CN114916248B - Unmanned aerial vehicle loss authentication method and system, terminal equipment and remote control equipment - Google Patents

Unmanned aerial vehicle loss authentication method and system, terminal equipment and remote control equipment Download PDF

Info

Publication number
CN114916248B
CN114916248B CN202080081314.2A CN202080081314A CN114916248B CN 114916248 B CN114916248 B CN 114916248B CN 202080081314 A CN202080081314 A CN 202080081314A CN 114916248 B CN114916248 B CN 114916248B
Authority
CN
China
Prior art keywords
unmanned aerial
aerial vehicle
remote controller
identification information
remote control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202080081314.2A
Other languages
Chinese (zh)
Other versions
CN114916248A (en
Inventor
袁一然
陈卓伟
闫伟
樊雪枫
俞晟阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SZ DJI Technology Co Ltd
Original Assignee
SZ DJI Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SZ DJI Technology Co Ltd filed Critical SZ DJI Technology Co Ltd
Publication of CN114916248A publication Critical patent/CN114916248A/en
Application granted granted Critical
Publication of CN114916248B publication Critical patent/CN114916248B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Selective Calling Equipment (AREA)

Abstract

The embodiment of the application discloses an unmanned aerial vehicle loss authentication method, which is applied to terminal equipment and comprises the following steps: acquiring an operation of confirming the loss authentication of a first unmanned aerial vehicle on a display interface of terminal equipment by a user; responding to the confirmation to perform the operation of losing authentication, and determining that the remote controller currently connected with the terminal equipment is a first remote controller uniquely bound by the first unmanned aerial vehicle, wherein the first unmanned aerial vehicle can only be controlled by the uniquely bound first remote controller; and carrying out data modification on the first remote controller according to the identification information of the first unmanned aerial vehicle so as to eliminate the control capability of the first remote controller on the first unmanned aerial vehicle. The method disclosed by the embodiment of the application can remotely lock the unmanned aerial vehicle, and effectively carries out loss authentication on the unmanned aerial vehicle.

Description

Unmanned aerial vehicle loss authentication method and system, terminal equipment and remote control equipment
Technical Field
The application relates to the technical field of unmanned aerial vehicles, in particular to an unmanned aerial vehicle loss authentication method and system, a mobile equipment loss authentication method, terminal equipment, remote control equipment and a computer readable storage medium.
Background
At present, unmanned aerial vehicles are increasingly applied, for example, widely applied to the fields of aerial photography, mapping and the like, and the technology is also becoming mature. But is limited by sensor technology, obstacle avoidance algorithm and flight control, and flight faults such as unmanned aerial vehicle frying, signal loss and the like are difficult to avoid in the unmanned aerial vehicle flight process. How to carry out loss authentication after the loss problem caused by flight faults becomes a problem to be solved in the unmanned aerial vehicle field.
Disclosure of Invention
In view of this, the embodiment of the application provides a method for authenticating loss of an unmanned aerial vehicle, which aims at solving the technical problem of how to authenticate loss of the unmanned aerial vehicle.
An embodiment of the present application provides a method for authenticating loss of an unmanned aerial vehicle, applied to a terminal device, including:
acquiring an operation of confirming the loss authentication of a first unmanned aerial vehicle on a display interface of terminal equipment by a user;
responding to the confirmation to perform the operation of losing authentication, and determining that the remote controller currently connected with the terminal equipment is a first remote controller uniquely bound by the first unmanned aerial vehicle, wherein the first unmanned aerial vehicle can only be controlled by the uniquely bound first remote controller;
and carrying out data modification on the first remote controller according to the identification information of the first unmanned aerial vehicle so as to eliminate the control capability of the first remote controller on the first unmanned aerial vehicle.
A second aspect of the embodiments of the present application provides an unmanned aerial vehicle loss authentication method, applied to a terminal device, including:
acquiring an operation of confirming the loss authentication of a first unmanned aerial vehicle on a display interface of terminal equipment by a user;
responding to the confirmation to perform the operation of losing authentication, and determining that the remote controller currently connected with the terminal equipment is a first remote controller uniquely bound by the first unmanned aerial vehicle recorded in a server, wherein the first unmanned aerial vehicle can only be controlled by the uniquely bound first remote controller;
and acquiring the identification information of the first unmanned aerial vehicle from the server, and carrying out data modification on the first remote controller according to the identification information of the first unmanned aerial vehicle so as to eliminate the control capability of the first remote controller on the first unmanned aerial vehicle.
A third aspect of the embodiments of the present application provides a method for authenticating loss of an unmanned aerial vehicle, which is applied to a remote control device, and includes:
acquiring an operation of confirming the loss authentication of the first unmanned aerial vehicle on a display interface of the remote control equipment by a user;
responding to the confirmation to perform the operation of losing authentication, and determining that the remote control equipment is a first remote control equipment uniquely bound by the first unmanned aerial vehicle, wherein the first unmanned aerial vehicle can only be controlled by the uniquely bound first remote control equipment;
And carrying out data modification on the first remote control equipment according to the identification information of the first unmanned aerial vehicle so as to eliminate the control capability of the first remote control equipment on the first unmanned aerial vehicle.
A fourth aspect of the present embodiment provides a method for mobile device loss authentication, which is applied to a terminal device, and includes:
acquiring an operation of confirming the loss authentication of the first movable equipment on a display interface of the terminal equipment by a user;
responding to the confirmation to perform the operation of losing authentication, and determining that the remote controller currently connected with the terminal equipment is a first remote controller uniquely bound to the first movable equipment, wherein the first movable equipment can only be controlled by the uniquely bound first remote controller;
and carrying out data modification on the first remote controller according to the identification information of the first movable equipment so as to eliminate the control capability of the first remote controller on the first movable equipment.
A fifth aspect of the embodiments of the present application provides a terminal device, including: a processor and a memory storing a computer program, the processor implementing the unmanned aerial vehicle loss authentication method provided in the first aspect above when executing the computer program.
A sixth aspect of the embodiments of the present application provides a terminal device, including: a processor and a memory storing a computer program, the processor implementing the unmanned aerial vehicle loss authentication method provided in the second aspect above when executing the computer program.
A seventh aspect of the embodiments of the present application provides a terminal device, including: a processor and a memory storing a computer program, the processor implementing the unmanned aerial vehicle loss authentication method provided in the third aspect above when executing the computer program.
An eighth aspect of the embodiments of the present application provides an unmanned aerial vehicle loss authentication system, including: the system comprises terminal equipment, a remote controller and a server, wherein the terminal equipment is respectively connected with the remote controller and the server;
the server pre-records binding information of a first unmanned aerial vehicle and a first remote controller, wherein the first unmanned aerial vehicle is uniquely bound with the first remote controller and can be controlled by the first remote controller only, and the binding information at least comprises identification information of the first unmanned aerial vehicle and identification information of the first remote controller;
the terminal equipment is used for acquiring the operation of confirming the loss authentication of the first unmanned aerial vehicle on a display interface by a user; responding to the confirmation to perform the operation of losing authentication, acquiring the identification information of the first remote controller from the server, and determining whether the currently connected remote controller is the first remote controller according to the identification information of the first remote controller; if the remote controller is determined to be the first remote controller, acquiring the identification information of the first unmanned aerial vehicle from the server, and carrying out data modification on the first remote controller according to the identification information of the first unmanned aerial vehicle so as to eliminate the control capability of the first remote controller on the first unmanned aerial vehicle; and feeding back the result of the data modification to the server to complete authentication.
A ninth aspect of the embodiments of the present application provides a computer readable storage medium storing a computer program, which when executed by a processor implements the unmanned aerial vehicle loss authentication method provided in the first aspect.
A tenth aspect of the embodiments of the present application provides a computer readable storage medium storing a computer program, which when executed by a processor, implements the unmanned aerial vehicle loss authentication method provided in the second aspect.
An eleventh aspect of the embodiments of the present application provides a computer readable storage medium storing a computer program, which when executed by a processor implements the unmanned aerial vehicle loss authentication method provided in the third aspect.
According to the unmanned aerial vehicle authentication loss method, after a user requests to lose authentication of a first unmanned aerial vehicle, the operation capability of the first remote controller uniquely bound with the first unmanned aerial vehicle to the first unmanned aerial vehicle is eliminated, so that although the first unmanned aerial vehicle still only 'recognizes' the first remote controller, namely only the first remote controller is allowed to operate the first remote controller, the first remote controller loses the operation capability of the first unmanned aerial vehicle, at the moment, the first unmanned aerial vehicle is equivalent to being in a locking state without any remote controller capable of being operated, the loss authentication of the first unmanned aerial vehicle is effectively realized, the user does not have a fraudulent-guarantee motivation, the unmanned aerial vehicle with successful loss authentication can be subjected to claim management, and the quality of after-sale service is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort to a person skilled in the art.
