Detailed Description
In order to make the technical solution and advantages of the present invention more apparent, the following detailed description of exemplary embodiments of the present invention is provided in conjunction with the accompanying drawings, it being apparent that the described embodiments are only some, but not all embodiments of the present invention. And the embodiments and features of the embodiments in this description may be combined with each other without conflict.
In the embodiment of the invention, when picking up goods, the two-way verification is carried out through the two information of the timestamp of the generation moment of the online logistics order of the user and the timestamp of the goods picking-up moment assigned to the unmanned aerial vehicle, or the one-way verification is carried out based on at least one timestamp, the unmanned aerial vehicle needs to verify whether the user is the real application party of the logistics order, and the user needs to verify whether the unmanned aerial vehicle is the correct unmanned aerial vehicle for appointed goods picking so as to prevent the false picking-up of the goods or the malicious unmanned aerial vehicle from cheating to pick up the goods of the user.
In one embodiment, the unmanned aerial vehicle uses a voice question-and-answer mode to compare and verify the answer of the user and the logistics order information to determine that the user is indeed a receiver, and photographs or videos are taken at the same time.
In another embodiment, similar to the goods taking, two-way verification can be performed through two information of a time stamp of the online logistics order generation time and a time stamp of the goods taking time assigned to the unmanned aerial vehicle, or one-way verification is performed based on at least one time stamp, the unmanned aerial vehicle needs to verify whether a user is a correct consignee, and the consignee needs to verify whether the unmanned aerial vehicle is an unmanned aerial vehicle for appointed goods delivery, so that the situation that other people impersonate the user to cheat to receive goods or the unmanned aerial vehicle misplaces and the user receives other people goods is prevented.
The unmanned aerial vehicle in the invention can be an unmanned aerial vehicle, an unmanned automobile or other unmanned transport means, and in the following preferred embodiments, the unmanned aerial vehicle is used for executing the transport task, and when the unmanned aerial vehicle is applied to other unmanned scenes, other flows related to order interaction and authentication are the same except for different specific transport modes.
Preferably, as shown in fig. 1, a first method for improving transportation safety of an unmanned aerial vehicle according to an embodiment of the present invention includes:
Step 101, an unmanned aerial vehicle acquires transportation order information and first encryption information for safety authentication, wherein the transportation order information comprises transportation place information;
102, after the unmanned aerial vehicle arrives at a transportation place according to the transportation place information, the unmanned aerial vehicle sends the first encryption information to a terminal which is logged in by a user account corresponding to the transportation order information, receives feedback information which is sent by the terminal and aims at the first encryption information, determines whether safety authentication is successful according to the feedback information, and controls a warehouse corresponding to the transportation order information to be opened after the safety authentication is determined to be successful; or alternatively, the first and second heat exchangers may be,
after the unmanned aerial vehicle arrives at the transportation location according to the transportation location information, receiving second encryption information sent by a terminal which is logged in by a user account corresponding to the transportation order information, respectively decrypting and comparing the first encryption information and the second encryption information by the unmanned aerial vehicle, determining whether security authentication is successful according to a comparison result, and controlling a warehouse corresponding to the transportation order information to be opened after the security authentication is determined to be successful; or alternatively, the first and second heat exchangers may be,
the unmanned aerial vehicle further receives third encryption information for safety authentication, after the unmanned aerial vehicle arrives at a transportation place according to the transportation place information, the unmanned aerial vehicle sends the first encryption information to a terminal for logging in a user account corresponding to the transportation order information, receives feedback information aiming at the first encryption information and sent by the terminal, receives second encryption information sent by the terminal, and decrypts and compares the third encryption information and the second encryption information respectively, determines whether the safety authentication is successful or not according to a comparison result and the feedback information, and after the success is determined, controls warehouse opening corresponding to the transportation order information.
Preferably, the feedback information for the first encryption information includes: verifying the first encrypted information as to whether the first encrypted information passes or not;
or, the feedback information for the first encryption information includes: information decrypted by the first encryption information; the step of receiving the feedback information further comprises: transmitting the decrypted information of the first encrypted information to a server, and receiving information which is fed back by the server and is used for verifying whether the decrypted information passes or not; the determining whether the security authentication is successful according to the feedback information comprises: and determining whether the security authentication is successful according to the information fed back by the server for verifying whether the security authentication is passed.
Preferably, the first encryption information sent to the terminal includes: information encrypted by a public key of the user account corresponding to the transportation order;
the second encryption information includes: information encrypted with the public key of the drone;
the first encryption information or the third encryption information decrypted by the unmanned aerial vehicle comprises: information encrypted with the public key of the drone.
The transport order is a pick-up order or a delivery order; preferably, the method comprises the steps of,
the encrypted information in each encrypted information may include: and generating a time stamp of the time of the transportation order, or confirming the time stamp of the time of the user logistics order corresponding to the transportation order by the server.
Preferably, as shown in fig. 2, a second method for improving transportation safety of an unmanned aerial vehicle according to an embodiment of the present invention includes:
step 201, the terminal obtains transportation order information and fourth encryption information for security authentication from a server according to account information of a user;
step 202, when the terminal communicates with the unmanned aerial vehicle corresponding to the transportation order information, the fourth encryption information is sent to the unmanned aerial vehicle, feedback information sent by the unmanned aerial vehicle is received, whether the security authentication is successful or not is determined according to the feedback information, and whether the security authentication is successful or not is displayed; or alternatively, the first and second heat exchangers may be,
the terminal receives fifth encryption information sent by the unmanned aerial vehicle when communicating with the unmanned aerial vehicle corresponding to the transportation order information, the terminal decrypts and compares the fourth encryption information and the fifth encryption information respectively, determines whether the security authentication is successful or not according to a comparison result, and displays information whether the security authentication is successful or not; or alternatively, the first and second heat exchangers may be,
the terminal further obtains sixth encryption information for safety certification from the server, when the terminal communicates with the unmanned aerial vehicle corresponding to the transportation order information, the terminal sends the fourth encryption information to the unmanned aerial vehicle, receives feedback information sent by the unmanned aerial vehicle, and receives fifth encryption information sent by the unmanned aerial vehicle, the terminal decrypts and compares the fifth encryption information and the sixth encryption information respectively, determines whether safety certification is successful or not according to a comparison result and the feedback information, and displays information whether the safety certification is successful or not.
The feedback information for the fourth encryption information includes: verifying the fourth encrypted information as to whether the fourth encrypted information passes or not;
or, the feedback information for the fourth encryption information includes: information decrypted by the fourth encryption information; the step of receiving the feedback information further comprises: transmitting the information decrypted by the fourth encryption information to a server, and receiving information which is fed back by the server and is used for verifying whether the information decrypted by the server passes or not; the determining whether the security authentication is successful according to the feedback information comprises: and determining whether the security authentication is successful according to the information fed back by the server for verifying whether the security authentication is passed.
