Disclosure of Invention
The invention provides a shared unmanned aerial vehicle renting method, equipment and a system.
In a first aspect, the method for leasing a shared unmanned aerial vehicle provided by the present invention is applied to a terminal, and includes:
sending a first request message to a key production center, wherein the first request message comprises an identity of the terminal;
receiving a first authentication message sent by a key production center, wherein the first authentication message comprises a private key, and the private key is obtained by the key production center through calculation by using preset parameters and an identity of the terminal;
sending a second request message to the unmanned aerial vehicle management platform, wherein the second request message comprises the identity of the terminal, and the second message is used for instructing the unmanned aerial vehicle management platform to generate a public key for the terminal according to the identity of the terminal and the preset parameter;
receiving an unmanned aerial vehicle lease right message sent by an unmanned aerial vehicle management platform, wherein the unmanned aerial vehicle lease right message is a message encrypted by using the public key;
and decrypting the unmanned aerial vehicle lease right message by using the private key to obtain the lease right of the unmanned aerial vehicle.
Optionally, the first request message further includes a token with a validity period, where the token is used to instruct the key production center to generate a private key for the terminal within the validity period of the token;
correspondingly, the first authentication message further includes the token carrying the validity period.
Optionally, after receiving the first authentication message sent by the key production center, the method further includes:
and sending a confirmation message to the key production center, wherein the confirmation message comprises the token with the expiration date.
In a second aspect, the method for leasing a shared unmanned aerial vehicle provided by the present invention is applied to a key production center, and includes:
receiving a first request message sent by a terminal, wherein the first request message comprises an identity of the terminal;
calculating by using preset parameters and the identity of the terminal to generate a private key for the terminal;
and sending a first authentication message to the terminal, wherein the first authentication message comprises the private key, and the private key is used for the terminal to decrypt the unmanned aerial vehicle lease right message received from the unmanned aerial vehicle management platform.
Optionally, the first message further includes a token carrying an expiration date;
correspondingly, the using the preset parameter and the identity of the terminal to perform operation to generate a private key for the terminal includes:
in the validity period of the token, using preset parameters and the identity of the terminal to carry out operation, and generating a private key for the terminal;
the first authentication message further includes the token carrying the validity period.
Optionally, after sending the first authentication message to the terminal, the method further includes:
and receiving a confirmation message sent by the terminal, wherein the confirmation message comprises the token carrying the validity period.
Optionally, the method further includes:
and sending a second authentication message to the unmanned aerial vehicle management platform, wherein the second authentication message comprises the preset parameters.
In a third aspect, the method for renting shared drones, provided by the invention, is applied to a drone management platform, and includes:
receiving a second request message sent by a terminal, wherein the second request message comprises an identity of the terminal;
generating a public key for the terminal according to preset parameters and the identity of the terminal;
encrypting the unmanned aerial vehicle lease right message by using the public key;
sending the unmanned aerial vehicle lease right message to the terminal so that the terminal decrypts the unmanned aerial vehicle lease right message by using a private key to obtain the lease right of the unmanned aerial vehicle; and the private key is obtained by the secret key production center through calculation by using the preset parameters and the identity of the terminal.
Optionally, the method further includes:
and receiving a second authentication message sent by a key production center, wherein the second authentication message comprises the preset parameters.
In a fourth aspect, the present invention provides a renting apparatus for sharing an unmanned aerial vehicle, applied to a terminal, including:
a sending module, configured to send a first request message to a key production center, where the first request message includes an identity of the terminal;
the terminal comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving a first authentication message sent by a key production center, the first authentication message comprises a private key, and the private key is obtained by the key production center through calculation by using preset parameters and an identity of the terminal;
the sending module is further configured to send a second request message to the unmanned aerial vehicle management platform, where the second request message includes the identity of the terminal, and the second message is used to instruct the unmanned aerial vehicle management platform to generate a public key for the terminal according to the identity of the terminal and the preset parameter;
the receiving module is further configured to receive an unmanned aerial vehicle lease right message sent by an unmanned aerial vehicle management platform, where the unmanned aerial vehicle lease right message is a message encrypted by using the public key;
and the decryption module is used for decrypting the unmanned aerial vehicle lease right message by using the private key to obtain the lease right of the unmanned aerial vehicle.