Fig. 1 is a flowchart of a first unmanned aerial vehicle loss authentication method provided in an embodiment of the present application.
Fig. 2 to 8 are diagrams of an interactive interface provided in an embodiment of the present application, respectively.
Fig. 9 is a flowchart of a second unmanned aerial vehicle authentication loss method provided in an embodiment of the present application.
Fig. 10 is a flowchart of a third method for losing authentication of a drone according to an embodiment of the present application.
Fig. 11 is a flowchart of a method for losing authentication of a mobile device according to an embodiment of the present application.
Fig. 12 is a schematic structural diagram of a terminal device provided in an embodiment of the present application.
Fig. 13 is a schematic structural diagram of a remote control device according to an embodiment of the present application.
Fig. 14 is a schematic structural diagram of an unmanned aerial vehicle loss authentication system provided in an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
After-sales services are various services provided after a product is sold, people pay attention to the after-sales services of the product in addition to the product per se when buying a product, and the after-sales services of the product can improve the market competitiveness of the product to a certain extent. After-market service of the drone is an important factor considered by the user when purchasing the drone. After purchasing the drone, the user may also purchase after-market service products of the drone, such as DJI Care, for better quality after-market service. After purchasing the after-market service product of the unmanned aerial vehicle, the user can enjoy more comprehensive warranty service, so that the unmanned aerial vehicle can be used more safely.
However, even in the case of after-sales service products such as DJI Care, the unmanned aerial vehicle is not kept in the guaranteed range, that is, no claims are paid for the unmanned aerial vehicle loss. This is so because it cannot be determined whether the user is truly missing the drone or is cheating. The absence of claims for the case of loss of the drone increases the concern when the user purchases the drone, since loss of the drone is not a very probable event, and on the other hand, the user may risk getting back to dangerous areas (e.g. cliffs) in order to be able to obtain the claims, resulting in personal accidents.
The unmanned aerial vehicle is lost and happens sometimes, for example, the unmanned aerial vehicle may fall due to collision in the flying process, lose connection due to poor signals or forcedly fall due to insufficient electric quantity, in these cases, the place where the unmanned aerial vehicle falls or falls may be a place where a user is difficult to find, or may be a place where the user cannot reach, such as a cliff, etc., so that the user cannot provide a real object of the unmanned aerial vehicle when claiming claims, and is considered as the situation where the unmanned aerial vehicle is lost, and claims are not paid.
In order to solve the problems, the embodiment of the application provides a loss authentication method for an unmanned aerial vehicle, which can lock the unmanned aerial vehicle remotely, so that the unmanned aerial vehicle is in a state that the unmanned aerial vehicle cannot be controlled by any remote controller, and the loss authentication for the unmanned aerial vehicle is effectively realized.
Referring to fig. 1, fig. 1 is a flowchart of a first unmanned aerial vehicle loss authentication method provided in an embodiment of the present application, where the method may be applied to a terminal device, and the method may include the following steps:
s102, acquiring an operation of confirming the loss authentication of the first unmanned aerial vehicle on a display interface of the terminal equipment by a user.
And S104, responding to the confirmation to perform the operation of losing authentication, and determining that the remote controller currently connected with the terminal equipment is a first remote controller uniquely bound by the first unmanned aerial vehicle.
S106, carrying out data modification on the first remote controller according to the identification information of the first unmanned aerial vehicle so as to eliminate the control capability of the first remote controller on the first unmanned aerial vehicle.
The terminal equipment can be any intelligent equipment such as a mobile phone, a tablet personal computer and the like, and in one implementation mode, an application program can be installed on the terminal equipment, and the unmanned aerial vehicle loss authentication method provided by the embodiment of the application is realized through the application program.
The first drone may be used to refer to any drone that the user wants to perform loss authentication, and the first remote control may be used to refer to the remote control to which the first drone is uniquely bound prior to loss. It should be noted that, the only binding is for the first unmanned aerial vehicle, that is, the first unmanned aerial vehicle can only bind one remote controller, and after the remote controller is bound, the first unmanned aerial vehicle can only be controlled by the bound remote controller, and other remote controllers can not control the first unmanned aerial vehicle. But a remote controller can bind a plurality of unmanned aerial vehicles, for example, a first remote controller can be a remote controller with which a first unmanned aerial vehicle and a second unmanned aerial vehicle are bound only at the same time.
The binding of the first drone to the first remote control is done prior to losing authentication. In one embodiment, the user may first establish connection between the first unmanned aerial vehicle and the first remote controller and connect between the first unmanned aerial vehicle and the terminal device, and implement binding between the first unmanned aerial vehicle and the first remote controller by performing corresponding operations on a display interface of the terminal device. Here, the user operation may be a touch operation, an operation on a physical key, a gesture operation, or the like. After the terminal device obtains the operation of confirming and binding the first unmanned aerial vehicle and the first remote controller, which is carried out on the display interface by the user, the binding relationship between the first unmanned aerial vehicle and the first remote controller can be established.
When the binding relationship between the first unmanned aerial vehicle and the first remote controller is established, various embodiments can be provided, and two embodiments are provided herein, and for convenience of reference, the two embodiments can be respectively referred to as a first embodiment and a second embodiment.
In the first embodiment, the identification information of the first remote controller may be obtained from the first remote controller, and the identification information of the first remote controller may be written into the first unmanned aerial vehicle, so as to complete the unique binding between the first unmanned aerial vehicle and the first remote controller. After the first unmanned aerial vehicle records the identification information of the first remote controller, whether the remote controller which is currently requested to be connected is the first remote controller or not can be determined according to the recorded identification information of the first remote controller when the first unmanned aerial vehicle is connected with the remote controller each time, if so, connection can be established, control of the remote controller is accepted, otherwise, connection can be refused, and only the first remote controller can carry out unique binding effect of controlling the first unmanned aerial vehicle.
In the second embodiment, in addition to writing the identification information of the first remote controller to the first unmanned aerial vehicle, the identification information of the first unmanned aerial vehicle acquired from the first unmanned aerial vehicle may be written to the first remote controller. In other words, in the second embodiment, the first unmanned aerial vehicle and the first remote controller can write identification information of each other. Here, as described above, the first unmanned aerial vehicle can only bind the first remote controller, that is, the first unmanned aerial vehicle can only write the identification information of one remote controller, but the first remote controller can bind a plurality of unmanned aerial vehicles instead of only binding one unmanned aerial vehicle, specifically, the identification information of a plurality of unmanned aerial vehicles can be written in the first remote controller.
If the first unmanned aerial vehicle and the first remote controller write in the identification information of the other party mutually, the first unmanned aerial vehicle can determine whether the currently connected remote controller is the first remote controller according to the identification information of the first remote controller recorded by the first unmanned aerial vehicle when being connected with any remote controller, if so, connection can be established, and if not, connection can be refused. Correspondingly, when the first remote controller is connected with any unmanned aerial vehicle, whether the currently connected unmanned aerial vehicle is the first unmanned aerial vehicle can be determined according to the identification information of the first unmanned aerial vehicle recorded by the first remote controller, if so, connection can be established, and if not, connection can be refused. In other words, the first unmanned aerial vehicle and the first remote controller need to verify the identification information of the other party in the process of interconnection, and if the mutual verification is successful, the first unmanned aerial vehicle and the first remote controller are connected with each other.
The binding relationship between the first unmanned aerial vehicle and the first remote controller needs to be recorded in the server. Specifically, when the terminal device confirms that the first unmanned aerial vehicle and the first remote controller are to be bound according to the operation of the user, the terminal device can acquire corresponding binding information and send the corresponding binding information to the server, so that the server can record the binding relationship. Here, the binding information may include at least identification information of the first unmanned aerial vehicle and identification information of the first remote controller, so that the server may establish a binding relationship between the first unmanned aerial vehicle and the first remote controller.
In another embodiment, the server may establish a binding relationship between the currently logged-in user account, the first drone, and the first remote control. Before binding the three, a user registers a user account, and after the user is connected with the first unmanned aerial vehicle through the first remote controller, the identification information of the first unmanned aerial vehicle is obtained, and the user account is bound with the first unmanned aerial vehicle. And then based on the binding operation of the first remote controller and the first unmanned aerial vehicle, acquiring the identification information of the first remote controller and the identification information of the first unmanned aerial vehicle, and establishing a binding relationship among the currently logged-in user account, the first unmanned aerial vehicle and the first remote controller.
After the first unmanned aerial vehicle is bound with the first remote controller, if the first unmanned aerial vehicle is lost, the user can carry out loss authentication on the first unmanned aerial vehicle. When losing authentication, for locking first unmanned aerial vehicle, can eliminate the first remote controller that first unmanned aerial vehicle is unique to bind to the ability of controlling of first unmanned aerial vehicle, so, because first unmanned aerial vehicle can not already be controlled by the remote controller other than first remote controller, first remote controller also can not control first unmanned aerial vehicle after losing authentication, consequently first unmanned aerial vehicle will be in the locking state that does not have the remote controller to control, the authentication of losing to first unmanned aerial vehicle has effectively been realized, make the user not have the motivation of cheating the insurance, can manage the unmanned aerial vehicle that loses authentication success.
