CN106797387B - Equipment authentication method and device, authentication equipment, unmanned aerial vehicle and remote controller - Google Patents

Equipment authentication method and device, authentication equipment, unmanned aerial vehicle and remote controller Download PDF

Info

Publication number
CN106797387B
CN106797387B CN201680002825.4A CN201680002825A CN106797387B CN 106797387 B CN106797387 B CN 106797387B CN 201680002825 A CN201680002825 A CN 201680002825A CN 106797387 B CN106797387 B CN 106797387B
Authority
CN
China
Prior art keywords
authentication
aerial vehicle
unmanned aerial
remote controller
operation result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201680002825.4A
Other languages
Chinese (zh)
Other versions
CN106797387A (en
Inventor
吴军
丘华良
尤中乾
梁泰文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SZ DJI Technology Co Ltd
Original Assignee
SZ DJI Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SZ DJI Technology Co Ltd filed Critical SZ DJI Technology Co Ltd
Publication of CN106797387A publication Critical patent/CN106797387A/en
Application granted granted Critical
Publication of CN106797387B publication Critical patent/CN106797387B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C17/00Arrangements for transmitting signals characterised by the use of a wireless electrical link
    • G08C17/02Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Selective Calling Equipment (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a device authentication method, a device, authentication equipment, an unmanned aerial vehicle and a remote controller, wherein the method comprises the following steps: the authentication equipment sends authentication data to the unmanned aerial vehicle so that the unmanned aerial vehicle forwards the authentication data to the remote controller, and the authentication data is used for enabling the remote controller to carry out encryption operation on the authentication data by adopting a secret key contained in the encryption authentication chip so as to obtain an operation result; wherein, an encryption authentication chip is embedded in the remote controller; the authentication equipment receives the operation result forwarded by the remote controller through the unmanned aerial vehicle; the authentication device determines that the unmanned aerial vehicle can communicate when determining that the operation result is correct. The authentication equipment realizes authentication of the unmanned aerial vehicle and the remote controller only by using the encryption authentication chip implanted in the remote controller in a remote authentication mode, saves authentication cost and improves authentication processing efficiency.