Optionally, the first request message further includes a token with a validity period, where the token is used to instruct the key production center to generate a private key for the terminal within the validity period of the token;
correspondingly, the first authentication message further includes the token carrying the validity period.
Optionally, the sending module is further configured to send a confirmation message to the key production center, where the confirmation message includes the token with the expiration date.
In a fifth aspect, the present invention provides a renting apparatus for sharing a drone, applied to a key production center, including:
a receiving module, configured to receive a first request message sent by a terminal, where the first request message includes an identity of the terminal;
the processing module is used for performing operation by using preset parameters and the identity of the terminal to generate a private key for the terminal;
the sending module is used for sending a first authentication message to the terminal, the first authentication message comprises the private key, and the private key is used for the terminal to decrypt the unmanned aerial vehicle lease right message received from the unmanned aerial vehicle management platform.
Optionally, the first message further includes a token carrying an expiration date;
correspondingly, the processing module is specifically configured to perform an operation using preset parameters and the identity of the terminal in the validity period of the token, and generate a private key for the terminal;
the first authentication message further includes the token carrying the validity period.
Optionally, the receiving module is further configured to receive a confirmation message sent by the terminal, where the confirmation message includes the token carrying the expiration date.
Optionally, the sending module is further configured to send a second authentication message to the unmanned aerial vehicle management platform, where the second authentication message includes the preset parameter.
In a sixth aspect, the present invention provides a renting apparatus for sharing an unmanned aerial vehicle, applied to an unmanned aerial vehicle management platform, including:
a receiving module, configured to receive a second request message sent by a terminal, where the second request message includes an identity of the terminal;
the processing module is used for generating a public key for the terminal according to preset parameters and the identity of the terminal;
the encryption module is used for encrypting the unmanned aerial vehicle lease right message by using the public key;
the sending module is used for sending the unmanned aerial vehicle lease right message to the terminal so that the terminal can decrypt the unmanned aerial vehicle lease right message by using a private key to obtain the lease right of the unmanned aerial vehicle; and the private key is obtained by the secret key production center through calculation by using the preset parameters and the identity of the terminal.
Optionally, the receiving module is further configured to receive a second authentication message sent by a key production center, where the second authentication message includes the preset parameter.
In a seventh aspect, the present invention provides a terminal, including:
a memory;
a processor; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to implement the method of any of the first aspects.
In an eighth aspect, the present invention provides a key production center, including:
a memory;
a processor; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to implement the method of any of the second aspects.
In a ninth aspect, the present invention provides an unmanned aerial vehicle management platform, including:
a memory;
a processor; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to implement the method of any of the third aspects.
In a tenth aspect, the invention provides a computer readable storage medium having stored thereon a computer program for execution by a processor to perform a method according to any one of the first aspect, or a method according to any one of the second aspect, or a method according to any one of the third aspect.
In an eleventh aspect, the present invention provides a leasing system for sharing a drone, including: a terminal according to a seventh aspect, a key production center according to an eighth aspect, a drone management platform according to a ninth aspect.