Preferably, the fourth encryption information sent to the unmanned aerial vehicle includes: information encrypted with the public key of the drone;
the fifth encryption information includes: information encrypted with a public key of the user account;
the fourth encryption information and the sixth encryption information decrypted by the terminal include: information encrypted with a public key of the user account.
The shipping order may be a pick-up order, or a delivery order; preferably, the encrypted information in each encrypted information may include: and generating a time stamp of the time of the transportation order, or confirming the time stamp of the time of the user logistics order corresponding to the transportation order by the server.
As shown in fig. 3, a third method for improving transportation safety of an unmanned aerial vehicle according to an embodiment of the present invention includes:
step 301, generating transportation order information for an unmanned aerial vehicle, wherein the transportation order information comprises transportation site information;
step 302, generating first encryption information for security authentication, or generating second encryption information and third encryption information for security encryption;
step 303, sending the generated transportation order to the unmanned aerial vehicle, and sending the generated encryption information to the unmanned aerial vehicle, or sending the generated encryption information to a terminal of user account login corresponding to the transportation order.
After the step of sending the encrypted information, the method may further include: and receiving decryption information sent by the unmanned aerial vehicle or the terminal, carrying out security authentication on the decryption information, and feeding back a security authentication result to the unmanned aerial vehicle or the terminal.
The first encryption information sent to the unmanned aerial vehicle may include: information encrypted with a public key of the user account;
the first encryption information sent to the terminal logged in by the user account may include: information encrypted with the public key of the drone;
the second encryption information and the third encryption information may include information encrypted with a public key of the drone and information encrypted with a public key of the user account, respectively.
The transportation order is a pick-up order or a delivery order; preferably, the encrypted information in each encrypted information includes: and the transport order generates a time stamp of the time, or the server confirms the time stamp of the user logistics order time corresponding to the transport order.
As shown in fig. 4, the first unmanned aerial vehicle provided by the embodiment of the invention includes a processing unit 41, a communication unit 42 and a storage unit 43, where the communication unit 42 and the storage unit 43 are both in communication with the processing unit 41 through a bus;
the communication unit 42 is used for receiving information from an external device through the processing unit 41 or transmitting information to the external device;
the storage unit 43 is used for storing information according to instructions of the processing unit 41;
the processing unit 41 is configured to receive, via the communication unit 42, shipping order information including shipping location information and first encrypted information for security authentication, and store the shipping order information in the storage unit 43; the method comprises the steps of,
after confirming that the unmanned aerial vehicle arrives at a transportation place, reading first encryption information in a storage unit 43, sending the first encryption information to a terminal which is logged in by a user account corresponding to the transportation order information through a communication unit 42, receiving feedback information aiming at the first encryption information and sent by the terminal through the communication unit 42, determining whether security authentication is successful according to the feedback information, and sending an instruction for controlling warehouse opening corresponding to the transportation order information after the security authentication is successful;
Or after confirming that the unmanned aerial vehicle arrives at the transportation site, receiving second encryption information sent by a terminal corresponding to the user account login of the transportation order information through a communication unit 42, reading the stored first encryption information, respectively decrypting and comparing the first encryption information and the second encryption information, determining whether security authentication is successful according to a comparison result, and after determining that the security authentication is successful, sending out an instruction for controlling warehouse opening corresponding to the transportation order information; or alternatively, the first and second heat exchangers may be,
or, the communication unit 42 is further configured to receive third encrypted information for security authentication through the communication unit 42, after confirming that the unmanned aerial vehicle arrives at a transportation location, read the first encrypted information from the storage unit 43, send the first encrypted information to a terminal that the transportation order information corresponds to a user account and logs in through the communication unit 42, receive feedback information for the first encrypted information sent by the terminal through the communication unit 42, receive second encrypted information sent by the terminal through the communication unit 42, decrypt and compare the third encrypted information and the second encrypted information, respectively, determine whether the security authentication is successful according to a comparison result and the feedback information, and send an instruction for controlling the warehouse corresponding to the transportation order information to open after the determination is successful.
Preferably, the feedback information for the first encryption information may include: verifying the first encrypted information as to whether the first encrypted information passes or not;
alternatively, the feedback information for the first encryption information may also include: information decrypted by the first encryption information; the processing unit 41 is further arranged to, via the communication unit 42: the information decrypted by the first encryption information is sent to the server through the communication unit 42, and information which is fed back by the server and is used for verifying whether the decrypted information passes or not is received through the communication unit 42; the communication unit 42 is configured to determine whether the security authentication is successful based on the feedback information, including: the communication unit 42 is configured to determine whether the security authentication is successful according to the information fed back by the server as to whether the authentication is passed.
Preferably, the first encryption information sent to the terminal includes: information encrypted by a public key of the user account corresponding to the transportation order;
the second encryption information includes: information encrypted with the public key of the drone;
the first encryption information or the third encryption information decrypted by the processing unit 41 includes: information encrypted with the public key of the drone.
The transport order can be a pick-up order or a delivery order; preferably, the encrypted information in each encrypted information includes: and generating a time stamp of the time of the transportation order, or confirming the time stamp of the time of the user logistics order corresponding to the transportation order by the server.
