CN107004177B - Method for improving transportation safety of unmanned aerial vehicle, terminal, server and computer program product - Google Patents

Method for improving transportation safety of unmanned aerial vehicle, terminal, server and computer program product Download PDF

Info

Publication number
CN107004177B
CN107004177B CN201680002950.5A CN201680002950A CN107004177B CN 107004177 B CN107004177 B CN 107004177B CN 201680002950 A CN201680002950 A CN 201680002950A CN 107004177 B CN107004177 B CN 107004177B
Authority
CN
China
Prior art keywords
information
unmanned aerial
aerial vehicle
encrypted
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201680002950.5A
Other languages
Chinese (zh)
Other versions
CN107004177A (en
Inventor
骆磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cloudminds Robotics Co Ltd
Original Assignee
Cloudminds Shanghai Robotics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cloudminds Shanghai Robotics Co Ltd filed Critical Cloudminds Shanghai Robotics Co Ltd
Publication of CN107004177A publication Critical patent/CN107004177A/en
Application granted granted Critical
Publication of CN107004177B publication Critical patent/CN107004177B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05DSYSTEMS FOR CONTROLLING OR REGULATING NON-ELECTRIC VARIABLES
    • G05D1/00Control of position, course, altitude or attitude of land, water, air or space vehicles, e.g. using automatic pilots
    • G05D1/10Simultaneous control of position or course in three dimensions
    • G05D1/101Simultaneous control of position or course in three dimensions specially adapted for aircraft
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Economics (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Development Economics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Quality & Reliability (AREA)
  • Human Resources & Organizations (AREA)
  • Tourism & Hospitality (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Operations Research (AREA)
  • Accounting & Taxation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Finance (AREA)
  • Aviation & Aerospace Engineering (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Automation & Control Theory (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Forklifts And Lifting Vehicles (AREA)

Abstract

The invention provides various methods, unmanned interfaces, terminals, servers and computer program products for improving the transportation safety of unmanned aerial vehicles. Through each method, various unmanned aerial vehicles, among the scheme of terminal, server and computer program product, the server is used for the encryption information of safety certification to terminal and/or unmanned aerial vehicle issuing, terminal and unmanned aerial vehicle carry out safety certification according to encryption information, only carry out unmanned aerial vehicle transportation task after safety certification passes, owing to adopt encryption information to carry out safety certification, the risk that safety certification information was intercepted and captured has also been reduced the terminal and has been faked, perhaps misfetched, the possibility of misdelivery, unmanned aerial vehicle transportation's security has been improved.

