CN109075967A - Data interactive method, ground control terminal, server and system based on unmanned plane - Google Patents

Data interactive method, ground control terminal, server and system based on unmanned plane Download PDF

Info

Publication number
CN109075967A
CN109075967A CN201780025869.3A CN201780025869A CN109075967A CN 109075967 A CN109075967 A CN 109075967A CN 201780025869 A CN201780025869 A CN 201780025869A CN 109075967 A CN109075967 A CN 109075967A
Authority
CN
China
Prior art keywords
random number
server
control terminal
ground control
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201780025869.3A
Other languages
Chinese (zh)
Other versions
CN109075967B (en
Inventor
周毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Dajiang Innovations Technology Co Ltd
Original Assignee
Shenzhen Dajiang Innovations Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Dajiang Innovations Technology Co Ltd filed Critical Shenzhen Dajiang Innovations Technology Co Ltd
Publication of CN109075967A publication Critical patent/CN109075967A/en
Application granted granted Critical
Publication of CN109075967B publication Critical patent/CN109075967B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05DSYSTEMS FOR CONTROLLING OR REGULATING NON-ELECTRIC VARIABLES
    • G05D1/00Control of position, course, altitude or attitude of land, water, air or space vehicles, e.g. using automatic pilots
    • G05D1/10Simultaneous control of position or course in three dimensions
    • G05D1/101Simultaneous control of position or course in three dimensions specially adapted for aircraft
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Aviation & Aerospace Engineering (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Traffic Control Systems (AREA)
  • Selective Calling Equipment (AREA)

Abstract

The present invention provides a kind of data interactive method based on unmanned plane, ground control terminal, server and system, this method comprises: ground control terminal is according to the first random number and the second generating random number symmetric key, using the symmetric key encryption Unmanned Aerial Vehicle Data, encrypted Unmanned Aerial Vehicle Data is obtained, the ground control terminal sends the encrypted Unmanned Aerial Vehicle Data to the server or unmanned plane;Alternatively, receiving the encrypted data that the unmanned plane or server are sent, the data received using the symmetric key decryption.Guarantee the safety of data transmission procedure, reduces data by the possibility of third party attack.