In this embodiment, the operation of losing authentication includes a unbinding operation. The terminal equipment responds to unbinding operation of a user point, and carries out data modification on the first remote controller according to the identification information of the first unmanned aerial vehicle so as to unbinding the first unmanned aerial vehicle and the first remote controller, thereby eliminating the control capability of the first remote controller on the first unmanned aerial vehicle
Before eliminating the control capability of the first remote controller on the first unmanned aerial vehicle, it is necessary to determine whether the remote controller currently connected with the terminal device is the only first remote controller bound with the first unmanned aerial vehicle. Specifically, the identification information of the first remote controller bound to the first unmanned aerial vehicle can be obtained from the server, the identification information of the currently connected remote controller can be obtained, and whether the currently connected remote controller is the first remote controller can be determined by comparing the identification information of the currently connected remote controller with the identification information of the first remote controller. When the currently connected remote controller is determined to be the first remote controller, the operation capability of the first remote controller on the first unmanned aerial vehicle can be eliminated for the first remote controller.
When the operation capability of the first remote controller on the first unmanned aerial vehicle is eliminated, namely, the binding relationship between the first remote controller and the first unmanned aerial vehicle is released, the operation capability can be realized by modifying the data of the first remote controller. Specifically, in one embodiment, if the binding relationship between the first remote controller and the first unmanned aerial vehicle is established through the first embodiment, that is, only the identification information of the first remote controller is written in the first unmanned aerial vehicle, and the first remote controller does not write the identification information of the first unmanned aerial vehicle, the identification information of the first unmanned aerial vehicle recorded during binding can be obtained from the server, and the identification information of the first unmanned aerial vehicle is written in the control blacklist of the first remote controller, so that the first remote controller loses the control capability of the first unmanned aerial vehicle. Here, the control blacklist may be preconfigured in the remote controller for storing identification information of the unmanned aerial vehicle to be refused to be controlled by the remote controller.
If the binding relationship between the first remote controller and the first unmanned aerial vehicle is established through the first embodiment, in one embodiment, after the user confirms the operation of performing the loss authentication on the first unmanned aerial vehicle, prompt information for prompting the user to send the first remote controller back to the after-sales department may be displayed on a display interface of the terminal device. Because the first remote controller is uniquely bound to the first unmanned aerial vehicle, the user can lose the unique means capable of controlling the first unmanned aerial vehicle by sending the first remote controller back to the after-sales department by the user, so that the lost authentication of the first unmanned aerial vehicle is realized, and the effect of preventing cheating protection is achieved.
In one embodiment, if the binding relationship between the first remote controller and the first unmanned aerial vehicle is established through the second embodiment, that is, the first unmanned aerial vehicle and the first remote controller both write the identification information of the other party, when the control capability of the first remote controller on the first unmanned aerial vehicle is eliminated, the identification information of the first unmanned aerial vehicle recorded in the first remote controller can be erased, so that the first remote controller cannot be matched with the first unmanned aerial vehicle, and the control capability of the first unmanned aerial vehicle is lost. Here, considering that the identification information of a plurality of unmanned aerial vehicles may be recorded in the first remote controller, in order to avoid error erasure, the identification information of the first unmanned aerial vehicle recorded during binding may be obtained from the server, and the identification information recorded in the first remote controller may be erased according to the identification information of the first unmanned aerial vehicle. Here, in the information recorded by the server, the account in which the user is currently logged may be bound with a plurality of unmanned aerial vehicles, and at this time, the terminal device may obtain, from the server, identification information of the unmanned aerial vehicle to be subjected to the loss authentication selected by the user according to the selected operation of the unmanned aerial vehicle by the user. In one example, if the current account is bound to only one unmanned aerial vehicle, the server may directly send the identification information of the bound unmanned aerial vehicle to the terminal device.
According to the scheme for eliminating the control capability of the first remote controller on the first unmanned aerial vehicle by erasing the identification information of the first unmanned aerial vehicle recorded in the first remote controller, if a user wants to recover the control capability of the first remote controller on the first unmanned aerial vehicle, the identification information of the first unmanned aerial vehicle needs to be rewritten into the first remote controller. Because the data writing is difficult, the first unmanned aerial vehicle can be ensured to be in a locking state which is not controlled by the remote controller, the first unmanned aerial vehicle can be effectively lost and authenticated, and a good anti-cheating protection effect is achieved.
In one embodiment, after the data modification to the first remote controller is successful, a message of the successful data modification may be sent to the server, and the server may record that the first unmanned aerial vehicle is in a lost or locked state based on the message of the successful data modification, where after the first unmanned aerial vehicle is recorded as a lost or locked state, all services related to the first unmanned aerial vehicle will be limited or rejected by the server. After the recording is completed, the server can return a message of successful recording to the terminal equipment, and the terminal equipment can display the information of successful loss authentication on a display interface after receiving the message of successful recording.
In one embodiment, the user may confirm that the unmanned aerial vehicle and the remote controller are to be bound on the display interface of the terminal device, and in response to the operation of the user, the terminal device may acquire respective identification information of the first unmanned aerial vehicle and the first remote controller that are currently connected, and may display the identification information as binding information, so that the user may confirm before binding. After the confirmation operation of the user on the binding information is obtained, the binding between the first unmanned aerial vehicle and the first remote controller can be performed, and the content of the part is described in the foregoing and is not described herein. Here, the binding information may include, in addition to the respective identification information of the first unmanned aerial vehicle and the first remote controller, account information of the user and model information of the first unmanned aerial vehicle, and the established binding relationship may be a binding relationship of the account, the first unmanned aerial vehicle and the first remote controller. Referring to fig. 2, fig. 2 is a diagram illustrating an interaction interface provided in an embodiment of the present application.
In one embodiment, after the user is determined to complete activation of the after-market service product of the drone, information for recommending or guiding the user to bind the drone with the remote control may be displayed on the display interface. Here, there may be various ways of recommending or guiding, for example, the user may ask whether to bind the unmanned aerial vehicle and the remote controller by popping up a clickable prompt bar on the front page of the application program, and reference may be made to fig. 3, where the position pointed by the hand pattern is the prompt bar. For another example, the user may be guided to click the "next" button after the after-market service product is successfully activated, and then the description about the binding of the drone and the remote controller may be directly displayed, which may be referred to fig. 4.
In one embodiment, the identification information of the first unmanned aerial vehicle may include an aircraft serial number or a flight control serial number of the first unmanned aerial vehicle, and the identification information of the first remote controller may include a chip ID of the first remote controller and/or a remote controller serial number.
In one embodiment, when the user performs the operation of loss authentication, the unmanned aerial vehicle to perform loss authentication may be selected on the display interface of the terminal device. Because the user can have a plurality of unmanned aerial vehicles and can bind the unmanned aerial vehicles under one account, the user can select the unmanned aerial vehicle to be subjected to the loss authentication. According to the selection operation of the user, the terminal device may determine the first unmanned aerial vehicle to perform the loss authentication, and may display the aircraft information of the first unmanned aerial vehicle for the user to confirm, which may refer to fig. 5. After the confirmation operation of the user on the aircraft information of the first unmanned aerial vehicle is obtained, the terminal equipment can start to carry out loss authentication on the first unmanned aerial vehicle, namely whether the currently connected remote controller is the first remote controller or not can be determined, and if the currently connected remote controller is the first remote controller, the data modification is carried out on the first remote controller so as to eliminate the control capability of the first remote controller on the first unmanned aerial vehicle.
When the aircraft information of the first unmanned aerial vehicle is provided for the user to confirm, the aircraft information of the first unmanned aerial vehicle may at least include identification information of the first unmanned aerial vehicle, and in an embodiment, may further include model information of the first unmanned aerial vehicle. Here, since the identification information and the model information of the first unmanned aerial vehicle are recorded in the server in advance, the identification information and the model information of the first unmanned aerial vehicle can be acquired from the server to be displayed.
In one embodiment, if the user does not bind the first unmanned aerial vehicle with any remote controller, the flight status information of the first unmanned aerial vehicle may be obtained when the user controls the first unmanned aerial vehicle to fly, according to the flight status information, the current flight security of the first unmanned aerial vehicle may be determined, and if the flight security is lower than a preset threshold, the inquiry information about whether to bind the currently connected remote controller with the first unmanned aerial vehicle may be pushed to the user. Through the flight safety of real-time detection unmanned aerial vehicle when flying, when judging that flight safety is low, unmanned aerial vehicle has higher probability to take place to lose promptly, through initiatively pop out inquiry information or pop out modes such as the swift button of a key binding, promote the user to accomplish unmanned aerial vehicle's binding fast to can accomplish the binding before the occurence of failure, prevent to lose authentication, unable condition emergence of obtaining the claim because of unbinding.