Description

Equipment authentication method and device, authentication equipment, unmanned aerial vehicle and remote controller
Technical Field
The embodiment of the invention relates to the technical field of unmanned aerial vehicles, in particular to a device authentication method and device, authentication equipment, an unmanned aerial vehicle and a remote controller.
Background
At present, the mode that the user generally operated unmanned aerial vehicle uses the remote controller, realizes the flight control to unmanned aerial vehicle through the mode of remote control. Taking aerial photography, which is a main application of the unmanned aerial vehicle, as an example, in order to facilitate a user to view an image shot by the unmanned aerial vehicle in real time through user terminal equipment such as a smart phone, a Personal Computer (PC), a tablet personal computer and the like, taking the smart phone as an example, the smart phone and a remote controller can be connected at present, so that the smart phone can receive the image shot by the unmanned aerial vehicle through the remote controller.
And the premise that the smart phone can receive the image picture is that the smart phone can communicate with the unmanned aerial vehicle and the remote controller. Therefore, in order to ensure that the user terminal device such as a smart phone can receive the image shot by the unmanned aerial vehicle or can perform flight control on the unmanned aerial vehicle, the user terminal device needs to authenticate the unmanned aerial vehicle and the remote controller to determine that the user terminal device can communicate with the user terminal device.
The authentication method adopted at present is as follows: the encryption authentication chip is implanted in both the unmanned aerial vehicle and the remote controller, and based on the encryption authentication chip, the user terminal equipment respectively realizes authentication of the unmanned aerial vehicle and the remote controller.
In the above authentication mode, the encryption authentication chip is required to be implanted in both the unmanned aerial vehicle and the remote controller, so that not only the hardware cost is increased, but also the authentication processing efficiency is lower in the mode of one-by-one authentication.
Disclosure of Invention
The embodiment of the invention provides an equipment authentication method and device, authentication equipment, an unmanned aerial vehicle and a remote controller, which realize high-efficiency authentication of different equipment in an unmanned aerial vehicle system and reduce hardware cost in a remote authentication mode.
A first aspect of the present invention provides an apparatus authentication method, including:
the authentication equipment sends authentication data to the unmanned aerial vehicle so that the unmanned aerial vehicle forwards the authentication data to the remote controller, and the authentication data is used for enabling the remote controller to carry out encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip so as to obtain an operation result; the remote controller is embedded with the encryption authentication chip;
the authentication equipment receives the operation result forwarded by the remote controller through the unmanned aerial vehicle;
and when the authentication equipment determines that the operation result is correct, the authentication equipment determines that the authentication equipment can communicate with the unmanned aerial vehicle.
With reference to the first aspect, in a first possible implementation manner of the first aspect, when determining that the operation result is correct, the determining, by the authentication device, that communication with the drone is possible includes:
the authentication equipment calculates the authentication data according to a locally stored encryption authentication algorithm to obtain a target calculation result;
the authentication device determines that communication with the unmanned aerial vehicle is possible when it is determined that the operation result is consistent with the target operation result.
With reference to the first aspect, in a second possible implementation manner of the first aspect, when determining that the operation result is correct, the determining, by the authentication device, that communication with the drone is possible includes:
the authentication equipment decrypts the operation result;
and the authentication equipment determines that the unmanned aerial vehicle can communicate when determining that the decryption result is consistent with the authentication data.
With reference to the first aspect, in a third possible implementation manner of the first aspect, the method further includes:
and the authentication equipment authenticates the remote controller according to the encryption authentication chip implanted in the remote controller.
With reference to the first aspect, the first, second, or third possible implementation manner of the first aspect, in a fourth possible implementation manner of the first aspect, the authentication device is connected to the drone, and the method further includes:
the authentication equipment directly receives data information sent by the unmanned aerial vehicle to the authentication equipment, and the data information comprises image data.
With reference to the first aspect, the first, second, or third possible implementation manner of the first aspect, in a fifth possible implementation manner of the first aspect, the authentication device is connected to the drone, and the method further includes:
the authentication equipment directly sends an unmanned aerial vehicle upgrading instruction to the unmanned aerial vehicle so that the unmanned aerial vehicle executes the unmanned aerial vehicle upgrading instruction to complete corresponding upgrading operation.
With reference to the first aspect, the first, second, or third possible implementation manner of the first aspect, in a sixth possible implementation manner of the first aspect, the authentication device is connected to the drone, and the method further includes:
the authentication equipment directly sends a remote controller upgrading instruction to the unmanned aerial vehicle, so that the unmanned aerial vehicle forwards the remote controller upgrading instruction to the remote controller, the remote controller executes the remote controller upgrading instruction, and corresponding upgrading operation is completed.
A second aspect of the present invention provides an apparatus authentication method, including:
the unmanned aerial vehicle receives authentication data sent by the authentication equipment;
the unmanned aerial vehicle sends the authentication data to a remote controller so that the remote controller carries out encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted into the remote controller;
the unmanned aerial vehicle receives the operation result sent by the remote controller, sends the operation result to the authentication equipment, and determines that the unmanned aerial vehicle can communicate with the authentication equipment when the operation result is determined to be correct.
With reference to the second aspect, in a first possible implementation manner of the second aspect, the drone is connected with the authentication device, and the method further includes:
the unmanned aerial vehicle directly sends data information to the authentication equipment, and the data information comprises image data.
With reference to the second aspect, in a second possible implementation manner of the second aspect, the drone is connected with the authentication device, and the method further includes:
the unmanned aerial vehicle directly receives the unmanned aerial vehicle upgrading instruction sent by the authentication equipment, executes the unmanned aerial vehicle upgrading instruction, and completes corresponding upgrading operation.
With reference to the second aspect, in a third possible implementation manner of the second aspect, the drone is connected with the authentication device, and the method further includes:
the unmanned aerial vehicle directly receives the remote controller upgrading instruction sent by the authentication equipment, and forwards the remote controller upgrading instruction to the remote controller, so that the remote controller executes the remote controller upgrading instruction to complete corresponding upgrading operation.
A third aspect of the present invention provides a device authentication method, including:
the method comprises the steps that a remote controller receives authentication data sent by an unmanned aerial vehicle, wherein the authentication data are sent to the unmanned aerial vehicle by authentication equipment and forwarded by the unmanned aerial vehicle;
the remote controller adopts a secret key contained in an encryption authentication chip to carry out encryption operation on the authentication data to obtain an operation result, and the encryption authentication chip is implanted into the remote controller;
the remote controller sends the operation result to the unmanned aerial vehicle so that the unmanned aerial vehicle forwards the operation result to the authentication equipment, and the operation result is used for enabling the authentication equipment to determine that the authentication equipment can communicate with the unmanned aerial vehicle when the operation result is determined to be correct.
With reference to the third aspect, in a first possible implementation manner of the third aspect, the encryption authentication chip implanted in the remote controller is further configured to enable the authentication device to authenticate the remote controller according to the encryption authentication chip.
With reference to the third aspect, in a second possible implementation manner of the third aspect, the method further includes:
the remote controller receives a remote controller upgrading instruction which is sent by the authentication equipment and forwarded by the unmanned aerial vehicle, executes the remote controller upgrading instruction, and completes corresponding upgrading operation.
A fourth aspect of the present invention provides another device authentication method, including:
the authentication equipment sends authentication data to a remote controller so that the remote controller forwards the authentication data to the unmanned aerial vehicle, and the authentication data is used for enabling the unmanned aerial vehicle to carry out encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip so as to obtain an operation result; the unmanned aerial vehicle is implanted with the encryption authentication chip;
the authentication equipment receives the operation result forwarded by the unmanned aerial vehicle through the remote controller;
and when the authentication equipment determines that the operation result is correct, the authentication equipment determines that the authentication equipment can communicate with the remote controller.
With reference to the fourth aspect, in a first possible implementation manner of the fourth aspect, the determining, by the authentication device, that communication with the remote controller is possible when the operation result is determined to be correct includes:
the authentication equipment calculates the authentication data according to a locally stored encryption authentication algorithm to obtain a target calculation result;
the authentication device determines that communication with the remote controller is possible when it is determined that the operation result coincides with the target operation result.
With reference to the fourth aspect, in a second possible implementation manner of the fourth aspect, the determining, by the authentication device, that communication with the remote controller is possible when the operation result is determined to be correct includes:
the authentication equipment decrypts the operation result;
the authentication device determines that communication with the remote controller is possible when it is determined that the decryption result coincides with the authentication data.
With reference to the fourth aspect, in a third possible implementation manner of the fourth aspect, the authentication device is connected to the remote controller, and the method further includes:
the authentication equipment directly sends a remote controller upgrading instruction to the remote controller so that the remote controller executes the remote controller upgrading instruction to complete corresponding upgrading operation.
With reference to the fourth aspect, in a fourth possible implementation manner of the fourth aspect, the authentication device is connected to the remote controller, and the method further includes:
the authentication equipment directly sends an unmanned aerial vehicle upgrading instruction to the remote controller, so that the remote controller forwards the unmanned aerial vehicle upgrading instruction to the unmanned aerial vehicle, the unmanned aerial vehicle executes the unmanned aerial vehicle upgrading instruction, and corresponding upgrading operation is completed.
With reference to the fourth aspect, in a fifth possible implementation manner of the fourth aspect, the authentication device is connected to the drone, and the method further includes:
the authentication equipment directly receives data information sent by the unmanned aerial vehicle to the authentication equipment, and the data information comprises image data.
With reference to the fourth aspect, in a sixth possible implementation of the fourth aspect, the authentication device is connected to the drone, and the method further includes:
the authentication equipment directly sends an unmanned aerial vehicle upgrading instruction to the unmanned aerial vehicle so that the unmanned aerial vehicle executes the unmanned aerial vehicle upgrading instruction to complete corresponding upgrading operation.
With reference to the fourth aspect, in a seventh possible implementation manner of the fourth aspect, the method further includes:
the authentication equipment authenticates the unmanned aerial vehicle according to the encryption authentication chip implanted in the unmanned aerial vehicle.
A fifth aspect of the present invention provides an apparatus authentication method, including:
the remote controller receives authentication data sent by the authentication equipment;
the remote controller sends the authentication data to the unmanned aerial vehicle so that the unmanned aerial vehicle carries out encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted into the unmanned aerial vehicle;
the remote controller receives the operation result sent by the unmanned aerial vehicle, sends the operation result to the authentication equipment, and determines that the remote controller can communicate with the authentication equipment when the operation result is determined to be correct.
With reference to the fifth aspect, in a first possible implementation manner of the fifth aspect, the remote controller is connected to the authentication device, and the method further includes:
and the remote controller directly receives a remote controller upgrading instruction sent by the authentication equipment, executes the remote controller upgrading instruction and completes corresponding upgrading operation.
With reference to the fifth aspect, in a second possible implementation manner of the fifth aspect, the remote controller is connected to the authentication device, and the method further includes:
the remote controller directly receives the unmanned aerial vehicle upgrading instruction sent by the authentication equipment, and forwards the unmanned aerial vehicle upgrading instruction to the unmanned aerial vehicle, so that the unmanned aerial vehicle executes the unmanned aerial vehicle upgrading instruction to complete corresponding upgrading operation.
A sixth aspect of the present invention provides an apparatus authentication method, including:
the unmanned aerial vehicle receives authentication data sent by a remote controller, wherein the authentication data is sent to the remote controller by authentication equipment and forwarded by the remote controller;
the unmanned aerial vehicle adopts a secret key contained in an encryption authentication chip to carry out encryption operation on the authentication data to obtain an operation result, and the encryption authentication chip is implanted into the unmanned aerial vehicle;
the unmanned aerial vehicle sends the operation result to the remote controller so that the remote controller forwards the operation result to the authentication equipment, and the operation result is used for ensuring that the authentication equipment can communicate with the remote controller when the authentication equipment determines that the operation result is correct.
With reference to the sixth aspect, in a first possible implementation manner of the sixth aspect, the encryption authentication chip implanted in the drone is further configured to enable the authentication device to authenticate the drone according to the encryption authentication chip.
With reference to the sixth aspect or the first possible implementation manner of the sixth aspect, in a second possible implementation manner of the sixth aspect, the drone is connected with the authentication device, and the method further includes:
the unmanned aerial vehicle directly sends data information to the authentication equipment, and the data information comprises image data.
With reference to the sixth aspect or the first possible implementation manner of the sixth aspect, in a third possible implementation manner of the sixth aspect, the drone is connected with the authentication device, and the method further includes:
the unmanned aerial vehicle directly receives the unmanned aerial vehicle upgrading instruction sent by the authentication equipment, executes the unmanned aerial vehicle upgrading instruction, and completes corresponding upgrading operation.
With reference to the sixth aspect or the first possible implementation manner of the sixth aspect, in a fourth possible implementation manner of the sixth aspect, the remote controller is connected to the authentication apparatus, and the method further includes:
the unmanned aerial vehicle receives the unmanned aerial vehicle upgrading instruction which is sent by the authentication equipment and forwarded by the unmanned aerial vehicle, executes the unmanned aerial vehicle upgrading instruction, and completes corresponding upgrading operation.
A seventh aspect of the present invention provides a device authentication apparatus provided in an authentication device, the device authentication apparatus including:
the remote controller comprises a sending module, a remote controller and an authentication module, wherein the sending module is used for sending authentication data to the unmanned aerial vehicle so that the unmanned aerial vehicle forwards the authentication data to the remote controller, and the authentication data is used for enabling the remote controller to carry out encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip so as to obtain an operation result; the remote controller is embedded with the encryption authentication chip;
the receiving module is used for receiving the operation result forwarded by the remote controller through the unmanned aerial vehicle;
and the processing module is used for determining that the unmanned aerial vehicle can communicate with the processing module when the operation result is determined to be correct.
With reference to the seventh aspect, in a first possible implementation manner of the seventh aspect, the processing module is specifically configured to: calculating the authentication data according to a locally stored encryption authentication algorithm to obtain a target calculation result;
determining that communication with the unmanned aerial vehicle is possible when it is determined that the operation result is consistent with the target operation result.
With reference to the seventh aspect, in a second possible implementation manner of the seventh aspect, the processing module is specifically configured to:
decrypting the operation result;
determining that communication with the drone is possible when it is determined that the decryption result is consistent with the authentication data.
With reference to the seventh aspect, in a third possible implementation manner of the seventh aspect, the processing module is further configured to:
and authenticating the remote controller according to the encryption authentication chip implanted in the remote controller.
With reference to the seventh aspect, the first, second, or third possible implementation manner of the seventh aspect, in a fourth possible implementation manner of the seventh aspect, the authentication device is connected to the drone, and the receiving module is further configured to:
and directly receiving data information sent by the unmanned aerial vehicle, wherein the data information comprises image data.
With reference to the seventh aspect, the first, second, or third possible implementation manner of the seventh aspect, in a fifth possible implementation manner of the seventh aspect, the authentication device is connected to the drone, and the sending module is further configured to:
directly to unmanned aerial vehicle sends unmanned aerial vehicle upgrading instruction, so that unmanned aerial vehicle carries out unmanned aerial vehicle upgrading instruction accomplishes corresponding upgrading operation.
With reference to the seventh aspect, the first, second, or third possible implementation manner of the seventh aspect, in a sixth possible implementation manner of the seventh aspect, the authentication device is connected to the drone, and the sending module is further configured to:
and directly sending a remote controller upgrading instruction to the unmanned aerial vehicle so that the unmanned aerial vehicle forwards the remote controller upgrading instruction to the remote controller, and the remote controller executes the remote controller upgrading instruction to complete corresponding upgrading operation.
An eighth aspect of the present invention provides an apparatus authentication device provided in an unmanned aerial vehicle, the apparatus authentication device including:
the receiving module is used for receiving authentication data sent by the authentication equipment;
the sending module is used for sending the authentication data to a remote controller so that the remote controller carries out encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted into the remote controller;
the receiving module is further configured to receive the operation result sent by the remote controller, send the operation result to the authentication device, and determine that communication with the authentication device is possible when the operation result is determined to be correct.
With reference to the eighth aspect, in a first possible implementation manner of the eighth aspect, the drone is connected to the authentication device, and the sending module is further configured to:
and directly sending data information to the authentication device, wherein the data information comprises image data.
With reference to the eighth aspect, in a second possible implementation manner of the eighth aspect, the drone is connected to the authentication device, and the receiving module is further configured to:
directly receiving an unmanned aerial vehicle upgrading instruction sent by the authentication equipment;
the device further comprises:
and the processing module is used for executing the unmanned aerial vehicle upgrading instruction and finishing corresponding upgrading operation.
With reference to the eighth aspect, in a third possible implementation manner of the eighth aspect, the drone is connected to the authentication device, and the receiving module is further configured to:
directly receiving a remote controller upgrading instruction sent by the authentication equipment;
the sending module is further configured to: and forwarding the remote controller upgrading instruction to the remote controller, so that the remote controller executes the remote controller upgrading instruction to complete corresponding upgrading operation.
A ninth aspect of the present invention provides an apparatus authentication device provided in a remote controller, the apparatus authentication device comprising:
the receiving module is used for receiving authentication data sent by the unmanned aerial vehicle, wherein the authentication data is sent to the unmanned aerial vehicle by authentication equipment and forwarded by the unmanned aerial vehicle;
the processing module is used for carrying out encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted into the remote controller;
the sending module is used for sending the operation result to the unmanned aerial vehicle so that the unmanned aerial vehicle forwards the operation result to the authentication equipment, and the operation result is used for ensuring that the authentication equipment can communicate with the unmanned aerial vehicle when the authentication equipment determines that the operation result is correct.
With reference to the ninth aspect, in a first possible implementation manner of the ninth aspect, the encryption authentication chip implanted in the remote controller is further configured to enable the authentication device to authenticate the remote controller according to the encryption authentication chip.
With reference to the ninth aspect, in a second possible implementation manner of the ninth aspect, the receiving module is further configured to:
receiving a remote controller upgrading instruction which is sent from the authentication equipment and forwarded by the unmanned aerial vehicle;
the processing module is further configured to: and executing the remote controller upgrading instruction to complete corresponding upgrading operation.
A tenth aspect of the present invention provides an apparatus authentication device provided in an authentication apparatus, the apparatus authentication device comprising:
the remote controller comprises a sending module, a receiving module and a processing module, wherein the sending module is used for sending authentication data to the remote controller so that the remote controller forwards the authentication data to the unmanned aerial vehicle, and the authentication data is used for enabling the unmanned aerial vehicle to carry out encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip so as to obtain an operation result; the unmanned aerial vehicle is implanted with the encryption authentication chip;
the receiving module is used for receiving the operation result forwarded by the unmanned aerial vehicle through the remote controller;
and the processing module is used for determining that the remote controller can be communicated when the operation result is determined to be correct.
With reference to the tenth aspect, in a first possible implementation manner of the tenth aspect, the processing module is specifically configured to:
calculating the authentication data according to a locally stored encryption authentication algorithm to obtain a target calculation result;
determining that communication with the remote controller is possible when it is determined that the operation result coincides with the target operation result.
With reference to the tenth aspect, in a second possible implementation manner of the tenth aspect, the processing module is specifically configured to:
decrypting the operation result;
determining that communication with the remote controller is possible when it is determined that the decryption result coincides with the authentication data.
With reference to the tenth aspect, in a third possible implementation manner of the tenth aspect, the authentication device is connected to the remote controller, and the sending module is further configured to:
and directly sending a remote controller upgrading instruction to the remote controller so that the remote controller executes the remote controller upgrading instruction to complete corresponding upgrading operation.
With reference to the tenth aspect, in a fourth possible implementation manner of the tenth aspect, the authentication device is connected to the remote controller, and the sending module is further configured to:
directly to the remote controller sends unmanned aerial vehicle upgrading instruction, so that the remote controller will unmanned aerial vehicle upgrading instruction forwards to unmanned aerial vehicle makes unmanned aerial vehicle carries out unmanned aerial vehicle upgrading instruction accomplishes corresponding upgrading operation.
With reference to the tenth aspect, in a fifth possible implementation manner of the tenth aspect, the authentication device is connected to the drone, and the receiving module is further configured to:
and directly receiving data information sent by the unmanned aerial vehicle to the authentication equipment, wherein the data information comprises image data.
With reference to the tenth aspect, in a sixth possible implementation manner of the tenth aspect, the authentication device is connected to the drone, and the sending module is further configured to:
directly to unmanned aerial vehicle sends unmanned aerial vehicle upgrading instruction, so that unmanned aerial vehicle carries out unmanned aerial vehicle upgrading instruction accomplishes corresponding upgrading operation.
With reference to the tenth aspect, in a seventh possible implementation manner of the tenth aspect, the processing module is further configured to:
and authenticating the unmanned aerial vehicle according to the encryption authentication chip implanted in the unmanned aerial vehicle.
An eleventh aspect of the present invention provides an apparatus for authenticating a device in an unmanned aerial vehicle system, the apparatus being provided in a remote controller, the apparatus comprising:
the receiving module is used for receiving authentication data sent by the authentication equipment;
the sending module is used for sending the authentication data to the unmanned aerial vehicle so that the unmanned aerial vehicle can carry out encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted into the unmanned aerial vehicle;
the receiving module is further configured to receive the operation result sent by the unmanned aerial vehicle, send the operation result to the authentication device, and determine that communication with the authentication device is possible when the operation result is determined to be correct.
With reference to the eleventh aspect, in a first possible implementation manner of the eleventh aspect, the remote controller is connected to the authentication device, and the receiving module is further configured to:
directly receiving a remote controller upgrading instruction sent by the authentication equipment;
the device further comprises:
and the processing module is used for executing the remote controller upgrading instruction and finishing the corresponding upgrading operation.
With reference to the eleventh aspect, in a second possible implementation manner of the eleventh aspect, the remote controller is connected to the authentication device, and the receiving module is further configured to:
directly receiving an unmanned aerial vehicle upgrading instruction sent by the authentication equipment;
the sending module is further configured to: and forwarding the unmanned aerial vehicle upgrading instruction to the unmanned aerial vehicle so that the unmanned aerial vehicle executes the unmanned aerial vehicle upgrading instruction to complete corresponding upgrading operation.
A twelfth aspect of the present invention provides an apparatus for authenticating a device in an unmanned aerial vehicle system, the apparatus being provided in an unmanned aerial vehicle, the apparatus comprising:
the remote controller comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving authentication data sent by the remote controller, and the authentication data is sent to the remote controller by authentication equipment and forwarded by the remote controller;
the processing module is used for carrying out encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted into the unmanned aerial vehicle;
the sending module is used for sending the operation result to the remote controller so that the remote controller forwards the operation result to the authentication equipment, and the operation result is used for ensuring that the authentication equipment can communicate with the remote controller when the authentication equipment determines that the operation result is correct.
With reference to the twelfth aspect, in a first possible implementation manner of the twelfth aspect, the encryption authentication chip implanted in the drone is further configured to enable the authentication device to authenticate the drone according to the encryption authentication chip.
With reference to the twelfth aspect or the first possible implementation manner of the twelfth aspect, in a second possible implementation manner of the twelfth aspect, the drone is connected to the authentication device, and the sending module is further configured to:
and directly sending data information to the authentication device, wherein the data information comprises image data.
With reference to the twelfth aspect or the first possible implementation manner of the twelfth aspect, in a second possible implementation manner of the twelfth aspect, the drone is connected to the authentication device, and the receiving module is further configured to:
directly receiving an unmanned aerial vehicle upgrading instruction sent by the authentication equipment;
the processing module is further configured to: and executing the unmanned aerial vehicle upgrading instruction to complete corresponding upgrading operation.
With reference to the twelfth aspect or the first possible implementation manner of the twelfth aspect, in a third possible implementation manner of the twelfth aspect, the remote controller is connected to the authentication device, and the receiving module is further configured to:
receiving an unmanned aerial vehicle upgrading instruction which is sent from the authentication equipment and forwarded by the unmanned aerial vehicle;
the processing module is further configured to: and executing the unmanned aerial vehicle upgrading instruction to complete corresponding upgrading operation.
A thirteenth aspect of the present invention provides an authentication apparatus comprising:
the transmitter is used for transmitting authentication data to the unmanned aerial vehicle so that the unmanned aerial vehicle can forward the authentication data to the remote controller, and the authentication data is used for enabling the remote controller to carry out encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip so as to obtain an operation result; the remote controller is embedded with the encryption authentication chip;
the receiver is used for receiving the operation result forwarded by the remote controller through the unmanned aerial vehicle;
and the processor is used for determining that the unmanned aerial vehicle can communicate with the unmanned aerial vehicle when the operation result is determined to be correct.
With reference to the thirteenth aspect, in a first possible implementation manner of the thirteenth aspect, the processor is specifically configured to: calculating the authentication data according to a locally stored encryption authentication algorithm to obtain a target calculation result;
determining that communication with the unmanned aerial vehicle is possible when it is determined that the operation result is consistent with the target operation result.
With reference to the thirteenth aspect, in a second possible implementation manner of the thirteenth aspect, the processor is specifically configured to:
decrypting the operation result;
determining that communication with the drone is possible when it is determined that the decryption result is consistent with the authentication data.
With reference to the thirteenth aspect, in a third possible implementation manner of the thirteenth aspect, the processor is further configured to:
and authenticating the remote controller according to the encryption authentication chip implanted in the remote controller.
With reference to the thirteenth aspect, the first, second or third possible implementation manner of the thirteenth aspect, in a fourth possible implementation manner of the thirteenth aspect, the authentication device is connected to the drone, and the receiver is further configured to:
and directly receiving data information sent by the unmanned aerial vehicle, wherein the data information comprises image data.
With reference to the thirteenth aspect, the first, second or third possible implementation manner of the thirteenth aspect, in a fifth possible implementation manner of the thirteenth aspect, the authentication device is connected to the drone, and the transmitter is further configured to:
directly to unmanned aerial vehicle sends unmanned aerial vehicle upgrading instruction, so that unmanned aerial vehicle carries out unmanned aerial vehicle upgrading instruction accomplishes corresponding upgrading operation.
With reference to the thirteenth aspect, the first, second or third possible implementation manner of the thirteenth aspect, in a sixth possible implementation manner of the thirteenth aspect, the authentication device is connected to the drone, and the transmitter is further configured to:
and directly sending a remote controller upgrading instruction to the unmanned aerial vehicle so that the unmanned aerial vehicle forwards the remote controller upgrading instruction to the remote controller, and the remote controller executes the remote controller upgrading instruction to complete corresponding upgrading operation.
A fourteenth aspect of the present invention provides an unmanned aerial vehicle, comprising:
a receiver for receiving authentication data transmitted by an authentication device;
the transmitter is used for transmitting the authentication data to a remote controller so that the remote controller carries out encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted into the remote controller;
the receiver is further configured to receive the operation result sent by the remote controller, send the operation result to the authentication device, and determine that communication with the authentication device is possible when the operation result is determined to be correct.
With reference to the fourteenth aspect, in a first possible implementation manner of the fourteenth aspect, the drone is connected to the authentication device, and the transmitter is further configured to:
and directly sending data information to the authentication device, wherein the data information comprises image data.
With reference to the fourteenth aspect, in a second possible implementation manner of the fourteenth aspect, the drone is connected to the authentication device, and the receiver is further configured to:
directly receiving an unmanned aerial vehicle upgrading instruction sent by the authentication equipment;
the unmanned aerial vehicle still includes:
and the processor is used for executing the unmanned aerial vehicle upgrading instruction and finishing corresponding upgrading operation.
With reference to the fourteenth aspect, in a third possible implementation manner of the fourteenth aspect, the drone is connected to the authentication device, and the receiver is further configured to:
directly receiving a remote controller upgrading instruction sent by the authentication equipment;
the transmitter is further configured to: and forwarding the remote controller upgrading instruction to the remote controller, so that the remote controller executes the remote controller upgrading instruction to complete corresponding upgrading operation.
A fifteenth aspect of the present invention provides a remote controller comprising:
the receiver is used for receiving authentication data sent by the unmanned aerial vehicle, wherein the authentication data is sent to the unmanned aerial vehicle by the authentication equipment and forwarded by the unmanned aerial vehicle;
the processor is used for carrying out encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted into the remote controller;
the sender is used for sending the operation result to the unmanned aerial vehicle so that the unmanned aerial vehicle forwards the operation result to the authentication equipment, and the operation result is used for enabling the authentication equipment to determine that the authentication equipment can communicate with the unmanned aerial vehicle when the operation result is determined to be correct by the authentication equipment.
With reference to the fifteenth aspect, in a first possible implementation manner of the fifteenth aspect, the encryption authentication chip implanted in the remote controller is further configured to enable the authentication device to authenticate the remote controller according to the encryption authentication chip.
With reference to the fifteenth aspect, in a second possible implementation manner of the fifteenth aspect, the receiver is further configured to:
receiving a remote controller upgrading instruction which is sent from the authentication equipment and forwarded by the unmanned aerial vehicle;
the processor is further configured to: and executing the remote controller upgrading instruction to complete corresponding upgrading operation.
A sixteenth aspect of the present invention provides an authentication apparatus comprising:
the transmitter is used for transmitting authentication data to a remote controller so that the remote controller can forward the authentication data to the unmanned aerial vehicle, and the authentication data is used for enabling the unmanned aerial vehicle to carry out encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip so as to obtain an operation result; the unmanned aerial vehicle is implanted with the encryption authentication chip;
the receiver is used for receiving the operation result forwarded by the unmanned aerial vehicle through the remote controller;
and the processor is used for determining that the remote controller can be communicated when the operation result is determined to be correct.
With reference to the sixteenth aspect, in a first possible implementation manner of the sixteenth aspect, the processor is specifically configured to:
calculating the authentication data according to a locally stored encryption authentication algorithm to obtain a target calculation result;
determining that communication with the remote controller is possible when it is determined that the operation result coincides with the target operation result.
With reference to the sixteenth aspect, in a second possible implementation manner of the sixteenth aspect, the processor is specifically configured to:
decrypting the operation result;
determining that communication with the remote controller is possible when it is determined that the decryption result coincides with the authentication data.
With reference to the sixteenth aspect, in a third possible implementation manner of the sixteenth aspect, the authentication device is connected to the remote controller, and the transmitter is further configured to:
and directly sending a remote controller upgrading instruction to the remote controller so that the remote controller executes the remote controller upgrading instruction to complete corresponding upgrading operation.
With reference to the sixteenth aspect, in a fourth possible implementation manner of the sixteenth aspect, the authentication device is connected to the remote controller, and the transmitter is further configured to:
directly to the remote controller sends unmanned aerial vehicle upgrading instruction, so that the remote controller will unmanned aerial vehicle upgrading instruction forwards to unmanned aerial vehicle makes unmanned aerial vehicle carries out unmanned aerial vehicle upgrading instruction accomplishes corresponding upgrading operation.
With reference to the sixteenth aspect, in a fifth possible implementation manner of the sixteenth aspect, the authentication device is connected to the drone, and the receiver is further configured to:
and directly receiving data information sent by the unmanned aerial vehicle to the authentication equipment, wherein the data information comprises image data.
With reference to the sixteenth aspect, in a sixth possible implementation manner of the sixteenth aspect, the authentication device is connected to the drone, and the transmitter is further configured to:
directly to unmanned aerial vehicle sends unmanned aerial vehicle upgrading instruction, so that unmanned aerial vehicle carries out unmanned aerial vehicle upgrading instruction accomplishes corresponding upgrading operation.
With reference to the sixteenth aspect, in a seventh possible implementation manner of the sixteenth aspect, the processor is further configured to:
and authenticating the unmanned aerial vehicle according to the encryption authentication chip implanted in the unmanned aerial vehicle.
A seventeenth aspect of the present invention provides a remote controller comprising:
a receiver for receiving authentication data transmitted by an authentication device;
the transmitter is used for transmitting the authentication data to the unmanned aerial vehicle so that the unmanned aerial vehicle can perform encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted into the unmanned aerial vehicle;
the receiver is further configured to receive the operation result sent by the unmanned aerial vehicle, send the operation result to the authentication device, and determine that communication with the authentication device is possible when the operation result is determined to be correct.
With reference to the seventeenth aspect, in a first possible implementation manner of the seventeenth aspect, the remote controller is connected to the authentication device, and the receiver is further configured to:
directly receiving a remote controller upgrading instruction sent by the authentication equipment;
the remote controller further includes:
and the processor is used for executing the remote controller upgrading instruction and finishing corresponding upgrading operation.
With reference to the seventeenth aspect, in a second possible implementation manner of the seventeenth aspect, the remote controller is connected to the authentication device, and the receiver is further configured to: directly receiving an unmanned aerial vehicle upgrading instruction sent by the authentication equipment;
the transmitter is further configured to: and forwarding the unmanned aerial vehicle upgrading instruction to the unmanned aerial vehicle so that the unmanned aerial vehicle executes the unmanned aerial vehicle upgrading instruction to complete corresponding upgrading operation.
The eighteenth aspect of the present invention is an unmanned aerial vehicle, including:
the receiver is used for receiving authentication data sent by a remote controller, wherein the authentication data is sent to the remote controller by authentication equipment and forwarded by the remote controller;
the processor is used for carrying out encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted into the unmanned aerial vehicle;
the transmitter is used for transmitting the operation result to the remote controller so that the remote controller can transmit the operation result to the authentication equipment, and the operation result is used for ensuring that the authentication equipment can communicate with the remote controller when the authentication equipment determines that the operation result is correct.
With reference to the eighteenth aspect, in a first possible implementation manner of the eighteenth aspect, the encryption authentication chip implanted in the drone is further configured to enable the authentication device to authenticate the drone according to the encryption authentication chip.
With reference to the eighteenth aspect or the first possible implementation manner of the eighteenth aspect, in a second possible implementation manner of the eighteenth aspect, the drone is connected to the authentication device, and the transmitter is further configured to:
and directly sending data information to the authentication device, wherein the data information comprises image data.
With reference to the eighteenth aspect or the first possible implementation manner of the eighteenth aspect, in a third possible implementation manner of the eighteenth aspect, the drone is connected to the authentication device, and the receiver is further configured to:
directly receiving an unmanned aerial vehicle upgrading instruction sent by the authentication equipment;
the processor is further configured to: and executing the unmanned aerial vehicle upgrading instruction to complete corresponding upgrading operation.
With reference to the eighteenth aspect or the first possible implementation manner of the eighteenth aspect, in a fourth possible implementation manner of the eighteenth aspect, the remote controller is connected to the authentication device, and the receiver is further configured to: receiving an unmanned aerial vehicle upgrading instruction which is sent from the authentication equipment and forwarded by the unmanned aerial vehicle;
the processor is further configured to: and executing the unmanned aerial vehicle upgrading instruction to complete corresponding upgrading operation.
According to the equipment authentication method and device, the authentication equipment, the unmanned aerial vehicle and the remote controller, the authentication equipment sends authentication data to the unmanned aerial vehicle so that the unmanned aerial vehicle forwards the authentication data to the remote controller, and the authentication data is used for enabling the remote controller to carry out encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip so as to obtain an operation result; wherein, an encryption authentication chip is embedded in the remote controller; the authentication equipment receives the operation result forwarded by the remote controller through the unmanned aerial vehicle; the authentication device determines that the unmanned aerial vehicle can communicate when determining that the operation result is correct. The authentication equipment realizes authentication of the unmanned aerial vehicle and the remote controller only by using the encryption authentication chip implanted in the remote controller in a remote authentication mode, saves authentication cost and improves authentication processing efficiency.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1(a) is a schematic diagram of an authentication scenario according to an embodiment of the present invention;
fig. 1(b) is a schematic diagram of another authentication scenario provided in the embodiment of the present invention;
fig. 2 is a flowchart of a first embodiment of an apparatus authentication method according to the present invention;
fig. 3 is a flowchart of a second embodiment of an apparatus authentication method according to the present invention;
fig. 4 is a flowchart of a third embodiment of an apparatus authentication method according to the present invention;
fig. 5 is a flowchart of a fourth embodiment of an apparatus authentication method according to the present invention;
fig. 6 is a flowchart of a fifth embodiment of an apparatus authentication method according to an embodiment of the present invention;
fig. 7 is a signaling interaction diagram of a sixth embodiment of an apparatus authentication method according to an embodiment of the present invention;
fig. 8 is a flowchart of a seventh embodiment of an apparatus authentication method according to an embodiment of the present invention;
fig. 9 is a flowchart of an eighth embodiment of an apparatus authentication method according to an embodiment of the present invention;
fig. 10 is a flowchart of a ninth embodiment of a device authentication method according to an embodiment of the present invention;
fig. 11 is a flowchart of a tenth embodiment of an apparatus authentication method according to an embodiment of the present invention;
fig. 12 is a flowchart of an eleventh embodiment of a device authentication method according to an embodiment of the present invention;
fig. 13 is a signaling interaction diagram of a twelfth embodiment of an apparatus authentication method according to an embodiment of the present invention;
fig. 14 is a schematic structural diagram of a first apparatus authentication device according to an embodiment of the present invention;
fig. 15 is a schematic structural diagram of a second apparatus authentication device according to an embodiment of the present invention;
fig. 16 is a schematic structural diagram of a third apparatus authentication device according to an embodiment of the present invention;
fig. 17 is a schematic structural diagram of a fourth apparatus authentication device according to an embodiment of the present invention;
fig. 18 is a schematic structural diagram of a fifth embodiment of an apparatus authentication device according to an embodiment of the present invention;
fig. 19 is a schematic structural diagram of a sixth embodiment of an apparatus authentication device according to an embodiment of the present invention;
fig. 20 is a schematic structural diagram of a first authentication apparatus according to an embodiment of the present invention;
fig. 21 is a schematic structural diagram of a first unmanned aerial vehicle according to an embodiment of the present invention;
fig. 22 is a schematic structural diagram of a first remote controller according to an embodiment of the present invention;
fig. 23 is a schematic structural diagram of a second authentication apparatus according to an embodiment of the present invention;
fig. 24 is a schematic structural diagram of a second remote controller according to an embodiment of the present invention;
fig. 25 is a schematic structural diagram of a second embodiment of the unmanned aerial vehicle according to the embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
First, an authentication scenario applicable to the embodiment of the present invention is described with reference to fig. 1(a) and 1(b), assuming that the drone system includes an authentication device and an authenticated device, where the authenticated device includes a remote controller and a drone. The authentication device is, for example, a terminal device such as a PC, a smartphone terminal, a tablet computer, or the like. In the authentication scenario in the embodiment of the present invention, only one authenticated device is implanted with an encrypted authentication chip.
The connection relationship between the two authenticated devices and the authentication device is as follows: the authentication device can be connected with two authenticated devices respectively in a physical connection mode, and the two authenticated devices can be connected in a wireless or wired communication mode. The physical connection mode is, for example, a serial bus connection mode.
Specifically, fig. 1(a) is a schematic view of an authentication scenario provided by an embodiment of the present invention, in fig. 1(a), an encrypted authentication chip is implanted in a remote controller, wherein an authentication device is connected to an unmanned aerial vehicle in a physical connection manner, for example, through a serial port, and the unmanned aerial vehicle and the remote controller can be wirelessly connected through a wireless link. It is worth explaining that fig. 1(a) only illustrates the physical connection between the authentication device and the unmanned aerial vehicle, and actually, the authentication device may also be physically connected with the remote controller, so that in the authentication scene, the authentication of the unmanned aerial vehicle and the remote controller can be realized only by installing one encryption authentication chip in the remote controller.
Fig. 1(b) is a schematic view of another authentication scenario provided by an embodiment of the present invention, in fig. 1(b), an encrypted authentication chip is implanted in an unmanned aerial vehicle, wherein an authentication device and a remote controller are connected in a physical connection manner, for example, in a serial connection manner, and the unmanned aerial vehicle and the remote controller can be wirelessly connected by establishing a wireless link. It is worth explaining that fig. 1(b) only illustrates the physical connection between the authentication device and the remote controller, and actually, the authentication device can also establish physical connection with the unmanned aerial vehicle, so that in the authentication scene, authentication of the unmanned aerial vehicle and the remote controller can be realized only by installing an encryption authentication chip in the unmanned aerial vehicle.
Hereinafter, referring to fig. 1(a) and fig. 1(b), the device authentication method provided by the present invention will be described with reference to several specific embodiments. Specifically, the device authentication method is described with reference to the authentication scenario illustrated in fig. 1(a) and with reference to the embodiments illustrated in fig. 2 to 7, and the device authentication method is described with reference to the authentication scenario illustrated in fig. 1(b) and with reference to the embodiments illustrated in fig. 8 to 13.
Fig. 2 is a flowchart of a first embodiment of an apparatus authentication method provided in an embodiment of the present invention, and as shown in fig. 2, an execution subject of the scheme is an authentication apparatus, and the method includes the following steps:
step 101, the authentication device sends authentication data to the unmanned aerial vehicle so that the unmanned aerial vehicle forwards the authentication data to the remote controller, and the authentication data is used for enabling the remote controller to perform encryption operation on the authentication data by using a secret key contained in the encryption authentication chip to obtain an operation result.
And 102, the authentication equipment receives the operation result forwarded by the remote controller through the unmanned aerial vehicle.
And 103, when the authentication equipment determines that the operation result is correct, determining that the authentication equipment can communicate with the unmanned aerial vehicle.
The scheme provided by the present embodiment is described with reference to fig. 1(a), so that the authentication device is physically connected to the drone, the drone is wirelessly connected to the remote controller, and the remote controller is implanted with an encryption authentication chip.
How the authentication device realizes authentication of the unmanned aerial vehicle through the encryption authentication chip in the remote controller is described in detail below. Because there is no encryption authentication chip in the drone, the mode of authenticating the drone through the encryption authentication chip in the remote controller can be regarded as a remote authentication mode.
Authentication equipment needs to authenticate unmanned aerial vehicle to when confirming whether can communicate with unmanned aerial vehicle, authentication equipment can be through the physical connection with unmanned aerial vehicle between, send authentication data to unmanned aerial vehicle, and this authentication data can be a string of random number.
Because no encryption authentication chip is installed in the unmanned aerial vehicle, the authentication process cannot be completed independently. Therefore, when receiving the authentication data sent by the authentication device, the drone forwards the authentication data to the remote controller. During specific implementation, the authentication device can carry the authentication data in the authentication request by sending the authentication request to the unmanned aerial vehicle, so that the unmanned aerial vehicle analyzes and obtains the authentication data when receiving the authentication request carrying the authentication data, and forwards the authentication data to the remote controller.
An encryption authentication chip is embedded in the remote controller, and an encryption key is stored in the encryption authentication chip. Therefore, when the remote controller receives the authentication data, the remote controller uses the secret key to perform encryption operation on the received authentication data so as to obtain an operation result, and the operation result is fed back to the unmanned aerial vehicle.
Therefore, the unmanned aerial vehicle forwards the received operation result to the authentication equipment, the authentication equipment carries out correctness verification on the operation result, and if the operation result is correct, the unmanned aerial vehicle passes the authentication and can communicate with the authentication equipment.
Optionally, the correctness verification method may be: the authentication equipment calculates the sent authentication data according to the encryption authentication algorithm stored locally to obtain a target calculation result, and if the calculation result received from the unmanned aerial vehicle is consistent with the target calculation result, the unmanned aerial vehicle is determined to pass the authentication and can communicate with the unmanned aerial vehicle.
Optionally, the correctness verification method may also be implemented based on an asymmetric signature authentication method: the remote controller carries out encryption operation processing based on a secret key (private key) contained in the encryption authentication chip on the authentication data, when the authentication data receives an operation result, the operation result can be decrypted according to the locally stored public key at the authentication equipment, and if the authentication data obtained by decryption is consistent with the authentication data sent by the authentication equipment, the unmanned aerial vehicle is determined to pass authentication and can communicate with the unmanned aerial vehicle.