According to the renting method, the equipment and the system for the shared unmanned aerial vehicle, the terminal sends a first request message to the key production center, wherein the first request message comprises the identity of the terminal, so that the key production center generates a private key for the terminal; sending a second request message to the unmanned aerial vehicle management platform, wherein the second request message comprises the identity of the terminal, so that the unmanned aerial vehicle management platform can generate a public key for the terminal; and then the unmanned aerial vehicle management platform uses the public key to encrypt the unmanned aerial vehicle lease right message, and the terminal uses the private key to decrypt the unmanned aerial vehicle lease right message, so as to obtain the lease right of the unmanned aerial vehicle. Through the process, the safety of the information between the unmanned aerial vehicle management platform and the terminal is guaranteed, and the unmanned aerial vehicle management platform is prevented from being attacked by the outside.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of operation in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The invention provides a shared unmanned aerial vehicle renting method and system, wherein an encryption technology based on identification is adopted, an unmanned aerial vehicle management platform uses a public key to encrypt unmanned aerial vehicle renting right information, and a terminal uses a private key to decrypt the unmanned aerial vehicle renting right information, so that the safety of information between the unmanned aerial vehicle management platform and the terminal is ensured, and the unmanned aerial vehicle management platform is prevented from being attacked by the outside.
The technical solution of the present invention will be described in detail below with specific examples. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments.
Fig. 1 is an architecture diagram of a shared unmanned aerial vehicle leasing system provided in the present invention, and as shown in fig. 1, the unmanned aerial vehicle leasing system includes: terminal, unmanned aerial vehicle management platform and key production center. The terminal is a terminal device used by a user, and includes but is not limited to electronic devices such as a mobile phone, a tablet computer, a notebook computer and the like; the unmanned aerial vehicle management platform is an unmanned aerial vehicle management server, can receive an unmanned aerial vehicle renting request of the terminal, and provides unmanned aerial vehicle renting right information for the terminal. The key production center may be a key management server for managing public and private keys of all terminals.
Among the prior art, the user can log in unmanned aerial vehicle management platform through modes such as user terminal APP, scanning two-dimensional code when using shared unmanned aerial vehicle, then with personal information and lease information input back, unmanned aerial vehicle management platform returns shared unmanned aerial vehicle's lease right information for the user. However, in the shared unmanned aerial vehicle renting process, the security of the interactive information between the user terminal and the unmanned aerial vehicle management platform cannot be guaranteed, and the possibility of being attacked exists.
As shown in fig. 1, in the shared unmanned aerial vehicle renting system provided by the invention, a public key and a private key used by a key production center for managing a terminal are added, so that an unmanned aerial vehicle management platform encrypts an unmanned aerial vehicle renting right message by using the public key, the terminal decrypts the unmanned aerial vehicle renting right message by using the private key, a safe information interaction channel is constructed between the terminal and the unmanned aerial vehicle management platform, and the safety of interaction information is ensured.
Fig. 2 is a flowchart of a first embodiment of a method for leasing a shared drone, where an execution subject of the embodiment may be the terminal in fig. 1. As shown in fig. 2, the method of the present embodiment includes:
s21: and sending a first request message to a key production center, wherein the first request message comprises the identity of the terminal.
S22: receiving a first authentication message sent by a key production center, wherein the first authentication message comprises a private key, and the private key is obtained by the key production center through calculation by using preset parameters and the identity of the terminal.
Specifically, before acquiring the lease right of the shared unmanned aerial vehicle, the terminal needs to acquire a private key from a key production center through a first request message. The key production center can be a trusted third party, and the key production center can perform operation by using preset parameters and a preset algorithm according to an identity provided by the terminal to obtain a private key of the terminal and send the private key to the terminal through a first authentication message, wherein the preset parameters can be generated according to the preset algorithm at the initialization stage of the key production center.
The time when the terminal sends the first request message to the key production center is not particularly limited, and may be any time before acquiring the lease right of the shared drone. In an optional implementation manner, when the terminal registers on the drone management platform, the terminal sends a first request message to the key production center. In another optional implementation manner, after acquiring the unmanned aerial vehicle lease right message sent by the unmanned aerial vehicle management platform, when finding that the message is an encrypted message and has no corresponding decryption private key, the terminal sends a first request message to the key production center to request the private key.
Optionally, the identity of the terminal is any string of meaningful characters, including but not limited to: the email address, the mobile phone number, the identity number, etc. of the user.