Description

Data interactive method, ground control terminal, server and system based on unmanned plane
Technical field
The present invention relates to unmanned air vehicle technique more particularly to a kind of data interactive method based on unmanned plane, ground control terminal, Server and system.
Background technique
With the continuous development of unmanned air vehicle technique, unmanned plane is applied in more and more fields.Wherein, agriculture unmanned plane Appearance, the labour of agricultural production obtained further liberating.
Agricultural unmanned plane of today can execute pesticide, chemical fertilizer sprinkling in agriculture field, can monitor agricultural land information, calamity Evil prospecting etc..In the use process of agriculture unmanned plane, unmanned plane application program (Application, the abbreviation installed in terminal APP the data of unmanned plane acquisition) can be interacted with background server.
In the prior art, by the data that interaction unmanned plane acquires in plain text, these data are easy for terminal and background server By third party attack, thus in the presence of the risks such as be stolen, distort.
Summary of the invention
The present invention provides a kind of data interactive method based on unmanned plane, ground control terminal, server and system, for solving The problem of certainly data are easy by third party attack in the prior art.
In a first aspect, the present invention provides a kind of data interactive method based on unmanned plane, the unmanned plane is controlled by ground End control, which comprises
The ground control terminal is according to the first random number and the second generating random number symmetric key, wherein described first with Machine number is generated by the ground control terminal, second random number is generated by server;
The ground control terminal uses the symmetric key encryption Unmanned Aerial Vehicle Data, obtains encrypted Unmanned Aerial Vehicle Data, The ground control terminal sends the encrypted Unmanned Aerial Vehicle Data to the server or unmanned plane;Alternatively,
The ground control terminal receives the encrypted data that the unmanned plane or server are sent, using described symmetrical close Key decrypts the data received.
Second aspect, the present invention provide a kind of data interactive method based on unmanned plane, and the unmanned plane is controlled by ground End control, which comprises
Server is according to the first random number and the second generating random number symmetric key, wherein first random number is by institute State ground control terminal generation, second random number is generated by the server;
The server receives the Unmanned Aerial Vehicle Data that the ground control terminal uses the symmetric key encryption, and uses institute The Unmanned Aerial Vehicle Data for stating symmetric key encryption described in symmetric key decryption obtains the Unmanned Aerial Vehicle Data;Alternatively,
The server by the symmetric key encryption data, and by encrypted data be sent to the unmanned plane or Ground control terminal.
The third aspect, the present invention provide a kind of data interactive method based on unmanned plane, comprising:
Ground control terminal, server are all in accordance with the first random number and the second generating random number symmetric key, wherein described One random number is generated by the ground control terminal, second random number is generated by server;
The ground control terminal uses the symmetric key encryption Unmanned Aerial Vehicle Data, obtains encrypted Unmanned Aerial Vehicle Data, The ground control terminal sends the encrypted Unmanned Aerial Vehicle Data to the server or unmanned plane;Alternatively,
The server uses the symmetric key encryption Unmanned Aerial Vehicle Data, obtains encrypted Unmanned Aerial Vehicle Data, described Server sends the encrypted Unmanned Aerial Vehicle Data to the ground control terminal.
Fourth aspect, the present invention provide a kind of ground control terminal, comprising: memory, processor and display;
For storing instruction, the processor is used to call the instruction in the memory memory, executes following Method:
According to the first random number and the second generating random number symmetric key, wherein first random number is by the ground Control terminal generates, second random number is generated by server;Using the symmetric key encryption Unmanned Aerial Vehicle Data, encrypted Unmanned Aerial Vehicle Data afterwards, the ground control terminal send the encrypted Unmanned Aerial Vehicle Data to the server or unmanned plane; Alternatively, receiving the encrypted data that the unmanned plane or server are sent, the number received using the symmetric key decryption According to.
5th aspect, the present invention provide a kind of server, comprising: memory and processor;
For storing instruction, the processor is used to call the instruction in the memory memory, executes following Method:
According to the first random number and the second generating random number symmetric key, wherein first random number is by the ground Control terminal generates, second random number is generated by server;The ground control terminal is received using the symmetric key encryption Unmanned Aerial Vehicle Data, and using the Unmanned Aerial Vehicle Data of symmetric key encryption described in the symmetric key decryption, obtain it is described nobody Machine data;Alternatively, being sent to the unmanned plane or ground control by the symmetric key encryption data, and by encrypted data End processed.
6th aspect, the present invention provide a kind of data interaction system based on unmanned plane, comprising: unmanned plane, ground control End, server;
The ground control terminal is for controlling the unmanned plane;
The ground control terminal is ground control terminal described in fourth aspect;The server is clothes described in the 5th aspect Business device.
In data interactive method provided by the invention based on unmanned plane, ground control terminal, server and system, ground control End processed, server are according to the first random number and the second generating random number symmetric key, and then ground control terminal, unmanned plane and clothes It between business device in data exchange process, is encrypted using symmetric key, guarantees the safety of data transmission procedure, reduce data By the possibility of third party attack.
Detailed description of the invention
Fig. 1 is a kind of data interaction system configuration diagram based on unmanned plane provided by the invention;
Fig. 2 is the data interactive method flow diagram based on unmanned plane that one embodiment of the invention provides;
Fig. 3 be another embodiment of the present invention provides the data interactive method flow diagram based on unmanned plane;
Fig. 4 be another embodiment of the present invention provides the data interactive method flow diagram based on unmanned plane;
Fig. 5 is the data interaction device structural schematic diagram based on unmanned plane that one embodiment of the invention provides;
Fig. 6 be another embodiment of the present invention provides the data interaction device structural schematic diagram based on unmanned plane.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention is clearly retouched It states, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Based on the present invention In embodiment, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
Unless otherwise defined, all technical and scientific terms used herein and belong to technical field of the invention The normally understood meaning of technical staff is identical.Term as used herein in the specification of the present invention is intended merely to description tool The purpose of the embodiment of body, it is not intended that in the limitation present invention.Term " and or " used herein includes one or more phases Any and all combinations of the listed item of pass.
With reference to the accompanying drawing, it elaborates to some embodiments of the present invention.In the absence of conflict, following Feature in embodiment and embodiment can be combined with each other.
Fig. 1 is a kind of data interaction system configuration diagram based on unmanned plane provided by the invention.As shown in Figure 1, should System includes: unmanned plane 01, ground control terminal 02 and server 03.
Wherein, ground control terminal may include following at least one: wear-type display glasses (VR glasses, VR helmet etc.), Mobile phone, remote controler (such as with the remote controler of display screen), Intelligent bracelet, tablet computer.The present embodiment is with the remote controler with display screen For, illustrate the data interaction between ground control terminal 02 and server 03, unmanned plane 01.