Based on the remote authentication mode, the authentication equipment can complete the authentication of the unmanned aerial vehicle based on the encryption authentication chip in the remote controller. Meanwhile, in practical application, the unmanned aerial vehicle and the remote controller have a pairing relation, namely the unmanned aerial vehicle and the remote controller are in one-to-one correspondence. Thus, in the case where the drone and the remote controller have established a wireless communication link, it can be considered that the drone and the remote controller have completed a pairing connection. Therefore, when the authentication device receives and verifies that the operation result forwarded by the unmanned aerial vehicle is correct, the authentication device can determine that the unmanned aerial vehicle passes authentication and also determine that the remote controller passes authentication, so that authentication of the unmanned aerial vehicle and the remote controller is completed simultaneously, and the authentication processing efficiency is improved.
In addition, optionally, in order to further improve the reliability of the authentication result of the remote controller, the authentication of the authentication device on the remote controller may also be directly implemented based on an encryption authentication chip in the remote controller, that is, the authentication device authenticates the remote controller according to the encryption authentication chip implanted in the remote controller.
Specifically, as mentioned in the foregoing description of the authentication scenario illustrated in fig. 1(a), the authentication device may also be connected to the remote controller by way of a physical connection. Through the physical connection, the authentication equipment can send authentication data to the remote controller, and the remote controller uses a secret key contained in the encryption authentication chip to carry out encryption operation on the authentication data, obtains an operation result and feeds the operation result back to the authentication equipment. And when the authentication equipment verifies that the operation result is correct, the authentication of the remote controller is determined.
To sum up, the unmanned aerial vehicle is equivalent to the remote use of the operation result of the encryption authentication chip in the remote controller, so that the authentication equipment realizes the remote authentication of the unmanned aerial vehicle and the remote controller. The authentication equipment realizes the authentication of different authenticated equipment by using only one encryption authentication chip through the remote authentication mode, thereby effectively reducing the hardware cost and improving the authentication processing efficiency of different authenticated equipment.
Fig. 3 is a flowchart of a second embodiment of the device authentication method provided in the embodiment of the present invention, as shown in fig. 3, on the basis of the embodiment shown in fig. 2, after the authentication device determines that it can communicate with the drone, the method may further include the following steps:
step 201, the authentication device is connected with the unmanned aerial vehicle, the authentication device directly receives data information sent by the unmanned aerial vehicle to the authentication device, and the data information comprises image data.
Taking an authentication device as an example of a smart phone, at present, a manner of receiving/downloading data information such as an image captured by an unmanned aerial vehicle by the smart phone is as follows: the unmanned aerial vehicle sends the data message to the remote controller through the wireless link between the remote controller and the remote controller, and then the remote controller forwards the data message to the smart mobile phone based on being connected between the smart mobile phone, and the operation is inconvenient, and because influence factors such as the restriction of wireless link bandwidth for the data transmission that the smart mobile phone received the data message has higher time delay.
And adopting the scheme of the embodiment shown in fig. 2, under the condition that the smart phone has realized remote authentication to unmanned aerial vehicle, the smart phone can be directly connected (physical connection or wireless connection) with unmanned aerial vehicle to carry out the transmission of data information, so unmanned aerial vehicle can directly send data information such as image data to the smart phone, and the smart phone can download unmanned aerial vehicle's data information more quickly.
Fig. 4 is a flowchart of a third embodiment of the device authentication method provided in the embodiment of the present invention, as shown in fig. 4, on the basis of the embodiment shown in fig. 2, after the authentication device determines that it can communicate with the drone, the method may further include the following step 301 or step 302:
step 301, the authentication device is connected with the unmanned aerial vehicle, and the authentication device directly sends an unmanned aerial vehicle upgrade instruction to the unmanned aerial vehicle so that the unmanned aerial vehicle executes the unmanned aerial vehicle upgrade instruction to complete corresponding upgrade operation.
In this embodiment, still taking the smart phone as an example of the authentication device, when the unmanned aerial vehicle has passed the authentication of the smart phone, the smart phone is directly connected (wirelessly connected or wirelessly connected) with the unmanned aerial vehicle, thereby realizing communication between the smart phone and the unmanned aerial vehicle. At this moment, if the unmanned aerial vehicle has an upgrading requirement, software upgrading of the unmanned aerial vehicle can be directly and conveniently completed through the smart phone.
Corresponding APP can be installed in the smart phone, so that corresponding upgrading packages can be carried in unmanned aerial vehicle upgrading instructions to be directly sent to the unmanned aerial vehicle through the mode of triggering the APP, the unmanned aerial vehicle executes the unmanned aerial vehicle upgrading instructions, and corresponding upgrading operations are completed.
Therefore, based on the remote authentication of the smart phone to the unmanned aerial vehicle, the authentication cost is saved, and the upgrading of the unmanned aerial vehicle can be directly and conveniently completed through the smart phone.
Step 302, the authentication device is connected with the unmanned aerial vehicle, and the authentication device directly sends a remote controller upgrading instruction to the unmanned aerial vehicle, so that the unmanned aerial vehicle forwards the remote controller upgrading instruction to the remote controller, and the remote controller executes the remote controller upgrading instruction to complete corresponding upgrading operation.
In this embodiment, when the unmanned aerial vehicle has passed the authentication of smart mobile phone, and when direct connection between smart mobile phone and the unmanned aerial vehicle, not only can directly conveniently accomplish the software upgrade to unmanned aerial vehicle through smart mobile phone, can also accomplish the software upgrade to the remote controller through forwarding of unmanned aerial vehicle.
Similarly, can be through triggering corresponding APP of installation in the smart mobile phone, carry the upgrading package to the remote controller and directly send to unmanned aerial vehicle in remote controller upgrading instruction, unmanned aerial vehicle discerns that this upgrading instruction is to the remote controller, then forwards remote controller upgrading instruction to the remote controller for this remote controller upgrading instruction of remote controller execution, the completion corresponding upgrading operation.
Therefore, based on the remote authentication of the smart phone to the unmanned aerial vehicle, the authentication cost is saved, the smart phone can conveniently complete the upgrading of the remote controller through the forwarding of the unmanned aerial vehicle.
Fig. 5 is a flowchart of a fourth embodiment of the device authentication method according to the embodiment of the present invention, and this embodiment is described with an unmanned aerial vehicle as an execution subject. As shown in fig. 5, the method includes the steps of:
step 401, the drone receives authentication data sent by the authentication device.
Step 402, the unmanned aerial vehicle sends the authentication data to the remote controller, so that the remote controller performs encryption operation on the authentication data by using a secret key contained in the encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted in the remote controller.
And 403, receiving the operation result sent by the remote controller by the unmanned aerial vehicle, sending the operation result to the authentication equipment, and determining that the unmanned aerial vehicle can communicate with the authentication equipment when the operation result is determined to be correct.
The authentication scenario to which the present embodiment is applied is still the authentication scenario shown in fig. 1 (a): an encryption authentication chip is implanted in the remote controller, authentication equipment is physically connected with the unmanned aerial vehicle, and the unmanned aerial vehicle and the remote controller establish a wireless link.
Authentication equipment needs to authenticate unmanned aerial vehicle to when confirming whether can communicate with unmanned aerial vehicle, authentication equipment can be through the physical connection with unmanned aerial vehicle between, send authentication data to unmanned aerial vehicle, and this authentication data can be a string of random number.
Because no encryption authentication chip is installed in the unmanned aerial vehicle, the authentication process cannot be completed independently. Therefore, when receiving the authentication data sent by the authentication device, the drone forwards the authentication data to the remote controller.
During specific implementation, the authentication device can carry the authentication data in the authentication request by sending the authentication request to the unmanned aerial vehicle, so that the unmanned aerial vehicle analyzes and obtains the authentication data when receiving the authentication request carrying the authentication data, and forwards the authentication data to the remote controller.
Because in practical application, unmanned aerial vehicle and remote controller have the mating relation, unmanned aerial vehicle and remote controller one-to-one promptly. Therefore, the unmanned aerial vehicle and the remote controller can establish a wireless communication link first, and the unmanned aerial vehicle and the remote controller can be considered to have finished pairing connection first. Therefore, after the unmanned aerial vehicle receives the authentication data sent by the authentication equipment, the authentication data are forwarded to the corresponding remote controller based on the established pairing relation.
An encryption authentication chip is embedded in the remote controller, and a secret key is stored in the encryption authentication chip. Therefore, when the remote controller receives the authentication data, the remote controller uses the secret key to perform encryption operation on the received authentication data so as to obtain an operation result, and the operation result is fed back to the unmanned aerial vehicle.
Therefore, the unmanned aerial vehicle forwards the received operation result to the authentication equipment, the authentication equipment carries out correctness verification on the operation result, and if the operation result is correct, the unmanned aerial vehicle passes the authentication and can communicate with the authentication equipment.
Optionally, the correctness verification method may be: the authentication equipment calculates the sent authentication data according to a local stored encryption authentication algorithm to obtain a target calculation result, if the calculation result received from the unmanned aerial vehicle is consistent with the target calculation result, the unmanned aerial vehicle is determined to pass the authentication, and the unmanned aerial vehicle can communicate with the authentication equipment.
In this embodiment, because no encryption authentication chip is installed in the unmanned aerial vehicle, when authentication equipment needs to authenticate the unmanned aerial vehicle, the authentication equipment needs to be remotely completed by the aid of the encryption authentication chip installed in the remote controller. Therefore, based on the remote authentication mode and based on the pairing relation between the unmanned aerial vehicle and the remote controller, the authentication equipment can complete simultaneous authentication of the unmanned aerial vehicle and the remote controller based on the encryption authentication chip in the remote controller, so that the cost is saved, and the authentication processing efficiency is improved.
Further optionally, after the authentication device determines that the drone is authenticated, the method may further include the following steps 404, 405, and 406. These three steps have no timing-defining relationship.
Step 404, the unmanned aerial vehicle is connected with the authentication device, and the unmanned aerial vehicle directly sends data information to the authentication device, wherein the data information comprises image data.
Take authentication equipment as the smart mobile phone for example, the smart mobile phone has realized under the condition of remote authentication to unmanned aerial vehicle, the smart mobile phone can with unmanned aerial vehicle lug connection (physical connection or wireless connection), thereby carry out data information's transmission, so unmanned aerial vehicle can directly send data information such as image data to the smart mobile phone, thereby need not the retransmission through the remote controller, make the smart mobile phone can download unmanned aerial vehicle's data information more quickly, data information transmission efficiency has been improved, transmission time has been shortened.
And 405, connecting the unmanned aerial vehicle with authentication equipment, directly receiving an unmanned aerial vehicle upgrading instruction sent by the authentication equipment by the unmanned aerial vehicle, executing the unmanned aerial vehicle upgrading instruction, and finishing corresponding upgrading operation.
Still take the smart phone as an example of the authentication device, when the unmanned aerial vehicle has passed the authentication of the smart phone, the smart phone is directly connected (wirelessly connected or wirelessly connected) with the unmanned aerial vehicle, thereby realizing communication between the smart phone and the unmanned aerial vehicle. At this moment, if the unmanned aerial vehicle has an upgrading requirement, software upgrading of the unmanned aerial vehicle can be conveniently completed through the smart phone.
Corresponding APP can be installed in the smart phone, so that corresponding upgrading packages can be carried in unmanned aerial vehicle upgrading instructions to be directly sent to the unmanned aerial vehicle through the mode of triggering the APP, the unmanned aerial vehicle executes the unmanned aerial vehicle upgrading instructions, and corresponding upgrading operations are completed.
Therefore, based on the remote authentication of the smart phone to the unmanned aerial vehicle, the authentication cost is saved, and the upgrading of the unmanned aerial vehicle can be directly and conveniently completed through the smart phone.
And step 406, connecting the unmanned aerial vehicle with the authentication device, directly receiving the remote controller upgrading instruction sent by the authentication device by the unmanned aerial vehicle, and forwarding the remote controller upgrading instruction to the remote controller, so that the remote controller executes the remote controller upgrading instruction to complete corresponding upgrading operation.
In this embodiment, when the unmanned aerial vehicle has passed the authentication of smart mobile phone, and when direct connection between smart mobile phone and the unmanned aerial vehicle, not only can directly conveniently accomplish the software upgrade to unmanned aerial vehicle through smart mobile phone, can also accomplish the software upgrade to the remote controller through forwarding of unmanned aerial vehicle.
Similarly, can be through triggering corresponding APP of installation in the smart mobile phone, carry the upgrading package to the remote controller and directly send to unmanned aerial vehicle in remote controller upgrading instruction, unmanned aerial vehicle discerns that this upgrading instruction is to the remote controller, then forwards remote controller upgrading instruction to the remote controller for this remote controller upgrading instruction of remote controller execution, the completion corresponding upgrading operation.
Therefore, based on the remote authentication of the smart phone to the unmanned aerial vehicle, the authentication cost is saved, the smart phone can conveniently complete the upgrading of the remote controller through the forwarding of the unmanned aerial vehicle.
Fig. 6 is a flowchart of a fifth embodiment of the device authentication method according to the present invention, and the present embodiment is described with a remote controller as an execution subject. As shown in fig. 6, the method includes the steps of:
step 501, the remote controller receives authentication data sent by the unmanned aerial vehicle, and the authentication data is sent to the unmanned aerial vehicle by the authentication device and forwarded by the unmanned aerial vehicle.
Step 502, the remote controller performs encryption operation on the authentication data by using a secret key contained in the encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted in the remote controller.
Step 503, the remote controller sends the operation result to the unmanned aerial vehicle, so that the unmanned aerial vehicle forwards the operation result to the authentication device, and the operation result is used for ensuring that the authentication device can communicate with the unmanned aerial vehicle when the authentication device determines that the operation result is correct.
The authentication scenario to which the present embodiment is applied is still the authentication scenario shown in fig. 1 (a): an encryption authentication chip is implanted in the remote controller, authentication equipment is physically connected with the unmanned aerial vehicle, and the unmanned aerial vehicle and the remote controller establish a wireless link.
Authentication equipment needs to authenticate unmanned aerial vehicle to when confirming whether can communicate with unmanned aerial vehicle, authentication equipment can be through the physical connection with unmanned aerial vehicle between, send authentication data to unmanned aerial vehicle, and this authentication data can be a string of random number.
Because no encryption authentication chip is installed in the unmanned aerial vehicle, the authentication process cannot be completed independently. Therefore, when receiving the authentication data sent by the authentication device, the drone forwards the authentication data to the remote controller.
Because in practical application, unmanned aerial vehicle and remote controller have the mating relation, unmanned aerial vehicle and remote controller one-to-one promptly. Therefore, the unmanned aerial vehicle and the remote controller can establish a wireless communication link first, and the unmanned aerial vehicle and the remote controller can be considered to have finished pairing connection first. Therefore, after the unmanned aerial vehicle receives the authentication data sent by the authentication equipment, the authentication data are forwarded to the corresponding remote controller based on the established pairing relation.
An encryption authentication chip is embedded in the remote controller, and a secret key is stored in the encryption authentication chip. Therefore, when the remote controller receives the authentication data, the remote controller uses the secret key to perform encryption operation on the received authentication data so as to obtain an operation result, and the operation result is fed back to the unmanned aerial vehicle.
Therefore, the unmanned aerial vehicle forwards the received operation result to the authentication equipment, the authentication equipment carries out correctness verification on the operation result, and if the operation result is correct, the unmanned aerial vehicle passes the authentication and can communicate with the authentication equipment.
Optionally, the correctness verification method may be: when receiving the operation result, the authentication device can decrypt the operation result according to the locally stored public key, and if the authentication data obtained by decryption is consistent with the authentication data sent by the authentication device, the unmanned aerial vehicle is determined to pass the authentication, and can communicate with the unmanned aerial vehicle.
In this embodiment, because no encryption authentication chip is installed in the unmanned aerial vehicle, when authentication equipment needs to authenticate the unmanned aerial vehicle, the authentication equipment needs to be remotely completed by the aid of the encryption authentication chip installed in the remote controller. Therefore, based on the remote authentication mode and based on the pairing relation between the unmanned aerial vehicle and the remote controller, the authentication equipment can complete simultaneous authentication of the unmanned aerial vehicle and the remote controller based on the encryption authentication chip in the remote controller, so that the cost is saved, and the authentication processing efficiency is improved.
Optionally, in order to further improve the reliability of the authentication result of the remote controller, the authentication of the authentication device on the remote controller may also be directly implemented based on an encryption authentication chip in the remote controller, that is, the authentication device authenticates the remote controller according to the encryption authentication chip implanted in the remote controller.
Specifically, as mentioned in the foregoing description of the authentication scenario illustrated in fig. 1(a), the authentication device may also be connected to the remote controller by way of a physical connection. Through the physical connection, the authentication equipment can send authentication data to the remote controller, and the remote controller uses a secret key contained in the encryption authentication chip to carry out encryption operation on the authentication data, obtains an operation result and feeds the operation result back to the authentication equipment. And when the authentication equipment verifies that the operation result is correct, the authentication of the remote controller is determined.
Optionally, after step 503, the following step 504 may be further included:
and step 504, the unmanned aerial vehicle is connected with the authentication equipment, the remote controller receives a remote controller upgrading instruction which is sent from the authentication equipment and forwarded by the unmanned aerial vehicle, and executes the remote controller upgrading instruction to complete corresponding upgrading operation.
In this embodiment, still taking authentication equipment as an example of the smart phone, when the unmanned aerial vehicle has passed the authentication of the smart phone based on the encrypted authentication chip in the remote controller, and when the smart phone is directly connected to the unmanned aerial vehicle, software upgrading of the remote controller can be completed through the smart phone.
At this moment, the software upgrading of the remote controller by the smart phone is carried out through the unmanned aerial vehicle, namely, the software upgrading of the remote controller is completed through the forwarding of the unmanned aerial vehicle.
Particularly, can be through triggering corresponding APP of installation in the smart mobile phone, carry the upgrading package to the remote controller and directly send to unmanned aerial vehicle in remote controller upgrading instruction, unmanned aerial vehicle discerns that this upgrading instruction is to the remote controller, then forwards remote controller upgrading instruction to the remote controller for this remote controller upgrading instruction of remote controller execution, the completion corresponding upgrading operation.
Therefore, based on the remote authentication of the smart phone to the unmanned aerial vehicle, the authentication cost is saved, the smart phone can conveniently complete the upgrading of the remote controller through the forwarding of the unmanned aerial vehicle.
The above method embodiments are based on the authentication scenario in fig. 1(a), and the device authentication method is introduced from the perspective of different execution subjects, and is described below from the perspective of signaling interaction with reference to fig. 7.
Fig. 7 is a signaling diagram of a sixth embodiment of an apparatus authentication method according to an embodiment of the present invention, as shown in fig. 7, including the following steps:
step 601, the authentication device sends authentication data to the unmanned aerial vehicle.
Step 602, the drone forwards the authentication data to the remote controller.
Step 603, the remote controller performs encryption operation on the authentication data by using a key contained in the encryption authentication chip installed in the remote controller, and obtains an operation result.
And step 604, the remote controller sends the operation result to the unmanned aerial vehicle.
Step 605, the drone forwards the operation result to the authentication device.
Step 606, when the authentication device determines that the operation result is correct, it is determined that the communication with the unmanned aerial vehicle can be performed.
The following describes a device authentication method provided by the present invention with reference to an authentication scenario shown in fig. 1(b) in conjunction with several method embodiments.
Fig. 8 is a flowchart of a seventh embodiment of an apparatus authentication method according to an embodiment of the present invention, and this embodiment takes an authentication apparatus as an execution subject for description. As shown in fig. 8, the method includes the steps of:
step 701, the authentication device sends authentication data to the remote controller so that the remote controller forwards the authentication data to the unmanned aerial vehicle, wherein the authentication data is used for enabling the unmanned aerial vehicle to perform encryption operation on the authentication data by using a secret key contained in an encryption authentication chip to obtain an operation result; wherein, implant in the unmanned aerial vehicle and encrypt the authentication chip.
Step 702, the authentication device receives the operation result forwarded by the unmanned aerial vehicle through the remote controller.
And step 703, when the authentication device determines that the operation result is correct, determining that the authentication device can communicate with the remote controller.
The scheme provided by the present embodiment is described with reference to fig. 1(b), so that the authentication device is physically connected to the remote controller, the unmanned aerial vehicle is wirelessly connected to the remote controller, and the encryption authentication chip is implanted in the unmanned aerial vehicle.
How the authentication device authenticates the remote controller through the encrypted authentication chip in the unmanned aerial vehicle is described in detail below. Because the remote controller is not provided with the encryption authentication chip, the mode of carrying out the authentication of the remote controller through the encryption authentication chip in the unmanned aerial vehicle can be regarded as a remote authentication mode.
When the authentication device needs to authenticate the remote controller to determine whether the remote controller can communicate with the authentication device, the authentication device may send authentication data to the remote controller through a physical connection with the remote controller, where the authentication data may be a string of random numbers.
Because the remote controller is not provided with an encryption authentication chip, the authentication process cannot be independently completed. Therefore, the remote controller forwards the authentication data to the drone when receiving the authentication data sent by the authentication device.
During specific implementation, the authentication device can carry the authentication data in the authentication request by sending the authentication request to the remote controller, so that the remote controller analyzes and obtains the authentication data when receiving the authentication request carrying the authentication data, and forwards the authentication data to the unmanned aerial vehicle.
An encryption authentication chip is implanted in the unmanned aerial vehicle, and an encryption key is stored in the encryption authentication chip. Therefore, when the unmanned aerial vehicle receives the authentication data, the unmanned aerial vehicle uses the key to perform encryption operation on the received authentication data so as to obtain an operation result, and feeds the operation result back to the remote controller.
Therefore, the remote controller forwards the received operation result to the authentication equipment, the authentication equipment carries out correctness verification on the operation result, and if the operation result is correct, the remote controller passes the authentication and can communicate with the authentication equipment.
Optionally, the correctness verification method may be: the authentication equipment calculates the sent authentication data according to the encryption authentication algorithm stored locally to obtain a target calculation result, and if the calculation result received from the remote controller is consistent with the target calculation result, the authentication of the remote controller is determined, and the remote controller can communicate with the remote controller.
Optionally, the correctness verification method may also be implemented based on an asymmetric signature authentication method: the unmanned aerial vehicle carries out encryption operation processing based on a secret key (private key) contained in the encryption authentication chip on the authentication data, when the authentication equipment receives an operation result, the authentication equipment can decrypt the operation result according to a locally stored public key, and if the authentication data obtained by decryption is consistent with the authentication data sent by the authentication equipment, the authentication of the remote controller is confirmed, and the remote controller can be communicated with the remote controller.