Description

Method for improving transportation safety of unmanned aerial vehicle, terminal, server and computer program product
Technical Field
The invention relates to the field of logistics transportation, in particular to a method for improving transportation safety of an unmanned aerial vehicle, the unmanned aerial vehicle, a terminal and a computer program product.
Background
With the development of logistics industry and automation, a mode of unmanned aerial vehicle delivery is adopted for the initial demonstration. However, the experimental nature and large-scale commercial use have a long distance, for example, the safety aspect of picking up and delivering goods is thinned, and the current scheme also has few consideration, and cannot cope with the events such as the impossibility of picking up and delivering goods.
Disclosure of Invention
The embodiment of the invention provides a method for improving the transportation safety of an unmanned aerial vehicle, the unmanned aerial vehicle, a terminal, a server and a computer program product, which are beneficial to improving the safety of the unmanned aerial vehicle during cargo transportation.
The first method for improving the transportation safety of the unmanned aerial vehicle provided by the embodiment of the invention comprises the following steps:
the unmanned aerial vehicle acquires transportation order information and first encryption information for safety authentication, wherein the transportation order information comprises transportation place information;
after the unmanned aerial vehicle arrives at the transportation location according to the transportation location information, the unmanned aerial vehicle sends the first encryption information to a terminal which is logged in by a user account corresponding to the transportation order information, receives feedback information aiming at the first encryption information and sent by the terminal, determines whether safety authentication is successful according to the feedback information, and controls a warehouse corresponding to the transportation order information to be opened after the safety authentication is determined to be successful; or alternatively, the first and second heat exchangers may be,
after the unmanned aerial vehicle arrives at the transportation location according to the transportation location information, receiving second encryption information sent by a terminal which is logged in by a user account corresponding to the transportation order information, respectively decrypting and comparing the first encryption information and the second encryption information by the unmanned aerial vehicle, determining whether security authentication is successful according to a comparison result, and controlling a warehouse corresponding to the transportation order information to be opened after the security authentication is determined to be successful; or alternatively, the first and second heat exchangers may be,
The unmanned aerial vehicle further receives third encryption information for safety authentication, after the unmanned aerial vehicle arrives at a transportation place according to the transportation place information, the unmanned aerial vehicle sends the first encryption information to a terminal for logging in a user account corresponding to the transportation order information, receives feedback information aiming at the first encryption information and sent by the terminal, receives second encryption information sent by the terminal, and decrypts and compares the third encryption information and the second encryption information respectively, determines whether the safety authentication is successful or not according to a comparison result and the feedback information, and after the success is determined, controls warehouse opening corresponding to the transportation order information.
The second method for improving the transportation safety of the unmanned aerial vehicle provided by the embodiment of the invention comprises the following steps:
the terminal acquires transportation order information and fourth encryption information for security authentication from the server according to account information of the user;
when the terminal communicates with the unmanned aerial vehicle corresponding to the transportation order information, the fourth encryption information is sent to the unmanned aerial vehicle, feedback information sent by the unmanned aerial vehicle is received, whether the safety authentication is successful or not is determined according to the feedback information, and whether the safety authentication is successful or not is displayed; or alternatively, the first and second heat exchangers may be,
The terminal receives fifth encryption information sent by the unmanned aerial vehicle when communicating with the unmanned aerial vehicle corresponding to the transportation order information, the terminal decrypts and compares the fourth encryption information and the fifth encryption information respectively, determines whether the security authentication is successful or not according to a comparison result, and displays information whether the security authentication is successful or not; or alternatively, the first and second heat exchangers may be,
the terminal further obtains sixth encryption information for safety certification from the server, when the terminal communicates with the unmanned aerial vehicle corresponding to the transportation order information, the terminal sends the fourth encryption information to the unmanned aerial vehicle, receives feedback information aiming at the fourth encryption information sent by the unmanned aerial vehicle, and receives fifth encryption information sent by the unmanned aerial vehicle, the terminal decrypts and compares the fifth encryption information and the sixth encryption information respectively, determines whether safety certification is successful or not according to a comparison result and the feedback information, and displays information whether the safety certification is successful or not.
The third method for improving the transportation safety of the unmanned aerial vehicle provided by the embodiment of the invention comprises the following steps:
generating transportation order information for the unmanned aerial vehicle, wherein the transportation order information comprises transportation site information;
Generating first encryption information for security authentication, or generating second encryption information and third encryption information for security encryption;
and sending the generated transportation order to the unmanned aerial vehicle, and sending the generated encryption information to the unmanned aerial vehicle, or sending the generated encryption information to a terminal for logging in a user account corresponding to the transportation order.
The first unmanned aerial vehicle provided by the embodiment of the invention comprises a communication unit, a processing unit and a storage unit, wherein the communication unit and the storage unit are communicated with the processing unit through buses;
the communication unit is used for receiving information from the external equipment through the processing unit or sending information to the external equipment;
the storage unit is used for storing information according to the instruction of the processing unit;
the processing unit is used for receiving the transportation order information and the first encryption information for safety authentication through the communication unit, wherein the transportation order information comprises transportation place information and is stored in the storage unit; the method comprises the steps of,
after confirming that the unmanned aerial vehicle arrives at a transportation place, reading first encryption information in a storage unit, sending the first encryption information to a terminal which is logged in by a user account corresponding to transportation order information through a communication unit, receiving feedback information aiming at the first encryption information and sent by the terminal through the communication unit, determining whether security authentication is successful according to the feedback information, and sending an instruction for controlling warehouse opening corresponding to the transportation order information after the security authentication is determined to be successful;
Or after confirming that the unmanned aerial vehicle arrives at a transportation place, receiving second encryption information sent by a terminal which is logged in by a user account corresponding to the transportation order information through a communication unit, reading the stored first encryption information, respectively decrypting and comparing the first encryption information and the second encryption information, determining whether security authentication is successful according to a comparison result, and after determining that the security authentication is successful, sending out an instruction for controlling warehouse opening corresponding to the transportation order information; or alternatively, the first and second heat exchangers may be,
or the communication unit is further used for receiving third encryption information for safety certification through the communication unit, reading the first encryption information from the storage unit after confirming that the unmanned aerial vehicle arrives at a transportation place, sending the first encryption information to a terminal corresponding to the transportation order information and logging in by a user account through the communication unit, receiving feedback information aiming at the first encryption information sent by the terminal through the communication unit, receiving second encryption information sent by the terminal through the communication unit, respectively decrypting and comparing the third encryption information and the second encryption information, determining whether the safety certification is successful according to a comparison result and the feedback information, and sending an instruction for controlling the warehouse corresponding to the transportation order information to be opened after the success is determined.
The first terminal provided by the embodiment of the invention comprises a communication unit, a processing unit, a storage unit and a display unit, wherein the communication unit, the storage unit and the display unit are communicated with the processing unit through buses;
the communication unit is used for receiving information from the external equipment through the processing unit or sending information to the external equipment;
the storage unit is used for storing information according to the instruction of the processing unit;
the display unit is used for displaying information according to the instruction of the processing unit;
the processing unit is used for acquiring the transportation order information and the fourth encryption information for safety authentication from the server through the communication unit and storing the transportation order information and the fourth encryption information into the storage unit; the method comprises the steps of,
when the communication unit is used for communicating with the unmanned aerial vehicle corresponding to the transportation order information, the fourth encryption information in the storage unit is read, the fourth encryption information is sent to the unmanned aerial vehicle through the communication unit, feedback information aiming at the fourth encryption information and sent by the unmanned aerial vehicle is received through the communication unit, whether the safety authentication is successful or not is determined according to the feedback information, and the display unit is indicated to display whether the safety authentication is successful or not; or alternatively, the first and second heat exchangers may be,
When the communication unit is used for communicating with the unmanned aerial vehicle corresponding to the transportation order information, the communication unit is used for receiving fifth encrypted information sent by the unmanned aerial vehicle, reading fourth encrypted information stored in the storage unit, decrypting and comparing the fourth encrypted information and the fifth encrypted information respectively, determining whether the security authentication is successful or not according to a comparison result, and indicating the display unit to display the information whether the security authentication is successful or not; or alternatively, the first and second heat exchangers may be,
the processing unit is further configured to obtain sixth encryption information for security authentication from the server through the communication unit, and when the communication unit communicates with the unmanned aerial vehicle corresponding to the transportation order information, read the fourth encryption information stored in the storage unit, send the fourth encryption information to the unmanned aerial vehicle through the communication unit, receive feedback information sent by the unmanned aerial vehicle through the communication unit, receive fifth encryption information sent by the unmanned aerial vehicle through the communication unit, decrypt and compare the fifth encryption information and the sixth encryption information, determine whether the security authentication is successful according to a comparison result and the feedback information, and instruct the display unit to display information whether the security authentication is successful.
The first server provided by the embodiment of the invention comprises: the device comprises a communication unit, a processing unit and a storage unit, wherein the communication unit and the storage unit are communicated with the processing unit through buses;
the communication unit is used for receiving information from the external equipment through the processing unit or sending information to the external equipment;
the storage unit is used for storing information according to the instruction of the processing unit;
the processing unit is used for generating a transportation order comprising transportation site information for the unmanned aerial vehicle, generating first encryption information for security authentication or generating second and third encryption information for security authentication, sending the generated transportation order to the unmanned aerial vehicle through the communication unit, and sending the generated encryption information to the unmanned aerial vehicle or a terminal for logging in a user account corresponding to the transportation order through the communication unit.
The second unmanned aerial vehicle provided by the embodiment of the invention comprises a memory and one or more processors; and one or more modules stored in the memory and configured to be executed by the one or more processors, the one or more modules including instructions for performing the steps of the first method of improving transportation safety of a drone.
The second terminal provided by the embodiment of the invention comprises a display, a memory, a transceiver and one or more processors; and one or more modules stored in the memory and configured to be executed by the one or more processors, the one or more modules including instructions for performing the steps of the second method of improving transportation safety of a drone.
The second server provided by the embodiment of the invention comprises: a memory, a transceiver, one or more processors; and one or more modules stored in the memory and configured to be executed by the one or more processors, the one or more modules including instructions for performing steps of a third method of improving transportation safety of a fir tree.
The embodiment of the invention also provides a computer program product used in combination with the unmanned aerial vehicle, which comprises a computer readable storage medium and a computer program mechanism embedded in the storage medium, wherein the computer program mechanism comprises instructions for executing the steps in the first unmanned aerial vehicle transportation safety improving method.
Embodiments of the present invention also provide a computer program product for use in conjunction with an electronic device, the computer program product comprising a computer-readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising instructions for performing the steps of the second method for improving transportation security of a drone.
Embodiments of the present invention also provide a computer program product for use in conjunction with a server, the computer program product comprising a computer-readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising instructions for performing the steps of the third method for improving transportation security of a drone described above.
According to the unmanned aerial vehicle transportation safety method, various unmanned aerial vehicles and the scheme of the computer program product combined with the unmanned aerial vehicle, the unmanned aerial vehicle acquires the encrypted information and performs safety certification according to interaction of the encrypted information and the terminal, and the cargo hold is opened to complete the transportation task only after the safety certification passes.
According to the scheme of the second method for improving the unmanned aerial vehicle transportation safety, various terminals and the computer program product combined with the electronic equipment, the terminals acquire the encryption information according to the user account information, perform safety authentication with the unmanned aerial vehicle according to the encryption information, and inform the user of the authentication result information.
According to the third method for improving the transportation safety of the unmanned aerial vehicle, various servers and the scheme of the computer program product combined with the servers, the servers generate encryption information and send the encryption information to the user account login terminal and/or the unmanned aerial vehicle, so that transportation safety authentication can be carried out through the encryption information in the follow-up process, the risk that safety authentication information is intercepted is reduced, the possibility that the unmanned aerial vehicle is impersonated or received by mistake and the cargo is wrongly sent out is reduced, and the transportation safety of the unmanned aerial vehicle is improved.
Drawings
Specific embodiments of the invention will be described below with reference to the accompanying drawings, in which:
fig. 1 is a schematic flow chart of a first method for improving transportation safety of a unmanned aerial vehicle according to an embodiment of the present invention;