Different from the existing remote controler with display screen, the remote controler provided in this embodiment with display screen is provided with user Interface.User can control unmanned plane by the user interface, operation of the remote controler according to user to the user interface, really Determine the control information of user's input.
By taking above-mentioned unmanned plane is agriculture unmanned plane as an example, which may include following at least one: sprinkling flow Information is controlled, direction controlling information is sprayed, flying speed controls information, flight altitude control information, and spray head controls information, course line Spacing controls information, and safe distance controls information etc..But invention is not limited thereto.
Unmanned plane 01 executes related operation under the control of ground control terminal 02, and related data in operation is fed back to ground Face control terminal 02.These data are transferred to server 03 or ground control terminal 02 by ground control terminal 02 will treated number According to being transferred to server 03.
The present invention provides a kind of data interactive method based on unmanned plane, come ensure unmanned plane 01, ground control terminal 02 with And safer interaction data between server 03.
Fig. 2 is the data interactive method flow diagram based on unmanned plane that one embodiment of the invention provides, such as Fig. 2 institute Show, this method comprises:
S201, ground control terminal are according to the first random number and the second generating random number symmetric key.Wherein, the first random number It is generated by ground control terminal, the second random number is generated by server.
First random number and the second random number can be a number, be also possible to one section of sequence, for example, 16 sequence, Or 64 sequences, the present invention is with no restriction.
Optionally, in the consideration of safety, minimum length, the maximum of first random number and the second random number be can specify that Length, such as: minimum length is 32, and maximum length is 64, is less than minimum length or is greater than maximum length, is determined as connecting Failure is connect, new random number can be regenerated again.
Ground control terminal and server generate random number, after interaction by ground control terminal according to the first random number and second with Machine number generates symmetric key, uses in follow-up data interaction.
It should be noted that symmetric key, that is, sender and recipient are encrypted and are decrypted using same key.
Specifically, S202 or 203 is executed.
S202, ground control terminal use the symmetric key encryption Unmanned Aerial Vehicle Data, obtain encrypted Unmanned Aerial Vehicle Data, to Server or unmanned plane send the encrypted Unmanned Aerial Vehicle Data.
S203, ground control terminal receive the encrypted data that unmanned plane or server are sent, and use the symmetric key solution Touch the data received.
It should be noted that ground control terminal, server all obtain the first random number and the second random number, then according to pre- Imputation method obtains symmetric key, encrypts to the data to be sent.
Ground control terminal can also send the first random number and the second random number to unmanned plane, and unmanned plane oneself generates symmetrical Key.Alternatively, ground control terminal directly sends symmetric key to unmanned plane.The application is with no restriction.
In the present embodiment, ground control terminal is according to the first random number and the second generating random number symmetric key, and then ground It between control terminal, unmanned plane and server in data exchange process, is encrypted using symmetric key, guarantees that data are transmitted across The safety of journey reduces data by the possibility of third party attack.
Fig. 3 be another embodiment of the present invention provides the data interactive method flow diagram based on unmanned plane, such as Fig. 3 institute Show, it is corresponding with method shown in Fig. 2, this method comprises:
S301, server are according to the first random number and the second generating random number symmetric key.Wherein, the first random number is by ground Face control terminal generates, and the second random number is generated by server.
And then execute S302 or S303.
S302, server receive the Unmanned Aerial Vehicle Data that ground control terminal uses the symmetric key encryption, and described in use The Unmanned Aerial Vehicle Data of symmetric key encryption described in symmetric key decryption obtains the Unmanned Aerial Vehicle Data.
S303, server are sent to the unmanned plane by the symmetric key encryption data, and by encrypted data Or ground control terminal.
In the present embodiment, server is according to the first random number and the second generating random number symmetric key, and then ground controls Between end, unmanned plane and server in data exchange process, is encrypted using symmetric key, guarantee data transmission procedure Safety reduces data by the possibility of third party attack.
In one embodiment, before ground control terminal is according to the first random number and the second generating random number symmetric key, ground Control terminal generates the first random number, and uses public key encryption first random number, obtains encrypted first random number, Jin Erxiang Server sends encrypted first random number.Server is decrypted after obtaining the first random number by private key, generates second Random number, and it is sent to ground control terminal.
Public key and private key are a pair of of unsymmetrical key, and server can be generated a pair of of private key and public key, public key is sent to Ground control terminal.
In the present embodiment, by unsymmetrical key interaction random number between ground control terminal and server, further The safety of data interaction is ensured.
When specific implementation, before ground control terminal controls unmanned machine operation, under networking state, it is corresponding to first pass through unmanned plane Application program (APP) is logged in.
Specifically, ground control terminal sends log-on message to the server, which may include unmanned plane pair The information such as account, the password answered.
Optionally, the first random number can account corresponding with unmanned plane, password be packaged in log-on message, can also be single The first random number is solely sent, the application is with no restriction.
After server receives log-on message, first log-on message is verified, server verifying log-on message pass through after, The second random number can be generated.
Correspondingly, control terminal transmission logins successfully response message to server to the ground, and server can login successfully sound It answers and carries above-mentioned second random number in information.Can also individually control terminal sends the second random number to the ground, the application do not limit System.
In addition, server can also be after verifying log-on message passes through, and control terminal sends public to the ground in a kind of embodiment Key, so that ground control terminal uses first random number of public key encryption.
It should be noted that control terminal sends login failure and rings to the ground if server authentication log-on message fails Information is answered, process terminates.Specifically, login failure may be account or password mistake, such as account, password mismatch, account There is no etc.;It is also likely to be that other abnormal conditions are judged as login failure, such as: it is logged in the short time excessively frequently, is not right Open current system in user region etc..The present invention is not especially limited.
Further, above-mentioned ground control terminal is according to the first random number and the second generating random number symmetric key, can be with It is that ground control terminal uses predetermined encryption algorithm, according to first random number and the second generating random number symmetric key.
It should be noted that the predetermined encryption algorithm can be secure hash algorithm (SHA512).Assuming that the first random number R1 and the second random number R 2 are 64 sequences, and 128 sequences will be continuously spliced into before and after R1 and R2, then by this 128 Input of the sequence of position as secure hash algorithm, obtains symmetric key.Optionally, secure hash algorithm exports 64 sequences As symmetric key.