Based on the remote authentication mode, the authentication equipment can complete the authentication of the remote controller based on an encryption authentication chip in the unmanned aerial vehicle. Meanwhile, in practical application, the unmanned aerial vehicle and the remote controller have a pairing relation, namely the unmanned aerial vehicle and the remote controller are in one-to-one correspondence. Thus, in the case where the drone and the remote controller have established a wireless communication link, it can be considered that the drone and the remote controller have completed a pairing connection. Therefore, when the authentication equipment receives and verifies that the operation result forwarded by the remote controller is correct, the authentication equipment can determine that the remote controller passes authentication and can also determine that the unmanned aerial vehicle passes authentication, so that the authentication of the unmanned aerial vehicle and the remote controller is completed simultaneously, and the authentication processing efficiency is improved.
In addition, optionally, in order to further improve the reliability of the authentication result of the unmanned aerial vehicle, the authentication of the authentication device on the unmanned aerial vehicle can also be directly realized based on an encryption authentication chip in the unmanned aerial vehicle, that is, the authentication device authenticates the unmanned aerial vehicle according to the encryption authentication chip implanted in the unmanned aerial vehicle.
Specifically, as mentioned in the foregoing description of the authentication scenario illustrated in fig. 1(b), the authentication device may also be connected to the drone by means of a physical connection. Through this physical connection, authentication equipment can send authentication data to unmanned aerial vehicle, and unmanned aerial vehicle uses the secret key that contains in the encryption authentication chip to carry out encryption operation to this authentication data, obtains the operation result to feed back to authentication equipment. And when the authentication equipment verifies that the operation result is correct, the unmanned aerial vehicle is determined to pass the authentication.
In conclusion, the remote controller is equivalent to remotely using the operation result of the encryption authentication chip in the unmanned aerial vehicle, so that the authentication equipment realizes remote authentication of the unmanned aerial vehicle and the remote controller. The authentication equipment realizes the authentication of different authenticated equipment by using only one encryption authentication chip through the remote authentication mode, thereby effectively reducing the hardware cost and improving the authentication processing efficiency of different authenticated equipment.
Fig. 9 is a flowchart of an eighth embodiment of the device authentication method provided in the embodiment of the present invention, as shown in fig. 9, on the basis of the embodiment shown in fig. 8, after the unmanned aerial vehicle passes authentication of the authentication device, the method may further include the following steps 801, 802, 803, and 804, where the four steps have no timing relationship and are parallel selectable.
Step 801, the authentication device is connected with the unmanned aerial vehicle, the authentication device directly receives data information sent by the unmanned aerial vehicle to the authentication device, and the data information comprises image data.
Taking an authentication device as an example of a smart phone, at present, a manner of receiving/downloading data information such as an image captured by an unmanned aerial vehicle by the smart phone is as follows: the unmanned aerial vehicle sends the data information to the remote controller through the wireless link between the unmanned aerial vehicle and the remote controller, and then the remote controller forwards the data information to the smart phone based on the connection between the remote controller and the smart phone, so that the operation is inconvenient, and the data transmission of the data information received by the smart phone has high time delay due to the influence factors such as the bandwidth limitation of the wireless link.
And adopting the scheme of the embodiment shown in fig. 8, under the condition that the smart phone has realized remote authentication to unmanned aerial vehicle, the smart phone can be directly connected (physical connection or wireless connection) with unmanned aerial vehicle to carry out the transmission of data information, so unmanned aerial vehicle can directly send data information such as image data to the smart phone, and the smart phone can download unmanned aerial vehicle's data information more quickly.
Step 802, the authentication device is connected with the unmanned aerial vehicle, and the authentication device directly sends an unmanned aerial vehicle upgrade instruction to the unmanned aerial vehicle so that the unmanned aerial vehicle executes the unmanned aerial vehicle upgrade instruction to complete corresponding upgrade operation.
In this embodiment, still taking the smart phone as an example of the authentication device, when the unmanned aerial vehicle has passed the authentication of the smart phone, the smart phone may be directly connected (wireless connection or wireless connection) with the unmanned aerial vehicle, thereby achieving communication between the smart phone and the unmanned aerial vehicle. At this moment, if the unmanned aerial vehicle has an upgrading requirement, software upgrading of the unmanned aerial vehicle can be directly and conveniently completed through the smart phone.
Corresponding APP can be installed in the smart phone, so that corresponding upgrading packages can be carried in unmanned aerial vehicle upgrading instructions to be directly sent to the unmanned aerial vehicle through the mode of triggering the APP, the unmanned aerial vehicle executes the unmanned aerial vehicle upgrading instructions, and corresponding upgrading operations are completed.
Therefore, based on the remote authentication of the smart phone to the unmanned aerial vehicle, the authentication cost is saved, and the upgrading of the unmanned aerial vehicle can be directly and conveniently completed through the smart phone.
Step 803, the authentication device is connected with the remote controller, and the authentication device directly sends the unmanned aerial vehicle upgrade instruction to the remote controller, so that the remote controller forwards the unmanned aerial vehicle upgrade instruction to the unmanned aerial vehicle, and the unmanned aerial vehicle executes the unmanned aerial vehicle upgrade instruction to complete corresponding upgrade operation.
In this embodiment, when based on the encryption authentication chip in the unmanned aerial vehicle, the remote controller has passed the authentication of the smart phone, and when the smart phone is directly connected with the remote controller at this moment, the smart phone can also complete the software upgrade of the unmanned aerial vehicle with the help of the remote controller.
At this moment, the smart phone upgrades the software of the unmanned aerial vehicle through the remote controller, namely, the software of the unmanned aerial vehicle is upgraded through the forwarding of the remote controller.
Particularly, can be through triggering corresponding APP of installation in the smart mobile phone, carry the upgrading package to unmanned aerial vehicle and directly send to the remote controller in unmanned aerial vehicle upgrading instruction, the remote controller discerns that this upgrading instruction is to unmanned aerial vehicle, then forwards unmanned aerial vehicle upgrading instruction to unmanned aerial vehicle for unmanned aerial vehicle carries out this unmanned aerial vehicle upgrading instruction, accomplishes corresponding upgrading operation.
Therefore, based on the remote authentication of the remote controller by the smart phone, the authentication cost is saved, the smart phone can conveniently complete the upgrading of the unmanned aerial vehicle through the forwarding of the remote controller.
And step 804, the authentication device is connected with the remote controller, and the authentication device directly sends a remote controller upgrading instruction to the remote controller so that the remote controller executes the remote controller upgrading instruction to complete corresponding upgrading operation.
In this embodiment, when the remote controller has passed the authentication of the smartphone, the smartphone and the remote controller may be directly connected (wirelessly connected or wirelessly connected), thereby achieving communication between the smartphone and the remote controller. At the moment, if the remote controller has an upgrading requirement, software upgrading of the remote controller can be directly and conveniently completed through the smart phone.
Corresponding APP can be installed in the smart phone, so that corresponding upgrading packages can be carried in remote controller upgrading instructions to be directly sent to the remote controller through the mode of triggering the APP, the remote controller executes the remote controller upgrading instructions, and corresponding upgrading operations are completed.
Therefore, based on the remote authentication of the remote controller by the smart phone, the authentication cost is saved, and the remote controller can be directly and conveniently upgraded by the smart phone.
Fig. 10 is a flowchart of a ninth embodiment of the apparatus authentication method according to an embodiment of the present invention, which is described in terms of a remote controller as an execution subject. As shown in fig. 10, the method includes the steps of:
step 901, the remote controller receives authentication data sent by the authentication device.
Step 902, the remote controller sends the authentication data to the unmanned aerial vehicle so that the unmanned aerial vehicle performs encryption operation on the authentication data by using a secret key contained in an encryption authentication chip to obtain an operation result, wherein the encryption authentication chip is implanted in the unmanned aerial vehicle.
And 903, the remote controller receives the operation result sent by the unmanned aerial vehicle, sends the operation result to the authentication equipment, and determines that the unmanned aerial vehicle can communicate with the authentication equipment when the operation result is determined to be correct.
The authentication scenario applicable to this embodiment is still the authentication scenario shown in fig. 1 (b): an encryption authentication chip is implanted in the unmanned aerial vehicle, authentication equipment is physically connected with the remote controller, and the unmanned aerial vehicle and the remote controller establish a wireless link.
When the authentication device needs to authenticate the remote controller to determine whether the remote controller can communicate with the authentication device, the authentication device may send authentication data to the remote controller through a physical connection with the remote controller, where the authentication data may be a string of random numbers.
Because the remote controller is not provided with an encryption authentication chip, the authentication process cannot be independently completed. Therefore, the remote controller forwards the authentication data to the drone when receiving the authentication data sent by the authentication device.
During specific implementation, the authentication device can carry the authentication data in the authentication request by sending the authentication request to the remote controller, so that the remote controller analyzes and obtains the authentication data when receiving the authentication request carrying the authentication data, and forwards the authentication data to the unmanned aerial vehicle.
Because in practical application, unmanned aerial vehicle and remote controller have the mating relation, unmanned aerial vehicle and remote controller one-to-one promptly. Therefore, the unmanned aerial vehicle and the remote controller can establish a wireless communication link first, and the unmanned aerial vehicle and the remote controller can be considered to have finished pairing connection first. Therefore, after the remote controller receives the authentication data sent by the authentication equipment, the authentication data are forwarded to the corresponding unmanned aerial vehicle based on the established pairing relation.
An encryption authentication chip is implanted in the unmanned aerial vehicle, and a secret key is stored in the encryption authentication chip. Therefore, when the unmanned aerial vehicle receives the authentication data, the unmanned aerial vehicle uses the key to perform encryption operation on the received authentication data so as to obtain an operation result, and feeds the operation result back to the remote controller.
Therefore, the remote controller forwards the received operation result to the authentication equipment, the authentication equipment carries out correctness verification on the operation result, and if the operation result is correct, the remote controller passes the authentication and can communicate with the authentication equipment.
Optionally, the correctness verification method may be: the authentication equipment calculates the sent authentication data according to the encryption authentication algorithm stored locally to obtain a target calculation result, and if the calculation result received from the remote controller is consistent with the target calculation result, the authentication of the remote controller is determined, and the remote controller can communicate with the remote controller.
In this embodiment, because the encryption authentication chip is not installed in the remote controller, when the authentication device needs to authenticate the remote controller, the authentication device needs to remotely complete the authentication by using the encryption authentication chip installed in the unmanned aerial vehicle. Therefore, based on the remote authentication mode and based on the pairing relation between the unmanned aerial vehicle and the remote controller, the authentication equipment can complete simultaneous authentication of the unmanned aerial vehicle and the remote controller based on the encryption authentication chip in the unmanned aerial vehicle, so that the cost is saved, and the authentication processing efficiency is improved.
Optionally, after the step 903, a step 904 and a step 905 may be further included, where the two steps have no timing-limited relationship.
And step 904, connecting the remote controller with the authentication equipment, directly receiving the remote controller upgrading instruction sent by the authentication equipment by the remote controller, and executing the remote controller upgrading instruction to complete corresponding upgrading operation.
In this embodiment, when the remote controller has passed the authentication of the smartphone, the smartphone and the remote controller may be directly connected (wirelessly connected or wirelessly connected), thereby achieving communication between the smartphone and the remote controller. At the moment, if the remote controller has an upgrading requirement, software upgrading of the remote controller can be directly and conveniently completed through the smart phone.
Corresponding APP can be installed in the smart phone, so that corresponding upgrading packages can be carried in remote controller upgrading instructions to be directly sent to the remote controller through the mode of triggering the APP, the remote controller receives and executes the remote controller upgrading instructions, and corresponding upgrading operations are completed.
Therefore, based on the remote authentication of the remote controller by the smart phone, the authentication cost is saved, and the remote controller can be directly and conveniently upgraded by the smart phone.
And 905, connecting the remote controller with the authentication equipment, wherein the remote controller directly receives the unmanned aerial vehicle upgrading instruction sent by the authentication equipment and forwards the unmanned aerial vehicle upgrading instruction to the unmanned aerial vehicle so that the unmanned aerial vehicle executes the unmanned aerial vehicle upgrading instruction and completes corresponding upgrading operation.
In this embodiment, when based on the encryption authentication chip in the unmanned aerial vehicle, the remote controller has passed the authentication of the smart phone, and when the smart phone is directly connected with the remote controller at this moment, the smart phone can also complete the software upgrade of the unmanned aerial vehicle with the help of the remote controller.
At this moment, the smart phone upgrades the software of the unmanned aerial vehicle through the remote controller, namely, the software of the unmanned aerial vehicle is upgraded through the forwarding of the remote controller.
Particularly, can be through triggering corresponding APP of installation in the smart mobile phone, carry the upgrading package to unmanned aerial vehicle and directly send to the remote controller in unmanned aerial vehicle upgrading instruction, the remote controller discerns that this upgrading instruction is to unmanned aerial vehicle, then forwards unmanned aerial vehicle upgrading instruction to unmanned aerial vehicle for unmanned aerial vehicle carries out this unmanned aerial vehicle upgrading instruction, accomplishes corresponding upgrading operation.
Therefore, based on the remote authentication of the remote controller by the smart phone, the authentication cost is saved, the smart phone can conveniently complete the upgrading of the unmanned aerial vehicle through the forwarding of the remote controller.
Fig. 11 is a flowchart of a tenth embodiment of the device authentication method according to the embodiment of the present invention, and this embodiment is described from the perspective of an unmanned aerial vehicle as an execution subject. As shown in fig. 11, the method includes the steps of:
step 1001, the unmanned aerial vehicle receives authentication data sent by the remote controller, and the authentication data is sent to the remote controller by the authentication device and forwarded by the remote controller.
Step 1002, the unmanned aerial vehicle performs encryption operation on the authentication data by using a key contained in the encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted in the unmanned aerial vehicle.
Step 1003, the unmanned aerial vehicle sends the operation result to the remote controller so that the remote controller forwards the operation result to the authentication equipment, and the operation result is used for enabling the authentication equipment to determine that the authentication equipment can communicate with the remote controller when the operation result is determined to be correct by the authentication equipment.
The authentication scenario applicable to this embodiment is still the authentication scenario shown in fig. 1 (b): an encryption authentication chip is implanted in the unmanned aerial vehicle, authentication equipment is physically connected with the remote controller, and the unmanned aerial vehicle and the remote controller establish a wireless link.
When the authentication device needs to authenticate the remote controller to determine whether the remote controller can communicate with the authentication device, the authentication device may send authentication data to the remote controller through a physical connection with the remote controller, where the authentication data may be a string of random numbers.
Because the remote controller is not provided with an encryption authentication chip, the authentication process cannot be independently completed. Therefore, the remote controller forwards the authentication data to the drone when receiving the authentication data sent by the authentication device.
Because in practical application, unmanned aerial vehicle and remote controller have the mating relation, unmanned aerial vehicle and remote controller one-to-one promptly. Therefore, the unmanned aerial vehicle and the remote controller can establish a wireless communication link first, and the unmanned aerial vehicle and the remote controller can be considered to have finished pairing connection first. Therefore, after the remote controller receives the authentication data sent by the authentication equipment, the authentication data are forwarded to the corresponding unmanned aerial vehicle based on the established pairing relation.
An encryption authentication chip is implanted in the unmanned aerial vehicle, and a secret key is stored in the encryption authentication chip. Therefore, when the unmanned aerial vehicle receives the authentication data, the unmanned aerial vehicle uses the key to perform encryption operation on the received authentication data so as to obtain an operation result, and feeds the operation result back to the remote controller.
Therefore, the remote controller forwards the received operation result to the authentication equipment, the authentication equipment carries out correctness verification on the operation result, and if the operation result is correct, the remote controller passes the authentication and can communicate with the authentication equipment.
Optionally, the correctness verification method may be: the authentication device can decrypt the operation result according to the locally stored public key when receiving the operation result, and if the authentication data obtained by decryption is consistent with the authentication data sent by the authentication device, the authentication device determines that the remote controller passes the authentication and can communicate with the remote controller.
In this embodiment, because the encryption authentication chip is not installed in the remote controller, when the authentication device needs to authenticate the remote controller, the authentication device needs to remotely complete the authentication by using the encryption authentication chip installed in the unmanned aerial vehicle. Therefore, based on the remote authentication mode and based on the pairing relation between the unmanned aerial vehicle and the remote controller, the authentication equipment can complete simultaneous authentication of the unmanned aerial vehicle and the remote controller based on the encryption authentication chip in the unmanned aerial vehicle, so that the cost is saved, and the authentication processing efficiency is improved.
Further optionally, for further improving the reliability to the unmanned aerial vehicle authentication result, to authentication equipment to unmanned aerial vehicle's authentication, can also directly realize based on the encryption authentication chip in the unmanned aerial vehicle, authentication equipment authenticates unmanned aerial vehicle according to the encryption authentication chip of implanting in the unmanned aerial vehicle promptly.
Specifically, as mentioned in the foregoing description of the authentication scenario illustrated in fig. 1(b), the authentication device may also be connected to the drone by means of a physical connection. Through this physical connection, authentication equipment can send authentication data to unmanned aerial vehicle, and unmanned aerial vehicle uses the secret key that contains in the encryption authentication chip to carry out encryption operation to this authentication data, obtains the operation result to feed back to authentication equipment. And when the authentication equipment verifies that the operation result is correct, the unmanned aerial vehicle is determined to pass the authentication.
Fig. 12 is a flowchart of an eleventh embodiment of the device authentication method according to the embodiment of the present invention, as shown in fig. 12, on the basis of the embodiment shown in fig. 11, after the drone passes authentication of the authentication device, the method may further include the following step 1101, step 1102, and step 1103. These three steps have no timing-defining relationship.
Step 1101, connecting the unmanned aerial vehicle with an authentication device, wherein the unmanned aerial vehicle directly sends data information to the authentication device, and the data information comprises image data.
Take authentication equipment as the smart mobile phone for example, the smart mobile phone has realized under the condition of remote authentication to unmanned aerial vehicle, and the smart mobile phone can with unmanned aerial vehicle lug connection (physical connection or wireless connection) to carry out data information's transmission, so unmanned aerial vehicle can directly send data information such as image data to the smart mobile phone, thereby need not to pass through the relaying of remote controller, makes the smart mobile phone can download unmanned aerial vehicle's data information more quickly.
Step 1102, connecting the unmanned aerial vehicle with the authentication device, directly receiving the unmanned aerial vehicle upgrading instruction sent by the authentication device by the unmanned aerial vehicle, executing the unmanned aerial vehicle upgrading instruction, and finishing corresponding upgrading operation.
Still take the smart mobile phone as the authentication equipment for example, unmanned aerial vehicle directly is connected with authentication equipment physics, when unmanned aerial vehicle has passed the authentication of smart mobile phone, can communicate between smart mobile phone and the unmanned aerial vehicle. At this moment, if the unmanned aerial vehicle has an upgrading requirement, software upgrading of the unmanned aerial vehicle can be directly and conveniently completed through the smart phone.
Corresponding APP can be installed in the smart phone, so that corresponding upgrading packages can be carried in unmanned aerial vehicle upgrading instructions to be sent to the unmanned aerial vehicle in a mode of triggering the APP, the unmanned aerial vehicle executes the unmanned aerial vehicle upgrading instructions, and corresponding upgrading operations are completed.
Therefore, based on the remote authentication of the smart phone to the unmanned aerial vehicle, the authentication cost is saved, and the upgrading of the unmanned aerial vehicle can be directly and conveniently completed through the smart phone.
Step 1103, the remote controller is connected with the authentication device, and the unmanned aerial vehicle receives the unmanned aerial vehicle upgrading instruction which is sent from the authentication device and forwarded by the unmanned aerial vehicle, executes the unmanned aerial vehicle upgrading instruction, and completes corresponding upgrading operation.
In this embodiment, when based on the encryption authentication chip in the unmanned aerial vehicle, the remote controller has passed the authentication of the smart phone, and when the smart phone is directly connected with the remote controller at this moment, the smart phone can also complete the software upgrade of the unmanned aerial vehicle with the help of the remote controller.
At this moment, the smart phone upgrades the software of the unmanned aerial vehicle through the remote controller, namely, the software of the unmanned aerial vehicle is upgraded through the forwarding of the remote controller.
Particularly, can be through triggering corresponding APP of installation in the smart mobile phone, carry the upgrading package to unmanned aerial vehicle and directly send to the remote controller in unmanned aerial vehicle upgrading instruction, the remote controller discerns that this upgrading instruction is to unmanned aerial vehicle, then forwards unmanned aerial vehicle upgrading instruction to unmanned aerial vehicle for unmanned aerial vehicle carries out this unmanned aerial vehicle upgrading instruction, accomplishes corresponding upgrading operation.
Therefore, based on the remote authentication of the remote controller by the smart phone, the authentication cost is saved, the smart phone can conveniently complete the upgrading of the unmanned aerial vehicle through the forwarding of the remote controller.
The above method embodiments are based on the authentication scenario in fig. 1(b), and the device authentication method is introduced from the perspective of different execution subjects, and is described below from the perspective of signaling interaction with reference to fig. 13.
Fig. 13 is a signaling interaction diagram of a twelfth embodiment of an apparatus authentication method according to an embodiment of the present invention, as shown in fig. 13, the method includes the following steps:
step 1201, the authentication device sends authentication data to the remote control.
Step 1202, the remote controller forwards the authentication data to the unmanned aerial vehicle.
Step 1203, the unmanned aerial vehicle performs encryption operation on the authentication data by using a key contained in the encryption authentication chip installed in the unmanned aerial vehicle, and an operation result is obtained.
And step 1204, the unmanned aerial vehicle sends the operation result to the remote controller.
And step 1205, the remote controller forwards the operation result to the authentication equipment.
And step 1206, when the authentication equipment determines that the operation result is correct, determining that the communication with the remote controller can be carried out.
Fig. 14 is a schematic structural diagram of a first embodiment of an apparatus authentication device according to an embodiment of the present invention, where the apparatus authentication device is disposed in an authentication device, and the authentication device is, for example, a terminal device such as a smart phone and a tablet computer, as shown in fig. 14, the apparatus authentication device includes: a sending module 11, a receiving module 12 and a processing module 13.
The sending module 11 is configured to send authentication data to the unmanned aerial vehicle, so that the unmanned aerial vehicle forwards the authentication data to the remote controller, where the authentication data is used to enable the remote controller to perform encryption operation on the authentication data by using a key included in an encryption authentication chip, and obtain an operation result; wherein, the remote controller is embedded with the encryption authentication chip.
And the receiving module 12 is configured to receive the operation result forwarded by the remote controller through the unmanned aerial vehicle.
And the processing module 13 is configured to determine that the communication with the unmanned aerial vehicle is possible when the operation result is determined to be correct.