The flight status information used for determining the flight security may be various, and in an embodiment, the flight status information may include power information and/or signal strength information, for example, when the power of the unmanned aerial vehicle is low or the connection signal with the remote controller is poor, it may be determined that the unmanned aerial vehicle has low flight security at this time, and the possibility of occurrence of an accident is high.
Further, the flight safety of the unmanned aerial vehicle can be determined according to the flight environment information of the unmanned aerial vehicle. Here, in one embodiment, the flight environment information may be obtained by identifying an image captured by the first unmanned aerial vehicle. The flight environment information may include one or more of the following: scene type, surrounding barrier information and current weather information corresponding to the current environment of the unmanned aerial vehicle. For easy understanding, for example, if it is determined by image recognition that the scene type corresponding to the environment where the unmanned aerial vehicle is currently located is a building group, it may be determined that the current flight security of the unmanned aerial vehicle is relatively low; if the number of the peripheral obstacles is determined to be more through image recognition, the current flight safety of the unmanned aerial vehicle can be determined to be lower; if the current weather is unsuitable for flight or is about to unsuitable for flight, such as raining or raining, through image recognition, the current flight safety of the unmanned aerial vehicle can be determined to be low.
In one embodiment, in order to prevent the user from deliberately losing the unmanned aerial vehicle in exchange for a new unmanned aerial vehicle, the flight data of the user for controlling the first unmanned aerial vehicle last time may be obtained when the user performs loss authentication. Here, in one embodiment, the flight data locally stored in the terminal device may be uploaded to a server, and the server may determine whether the first unmanned aerial vehicle has a landing behavior according to the flight data, so as to determine whether to give the loss authentication according to a determination result of the landing behavior. In one embodiment, the terminal device may also determine whether the first unmanned aerial vehicle has landing behavior locally according to the flight data, so that a determination result of the landing behavior may be fed back to the server, and the server may determine whether to give the loss authentication according to the feedback result.
In some cases, the user may declare that his or her drone falls in an unreachable area when performing the drone loss authentication, and cannot retrieve the drone, in order to verify the authenticity of the content spoken by the user, in one embodiment, if the terminal device uploads the flight data to the server, the server may determine a possible landing position of the first drone according to the flight data, and determine whether the first drone falls in an area that is difficult for the person to reach according to the landing position, so that the authenticity of the content spoken by the user may be verified to some extent, and help determine whether to give the loss authentication. In one embodiment, the terminal device may also perform the work of determining the landing position of the first unmanned aerial vehicle according to the flight data locally, determining whether the landing position belongs to an unreachable area, and may feed back the final determination result to the server, so as to help the server decide whether to give the loss authentication. Here, the landing position of the unmanned aerial vehicle may be determined according to GPS information in the flight data, or, if the user allows, may be determined according to an image captured by the unmanned aerial vehicle in the flight data.
In the foregoing, when the first unmanned aerial vehicle and the first remote controller are bound, the user account can participate in the binding, that is, the binding relationship among the user account, the first unmanned aerial vehicle and the first remote controller can be established. Here, the user account may be an account in which the user registers in the server in advance, and one user account may bind a plurality of unmanned aerial vehicles. The binding between the user account and the unmanned aerial vehicle can be completed when the user activates the unmanned aerial vehicle, specifically, when the user connects the newly purchased unmanned aerial vehicle for the first time and activates the unmanned aerial vehicle, the server can record the account information of the user and the identification information of the unmanned aerial vehicle, and a binding relationship between the user account and the unmanned aerial vehicle is established.
In one embodiment, if the first remote control is already uniquely bound to the first unmanned aerial vehicle, if the user tries to connect to the first unmanned aerial vehicle using another remote control, information for reminding the user to replace the correct remote control may be displayed on the display interface of the terminal device, and fig. 6 may be referred to.
In one embodiment, when the user performs loss authentication on the first unmanned aerial vehicle, if the remote controller currently connected to the terminal device is not the first remote controller uniquely bound to the first unmanned aerial vehicle, the information of the unbinding failure may be displayed on the display interface of the terminal device, and the user may be reminded to unbinding after connecting the correct remote controller, and fig. 7 may be referred to.
In one embodiment, if the first drone establishes a binding relationship with the first remote control and the first drone is not lost, the user may unbind the first drone from the first remote control. Specifically, after the operation of unbinding the first unmanned aerial vehicle and the first remote controller on the display interface by the user is obtained, whether the remote controller currently connected with the terminal equipment is the first remote controller or not and whether the currently connected unmanned aerial vehicle is the first unmanned aerial vehicle or not can be determined according to the respective identification information of the first unmanned aerial vehicle and the first remote controller recorded in the server. After determining that the terminal device is currently connected to the first remote controller and the first unmanned aerial vehicle, unbinding information may be displayed on the display interface, where the unbinding information may at least include respective identification information of the first unmanned aerial vehicle and the first remote controller, and fig. 8 may be referred to. After the determination operation of the user on the unbinding information is obtained, the recorded identification information of the first remote controller of the first unmanned aerial vehicle can be erased for the first unmanned aerial vehicle, and if the first remote controller records the identification information of the first unmanned aerial vehicle (corresponding to the second embodiment of the foregoing), the recorded identification information of the first unmanned aerial vehicle can be erased for the first remote controller.
According to the unmanned aerial vehicle authentication loss method, after the first unmanned aerial vehicle completes the loss authentication, whether a user logs in an account or not and whether a remote controller or terminal equipment is connected with a network (can access a server) or not can not operate the first unmanned aerial vehicle, the controlled process of the first unmanned aerial vehicle is prevented from being participated by the server, compared with the mode of recording a black list of the unmanned aerial vehicle in the server and limiting and controlling the unmanned aerial vehicle based on the black list, networking is not needed, the unmanned aerial vehicle operated by the user is not required to be detected, and the privacy of the user is not infringed; in addition, the control limiting mode needs to open the permission of the control of the unmanned aerial vehicle by the remote controller to the related app, and the rights and interests of the user are seriously violated.
According to the unmanned aerial vehicle authentication loss method, after a user requests to lose authentication of a first unmanned aerial vehicle, the operation capability of the first remote controller uniquely bound with the first unmanned aerial vehicle to the first unmanned aerial vehicle is eliminated, so that although the first unmanned aerial vehicle still only 'recognizes' the first remote controller, namely only the first remote controller is allowed to operate the first remote controller, the first remote controller loses the operation capability of the first unmanned aerial vehicle, at the moment, the first unmanned aerial vehicle is equivalent to being in a locking state without any remote controller capable of being operated, the loss authentication of the first unmanned aerial vehicle is effectively realized, the user does not have a fraudulent-guarantee motivation, the unmanned aerial vehicle with successful loss authentication can be subjected to claim management, and the quality of after-sale service is improved.
Reference may be made to fig. 9, and fig. 9 is a flowchart of a second method for losing authentication of a drone according to an embodiment of the present application. The method may be applied to a terminal device, and the method may include the steps of:
s902, acquiring an operation of confirming the loss authentication of the first unmanned aerial vehicle on a display interface of the terminal equipment by a user.
S904, responding to the confirmation to perform the operation of losing authentication, and determining that the remote controller currently connected with the terminal equipment is a first remote controller which is recorded in a server and is uniquely bound with the first unmanned aerial vehicle.
The first unmanned aerial vehicle can only be controlled by the uniquely-bound first remote controller;
s906, acquiring the identification information of the first unmanned aerial vehicle from the server, and carrying out data modification on the first remote controller according to the identification information of the first unmanned aerial vehicle so as to eliminate the control capability of the first remote controller on the first unmanned aerial vehicle.
Optionally, the obtaining the operation that the user confirms the loss authentication of the first unmanned aerial vehicle on the display interface of the terminal device includes:
acquiring the selection operation of a user on a display interface of terminal equipment on the unmanned aerial vehicle to be subjected to loss authentication;
according to the selection operation, determining a first unmanned aerial vehicle to be subjected to loss authentication, and displaying airplane information of the first unmanned aerial vehicle for confirmation of a user;
And acquiring the operation of confirming the aircraft information of the first unmanned aerial vehicle on the display interface by a user.
Optionally, the aircraft information of the first unmanned aerial vehicle at least includes identification information of the first unmanned aerial vehicle.
Optionally, the aircraft information of the first unmanned aerial vehicle further includes model information of the first unmanned aerial vehicle.