Fig. 5 shows a first terminal provided by an embodiment of the present invention, as shown in fig. 5, the terminal includes a communication unit 52, a processing unit 51, a storage unit 53, and a display unit 54, where the communication unit 52, the storage unit 53, and the display unit 54 all communicate with the processing unit 51 through a bus;
the communication unit 52 is used for the processing unit 51 to receive information from an external device or to send information to the external device;
the storage unit 53 is configured to store information according to an instruction of the processing unit 51;
the display unit 54 is configured to display information according to an instruction of the processing unit 51;
the processing unit 51 is configured to acquire shipping order information and fourth encryption information for security authentication from a server through the communication unit 52, and store the shipping order information and the fourth encryption information in the storage unit 53; the method comprises the steps of,
when the communication unit 52 communicates with the unmanned aerial vehicle corresponding to the transportation order information, the fourth encryption information in the storage unit 53 is read, the fourth encryption information is sent to the unmanned aerial vehicle through the communication unit 52, feedback information, sent by the unmanned aerial vehicle, aiming at the fourth encryption information is received through the communication unit 52, whether the security authentication is successful or not is determined according to the feedback information, and the display unit 54 is instructed to display whether the security authentication is successful or not; or alternatively, the first and second heat exchangers may be,
When the communication unit 52 is used for communicating with the unmanned aerial vehicle corresponding to the transportation order information, the communication unit 52 is used for receiving the fifth encrypted information sent by the unmanned aerial vehicle, reading the fourth encrypted information stored in the storage unit 53, decrypting and comparing the fourth encrypted information and the fifth encrypted information respectively, determining whether the security authentication is successful or not according to the comparison result, and indicating the display unit 54 to display the information whether the security authentication is successful or not; or alternatively, the first and second heat exchangers may be,
the processing unit 51 is further configured to obtain sixth encryption information for security authentication from a server through the communication unit 52, and when communicating with the unmanned aerial vehicle corresponding to the transportation order information through the communication unit 52, read fourth encryption information stored in the storage unit 53, send the fourth encryption information to the unmanned aerial vehicle through the communication unit 52, receive feedback information for the fourth encryption information sent by the unmanned aerial vehicle through the communication unit 52, and receive fifth encryption information sent by the unmanned aerial vehicle through the communication unit 52, decrypt and compare the fifth encryption information and the sixth encryption information, respectively, determine whether the security authentication is successful according to the comparison result and the feedback information, and instruct the display unit 54 to display information whether the security authentication is successful.
Preferably, the feedback information for the fourth encryption information includes: verifying the fourth encrypted information as to whether the fourth encrypted information passes or not;
or, the feedback information for the fourth encryption information includes: information decrypted by the fourth encryption information; the communication unit 52 is further adapted to: the information decrypted by the fourth encryption information is sent to a server through the communication unit 52, and information which is fed back by the server and is used for verifying whether the information passes or not is received through the communication unit 52; the communication unit 52 is configured to determine whether the security authentication is successful based on the feedback information, including: the communication unit 52 is configured to determine whether the security authentication is successful according to the information that is fed back by the server and that is verified.
Preferably, the fourth encryption information sent to the unmanned aerial vehicle includes: information encrypted with the public key of the drone;
the fifth encryption information includes: information encrypted with a public key of the user account;
the fourth encryption information or the sixth encryption information decrypted by the terminal includes: information encrypted with a public key of the user account.
The transport order can be a pick-up order or a delivery order; preferably, the encrypted information in the fourth encrypted information includes: the time stamp of the time when the transport order is generated, or the time stamp of the time when the user logistics order corresponding to the transport order is confirmed by the server;
The information encrypted in the fifth encryption information includes: the time stamp of the time when the transport order is generated, or the time stamp of the time when the user logistics order corresponding to the transport order is confirmed by the server;
the encrypted information in the sixth encrypted information includes: and generating a time stamp of the time of the transportation order, or confirming the time stamp of the time of the user logistics order corresponding to the transportation order by the server.
Fig. 6 shows a first server provided by an embodiment of the present invention, as shown in fig. 6, the server includes: a processing unit 61, a communication unit 62, and a storage unit 63, wherein the communication unit 62 and the storage unit 63 each communicate with the processing unit 61 through a bus;
the communication unit 62 is used for the processing unit 61 to receive information from an external device or to transmit information to the external device;
the storage unit 63 is configured to store information according to an instruction of the processing unit 61;
the processing unit 61 is configured to generate a transportation order including transportation location information for the unmanned aerial vehicle, generate first encryption information for security authentication, or generate second and third encryption information for security authentication, and send the generated transportation order to the unmanned aerial vehicle through the communication unit 62, and send the generated encryption information to the unmanned aerial vehicle or a terminal for logging in a user account corresponding to the transportation order through the communication unit 62.
Preferably, the processing unit 61 of the server is further configured to receive, through the communication unit 62, the decryption information sent by the unmanned aerial vehicle or the terminal, perform security authentication on the decryption information, and then feed back, through the communication unit 62, the security authentication result to the unmanned aerial vehicle or the terminal.
Preferably, the first encryption information sent to the unmanned aerial vehicle is: information encrypted with a public key of the user account;
the first encryption information sent to the terminal logged in by the user account comprises: information encrypted with the public key of the drone;
the second encryption information and the third encryption information include information encrypted with a public key of the drone and information encrypted with a public key of the user account, respectively.
The shipping order is a pick-up order, or a delivery order.
Preferably, the encrypted information in the first encrypted information includes: the time stamp of the time when the transportation order is generated, or the time stamp of the time when the user logistics order corresponding to the transportation order is confirmed by the server;
the encrypted information in the second encrypted information includes: the time stamp of the time when the transport order is generated, or the time stamp of the time when the user logistics order corresponding to the transport order is confirmed by the server;
The encrypted information in the third encrypted information includes: and generating a time stamp of the time of the transportation order, or confirming the time stamp of the time of the user logistics order corresponding to the transportation order by the server.
Fig. 7 shows a second type of drone provided by an embodiment of the present invention, as shown in fig. 7, the drone including a memory 71, a transceiver 72, one or more processors 73; and one or more modules stored in the memory 71 and configured to be executed by the one or more processors 73, the one or more modules including instructions for performing the steps of the first method of improving transportation safety of a drone described above.
Fig. 8 shows a second terminal provided by an embodiment of the invention, which terminal comprises, as shown in fig. 8, a display 81, a memory 82, a transceiver 83, one or more processors 84; and one or more modules stored in the memory 82 and configured to be executed by the one or more processors 84, the one or more modules including instructions for performing the steps of the second method of improving transportation safety of a drone described above.
Fig. 9 shows a second server according to an embodiment of the present invention, as shown in fig. 9, where the server includes: a memory 91, a transceiver 92, one or more processors 93; and one or more modules stored in the memory 91 and configured to be executed by the one or more processors 93, the one or more modules including instructions for performing the steps of the third method of improving transportation safety of a drone described above.
The embodiment of the invention also provides a computer program product used in combination with the unmanned aerial vehicle, which comprises a computer readable storage medium and a computer program mechanism embedded in the storage medium, wherein the computer program mechanism comprises instructions for executing the steps in the first unmanned aerial vehicle transportation safety improving method.
Embodiments of the present invention also provide a computer program product for use in conjunction with an electronic device, the computer program product comprising a computer-readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising instructions for performing the steps of the second method for improving transportation security of a drone.
Embodiments of the present invention also provide a computer program product for use in conjunction with a server, the computer program product comprising a computer-readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising instructions for performing the steps of the third method for improving transportation security of a drone described above.
The technical solutions of the embodiments of the present invention are further explained below through preferred embodiments, respectively.
Fig. 10 shows a preferred unmanned aerial vehicle pickup embodiment in which a delivery user authenticates itself to the unmanned aerial vehicle via a registered terminal, thereby improving transportation security.