S23: and sending a second request message to the unmanned aerial vehicle management platform, wherein the second request message comprises the identity of the terminal, and the second message is used for indicating the unmanned aerial vehicle management platform to generate a public key for the terminal according to the identity of the terminal and the preset parameters.
Specifically, in this embodiment, an encryption scheme based on an identifier is adopted, the encryption scheme based on the identifier adopts an asymmetric encryption technology, taking a communication process between a sender a and a receiver B as an example, the sender a encrypts a plaintext by using a public key of the receiver B to obtain a ciphertext, and the receiver B decrypts the ciphertext by using a private key of the receiver B after receiving the ciphertext to obtain the plaintext. Therefore, in this embodiment, the terminal sends the second request message to the unmanned aerial vehicle management platform, including the identity at the terminal, so that the unmanned aerial vehicle management platform can obtain the public key corresponding to the terminal according to the identity at the terminal, and then the unmanned aerial vehicle management platform can encrypt the unmanned aerial vehicle lease right message according to the public key at the terminal.
The unmanned aerial vehicle management platform can calculate according to preset parameters and the identity of the terminal, and a public key is generated for the terminal. The preset parameters are used by the key production center for generating the private key for the terminal. The method for acquiring the preset parameters by the unmanned aerial vehicle management platform is not particularly limited. In an optional implementation manner, after the key production center generates the preset parameters in an initialization stage, the preset parameters are sent to the unmanned aerial vehicle management platform. In another optional implementation, when the unmanned aerial vehicle management platform needs to use the preset parameters, the unmanned aerial vehicle management platform sends a request message to the key production center for acquisition.
It can be understood that the terminal needs to send the second request message to the unmanned aerial vehicle management platform before applying for the right of hiring to the unmanned aerial vehicle management platform for the unmanned aerial vehicle management platform can in time obtain the public key that this terminal corresponds, and then can adopt when sending the unmanned aerial vehicle right of hiring message to the terminal the public key is encrypted. In an optional implementation manner, the terminal sends the second request message to the drone management platform when logging in the drone management platform.
S24: receiving an unmanned aerial vehicle lease right message sent by an unmanned aerial vehicle management platform, wherein the unmanned aerial vehicle lease right message is a message encrypted by using the public key.
S25: and decrypting the unmanned aerial vehicle lease right message by using the private key to obtain the lease right of the unmanned aerial vehicle.
After the unmanned aerial vehicle management platform distributes the rental right of the unmanned aerial vehicle for the terminal, the public key is used for encrypting and sending the rental right message of the unmanned aerial vehicle to the terminal, and the terminal uses the private key to decrypt the rental right message of the unmanned aerial vehicle, so that the rental right of the unmanned aerial vehicle is obtained. Because only the terminal has the private key, other people can not attack the unmanned aerial vehicle rental right message, and the safety of message interaction of the shared unmanned aerial vehicle rental system is ensured.
In this embodiment, a terminal sends a first request message to a key production center, where the first request message includes an identity of the terminal, so that the key production center generates a private key for the terminal; sending a second request message to the unmanned aerial vehicle management platform, wherein the second request message comprises the identity of the terminal, so that the unmanned aerial vehicle management platform can generate a public key for the terminal; and then the unmanned aerial vehicle management platform uses the public key to encrypt the unmanned aerial vehicle lease right message, and the terminal uses the private key to decrypt the unmanned aerial vehicle lease right message, so as to obtain the lease right of the unmanned aerial vehicle. Through the process, the safety of the information between the unmanned aerial vehicle management platform and the terminal is guaranteed, and the unmanned aerial vehicle management platform is prevented from being attacked by the outside.
Fig. 3A is a flowchart of a second embodiment of the method for leasing a shared unmanned aerial vehicle according to the present invention, and fig. 3B is a signaling flowchart of the second embodiment of the method for leasing a shared unmanned aerial vehicle according to the present invention, and in conjunction with fig. 3A and fig. 3B, the present embodiment describes in detail an interaction process of a leasing system of a shared unmanned aerial vehicle.