Optionally, the first unmanned aerial vehicle and the first remote controller are bound in advance by:
acquiring an operation that a user confirms that a first unmanned aerial vehicle and a first remote controller which are connected with the terminal equipment at present are bound on the display interface;
responding to the confirmation to carry out binding operation, and establishing a binding relationship between the first unmanned aerial vehicle and the first remote controller by at least utilizing the identification information of the first remote controller;
and sending the identification information of the first unmanned aerial vehicle and the identification information of the first remote controller to the server to record the binding relationship.
Optionally, the establishing a binding relationship between the first unmanned aerial vehicle and the first remote controller at least by using the identification information of the first remote controller includes:
and writing the identification information of the first remote controller into the first remote controller.
Optionally, the data modification of the first remote controller according to the identification information of the first unmanned aerial vehicle includes:
and writing the identification information of the first unmanned aerial vehicle into a control blacklist of the first remote controller.
Optionally, the binding relationship is further established by using identification information of the first unmanned aerial vehicle.
Optionally, the establishing a binding relationship between the first unmanned aerial vehicle and the first remote controller at least by using the identification information of the first remote controller includes:
writing the identification information of the first unmanned aerial vehicle into the first remote controller, and writing the identification information of the first remote controller into the first unmanned aerial vehicle.
Optionally, the data modification of the first remote controller according to the identification information of the first unmanned aerial vehicle includes:
and erasing the identification information of the first unmanned aerial vehicle recorded by the first remote controller.
Optionally, the binding relationship includes a binding relationship of a user account, the first unmanned aerial vehicle and the first remote controller.
Optionally, the obtaining the operation that the user confirms that the first unmanned aerial vehicle currently connected to the terminal device and the first remote controller are bound on the display interface includes:
Responding to the confirmation of the operation of binding the unmanned aerial vehicle and the remote controller on the display interface by a user, and acquiring the respective identification information of the first unmanned aerial vehicle and the first remote controller which are currently connected with the terminal equipment;
displaying binding information for confirmation of a user, wherein the binding information at least comprises identification information of each of the first unmanned aerial vehicle and the first remote controller;
and acquiring confirmation operation of the user on the binding information on the display interface.
Optionally, the binding information further includes user account information.
Optionally, the method further comprises:
after the user is determined to complete the activation of the after-sale service product of the unmanned aerial vehicle, displaying information for recommending the user to bind the unmanned aerial vehicle with the remote controller on the display interface.
Optionally, the determining that the remote controller to which the terminal device is currently connected is a first remote controller bound to the first unmanned aerial vehicle recorded in a server includes:
acquiring the identification information of the first remote controller recorded by the server;
and if the identification information of the first remote controller is matched with the identification information of the currently connected remote controller, determining that the currently connected remote controller is the first remote controller.
Optionally, the method further comprises:
The result of successful data modification is sent to the server;
and acquiring information of successful authentication returned by the server and displaying the information on the display interface.
Optionally, the identification information of the first unmanned aerial vehicle includes an aircraft serial number of the first unmanned aerial vehicle.
Optionally, the identification information of the first remote controller includes a chip ID and/or a remote controller serial number of the first remote controller.
Optionally, before the first unmanned aerial vehicle establishes a binding relationship with the first remote controller, the method further includes:
when a user controls the first unmanned aerial vehicle to fly, acquiring flight state information of the first unmanned aerial vehicle;
determining the current flight safety of the first unmanned aerial vehicle at least according to the flight state information;
and if the flight safety is lower than a preset threshold value, pushing inquiry information of whether the currently connected remote controller is bound with the first unmanned aerial vehicle to a user.
Optionally, the flight status information includes: power information and/or signal strength information.
Optionally, the flight safety is further determined according to flight environment information of the first unmanned aerial vehicle.
Optionally, the flight environment information is determined by identifying an image shot by the first unmanned aerial vehicle.
Optionally, the flight environment information includes one or more of: scene category, obstacle information and weather information to which the current environment belongs.
Optionally, the method further comprises:
acquiring flight data of a user for controlling the first unmanned aerial vehicle last time;
determining whether the first unmanned aerial vehicle has landing behaviors according to the flight data;
and feeding back the determination result of the landing behavior to the server.
Optionally, the method further comprises:
determining a landing position of the first unmanned aerial vehicle according to the flight data;
determining whether the landing position belongs to an unreachable area;
and feeding back the determination result of the unreachable area to the server.
Optionally, the method further comprises:
and responding to the confirmation to perform the operation of losing authentication, and uploading the flight data locally stored by the terminal equipment to a server.
The specific implementation of the unmanned aerial vehicle loss authentication method in the various embodiments provided above is described correspondingly in the foregoing, and will not be described in detail here.
According to the unmanned aerial vehicle authentication loss method, after a user requests to lose authentication of a first unmanned aerial vehicle, the operation capability of the first remote controller uniquely bound with the first unmanned aerial vehicle to the first unmanned aerial vehicle is eliminated, so that although the first unmanned aerial vehicle still only 'recognizes' the first remote controller, namely only the first remote controller is allowed to operate the first remote controller, the first remote controller loses the operation capability of the first unmanned aerial vehicle, at the moment, the first unmanned aerial vehicle is equivalent to being in a locking state without any remote controller capable of being operated, the loss authentication of the first unmanned aerial vehicle is effectively realized, the user does not have a fraudulent-guarantee motivation, and the unmanned aerial vehicle with successful loss authentication can be claim-managed.
Referring to fig. 10, fig. 10 is a flowchart of a third method for losing authentication of a drone according to an embodiment of the present application. The method may be applied to a remote control device. Here, the remote control device may have various embodiments, and in one embodiment, the remote control device may be a combination of the terminal device and the remote controller, for example, may be an integral body formed by connecting the terminal device to the remote controller through a wired or wireless manner. In one embodiment, the remote control device may be an integrated device, with a remote control and a display screen, which may be connected to the unmanned aerial vehicle or to a server. The remote control device may be provided with an application program and the display screen may be used to display an operation interface of the application program.
The method may comprise the steps of:
s1002, acquiring an operation of confirming that the user performs loss authentication on the first unmanned aerial vehicle on a display interface of the remote control device.
S1004, responding to the confirmation to perform the operation of losing authentication, and determining that the remote control equipment is the first remote control equipment uniquely bound by the first unmanned aerial vehicle.
The first unmanned aerial vehicle can only be controlled by the uniquely-bound first remote control device.
S1006, carrying out data modification on the first remote control equipment according to the identification information of the first unmanned aerial vehicle so as to eliminate the control capability of the first remote control equipment on the first unmanned aerial vehicle.
Optionally, the remote control device includes: the remote controller is connected with the terminal equipment.
Optionally, the obtaining the operation that the user confirms the loss authentication of the first unmanned aerial vehicle on the display interface of the remote control device includes:
acquiring the selection operation of a user on the unmanned aerial vehicle to be subjected to loss authentication on a display interface of remote control equipment;
according to the selection operation, determining a first unmanned aerial vehicle to be subjected to loss authentication, and displaying airplane information of the first unmanned aerial vehicle for confirmation of a user;
and acquiring the operation of confirming the aircraft information of the first unmanned aerial vehicle on the display interface by a user.
Optionally, the aircraft information of the first unmanned aerial vehicle at least includes identification information of the first unmanned aerial vehicle.
Optionally, the aircraft information of the first unmanned aerial vehicle further includes model information of the first unmanned aerial vehicle.
Optionally, the first unmanned aerial vehicle and the first remote control device are bound in advance by:
Acquiring an operation of confirming binding of the first remote control device and the first unmanned aerial vehicle on the display interface by a user;
and responding to the confirmation to carry out binding operation, and establishing a binding relationship between the first unmanned aerial vehicle and the first remote control equipment by at least utilizing the identification information of the first remote control equipment.
Optionally, the establishing a binding relationship between the first unmanned aerial vehicle and the first remote control device at least by using the identification information of the first remote control device includes:
and writing the identification information of the first remote control equipment into the first remote control equipment.
Optionally, the data modification of the first remote control device according to the identification information of the first unmanned aerial vehicle includes:
and writing the identification information of the first unmanned aerial vehicle into a control blacklist of the first remote control equipment.
Optionally, the binding relationship is further established by using identification information of the first unmanned aerial vehicle.
Optionally, the establishing a binding relationship between the first unmanned aerial vehicle and the first remote control device at least by using the identification information of the first remote control device includes:
writing the identification information of the first unmanned aerial vehicle into the first remote control equipment, and writing the identification information of the first remote control equipment into the first unmanned aerial vehicle.
Optionally, the data modification of the first remote control device according to the identification information of the first unmanned aerial vehicle includes:
and erasing the identification information of the first unmanned aerial vehicle recorded by the first remote control equipment.
Optionally, the binding relationship includes a binding relationship of a user account, the first unmanned aerial vehicle, and the first remote control device.