The implementation mode specifically comprises the following steps:
in step 1001, the terminal obtains related information of the physical distribution order, including the address of the sender, the address of the receiver, the information of the goods, the contact information and other traditional physical distribution information, according to the operation performed by the user through the Application (APP) at the client, and generates the physical distribution order to be presented to the user, so that the user confirms the submitting to the server at the network side.
In alternative implementations, the user may perform related logistics operations through other common manners, such as web pages provided by the logistics system.
Of course, no matter the user operates in a webpage mode or in a client side mode, the user needs to log in an account before submitting, and the terminal can submit order information after logging interaction with a server on a network side is completed.
The server at the network side may be a server at the network side of the logistics system, and is used for interacting logistics related information, order information, unmanned aerial vehicle assignment and the like with the terminal logged in by the user. The service units for logistics related information and order information interacted with the terminal and the service unit for assigning the unmanned aerial vehicle can be integrated in one physical server, can be independent physical servers respectively, can also be realized by using cloud computing and other technologies through a distributed server, and the specific realization modes are all general technologies in the field of computer networks and are not repeated here.
Of course, when the invention is applied to a network side system for providing commodity sales service in addition to a logistics server, the service units interacted with the terminal can be integrated with the server unit for providing commodity sales service, and the service units assigned to the unmanned aerial vehicle are independently arranged.
Step 1002, after receiving the user logistics order and confirming that the order is successful, the server on the network side generates a time stamp T1 of the time when the order is confirmed to be successful.
In step 1003, the server assigns the unmanned aerial vehicle for taking goods to generate a taking order according to the user's logistics order, and records a time stamp T2 of the assigned time of the unmanned aerial vehicle.
When the unmanned aerial vehicle is assigned, the server generates a transportation order according to the user logistics order, in each embodiment of taking goods, the transportation order is called a taking order for clarity, and taking goods order information is sent to the unmanned aerial vehicle in the assignment instruction, wherein the taking goods order information at least comprises transportation location information, and in each embodiment of taking goods, the taking goods is called shipper address information. In addition, in this embodiment and other embodiments of the present invention, if the unmanned aerial vehicle is dedicated to picking up or is dedicated to delivering, the server does not need to include the transportation type information (information for identifying picking up or delivering at the time of the transportation task) in the picking-up order information or delivering order information sent to the unmanned aerial vehicle; if the unmanned aerial vehicle is used for taking goods and delivering goods, the server sends the taking order information or delivering goods order information of the unmanned aerial vehicle to the unmanned aerial vehicle and further comprises transportation type information.
In this step, the drone is assigned a time stamp of the moment, i.e. of the pick order generation moment.
Step 1004, the server adopts an asymmetric encryption mode, encrypts a timestamp T1 with the assigned public key of the unmanned aerial vehicle, encrypts a timestamp T2 with the public key of the user account, and then sends the encrypted timestamp T1 and the encrypted timestamp T2 to the assigned unmanned aerial vehicle and the terminal on which the user logs in, respectively.
In this step, the encrypted timestamp issued to the unmanned aerial vehicle may be issued along with the instruction assigned to the unmanned aerial vehicle, or may be issued separately through a specific message. The information issued to the terminal logged in by the user can be issued by a single message or issued along with other messages of the terminal in the process of executing the flow.
In an alternative embodiment, the timestamp T1 and the timestamp T2 may be exchanged, that is, T1 is encrypted with the public key of the user account, and T2 is encrypted with the public key of the unmanned aerial vehicle, which is also exchanged in the authentication process.
Preferably, in this embodiment and other embodiments of the present invention, when a user registers to a server through a client application or a web page on a terminal, or when an unmanned aerial vehicle registers to the server, the server may configure and store a public key private key pair for a user account or the unmanned aerial vehicle, and send a private key configured for the user account to the terminal registered by the user and a terminal subsequently logged in, and send a private key configured for the unmanned aerial vehicle to the corresponding unmanned aerial vehicle.
Step 1005, the assigned unmanned aerial vehicle fetches goods to a goods fetching place according to the place information and the time information in the logistics order, and feeds back the position information of the unmanned aerial vehicle to the server, and meanwhile, when the user initiates the unmanned aerial vehicle position inquiry through the logged-in terminal, the server sends the position and the time information of the unmanned aerial vehicle to the terminal logged in by the user at the moment.
In this embodiment and other embodiments of the present invention, the unmanned aerial vehicle may carry a GPS or other special positioning module, or may perform positioning through a wireless communication network to obtain its own location information.
Step 1006, after the unmanned aerial vehicle arrives at the goods taking place, the encrypted time stamp T2 in the unmanned aerial vehicle is transmitted to a terminal logged in by the user, and meanwhile, the user transmits the encrypted time stamp T1 in the unmanned aerial vehicle to the unmanned aerial vehicle through the logged-in terminal, and identity authentication is carried out according to the received encrypted time stamps.
Specifically, in this step, after the unmanned aerial vehicle arrives at the pickup location, the unmanned aerial vehicle starts photographing or video recording, and the terminal that the user logs in acquires order number information from the unmanned aerial vehicle, and verifies whether the arriving unmanned aerial vehicle is the unmanned aerial vehicle assigned for the corresponding order of the user.
After the unmanned aerial vehicle is successfully verified, the terminal transmits the encrypted time stamp T1 to the unmanned aerial vehicle, and meanwhile, the unmanned aerial vehicle transmits the encrypted time stamp T2 to the terminal.
After receiving the encrypted time stamp sent by the opposite party, the terminal and the unmanned aerial vehicle decrypt the received encrypted time stamp by using the private key of the terminal and the unmanned aerial vehicle, compare the received encrypted time stamp with the decrypted corresponding time stamp from the server, and if the encrypted time stamp is consistent with the decrypted corresponding time stamp, the opposite party passes the identity verification.
That is, the terminal compares the T2 information obtained from the server before the terminal and the T2 information received immediately before the terminal is separated by the private key of the terminal, and if the time stamps are the same, the unmanned aerial vehicle is considered to be the unmanned aerial vehicle assigned to the terminal. Meanwhile, the unmanned aerial vehicle uses the private key of the unmanned aerial vehicle to unlock the T1 information obtained from the server before the unmanned aerial vehicle and the T1 information just received and compare the information, and if the time stamps are the same, the user is considered to be the initiator of the logistics order. If the terminal verifies that T2 is not passed, it is determined that the unmanned aerial vehicle is not a system-assigned unmanned aerial vehicle, and is likely to be a malicious fool for unmanned aerial vehicles of other people, and the goods taking process is finished in step 1008; if the drone verifies that T1 is not passed or the terminal does not provide T1 information, then it is determined that the terminal is not the order initiating terminal, at which point no pick should be made, and the pick flow is also ended at step 1008.
