured.Specifically, unmanned vehicle passes through symmetric cryptography Algorithm generates a pair of of symmetric key and preserves key A such as key A and key B, the public key that key B is issued using management and control platform into Row encryption, and it is sent to management and control platform, acquisition can be decrypted using the key B after the private key pair encryption of oneself in management and control platform, and this is close Key B;Further, when carrying out unmanned vehicle information communication, unmanned vehicle carries out unmanned vehicle information using key A Encryption obtains unmanned vehicle encryption information, and sends it to management and control platform, and management and control platform is i.e. using the key B of acquisition to nothing People's aircraft encryption information is decrypted, and obtains unmanned vehicle information.
Above-described embodiment realizes unmanned vehicle information by the way that unmanned vehicle information is encrypted in the form of ciphertext Communication, avoid information leakage that plaintext communication band comes, by distorting the problems such as, effective guarantee unmanned vehicle information Safety further ensures the safe operation of unmanned vehicle.
S105:Unmanned vehicle encryption information is decrypted, unmanned vehicle information is obtained.
Specifically, after management and control platform receives the unmanned vehicle encryption information, you can encrypt and believe to the unmanned vehicle Breath is decrypted, and to obtain corresponding unmanned vehicle information, thereby ensures that the safety communication of unmanned vehicle information.Its In, the manner of decryption of unmanned vehicle encryption information can correspond to the ciphering process of unmanned vehicle information, if for example, nobody flies Row device encryption information is obtained by symmetric encipherment algorithm, then can be solved to it using the inverse operation of symmetric encipherment algorithm It is close, above-mentioned unmanned vehicle information is obtained, detailed process is no longer illustrated herein.
Preferably, above-mentioned that unmanned vehicle encryption information is decrypted, it may include pair to obtain unmanned vehicle information First verification information is parsed, and first key is obtained;The unmanned vehicle encryption information is solved using first key It is close, obtain unmanned vehicle information.
Specifically, after unmanned vehicle is completed to the encryption of unmanned vehicle information, it can be corresponding by its encryption key Decruption key, i.e., above-mentioned first key are stored in the first verification information, are sent to management and control platform together;Further, management and control platform exists Verify the unmanned vehicle identity it is true it is legal after, you can parsing is carried out to the first verification information and obtains above-mentioned first key, And unmanned vehicle encryption information is decrypted using the first key, obtain unmanned vehicle information.
It should be noted that unmanned vehicle information is encrypted in above-mentioned unmanned vehicle process and management and control platform are to nothing People's aircraft carries out the process of authentication, and the sequencing the application executed does not limit, and the two can be also carried out at the same time, with Improve the communication efficiency of both sides.
The safe communication method of unmanned vehicle information provided herein, authentication and information is encrypted is combined with Effect avoids the problem of unmanned vehicle information is leaked and distorts in communication regulations, improves unmanned vehicle information Transmission security and its protective capability improve the product safety performance of unmanned vehicle, effectively meet the peace of supervision department Full management and control requirement, form unmanned vehicle can recognize that, can monitor, retrospective technology management and control system, ensure that unmanned flight The safe operation of device realizes the safely controllable and benign sound development of unmanned vehicle, has further pushed unmanned vehicle Security application in each relevant industries field.
On the basis of the above embodiments:
As a kind of preferred embodiment, this method can also include that the second verification information is issued to unmanned vehicle;Nothing People's aircraft judges that whether true the identity of management and control platform is legal according to the second verification information;If so, receiving what management and control platform was sent Control extension instructs, and control extension instruction is decrypted, and obtains control instruction.
Specifically, this method can also realize that management and control platform controls the management of unmanned vehicle, to ensure control instruction Safety, first, the control instruction, which can be encrypted, in management and control platform obtains control extension instruction, and ciphering process can refer to nothing The ciphering process of people's aircraft information, details are not described herein;Further, management and control platform is by corresponding authentication information, i.e., above-mentioned Second verification information is sent to corresponding unmanned vehicle, and the true legitimacy of the management and control abutment body part is judged by unmanned vehicle, If the identity of the management and control platform is really legal, you can receive above-mentioned control extension instruction;Finally, unmanned vehicle is to the control extension Instruction is decrypted, and obtains corresponding control instruction, likewise, its decrypting process can be referring in particular to unmanned vehicle encryption information Decrypting process, details are not described herein.
Wherein, safe flight management and control of the management and control platform to unmanned vehicle may be implemented in above-mentioned control instruction, specifically may include Control unmanned vehicle flight time, place, region etc., can also include to occur without approval without authorization flight, not by batch Accurate unmanned vehicle plan is flown, flies into the progress of the unmanned vehicles such as restricred airspace and airspace danger area without approval Force the measures such as landing and control.The various control instructions that above-mentioned management and control platform issues unmanned vehicle are only provided herein Partial content, however it is not limited to this, can specifically be set as the case may be.