Optionally, the acquiring the operation that the user confirms binding the first remote control device with the first unmanned aerial vehicle on the display interface includes:
responding to the confirmation of the operation of binding the unmanned aerial vehicle and the remote control equipment on the display interface by a user, and acquiring the identification information of the first unmanned aerial vehicle currently connected with the first remote control equipment and the identification information of the first remote control equipment;
displaying binding information for confirmation of a user, wherein the binding information at least comprises identification information of each of the first unmanned aerial vehicle and the first remote control device;
and acquiring confirmation operation of the user on the binding information on the display interface.
Optionally, the binding information further includes user account information.
Optionally, the method further comprises:
after the user is determined to complete the activation of the after-sale service product of the unmanned aerial vehicle, displaying information for recommending the user to bind the unmanned aerial vehicle with the remote control device on the display interface.
Optionally, the identification information of the first unmanned aerial vehicle includes an aircraft serial number of the first unmanned aerial vehicle.
Optionally, the identification information of the first remote control device includes a chip ID and/or a remote control device serial number of the first remote control device.
The specific implementation of the unmanned aerial vehicle loss authentication method in the various embodiments provided above is described correspondingly in the foregoing, and will not be described in detail here.
According to the unmanned aerial vehicle authentication loss method, after a user requests to lose authentication of a first unmanned aerial vehicle, the operation capability of the first remote control device uniquely bound to the first unmanned aerial vehicle is eliminated, so that although the first unmanned aerial vehicle still only 'recognizes' the first remote control device, namely only the first remote control device is allowed to operate the first remote control device, the first remote control device loses the operation capability of the first unmanned aerial vehicle, at the moment, the first unmanned aerial vehicle is equivalent to being in a locking state without any remote control device and capable of being operated, the loss authentication of the first unmanned aerial vehicle is effectively realized, the user does not have a fraudulent-protection motivation, and the unmanned aerial vehicle with successful loss authentication can be claim-managed.
Reference may be made to fig. 11, and fig. 11 is a flowchart of a method for losing authentication of a mobile device according to an embodiment of the present application. The mobile device may have electronic equipment with mobile capabilities, such as may be an unmanned aerial vehicle, an unmanned vehicle, a robot, an unmanned ship, or the like. The method can be applied to the terminal equipment and comprises the following steps:
S1102, acquiring an operation that a user confirms to perform loss authentication on the first movable equipment on a display interface of the terminal equipment.
S1104, responding to the confirmation to perform the operation of losing authentication, and determining that the remote controller currently connected with the terminal equipment is the first remote controller uniquely bound with the first movable equipment.
The first removable device can only be manipulated by the uniquely bound first remote control.
And S1106, carrying out data modification on the first remote controller according to the identification information of the first movable equipment so as to eliminate the movable equipment with the control capability of the first remote controller on the first movable equipment.
Optionally, the obtaining the operation that the user confirms the loss authentication of the first movable device on the display interface of the terminal device includes:
acquiring the selection operation of a user on a display interface of terminal equipment on movable equipment to be subjected to loss authentication;
according to the selection operation, determining a first movable device to be subjected to loss authentication, and displaying device information of the first movable device for confirmation by a user;
and acquiring the operation of confirming the equipment information of the first movable equipment on the display interface by a user.
Optionally, the device information of the first mobile device includes at least identification information of the first mobile device.
Optionally, the device information of the first mobile device further includes model information of the first mobile device.
Optionally, the first mobile device and the first remote control are bound in advance by:
acquiring an operation of confirming binding between a first movable device currently connected with the terminal device and a first remote controller on the display interface by a user;
and responding to the confirmation to carry out binding operation, and establishing a binding relation between the first movable equipment and the first remote controller by at least utilizing the identification information of the first remote controller.
Optionally, the establishing a binding relationship between the first movable device and the first remote controller at least by using the identification information of the first remote controller includes:
and writing the identification information of the first remote controller into the first movable equipment.
Optionally, the data modification of the first remote controller according to the identification information of the first movable device includes:
and writing the identification information of the first movable equipment into a control blacklist of the first remote controller.
Optionally, the binding relationship is further established using identification information of the first movable device.
Optionally, the establishing a binding relationship between the first movable device and the first remote controller at least by using the identification information of the first remote controller includes:
writing the identification information of the first movable equipment into the first remote controller, and writing the identification information of the first remote controller into the first movable equipment.
Optionally, the data modification of the first remote controller according to the identification information of the first movable device includes:
and erasing the identification information of the first movable equipment recorded by the first remote controller.
Optionally, the binding relationship includes a binding relationship of a user account, the first movable device, and the first remote control.
Optionally, the obtaining the operation that the user confirms, on the display interface, binding the first movable device currently connected to the terminal device and the first remote controller includes:
responding to the confirmation of the binding operation of the movable equipment and the remote controller on the display interface by a user, and acquiring the respective identification information of the first movable equipment and the first remote controller which are currently connected with the terminal equipment;
Displaying binding information for confirmation of a user, wherein the binding information at least comprises identification information of the first movable equipment and the first remote controller;
and acquiring confirmation operation of the user on the binding information on the display interface.
Optionally, the binding information further includes user account information.
Optionally, the method further comprises:
after the user is determined to complete the activation of the after-sale service product of the movable equipment, displaying information for recommending the user to bind the movable equipment with the remote controller on the display interface.
Optionally, the identification information of the first mobile device includes a device serial number of the first mobile device.
Optionally, the identification information of the first remote controller includes a chip ID and/or a remote controller serial number of the first remote controller.
The specific implementation of the mobile device loss authentication method in the various embodiments provided above is described in the foregoing, and will not be described herein.
According to the mobile equipment authentication loss method, after a user requests to carry out loss authentication on the first mobile equipment, the control capability of the first mobile equipment on the first mobile equipment by the first remote equipment which is only bound by the first mobile equipment is eliminated, so that although the first mobile equipment still only 'recognizes' the first remote equipment, namely only the first remote equipment is allowed to control the first remote equipment, the first remote equipment loses the control capability on the first mobile equipment, at the moment, the first mobile equipment is equivalent to being in a locking state without any remote equipment capable of controlling, the loss authentication on the first mobile equipment is effectively realized, the user does not have a fraudulent motivation, and the unmanned aerial vehicle with successful loss authentication can be claiming.
Reference may be made to fig. 12, and fig. 12 is a schematic structural diagram of a terminal device provided in an embodiment of the present application. The terminal device may include: the processor 1210 and the memory 1220 storing the computer program may implement the first or second unmanned aerial vehicle loss authentication method provided in the embodiments of the present application when the processor executes the computer program.
Reference may be made to fig. 13, and fig. 13 is a schematic structural diagram of a remote control device provided in an embodiment of the present application. The remote control device may include: a processor 1310 and a memory 1320 storing a computer program, where the processor may implement the third unmanned aerial vehicle loss authentication method provided in the embodiment of the present application when executing the computer program.
Referring also to fig. 14, fig. 14 is a schematic structural diagram of the unmanned aerial vehicle loss authentication system provided in the embodiment of the present application. The system may include: terminal device 1410, remote control 1420 and server 1430, said terminal device being connected to said remote control and said server respectively;
the server pre-records binding information of a first unmanned aerial vehicle and a first remote controller, wherein the first unmanned aerial vehicle is uniquely bound with the first remote controller and can be controlled by the first remote controller only, and the binding information at least comprises identification information of the first unmanned aerial vehicle and identification information of the first remote controller;
The terminal equipment is used for acquiring the operation of confirming the loss authentication of the first unmanned aerial vehicle on a display interface by a user; responding to the confirmation to perform the operation of losing authentication, acquiring the identification information of the first remote controller from the server, and determining whether the currently connected remote controller is the first remote controller according to the identification information of the first remote controller; if the remote controller is determined to be the first remote controller, acquiring the identification information of the first unmanned aerial vehicle from the server, and carrying out data modification on the first remote controller according to the identification information of the first unmanned aerial vehicle so as to eliminate the control capability of the first remote controller on the first unmanned aerial vehicle; and feeding back the result of the data modification to the server to complete authentication.
According to the unmanned aerial vehicle authentication loss system, after a user requests to lose authentication of a first unmanned aerial vehicle, the operation capability of the first remote controller uniquely bound with the first unmanned aerial vehicle to the first unmanned aerial vehicle is eliminated, so that although the first unmanned aerial vehicle still only 'recognizes' the first remote controller, namely only the first remote controller is allowed to operate the first remote controller, the first remote controller loses the operation capability of the first unmanned aerial vehicle, at the moment, the first unmanned aerial vehicle is equivalent to being in a locking state without any remote controller and capable of being operated, the first unmanned aerial vehicle is effectively lost and authenticated, the user does not have a fraudulent-protection motivation, and the unmanned aerial vehicle with successful lost authentication can be claiming.
The embodiment of the application also provides a computer readable storage medium, wherein the computer readable storage medium stores a computer program, and the computer program realizes the first unmanned aerial vehicle loss authentication method provided by the embodiment of the application when being executed by a processor.