Preferably, in this step, the communication between the terminal and the unmanned aerial vehicle may be completed through various wireless communication modes. In this embodiment, preferably, bluetooth, a non-contact radio frequency identification (NFC) manner, or a direct interaction manner such as scanning identification codes (e.g. two-dimensional codes or bar codes) may be adopted, which may further improve security compared to communication through a wireless communication network.
Step 1007, after the identity verification of both sides is passed, the unmanned aerial vehicle automatically unlocks and opens the warehouse corresponding to the transportation order information, the user puts the articles into the appointed space position, and after the completion of the putting, the warehouse is locked, and the picking is completed.
In this step, if the unmanned aerial vehicle has only one warehouse, the warehouse is opened, and if a plurality of warehouses exist and respectively correspond to different transportation orders, only the warehouse corresponding to the transportation order information is opened.
In the step, after the goods are taken, the unmanned aerial vehicle can fly to a logistics collection and distribution point and a next goods taking point, or can directly deliver goods when the destination is judged to be the same city and the distance is relatively close.
Step 1008, if the identity of both parties is not passed, ending the picking process.
In the step, if the terminal verifies that the T2 does not pass, the information of the failed T2 is fed back to the server, and the arrival of a correct unmanned aerial vehicle is waited; if the unmanned aerial vehicle verifies that the T1 does not pass or does not receive the encrypted T1 information from the terminal, the unmanned aerial vehicle feeds back verification failure information to the server, and flies back to a logistics distribution point, flies to the next goods taking point or waits in situ according to an instruction fed back by the server.
In the above embodiment and other embodiments of the present invention, the flow of the related logistics processes related to logistics order operation, unmanned aerial vehicle assignment, etc. may be any existing implementation manner, and the present invention is not limited thereto.
In this embodiment and other embodiments of the present invention, the terminal or the unmanned aerial vehicle and the server may communicate via various wireless communication networks such as 5G, 4G, 3G, GPRS, wiFi, and the like, and the present invention is not limited thereto.
In addition, the above-mentioned timestamp T1 and timestamp T2 are preferred implementation schemes in this embodiment and other embodiments, and by adopting this scheme, the security information and the order form fit better. The two timestamps can also be replaced by other timestamps, so long as the server generates two different timestamps, the two different timestamps are respectively encrypted by the public keys of the terminal and the unmanned aerial vehicle and sent to two devices for verification, and the technical effect of improving the transportation safety of the unmanned aerial vehicle can be achieved.
Fig. 11 shows another preferred unmanned aerial vehicle pickup implementation, in which the server completes identity authentication of the user's terminal and unmanned aerial vehicle, and improves transportation security. Steps 1101 to 1103 in this embodiment are the same as steps 1001 to 1003, and are not described here again, and after step 1103, the steps include the following steps:
step 1104, the server encrypts the timestamp T1 by the public key of the user account, encrypts the timestamp T2 by the public key of the assigned unmanned aerial vehicle, then sends the encrypted timestamp T1 to the assigned unmanned aerial vehicle, and sends the encrypted timestamp T2 to the terminal on which the user logs in.
In an alternative embodiment, the timestamp T1 and the timestamp T2 may be exchanged, that is, the timestamp T1 is encrypted by the public key of the unmanned aerial vehicle, the timestamp T2 is encrypted by the public key of the terminal, the encrypted timestamp T1 is sent to the terminal logged in by the user, the encrypted timestamp T2 is sent to the unmanned aerial vehicle, and similar exchange is performed in the subsequent authentication process, which is not repeated here.
In step 1105, the assigned unmanned aerial vehicle gets goods from the goods getting place according to the place information and the time information in the logistics order, and feeds back the position information of the unmanned aerial vehicle to the server, and meanwhile, when the user initiates the unmanned aerial vehicle position inquiry through the logged-in terminal, the server sends the position and the time information of the unmanned aerial vehicle to the terminal logged in by the user at the time.
And 1106, after the unmanned aerial vehicle arrives at the goods taking place, transmitting the encrypted time stamp T1 in the unmanned aerial vehicle to a terminal logged in by the user, and simultaneously transmitting the encrypted time stamp T2 in the unmanned aerial vehicle to the terminal logged in by the user.
Specifically, in this step, after the unmanned aerial vehicle arrives at the pickup location, the unmanned aerial vehicle starts photographing or video recording, and the user acquires order number information from the unmanned aerial vehicle through the logged-in terminal, and verifies whether the arriving unmanned aerial vehicle is the unmanned aerial vehicle assigned for the corresponding order of the user.
After the unmanned aerial vehicle is successfully verified, the terminal transmits the encrypted time stamp T2 to the unmanned aerial vehicle, and meanwhile, the unmanned aerial vehicle transmits the encrypted time stamp T1 to the terminal.
Step 1107, after receiving the encrypted time stamp sent by the opposite party, the terminal and the unmanned aerial vehicle decrypt the received encrypted time stamp by using the corresponding private key in the terminal and the unmanned aerial vehicle, and feed back the decrypted time stamp to the opposite party.
In this step, if the decryption is unsuccessful, one of the terminal and the unmanned aerial vehicle directly ends the goods taking process, or feeds back the decryption failure information to the other party and/or uploads the decryption failure information to the server, and ends the process.
If the decryption of one party of the terminal and the unmanned aerial vehicle is successful, but the decryption failure message of the other party is received, or the decryption failure message of the other party is received through the server, ending the goods taking flow.
And step 1108, after receiving the decrypted time stamps, the terminal and the unmanned aerial vehicle respectively upload the decrypted time stamps to the server.
Step 1109, the server compares the received decryption time stamp with the time stamp recorded by the server, and checks whether the time stamps uploaded by the terminal and the unmanned aerial vehicle are correct or not so as to authenticate the identity of the terminal and the unmanned aerial vehicle, and feeds an authentication result back to the unmanned aerial vehicle and the terminal.
In the step, if the time stamps uploaded by the terminal and the unmanned aerial vehicle are correct, the terminal is considered to be the terminal of the initiating user of the logistics order, and the unmanned aerial vehicle is really an assigned unmanned aerial vehicle; if the timestamp T1 is correct and the timestamp T2 is wrong (or missing), the unmanned aerial vehicle is correct, but a terminal disguises as a sender, and the terminal already acquires a private key of the decryption timestamp T1; if the time stamp T1 is wrong (or missing), the time stamp T2 is correct, judging that the unmanned aerial vehicle is in malicious spoofing, and the unmanned aerial vehicle already acquires a private key of the decryption time stamp T2; if the time stamp T1 and the time stamp T2 are wrong or missing, the unmanned aerial vehicle can be basically judged to be in malicious spoofing, and a small part of unmanned aerial vehicle is possibly correct, but a user can be disguised as a sender, at the moment, a message is immediately sent to a correct user terminal, and the order user is reminded that the unmanned aerial vehicle is in malicious spoofing or other people can be disguised as the sender.