Optionally, the processing module 13 is specifically configured to: calculating the authentication data according to a locally stored encryption authentication algorithm to obtain a target calculation result; determining that communication with the unmanned aerial vehicle is possible when it is determined that the operation result is consistent with the target operation result.
Optionally, the processing module 13 is specifically configured to: decrypting the operation result; determining that communication with the drone is possible when it is determined that the decryption result is consistent with the authentication data.
Optionally, the processing module 13 is further configured to: and authenticating the remote controller according to the encryption authentication chip implanted in the remote controller.
Optionally, the authentication device is connected to the drone, and the receiving module 12 is further configured to: and directly receiving data information sent by the unmanned aerial vehicle, wherein the data information comprises image data.
Optionally, the authentication device is connected to the drone, and the sending module 11 is further configured to: directly to unmanned aerial vehicle sends unmanned aerial vehicle upgrading instruction, so that unmanned aerial vehicle carries out unmanned aerial vehicle upgrading instruction accomplishes corresponding upgrading operation.
Optionally, the authentication device is connected to the drone, and the sending module 11 is further configured to:
and directly sending a remote controller upgrading instruction to the unmanned aerial vehicle so that the unmanned aerial vehicle forwards the remote controller upgrading instruction to the remote controller, and the remote controller executes the remote controller upgrading instruction to complete corresponding upgrading operation.
The device authentication apparatus provided in this embodiment may be used to execute the technical scheme of authenticating the device in any one of the method embodiments shown in fig. 2 to fig. 7, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 15 is a schematic structural diagram of a second embodiment of an apparatus authentication device according to an embodiment of the present invention, where the apparatus authentication device is disposed in an unmanned aerial vehicle, and as shown in fig. 15, the apparatus authentication device includes: a receiving module 21, a sending module 22 and a processing module 23.
A receiving module 21, configured to receive authentication data sent by an authentication device.
And the sending module 22 is configured to send the authentication data to a remote controller, so that the remote controller performs an encryption operation on the authentication data by using a key included in an encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted in the remote controller.
The receiving module 21 is further configured to receive the operation result sent by the remote controller, send the operation result to the authentication device, and determine that communication with the authentication device is possible when the operation result is determined to be correct.
Optionally, the drone is connected to the authentication device, and the sending module 22 is further configured to: and directly sending data information to the authentication device, wherein the data information comprises image data.
Optionally, the drone is connected to the authentication device, and the receiving module 21 is further configured to: and directly receiving the unmanned aerial vehicle upgrading instruction sent by the authentication equipment.
The device further comprises: and the processing module 23 is configured to execute the unmanned aerial vehicle upgrade instruction to complete corresponding upgrade operation.
Optionally, the drone is connected to the authentication device, and the receiving module 21 is further configured to: and directly receiving a remote controller upgrading instruction sent by the authentication equipment.
The sending module 22 is further configured to: and forwarding the remote controller upgrading instruction to the remote controller, so that the remote controller executes the remote controller upgrading instruction to complete corresponding upgrading operation.
The device authentication apparatus provided in this embodiment may be used to implement the technical solution of the drone in any one of the embodiments shown in fig. 2 to 7, and the implementation principle and the technical effect are similar and will not be described again.
Fig. 16 is a schematic structural diagram of a third embodiment of an apparatus authentication device according to the present invention, the apparatus authentication device is disposed in a remote controller, and as shown in fig. 16, the apparatus authentication device includes: a receiving module 31, a processing module 32, and a transmitting module 33.
The receiving module 31 is configured to receive authentication data sent by the drone, where the authentication data is sent to the drone by an authentication device and forwarded by the drone.
And the processing module 32 is configured to perform encryption operation on the authentication data by using a key included in an encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted in the remote controller.
A sending module 33, configured to send the operation result to the drone so that the drone forwards the operation result to the authentication device, where the operation result is used to enable the authentication device to determine that the authentication device can communicate with the drone when the operation result is determined to be correct.
The encryption authentication chip implanted in the remote controller is further used for enabling the authentication equipment to authenticate the remote controller according to the encryption authentication chip.
Optionally, the receiving module 31 is further configured to: and receiving a remote controller upgrading instruction which is sent from the authentication equipment and forwarded by the unmanned aerial vehicle.
The processing module 32 is further configured to: and executing the remote controller upgrading instruction to complete corresponding upgrading operation.
The device authentication apparatus provided in this embodiment may be used to implement the technical solution of the remote controller in any one of the embodiments shown in fig. 2 to fig. 7, and the implementation principle and the technical effect are similar and will not be described again.
Fig. 17 is a schematic structural diagram of a fourth embodiment of an apparatus authentication device according to an embodiment of the present invention, where the apparatus authentication device is disposed in an authentication device, and the authentication device is, for example, a terminal device such as a smart phone and a tablet computer, as shown in fig. 17, the apparatus authentication device includes: a sending module 41, a receiving module 42 and a processing module 43.
A sending module 41, configured to send authentication data to a remote controller, so that the remote controller forwards the authentication data to an unmanned aerial vehicle, where the authentication data is used to enable the unmanned aerial vehicle to perform an encryption operation on the authentication data by using a key included in an encryption authentication chip, so as to obtain an operation result; wherein, be implanted in the unmanned aerial vehicle and encrypt authentication chip.
And the receiving module 42 is configured to receive the operation result forwarded by the unmanned aerial vehicle through the remote controller.
And the processing module 43 is configured to determine that communication with the remote controller is possible when the operation result is determined to be correct.
Optionally, the processing module 43 is specifically configured to: calculating the authentication data according to a locally stored encryption authentication algorithm to obtain a target calculation result; determining that communication with the remote controller is possible when it is determined that the operation result coincides with the target operation result.
Optionally, the processing module 43 is specifically configured to: decrypting the operation result; determining that communication with the remote controller is possible when it is determined that the decryption result coincides with the authentication data.
Optionally, the authentication device is connected to the remote controller, and the sending module 41 is further configured to: and directly sending a remote controller upgrading instruction to the remote controller so that the remote controller executes the remote controller upgrading instruction to complete corresponding upgrading operation.
Optionally, the authentication device is connected to the remote controller, and the sending module 41 is further configured to: directly to the remote controller sends unmanned aerial vehicle upgrading instruction, so that the remote controller will unmanned aerial vehicle upgrading instruction forwards to unmanned aerial vehicle makes unmanned aerial vehicle carries out unmanned aerial vehicle upgrading instruction accomplishes corresponding upgrading operation.
Optionally, the authentication device is connected to the drone, and the receiving module 42 is further configured to: and directly receiving data information sent by the unmanned aerial vehicle to the authentication equipment, wherein the data information comprises image data.
Optionally, the authentication device is connected to the drone, and the sending module 41 is further configured to: directly to unmanned aerial vehicle sends unmanned aerial vehicle upgrading instruction, so that unmanned aerial vehicle carries out unmanned aerial vehicle upgrading instruction accomplishes corresponding upgrading operation.
Optionally, the processing module 43 is further configured to: and authenticating the unmanned aerial vehicle according to the encryption authentication chip implanted in the unmanned aerial vehicle.
The device authentication apparatus provided in this embodiment may be used to implement the technical scheme of authenticating the device in any one of the embodiments shown in fig. 8 to 13, and the implementation principle and the technical effect are similar and will not be described again.
Fig. 18 is a schematic structural diagram of a fifth embodiment of an apparatus authentication device according to an embodiment of the present invention, where the apparatus authentication device is disposed in a remote controller, and as shown in fig. 18, the apparatus authentication device includes: a receiving module 51 and a transmitting module 52.
A receiving module 51, configured to receive authentication data sent by an authentication device.
And the sending module 52 is configured to send the authentication data to the unmanned aerial vehicle, so that the unmanned aerial vehicle performs encryption operation on the authentication data by using a secret key included in an encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted in the unmanned aerial vehicle.
The receiving module 51 is further configured to receive the operation result sent by the unmanned aerial vehicle, send the operation result to the authentication device, and determine that communication with the authentication device is possible when the operation result is determined to be correct.
Optionally, the remote controller is connected to the authentication device, and the receiving module 51 is further configured to: and directly receiving a remote controller upgrading instruction sent by the authentication equipment.
The device further comprises: and the processing module 53 is configured to execute the remote controller upgrading instruction to complete corresponding upgrading operation.
Optionally, the remote controller is connected to the authentication device, and the receiving module 51 is further configured to: and directly receiving the unmanned aerial vehicle upgrading instruction sent by the authentication equipment.
The sending module 52 is further configured to: and forwarding the unmanned aerial vehicle upgrading instruction to the unmanned aerial vehicle so that the unmanned aerial vehicle executes the unmanned aerial vehicle upgrading instruction to complete corresponding upgrading operation.
The device authentication apparatus provided in this embodiment may be used to implement the technical solution of the remote controller in any one of the embodiments shown in fig. 8 to fig. 13, and the implementation principle and the technical effect are similar and will not be described again.
Fig. 19 is a schematic structural diagram of a sixth embodiment of an apparatus authentication device according to an embodiment of the present invention, where the apparatus authentication device is disposed in an unmanned aerial vehicle, and as shown in fig. 19, the apparatus authentication device includes: a receiving module 61, a processing module 62 and a sending module 63.
The receiving module 61 is configured to receive authentication data sent by a remote controller, where the authentication data is sent to the remote controller by an authentication device and forwarded by the remote controller.
And the processing module 62 is configured to perform encryption operation on the authentication data by using a key included in an encryption authentication chip to obtain an operation result, where the encryption authentication chip is implanted in the unmanned aerial vehicle.
A sending module 63, configured to send the operation result to the remote controller, so that the remote controller forwards the operation result to the authentication device, where the operation result is used to determine that the authentication device can communicate with the remote controller when the authentication device determines that the operation result is correct.
Optionally, the encryption authentication chip implanted in the unmanned aerial vehicle is further configured to enable the authentication device to authenticate the unmanned aerial vehicle according to the encryption authentication chip.
Optionally, the drone is connected to the authentication device, and the sending module 63 is further configured to: and directly sending data information to the authentication device, wherein the data information comprises image data.
Optionally, the drone is connected to the authentication device, and the receiving module 61 is further configured to: and directly receiving the unmanned aerial vehicle upgrading instruction sent by the authentication equipment.
The processing module 62 is further configured to: and executing the unmanned aerial vehicle upgrading instruction to complete corresponding upgrading operation.
Optionally, the remote controller is connected to the authentication device, and the receiving module 61 is further configured to: and receiving an unmanned aerial vehicle upgrading instruction which is sent from the authentication equipment and forwarded by the unmanned aerial vehicle.
The processing module 62 is further configured to: and executing the unmanned aerial vehicle upgrading instruction to complete corresponding upgrading operation.
The device authentication apparatus provided in this embodiment may be used to implement the technical solution of the drone in any one of the embodiments shown in fig. 8 to 13, and the implementation principle and the technical effect are similar and will not be described again.
Fig. 20 is a schematic structural diagram of an authentication apparatus according to a first embodiment of the present invention, and as shown in fig. 20, the authentication apparatus includes: a transmitter 71, a receiver 72, a processor 73.
The transmitter 71 is configured to transmit authentication data to the drone so that the drone forwards the authentication data to the remote controller, where the authentication data is used to enable the remote controller to perform encryption operation on the authentication data by using a key included in an encryption authentication chip to obtain an operation result; wherein, the remote controller is embedded with the encryption authentication chip.
A receiver 72, configured to receive the operation result forwarded by the remote controller through the drone.
And a processor 73, configured to determine that communication with the drone is possible when it is determined that the operation result is correct.
Optionally, the processor 73 is specifically configured to: calculating the authentication data according to a locally stored encryption authentication algorithm to obtain a target calculation result; determining that communication with the unmanned aerial vehicle is possible when it is determined that the operation result is consistent with the target operation result.
Optionally, the processor 73 is specifically configured to: decrypting the operation result; determining that communication with the drone is possible when it is determined that the decryption result is consistent with the authentication data.
Optionally, the processor 73 is further configured to: and authenticating the remote controller according to the encryption authentication chip implanted in the remote controller.
Optionally, the authentication device is connected to the drone, and the receiver 72 is further configured to: and directly receiving data information sent by the unmanned aerial vehicle, wherein the data information comprises image data.
Optionally, the authentication device is connected to the drone, and the transmitter 71 is further configured to: directly to unmanned aerial vehicle sends unmanned aerial vehicle upgrading instruction, so that unmanned aerial vehicle carries out unmanned aerial vehicle upgrading instruction accomplishes corresponding upgrading operation.
Optionally, the authentication device is connected to the drone, and the transmitter 71 is further configured to: and directly sending a remote controller upgrading instruction to the unmanned aerial vehicle so that the unmanned aerial vehicle forwards the remote controller upgrading instruction to the remote controller, and the remote controller executes the remote controller upgrading instruction to complete corresponding upgrading operation.
The authentication device provided in this embodiment may be used to execute the technical solution in any one of the method embodiments shown in fig. 2 to fig. 7, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 21 is a schematic structural diagram of a first embodiment of the unmanned aerial vehicle provided in the embodiment of the present invention, and as shown in fig. 21, the unmanned aerial vehicle includes: a receiver 81, a transmitter 82, a processor 83.
A receiver 81 for receiving the authentication data sent by the authentication device.
And the transmitter 82 is used for transmitting the authentication data to a remote controller so that the remote controller performs encryption operation on the authentication data by using a secret key contained in an encryption authentication chip to obtain an operation result, wherein the encryption authentication chip is implanted in the remote controller.
The receiver 81 is further configured to receive the operation result sent by the remote controller, send the operation result to the authentication device, and determine that communication with the authentication device is possible when the operation result is determined to be correct.
Optionally, the drone is connected to the authentication device, and the transmitter 82 is further configured to: and directly sending data information to the authentication device, wherein the data information comprises image data.
Optionally, the drone is connected to the authentication device, and the receiver 81 is further configured to: directly receiving an unmanned aerial vehicle upgrading instruction sent by the authentication equipment;
and the processor 83 is used for executing the unmanned aerial vehicle upgrading instruction and finishing corresponding upgrading operation.
Optionally, the drone is connected to the authentication device, and the receiver 81 is further configured to: and directly receiving a remote controller upgrading instruction sent by the authentication equipment.
The transmitter 82 is further configured to: and forwarding the remote controller upgrading instruction to the remote controller, so that the remote controller executes the remote controller upgrading instruction to complete corresponding upgrading operation.
The unmanned aerial vehicle provided by this embodiment may be used to execute the technical solution in any one of the method embodiments shown in fig. 2 to fig. 7, and the implementation principle and technical effect thereof are similar and will not be described herein again.
Fig. 22 is a schematic structural diagram of a first embodiment of a remote controller according to the present invention, and as shown in fig. 22, the remote controller includes: a receiver 91, a processor 92, a transmitter 93.
A receiver 91, configured to receive authentication data sent by a drone, where the authentication data is sent to the drone by an authentication device and forwarded by the drone.
And the processor 92 is configured to perform encryption operation on the authentication data by using a key included in an encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted in the remote controller.
A transmitter 93, configured to send the operation result to the drone so that the drone forwards the operation result to the authentication device, where the operation result is used to enable the authentication device to determine that the authentication device can communicate with the drone when the operation result is determined to be correct.
Optionally, the encryption authentication chip implanted in the remote controller is further configured to enable the authentication device to authenticate the remote controller according to the encryption authentication chip.
Optionally, the receiver 91 is further configured to: and receiving a remote controller upgrading instruction which is sent from the authentication equipment and forwarded by the unmanned aerial vehicle.
The processor 92 is further configured to: and executing the remote controller upgrading instruction to complete corresponding upgrading operation.
The remote controller provided in this embodiment may be used to execute the technical solution in any one of the method embodiments shown in fig. 2 to fig. 7, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 23 is a schematic structural diagram of a second authentication apparatus according to an embodiment of the present invention, and as shown in fig. 23, the authentication apparatus includes: a transmitter 1011, a receiver 1012, a processor 1013.
A transmitter 1011, configured to transmit authentication data to a remote controller, so that the remote controller forwards the authentication data to an unmanned aerial vehicle, where the authentication data is used to enable the unmanned aerial vehicle to perform an encryption operation on the authentication data by using a key included in an encryption authentication chip, so as to obtain an operation result; wherein, be implanted in the unmanned aerial vehicle and encrypt authentication chip.
A receiver 1012, configured to receive the operation result forwarded by the drone through the remote controller.
And a processor 1013 configured to determine that communication with the remote controller is possible when the operation result is determined to be correct.
Optionally, the processor 1013 is specifically configured to:
calculating the authentication data according to a locally stored encryption authentication algorithm to obtain a target calculation result; determining that communication with the remote controller is possible when it is determined that the operation result coincides with the target operation result.
Optionally, the processor 1013 is specifically configured to:
decrypting the operation result; determining that communication with the remote controller is possible when it is determined that the decryption result coincides with the authentication data.
Optionally, the processor 1013 is further configured to: and authenticating the unmanned aerial vehicle according to the encryption authentication chip implanted in the unmanned aerial vehicle.
Optionally, the authentication device is connected to the remote controller, and the transmitter 1011 is further configured to: and directly sending a remote controller upgrading instruction to the remote controller so that the remote controller executes the remote controller upgrading instruction to complete corresponding upgrading operation.
Optionally, the authentication device is connected to the remote controller, and the transmitter 1011 is further configured to: directly to the remote controller sends unmanned aerial vehicle upgrading instruction, so that the remote controller will unmanned aerial vehicle upgrading instruction forwards to unmanned aerial vehicle makes unmanned aerial vehicle carries out unmanned aerial vehicle upgrading instruction accomplishes corresponding upgrading operation.
Optionally, the authentication device is connected to the drone, and the receiver 1012 is further configured to: and directly receiving data information sent by the unmanned aerial vehicle to the authentication equipment, wherein the data information comprises image data.
Optionally, the authentication device is connected to the drone, and the transmitter 1011 is further configured to: directly to unmanned aerial vehicle sends unmanned aerial vehicle upgrading instruction, so that unmanned aerial vehicle carries out unmanned aerial vehicle upgrading instruction accomplishes corresponding upgrading operation.
The authentication device provided in this embodiment may be used to execute the technical solution in any one of the embodiments shown in fig. 8 to fig. 13, and the implementation principle and the technical effect are similar and will not be described again.
Fig. 24 is a schematic structural diagram of a second embodiment of the remote controller according to the present invention, and as shown in fig. 24, the remote controller includes: receiver 1111, transmitter 1112.
A receiver 1111, configured to receive authentication data sent by the authentication device.
A transmitter 1112, configured to transmit the authentication data to an unmanned aerial vehicle, so that the unmanned aerial vehicle performs an encryption operation on the authentication data by using a key included in an encryption authentication chip, to obtain an operation result, where the encryption authentication chip is implanted in the unmanned aerial vehicle.
The receiver 1111 is further configured to receive the operation result sent by the unmanned aerial vehicle, send the operation result to the authentication device, and determine that communication with the authentication device is possible when it is determined that the operation result is correct.
Optionally, the remote controller is connected to the authentication device, and the receiver 1111 is further configured to: and directly receiving a remote controller upgrading instruction sent by the authentication equipment.
The remote controller further includes: and the processor 1113 is configured to execute the remote controller upgrading instruction to complete corresponding upgrading operation.
Optionally, the remote controller is connected to the authentication device, and the receiver 1111 is further configured to: and directly receiving the unmanned aerial vehicle upgrading instruction sent by the authentication equipment.
The transmitter 1112 is further configured to: and forwarding the unmanned aerial vehicle upgrading instruction to the unmanned aerial vehicle so that the unmanned aerial vehicle executes the unmanned aerial vehicle upgrading instruction to complete corresponding upgrading operation.
The remote controller provided in this embodiment may be used to implement the technical solution in any one of the embodiments shown in fig. 8 to 13, and the implementation principle and the technical effect are similar and will not be described again.
Fig. 25 is a schematic structural diagram of a second embodiment of the unmanned aerial vehicle provided in the embodiment of the present invention, and as shown in fig. 25, the unmanned aerial vehicle includes: a receiver 1211, a processor 1212, a transmitter 1213.
A receiver 1211, configured to receive authentication data sent by a remote controller, where the authentication data is sent to the remote controller by an authentication device and forwarded by the remote controller.
And the processor 1212 is configured to perform encryption operation on the authentication data by using a key included in an encryption authentication chip to obtain an operation result, where the encryption authentication chip is implanted in the unmanned aerial vehicle.
A transmitter 1213, configured to transmit the operation result to the remote controller, so that the remote controller forwards the operation result to the authentication device, where the operation result is used to enable the authentication device to determine that the authentication device can communicate with the remote controller when the operation result is determined to be correct.
Optionally, the encryption authentication chip implanted in the unmanned aerial vehicle is further configured to enable the authentication device to authenticate the unmanned aerial vehicle according to the encryption authentication chip.
Optionally, the drone is connected to the authentication device, and the transmitter 1213 is further configured to: and directly sending data information to the authentication device, wherein the data information comprises image data.
Optionally, the drone is connected to the authentication device, and the receiver 1211 is further configured to: and directly receiving the unmanned aerial vehicle upgrading instruction sent by the authentication equipment.
The processor 1212 is further configured to: and executing the unmanned aerial vehicle upgrading instruction to complete corresponding upgrading operation.
Optionally, the remote controller is connected to the authentication device, and the receiver 1211 is further configured to: and receiving an unmanned aerial vehicle upgrading instruction which is sent from the authentication equipment and forwarded by the unmanned aerial vehicle.
The processor 1212 is further configured to: and executing the unmanned aerial vehicle upgrading instruction to complete corresponding upgrading operation.
The unmanned aerial vehicle provided by this embodiment can be used to execute the technical scheme in any one of the embodiments shown in fig. 8 to 13, and the implementation principle and technical effect thereof are similar and are not described again.
In the embodiments of the authentication device, the unmanned aerial vehicle, and the remote controller, it should be understood that the Processor may be a Central Processing Unit (CPU), other general-purpose processors, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), and the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware processor, or may be implemented by a combination of hardware and software modules in the processor.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: read-only memory (ROM), RAM, flash memory, hard disk, solid state disk, magnetic tape (magnetic tape), floppy disk (flexible disk), optical disk (optical disk), and any combination thereof.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (78)