Fig. 2 is a flow chart illustrating a second method for improving transportation safety of a unmanned aerial vehicle according to an embodiment of the present invention;
fig. 3 is a flow chart illustrating a second method for improving transportation safety of a unmanned aerial vehicle according to an embodiment of the present invention;
fig. 4 is a schematic structural view of a first unmanned aerial vehicle except for the first unmanned aerial vehicle provided by the embodiment of the invention;
fig. 5 shows a schematic structural diagram of a first terminal according to an embodiment of the present invention;
fig. 6 shows a schematic structural diagram of a first server according to an embodiment of the present invention;
fig. 7 shows a schematic structural diagram of a second unmanned aerial vehicle according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a second terminal according to an embodiment of the present invention;
fig. 9 shows a schematic structural diagram of a second server according to an embodiment of the present invention;
FIG. 10 is a flow chart of a preferred unmanned aerial vehicle pick-up embodiment of the present invention;
FIG. 11 is a flow chart of another preferred unmanned aerial vehicle pick-up embodiment of the present invention;
FIG. 12 is a schematic flow chart diagram of an embodiment of a method for delivering cargo to an unmanned aerial vehicle according to the present invention;
FIG. 13 shows a flow diagram of another embodiment of a method of unmanned aerial vehicle delivery;
FIG. 14 shows a flow diagram of yet another embodiment of a drone delivery method;
FIG. 15 shows a schematic structural view of an exemplary embodiment of the drone of the present invention;
FIG. 16 illustrates a schematic structural view of one particular implementation of the exemplary embodiment of the drone shown in FIG. 15;
FIG. 17 shows a schematic structural view of yet another embodiment of the drone of the present invention;
FIG. 18 shows a schematic diagram of the structure of a terminal embodiment of the present invention;
fig. 19 shows a schematic diagram of the structure of a server embodiment of the present invention.
Detailed Description
In order to make the technical solution and advantages of the present invention more apparent, the following detailed description of exemplary embodiments of the present invention is provided in conjunction with the accompanying drawings, it being apparent that the described embodiments are only some, but not all embodiments of the present invention. And the embodiments and features of the embodiments in this description may be combined with each other without conflict.
In the embodiment of the invention, when picking up goods, the two-way verification is carried out through the two information of the timestamp of the generation moment of the online logistics order of the user and the timestamp of the goods picking-up moment assigned to the unmanned aerial vehicle, or the one-way verification is carried out based on at least one timestamp, the unmanned aerial vehicle needs to verify whether the user is the real application party of the logistics order, and the user needs to verify whether the unmanned aerial vehicle is the correct unmanned aerial vehicle for appointed goods picking so as to prevent the false picking-up of the goods or the malicious unmanned aerial vehicle from cheating to pick up the goods of the user.
In one embodiment, the unmanned aerial vehicle uses a voice question-and-answer mode to compare and verify the answer of the user and the logistics order information to determine that the user is indeed a receiver, and photographs or videos are taken at the same time.
In another embodiment, similar to the goods taking, two-way verification can be performed through two information of a time stamp of the online logistics order generation time and a time stamp of the goods taking time assigned to the unmanned aerial vehicle, or one-way verification is performed based on at least one time stamp, the unmanned aerial vehicle needs to verify whether a user is a correct consignee, and the consignee needs to verify whether the unmanned aerial vehicle is an unmanned aerial vehicle for appointed goods delivery, so that the situation that other people impersonate the user to cheat to receive goods or the unmanned aerial vehicle misplaces and the user receives other people goods is prevented.
The unmanned aerial vehicle in the invention can be an unmanned aerial vehicle, an unmanned automobile or other unmanned transport means, and in the following preferred embodiments, the unmanned aerial vehicle is used for executing the transport task, and when the unmanned aerial vehicle is applied to other unmanned scenes, other flows related to order interaction and authentication are the same except for different specific transport modes.
Preferably, as shown in fig. 1, a first method for improving transportation safety of an unmanned aerial vehicle according to an embodiment of the present invention includes:
Step 101, an unmanned aerial vehicle acquires transportation order information and first encryption information for safety authentication, wherein the transportation order information comprises transportation place information;
102, after the unmanned aerial vehicle arrives at a transportation place according to the transportation place information, the unmanned aerial vehicle sends the first encryption information to a terminal which is logged in by a user account corresponding to the transportation order information, receives feedback information which is sent by the terminal and aims at the first encryption information, determines whether safety authentication is successful according to the feedback information, and controls a warehouse corresponding to the transportation order information to be opened after the safety authentication is determined to be successful; or alternatively, the first and second heat exchangers may be,
after the unmanned aerial vehicle arrives at the transportation location according to the transportation location information, receiving second encryption information sent by a terminal which is logged in by a user account corresponding to the transportation order information, respectively decrypting and comparing the first encryption information and the second encryption information by the unmanned aerial vehicle, determining whether security authentication is successful according to a comparison result, and controlling a warehouse corresponding to the transportation order information to be opened after the security authentication is determined to be successful; or alternatively, the first and second heat exchangers may be,
the unmanned aerial vehicle further receives third encryption information for safety authentication, after the unmanned aerial vehicle arrives at a transportation place according to the transportation place information, the unmanned aerial vehicle sends the first encryption information to a terminal for logging in a user account corresponding to the transportation order information, receives feedback information aiming at the first encryption information and sent by the terminal, receives second encryption information sent by the terminal, and decrypts and compares the third encryption information and the second encryption information respectively, determines whether the safety authentication is successful or not according to a comparison result and the feedback information, and after the success is determined, controls warehouse opening corresponding to the transportation order information.
Preferably, the feedback information for the first encryption information includes: verifying the first encrypted information as to whether the first encrypted information passes or not;
or, the feedback information for the first encryption information includes: information decrypted by the first encryption information; the step of receiving the feedback information further comprises: transmitting the decrypted information of the first encrypted information to a server, and receiving information which is fed back by the server and is used for verifying whether the decrypted information passes or not; the determining whether the security authentication is successful according to the feedback information comprises: and determining whether the security authentication is successful according to the information fed back by the server for verifying whether the security authentication is passed.
Preferably, the first encryption information sent to the terminal includes: information encrypted by a public key of the user account corresponding to the transportation order;
the second encryption information includes: information encrypted with the public key of the drone;
the first encryption information or the third encryption information decrypted by the unmanned aerial vehicle comprises: information encrypted with the public key of the drone.
The transport order is a pick-up order or a delivery order; preferably, the method comprises the steps of,
the encrypted information in each encrypted information may include: and generating a time stamp of the time of the transportation order, or confirming the time stamp of the time of the user logistics order corresponding to the transportation order by the server.
Preferably, as shown in fig. 2, a second method for improving transportation safety of an unmanned aerial vehicle according to an embodiment of the present invention includes:
step 201, the terminal obtains transportation order information and fourth encryption information for security authentication from a server according to account information of a user;
step 202, when the terminal communicates with the unmanned aerial vehicle corresponding to the transportation order information, the fourth encryption information is sent to the unmanned aerial vehicle, feedback information sent by the unmanned aerial vehicle is received, whether the security authentication is successful or not is determined according to the feedback information, and whether the security authentication is successful or not is displayed; or alternatively, the first and second heat exchangers may be,
the terminal receives fifth encryption information sent by the unmanned aerial vehicle when communicating with the unmanned aerial vehicle corresponding to the transportation order information, the terminal decrypts and compares the fourth encryption information and the fifth encryption information respectively, determines whether the security authentication is successful or not according to a comparison result, and displays information whether the security authentication is successful or not; or alternatively, the first and second heat exchangers may be,
the terminal further obtains sixth encryption information for safety certification from the server, when the terminal communicates with the unmanned aerial vehicle corresponding to the transportation order information, the terminal sends the fourth encryption information to the unmanned aerial vehicle, receives feedback information sent by the unmanned aerial vehicle, and receives fifth encryption information sent by the unmanned aerial vehicle, the terminal decrypts and compares the fifth encryption information and the sixth encryption information respectively, determines whether safety certification is successful or not according to a comparison result and the feedback information, and displays information whether the safety certification is successful or not.
The feedback information for the fourth encryption information includes: verifying the fourth encrypted information as to whether the fourth encrypted information passes or not;
or, the feedback information for the fourth encryption information includes: information decrypted by the fourth encryption information; the step of receiving the feedback information further comprises: transmitting the information decrypted by the fourth encryption information to a server, and receiving information which is fed back by the server and is used for verifying whether the information decrypted by the server passes or not; the determining whether the security authentication is successful according to the feedback information comprises: and determining whether the security authentication is successful according to the information fed back by the server for verifying whether the security authentication is passed.
Preferably, the fourth encryption information sent to the unmanned aerial vehicle includes: information encrypted with the public key of the drone;
the fifth encryption information includes: information encrypted with a public key of the user account;
the fourth encryption information and the sixth encryption information decrypted by the terminal include: information encrypted with a public key of the user account.
The shipping order may be a pick-up order, or a delivery order; preferably, the encrypted information in each encrypted information may include: and generating a time stamp of the time of the transportation order, or confirming the time stamp of the time of the user logistics order corresponding to the transportation order by the server.
As shown in fig. 3, a third method for improving transportation safety of an unmanned aerial vehicle according to an embodiment of the present invention includes:
step 301, generating transportation order information for an unmanned aerial vehicle, wherein the transportation order information comprises transportation site information;
step 302, generating first encryption information for security authentication, or generating second encryption information and third encryption information for security encryption;
step 303, sending the generated transportation order to the unmanned aerial vehicle, and sending the generated encryption information to the unmanned aerial vehicle, or sending the generated encryption information to a terminal of user account login corresponding to the transportation order.
After the step of sending the encrypted information, the method may further include: and receiving decryption information sent by the unmanned aerial vehicle or the terminal, carrying out security authentication on the decryption information, and feeding back a security authentication result to the unmanned aerial vehicle or the terminal.
The first encryption information sent to the unmanned aerial vehicle may include: information encrypted with a public key of the user account;
the first encryption information sent to the terminal logged in by the user account may include: information encrypted with the public key of the drone;
the second encryption information and the third encryption information may include information encrypted with a public key of the drone and information encrypted with a public key of the user account, respectively.
The transportation order is a pick-up order or a delivery order; preferably, the encrypted information in each encrypted information includes: and the transport order generates a time stamp of the time, or the server confirms the time stamp of the user logistics order time corresponding to the transport order.
As shown in fig. 4, the first unmanned aerial vehicle provided by the embodiment of the invention includes a processing unit 41, a communication unit 42 and a storage unit 43, where the communication unit 42 and the storage unit 43 are both in communication with the processing unit 41 through a bus;
the communication unit 42 is used for receiving information from an external device through the processing unit 41 or transmitting information to the external device;
the storage unit 43 is used for storing information according to instructions of the processing unit 41;
the processing unit 41 is configured to receive, via the communication unit 42, shipping order information including shipping location information and first encrypted information for security authentication, and store the shipping order information in the storage unit 43; the method comprises the steps of,
after confirming that the unmanned aerial vehicle arrives at a transportation place, reading first encryption information in a storage unit 43, sending the first encryption information to a terminal which is logged in by a user account corresponding to the transportation order information through a communication unit 42, receiving feedback information aiming at the first encryption information and sent by the terminal through the communication unit 42, determining whether security authentication is successful according to the feedback information, and sending an instruction for controlling warehouse opening corresponding to the transportation order information after the security authentication is successful;
Or after confirming that the unmanned aerial vehicle arrives at the transportation site, receiving second encryption information sent by a terminal corresponding to the user account login of the transportation order information through a communication unit 42, reading the stored first encryption information, respectively decrypting and comparing the first encryption information and the second encryption information, determining whether security authentication is successful according to a comparison result, and after determining that the security authentication is successful, sending out an instruction for controlling warehouse opening corresponding to the transportation order information; or alternatively, the first and second heat exchangers may be,
or, the communication unit 42 is further configured to receive third encrypted information for security authentication through the communication unit 42, after confirming that the unmanned aerial vehicle arrives at a transportation location, read the first encrypted information from the storage unit 43, send the first encrypted information to a terminal that the transportation order information corresponds to a user account and logs in through the communication unit 42, receive feedback information for the first encrypted information sent by the terminal through the communication unit 42, receive second encrypted information sent by the terminal through the communication unit 42, decrypt and compare the third encrypted information and the second encrypted information, respectively, determine whether the security authentication is successful according to a comparison result and the feedback information, and send an instruction for controlling the warehouse corresponding to the transportation order information to open after the determination is successful.
Preferably, the feedback information for the first encryption information may include: verifying the first encrypted information as to whether the first encrypted information passes or not;