Preferably, above-mentioned that control extension instruction is decrypted, it may include to the second verification information to obtain control instruction It is parsed, obtains the second key;It is decrypted using the second key pair encryption control instruction, obtains control instruction.
Specifically, management and control platform can equally instruct control extension corresponding decruption key, i.e., above-mentioned second key to preserve In the second verification information, unmanned vehicle, similarly can be to second when the control extension instruction to reception is decrypted Verification information is parsed, and above-mentioned second key is obtained, and be decrypted using the second key pair encryption control instruction, to obtain Obtain corresponding control instruction.
The present embodiment to unmanned vehicle carry out authentication, unmanned vehicle information is encrypted on the basis of, Security verification further has been carried out to the identity of management and control platform, and the control instruction that it sends out has been encrypted, has effectively been realized The bidirectional safe communication of related data information, further ensures the peace of unmanned vehicle between unmanned vehicle and management and control platform Row for the national games.
To solve the above problems, referring to FIG. 2, Fig. 2 is a kind of safety of unmanned vehicle information provided herein The schematic diagram of communication device, the device may include:
First receiving module 1, the first verification information for receiving unmanned vehicle transmission;
Identity judgment module 2, for judging that whether true the identity of unmanned vehicle is legal according to the first verification information;
Second receiving module 3 receives the nothing of unmanned vehicle transmission if the identity for unmanned vehicle is really legal People's aircraft encryption information;Wherein, unmanned vehicle encryption information by unmanned vehicle to the unmanned vehicle information of acquisition into Row encryption obtains;
Information deciphering module 4 obtains unmanned vehicle information for unmanned vehicle encryption information to be decrypted.
As a kind of preferred embodiment, above-mentioned identity judgment module 2 may include:
Submodule is verified, it is whether effective for verifying digital certificate;
Submodule is marked, is true legal by the identity marks of unmanned vehicle if effective for digital certificate.
As a kind of preferred embodiment, above- mentioned information deciphering module 4 may include:
First analyzing sub-module obtains first key for being parsed to the first verification information;
First decryption submodule obtains nobody for unmanned vehicle encryption information to be decrypted using first key Aircraft information.
As a kind of preferred embodiment, which can also include:
Sending module, for the second verification information to be issued to unmanned vehicle;
Deciphering module judges that whether true the identity of management and control platform is legal for unmanned vehicle according to the second verification information; If so, receiving the control extension instruction that management and control platform is sent, and control extension instruction is decrypted, obtains control instruction.
As a kind of preferred embodiment, above-mentioned deciphering module may include:
Second analyzing sub-module obtains the second key for being parsed to the second verification information;
Second decryption submodule obtains control instruction for being decrypted using the second key pair encryption control instruction.
Above method embodiment is please referred to for the introduction of device provided by the present application, this will not be repeated here by the application.
To solve the above problems, referring to FIG. 3, Fig. 3 is a kind of safety of unmanned vehicle information provided herein The schematic diagram of communication system, the system may include:
Unmanned vehicle 10 obtains unmanned vehicle encryption information for unmanned vehicle information to be encrypted;And it will First verification information and unmanned vehicle encryption information are sent to management and control platform 20;
Management and control platform 20, for receiving the first verification information;The identity of unmanned vehicle 10 is judged according to the first verification information It is whether true legal;If the identity of unmanned vehicle 10 is really legal, 10 encryption information of unmanned vehicle is received;And to nobody Aircraft encryption information is decrypted, and obtains unmanned vehicle information.
Above method embodiment is please referred to for the introduction of system provided by the present application, this will not be repeated here by the application.
Each embodiment is described by the way of progressive in specification, the highlights of each of the examples are with other realities Apply the difference of example, just to refer each other for identical similar portion between each embodiment.For device disclosed in embodiment Speech, since it is corresponded to the methods disclosed in the examples, so description is fairly simple, related place is referring to method part illustration .
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These Function is implemented in hardware or software actually, depends on the specific application and design constraint of technical solution.Profession Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered Think to exceed scope of the present application.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor The combination of capable software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology In any other form of storage medium well known in field.
Safe communication method, device and the system of unmanned vehicle information provided herein have been carried out in detail above It is thin to introduce.Specific examples are used herein to illustrate the principle and implementation manner of the present application, and above example is said It is bright to be merely used to help understand the present processes and its core concept.It should be pointed out that for the ordinary skill of the art For personnel, under the premise of not departing from the application principle, can also to the application, some improvement and modification can also be carried out, these improvement The application scope of the claims element is also fallen into modification.