1. A device authentication method, comprising:
the authentication equipment sends authentication data to the unmanned aerial vehicle so that the unmanned aerial vehicle forwards the authentication data to the remote controller, and the authentication data is used for enabling the remote controller to carry out encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip so as to obtain an operation result; the remote controller is embedded with the encryption authentication chip;
the authentication equipment receives the operation result forwarded by the remote controller through the unmanned aerial vehicle;
when the authentication equipment determines that the operation result is correct, the authentication equipment determines that the authentication equipment can communicate with the unmanned aerial vehicle;
the method further comprises the following steps:
and the authentication equipment authenticates the remote controller and the unmanned aerial vehicle according to the encrypted authentication chip implanted in the remote controller.
2. The method of claim 1, wherein the authentication device determining that communication with the drone is possible when the operation result is determined to be correct comprises:
the authentication equipment calculates the authentication data according to a locally stored encryption authentication algorithm to obtain a target calculation result;
the authentication device determines that communication with the unmanned aerial vehicle is possible when it is determined that the operation result is consistent with the target operation result.
3. The method of claim 1, wherein the authentication device determining that communication with the drone is possible when the operation result is determined to be correct comprises:
the authentication equipment decrypts the operation result;
and the authentication equipment determines that the unmanned aerial vehicle can communicate when determining that the decryption result is consistent with the authentication data.
4. The method of any of claims 1-3, wherein the authentication device is connected with the drone, the method further comprising:
the authentication equipment directly receives data information sent by the unmanned aerial vehicle to the authentication equipment, and the data information comprises image data.
5. The method of any of claims 1-3, wherein the authentication device is connected with the drone, the method further comprising:
the authentication equipment directly sends an unmanned aerial vehicle upgrading instruction to the unmanned aerial vehicle so that the unmanned aerial vehicle executes the unmanned aerial vehicle upgrading instruction to complete corresponding upgrading operation.
6. The method of any of claims 1-3, wherein the authentication device is connected with the drone, the method further comprising:
the authentication equipment directly sends a remote controller upgrading instruction to the unmanned aerial vehicle, so that the unmanned aerial vehicle forwards the remote controller upgrading instruction to the remote controller, the remote controller executes the remote controller upgrading instruction, and corresponding upgrading operation is completed.
7. A device authentication method, comprising:
the unmanned aerial vehicle receives authentication data sent by the authentication equipment;
the unmanned aerial vehicle sends the authentication data to a remote controller so that the remote controller carries out encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted into the remote controller;
the unmanned aerial vehicle receives the operation result sent by the remote controller, sends the operation result to the authentication equipment, and determines that the unmanned aerial vehicle can communicate with the authentication equipment when the operation result is determined to be correct;
wherein the authentication device is configured to authenticate the remote controller and the drone according to the encrypted authentication chip implanted in the remote controller.
8. The method of claim 7, wherein the drone is connected with the authentication device, the method further comprising:
the unmanned aerial vehicle directly sends data information to the authentication equipment, and the data information comprises image data.
9. The method of claim 7, wherein the drone is connected with the authentication device, the method further comprising:
the unmanned aerial vehicle directly receives the unmanned aerial vehicle upgrading instruction sent by the authentication equipment, executes the unmanned aerial vehicle upgrading instruction, and completes corresponding upgrading operation.
10. The method of claim 7, wherein the drone is connected with the authentication device, the method further comprising:
the unmanned aerial vehicle directly receives the remote controller upgrading instruction sent by the authentication equipment, and forwards the remote controller upgrading instruction to the remote controller, so that the remote controller executes the remote controller upgrading instruction to complete corresponding upgrading operation.
11. A device authentication method, comprising:
the method comprises the steps that a remote controller receives authentication data sent by an unmanned aerial vehicle, wherein the authentication data are sent to the unmanned aerial vehicle by authentication equipment and forwarded by the unmanned aerial vehicle;
the remote controller adopts a secret key contained in an encryption authentication chip to carry out encryption operation on the authentication data to obtain an operation result, and the encryption authentication chip is implanted into the remote controller;
the remote controller sends the operation result to the unmanned aerial vehicle so that the unmanned aerial vehicle forwards the operation result to the authentication equipment, wherein the operation result is used for ensuring that the authentication equipment can communicate with the unmanned aerial vehicle when the authentication equipment determines that the operation result is correct;
the encryption authentication chip implanted in the remote controller is also used for enabling the authentication equipment to authenticate the remote controller according to the encryption authentication chip.
12. The method of claim 11, further comprising:
the remote controller receives a remote controller upgrading instruction which is sent by the authentication equipment and forwarded by the unmanned aerial vehicle, executes the remote controller upgrading instruction, and completes corresponding upgrading operation.
13. A device authentication method, comprising:
the authentication equipment sends authentication data to a remote controller so that the remote controller forwards the authentication data to the unmanned aerial vehicle, and the authentication data is used for enabling the unmanned aerial vehicle to carry out encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip so as to obtain an operation result; the unmanned aerial vehicle is implanted with the encryption authentication chip;
the authentication equipment receives the operation result forwarded by the unmanned aerial vehicle through the remote controller;
when the authentication equipment determines that the operation result is correct, the authentication equipment determines that the authentication equipment can communicate with the remote controller;
the method further comprises the following steps:
the authentication equipment authenticates the remote controller and the unmanned aerial vehicle according to the encryption authentication chip implanted in the unmanned aerial vehicle.
14. The method of claim 13, wherein the authentication device determining that communication with the remote controller is possible when the operation result is determined to be correct comprises:
the authentication equipment calculates the authentication data according to a locally stored encryption authentication algorithm to obtain a target calculation result;
the authentication device determines that communication with the remote controller is possible when it is determined that the operation result coincides with the target operation result.
15. The method of claim 13, wherein the authentication device determining that communication with the remote controller is possible when the operation result is determined to be correct comprises:
the authentication equipment decrypts the operation result;
the authentication device determines that communication with the remote controller is possible when it is determined that the decryption result coincides with the authentication data.
16. The method of claim 13, wherein the authentication device is connected to the remote control, the method further comprising:
the authentication equipment directly sends a remote controller upgrading instruction to the remote controller so that the remote controller executes the remote controller upgrading instruction to complete corresponding upgrading operation.
17. The method of claim 13, wherein the authentication device is connected to the remote control, the method further comprising:
the authentication equipment directly sends an unmanned aerial vehicle upgrading instruction to the remote controller, so that the remote controller forwards the unmanned aerial vehicle upgrading instruction to the unmanned aerial vehicle, the unmanned aerial vehicle executes the unmanned aerial vehicle upgrading instruction, and corresponding upgrading operation is completed.
18. The method of claim 13, wherein the authentication device is connected with the drone, the method further comprising:
the authentication equipment directly receives data information sent by the unmanned aerial vehicle to the authentication equipment, and the data information comprises image data.
19. The method of claim 13, wherein the authentication device is connected with the drone, the method further comprising:
the authentication equipment directly sends an unmanned aerial vehicle upgrading instruction to the unmanned aerial vehicle so that the unmanned aerial vehicle executes the unmanned aerial vehicle upgrading instruction to complete corresponding upgrading operation.
20. A device authentication method, comprising:
the remote controller receives authentication data sent by the authentication equipment;
the remote controller sends the authentication data to the unmanned aerial vehicle so that the unmanned aerial vehicle carries out encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted into the unmanned aerial vehicle;
the remote controller receives the operation result sent by the unmanned aerial vehicle, sends the operation result to the authentication equipment, and determines that the remote controller can communicate with the authentication equipment when the operation result is determined to be correct;
wherein the authentication device is configured to authenticate the remote controller and the drone according to the encrypted authentication chip implanted in the remote controller.
21. The method of claim 20, wherein the remote control is connected to the authentication device, the method further comprising:
and the remote controller directly receives a remote controller upgrading instruction sent by the authentication equipment, executes the remote controller upgrading instruction and completes corresponding upgrading operation.
22. The method of claim 20, wherein the remote control is connected to the authentication device, the method further comprising:
the remote controller directly receives the unmanned aerial vehicle upgrading instruction sent by the authentication equipment, and forwards the unmanned aerial vehicle upgrading instruction to the unmanned aerial vehicle, so that the unmanned aerial vehicle executes the unmanned aerial vehicle upgrading instruction to complete corresponding upgrading operation.
23. A device authentication method, comprising:
the unmanned aerial vehicle receives authentication data sent by a remote controller, wherein the authentication data is sent to the remote controller by authentication equipment and forwarded by the remote controller;
the unmanned aerial vehicle adopts a secret key contained in an encryption authentication chip to carry out encryption operation on the authentication data to obtain an operation result, and the encryption authentication chip is implanted into the unmanned aerial vehicle;
the unmanned aerial vehicle sends the operation result to the remote controller so that the remote controller forwards the operation result to the authentication equipment, and the operation result is used for ensuring that the authentication equipment can communicate with the remote controller when the authentication equipment determines that the operation result is correct;
the encryption authentication chip implanted in the unmanned aerial vehicle is further used for enabling the authentication equipment to authenticate the unmanned aerial vehicle according to the encryption authentication chip.
24. The method of claim 23, wherein the drone is connected with the authentication device, the method further comprising:
the unmanned aerial vehicle directly sends data information to the authentication equipment, and the data information comprises image data.
25. The method of claim 23, wherein the drone is connected with the authentication device, the method further comprising:
the unmanned aerial vehicle directly receives the unmanned aerial vehicle upgrading instruction sent by the authentication equipment, executes the unmanned aerial vehicle upgrading instruction, and completes corresponding upgrading operation.
26. The method of claim 23, wherein the remote control is connected to the authentication device, the method further comprising:
the unmanned aerial vehicle receives the unmanned aerial vehicle upgrading instruction which is sent by the authentication equipment and forwarded by the unmanned aerial vehicle, executes the unmanned aerial vehicle upgrading instruction, and completes corresponding upgrading operation.
27. An apparatus authentication apparatus provided in an authentication device, the apparatus authentication apparatus comprising:
the remote controller comprises a sending module, a remote controller and an authentication module, wherein the sending module is used for sending authentication data to the unmanned aerial vehicle so that the unmanned aerial vehicle forwards the authentication data to the remote controller, and the authentication data is used for enabling the remote controller to carry out encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip so as to obtain an operation result; the remote controller is embedded with the encryption authentication chip;
the receiving module is used for receiving the operation result forwarded by the remote controller through the unmanned aerial vehicle;
the processing module is used for determining that the unmanned aerial vehicle can communicate with the processing module when the operation result is determined to be correct;
the processing module is further configured to:
and authenticating the remote controller and the unmanned aerial vehicle according to the encryption authentication chip implanted in the remote controller.
28. The apparatus of claim 27, wherein the processing module is specifically configured to: calculating the authentication data according to a locally stored encryption authentication algorithm to obtain a target calculation result;
determining that communication with the unmanned aerial vehicle is possible when it is determined that the operation result is consistent with the target operation result.
29. The apparatus of claim 27, wherein the processing module is specifically configured to:
decrypting the operation result;
determining that communication with the drone is possible when it is determined that the decryption result is consistent with the authentication data.
30. The apparatus of any of claims 27-29, wherein the authentication device is connected to the drone, the receiving module further to:
and directly receiving data information sent by the unmanned aerial vehicle, wherein the data information comprises image data.
31. The apparatus of any of claims 27-29, wherein the authentication device is connected to the drone, and wherein the sending module is further configured to:
directly to unmanned aerial vehicle sends unmanned aerial vehicle upgrading instruction, so that unmanned aerial vehicle carries out unmanned aerial vehicle upgrading instruction accomplishes corresponding upgrading operation.
32. The apparatus of any of claims 27-29, wherein the authentication device is connected to the drone, and wherein the sending module is further configured to:
and directly sending a remote controller upgrading instruction to the unmanned aerial vehicle so that the unmanned aerial vehicle forwards the remote controller upgrading instruction to the remote controller, and the remote controller executes the remote controller upgrading instruction to complete corresponding upgrading operation.
33. An apparatus authentication device, characterized in that, the apparatus authentication device is provided in an unmanned aerial vehicle, the apparatus authentication device includes:
the receiving module is used for receiving authentication data sent by the authentication equipment;
the sending module is used for sending the authentication data to a remote controller so that the remote controller carries out encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted into the remote controller;
the receiving module is further configured to receive the operation result sent by the remote controller, send the operation result to the authentication device, and determine that communication with the authentication device is possible when the operation result is determined to be correct;
wherein the authentication device is configured to authenticate the remote controller and the drone according to the encrypted authentication chip implanted in the remote controller.
34. The apparatus of claim 33, wherein the drone is connected with the authentication device, the sending module further configured to:
and directly sending data information to the authentication device, wherein the data information comprises image data.
35. The apparatus of claim 33, wherein the drone is connected with the authentication device, the receiving module further configured to:
directly receiving an unmanned aerial vehicle upgrading instruction sent by the authentication equipment;
the device further comprises:
and the processing module is used for executing the unmanned aerial vehicle upgrading instruction and finishing corresponding upgrading operation.
36. The apparatus of claim 33, wherein the drone is connected with the authentication device, the receiving module further configured to:
directly receiving a remote controller upgrading instruction sent by the authentication equipment;
the sending module is further configured to: and forwarding the remote controller upgrading instruction to the remote controller, so that the remote controller executes the remote controller upgrading instruction to complete corresponding upgrading operation.
37. An apparatus authentication apparatus provided in a remote controller, the apparatus authentication apparatus comprising:
the receiving module is used for receiving authentication data sent by the unmanned aerial vehicle, wherein the authentication data is sent to the unmanned aerial vehicle by authentication equipment and forwarded by the unmanned aerial vehicle;
the processing module is used for carrying out encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted into the remote controller;
a sending module, configured to send the operation result to the drone so that the drone forwards the operation result to the authentication device, where the operation result is used to enable the authentication device to determine that the authentication device can communicate with the drone when the operation result is determined to be correct by the authentication device;
the encryption authentication chip implanted in the remote controller is also used for enabling the authentication equipment to authenticate the remote controller according to the encryption authentication chip.
38. The apparatus of claim 37, wherein the receiving module is further configured to:
receiving a remote controller upgrading instruction which is sent from the authentication equipment and forwarded by the unmanned aerial vehicle;
the processing module is further configured to: and executing the remote controller upgrading instruction to complete corresponding upgrading operation.
39. An apparatus authentication apparatus provided in an authentication device, the apparatus authentication apparatus comprising:
the remote controller comprises a sending module, a receiving module and a processing module, wherein the sending module is used for sending authentication data to the remote controller so that the remote controller forwards the authentication data to the unmanned aerial vehicle, and the authentication data is used for enabling the unmanned aerial vehicle to carry out encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip so as to obtain an operation result; the unmanned aerial vehicle is implanted with the encryption authentication chip;
the receiving module is used for receiving the operation result forwarded by the unmanned aerial vehicle through the remote controller;
the processing module is used for determining that the remote controller can be communicated when the operation result is determined to be correct;
the processing module is further configured to:
and authenticating the remote controller and the unmanned aerial vehicle according to the encryption authentication chip implanted in the unmanned aerial vehicle.
40. The apparatus of claim 39, wherein the processing module is specifically configured to:
calculating the authentication data according to a locally stored encryption authentication algorithm to obtain a target calculation result;
determining that communication with the remote controller is possible when it is determined that the operation result coincides with the target operation result.
41. The apparatus of claim 39, wherein the processing module is specifically configured to:
decrypting the operation result;
determining that communication with the remote controller is possible when it is determined that the decryption result coincides with the authentication data.
42. The apparatus of claim 39, wherein the authentication device is connected to the remote controller, and wherein the sending module is further configured to:
and directly sending a remote controller upgrading instruction to the remote controller so that the remote controller executes the remote controller upgrading instruction to complete corresponding upgrading operation.
43. The apparatus of claim 39, wherein the authentication device is connected to the remote controller, and wherein the sending module is further configured to:
directly to the remote controller sends unmanned aerial vehicle upgrading instruction, so that the remote controller will unmanned aerial vehicle upgrading instruction forwards to unmanned aerial vehicle makes unmanned aerial vehicle carries out unmanned aerial vehicle upgrading instruction accomplishes corresponding upgrading operation.
44. The apparatus of claim 39, wherein the authentication device is connected to the drone, and wherein the receiving module is further configured to:
and directly receiving data information sent by the unmanned aerial vehicle to the authentication equipment, wherein the data information comprises image data.
45. The apparatus of claim 39, wherein the authentication device is connected to the drone, and wherein the sending module is further configured to:
directly to unmanned aerial vehicle sends unmanned aerial vehicle upgrading instruction, so that unmanned aerial vehicle carries out unmanned aerial vehicle upgrading instruction accomplishes corresponding upgrading operation.
46. An apparatus authentication apparatus provided in a remote controller, the apparatus authentication apparatus comprising:
the receiving module is used for receiving authentication data sent by the authentication equipment;
the sending module is used for sending the authentication data to the unmanned aerial vehicle so that the unmanned aerial vehicle can carry out encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted into the unmanned aerial vehicle;
the receiving module is further configured to receive the operation result sent by the unmanned aerial vehicle, send the operation result to the authentication device, and determine that communication with the authentication device is possible when the operation result is determined to be correct;
wherein the authentication device is configured to authenticate the remote controller and the drone according to the encrypted authentication chip implanted in the remote controller.
47. The apparatus of claim 46, wherein the remote control is connected to the authentication device, and wherein the receiving module is further configured to:
directly receiving a remote controller upgrading instruction sent by the authentication equipment;
the device further comprises:
and the processing module is used for executing the remote controller upgrading instruction and finishing the corresponding upgrading operation.
48. The apparatus of claim 46, wherein the remote control is connected to the authentication device, and wherein the receiving module is further configured to:
directly receiving an unmanned aerial vehicle upgrading instruction sent by the authentication equipment;
the sending module is further configured to: and forwarding the unmanned aerial vehicle upgrading instruction to the unmanned aerial vehicle so that the unmanned aerial vehicle executes the unmanned aerial vehicle upgrading instruction to complete corresponding upgrading operation.
49. An apparatus authentication device, characterized in that, the apparatus authentication device is provided in an unmanned aerial vehicle, the apparatus authentication device includes:
the remote controller comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving authentication data sent by the remote controller, and the authentication data is sent to the remote controller by authentication equipment and forwarded by the remote controller;
the processing module is used for carrying out encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted into the unmanned aerial vehicle;
the sending module is used for sending the operation result to the remote controller so that the remote controller forwards the operation result to the authentication equipment, and the operation result is used for ensuring that the authentication equipment can communicate with the remote controller when the authentication equipment determines that the operation result is correct;
the encryption authentication chip implanted in the unmanned aerial vehicle is further used for enabling the authentication equipment to authenticate the unmanned aerial vehicle according to the encryption authentication chip.
50. The apparatus of claim 49, wherein the drone is connected to the authentication device, the sending module further configured to:
and directly sending data information to the authentication device, wherein the data information comprises image data.
51. The apparatus of claim 49, wherein the drone is connected with the authentication device, the receiving module further configured to:
directly receiving an unmanned aerial vehicle upgrading instruction sent by the authentication equipment;
the processing module is further configured to: and executing the unmanned aerial vehicle upgrading instruction to complete corresponding upgrading operation.
52. The apparatus of claim 49, wherein the remote control is connected to the authentication device, and wherein the receiving module is further configured to:
receiving an unmanned aerial vehicle upgrading instruction which is sent from the authentication equipment and forwarded by the unmanned aerial vehicle;
the processing module is further configured to: and executing the unmanned aerial vehicle upgrading instruction to complete corresponding upgrading operation.
53. An authentication device, comprising:
the transmitter is used for transmitting authentication data to the unmanned aerial vehicle so that the unmanned aerial vehicle can forward the authentication data to the remote controller, and the authentication data is used for enabling the remote controller to carry out encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip so as to obtain an operation result; the remote controller is embedded with the encryption authentication chip;
the receiver is used for receiving the operation result forwarded by the remote controller through the unmanned aerial vehicle;
the processor is used for determining that the unmanned aerial vehicle can communicate with the unmanned aerial vehicle when the operation result is determined to be correct;
the processor is further configured to:
and authenticating the remote controller and the unmanned aerial vehicle according to the encryption authentication chip implanted in the remote controller.
54. The authentication device of claim 53, wherein the processor is specifically configured to: calculating the authentication data according to a locally stored encryption authentication algorithm to obtain a target calculation result;
determining that communication with the unmanned aerial vehicle is possible when it is determined that the operation result is consistent with the target operation result.
55. The authentication device of claim 53, wherein the processor is specifically configured to:
decrypting the operation result;
determining that communication with the drone is possible when it is determined that the decryption result is consistent with the authentication data.
56. The authentication device of any one of claims 53 to 55, wherein the authentication device is connected to the drone, the receiver further to:
and directly receiving data information sent by the unmanned aerial vehicle, wherein the data information comprises image data.
57. The authentication device of any one of claims 53 to 55, wherein the authentication device is connected to the drone, the transmitter further configured to:
directly to unmanned aerial vehicle sends unmanned aerial vehicle upgrading instruction, so that unmanned aerial vehicle carries out unmanned aerial vehicle upgrading instruction accomplishes corresponding upgrading operation.
58. The authentication device of any one of claims 53 to 55, wherein the authentication device is connected to the drone, the transmitter further configured to:
and directly sending a remote controller upgrading instruction to the unmanned aerial vehicle so that the unmanned aerial vehicle forwards the remote controller upgrading instruction to the remote controller, and the remote controller executes the remote controller upgrading instruction to complete corresponding upgrading operation.
59. An unmanned aerial vehicle, comprising:
a receiver for receiving authentication data transmitted by an authentication device;
the transmitter is used for transmitting the authentication data to a remote controller so that the remote controller carries out encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted into the remote controller;
the receiver is further configured to receive the operation result sent by the remote controller, send the operation result to the authentication device, and determine that communication with the authentication device is possible when the operation result is determined to be correct;
wherein the authentication device is configured to authenticate the remote controller and the drone according to the encrypted authentication chip implanted in the remote controller.
60. A drone as claimed in claim 59, wherein the drone is connected with the authentication device, the transmitter being further to:
and directly sending data information to the authentication device, wherein the data information comprises image data.
61. A drone as claimed in claim 59, wherein the drone is connected with the authentication device, the receiver being further to:
directly receiving an unmanned aerial vehicle upgrading instruction sent by the authentication equipment;
the unmanned aerial vehicle still includes:
and the processor is used for executing the unmanned aerial vehicle upgrading instruction and finishing corresponding upgrading operation.
62. A drone as claimed in claim 59, wherein the drone is connected with the authentication device, the receiver being further to:
directly receiving a remote controller upgrading instruction sent by the authentication equipment;
the transmitter is further configured to: and forwarding the remote controller upgrading instruction to the remote controller, so that the remote controller executes the remote controller upgrading instruction to complete corresponding upgrading operation.
63. A remote control, comprising:
the receiver is used for receiving authentication data sent by the unmanned aerial vehicle, wherein the authentication data is sent to the unmanned aerial vehicle by the authentication equipment and forwarded by the unmanned aerial vehicle;
the processor is used for carrying out encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted into the remote controller;
a transmitter, configured to transmit the operation result to the drone so that the drone forwards the operation result to the authentication device, where the operation result is used to enable the authentication device to determine that the authentication device can communicate with the drone when the operation result is determined to be correct;
the encryption authentication chip implanted in the remote controller is also used for enabling the authentication equipment to authenticate the remote controller according to the encryption authentication chip.
64. The remote control of claim 63, wherein the receiver is further configured to:
receiving a remote controller upgrading instruction which is sent from the authentication equipment and forwarded by the unmanned aerial vehicle;
the processor is further configured to: and executing the remote controller upgrading instruction to complete corresponding upgrading operation.
65. An authentication device, comprising:
the transmitter is used for transmitting authentication data to a remote controller so that the remote controller can forward the authentication data to the unmanned aerial vehicle, and the authentication data is used for enabling the unmanned aerial vehicle to carry out encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip so as to obtain an operation result; the unmanned aerial vehicle is implanted with the encryption authentication chip;
the receiver is used for receiving the operation result forwarded by the unmanned aerial vehicle through the remote controller;
the processor is used for determining that the remote controller can be communicated when the operation result is determined to be correct;
the processor is further configured to:
and authenticating the remote controller and the unmanned aerial vehicle according to the encryption authentication chip implanted in the unmanned aerial vehicle.
66. The authentication device of claim 65, wherein the processor is specifically configured to:
calculating the authentication data according to a locally stored encryption authentication algorithm to obtain a target calculation result;
determining that communication with the remote controller is possible when it is determined that the operation result coincides with the target operation result.
67. The authentication device of claim 65, wherein the processor is specifically configured to:
decrypting the operation result;
determining that communication with the remote controller is possible when it is determined that the decryption result coincides with the authentication data.
68. The authentication device of claim 65, wherein the authentication device is connected to the remote control, and wherein the transmitter is further configured to:
and directly sending a remote controller upgrading instruction to the remote controller so that the remote controller executes the remote controller upgrading instruction to complete corresponding upgrading operation.
69. The authentication device of claim 65, wherein the authentication device is connected to the remote control, and wherein the transmitter is further configured to:
directly to the remote controller sends unmanned aerial vehicle upgrading instruction, so that the remote controller will unmanned aerial vehicle upgrading instruction forwards to unmanned aerial vehicle makes unmanned aerial vehicle carries out unmanned aerial vehicle upgrading instruction accomplishes corresponding upgrading operation.
70. The authentication device of claim 65, wherein the authentication device is connected to the drone, the receiver further configured to:
and directly receiving data information sent by the unmanned aerial vehicle to the authentication equipment, wherein the data information comprises image data.
71. The authentication device of claim 65, wherein the authentication device is connected to the drone, the transmitter further configured to:
directly to unmanned aerial vehicle sends unmanned aerial vehicle upgrading instruction, so that unmanned aerial vehicle carries out unmanned aerial vehicle upgrading instruction accomplishes corresponding upgrading operation.
72. A remote control, comprising:
a receiver for receiving authentication data transmitted by an authentication device;
the transmitter is used for transmitting the authentication data to the unmanned aerial vehicle so that the unmanned aerial vehicle can perform encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted into the unmanned aerial vehicle;
the receiver is further configured to receive the operation result sent by the unmanned aerial vehicle, send the operation result to the authentication device, and determine that communication with the authentication device is possible when the operation result is determined to be correct;
wherein the authentication device is configured to authenticate the remote controller and the drone according to the encrypted authentication chip implanted in the remote controller.
73. The remote control of claim 72, wherein the remote control is connected to the authentication device, and wherein the receiver is further configured to:
directly receiving a remote controller upgrading instruction sent by the authentication equipment;
the remote controller further includes:
and the processor is used for executing the remote controller upgrading instruction and finishing corresponding upgrading operation.
74. The remote control of claim 72, wherein the remote control is connected to the authentication device, and wherein the receiver is further configured to: directly receiving an unmanned aerial vehicle upgrading instruction sent by the authentication equipment;
the transmitter is further configured to: and forwarding the unmanned aerial vehicle upgrading instruction to the unmanned aerial vehicle so that the unmanned aerial vehicle executes the unmanned aerial vehicle upgrading instruction to complete corresponding upgrading operation.
75. An unmanned aerial vehicle, comprising:
the receiver is used for receiving authentication data sent by a remote controller, wherein the authentication data is sent to the remote controller by authentication equipment and forwarded by the remote controller;
the processor is used for carrying out encryption operation on the authentication data by adopting a secret key contained in an encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted into the unmanned aerial vehicle;
the transmitter is used for transmitting the operation result to the remote controller so that the remote controller can forward the operation result to the authentication equipment, and the operation result is used for ensuring that the authentication equipment can communicate with the remote controller when the authentication equipment determines that the operation result is correct;
the encryption authentication chip implanted in the unmanned aerial vehicle is further used for enabling the authentication equipment to authenticate the unmanned aerial vehicle according to the encryption authentication chip.
76. A drone as defined in claim 75, wherein the drone is connected with the authentication device, the transmitter further to:
and directly sending data information to the authentication device, wherein the data information comprises image data.
77. A drone as defined in claim 75, wherein the drone is connected with the authentication device, the receiver being further to:
directly receiving an unmanned aerial vehicle upgrading instruction sent by the authentication equipment;
the processor is further configured to: and executing the unmanned aerial vehicle upgrading instruction to complete corresponding upgrading operation.
78. A drone as claimed in claim 75, wherein the remote control is connected to the authentication device, the receiver being further configured to: receiving an unmanned aerial vehicle upgrading instruction which is sent from the authentication equipment and forwarded by the unmanned aerial vehicle;
the processor is further configured to: and executing the unmanned aerial vehicle upgrading instruction to complete corresponding upgrading operation.
CN201680002825.4A 2016-02-25 2016-02-25 Equipment authentication method and device, authentication equipment, unmanned aerial vehicle and remote controller Expired - Fee Related CN106797387B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/074581 WO2017143570A1 (en) 2016-02-25 2016-02-25 Method and device for device authentication, authentication device, unmanned aerial vehicle and remote controller