alternatively, the feedback information for the first encryption information may also include: information decrypted by the first encryption information; the processing unit 41 is further arranged to, via the communication unit 42: the information decrypted by the first encryption information is sent to the server through the communication unit 42, and information which is fed back by the server and is used for verifying whether the decrypted information passes or not is received through the communication unit 42; the communication unit 42 is configured to determine whether the security authentication is successful based on the feedback information, including: the communication unit 42 is configured to determine whether the security authentication is successful according to the information fed back by the server as to whether the authentication is passed.
Preferably, the first encryption information sent to the terminal includes: information encrypted by a public key of the user account corresponding to the transportation order;
the second encryption information includes: information encrypted with the public key of the drone;
the first encryption information or the third encryption information decrypted by the processing unit 41 includes: information encrypted with the public key of the drone.
The transport order can be a pick-up order or a delivery order; preferably, the encrypted information in each encrypted information includes: and generating a time stamp of the time of the transportation order, or confirming the time stamp of the time of the user logistics order corresponding to the transportation order by the server.
Fig. 5 shows a first terminal provided by an embodiment of the present invention, as shown in fig. 5, the terminal includes a communication unit 52, a processing unit 51, a storage unit 53, and a display unit 54, where the communication unit 52, the storage unit 53, and the display unit 54 all communicate with the processing unit 51 through a bus;
the communication unit 52 is used for the processing unit 51 to receive information from an external device or to send information to the external device;
the storage unit 53 is configured to store information according to an instruction of the processing unit 51;
the display unit 54 is configured to display information according to an instruction of the processing unit 51;
the processing unit 51 is configured to acquire shipping order information and fourth encryption information for security authentication from a server through the communication unit 52, and store the shipping order information and the fourth encryption information in the storage unit 53; the method comprises the steps of,
when the communication unit 52 communicates with the unmanned aerial vehicle corresponding to the transportation order information, the fourth encryption information in the storage unit 53 is read, the fourth encryption information is sent to the unmanned aerial vehicle through the communication unit 52, feedback information, sent by the unmanned aerial vehicle, aiming at the fourth encryption information is received through the communication unit 52, whether the security authentication is successful or not is determined according to the feedback information, and the display unit 54 is instructed to display whether the security authentication is successful or not; or alternatively, the first and second heat exchangers may be,
When the communication unit 52 is used for communicating with the unmanned aerial vehicle corresponding to the transportation order information, the communication unit 52 is used for receiving the fifth encrypted information sent by the unmanned aerial vehicle, reading the fourth encrypted information stored in the storage unit 53, decrypting and comparing the fourth encrypted information and the fifth encrypted information respectively, determining whether the security authentication is successful or not according to the comparison result, and indicating the display unit 54 to display the information whether the security authentication is successful or not; or alternatively, the first and second heat exchangers may be,
the processing unit 51 is further configured to obtain sixth encryption information for security authentication from a server through the communication unit 52, and when communicating with the unmanned aerial vehicle corresponding to the transportation order information through the communication unit 52, read fourth encryption information stored in the storage unit 53, send the fourth encryption information to the unmanned aerial vehicle through the communication unit 52, receive feedback information for the fourth encryption information sent by the unmanned aerial vehicle through the communication unit 52, and receive fifth encryption information sent by the unmanned aerial vehicle through the communication unit 52, decrypt and compare the fifth encryption information and the sixth encryption information, respectively, determine whether the security authentication is successful according to the comparison result and the feedback information, and instruct the display unit 54 to display information whether the security authentication is successful.
Preferably, the feedback information for the fourth encryption information includes: verifying the fourth encrypted information as to whether the fourth encrypted information passes or not;
or, the feedback information for the fourth encryption information includes: information decrypted by the fourth encryption information; the communication unit 52 is further adapted to: the information decrypted by the fourth encryption information is sent to a server through the communication unit 52, and information which is fed back by the server and is used for verifying whether the information passes or not is received through the communication unit 52; the communication unit 52 is configured to determine whether the security authentication is successful based on the feedback information, including: the communication unit 52 is configured to determine whether the security authentication is successful according to the information that is fed back by the server and that is verified.
Preferably, the fourth encryption information sent to the unmanned aerial vehicle includes: information encrypted with the public key of the drone;
the fifth encryption information includes: information encrypted with a public key of the user account;
the fourth encryption information or the sixth encryption information decrypted by the terminal includes: information encrypted with a public key of the user account.
The transport order can be a pick-up order or a delivery order; preferably, the encrypted information in the fourth encrypted information includes: the time stamp of the time when the transport order is generated, or the time stamp of the time when the user logistics order corresponding to the transport order is confirmed by the server;
The information encrypted in the fifth encryption information includes: the time stamp of the time when the transport order is generated, or the time stamp of the time when the user logistics order corresponding to the transport order is confirmed by the server;
the encrypted information in the sixth encrypted information includes: and generating a time stamp of the time of the transportation order, or confirming the time stamp of the time of the user logistics order corresponding to the transportation order by the server.
Fig. 6 shows a first server provided by an embodiment of the present invention, as shown in fig. 6, the server includes: a processing unit 61, a communication unit 62, and a storage unit 63, wherein the communication unit 62 and the storage unit 63 each communicate with the processing unit 61 through a bus;
the communication unit 62 is used for the processing unit 61 to receive information from an external device or to transmit information to the external device;
the storage unit 63 is configured to store information according to an instruction of the processing unit 61;
the processing unit 61 is configured to generate a transportation order including transportation location information for the unmanned aerial vehicle, generate first encryption information for security authentication, or generate second and third encryption information for security authentication, and send the generated transportation order to the unmanned aerial vehicle through the communication unit 62, and send the generated encryption information to the unmanned aerial vehicle or a terminal for logging in a user account corresponding to the transportation order through the communication unit 62.
Preferably, the processing unit 61 of the server is further configured to receive, through the communication unit 62, the decryption information sent by the unmanned aerial vehicle or the terminal, perform security authentication on the decryption information, and then feed back, through the communication unit 62, the security authentication result to the unmanned aerial vehicle or the terminal.
Preferably, the first encryption information sent to the unmanned aerial vehicle is: information encrypted with a public key of the user account;
the first encryption information sent to the terminal logged in by the user account comprises: information encrypted with the public key of the drone;
the second encryption information and the third encryption information include information encrypted with a public key of the drone and information encrypted with a public key of the user account, respectively.
The shipping order is a pick-up order, or a delivery order.
Preferably, the encrypted information in the first encrypted information includes: the time stamp of the time when the transportation order is generated, or the time stamp of the time when the user logistics order corresponding to the transportation order is confirmed by the server;
the encrypted information in the second encrypted information includes: the time stamp of the time when the transport order is generated, or the time stamp of the time when the user logistics order corresponding to the transport order is confirmed by the server;
The encrypted information in the third encrypted information includes: and generating a time stamp of the time of the transportation order, or confirming the time stamp of the time of the user logistics order corresponding to the transportation order by the server.
Fig. 7 shows a second type of drone provided by an embodiment of the present invention, as shown in fig. 7, the drone including a memory 71, a transceiver 72, one or more processors 73; and one or more modules stored in the memory 71 and configured to be executed by the one or more processors 73, the one or more modules including instructions for performing the steps of the first method of improving transportation safety of a drone described above.
Fig. 8 shows a second terminal provided by an embodiment of the invention, which terminal comprises, as shown in fig. 8, a display 81, a memory 82, a transceiver 83, one or more processors 84; and one or more modules stored in the memory 82 and configured to be executed by the one or more processors 84, the one or more modules including instructions for performing the steps of the second method of improving transportation safety of a drone described above.
Fig. 9 shows a second server according to an embodiment of the present invention, as shown in fig. 9, where the server includes: a memory 91, a transceiver 92, one or more processors 93; and one or more modules stored in the memory 91 and configured to be executed by the one or more processors 93, the one or more modules including instructions for performing the steps of the third method of improving transportation safety of a drone described above.
The embodiment of the invention also provides a computer program product used in combination with the unmanned aerial vehicle, which comprises a computer readable storage medium and a computer program mechanism embedded in the storage medium, wherein the computer program mechanism comprises instructions for executing the steps in the first unmanned aerial vehicle transportation safety improving method.
Embodiments of the present invention also provide a computer program product for use in conjunction with an electronic device, the computer program product comprising a computer-readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising instructions for performing the steps of the second method for improving transportation security of a drone.
Embodiments of the present invention also provide a computer program product for use in conjunction with a server, the computer program product comprising a computer-readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising instructions for performing the steps of the third method for improving transportation security of a drone described above.
The technical solutions of the embodiments of the present invention are further explained below through preferred embodiments, respectively.
Fig. 10 shows a preferred unmanned aerial vehicle pickup embodiment in which a delivery user authenticates itself to the unmanned aerial vehicle via a registered terminal, thereby improving transportation security.
The implementation mode specifically comprises the following steps:
in step 1001, the terminal obtains related information of the physical distribution order, including the address of the sender, the address of the receiver, the information of the goods, the contact information and other traditional physical distribution information, according to the operation performed by the user through the Application (APP) at the client, and generates the physical distribution order to be presented to the user, so that the user confirms the submitting to the server at the network side.
In alternative implementations, the user may perform related logistics operations through other common manners, such as web pages provided by the logistics system.
Of course, no matter the user operates in a webpage mode or in a client side mode, the user needs to log in an account before submitting, and the terminal can submit order information after logging interaction with a server on a network side is completed.
The server at the network side may be a server at the network side of the logistics system, and is used for interacting logistics related information, order information, unmanned aerial vehicle assignment and the like with the terminal logged in by the user. The service units for logistics related information and order information interacted with the terminal and the service unit for assigning the unmanned aerial vehicle can be integrated in one physical server, can be independent physical servers respectively, can also be realized by using cloud computing and other technologies through a distributed server, and the specific realization modes are all general technologies in the field of computer networks and are not repeated here.
Of course, when the invention is applied to a network side system for providing commodity sales service in addition to a logistics server, the service units interacted with the terminal can be integrated with the server unit for providing commodity sales service, and the service units assigned to the unmanned aerial vehicle are independently arranged.
Step 1002, after receiving the user logistics order and confirming that the order is successful, the server on the network side generates a time stamp T1 of the time when the order is confirmed to be successful.
In step 1003, the server assigns the unmanned aerial vehicle for taking goods to generate a taking order according to the user's logistics order, and records a time stamp T2 of the assigned time of the unmanned aerial vehicle.
When the unmanned aerial vehicle is assigned, the server generates a transportation order according to the user logistics order, in each embodiment of taking goods, the transportation order is called a taking order for clarity, and taking goods order information is sent to the unmanned aerial vehicle in the assignment instruction, wherein the taking goods order information at least comprises transportation location information, and in each embodiment of taking goods, the taking goods is called shipper address information. In addition, in this embodiment and other embodiments of the present invention, if the unmanned aerial vehicle is dedicated to picking up or is dedicated to delivering, the server does not need to include the transportation type information (information for identifying picking up or delivering at the time of the transportation task) in the picking-up order information or delivering order information sent to the unmanned aerial vehicle; if the unmanned aerial vehicle is used for taking goods and delivering goods, the server sends the taking order information or delivering goods order information of the unmanned aerial vehicle to the unmanned aerial vehicle and further comprises transportation type information.
In this step, the drone is assigned a time stamp of the moment, i.e. of the pick order generation moment.
Step 1004, the server adopts an asymmetric encryption mode, encrypts a timestamp T1 with the assigned public key of the unmanned aerial vehicle, encrypts a timestamp T2 with the public key of the user account, and then sends the encrypted timestamp T1 and the encrypted timestamp T2 to the assigned unmanned aerial vehicle and the terminal on which the user logs in, respectively.
In this step, the encrypted timestamp issued to the unmanned aerial vehicle may be issued along with the instruction assigned to the unmanned aerial vehicle, or may be issued separately through a specific message. The information issued to the terminal logged in by the user can be issued by a single message or issued along with other messages of the terminal in the process of executing the flow.
In an alternative embodiment, the timestamp T1 and the timestamp T2 may be exchanged, that is, T1 is encrypted with the public key of the user account, and T2 is encrypted with the public key of the unmanned aerial vehicle, which is also exchanged in the authentication process.
Preferably, in this embodiment and other embodiments of the present invention, when a user registers to a server through a client application or a web page on a terminal, or when an unmanned aerial vehicle registers to the server, the server may configure and store a public key private key pair for a user account or the unmanned aerial vehicle, and send a private key configured for the user account to the terminal registered by the user and a terminal subsequently logged in, and send a private key configured for the unmanned aerial vehicle to the corresponding unmanned aerial vehicle.
Step 1005, the assigned unmanned aerial vehicle fetches goods to a goods fetching place according to the place information and the time information in the logistics order, and feeds back the position information of the unmanned aerial vehicle to the server, and meanwhile, when the user initiates the unmanned aerial vehicle position inquiry through the logged-in terminal, the server sends the position and the time information of the unmanned aerial vehicle to the terminal logged in by the user at the moment.