As shown in fig. 3A and 3B, the method of the present embodiment includes:
s31: the terminal sends a first request message to the key production center, wherein the first request message comprises the identity of the terminal.
S32: and the key production center uses the preset parameters and the identity identification of the terminal to carry out operation and generates a private key for the terminal.
S33: and the key production center sends a first authentication message to the terminal, wherein the first authentication message comprises a private key.
S34: and the terminal sends a second request message to the unmanned aerial vehicle management platform, wherein the second request message comprises the identity of the terminal.
S35: and the unmanned aerial vehicle management platform generates a public key for the terminal according to the preset parameters and the identity of the terminal.
S36: the unmanned aerial vehicle management platform encrypts the unmanned aerial vehicle lease right message by using the public key.
S37: and the unmanned aerial vehicle management platform sends an unmanned aerial vehicle lease right message to the terminal.
S38: the terminal decrypts the unmanned aerial vehicle lease right message by using the private key to obtain the lease right of the unmanned aerial vehicle.
For a specific implementation process of this embodiment, reference may be made to the detailed description of the first embodiment, which is not described herein again.
In addition, it should be noted that, in this embodiment, a message interaction process in a leasing system of a shared drone is illustrated in one scenario. It is to be understood that the present invention is not limited to the execution sequence of the above steps, and the above steps may have different execution sequences according to specific application scenarios.
Optionally, before S35 in this embodiment, the method may further include: and the key production center sends a second authentication message to the unmanned aerial vehicle management platform, wherein the second authentication message comprises the preset parameters.
It should be noted that the above steps may be performed at any position before S25, and the present invention is not limited in this respect.
In this embodiment, a terminal sends a first request message to a key production center, where the first request message includes an identity of the terminal, so that the key production center generates a private key for the terminal; sending a second request message to the unmanned aerial vehicle management platform, wherein the second request message comprises the identity of the terminal, so that the unmanned aerial vehicle management platform can generate a public key for the terminal; and then the unmanned aerial vehicle management platform uses the public key to encrypt the unmanned aerial vehicle lease right message, and the terminal uses the private key to decrypt the unmanned aerial vehicle lease right message, so as to obtain the lease right of the unmanned aerial vehicle. Through the process, the safety of the information between the unmanned aerial vehicle management platform and the terminal is guaranteed, and the unmanned aerial vehicle management platform is prevented from being attacked by the outside.
Fig. 4A is a flowchart of a third embodiment of a renting method for a shared unmanned aerial vehicle according to the present invention, and fig. 4B is a signaling flowchart of the third embodiment of the renting method for a shared unmanned aerial vehicle according to the present invention.
As shown in fig. 4A and 4B, the method of the present embodiment includes:
s41: the terminal sends a first request message to a key production center, wherein the first request message comprises an identity of the terminal and a token carrying an expiration date.
S42: and the key production center uses preset parameters and the identity of the terminal to carry out operation in the validity period of the token so as to generate a private key for the terminal.
S43: and the key production center sends a first authentication message to the terminal, wherein the first authentication message comprises the private key and the token carrying the expiration date.
S44: and the terminal sends a confirmation message to the key production center, wherein the confirmation message comprises the token carrying the expiration date.
On the basis of the foregoing embodiment, in the method of this embodiment, when the terminal sends the first request message to the key production center, the terminal further includes a token with a validity period in the first request message, so that the key production center generates a private key for the terminal in the validity period of the token, and sends the first authentication message to the terminal in the validity period of the token, and further, the terminal sends the confirmation message to the key production center in the validity period of the token.