Further, when encrypting to Unmanned Aerial Vehicle Data, symmetric encipherment algorithm can also be cooperated to be encrypted.Optionally, Cooperation Advanced Encryption Standard (Advanced Encryption Standard, abbreviation AES) algorithm is encrypted.
Similarly, server is according to the first random number and the second generating random number symmetric key, or server is adopted With predetermined encryption algorithm, according to first random number and the second generating random number symmetric key.
In a kind of implementation, ground control terminal can send an algorithms selection list to server, and server calculated Predetermined encryption algorithm is selected in method selective listing.Such as selection SHA512 algorithm.
Specifically, ground control terminal is used to indicate multiple to server transmission algorithm notification message, the algorithm notification message Alternative Encryption Algorithm, it can use Encryption Algorithm list, carry the mark of multiple alternative Encryption Algorithm.Server is from multiple standby It selects and selects predetermined encryption algorithm in Encryption Algorithm, and then control terminal transmission algorithm determines message to server to the ground, the algorithm is true Determine message and is used to indicate the predetermined encryption algorithm.Such as algorithm determines the mark that predetermined encryption algorithm is carried in message.
Optionally, server to the ground control terminal send the second random number when, algorithm can be determined message and second with Machine number is packaged with transmission.This is not restricted, individually can also determine message by transmission algorithm.
Similarly, ground control terminal can also send the list of symmetric encipherment algorithm to server, by server selection pair Claim Encryption Algorithm.Such as selection aes algorithm.
After the completion of server selection, control terminal notifies the symmetric encipherment algorithm of selection to the ground.
Fig. 4 be another embodiment of the present invention provides the data interactive method flow diagram based on unmanned plane, above-mentioned On the basis of embodiment, entire data encryption process may include:
S401, ground control terminal generate the first random number, and use the first random number of public key encryption.
S402, ground control terminal send encrypted first random number to server.
S403, server decrypt above-mentioned encrypted first random number using the corresponding private key of above-mentioned public key, obtain first Random number.
S404, server generate the second random number.
Control terminal sends the second random number to the ground for S405, server.
Optionally, server uses the second random number of asymmetric-key encryption, and ground control terminal is using corresponding asymmetric Key decryption obtains the second random number.
S406, ground control terminal/server are according to the first random number and the second generating random number symmetric key.
And then referring to previous embodiment, between ground control terminal, unmanned plane and server in data exchange process, use Symmetric key is encrypted, and guarantees the safety of data transmission procedure, reduces data by the possibility of third party attack.
Fig. 5 is the data interaction device structural schematic diagram based on unmanned plane that one embodiment of the invention provides, which can To be integrated in aforementioned ground control terminal.As shown in figure 5, the ground control terminal 500 may include: memory 501, processor 502 With display 503, in which:
Memory 501, for storing instruction.Processor 502 is used to call the instruction in the memory 501, under execution State method:
According to the first random number and the second generating random number symmetric key, wherein first random number is by the ground Control terminal generates, second random number is generated by server;Using the symmetric key encryption Unmanned Aerial Vehicle Data, encrypted Unmanned Aerial Vehicle Data afterwards, the ground control terminal send the encrypted Unmanned Aerial Vehicle Data to the server or unmanned plane; Alternatively, receiving the encrypted data that the unmanned plane or server are sent, the number received using the symmetric key decryption According to.
Display 503 provides operation interface etc. for showing various data informations, and for user.
In one embodiment, processor 502 for generating the first random number, and uses the first random number described in public key encryption, Obtain encrypted first random number;Encrypted first random number is sent to server;Receive the server The second random number sent.
Optionally, processor 502 are also used to send log-on message to the server.
Correspondingly, processor 502 are sent after being verified the log-on message specifically for the reception server Second random number.
In another embodiment, processor 502 is specifically used for using predetermined encryption algorithm, according to first random number and The second generating random number symmetric key.
Optionally, processor 502 are also used to the server transmission algorithm notification message, the algorithm notification message It is used to indicate multiple alternative Encryption Algorithm;It receives the algorithm that the server is sent and determines message, the algorithm determines that message is used In the predetermined encryption algorithm for indicating that the server is selected according to the multiple alternative Encryption Algorithm.
The device is for executing preceding method embodiment, and it is similar that the realization principle and technical effect are similar, and details are not described herein.
Fig. 6 be another embodiment of the present invention provides the data interaction device structural schematic diagram based on unmanned plane, the device It can integrate in aforementioned server.As shown in fig. 6, the server 600 includes: memory 601 and processor 602, in which:
Memory 601, for storing instruction.
Processor 602, for calling the instruction in memory 601, execution following methods:
According to the first random number and the second generating random number symmetric key, wherein first random number is by the ground Control terminal generates, second random number is generated by server;The ground control terminal is received using the symmetric key encryption Unmanned Aerial Vehicle Data, and using the Unmanned Aerial Vehicle Data of symmetric key encryption described in the symmetric key decryption, obtain it is described nobody Machine data;Alternatively, being sent to the unmanned plane or ground control by the symmetric key encryption data, and by encrypted data End processed.
Optionally, processor 602, after being also used to receive the public key encryption that the ground control terminal is sent described first with Machine number;The first random number using the corresponding private key of the public key, after decrypting the public key encryption;The second random number is generated, and Second random number is sent to the ground control terminal.
In a kind of embodiment, processor 602 is also used to receive the log-on message that the ground control terminal is sent.
Correspondingly, processor 602, specifically for generating second random number after verifying the log-on message and passing through.
In another embodiment, processor 602 is specifically used for using predetermined encryption algorithm, according to first random number and The second generating random number symmetric key.
Optionally, processor 602 are also used to receive the algorithm notification message that the ground control terminal is sent, the algorithm Notification message is used to indicate multiple alternative Encryption Algorithm;The predetermined encryption algorithm is selected from the multiple alternative Encryption Algorithm; Message is determined to the ground control terminal transmission algorithm, and the algorithm determines that message is used to indicate the predetermined encryption algorithm.
The device is for executing preceding method embodiment, and it is similar that the realization principle and technical effect are similar, and details are not described herein.
Those of ordinary skill in the art will appreciate that: realize that all or part of the steps of above method embodiment can pass through The relevant hardware of program instruction is completed, and program above-mentioned can be stored in a computer readable storage medium, the program When being executed, step including the steps of the foregoing method embodiments is executed;And storage medium above-mentioned includes: ROM, RAM, magnetic disk or light The various media that can store program code such as disk.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme.