In this embodiment and other embodiments of the present invention, the unmanned aerial vehicle may carry a GPS or other special positioning module, or may perform positioning through a wireless communication network to obtain its own location information.
Step 1006, after the unmanned aerial vehicle arrives at the goods taking place, the encrypted time stamp T2 in the unmanned aerial vehicle is transmitted to a terminal logged in by the user, and meanwhile, the user transmits the encrypted time stamp T1 in the unmanned aerial vehicle to the unmanned aerial vehicle through the logged-in terminal, and identity authentication is carried out according to the received encrypted time stamps.
Specifically, in this step, after the unmanned aerial vehicle arrives at the pickup location, the unmanned aerial vehicle starts photographing or video recording, and the terminal that the user logs in acquires order number information from the unmanned aerial vehicle, and verifies whether the arriving unmanned aerial vehicle is the unmanned aerial vehicle assigned for the corresponding order of the user.
After the unmanned aerial vehicle is successfully verified, the terminal transmits the encrypted time stamp T1 to the unmanned aerial vehicle, and meanwhile, the unmanned aerial vehicle transmits the encrypted time stamp T2 to the terminal.
After receiving the encrypted time stamp sent by the opposite party, the terminal and the unmanned aerial vehicle decrypt the received encrypted time stamp by using the private key of the terminal and the unmanned aerial vehicle, compare the received encrypted time stamp with the decrypted corresponding time stamp from the server, and if the encrypted time stamp is consistent with the decrypted corresponding time stamp, the opposite party passes the identity verification.
That is, the terminal compares the T2 information obtained from the server before the terminal and the T2 information received immediately before the terminal is separated by the private key of the terminal, and if the time stamps are the same, the unmanned aerial vehicle is considered to be the unmanned aerial vehicle assigned to the terminal. Meanwhile, the unmanned aerial vehicle uses the private key of the unmanned aerial vehicle to unlock the T1 information obtained from the server before the unmanned aerial vehicle and the T1 information just received and compare the information, and if the time stamps are the same, the user is considered to be the initiator of the logistics order. If the terminal verifies that T2 is not passed, it is determined that the unmanned aerial vehicle is not a system-assigned unmanned aerial vehicle, and is likely to be a malicious fool for unmanned aerial vehicles of other people, and the goods taking process is finished in step 1008; if the drone verifies that T1 is not passed or the terminal does not provide T1 information, then it is determined that the terminal is not the order initiating terminal, at which point no pick should be made, and the pick flow is also ended at step 1008.
Preferably, in this step, the communication between the terminal and the unmanned aerial vehicle may be completed through various wireless communication modes. In this embodiment, preferably, bluetooth, a non-contact radio frequency identification (NFC) manner, or a direct interaction manner such as scanning identification codes (e.g. two-dimensional codes or bar codes) may be adopted, which may further improve security compared to communication through a wireless communication network.
Step 1007, after the identity verification of both sides is passed, the unmanned aerial vehicle automatically unlocks and opens the warehouse corresponding to the transportation order information, the user puts the articles into the appointed space position, and after the completion of the putting, the warehouse is locked, and the picking is completed.
In this step, if the unmanned aerial vehicle has only one warehouse, the warehouse is opened, and if a plurality of warehouses exist and respectively correspond to different transportation orders, only the warehouse corresponding to the transportation order information is opened.
In the step, after the goods are taken, the unmanned aerial vehicle can fly to a logistics collection and distribution point and a next goods taking point, or can directly deliver goods when the destination is judged to be the same city and the distance is relatively close.
Step 1008, if the identity of both parties is not passed, ending the picking process.
In the step, if the terminal verifies that the T2 does not pass, the information of the failed T2 is fed back to the server, and the arrival of a correct unmanned aerial vehicle is waited; if the unmanned aerial vehicle verifies that the T1 does not pass or does not receive the encrypted T1 information from the terminal, the unmanned aerial vehicle feeds back verification failure information to the server, and flies back to a logistics distribution point, flies to the next goods taking point or waits in situ according to an instruction fed back by the server.
In the above embodiment and other embodiments of the present invention, the flow of the related logistics processes related to logistics order operation, unmanned aerial vehicle assignment, etc. may be any existing implementation manner, and the present invention is not limited thereto.
In this embodiment and other embodiments of the present invention, the terminal or the unmanned aerial vehicle and the server may communicate via various wireless communication networks such as 5G, 4G, 3G, GPRS, wiFi, and the like, and the present invention is not limited thereto.
In addition, the above-mentioned timestamp T1 and timestamp T2 are preferred implementation schemes in this embodiment and other embodiments, and by adopting this scheme, the security information and the order form fit better. The two timestamps can also be replaced by other timestamps, so long as the server generates two different timestamps, the two different timestamps are respectively encrypted by the public keys of the terminal and the unmanned aerial vehicle and sent to two devices for verification, and the technical effect of improving the transportation safety of the unmanned aerial vehicle can be achieved.
Fig. 11 shows another preferred unmanned aerial vehicle pickup implementation, in which the server completes identity authentication of the user's terminal and unmanned aerial vehicle, and improves transportation security. Steps 1101 to 1103 in this embodiment are the same as steps 1001 to 1003, and are not described here again, and after step 1103, the steps include the following steps:
step 1104, the server encrypts the timestamp T1 by the public key of the user account, encrypts the timestamp T2 by the public key of the assigned unmanned aerial vehicle, then sends the encrypted timestamp T1 to the assigned unmanned aerial vehicle, and sends the encrypted timestamp T2 to the terminal on which the user logs in.
In an alternative embodiment, the timestamp T1 and the timestamp T2 may be exchanged, that is, the timestamp T1 is encrypted by the public key of the unmanned aerial vehicle, the timestamp T2 is encrypted by the public key of the terminal, the encrypted timestamp T1 is sent to the terminal logged in by the user, the encrypted timestamp T2 is sent to the unmanned aerial vehicle, and similar exchange is performed in the subsequent authentication process, which is not repeated here.
In step 1105, the assigned unmanned aerial vehicle gets goods from the goods getting place according to the place information and the time information in the logistics order, and feeds back the position information of the unmanned aerial vehicle to the server, and meanwhile, when the user initiates the unmanned aerial vehicle position inquiry through the logged-in terminal, the server sends the position and the time information of the unmanned aerial vehicle to the terminal logged in by the user at the time.
And 1106, after the unmanned aerial vehicle arrives at the goods taking place, transmitting the encrypted time stamp T1 in the unmanned aerial vehicle to a terminal logged in by the user, and simultaneously transmitting the encrypted time stamp T2 in the unmanned aerial vehicle to the terminal logged in by the user.
Specifically, in this step, after the unmanned aerial vehicle arrives at the pickup location, the unmanned aerial vehicle starts photographing or video recording, and the user acquires order number information from the unmanned aerial vehicle through the logged-in terminal, and verifies whether the arriving unmanned aerial vehicle is the unmanned aerial vehicle assigned for the corresponding order of the user.
After the unmanned aerial vehicle is successfully verified, the terminal transmits the encrypted time stamp T2 to the unmanned aerial vehicle, and meanwhile, the unmanned aerial vehicle transmits the encrypted time stamp T1 to the terminal.
Step 1107, after receiving the encrypted time stamp sent by the opposite party, the terminal and the unmanned aerial vehicle decrypt the received encrypted time stamp by using the corresponding private key in the terminal and the unmanned aerial vehicle, and feed back the decrypted time stamp to the opposite party.
In this step, if the decryption is unsuccessful, one of the terminal and the unmanned aerial vehicle directly ends the goods taking process, or feeds back the decryption failure information to the other party and/or uploads the decryption failure information to the server, and ends the process.
If the decryption of one party of the terminal and the unmanned aerial vehicle is successful, but the decryption failure message of the other party is received, or the decryption failure message of the other party is received through the server, ending the goods taking flow.
And step 1108, after receiving the decrypted time stamps, the terminal and the unmanned aerial vehicle respectively upload the decrypted time stamps to the server.
Step 1109, the server compares the received decryption time stamp with the time stamp recorded by the server, and checks whether the time stamps uploaded by the terminal and the unmanned aerial vehicle are correct or not so as to authenticate the identity of the terminal and the unmanned aerial vehicle, and feeds an authentication result back to the unmanned aerial vehicle and the terminal.
In the step, if the time stamps uploaded by the terminal and the unmanned aerial vehicle are correct, the terminal is considered to be the terminal of the initiating user of the logistics order, and the unmanned aerial vehicle is really an assigned unmanned aerial vehicle; if the timestamp T1 is correct and the timestamp T2 is wrong (or missing), the unmanned aerial vehicle is correct, but a terminal disguises as a sender, and the terminal already acquires a private key of the decryption timestamp T1; if the time stamp T1 is wrong (or missing), the time stamp T2 is correct, judging that the unmanned aerial vehicle is in malicious spoofing, and the unmanned aerial vehicle already acquires a private key of the decryption time stamp T2; if the time stamp T1 and the time stamp T2 are wrong or missing, the unmanned aerial vehicle can be basically judged to be in malicious spoofing, and a small part of unmanned aerial vehicle is possibly correct, but a user can be disguised as a sender, at the moment, a message is immediately sent to a correct user terminal, and the order user is reminded that the unmanned aerial vehicle is in malicious spoofing or other people can be disguised as the sender.
Step 1110, after the unmanned aerial vehicle and the terminal receive the message that the identity authentication of both sides sent by the server passes, the goods taking process is completed according to the description of step 1007.
In another preferred embodiment of the present invention similar to the overall flow of fig. 11, after receiving the encrypted timestamp sent by the opposite party, the terminal and the unmanned aerial vehicle decrypt the received encrypted timestamp by using the corresponding private key of the unmanned aerial vehicle, and may not send the decrypted timestamp to the opposite party, but directly send the decrypted timestamp to the server, directly authenticate the server, and respectively send the authentication result to the opposite party, where the specific authentication mode and the result sending mode are the same as those in the previous preferred embodiment, and are not described herein again.
The above is a description of an embodiment of the unmanned aerial vehicle picking method of the present invention. The embodiment of the invention also provides a method for improving the delivery safety of the unmanned aerial vehicle.
Fig. 12 shows a specific embodiment of a delivery method of an unmanned aerial vehicle, in which the unmanned aerial vehicle uses a voice question-and-answer method to perform comparison verification with answers of users and logistics order information to determine that the unmanned aerial vehicle is indeed a recipient, and specifically includes the following steps:
step 1201, the server assigns an unmanned aerial vehicle, and after receiving the instruction comprising the transportation order, the unmanned aerial vehicle flies to the delivery destination according to the instruction after loading the goods.
In this embodiment and the embodiments described below, the shipping order includes shipping location information, i.e., shipping destination location information.
Step 1202, after the receiver appears, the unmanned aerial vehicle photographs or starts video recording.
In this step, the unmanned aerial vehicle may automatically start to take a picture or record a video at a fixed time after reaching the delivery destination.
In addition, in this step, the unmanned aerial vehicle may determine that the receiver appears through image recognition, or may determine that the receiver appears through operation of the unmanned aerial vehicle by the receiver.
In step 1203, the unmanned aerial vehicle queries the name and/or address information of the receiver in a voice manner.
In step 1204, the unmanned aerial vehicle detects whether the information answered by the receiver is correct, and provides the goods after checking that the information is correct, and then step 1205 is performed.
In the step, the unmanned aerial vehicle can acquire the content answered by the receiver through voice recognition, then the answered content is compared with the information of the logistics order, if the content is the same, the location is considered to be correct, unlocking is automatically carried out, and the receiver takes away the article; if the two types of the goods are similar, further intelligent verification is needed (such as a mode of calling out the first few digits and calling out the second few digits by a receiver through a mode of mobile phone numbers) until verification is passed, automatic unlocking is achieved, and a user takes the goods; if the information is completely different or the information cannot pass verification, the position is considered to be wrong or a person imports, and the unmanned aerial vehicle should return the information and deliver the information after the logistics company manually communicates with the addressee.
And 1205, finishing delivering goods by the unmanned aerial vehicle, finishing photographing or video recording when leaving, and flying to the next delivery point or returning.
Fig. 13 shows another embodiment of a method for delivering cargo from a drone, in which the drone performs two-way verification with the recipient, the embodiment specifically including the steps of:
step 1301, the server assigns an unmanned aerial vehicle for delivery when delivering goods to a receiver according to the user logistics order, namely generates a transportation order and sends the transportation order to the unmanned aerial vehicle, records a time stamp T2 of the assigned time of the unmanned aerial vehicle, and acquires a time stamp T1 of the generation time of the user logistics order.
Step 1302, the server adopts an asymmetric encryption mode, encrypts the timestamp T2 with the public key of the account of the receiver user, encrypts the public key of the unmanned aerial vehicle with the timestamp T1, and then sends the encrypted timestamps T1 and T2 to the terminals of the unmanned aerial vehicle and the account of the receiver user for login, respectively.
As described in the embodiments above, T1 and T2 may be interchanged herein, or may be replaced with other time stamps.
In step 1303, the assigned unmanned aerial vehicle loads goods and delivers goods according to the place information in the logistics order, and feeds back the position information of the unmanned aerial vehicle to the server, and meanwhile, when the user initiates the unmanned aerial vehicle position query through the logged-in terminal, the server sends the position and time information of the unmanned aerial vehicle to the terminal logged in by the user at the time, and the user can be a shipper or a receiver.
In this embodiment, the time for loading the cargo by the unmanned aerial vehicle may be after or before the time for issuing the encrypted timestamp by the server.
And 1304, after the unmanned aerial vehicle arrives at the delivery site, transmitting the encrypted time stamp T2 in the unmanned aerial vehicle to a terminal logged in by a receiver user, transmitting the encrypted time stamp T1 in the unmanned aerial vehicle to the terminal logged in by the receiver user, and respectively carrying out identity authentication according to the received encrypted time stamps.
Specifically, in this step, after the unmanned aerial vehicle arrives at the delivery site, the unmanned aerial vehicle may take a photograph or record a video, and before the encrypted timestamp is transmitted, the receiver user obtains order number information from the unmanned aerial vehicle through the logged-in terminal, verifies whether the arrived unmanned aerial vehicle is the unmanned aerial vehicle assigned for the corresponding order of the user, or may verify whether the unmanned aerial vehicle correctly authenticates the receiver, and then performs the key interaction operation in this step as described in the previous embodiment.
After receiving the encrypted time stamp sent by the opposite party, the terminal and the unmanned aerial vehicle decrypt the received encrypted time stamp by using the private key of the terminal and the unmanned aerial vehicle, compare the received encrypted time stamp with the decrypted corresponding time stamp from the server, and if the encrypted time stamp is consistent with the decrypted corresponding time stamp, the opposite party passes the identity verification.