Step 1110, after the unmanned aerial vehicle and the terminal receive the message that the identity authentication of both sides sent by the server passes, the goods taking process is completed according to the description of step 1007.
In another preferred embodiment of the present invention similar to the overall flow of fig. 11, after receiving the encrypted timestamp sent by the opposite party, the terminal and the unmanned aerial vehicle decrypt the received encrypted timestamp by using the corresponding private key of the unmanned aerial vehicle, and may not send the decrypted timestamp to the opposite party, but directly send the decrypted timestamp to the server, directly authenticate the server, and respectively send the authentication result to the opposite party, where the specific authentication mode and the result sending mode are the same as those in the previous preferred embodiment, and are not described herein again.
The above is a description of an embodiment of the unmanned aerial vehicle picking method of the present invention. The embodiment of the invention also provides a method for improving the delivery safety of the unmanned aerial vehicle.
Fig. 12 shows a specific embodiment of a delivery method of an unmanned aerial vehicle, in which the unmanned aerial vehicle uses a voice question-and-answer method to perform comparison verification with answers of users and logistics order information to determine that the unmanned aerial vehicle is indeed a recipient, and specifically includes the following steps:
step 1201, the server assigns an unmanned aerial vehicle, and after receiving the instruction comprising the transportation order, the unmanned aerial vehicle flies to the delivery destination according to the instruction after loading the goods.
In this embodiment and the embodiments described below, the shipping order includes shipping location information, i.e., shipping destination location information.
Step 1202, after the receiver appears, the unmanned aerial vehicle photographs or starts video recording.
In this step, the unmanned aerial vehicle may automatically start to take a picture or record a video at a fixed time after reaching the delivery destination.
In addition, in this step, the unmanned aerial vehicle may determine that the receiver appears through image recognition, or may determine that the receiver appears through operation of the unmanned aerial vehicle by the receiver.
In step 1203, the unmanned aerial vehicle queries the name and/or address information of the receiver in a voice manner.
In step 1204, the unmanned aerial vehicle detects whether the information answered by the receiver is correct, and provides the goods after checking that the information is correct, and then step 1205 is performed.
In the step, the unmanned aerial vehicle can acquire the content answered by the receiver through voice recognition, then the answered content is compared with the information of the logistics order, if the content is the same, the location is considered to be correct, unlocking is automatically carried out, and the receiver takes away the article; if the two types of the goods are similar, further intelligent verification is needed (such as a mode of calling out the first few digits and calling out the second few digits by a receiver through a mode of mobile phone numbers) until verification is passed, automatic unlocking is achieved, and a user takes the goods; if the information is completely different or the information cannot pass verification, the position is considered to be wrong or a person imports, and the unmanned aerial vehicle should return the information and deliver the information after the logistics company manually communicates with the addressee.
And 1205, finishing delivering goods by the unmanned aerial vehicle, finishing photographing or video recording when leaving, and flying to the next delivery point or returning.
Fig. 13 shows another embodiment of a method for delivering cargo from a drone, in which the drone performs two-way verification with the recipient, the embodiment specifically including the steps of:
step 1301, the server assigns an unmanned aerial vehicle for delivery when delivering goods to a receiver according to the user logistics order, namely generates a transportation order and sends the transportation order to the unmanned aerial vehicle, records a time stamp T2 of the assigned time of the unmanned aerial vehicle, and acquires a time stamp T1 of the generation time of the user logistics order.
Step 1302, the server adopts an asymmetric encryption mode, encrypts the timestamp T2 with the public key of the account of the receiver user, encrypts the public key of the unmanned aerial vehicle with the timestamp T1, and then sends the encrypted timestamps T1 and T2 to the terminals of the unmanned aerial vehicle and the account of the receiver user for login, respectively.
As described in the embodiments above, T1 and T2 may be interchanged herein, or may be replaced with other time stamps.
In step 1303, the assigned unmanned aerial vehicle loads goods and delivers goods according to the place information in the logistics order, and feeds back the position information of the unmanned aerial vehicle to the server, and meanwhile, when the user initiates the unmanned aerial vehicle position query through the logged-in terminal, the server sends the position and time information of the unmanned aerial vehicle to the terminal logged in by the user at the time, and the user can be a shipper or a receiver.
In this embodiment, the time for loading the cargo by the unmanned aerial vehicle may be after or before the time for issuing the encrypted timestamp by the server.
And 1304, after the unmanned aerial vehicle arrives at the delivery site, transmitting the encrypted time stamp T2 in the unmanned aerial vehicle to a terminal logged in by a receiver user, transmitting the encrypted time stamp T1 in the unmanned aerial vehicle to the terminal logged in by the receiver user, and respectively carrying out identity authentication according to the received encrypted time stamps.
Specifically, in this step, after the unmanned aerial vehicle arrives at the delivery site, the unmanned aerial vehicle may take a photograph or record a video, and before the encrypted timestamp is transmitted, the receiver user obtains order number information from the unmanned aerial vehicle through the logged-in terminal, verifies whether the arrived unmanned aerial vehicle is the unmanned aerial vehicle assigned for the corresponding order of the user, or may verify whether the unmanned aerial vehicle correctly authenticates the receiver, and then performs the key interaction operation in this step as described in the previous embodiment.
After receiving the encrypted time stamp sent by the opposite party, the terminal and the unmanned aerial vehicle decrypt the received encrypted time stamp by using the private key of the terminal and the unmanned aerial vehicle, compare the received encrypted time stamp with the decrypted corresponding time stamp from the server, and if the encrypted time stamp is consistent with the decrypted corresponding time stamp, the opposite party passes the identity verification.
Preferably, in this step, the communication between the terminal and the unmanned aerial vehicle may be completed through various wireless communication modes. In this embodiment, preferably, bluetooth, a non-contact radio frequency identification (NFC) manner, or a direct interaction manner such as scanning identification codes (e.g. two-dimensional codes or bar codes) may be adopted, which may further improve security compared to communication through a wireless communication network.
Step 1305, after the identity verification of both sides is passed, the unmanned aerial vehicle automatically unlocks, the receiver user takes out the article, and after the article is confirmed to be taken out, the warehouse is locked, and the unmanned aerial vehicle delivery is completed; if the identity of the two parties fails to pass, ending the goods taking process.