Claims (26)

1. a kind of data interactive method based on unmanned plane, which is characterized in that the unmanned plane is controlled by ground control terminal, described Method includes:
The ground control terminal is according to the first random number and the second generating random number symmetric key, wherein first random number It is generated by the ground control terminal, second random number is generated by server;
The ground control terminal uses the symmetric key encryption Unmanned Aerial Vehicle Data, obtains encrypted Unmanned Aerial Vehicle Data, described Ground control terminal sends the encrypted Unmanned Aerial Vehicle Data to the server or unmanned plane;Alternatively,
The ground control terminal receives the encrypted data that the unmanned plane or server are sent, and uses the symmetric key solution Touch the data received.
2. the method according to claim 1, wherein the ground control terminal according to the first random number and second with Machine number generates before symmetric key, further includes:
The ground control terminal generates the first random number, and using the first random number described in public key encryption, obtains encrypted institute State the first random number;
The ground control terminal sends encrypted first random number to server;
The ground control terminal receives the second random number that the server is sent.
3. according to the method described in claim 2, it is characterized in that, the method also includes:
The ground control terminal sends log-on message to the server;
Correspondingly, the ground control terminal receives the second random number that the server is sent, comprising:
The ground control terminal receives second random number that the server is sent after being verified the log-on message.
4. method according to claim 1-3, which is characterized in that the ground control terminal is according to the first random number With the second generating random number symmetric key, comprising:
The ground control terminal uses predetermined encryption algorithm, symmetrical according to first random number and second generating random number Key.
5. according to the method described in claim 4, it is characterized in that, the ground control terminal use predetermined encryption algorithm, according to Before first random number and the second generating random number symmetric key, further includes:
The ground control terminal is used to indicate multiple standby to the server transmission algorithm notification message, the algorithm notification message Select Encryption Algorithm;
The ground control terminal receives the algorithm that the server is sent and determines message, and the algorithm determines that message is used to indicate institute Server is stated according to the predetermined encryption algorithm of the multiple alternative Encryption Algorithm selection.
6. a kind of data interactive method based on unmanned plane, which is characterized in that the unmanned plane is controlled by ground control terminal, described Method includes:
Server is according to the first random number and the second generating random number symmetric key, wherein first random number is by describedly Face control terminal generates, second random number is generated by the server;
The server receives the Unmanned Aerial Vehicle Data that the ground control terminal uses the symmetric key encryption, and using described right The Unmanned Aerial Vehicle Data for claiming key to decrypt the symmetric key encryption, obtains the Unmanned Aerial Vehicle Data;Alternatively,
The server is sent to the unmanned plane or ground by the symmetric key encryption data, and by encrypted data Control terminal.
7. according to the method described in claim 6, it is characterized in that, the server is according to the first random number and the second random number Before generation symmetric key, further includes:
The server receives first random number after the public key encryption that the ground control terminal is sent;
The server uses the corresponding private key of the public key, the first random number after decrypting the public key encryption;
The server generates the second random number, and sends second random number to the ground control terminal.
8. the method according to the description of claim 7 is characterized in that before the server the second random number of generation, further includes:
The server receives the log-on message that the ground control terminal is sent;
Correspondingly, the server generates the second random number, comprising:
The server generates second random number after verifying the log-on message and passing through.
9. according to the described in any item methods of claim 6-8, which is characterized in that the server is according to the first random number and Two generating random number symmetric keys, comprising:
The server uses predetermined encryption algorithm, symmetrically close according to first random number and second generating random number Key.
10. according to the method described in claim 9, it is characterized in that, the server uses predetermined encryption algorithm, according to described Before first random number and the second generating random number symmetric key, further includes:
The server receives the algorithm notification message that the ground control terminal is sent, and the algorithm notification message is used to indicate more A alternative Encryption Algorithm;
The server selects the predetermined encryption algorithm from the multiple alternative Encryption Algorithm;
The server determines message to the ground control terminal transmission algorithm, and it is described pre- that the algorithm determines that message is used to indicate If Encryption Algorithm.
11. a kind of data interactive method based on unmanned plane characterized by comprising
Ground control terminal, server are all in accordance with the first random number and the second generating random number symmetric key, wherein described first with Machine number is generated by the ground control terminal, second random number is generated by server;
The ground control terminal uses the symmetric key encryption Unmanned Aerial Vehicle Data, obtains encrypted Unmanned Aerial Vehicle Data, described Ground control terminal sends the encrypted Unmanned Aerial Vehicle Data to the server or unmanned plane;Alternatively,
The server uses the symmetric key encryption Unmanned Aerial Vehicle Data, obtains encrypted Unmanned Aerial Vehicle Data, the service Device sends the encrypted Unmanned Aerial Vehicle Data to the ground control terminal.
12. according to the method for claim 11, which is characterized in that the ground control terminal, server all in accordance with first with Before machine number and the second generating random number symmetric key, further includes:
The ground control terminal generates the first random number, and using the first random number described in public key encryption, obtains encrypted institute State the first random number;
The ground control terminal sends encrypted first random number to server;