Preferably, in this step, the communication between the terminal and the unmanned aerial vehicle may be completed through various wireless communication modes. In this embodiment, preferably, bluetooth, a non-contact radio frequency identification (NFC) manner, or a direct interaction manner such as scanning identification codes (e.g. two-dimensional codes or bar codes) may be adopted, which may further improve security compared to communication through a wireless communication network.
Step 1305, after the identity verification of both sides is passed, the unmanned aerial vehicle automatically unlocks, the receiver user takes out the article, and after the article is confirmed to be taken out, the warehouse is locked, and the unmanned aerial vehicle delivery is completed; if the identity of the two parties fails to pass, ending the goods taking process.
In this step, after the goods are taken, the unmanned aerial vehicle can fly to the logistics collection and distribution point, the next delivery point or the goods taking point.
In this embodiment, if the terminal verifies that T2 does not pass, the terminal feeds back the information of the failed T2 to the server, and waits for the correct unmanned aerial vehicle to arrive; if the unmanned aerial vehicle verifies that the T1 does not pass or does not receive the encrypted T1 information from the terminal, the unmanned aerial vehicle feeds back verification failure information to the server, and flies back to a logistics distribution point, flies to the next goods taking point or waits in situ according to an instruction fed back by the server.
Fig. 14 shows yet another embodiment of a method for delivering cargo by an unmanned aerial vehicle, in which the unmanned aerial vehicle performs unidirectional verification of a receiver, the embodiment specifically includes the following steps:
in step 1401, the server assigns the unmanned aerial vehicle for delivery when the delivery of the goods to the receiver is required according to the user logistics order, that is, generates a transportation order, issues the transportation order to the unmanned aerial vehicle, and records a time stamp T2 of the assigned time of the unmanned aerial vehicle.
Step 1402, the server encrypts the timestamp T2 with the public key of the account of the recipient user by using an asymmetric encryption manner, and then sends the encrypted timestamp T2 to the assigned unmanned aerial vehicle.
In this step, the server may encrypt the timestamp T2 with the public key of the unmanned aerial vehicle itself and send the encrypted timestamp T2 to the assigned unmanned aerial vehicle.
In step 1403, the assigned unmanned aerial vehicle loads goods, delivers goods according to the place information in the logistics order, feeds back the position information of the unmanned aerial vehicle to the server, and meanwhile, when the user initiates the unmanned aerial vehicle position query through the logged-in terminal, the server sends the position and time information of the unmanned aerial vehicle to the terminal logged in by the user at the time, wherein the user can be a shipper or a receiver.
In this embodiment, the time for loading the cargo by the unmanned aerial vehicle may be after or before the time for issuing the encrypted timestamp by the server.
And step 1404, after the unmanned aerial vehicle arrives at the delivery site, transmitting a timestamp T2 encrypted by the public key of the user account in the unmanned aerial vehicle to a terminal logged in by the receiver user.
Specifically, in this step, after the unmanned aerial vehicle arrives at the pickup location, the unmanned aerial vehicle starts photographing or video recording, the user acquires order number information from the unmanned aerial vehicle through the terminal, verifies whether the arriving unmanned aerial vehicle is the unmanned aerial vehicle assigned for the user's corresponding order, and thereafter, performs the step of transmitting the encrypted time stamp.
In step 1405, the unmanned aerial vehicle receives the decrypted T2 information fed back by the terminal, and authenticates the terminal according to the decrypted T2 information.
In this step, if in step 1402, the server issues T2 encrypted with the public key of the unmanned aerial vehicle to the unmanned aerial vehicle, then the unmanned aerial vehicle decrypts the encrypted information, and then compares the decrypted T2 with T2 from the terminal, if it is consistent, the authentication passes the terminal, and if it is inconsistent, the authentication does not pass.
If in step 1402, the server does not issue T2 encrypted by the public key of the unmanned aerial vehicle to the unmanned aerial vehicle, the unmanned aerial vehicle sends the T2 information and transportation order related information, such as an order number, to the server after receiving the decrypted T2 information fed back by the terminal, the server verifies whether the decrypted T2 is correct, and feeds back the verification result to the unmanned aerial vehicle, and the unmanned aerial vehicle determines whether to pass the authentication of the terminal according to the verification result.
And comparing the decrypted T2 information with T2 in the terminal or T2 obtained by decrypting the terminal with a private key of the terminal, and determining whether the T2 fed back by the terminal is correct or not so as to carry out identity authentication on the terminal.
Step 1406, after the unmanned aerial vehicle passes the authentication of the terminal, the unmanned aerial vehicle automatically unlocks, the receiver user takes out the article, and after confirming that the goods are taken out, the goods warehouse is locked, and the unmanned aerial vehicle delivery is completed; if the identity verification is not passed, ending the goods taking process.
In this step, after the goods are taken, the unmanned aerial vehicle can fly to the logistics collection and distribution point, the next delivery point or the goods taking point.
In an alternative to the embodiment shown in fig. 14, the one-way verification process performed by the drone on the consignee may also be: the server simultaneously sends the T2 encrypted by the public key of the unmanned aerial vehicle to the unmanned aerial vehicle and the terminal logged in by the user, after the unmanned aerial vehicle arrives at a delivery place, the unmanned aerial vehicle acquires the T2 encrypted by the public key of the unmanned aerial vehicle from the terminal logged in by the user, the T2 and the encrypted T2 sent to the server by the server are simultaneously decrypted by the private key of the server, the decrypted encrypted T2 and the decrypted T2 are compared, and if the decrypted T2 and the encrypted T2 are consistent, the terminal authentication is passed, and the inconsistent authentication is passed.
The structure of an exemplary embodiment of the inventive drone is shown in fig. 15. In this embodiment, when unmanned aerial vehicle is used for getting goods, through the terminal mutual authentication that unmanned aerial vehicle and user logged in, improve unmanned aerial vehicle and get the security of goods.
In this embodiment, unmanned aerial vehicle includes: a communication unit 151, a processing unit 152, and a storage unit 153, wherein the communication unit 151 and the storage unit 153 each communicate with the processing unit 152 through a bus. Of course, as technology advances, if other computer internal communication methods are presented, the communication unit 151, the storage unit 153, and the like may also communicate with the processing unit 152 through other computer internal communication methods.
The communication unit 151 is configured to receive the transportation task and the transportation location from the server, the order information, and the first encrypted information for security authentication, and send the first encrypted information to the processing unit 152; and, according to the instruction of the processing unit 152, sending the first encrypted information to the terminal corresponding to the order information, receiving the second encrypted information from the terminal, and sending the second encrypted information to the processing unit 152; and, receiving a notification that the terminal verifies that the drone passes, and sending it to the processing unit 152;
the processing unit 152 is configured to receive the transportation task and the transportation location, order information, and first encryption information, and store the first encryption information in the storage unit 153; after confirming that the unmanned aerial vehicle arrives at the transportation site, reading the first encryption information in the storage unit 153, and sending the first encryption information to the terminal by the instruction communication unit 151; determining that the terminal is legal according to the received second encryption information, and controlling the unmanned aerial vehicle to execute the transportation task after receiving a notification that the terminal verifies that the unmanned aerial vehicle passes;
the storage unit 153 is used for storing or providing information according to instructions of the processing unit 152.
The second encrypted information may be stored in the storage unit 153, and read from the storage unit 153 when the processing unit 152 is used.
The second encryption information is information encrypted by a public key of the unmanned aerial vehicle;
the communication unit 151 is configured to determine that the terminal is legal according to the second encryption information includes:
the processing unit 152 is configured to read the private key of the unmanned aerial vehicle from the storage unit 153, decrypt the second encrypted information, and determine that the decrypted information matches with the corresponding information stored in the storage unit 153.
The communication unit 151 may be further configured to receive second encrypted information from the server;
the communication unit 151 is further configured to store the second encrypted information from the server to the storage unit 153;
the communication unit 151 is configured to determine that the terminal is legal according to the second encryption information includes:
the processing unit 152 is configured to read the private key of the unmanned aerial vehicle and the second encrypted information from the server from the storage unit 153, decrypt the second encrypted information from the terminal and the second encrypted information from the server, and determine that the decrypted information matches.
Preferably, the encryption information is an encrypted time stamp. The time stamp in the first encryption information is generated according to the moment when the server transmits the transmission task to the unmanned aerial vehicle, and the time stamp in the second encryption information is generated according to the moment when the server generates the order; or the time stamp in the first encryption information is generated according to the moment when the server generates the order, and the time stamp in the second encryption information is generated according to the moment when the server transmits the transmission task to the unmanned aerial vehicle.
Preferably, the first encryption information is information encrypted with a public key of the end user account; the communication unit 151 for receiving a notification that the terminal verifies that the drone passes may include:
the communication unit 151 is configured to receive a verification passing message sent by the terminal after the terminal decrypts and verifies the first encrypted information using the user account private key in the terminal.
Preferably, as shown in fig. 16, in the present embodiment, the communication unit 151 includes a first communication unit 1511 and a second communication unit 1512. The first communication unit 1511 is configured to perform wireless communication with a server or other devices through a wireless communication network by using the processing unit 152 of the unmanned aerial vehicle. Preferably, the first communication unit 1511 may be a 5G, 4G, 3G, GPRS or WiFi communication unit, or may integrate any two or more of the above communication functions.
The second communication unit 1512 is for the processing unit 152 of the unmanned aerial vehicle to wirelessly communicate with the terminal of the user. Preferably, the second communication unit 1512 may be a bluetooth communication unit, a radio frequency identification unit, or the like, which may directly communicate with the terminal wirelessly, without a communication unit through a communication network.
In another preferred embodiment of the unmanned aerial vehicle, when the unmanned aerial vehicle is used for taking goods, the identity authentication of the other party is carried out through the server by the unmanned aerial vehicle and the terminal logged in by the user, so that the safety of taking goods by the unmanned aerial vehicle is improved.
In this embodiment, the difference from the previous embodiment is mainly that the legal verification portion of the processing unit for the terminal and how the unmanned aerial vehicle receives the information that the terminal passes through for verification, and the rest of the processing unit is the same as the previous unmanned aerial vehicle embodiment, and the same portions are not traced.
In this embodiment, the processing unit may determine that the terminal is legal based on the second encryption information, or may determine that the terminal is legal based on the first encryption information.
The processing unit is used for determining that the terminal is legal according to the second encryption information, and the method comprises the following steps: the processing unit is used for reading the private key of the unmanned aerial vehicle from the storage unit, decrypting the second encrypted information, indicating the communication unit to send the decrypted information to the server, and receiving an authentication success message fed back by the server through the communication unit.
The processing unit is configured to determine, according to the first encryption information, that the terminal is legal includes: the processing unit is used for receiving the decrypted first encrypted information fed back by the terminal through the communication unit, sending the decrypted information to the server through the communication unit, and determining that the terminal is legal after the decrypted information is successfully verified through the server feedback confirmation received through the communication unit.
Fig. 17 shows a schematic structural view of still another embodiment of the unmanned aerial vehicle of the present invention, the unmanned aerial vehicle including: a memory 171, a transceiver 173, and one or more processors 172; and one or more software modules stored in the memory 171 and configured to be executed by the one or more processors, the one or more software modules including instructions for performing the various steps performed by the drone in the pick and/or delivery embodiments described above.
As is well known to those skilled in the art, the embodiment shown in fig. 15 and the embodiment shown in fig. 17 may be identical, and are described herein only from a different technical perspective.
Embodiments of the present invention also provide a computer program product for use in connection with a drone, the computer program product comprising a computer-readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising instructions for performing the steps performed by the drone in the pick-and/or delivery embodiments described above.
Fig. 18 shows a schematic structural diagram of an embodiment of the terminal of the present invention, which includes: a display 181, a memory 182, a transceiver 183, one or more processors 184; and one or more software modules stored in the memory and configured to be executed by the one or more processors, the one or more software modules including instructions for performing the steps performed by the terminal in the unmanned aerial vehicle pick-and/or delivery embodiments described above. In this embodiment, one or more of the software modules may be client application software.
Fig. 19 shows a schematic structural diagram of an embodiment of a server of the present invention, the server comprising: the server includes: memory 191, transceiver 192, one or more processors 193; and one or more modules stored in the memory 191 and configured to be executed by the one or more processors 193, the one or more modules including instructions for performing the steps performed by the server in the unmanned aerial vehicle pick-and/or delivery embodiments described above.
Embodiments of the present invention also provide a computer program product for use in conjunction with an electronic device, the computer program product comprising a computer-readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising instructions for performing the steps performed by the terminal in the unmanned aerial vehicle pick-up and/or delivery embodiments described above. The computer program product may be client application software.
Embodiments of the present invention also provide a computer program product for use in conjunction with a server, the computer program product comprising a computer-readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising instructions for performing the steps performed by the server in the unmanned aerial vehicle pick-up and/or delivery embodiments described above.
According to the invention, through the embodiments, after the identity authentication of the other party is passed by both the unmanned aerial vehicle and the terminal, the unmanned aerial vehicle continues to execute the transportation task, or the user can determine whether to ship or pick up goods according to the information which is presented on the terminal and passes through the authentication of both parties, so that the transportation safety of the unmanned aerial vehicle is improved. The invention largely avoids the problems of false extraction, cheating by other unmanned aerial vehicles, false goods taking place and the like when the unmanned aerial vehicles take goods, and also avoids the problems of false collar or place error and the like when the unmanned aerial vehicles send goods, greatly improves the goods taking/sending safety, and greatly helps the establishment of an automatic logistics system of the unmanned aerial vehicle in the future.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of the invention.