In this step, after the goods are taken, the unmanned aerial vehicle can fly to the logistics collection and distribution point, the next delivery point or the goods taking point.
In this embodiment, if the terminal verifies that T2 does not pass, the terminal feeds back the information of the failed T2 to the server, and waits for the correct unmanned aerial vehicle to arrive; if the unmanned aerial vehicle verifies that the T1 does not pass or does not receive the encrypted T1 information from the terminal, the unmanned aerial vehicle feeds back verification failure information to the server, and flies back to a logistics distribution point, flies to the next goods taking point or waits in situ according to an instruction fed back by the server.
Fig. 14 shows yet another embodiment of a method for delivering cargo by an unmanned aerial vehicle, in which the unmanned aerial vehicle performs unidirectional verification of a receiver, the embodiment specifically includes the following steps:
in step 1401, the server assigns the unmanned aerial vehicle for delivery when the delivery of the goods to the receiver is required according to the user logistics order, that is, generates a transportation order, issues the transportation order to the unmanned aerial vehicle, and records a time stamp T2 of the assigned time of the unmanned aerial vehicle.
Step 1402, the server encrypts the timestamp T2 with the public key of the account of the recipient user by using an asymmetric encryption manner, and then sends the encrypted timestamp T2 to the assigned unmanned aerial vehicle.
In this step, the server may encrypt the timestamp T2 with the public key of the unmanned aerial vehicle itself and send the encrypted timestamp T2 to the assigned unmanned aerial vehicle.
In step 1403, the assigned unmanned aerial vehicle loads goods, delivers goods according to the place information in the logistics order, feeds back the position information of the unmanned aerial vehicle to the server, and meanwhile, when the user initiates the unmanned aerial vehicle position query through the logged-in terminal, the server sends the position and time information of the unmanned aerial vehicle to the terminal logged in by the user at the time, wherein the user can be a shipper or a receiver.
In this embodiment, the time for loading the cargo by the unmanned aerial vehicle may be after or before the time for issuing the encrypted timestamp by the server.
And step 1404, after the unmanned aerial vehicle arrives at the delivery site, transmitting a timestamp T2 encrypted by the public key of the user account in the unmanned aerial vehicle to a terminal logged in by the receiver user.
Specifically, in this step, after the unmanned aerial vehicle arrives at the pickup location, the unmanned aerial vehicle starts photographing or video recording, the user acquires order number information from the unmanned aerial vehicle through the terminal, verifies whether the arriving unmanned aerial vehicle is the unmanned aerial vehicle assigned for the user's corresponding order, and thereafter, performs the step of transmitting the encrypted time stamp.
In step 1405, the unmanned aerial vehicle receives the decrypted T2 information fed back by the terminal, and authenticates the terminal according to the decrypted T2 information.
In this step, if in step 1402, the server issues T2 encrypted with the public key of the unmanned aerial vehicle to the unmanned aerial vehicle, then the unmanned aerial vehicle decrypts the encrypted information, and then compares the decrypted T2 with T2 from the terminal, if it is consistent, the authentication passes the terminal, and if it is inconsistent, the authentication does not pass.
If in step 1402, the server does not issue T2 encrypted by the public key of the unmanned aerial vehicle to the unmanned aerial vehicle, the unmanned aerial vehicle sends the T2 information and transportation order related information, such as an order number, to the server after receiving the decrypted T2 information fed back by the terminal, the server verifies whether the decrypted T2 is correct, and feeds back the verification result to the unmanned aerial vehicle, and the unmanned aerial vehicle determines whether to pass the authentication of the terminal according to the verification result.
And comparing the decrypted T2 information with T2 in the terminal or T2 obtained by decrypting the terminal with a private key of the terminal, and determining whether the T2 fed back by the terminal is correct or not so as to carry out identity authentication on the terminal.
Step 1406, after the unmanned aerial vehicle passes the authentication of the terminal, the unmanned aerial vehicle automatically unlocks, the receiver user takes out the article, and after confirming that the goods are taken out, the goods warehouse is locked, and the unmanned aerial vehicle delivery is completed; if the identity verification is not passed, ending the goods taking process.
In this step, after the goods are taken, the unmanned aerial vehicle can fly to the logistics collection and distribution point, the next delivery point or the goods taking point.
In an alternative to the embodiment shown in fig. 14, the one-way verification process performed by the drone on the consignee may also be: the server simultaneously sends the T2 encrypted by the public key of the unmanned aerial vehicle to the unmanned aerial vehicle and the terminal logged in by the user, after the unmanned aerial vehicle arrives at a delivery place, the unmanned aerial vehicle acquires the T2 encrypted by the public key of the unmanned aerial vehicle from the terminal logged in by the user, the T2 and the encrypted T2 sent to the server by the server are simultaneously decrypted by the private key of the server, the decrypted encrypted T2 and the decrypted T2 are compared, and if the decrypted T2 and the encrypted T2 are consistent, the terminal authentication is passed, and the inconsistent authentication is passed.
The structure of an exemplary embodiment of the inventive drone is shown in fig. 15. In this embodiment, when unmanned aerial vehicle is used for getting goods, through the terminal mutual authentication that unmanned aerial vehicle and user logged in, improve unmanned aerial vehicle and get the security of goods.
In this embodiment, unmanned aerial vehicle includes: a communication unit 151, a processing unit 152, and a storage unit 153, wherein the communication unit 151 and the storage unit 153 each communicate with the processing unit 152 through a bus. Of course, as technology advances, if other computer internal communication methods are presented, the communication unit 151, the storage unit 153, and the like may also communicate with the processing unit 152 through other computer internal communication methods.
The communication unit 151 is configured to receive the transportation task and the transportation location from the server, the order information, and the first encrypted information for security authentication, and send the first encrypted information to the processing unit 152; and, according to the instruction of the processing unit 152, sending the first encrypted information to the terminal corresponding to the order information, receiving the second encrypted information from the terminal, and sending the second encrypted information to the processing unit 152; and, receiving a notification that the terminal verifies that the drone passes, and sending it to the processing unit 152;
the processing unit 152 is configured to receive the transportation task and the transportation location, order information, and first encryption information, and store the first encryption information in the storage unit 153; after confirming that the unmanned aerial vehicle arrives at the transportation site, reading the first encryption information in the storage unit 153, and sending the first encryption information to the terminal by the instruction communication unit 151; determining that the terminal is legal according to the received second encryption information, and controlling the unmanned aerial vehicle to execute the transportation task after receiving a notification that the terminal verifies that the unmanned aerial vehicle passes;
the storage unit 153 is used for storing or providing information according to instructions of the processing unit 152.