The server uses the corresponding private key of the public key, the first random number after decrypting the public key encryption;
The server generates the second random number, and sends second random number to the ground control terminal.
13. according to the method for claim 12, which is characterized in that before the server generates the second random number, also wrap It includes:
The ground control terminal sends log-on message to the server;
Correspondingly, the server generates the second random number, comprising:
The server generates second random number after verifying the log-on message and passing through.
14. the described in any item methods of 1-13 according to claim 1, which is characterized in that the equal root of the ground control terminal, server According to the first random number and the second generating random number symmetric key, comprising:
The ground control terminal, server are all made of predetermined encryption algorithm, at random according to first random number and described second Number generates symmetric key.
15. according to the method for claim 14, which is characterized in that the ground control terminal, server are all made of default add Close algorithm, before first random number and the second generating random number symmetric key, further includes:
The ground control terminal is used to indicate multiple standby to the server transmission algorithm notification message, the algorithm notification message Select Encryption Algorithm;
The server selects the predetermined encryption algorithm from the multiple alternative Encryption Algorithm;
The server determines message to the ground control terminal transmission algorithm, and it is described pre- that the algorithm determines that message is used to indicate If Encryption Algorithm.
16. a kind of ground control terminal characterized by comprising memory, processor and display;
For storing instruction, the processor is used to call the instruction in the memory memory, executes following methods:
According to the first random number and the second generating random number symmetric key, wherein first random number is controlled by the ground End generates, second random number is generated by server;Using the symmetric key encryption Unmanned Aerial Vehicle Data, obtain encrypted Unmanned Aerial Vehicle Data, the ground control terminal send the encrypted Unmanned Aerial Vehicle Data to the server or unmanned plane;Alternatively, Receive the encrypted data that the unmanned plane or server are sent, the data received using the symmetric key decryption.
17. ground control terminal according to claim 16, which is characterized in that the processor, it is random for generating first Number, and using the first random number described in public key encryption, obtain encrypted first random number;Described add is sent to server The first random number after close;Receive the second random number that the server is sent.
18. ground control terminal according to claim 17, which is characterized in that the processor is also used to the service Device sends log-on message;
Correspondingly, the processor, the institute sent after being verified the log-on message specifically for receiving the server State the second random number.
19. the described in any item ground control terminals of 6-18 according to claim 1, which is characterized in that the processor is specifically used for Using predetermined encryption algorithm, according to first random number and the second generating random number symmetric key.
20. ground control terminal according to claim 19, which is characterized in that the processor is also used to the service Device transmission algorithm notification message, the algorithm notification message are used to indicate multiple alternative Encryption Algorithm;Receive the server hair The algorithm sent determines message, and the algorithm determines that message is used to indicate the server and selects according to the multiple alternative Encryption Algorithm The predetermined encryption algorithm selected.
21. a kind of server characterized by comprising memory and processor;
For storing instruction, the processor is used to call the instruction in the memory memory, executes following methods:
According to the first random number and the second generating random number symmetric key, wherein first random number is controlled by the ground End generates, second random number is generated by server;Receive the nothing that the ground control terminal uses the symmetric key encryption Man-machine data, and using the Unmanned Aerial Vehicle Data of symmetric key encryption described in the symmetric key decryption, obtain the unmanned plane number According to;Alternatively, being sent to the unmanned plane or ground control by the symmetric key encryption data, and by encrypted data End.
22. server according to claim 21, which is characterized in that the processor is also used to receive the ground control First random number after the public key encryption that end processed is sent;Using the corresponding private key of the public key, the public key encryption is decrypted The first random number afterwards;The second random number is generated, and sends second random number to the ground control terminal.
23. server according to claim 22, which is characterized in that the processor is also used to receive the ground control The log-on message that end processed is sent;
Correspondingly, the processor, specifically for generating second random number after verifying the log-on message and passing through.
24. according to the described in any item servers of claim 21-23, which is characterized in that the processor is specifically used for using Predetermined encryption algorithm, according to first random number and the second generating random number symmetric key.
25. server according to claim 24, which is characterized in that the processor is also used to receive the ground control The algorithm notification message that end processed is sent, the algorithm notification message are used to indicate multiple alternative Encryption Algorithm;From the multiple standby Encryption Algorithm is selected to select the predetermined encryption algorithm;Message is determined to the ground control terminal transmission algorithm, and the algorithm determines Message is used to indicate the predetermined encryption algorithm.
26. a kind of data interaction system based on unmanned plane characterized by comprising unmanned plane, ground control terminal, server;
The ground control terminal is for controlling the unmanned plane;
The ground control terminal is such as the described in any item ground control terminals of claim 16-20;The server is wanted for right Seek the described in any item servers of 21-25.
CN201780025869.3A 2017-12-18 2017-12-18 Data interaction method based on unmanned aerial vehicle, ground control terminal, server and system Expired - Fee Related CN109075967B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/117034 WO2019119238A1 (en) 2017-12-18 2017-12-18 Data exchange method and system based on unmanned aerial vehicle, and ground control terminal and server