Claims (24)

1. A method of improving transportation safety of an unmanned aerial vehicle, the method comprising:
the unmanned aerial vehicle acquires transportation order information and first encryption information for safety authentication, wherein the transportation order information comprises transportation place information;
the unmanned aerial vehicle further receives third encryption information for safety authentication, after the unmanned aerial vehicle arrives at a transportation location according to the transportation location information, the unmanned aerial vehicle sends the first encryption information to a terminal which is logged in by a user account corresponding to the transportation order information, receives feedback information which is sent by the terminal and aims at the first encryption information, receives second encryption information which is sent by the terminal, the unmanned aerial vehicle decrypts and compares the third encryption information and the second encryption information respectively, whether the safety authentication is successful is determined according to a comparison result and the feedback information, and after the success is determined, the warehouse corresponding to the transportation order information is controlled to be opened;
The first encryption information sent to the terminal comprises: information encrypted by a public key of the user account corresponding to the transportation order;
the second encryption information includes: information encrypted with the public key of the drone;
the first encryption information or the third encryption information decrypted by the unmanned aerial vehicle comprises: information encrypted with the public key of the drone;
the encrypted information in the first encryption information, the second encryption information or the third encryption information further includes: the time stamp of the time when the transport order is generated, or the time stamp of the time when the user logistics order corresponding to the transport order is confirmed by the server, is recorded as the first time stamp of the time when the order is confirmed to be successful;
the server assigns the unmanned aerial vehicle for taking goods to generate a goods taking order according to the user logistics order, and records a second timestamp of the assigned moment of the unmanned aerial vehicle;
the server adopts an asymmetric encryption mode, encrypts the first timestamp by using the public key of the assigned unmanned aerial vehicle, encrypts the second timestamp by using the public key of the user account, and then respectively sends the encrypted first timestamp and the encrypted second timestamp to the assigned unmanned aerial vehicle and the terminal logged in by the user account;
The assigned unmanned aerial vehicle fetches goods according to the place information and time information in the logistics order to a goods fetching place, and feeds back the position information of the unmanned aerial vehicle to the server, and meanwhile, when a user initiates unmanned aerial vehicle position inquiry through a logged-in terminal, the server sends the position and time information of the unmanned aerial vehicle to the terminal logged in by the user at the time;
after the unmanned aerial vehicle arrives at the goods taking place, the encrypted second timestamp in the unmanned aerial vehicle is transmitted to the terminal logged in by the user account, and meanwhile, the user transmits the encrypted first timestamp in the unmanned aerial vehicle to the unmanned aerial vehicle through the logged-in terminal, and identity authentication is carried out according to the received encrypted timestamp respectively;
after the identity verification of both sides is passed, the unmanned aerial vehicle automatically unlocks and opens the goods warehouse corresponding to the transportation order information, the user puts the goods into the appointed space position, and after the user confirms that the goods are put into the space position, the goods warehouse is locked, and the goods taking is completed.
2. The method of claim 1, wherein the feedback information for the first encryption information comprises: verifying the first encrypted information as to whether the first encrypted information passes or not;
or, the feedback information for the first encryption information includes: information decrypted by the first encryption information; the step of receiving the feedback information further comprises: transmitting the decrypted information of the first encrypted information to a server, and receiving information which is fed back by the server and is used for verifying whether the decrypted information passes or not; the determining whether the security authentication is successful according to the feedback information comprises: and determining whether the security authentication is successful according to the information fed back by the server for verifying whether the security authentication is passed.
3. The method of any one of claims 1 to 2, wherein the shipping order is a pick-up order or a delivery order.
4. A method of improving transportation safety of an unmanned aerial vehicle, the method comprising:
the terminal acquires transportation order information and fourth encryption information for security authentication from the server according to account information of the user;
the terminal further obtains sixth encryption information for safety authentication from a server, when the terminal communicates with the unmanned aerial vehicle corresponding to the transportation order information, the terminal sends the fourth encryption information to the unmanned aerial vehicle, receives feedback information aiming at the fourth encryption information sent by the unmanned aerial vehicle, receives fifth encryption information sent by the unmanned aerial vehicle, decrypts and compares the fifth encryption information and the sixth encryption information respectively, determines whether safety authentication is successful or not according to a comparison result and the feedback information, and displays information whether the safety authentication is successful or not;
the fourth encryption information sent to the unmanned aerial vehicle comprises: information encrypted with the public key of the drone;
the fifth encryption information includes: information encrypted with a public key of the user account;
The fourth encryption information and the sixth encryption information decrypted by the terminal include: information encrypted with a public key of the user account;
the information encrypted in the fourth encryption information, the fifth encryption information or the sixth encryption information includes: the time stamp of the time when the transport order is generated, or the time stamp of the time when the user logistics order corresponding to the transport order is confirmed by the server, is recorded as the first time stamp of the time when the order is confirmed to be successful;
the server assigns the unmanned aerial vehicle for taking goods to generate a goods taking order according to the user logistics order, and records a second timestamp of the assigned moment of the unmanned aerial vehicle;
the server adopts an asymmetric encryption mode, encrypts the first timestamp by using the public key of the assigned unmanned aerial vehicle, encrypts the second timestamp by using the public key of the user account, and then respectively sends the encrypted first timestamp and the encrypted second timestamp to the assigned unmanned aerial vehicle and the terminal logged in by the user account;
the assigned unmanned aerial vehicle fetches goods according to the place information and time information in the logistics order to a goods fetching place, and feeds back the position information of the unmanned aerial vehicle to the server, and meanwhile, when a user initiates unmanned aerial vehicle position inquiry through a logged-in terminal, the server sends the position and time information of the unmanned aerial vehicle to the terminal logged in by the user at the time;
After the unmanned aerial vehicle arrives at the goods taking place, the encrypted second timestamp in the unmanned aerial vehicle is transmitted to the terminal logged in by the user account, and meanwhile, the user transmits the encrypted first timestamp in the unmanned aerial vehicle to the unmanned aerial vehicle through the logged-in terminal, and identity authentication is carried out according to the received encrypted timestamp respectively;
after the identity verification of both sides is passed, the unmanned aerial vehicle automatically unlocks and opens the goods warehouse corresponding to the transportation order information, the user puts the goods into the appointed space position, and after the user confirms that the goods are put into the space position, the goods warehouse is locked, and the goods taking is completed.
5. The method of claim 4, wherein the feedback information for the fourth encryption information comprises: verifying the fourth encrypted information as to whether the fourth encrypted information passes or not;
or, the feedback information for the fourth encryption information includes: information decrypted by the fourth encryption information; the step of receiving the feedback information further comprises: transmitting the information decrypted by the fourth encryption information to a server, and receiving information which is fed back by the server and is used for verifying whether the information decrypted by the server passes or not; the determining whether the security authentication is successful according to the feedback information comprises: and determining whether the security authentication is successful according to the information fed back by the server for verifying whether the security authentication is passed.
6. The method of any one of claims 4 to 5, wherein the shipping order is a pick-up order or a delivery order.
7. An unmanned aerial vehicle, characterized in that the unmanned aerial vehicle comprises: the device comprises a communication unit, a processing unit and a storage unit, wherein the communication unit and the storage unit are communicated with the processing unit through buses;
the communication unit is used for receiving information from the external equipment through the processing unit or sending information to the external equipment;
the storage unit is used for storing information according to the instruction of the processing unit;
the processing unit is used for receiving the transportation order information and the first encryption information for safety authentication through the communication unit, wherein the transportation order information comprises transportation place information and is stored in the storage unit; the method comprises the steps of,
the communication unit is further used for receiving third encryption information for safety authentication through the communication unit, reading the first encryption information from the storage unit after confirming that the unmanned aerial vehicle arrives at a transportation place, sending the first encryption information to a terminal corresponding to the transportation order information and logged in by a user account through the communication unit, receiving feedback information aiming at the first encryption information sent by the terminal through the communication unit, receiving second encryption information sent by the terminal through the communication unit, decrypting and comparing the third encryption information and the second encryption information respectively, determining whether the safety authentication is successful according to a comparison result and the feedback information, and sending an instruction for controlling warehouse opening corresponding to the transportation order information after the confirmation is successful;
The first encryption information sent to the terminal comprises: information encrypted by a public key of the user account corresponding to the transportation order;
the second encryption information includes: information encrypted with the public key of the drone;
the first encryption information or the third encryption information decrypted by the processing unit includes: information encrypted with the public key of the drone;
the encrypted information in the first encryption information, the second encryption information or the third encryption information further includes: the time stamp of the time when the transport order is generated, or the time stamp of the time when the user logistics order corresponding to the transport order is confirmed by the server, is recorded as the first time stamp of the time when the order is confirmed to be successful;
the server assigns the unmanned aerial vehicle for taking goods to generate a goods taking order according to the user logistics order, and records a second timestamp of the assigned moment of the unmanned aerial vehicle;
the server adopts an asymmetric encryption mode, encrypts the first timestamp by using the public key of the assigned unmanned aerial vehicle, encrypts the second timestamp by using the public key of the user account, and then respectively sends the encrypted first timestamp and the encrypted second timestamp to the assigned unmanned aerial vehicle and the terminal logged in by the user account;
The assigned unmanned aerial vehicle fetches goods according to the place information and time information in the logistics order to a goods fetching place, and feeds back the position information of the unmanned aerial vehicle to the server, and meanwhile, when a user initiates unmanned aerial vehicle position inquiry through a logged-in terminal, the server sends the position and time information of the unmanned aerial vehicle to the terminal logged in by the user at the time;
after the unmanned aerial vehicle arrives at the goods taking place, the encrypted second timestamp in the unmanned aerial vehicle is transmitted to the terminal logged in by the user account, and meanwhile, the user transmits the encrypted first timestamp in the unmanned aerial vehicle to the unmanned aerial vehicle through the logged-in terminal, and identity authentication is carried out according to the received encrypted timestamp respectively;
after the identity verification of both sides is passed, the unmanned aerial vehicle automatically unlocks and opens the goods warehouse corresponding to the transportation order information, the user puts the goods into the appointed space position, and after the user confirms that the goods are put into the space position, the goods warehouse is locked, and the goods taking is completed.
8. The drone of claim 7, wherein the feedback information for the first encryption information includes: verifying the first encrypted information as to whether the first encrypted information passes or not;
or, the feedback information for the first encryption information includes: information decrypted by the first encryption information; the processing unit is further configured to, via the communication unit: the information decrypted by the first encryption information is sent to the server through the communication unit, and the information which is fed back by the server and is used for verifying whether the information passes or not is received through the communication unit; the communication unit is configured to determine whether the security authentication is successful according to the feedback information, including: the communication unit is used for determining whether the security authentication is successful according to the information fed back by the server and used for determining whether the authentication is passed.
9. The drone of any one of claims 7 to 8, wherein the shipping order is a pick-up order or a delivery order.
10. A terminal, the terminal comprising: the device comprises a communication unit, a processing unit, a storage unit and a display unit, wherein the communication unit, the storage unit and the display unit are communicated with the processing unit through buses;
the communication unit is used for receiving information from the external equipment through the processing unit or sending information to the external equipment;
the storage unit is used for storing information according to the instruction of the processing unit;
the display unit is used for displaying information according to the instruction of the processing unit;
the processing unit is used for acquiring the transportation order information and the fourth encryption information for safety authentication from the server through the communication unit and storing the transportation order information and the fourth encryption information into the storage unit; the method comprises the steps of,
the processing unit is further configured to obtain sixth encryption information for security authentication from a server through the communication unit, and when the communication unit communicates with the unmanned aerial vehicle corresponding to the transportation order information, read fourth encryption information stored in the storage unit, send the fourth encryption information to the unmanned aerial vehicle through the communication unit, receive feedback information sent by the unmanned aerial vehicle through the communication unit, receive fifth encryption information sent by the unmanned aerial vehicle through the communication unit, decrypt and compare the fifth encryption information and the sixth encryption information, determine whether the security authentication is successful according to a comparison result and the feedback information, and instruct the display unit to display information whether the security authentication is successful;
The fourth encryption information sent to the unmanned aerial vehicle comprises: information encrypted with the public key of the drone;
the fifth encryption information includes: information encrypted with a public key of the user account;
the fourth encryption information or the sixth encryption information decrypted by the terminal includes: information encrypted with a public key of the user account;
the information encrypted in the fourth encryption information, the fifth encryption information or the sixth encryption information includes: the method comprises the steps that a time stamp of a transport order generation time or a time stamp of a user logistics order time corresponding to the transport order is confirmed by a server and is recorded as a first time stamp of a confirmation order success time, the server assigns unmanned aerial vehicles for taking goods to generate a goods taking order according to the user logistics order, and records a second time stamp of the assigned time of the unmanned aerial vehicles;
the assigned unmanned aerial vehicle and the terminal logged in by the user account receive the following information sent by the server: encrypting the first timestamp by using an assigned public key of the unmanned aerial vehicle, encrypting the second timestamp by using a public key of the user account in an asymmetric encryption mode, and then respectively encrypting the encrypted first timestamp and the encrypted second timestamp;
The assigned unmanned aerial vehicle fetches goods according to the place information and time information in the logistics order to a goods fetching place, and feeds back the position information of the unmanned aerial vehicle to the server, and meanwhile, when a user initiates unmanned aerial vehicle position inquiry through a logged-in terminal, the server sends the position and time information of the unmanned aerial vehicle to the terminal logged in by the user at the time;
after the unmanned aerial vehicle arrives at the goods taking place, the encrypted second timestamp in the unmanned aerial vehicle is transmitted to the terminal logged in by the user account, and meanwhile, the user transmits the encrypted first timestamp in the unmanned aerial vehicle to the unmanned aerial vehicle through the logged-in terminal, and identity authentication is carried out according to the received encrypted timestamp respectively;
after the identity verification of both sides is passed, the unmanned aerial vehicle automatically unlocks and opens the goods warehouse corresponding to the transportation order information, the user puts the goods into the appointed space position, and after the user confirms that the goods are put into the space position, the goods warehouse is locked, and the goods taking is completed.
11. The terminal of claim 10, wherein the feedback information for the fourth encryption information comprises: verifying the fourth encrypted information as to whether the fourth encrypted information passes or not;
or, the feedback information for the fourth encryption information includes: information decrypted by the fourth encryption information; the communication unit is further adapted to: the information decrypted by the fourth encryption information is sent to a server through the communication unit, and the information which is fed back by the server and is used for verifying whether the information passes or not is received through the communication unit; the communication unit is configured to determine whether the security authentication is successful according to the feedback information, including: the communication unit is used for determining whether the security authentication is successful according to the information fed back by the server and used for determining whether the authentication is passed.
12. A terminal according to any of claims 10 to 11, wherein the shipping order is a pick-up order or a delivery order.
13. An unmanned aerial vehicle, characterized in that the unmanned aerial vehicle comprises: a memory, and one or more processors; and one or more modules stored in the memory and configured to be executed by the one or more processors, the one or more modules comprising instructions for performing the steps of the method of any of claims 1-3.
14. A computer program product for use in connection with a drone, the computer program product comprising a computer-readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising instructions for performing the steps of the method of any one of claims 1-3.
15. A terminal, the terminal comprising: a display, a memory, a transceiver, one or more processors; and one or more modules stored in the memory and configured to be executed by the one or more processors, the one or more modules comprising instructions for performing the steps of the method of any of claims 4-6.
16. A computer program product for use in connection with an electronic device, the computer program product comprising a computer-readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising instructions for performing the steps of the method of any of claims 4-6.
17. A method for improving transportation safety of an unmanned aerial vehicle, the method comprising:
generating transportation order information for the unmanned aerial vehicle, wherein the transportation order information comprises transportation site information;
generating first encryption information for security authentication, or generating second encryption information and third encryption information for security encryption;
the generated transportation order is sent to the unmanned aerial vehicle, and the generated encryption information is sent to the unmanned aerial vehicle, or is sent to a terminal of user account login corresponding to the transportation order;
the first encryption information sent to the unmanned aerial vehicle is: information encrypted with a public key of the user account;
the first encryption information sent to the terminal logged in by the user account comprises: information encrypted with the public key of the drone;
the second encryption information and the third encryption information respectively comprise information encrypted by a public key of the unmanned aerial vehicle and information encrypted by a public key of the user account;
The encrypted information in the first encryption information, the second encryption information or the third encryption information further includes: the time stamp of the time when the transport order is generated, or the time stamp of the time when the user logistics order corresponding to the transport order is confirmed by the server, is recorded as the first time stamp of the time when the order is confirmed to be successful;
the server assigns the unmanned aerial vehicle for taking goods to generate a goods taking order according to the user logistics order, and records a second timestamp of the assigned moment of the unmanned aerial vehicle;
the server adopts an asymmetric encryption mode, encrypts the first timestamp by using the public key of the assigned unmanned aerial vehicle, encrypts the second timestamp by using the public key of the user account, and then respectively sends the encrypted first timestamp and the encrypted second timestamp to the assigned unmanned aerial vehicle and the terminal logged in by the user account;
the assigned unmanned aerial vehicle fetches goods according to the place information and time information in the logistics order to a goods fetching place, and feeds back the position information of the unmanned aerial vehicle to the server, and meanwhile, when a user initiates unmanned aerial vehicle position inquiry through a logged-in terminal, the server sends the position and time information of the unmanned aerial vehicle to the terminal logged in by the user at the time;
After the unmanned aerial vehicle arrives at the goods taking place, the encrypted second timestamp in the unmanned aerial vehicle is transmitted to the terminal logged in by the user account, and meanwhile, the user transmits the encrypted first timestamp in the unmanned aerial vehicle to the unmanned aerial vehicle through the logged-in terminal, and identity authentication is carried out according to the received encrypted timestamp respectively;
after the identity verification of both sides is passed, the unmanned aerial vehicle automatically unlocks and opens the goods warehouse corresponding to the transportation order information, the user puts the goods into the appointed space position, and after the user confirms that the goods are put into the space position, the goods warehouse is locked, and the goods taking is completed.
18. The method of claim 17, further comprising, after the step of transmitting the encrypted information:
and receiving decryption information sent by the unmanned aerial vehicle or the terminal, carrying out security authentication on the decryption information, and feeding back a security authentication result to the unmanned aerial vehicle or the terminal.
19. The method of any one of claims 17 to 18, wherein the shipping order is a pick-up order or a delivery order.
20. A server, the server comprising: the device comprises a communication unit, a processing unit and a storage unit, wherein the communication unit and the storage unit are communicated with the processing unit through buses;
The communication unit is used for receiving information from the external equipment through the processing unit or sending information to the external equipment;
the storage unit is used for storing information according to the instruction of the processing unit;
the processing unit is used for generating a transportation order comprising transportation site information for the unmanned aerial vehicle, generating first encryption information for security authentication or generating second and third encryption information for security authentication, sending the generated transportation order to the unmanned aerial vehicle through the communication unit, and sending the generated encryption information to the unmanned aerial vehicle or a terminal for logging in a user account corresponding to the transportation order through the communication unit;
the first encryption information sent to the unmanned aerial vehicle is: information encrypted with a public key of the user account;
the first encryption information sent to the terminal logged in by the user account comprises: information encrypted with the public key of the drone;
the second encryption information and the third encryption information respectively comprise information encrypted by a public key of the unmanned aerial vehicle and information encrypted by a public key of the user account;
the encrypted information in the first encryption information, the second encryption information or the third encryption information further includes: the time stamp of the time when the transport order is generated, or the time stamp of the time when the user logistics order corresponding to the transport order is confirmed by the server, is recorded as the first time stamp of the time when the order is confirmed to be successful;
The server assigns the unmanned aerial vehicle for taking goods to generate a goods taking order according to the user logistics order, and records a second timestamp of the assigned moment of the unmanned aerial vehicle;
the server adopts an asymmetric encryption mode, encrypts the first timestamp by using the public key of the assigned unmanned aerial vehicle, encrypts the second timestamp by using the public key of the user account, and then respectively sends the encrypted first timestamp and the encrypted second timestamp to the assigned unmanned aerial vehicle and the terminal logged in by the user account;
the assigned unmanned aerial vehicle fetches goods according to the place information and time information in the logistics order to a goods fetching place, and feeds back the position information of the unmanned aerial vehicle to the server, and meanwhile, when a user initiates unmanned aerial vehicle position inquiry through a logged-in terminal, the server sends the position and time information of the unmanned aerial vehicle to the terminal logged in by the user at the time;
after the unmanned aerial vehicle arrives at the goods taking place, the encrypted second timestamp in the unmanned aerial vehicle is transmitted to the terminal logged in by the user account, and meanwhile, the user transmits the encrypted first timestamp in the unmanned aerial vehicle to the unmanned aerial vehicle through the logged-in terminal, and identity authentication is carried out according to the received encrypted timestamp respectively;
After the identity verification of both sides is passed, the unmanned aerial vehicle automatically unlocks and opens the goods warehouse corresponding to the transportation order information, the user puts the goods into the appointed space position, and after the user confirms that the goods are put into the space position, the goods warehouse is locked, and the goods taking is completed.
21. The server according to claim 20, wherein the processing unit is further configured to receive, via the communication unit, the decryption information sent by the drone or the terminal, perform security authentication on the decryption information, and then feed back, via the communication unit, the security authentication result to the drone or the terminal.
22. The server according to any one of claims 20 to 21, wherein the shipping order is a pick-up order or a delivery order.
23. A server, the server comprising: a memory, a transceiver, one or more processors; and one or more modules stored in the memory and configured to be executed by the one or more processors, the one or more modules comprising instructions for performing the steps of the method of any of claims 17-19.
24. A computer program product for use in connection with a server, the computer program product comprising a computer readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising instructions for performing the steps of the method of any of claims 17-19.
CN201680002950.5A 2016-11-22 2016-11-22 Method for improving transportation safety of unmanned aerial vehicle, terminal, server and computer program product Active CN107004177B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/106749 WO2018094554A1 (en) 2016-11-22 2016-11-22 Method for improving security of unmanned aerial vehicle transportation, and unmanned aerial vehicle, terminal, server and computer program product