Claims (10)

1. a kind of safe communication method of unmanned vehicle information, which is characterized in that the method includes:
Receive the first verification information that unmanned vehicle is sent;
Judge that whether true the identity of the unmanned vehicle is legal according to first verification information;
If the identity of the unmanned vehicle is really legal, the unmanned vehicle encryption letter that the unmanned vehicle is sent is received Breath;Wherein, the unmanned vehicle encryption information is encrypted the unmanned vehicle information of acquisition by the unmanned vehicle It obtains;
The unmanned vehicle confidential information is decrypted, the unmanned vehicle information is obtained.
2. the method as described in claim 1, which is characterized in that first verification information is digital certificate.
3. method as claimed in claim 2, which is characterized in that it is described according to first verification information judge it is described nobody fly Whether the identity of row device is really legal to include:
Whether effective verify the digital certificate;
It is true legal by the identity marks of the unmanned vehicle if the digital certificate is effective.
4. method as claimed in claim 3, which is characterized in that the content of the verification includes the effective of the digital certificate Phase, signature true legitimacy and whether be revoked.
5. the method as described in claim 1, which is characterized in that the unmanned vehicle is using symmetric encipherment algorithm to the nothing People's aircraft information is encrypted, and obtains the unmanned vehicle encryption information.
6. the method as described in claim 1, which is characterized in that it is described that the unmanned vehicle encryption information is decrypted, Obtaining the unmanned vehicle information includes:
First verification information is parsed, first key is obtained;
The unmanned vehicle encryption information is decrypted using the first key, obtains the unmanned vehicle information.
7. the method as described in claim 1, which is characterized in that further include:
Second verification information is issued to the unmanned vehicle;
The unmanned vehicle judges that whether true the identity of management and control platform is legal according to second verification information;If so, connecing The control extension instruction that the management and control platform is sent is received, and control extension instruction is decrypted, obtains control instruction.
8. the method for claim 7, which is characterized in that it is described that control extension instruction is decrypted, it is controlled System instructs:
Second verification information is parsed, the second key is obtained;
It is decrypted using control extension instruction described in second key pair, obtains the control instruction.
9. a kind of safety communication device of unmanned vehicle information, which is characterized in that described device includes:
First receiving module, the first verification information for receiving unmanned vehicle transmission;
Identity judgment module, for judging whether the identity of the unmanned vehicle really closes according to first verification information Method;
Second receiving module receives the unmanned vehicle and sends if the identity for the unmanned vehicle is really legal Unmanned vehicle encryption information;Wherein, the unmanned vehicle encryption information by the unmanned vehicle to acquisition nobody Acquisition is encrypted in aircraft information;
Information deciphering module obtains the unmanned vehicle information for the unmanned vehicle encryption information to be decrypted.
10. a kind of safety communication system of unmanned vehicle information, which is characterized in that the system comprises:
Unmanned vehicle obtains unmanned vehicle encryption information for unmanned vehicle information to be encrypted;And first is tested Card information and the unmanned vehicle encryption information are sent to management and control platform;
The management and control platform, for receiving first verification information;Judge the unmanned flight according to first verification information Whether the identity of device is true legal;If the identity of the unmanned vehicle is really legal, the unmanned vehicle encryption is received Information;And the unmanned vehicle encryption information is decrypted, obtain the unmanned vehicle information.
CN201810431440.0A 2018-05-08 2018-05-08 A kind of safe communication method, the apparatus and system of unmanned vehicle information Pending CN108696517A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810431440.0A CN108696517A (en) 2018-05-08 2018-05-08 A kind of safe communication method, the apparatus and system of unmanned vehicle information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810431440.0A CN108696517A (en) 2018-05-08 2018-05-08 A kind of safe communication method, the apparatus and system of unmanned vehicle information