Publications (2)

Publication Number Publication Date
CN106797387A CN106797387A (en) 2017-05-31
CN106797387B true CN106797387B (en) 2020-12-18

Family

ID=58952265

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201680002825.4A Expired - Fee Related CN106797387B (en) 2016-02-25 2016-02-25 Equipment authentication method and device, authentication equipment, unmanned aerial vehicle and remote controller

Country Status (2)

Country Link
CN (1) CN106797387B (en)
WO (1) WO2017143570A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109298874A (en) * 2017-07-24 2019-02-01 深圳市中兴微电子技术有限公司 A kind of unmanned plane software update system and method
CN110383189A (en) * 2018-03-30 2019-10-25 深圳市大疆创新科技有限公司 Unmanned aerial vehicle (UAV) control method and control device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103914076A (en) * 2014-03-28 2014-07-09 浙江吉利控股集团有限公司 Cargo transferring system and method based on unmanned aerial vehicle
CN104809918A (en) * 2015-05-27 2015-07-29 张忠义 Flight management method of unmanned aerial vehicle
CN105206116A (en) * 2015-10-10 2015-12-30 杨珊珊 Unmanned aerial vehicle flight range verification device and verification method thereof
CN105261189A (en) * 2015-11-16 2016-01-20 英华达(上海)科技有限公司 Unmanned aerial vehicle flight control method and system

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20180095122A (en) * 2013-06-12 2018-08-24 콘비다 와이어리스, 엘엘씨 Context and power control information management for proximity services
KR101541359B1 (en) * 2013-10-21 2015-08-03 동국대학교 산학협력단 Method and system for unmanned delivery service
CN104993928A (en) * 2015-05-11 2015-10-21 昆明理工大学 Unmanned plane safe communication link encryption method based on real-time embedded control system
CN104898654A (en) * 2015-05-19 2015-09-09 吴晗 Unmanned plane remote control system and method
CN104918020A (en) * 2015-06-17 2015-09-16 宋克凡 Unmanned plane driving simulation display unit
CN104980210B (en) * 2015-06-26 2019-03-05 陈昊 A kind of unmanned plane cooperating authentication communication mechanism and earth station and method for authenticating
CN104994112A (en) * 2015-07-23 2015-10-21 陈昊 Method for encrypting communication data chain between unmanned aerial vehicle and ground station
CN105139693A (en) * 2015-07-28 2015-12-09 顺丰科技有限公司 Unmanned aerial vehicle monitoring method and unmanned aerial vehicle management platform
CN105353700A (en) * 2015-10-30 2016-02-24 周丽娜 Unmanned aerial vehicle with safety control system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103914076A (en) * 2014-03-28 2014-07-09 浙江吉利控股集团有限公司 Cargo transferring system and method based on unmanned aerial vehicle
CN104809918A (en) * 2015-05-27 2015-07-29 张忠义 Flight management method of unmanned aerial vehicle
CN105206116A (en) * 2015-10-10 2015-12-30 杨珊珊 Unmanned aerial vehicle flight range verification device and verification method thereof
CN105261189A (en) * 2015-11-16 2016-01-20 英华达(上海)科技有限公司 Unmanned aerial vehicle flight control method and system

Also Published As

Publication number Publication date
CN106797387A (en) 2017-05-31
WO2017143570A1 (en) 2017-08-31

Similar Documents

Publication Publication Date Title
CN109923830B (en) System and method for configuring wireless network access device
CN106465121B (en) Electronic subscriber identity module configuration
CN113099443B (en) Equipment authentication method, device, equipment and system
CN106850680B (en) Intelligent identity authentication method and device for rail transit equipment
CN107888577B (en) Door lock firmware upgrading method, door lock, server, system and storage medium
EP3001351A1 (en) User identity authentication method, terminal and service terminal
US11284249B2 (en) Apparatus for secure hearing device communication and related method
CN105634737B (en) Data transmission method, terminal and system
CN108762791A (en) Firmware upgrade method and device
JP7024980B2 (en) Remote control of computing devices
US11546699B2 (en) Hearing device with service mode and related method
WO2016008344A1 (en) Wireless connection establishing methods and wireless connection establishing apparatuses
US20210058252A1 (en) Electronic device and method, performed by electronic device, of transmitting control command to target device
CN103533543A (en) Terminal pairing method and device on basis of near field communication
US10872327B2 (en) Mobile payment systems and mobile payment methods thereof
CN112994873B (en) Certificate application method and equipment
WO2022188033A1 (en) Data uploading method, data downloading method and related device
CN106797387B (en) Equipment authentication method and device, authentication equipment, unmanned aerial vehicle and remote controller
CN105516179B (en) A kind of data safe transmission system and method for guarding against intrusion from network
CN110740109A (en) Network device, method for security, and computer-readable storage medium
CN116232766B (en) OTA-based data encryption system and method
JP6388622B2 (en) COMMUNICATION SYSTEM, TERMINAL DEVICE, COMMUNICATION METHOD, AND PROGRAM
KR20190037088A (en) Security Device providing Security function for image, Camera Device having the same and System on Chip controlling Camera Device
KR101528681B1 (en) Method for Providing Security Push Messaging
WO2014173213A1 (en) Conversion device and display system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20201218

CF01 Termination of patent right due to non-payment of annual fee