Publications (2)

Publication Number Publication Date
CN107004177A CN107004177A (en) 2017-08-01
CN107004177B true CN107004177B (en) 2024-03-19

Family

ID=59431135

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201680002950.5A Active CN107004177B (en) 2016-11-22 2016-11-22 Method for improving transportation safety of unmanned aerial vehicle, terminal, server and computer program product

Country Status (2)

Country Link
CN (1) CN107004177B (en)
WO (1) WO2018094554A1 (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11064363B2 (en) 2016-10-11 2021-07-13 Whitefox Defense Technologies, Inc. Systems and methods for cyber-physical vehicle management, detection and control
US11134380B2 (en) 2016-10-11 2021-09-28 Whitefox Defense Technologies, Inc. Systems and methods for cyber-physical vehicle management, detection and control
CN107516181A (en) * 2017-08-30 2017-12-26 亿航智能设备(广州)有限公司 Order allocator, device and system
US11186368B2 (en) 2017-12-21 2021-11-30 Wing Aviation Llc Methods and systems for door-enabled loading and release of payloads in an unmanned aerial vehicle (UAV)
CN108132676A (en) * 2017-12-24 2018-06-08 广西南宁英凡达科技有限公司 Aerial system for conveying goods
CN107945582B (en) * 2017-12-24 2020-09-15 广西南宁英凡达科技有限公司 Cargo carrying and transmission system based on low-altitude flight unmanned aerial vehicle
WO2019140695A1 (en) * 2018-01-22 2019-07-25 深圳市大疆创新科技有限公司 Method and device for controlling flight of aircraft
CN108334106A (en) * 2018-01-25 2018-07-27 芜湖应天光电科技有限责任公司 A kind of UAV system and control method launched for express delivery
CN110517374A (en) * 2018-05-22 2019-11-29 杭州海康威视数字技术股份有限公司 A kind of goods and materials turnover management system and method
WO2020051226A1 (en) 2018-09-05 2020-03-12 Whitefox Defense Technologies, Inc. Integrated secure device manager systems and methods for cyber-physical vehicles
CN109345728A (en) * 2018-09-14 2019-02-15 深圳市丰巢科技有限公司 Method of reseptance, device, storage medium and the express delivery box of unmanned plane delivery
SE544037C2 (en) * 2018-12-07 2021-11-16 Scania Cv Ab Methods, control devices and vehicles for authentication of transport missions
US11139990B2 (en) * 2018-12-29 2021-10-05 Intel Corporation Automatically verifying vehicle identity and validating vehicle presence
US12091170B2 (en) * 2020-04-17 2024-09-17 Dish Network L.L.C. Autonomous servicing of network devices
CN115285715A (en) * 2022-08-19 2022-11-04 江铃汽车股份有限公司 Intelligent cargo loading and unloading method and system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102685749A (en) * 2012-05-30 2012-09-19 杭州师范大学 Wireless safety authentication method orienting to mobile terminal
CN104657842A (en) * 2015-03-03 2015-05-27 付飞泉 Intelligent logistics signing method and system
TW201545111A (en) * 2014-05-29 2015-12-01 xiao-zhong Li Unmanned aerial vehicle for transporting commodity and method thereof
CN105139178A (en) * 2015-09-15 2015-12-09 余江 Express delivery method and system based on unmanned aerial vehicle
KR20150140556A (en) * 2015-02-23 2015-12-16 전대연 Smart unmanned-transportation-object-based delivery completion system
CN105160505A (en) * 2015-07-24 2015-12-16 刘擂 Unmanned aerial vehicle logistics transport system
CN105518728A (en) * 2014-11-28 2016-04-20 深圳市大疆创新科技有限公司 Unmanned aerial vehicle, unmanned aerial vehicle delivery method and system
CN205256665U (en) * 2015-12-21 2016-05-25 谭圆圆 Point -to -point system that reachs based on unmanned vehicles

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160012393A1 (en) * 2014-07-14 2016-01-14 Nutex Communications Corp. Parcel delivery method using an unmanned aerial vehicle
US9359074B2 (en) * 2014-09-08 2016-06-07 Qualcomm Incorporated Methods, systems and devices for delivery drone security
US10196155B2 (en) * 2014-09-09 2019-02-05 Joseph Martin Unmanned aerial delivery system
US9731821B2 (en) * 2014-09-10 2017-08-15 International Business Machines Corporation Package transport by unmanned aerial vehicles
US11480958B2 (en) * 2015-02-19 2022-10-25 Amazon Technologies, Inc. Collective unmanned aerial vehicle configurations
US9809305B2 (en) * 2015-03-02 2017-11-07 Amazon Technologies, Inc. Landing of unmanned aerial vehicles on transportation vehicles for transport
CN204776032U (en) * 2015-06-03 2015-11-18 朱威 Many rotor unmanned aerial vehicle that transport safely

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102685749A (en) * 2012-05-30 2012-09-19 杭州师范大学 Wireless safety authentication method orienting to mobile terminal
TW201545111A (en) * 2014-05-29 2015-12-01 xiao-zhong Li Unmanned aerial vehicle for transporting commodity and method thereof
CN105518728A (en) * 2014-11-28 2016-04-20 深圳市大疆创新科技有限公司 Unmanned aerial vehicle, unmanned aerial vehicle delivery method and system
KR20150140556A (en) * 2015-02-23 2015-12-16 전대연 Smart unmanned-transportation-object-based delivery completion system
CN104657842A (en) * 2015-03-03 2015-05-27 付飞泉 Intelligent logistics signing method and system
CN105160505A (en) * 2015-07-24 2015-12-16 刘擂 Unmanned aerial vehicle logistics transport system
CN105139178A (en) * 2015-09-15 2015-12-09 余江 Express delivery method and system based on unmanned aerial vehicle
CN205256665U (en) * 2015-12-21 2016-05-25 谭圆圆 Point -to -point system that reachs based on unmanned vehicles

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
Observing river stages using unmanned aerial vehicles;Niedzielski, Tomasz等;《HYDROLOGY AND EARTH SYSTEM SCIENCES》;全文 *
基于无人机的投递系统的设计;单君正;《电脑知识与技术》(第11期);全文 *
杨波."非对称加密系统".《电子商务概论》.北京邮电大学出版社,2014,第111-114页. *
面向货物运输的移动平台设计与无人直升机追踪控制;王诚;徐锦法;张梁;于永军;;南京航空航天大学学报(第02期);全文 *

Also Published As

Publication number Publication date
WO2018094554A1 (en) 2018-05-31
CN107004177A (en) 2017-08-01

Similar Documents

Publication Publication Date Title
CN107004177B (en) Method for improving transportation safety of unmanned aerial vehicle, terminal, server and computer program product
US10504313B2 (en) Locker system access control
US10621543B2 (en) System and method to enable delivery and pick up of packages using pods and unmanned vehicles
US7287693B2 (en) Proximity validation system and method
EP3690684A1 (en) Data management method, apparatus, device, system and storage medium for smart lock
US20210134094A1 (en) Automated physical package delivery with end-to-end package security
US20190050805A1 (en) Automated delivery device and method for delivering a package
WO2018144833A1 (en) Systems and methods for data storage in keyed devices
CA2988800A1 (en) Logistics verification system and method
CN108496332A (en) Auth method, equipment, machine readable storage medium and system
CN105429846B (en) Instant chat tool chat record synchronization method and terminal equipment
CN108711234A (en) It is a kind of to take object method, apparatus and terminal using locker
US11838422B1 (en) User authentication method and unmanned delivery system based on user authentication
US20220337582A1 (en) Device Engagement Connection System with Verification
CN112492041B (en) Article conveying method, user side, service cloud platform and internet unmanned aerial vehicle
CN110166460A (en) Register method and device, storage medium, the electronic device of service account
WO2015188478A1 (en) Method, system and device for realizing remote contract signing, and computer storage medium
WO2017219976A1 (en) Cloud server login method and apparatus
CN116743850B (en) Equipment discovery method and device based on Internet of things platform, computer equipment and storage medium
CN103108316A (en) Authentication method, device and system for aerial card writing
US20240243914A1 (en) Method, user device, server, device and system for authenticating a device
US20210289422A1 (en) Bluetooth mesh network system and communication method having unprovisioned communication mechanism
CN109147211A (en) Cargo put-on method, apparatus and system
CN111898940B (en) Information processing method and device
JP3747394B2 (en) Electronic data arrival guarantee method and program recording medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210317

Address after: 201111 2nd floor, building 2, no.1508, Kunyang Road, Minhang District, Shanghai

Applicant after: Dalu Robot Co.,Ltd.

Address before: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Applicant before: CLOUDMINDS (SHENZHEN) ROBOTICS SYSTEMS Co.,Ltd.

CB02 Change of applicant information
CB02 Change of applicant information

Address after: 201111 Building 8, No. 207, Zhongqing Road, Minhang District, Shanghai

Applicant after: Dayu robot Co.,Ltd.

Address before: 201111 2nd floor, building 2, no.1508, Kunyang Road, Minhang District, Shanghai

Applicant before: Dalu Robot Co.,Ltd.

GR01 Patent grant
GR01 Patent grant