Publications (1)

Publication Number Publication Date
CN108696517A true CN108696517A (en) 2018-10-23

Family

ID=63847221

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810431440.0A Pending CN108696517A (en) 2018-05-08 2018-05-08 A kind of safe communication method, the apparatus and system of unmanned vehicle information

Country Status (1)

Country Link
CN (1) CN108696517A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109951454A (en) * 2019-02-26 2019-06-28 深圳飞马机器人科技有限公司 Unmanned plane identity identifying method, system and terminal
CN111341155A (en) * 2020-03-20 2020-06-26 中国人民解放军空军研究院战略预警研究所 Route transmission and processing system between flight information systems
WO2020132978A1 (en) * 2018-12-26 2020-07-02 深圳市大疆创新科技有限公司 Encrypted communication method, apparatus and system, and computer storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104980281A (en) * 2015-07-07 2015-10-14 余江 Unmanned aircraft-based method, device and system for article delivery
CN106716973A (en) * 2016-11-22 2017-05-24 深圳市大疆创新科技有限公司 Control method and ground control terminal of unmanned aerial vehicle
CN107615358A (en) * 2015-03-31 2018-01-19 深圳市大疆创新科技有限公司 For identifying the Verification System and method of authorized participant

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107615358A (en) * 2015-03-31 2018-01-19 深圳市大疆创新科技有限公司 For identifying the Verification System and method of authorized participant
CN104980281A (en) * 2015-07-07 2015-10-14 余江 Unmanned aircraft-based method, device and system for article delivery
CN106716973A (en) * 2016-11-22 2017-05-24 深圳市大疆创新科技有限公司 Control method and ground control terminal of unmanned aerial vehicle

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020132978A1 (en) * 2018-12-26 2020-07-02 深圳市大疆创新科技有限公司 Encrypted communication method, apparatus and system, and computer storage medium
CN109951454A (en) * 2019-02-26 2019-06-28 深圳飞马机器人科技有限公司 Unmanned plane identity identifying method, system and terminal
CN111341155A (en) * 2020-03-20 2020-06-26 中国人民解放军空军研究院战略预警研究所 Route transmission and processing system between flight information systems
CN111341155B (en) * 2020-03-20 2021-08-17 中国人民解放军空军研究院战略预警研究所 Route transmission and processing system between flight information systems

Similar Documents

Publication Publication Date Title
CN109309565B (en) Security authentication method and device
EP3314808B1 (en) Binding a trusted input session to a trusted output session
WO2015180691A1 (en) Key agreement method and device for verification information
CN109257328B (en) Safe interaction method and device for field operation and maintenance data
CN105553951A (en) Data transmission method and data transmission device
CN107679847B (en) Mobile transaction privacy protection method based on near field communication bidirectional identity authentication
CN102065148A (en) Memory system access authorizing method based on communication network
CN105450406A (en) Data processing method and device
US9215070B2 (en) Method for the cryptographic protection of an application
CN109088848A (en) A kind of intelligent network connection automobile information method for security protection
CN105227537A (en) Method for authenticating user identity, terminal and service end
WO2015180689A1 (en) Method and apparatus for acquiring verification information
CN111343613A (en) Method and apparatus to establish secure low energy wireless communication in a process control system
CN108696517A (en) A kind of safe communication method, the apparatus and system of unmanned vehicle information
CN104424446A (en) Safety verification and transmission method and system
CN105447715A (en) Method and apparatus for anti-theft electronic coupon sweeping by cooperating with third party
CN111274578A (en) Data safety protection system and method for video monitoring system
CN105407467A (en) Short message encryption methods, devices and system
CN107026730B (en) Data processing method, device and system
CN109451504B (en) Internet of things module authentication method and system
KR102219086B1 (en) HMAC-based source authentication and secret key sharing method and system for Unnamed Aerial vehicle systems
CN104468478A (en) Mail encryption method
KR101358375B1 (en) Prevention security system and method for smishing
CN104936172A (en) Beidou positioning data transmission encryption system
CN109246148A (en) Message processing method, device, system, equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181023

RJ01 Rejection of invention patent application after publication