Publications (2)

Publication Number Publication Date
CN109075967A true CN109075967A (en) 2018-12-21
CN109075967B CN109075967B (en) 2020-12-29

Family

ID=64822080

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780025869.3A Expired - Fee Related CN109075967B (en) 2017-12-18 2017-12-18 Data interaction method based on unmanned aerial vehicle, ground control terminal, server and system

Country Status (2)

Country Link
CN (1) CN109075967B (en)
WO (1) WO2019119238A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112906037A (en) * 2021-03-26 2021-06-04 北京三快在线科技有限公司 Communication encryption system, method and device
CN113709245A (en) * 2021-08-27 2021-11-26 浙江浙燃能源有限公司 Industrial Internet of things data processing method based on block chain and related equipment
CN113891312A (en) * 2021-09-27 2022-01-04 深圳市道通智能航空技术股份有限公司 Unmanned aerial vehicle data encryption transmission method, device, equipment and storage medium
CN114726628A (en) * 2022-04-11 2022-07-08 广东电网有限责任公司佛山供电局 Unmanned aerial vehicle inspection system and encryption method thereof, unmanned aerial vehicle and ground terminal

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110239483B (en) * 2019-05-07 2021-10-08 山东工商学院 Vehicle control method, system, and computer-readable storage medium
GB2591250A (en) * 2020-01-22 2021-07-28 Bae Systems Plc Artificial intelligence