The second encrypted information may be stored in the storage unit 153, and read from the storage unit 153 when the processing unit 152 is used.
The second encryption information is information encrypted by a public key of the unmanned aerial vehicle;
the communication unit 151 is configured to determine that the terminal is legal according to the second encryption information includes:
the processing unit 152 is configured to read the private key of the unmanned aerial vehicle from the storage unit 153, decrypt the second encrypted information, and determine that the decrypted information matches with the corresponding information stored in the storage unit 153.
The communication unit 151 may be further configured to receive second encrypted information from the server;
the communication unit 151 is further configured to store the second encrypted information from the server to the storage unit 153;
the communication unit 151 is configured to determine that the terminal is legal according to the second encryption information includes:
the processing unit 152 is configured to read the private key of the unmanned aerial vehicle and the second encrypted information from the server from the storage unit 153, decrypt the second encrypted information from the terminal and the second encrypted information from the server, and determine that the decrypted information matches.
Preferably, the encryption information is an encrypted time stamp. The time stamp in the first encryption information is generated according to the moment when the server transmits the transmission task to the unmanned aerial vehicle, and the time stamp in the second encryption information is generated according to the moment when the server generates the order; or the time stamp in the first encryption information is generated according to the moment when the server generates the order, and the time stamp in the second encryption information is generated according to the moment when the server transmits the transmission task to the unmanned aerial vehicle.
Preferably, the first encryption information is information encrypted with a public key of the end user account; the communication unit 151 for receiving a notification that the terminal verifies that the drone passes may include:
the communication unit 151 is configured to receive a verification passing message sent by the terminal after the terminal decrypts and verifies the first encrypted information using the user account private key in the terminal.
Preferably, as shown in fig. 16, in the present embodiment, the communication unit 151 includes a first communication unit 1511 and a second communication unit 1512. The first communication unit 1511 is configured to perform wireless communication with a server or other devices through a wireless communication network by using the processing unit 152 of the unmanned aerial vehicle. Preferably, the first communication unit 1511 may be a 5G, 4G, 3G, GPRS or WiFi communication unit, or may integrate any two or more of the above communication functions.
The second communication unit 1512 is for the processing unit 152 of the unmanned aerial vehicle to wirelessly communicate with the terminal of the user. Preferably, the second communication unit 1512 may be a bluetooth communication unit, a radio frequency identification unit, or the like, which may directly communicate with the terminal wirelessly, without a communication unit through a communication network.
In another preferred embodiment of the unmanned aerial vehicle, when the unmanned aerial vehicle is used for taking goods, the identity authentication of the other party is carried out through the server by the unmanned aerial vehicle and the terminal logged in by the user, so that the safety of taking goods by the unmanned aerial vehicle is improved.
In this embodiment, the difference from the previous embodiment is mainly that the legal verification portion of the processing unit for the terminal and how the unmanned aerial vehicle receives the information that the terminal passes through for verification, and the rest of the processing unit is the same as the previous unmanned aerial vehicle embodiment, and the same portions are not traced.
In this embodiment, the processing unit may determine that the terminal is legal based on the second encryption information, or may determine that the terminal is legal based on the first encryption information.
The processing unit is used for determining that the terminal is legal according to the second encryption information, and the method comprises the following steps: the processing unit is used for reading the private key of the unmanned aerial vehicle from the storage unit, decrypting the second encrypted information, indicating the communication unit to send the decrypted information to the server, and receiving an authentication success message fed back by the server through the communication unit.
The processing unit is configured to determine, according to the first encryption information, that the terminal is legal includes: the processing unit is used for receiving the decrypted first encrypted information fed back by the terminal through the communication unit, sending the decrypted information to the server through the communication unit, and determining that the terminal is legal after the decrypted information is successfully verified through the server feedback confirmation received through the communication unit.
Fig. 17 shows a schematic structural view of still another embodiment of the unmanned aerial vehicle of the present invention, the unmanned aerial vehicle including: a memory 171, a transceiver 173, and one or more processors 172; and one or more software modules stored in the memory 171 and configured to be executed by the one or more processors, the one or more software modules including instructions for performing the various steps performed by the drone in the pick and/or delivery embodiments described above.
As is well known to those skilled in the art, the embodiment shown in fig. 15 and the embodiment shown in fig. 17 may be identical, and are described herein only from a different technical perspective.
Embodiments of the present invention also provide a computer program product for use in connection with a drone, the computer program product comprising a computer-readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising instructions for performing the steps performed by the drone in the pick-and/or delivery embodiments described above.
Fig. 18 shows a schematic structural diagram of an embodiment of the terminal of the present invention, which includes: a display 181, a memory 182, a transceiver 183, one or more processors 184; and one or more software modules stored in the memory and configured to be executed by the one or more processors, the one or more software modules including instructions for performing the steps performed by the terminal in the unmanned aerial vehicle pick-and/or delivery embodiments described above. In this embodiment, one or more of the software modules may be client application software.
Fig. 19 shows a schematic structural diagram of an embodiment of a server of the present invention, the server comprising: the server includes: memory 191, transceiver 192, one or more processors 193; and one or more modules stored in the memory 191 and configured to be executed by the one or more processors 193, the one or more modules including instructions for performing the steps performed by the server in the unmanned aerial vehicle pick-and/or delivery embodiments described above.
Embodiments of the present invention also provide a computer program product for use in conjunction with an electronic device, the computer program product comprising a computer-readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising instructions for performing the steps performed by the terminal in the unmanned aerial vehicle pick-up and/or delivery embodiments described above. The computer program product may be client application software.
Embodiments of the present invention also provide a computer program product for use in conjunction with a server, the computer program product comprising a computer-readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising instructions for performing the steps performed by the server in the unmanned aerial vehicle pick-up and/or delivery embodiments described above.
According to the invention, through the embodiments, after the identity authentication of the other party is passed by both the unmanned aerial vehicle and the terminal, the unmanned aerial vehicle continues to execute the transportation task, or the user can determine whether to ship or pick up goods according to the information which is presented on the terminal and passes through the authentication of both parties, so that the transportation safety of the unmanned aerial vehicle is improved. The invention largely avoids the problems of false extraction, cheating by other unmanned aerial vehicles, false goods taking place and the like when the unmanned aerial vehicles take goods, and also avoids the problems of false collar or place error and the like when the unmanned aerial vehicles send goods, greatly improves the goods taking/sending safety, and greatly helps the establishment of an automatic logistics system of the unmanned aerial vehicle in the future.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of the invention.