The embodiment of the application also provides a computer readable storage medium, wherein the computer readable storage medium stores a computer program, and the computer program realizes the second unmanned aerial vehicle loss authentication method provided by the embodiment of the application when being executed by a processor.
The embodiment of the application also provides a computer readable storage medium, wherein the computer readable storage medium stores a computer program, and the computer program realizes the third unmanned aerial vehicle loss authentication method provided by the embodiment of the application when being executed by a processor.
The above provides various embodiments for each protection subject, and on the basis of no conflict or contradiction, the person skilled in the art can freely combine various embodiments according to the actual situation, thereby constructing various different technical solutions. While the present application is limited in terms of a description of all the embodiments, it is to be understood that the disclosure of all the embodiments is not limited to the description of all the embodiments.
Embodiments of the present application may take the form of a computer program product embodied on one or more storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having program code embodied therein. Computer-usable storage media include both permanent and non-permanent, removable and non-removable media, and information storage may be implemented by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to: phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Disks (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, may be used to store information that may be accessed by the computing device.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The foregoing has outlined rather broadly the methods and apparatus provided in embodiments of the present invention in order that the detailed description of the principles and embodiments of the present invention may be implemented in any way that is used to facilitate the understanding of the method and core concepts of the present invention; meanwhile, as those skilled in the art will have variations in the specific embodiments and application scope in accordance with the ideas of the present invention, the present description should not be construed as limiting the present invention in view of the above.

Claims (67)

1. The unmanned aerial vehicle loss authentication method is characterized by being applied to terminal equipment and comprising the following steps:
acquiring an operation of confirming the loss authentication of a first unmanned aerial vehicle on a display interface of terminal equipment by a user;
responding to the confirmation to perform the operation of losing authentication, and determining that the remote controller currently connected with the terminal equipment is a first remote controller uniquely bound by the first unmanned aerial vehicle, wherein the first unmanned aerial vehicle can only be controlled by the uniquely bound first remote controller;
and carrying out data modification on the first remote controller according to the identification information of the first unmanned aerial vehicle so as to eliminate the control capability of the first remote controller on the first unmanned aerial vehicle.
2. The method of claim 1, wherein the obtaining the user confirming the operation of performing the loss authentication on the first drone on the display interface of the terminal device includes:
acquiring the selection operation of a user on a display interface of terminal equipment on the unmanned aerial vehicle to be subjected to loss authentication;
according to the selection operation, determining a first unmanned aerial vehicle to be subjected to loss authentication, and displaying airplane information of the first unmanned aerial vehicle for confirmation of a user;
and acquiring the operation of confirming the aircraft information of the first unmanned aerial vehicle on the display interface by a user.
3. The method of claim 2, wherein the aircraft information of the first drone includes at least identification information of the first drone.
4. The method of claim 3, wherein the aircraft information for the first drone further includes model information for the first drone.
5. The method of claim 1, wherein the first drone and the first remote control are pre-tethered by:
acquiring an operation that a user confirms that a first unmanned aerial vehicle and a first remote controller which are connected with the terminal equipment at present are bound on the display interface;
And responding to the confirmation to carry out binding operation, and establishing a binding relationship between the first unmanned aerial vehicle and the first remote controller by at least utilizing the identification information of the first remote controller.
6. The method of claim 5, wherein the establishing a binding relationship between the first drone and the first remote control using at least identification information of the first remote control comprises:
and writing the identification information of the first remote controller into the first unmanned aerial vehicle.
7. The method of claim 6, wherein the performing data modification on the first remote control according to the identification information of the first unmanned aerial vehicle comprises:
and writing the identification information of the first unmanned aerial vehicle into a control blacklist of the first remote controller.
8. The method of claim 5, wherein the binding relationship is further established using identification information of the first drone.
9. The method of claim 8, wherein the establishing a binding relationship between the first drone and the first remote control using at least identification information of the first remote control comprises:
writing the identification information of the first unmanned aerial vehicle into the first remote controller, and writing the identification information of the first remote controller into the first unmanned aerial vehicle.
10. The method of claim 9, wherein the performing data modification on the first remote control according to the identification information of the first unmanned aerial vehicle comprises:
and erasing the identification information of the first unmanned aerial vehicle recorded by the first remote controller.
11. The method of claim 5, wherein the binding comprises a binding of a user account, the first drone, and the first remote control.
12. The method of claim 5, wherein the obtaining the user confirming, on the display interface, the operation of binding the first drone with the first remote control to which the terminal device is currently connected, comprises:
responding to the confirmation of the operation of binding the unmanned aerial vehicle and the remote controller on the display interface by a user, and acquiring the respective identification information of the first unmanned aerial vehicle and the first remote controller which are currently connected with the terminal equipment;
displaying binding information for confirmation of a user, wherein the binding information at least comprises identification information of each of the first unmanned aerial vehicle and the first remote controller;
and acquiring confirmation operation of the user on the binding information on the display interface.
13. The method of claim 12, wherein the binding information further comprises user account information.
14. The method according to claim 12, wherein the method further comprises:
after the user is determined to complete the activation of the after-sale service product of the unmanned aerial vehicle, displaying information for recommending the user to bind the unmanned aerial vehicle with the remote controller on the display interface.
15. The method of claim 1, wherein the identification information of the first drone includes an aircraft serial number of the first drone.
16. The method according to claim 1, wherein the identification information of the first remote control comprises a chip ID and/or a remote control serial number of the first remote control.
17. The unmanned aerial vehicle loss authentication method is characterized by being applied to terminal equipment and comprising the following steps:
acquiring an operation of confirming the loss authentication of a first unmanned aerial vehicle on a display interface of terminal equipment by a user;
responding to the confirmation to perform the operation of losing authentication, and determining that the remote controller currently connected with the terminal equipment is a first remote controller uniquely bound by the first unmanned aerial vehicle recorded in a server, wherein the first unmanned aerial vehicle can only be controlled by the uniquely bound first remote controller;
and acquiring the identification information of the first unmanned aerial vehicle from the server, and carrying out data modification on the first remote controller according to the identification information of the first unmanned aerial vehicle so as to eliminate the control capability of the first remote controller on the first unmanned aerial vehicle.
18. The method of claim 17, wherein the obtaining that the user confirms the operation of performing the loss authentication on the first drone on the display interface of the terminal device includes:
acquiring the selection operation of a user on a display interface of terminal equipment on the unmanned aerial vehicle to be subjected to loss authentication;
according to the selection operation, determining a first unmanned aerial vehicle to be subjected to loss authentication, and displaying airplane information of the first unmanned aerial vehicle for confirmation of a user;
and acquiring the operation of confirming the aircraft information of the first unmanned aerial vehicle on the display interface by a user.
19. The method of claim 18, wherein the aircraft information for the first drone includes at least identification information for the first drone.
20. The method of claim 19, wherein the aircraft information for the first drone further includes model information for the first drone.
21. The method of claim 17, wherein the first drone and the first remote control are pre-tethered by:
acquiring an operation that a user confirms that a first unmanned aerial vehicle and a first remote controller which are connected with the terminal equipment at present are bound on the display interface;
Responding to the confirmation to carry out binding operation, and establishing a binding relationship between the first unmanned aerial vehicle and the first remote controller by at least utilizing the identification information of the first remote controller;
and sending the identification information of the first unmanned aerial vehicle and the identification information of the first remote controller to the server to record the binding relationship.
22. The method of claim 21, wherein the establishing a binding relationship between the first drone and the first remote control using at least identification information of the first remote control comprises:
and writing the identification information of the first remote controller into the first remote controller.
23. The method of claim 22, wherein the performing data modification on the first remote control according to the identification information of the first drone includes:
and writing the identification information of the first unmanned aerial vehicle into a control blacklist of the first remote controller.
24. The method of claim 21, wherein the binding relationship is further established using identification information of the first drone.
25. The method of claim 24, wherein the establishing a binding relationship between the first drone and the first remote control using at least identification information of the first remote control comprises:
Writing the identification information of the first unmanned aerial vehicle into the first remote controller, and writing the identification information of the first remote controller into the first unmanned aerial vehicle.
26. The method of claim 25, wherein the performing data modification on the first remote control according to the identification information of the first drone includes:
and erasing the identification information of the first unmanned aerial vehicle recorded by the first remote controller.
27. The method of claim 21, wherein the binding comprises a binding of a user account, the first drone, and the first remote control.
28. The method of claim 21, wherein the obtaining the user confirming, on the display interface, the operation of binding the first drone with the first remote control to which the terminal device is currently connected, comprises:
responding to the confirmation of the operation of binding the unmanned aerial vehicle and the remote controller on the display interface by a user, and acquiring the respective identification information of the first unmanned aerial vehicle and the first remote controller which are currently connected with the terminal equipment;
displaying binding information for confirmation of a user, wherein the binding information at least comprises identification information of each of the first unmanned aerial vehicle and the first remote controller;
And acquiring confirmation operation of the user on the binding information on the display interface.