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202694592U (en) * 2012-07-25 2013-01-23 湖南中航天幕科技有限公司 Comprehensive management network platform of civil unmanned aerial vehicle
CN104994112A (en) * 2015-07-23 2015-10-21 陈昊 Method for encrypting communication data chain between unmanned aerial vehicle and ground station
CN105429759A (en) * 2015-11-05 2016-03-23 天津津航计算技术研究所 Key management method used for data encryption of airborne data recorder of unmanned aerial vehicle
US20160300495A1 (en) * 2014-05-20 2016-10-13 Verizon Patent And Licensing Inc. Secure communications with unmanned aerial vehicles
CN107426153A (en) * 2017-04-13 2017-12-01 北京福瑞航行科技有限公司 A kind of unmanned plane telecommunication network authentication mechanism and authentication method based on APP control terminals

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202694592U (en) * 2012-07-25 2013-01-23 湖南中航天幕科技有限公司 Comprehensive management network platform of civil unmanned aerial vehicle
US20160300495A1 (en) * 2014-05-20 2016-10-13 Verizon Patent And Licensing Inc. Secure communications with unmanned aerial vehicles
CN104994112A (en) * 2015-07-23 2015-10-21 陈昊 Method for encrypting communication data chain between unmanned aerial vehicle and ground station
CN105429759A (en) * 2015-11-05 2016-03-23 天津津航计算技术研究所 Key management method used for data encryption of airborne data recorder of unmanned aerial vehicle
CN107426153A (en) * 2017-04-13 2017-12-01 北京福瑞航行科技有限公司 A kind of unmanned plane telecommunication network authentication mechanism and authentication method based on APP control terminals

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112906037A (en) * 2021-03-26 2021-06-04 北京三快在线科技有限公司 Communication encryption system, method and device
CN113709245A (en) * 2021-08-27 2021-11-26 浙江浙燃能源有限公司 Industrial Internet of things data processing method based on block chain and related equipment
CN113891312A (en) * 2021-09-27 2022-01-04 深圳市道通智能航空技术股份有限公司 Unmanned aerial vehicle data encryption transmission method, device, equipment and storage medium
WO2023046177A1 (en) * 2021-09-27 2023-03-30 深圳市道通智能航空技术股份有限公司 Unmanned aerial vehicle data encryption transmission method and apparatus, device, and storage medium
CN113891312B (en) * 2021-09-27 2024-06-18 深圳市道通智能航空技术股份有限公司 Unmanned aerial vehicle data encryption transmission method, device, equipment and storage medium
CN114726628A (en) * 2022-04-11 2022-07-08 广东电网有限责任公司佛山供电局 Unmanned aerial vehicle inspection system and encryption method thereof, unmanned aerial vehicle and ground terminal

Also Published As

Publication number Publication date
WO2019119238A1 (en) 2019-06-27
CN109075967B (en) 2020-12-29

Similar Documents

Publication Publication Date Title
CN109075967A (en) Data interactive method, ground control terminal, server and system based on unmanned plane
CN112329041B (en) Method and device for deploying contracts
CN110492990B (en) Private key management method, device and system under block chain scene
US10819687B2 (en) Apparatus and method of encrypted communication
US9088861B2 (en) Method and apparatus for bearer and server independent parental control on smartphone, managed by smartphone
CN105007577B (en) A kind of virtual SIM card parameter management method, mobile terminal and server
CN104270516B (en) Decryption method and mobile terminal
CN104917603B (en) A kind of information security transfer method receives terminal and sends terminal
Girgenti et al. On the feasibility of attribute-based encryption on constrained IoT devices for smart systems
EP3688927A1 (en) Access to secured information
CN106162537A (en) Method, Wireless Telecom Equipment and the terminal that a kind of safety certification connects
CN103986723A (en) Secret communication control and secret communication method and device
CN111201750A (en) Encryption and decryption of media data
CN110690967B (en) Instant communication key establishment method independent of server security
CN112291268A (en) Information transmission method, device, equipment and storage medium
KR20210039499A (en) Communication protocol
CN103997405A (en) Secret key generation method and device
KR101317342B1 (en) Mobile Terminal Interlocking Resource, Method for Interlocking Resource in Mobile Terminal, and between Web Server and Terminal
Chowdhury et al. Threat models over space and time: a case study of E2EE messaging applications
CN112700014A (en) Method, device and system for deploying federal learning application and electronic equipment
WO2020219136A2 (en) System and method for secure electronic data transfer
CN105450597B (en) A kind of information transferring method and device
CN109120621A (en) Data processor
US9577995B1 (en) Systems and methods for enabling secure communication between endpoints in a distributed computerized infrastructure for establishing a social network
US9154471B2 (en) Method and apparatus for unified encrypted messaging

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20201229