In this embodiment, through adding the token mechanism, can further improve the security of message interaction in the shared unmanned aerial vehicle system of renting. Specifically, on one hand, the duration of the token validity period can be reasonably set, so that other people cannot attack the token within the token validity period. For example, the terminal may set a short validity period for the token according to the network state, so that others cannot perform network attack within the short validity period. On the other hand, the terminal and the key production center can also determine the security of the network according to the validity period of the token. For example, if the terminal does not receive the corresponding first authentication message within the validity period of the token after sending the first request message, the first request message may be resent, so that the key production center redistributes the private key for the terminal.
Fig. 5 is a schematic structural diagram of a first embodiment of a renting apparatus for sharing an unmanned aerial vehicle according to the present invention, where the apparatus of this embodiment may be disposed in a terminal. As shown in fig. 5, the renting apparatus 500 of the shared drone of the present embodiment may include: a sending module 501, a receiving module 502 and a decryption module 503.
The sending module 501 is configured to send a first request message to a key generation center, where the first request message includes an identity of the terminal.
A receiving module 502, configured to receive a first authentication message sent by a key production center, where the first authentication message includes a private key, and the private key is obtained by performing an operation by using a preset parameter and an identity of the terminal by the key production center.
The sending module 501 is further configured to send a second request message to the unmanned aerial vehicle management platform, where the second request message includes the identity of the terminal, and the second message is used to instruct the unmanned aerial vehicle management platform to generate a public key for the terminal according to the identity of the terminal and the preset parameter.
The receiving module 502 is further configured to receive a drone lease right message sent by the drone management platform, where the drone lease right message is a message encrypted by using the public key.
A decryption module 503, configured to decrypt the unmanned aerial vehicle lease right message by using the private key, so as to obtain the lease right of the unmanned aerial vehicle.
Optionally, the first request message further includes a token with a validity period, where the token is used to instruct the key production center to generate a private key for the terminal within the validity period of the token; correspondingly, the first authentication message further includes the token carrying the validity period.
Optionally, the sending module 501 is further configured to send a confirmation message to the key production center, where the confirmation message includes the token with the expiration date.
The renting device for sharing the unmanned aerial vehicle can be used for executing the technical scheme of the terminal side in any one of the method embodiments, the implementation principle and the technical effect are similar, and the details are not repeated here.
Fig. 6 is a schematic structural diagram of a second embodiment of the shared unmanned aerial vehicle renting apparatus provided in the present invention, and the apparatus of this embodiment may be disposed in a key production center. As shown in fig. 6, the renting apparatus 600 for shared drones of this embodiment may include: a receiving module 601, a processing module 602 and a sending module 603.
The receiving module 601 is configured to receive a first request message sent by a terminal, where the first request message includes an identity of the terminal.
The processing module 602 is configured to perform an operation using preset parameters and the identity of the terminal, and generate a private key for the terminal.
The sending module 603 is configured to send a first authentication message to the terminal, where the first authentication message includes the private key, and the private key is used for the terminal to decrypt an unmanned aerial vehicle lease right message received from an unmanned aerial vehicle management platform.
Optionally, the first message further includes a token carrying an expiration date; correspondingly, the processing module 602 is specifically configured to perform an operation using preset parameters and the identity of the terminal in the validity period of the token, and generate a private key for the terminal; the first authentication message further includes the token carrying the validity period.
Optionally, the receiving module 601 is further configured to receive a confirmation message sent by the terminal, where the confirmation message includes the token carrying the expiration date.
Optionally, the sending module 603 is further configured to send a second authentication message to the drone management platform, where the second authentication message includes the preset parameter.
The renting device of the shared unmanned aerial vehicle can be used for executing the technical scheme of the key production center side in any one of the method embodiments, the implementation principle and the technical effect are similar, and the description is omitted here.
Fig. 7 is a schematic structural diagram of a third embodiment of the shared-drone leasing device provided by the present invention, and the device of this embodiment may be disposed in a drone management platform. As shown in fig. 7, the renting apparatus 700 of the shared drone of the present embodiment may include: a receiving module 701, a processing module 702, an encryption module 703 and a sending module 704.
A receiving module 701, configured to receive a second request message sent by a terminal, where the second request message includes an identity of the terminal.
A processing module 702, configured to generate a public key for the terminal according to a preset parameter and the identity of the terminal.
An encryption module 703, configured to encrypt the unmanned aerial vehicle lease right message by using the public key.
A sending module 704, configured to send the unmanned aerial vehicle lease right message to the terminal, so that the terminal decrypts the unmanned aerial vehicle lease right message by using a private key to obtain a lease right of the unmanned aerial vehicle; and the private key is obtained by the secret key production center through calculation by using the preset parameters and the identity of the terminal.
Optionally, the receiving module 701 is further configured to receive a second authentication message sent by the key production center, where the second authentication message includes the preset parameter.
The renting device for sharing the unmanned aerial vehicle can be used for executing the technical scheme of the unmanned aerial vehicle management platform side in any method embodiment, the implementation principle and the technical effect are similar, and the description is omitted here.
Fig. 8 is a schematic structural diagram of an embodiment of a terminal provided in the present invention, and as shown in fig. 8, the terminal 800 of this embodiment may include: the system comprises a memory 801, a processor 802 and a computer program, wherein the computer program is stored in the memory 801 and is configured to be executed by the processor 802 to implement the technical scheme at the terminal side in any of the above method embodiments, and the implementation principle and the technical effect are similar, and are not described herein again.
Fig. 9 is a schematic structural diagram of an embodiment of a key production center provided in the present invention, and as shown in fig. 9, the key production center 900 of this embodiment may include: a memory 901, a processor 902 and a computer program, where the computer program is stored in the memory 901 and configured to be executed by the processor 902 to implement the technical solution at the key production center side in any of the above method embodiments, and the implementation principle and the technical effect thereof are similar and are not described herein again.
Fig. 10 is a schematic structural diagram of an embodiment of the unmanned aerial vehicle management platform provided in the present invention, and as shown in fig. 10, the unmanned aerial vehicle management platform 1000 of the present embodiment may include: the system comprises a memory 1001, a processor 1002 and a computer program, wherein the computer program is stored in the memory 1001 and is configured to be executed by the processor 1002 to implement the technical solution on the side of the unmanned aerial vehicle management platform in any one of the above method embodiments, and the implementation principle and the technical effect are similar, and are not described herein again.
An embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored, where the computer program is executed by a processor, and may implement a technical solution on a terminal side in any one of the above method embodiments, or may implement a technical solution on a key production center side in any one of the above method embodiments, or may implement a technical solution on an unmanned aerial vehicle management platform side in any one of the above method embodiments, where an implementation principle and a technical effect are similar, and are not described herein again.
Fig. 11 is a schematic structural diagram of an embodiment of a shared unmanned aerial vehicle renting system provided in the present invention, and as shown in fig. 11, the shared unmanned aerial vehicle renting system 1100 of the present embodiment may include: the terminal 1101, the key production center 1102 and the drone management platform 1103 are provided, wherein the terminal 1101 may adopt a structure shown in fig. 8, the key production center 1102 may adopt a structure shown in fig. 9, and the drone management platform 1103 may adopt a structure shown in fig. 10. The shared unmanned aerial vehicle renting system of this embodiment can be used for executing the technical scheme of any one of the above method embodiments, and the implementation principle and technical effect thereof are similar and are not described herein again.
The sign language translation system of this embodiment may be configured to execute the technical solution in any of the method embodiments, and the implementation principle and the technical effect are similar, which are not described herein again.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, a division of a unit is merely a logical division, and an actual implementation may have another division, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device) or a processor (processor) to execute some steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: a U disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In the foregoing embodiments of the network device or the terminal device, it should be understood that the Processor may be a Central Processing Unit (CPU), or may be other general-purpose processors, Digital Signal Processors (DSP), Application Specific Integrated Circuits (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present application may be embodied directly in a hardware processor, or in a combination of the hardware and software modules in the processor.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.