29. The method of claim 28, wherein the binding information further comprises user account information.
30. The method of claim 28, wherein the method further comprises:
after the user is determined to complete the activation of the after-sale service product of the unmanned aerial vehicle, displaying information for recommending the user to bind the unmanned aerial vehicle with the remote controller on the display interface.
31. The method of claim 17, wherein the determining that the remote control to which the terminal device is currently connected is a first remote control to which the first drone is bound recorded in a server, comprising:
acquiring the identification information of the first remote controller recorded by the server;
and if the identification information of the first remote controller is matched with the identification information of the currently connected remote controller, determining that the currently connected remote controller is the first remote controller.
32. The method of claim 17, wherein the method further comprises:
the result of successful data modification is sent to the server;
and acquiring information of successful authentication returned by the server and displaying the information on the display interface.
33. The method of claim 17, wherein the identification information of the first drone includes an aircraft serial number of the first drone.
34. The method of claim 17, wherein the identification information of the first remote control comprises a chip ID and/or a remote control serial number of the first remote control.
35. The method of claim 17, wherein prior to the first drone establishing a binding relationship with the first remote control, the method further comprises:
when a user controls the first unmanned aerial vehicle to fly, acquiring flight state information of the first unmanned aerial vehicle;
determining the current flight safety of the first unmanned aerial vehicle at least according to the flight state information;
and if the flight safety is lower than a preset threshold value, pushing inquiry information of whether the currently connected remote controller is bound with the first unmanned aerial vehicle to a user.
36. The method of claim 35, wherein the flight status information comprises: power information and/or signal strength information.
37. The method of claim 35, wherein the flight safety is further determined based on flight environment information of the first drone.
38. The method of claim 37, wherein the flight environment information is determined by identifying an image captured by the first drone.
39. The method of claim 37, wherein the flight environment information includes one or more of: scene category, obstacle information and weather information to which the current environment belongs.
40. The method of claim 17, wherein the method further comprises:
acquiring flight data of a user for controlling the first unmanned aerial vehicle last time;
determining whether the first unmanned aerial vehicle has landing behaviors according to the flight data;
and feeding back the determination result of the landing behavior to the server.
41. The method of claim 40, further comprising:
determining a landing position of the first unmanned aerial vehicle according to the flight data;
determining whether the landing position belongs to an unreachable area;
and feeding back the determination result of the unreachable area to the server.
42. The method of claim 17, wherein the method further comprises:
and responding to the confirmation to perform the operation of losing authentication, and uploading the flight data locally stored by the terminal equipment to a server.
43. The unmanned aerial vehicle loss authentication method is characterized by being applied to remote control equipment and comprising the following steps of:
acquiring an operation of confirming the loss authentication of the first unmanned aerial vehicle on a display interface of the remote control equipment by a user;
responding to the confirmation to perform the operation of losing authentication, and determining that the remote control equipment is a first remote control equipment uniquely bound by the first unmanned aerial vehicle, wherein the first unmanned aerial vehicle can only be controlled by the uniquely bound first remote control equipment;
and carrying out data modification on the first remote control equipment according to the identification information of the first unmanned aerial vehicle so as to eliminate the control capability of the first remote control equipment on the first unmanned aerial vehicle.
44. The method of claim 43, wherein the remote control device comprises: the remote controller is connected with the terminal equipment.
45. The method of claim 43, wherein the obtaining the user confirming the loss authentication of the first drone on the display interface of the remote control device, comprises:
acquiring the selection operation of a user on the unmanned aerial vehicle to be subjected to loss authentication on a display interface of remote control equipment;
according to the selection operation, determining a first unmanned aerial vehicle to be subjected to loss authentication, and displaying airplane information of the first unmanned aerial vehicle for confirmation of a user;
And acquiring the operation of confirming the aircraft information of the first unmanned aerial vehicle on the display interface by a user.
46. The method of claim 45, wherein the aircraft information of the first drone includes at least identification information of the first drone.
47. The method of claim 46, wherein the aircraft information for the first drone further includes model information for the first drone.
48. The method of claim 43, wherein the first drone and the first remote control device are pre-tethered by:
acquiring an operation of confirming binding of the first remote control device and the first unmanned aerial vehicle on the display interface by a user;
and responding to the confirmation to carry out binding operation, and establishing a binding relationship between the first unmanned aerial vehicle and the first remote control equipment by at least utilizing the identification information of the first remote control equipment.
49. The method of claim 48, wherein the establishing a binding relationship of the first drone with the first remote control device using at least identification information of the first remote control device comprises:
And writing the identification information of the first remote control equipment into the first remote control equipment.
50. The method of claim 49, wherein the performing data modification on the first remote control device according to the identification information of the first drone includes:
and writing the identification information of the first unmanned aerial vehicle into a control blacklist of the first remote control equipment.
51. The method of claim 48, wherein the binding relationship is further established using identification information of the first drone.
52. The method of claim 51, wherein the establishing a binding relationship of the first drone with the first remote control device using at least identification information of the first remote control device comprises:
writing the identification information of the first unmanned aerial vehicle into the first remote control equipment, and writing the identification information of the first remote control equipment into the first unmanned aerial vehicle.
53. The method of claim 52, wherein the performing data modification on the first remote control device based on the identification information of the first drone includes:
and erasing the identification information of the first unmanned aerial vehicle recorded by the first remote control equipment.
54. The method of claim 48, wherein the binding includes a binding of a user account, the first drone, and the first remote control device.
55. The method of claim 48, wherein the obtaining a user confirming binding of the first remote control device with the first drone on the display interface, comprises:
responding to the confirmation of the operation of binding the unmanned aerial vehicle and the remote control equipment on the display interface by a user, and acquiring the identification information of the first unmanned aerial vehicle currently connected with the first remote control equipment and the identification information of the first remote control equipment;
displaying binding information for confirmation of a user, wherein the binding information at least comprises identification information of each of the first unmanned aerial vehicle and the first remote control device;
and acquiring confirmation operation of the user on the binding information on the display interface.
56. The method of claim 55, wherein the binding information further includes user account information.
57. The method of claim 55, further comprising:
after the user is determined to complete the activation of the after-sale service product of the unmanned aerial vehicle, displaying information for recommending the user to bind the unmanned aerial vehicle with the remote control device on the display interface.
58. The method of claim 43, wherein the identification information of the first drone includes an aircraft serial number of the first drone.
59. The method of claim 43, wherein the identification information of the first remote control device comprises a chip ID of the first remote control device and/or a remote control device serial number.
60. A mobile device loss authentication method, applied to a terminal device, comprising:
acquiring an operation of confirming the loss authentication of the first movable equipment on a display interface of the terminal equipment by a user;
responding to the confirmation to perform the operation of losing authentication, and determining that the remote controller currently connected with the terminal equipment is a first remote controller uniquely bound to the first movable equipment, wherein the first movable equipment can only be controlled by the uniquely bound first remote controller;
and carrying out data modification on the first remote controller according to the identification information of the first movable equipment so as to eliminate the control capability of the first remote controller on the first movable equipment.
61. A terminal device, comprising: a processor and a memory storing a computer program, the processor implementing the drone loss authentication method of any one of claims 1-16 when the computer program is executed.
62. A terminal device, comprising: a processor and a memory storing a computer program, the processor implementing the drone loss authentication method of any one of claims 17-42 when the computer program is executed.
63. A remote control apparatus, comprising: a processor and a memory storing a computer program, the processor implementing the drone loss authentication method of any one of claims 43-59 when the computer program is executed.
64. An unmanned aerial vehicle loss authentication system, comprising: the system comprises terminal equipment, a remote controller and a server, wherein the terminal equipment is respectively connected with the remote controller and the server;
the server pre-records binding information of a first unmanned aerial vehicle and a first remote controller, wherein the first unmanned aerial vehicle is uniquely bound with the first remote controller and can be controlled by the first remote controller only, and the binding information at least comprises identification information of the first unmanned aerial vehicle and identification information of the first remote controller;
the terminal equipment is used for acquiring the operation of confirming the loss authentication of the first unmanned aerial vehicle on a display interface by a user; responding to the confirmation to perform the operation of losing authentication, acquiring the identification information of the first remote controller from the server, and determining whether the currently connected remote controller is the first remote controller according to the identification information of the first remote controller; if the remote controller is determined to be the first remote controller, acquiring the identification information of the first unmanned aerial vehicle from the server, and carrying out data modification on the first remote controller according to the identification information of the first unmanned aerial vehicle so as to eliminate the control capability of the first remote controller on the first unmanned aerial vehicle; and feeding back the result of the data modification to the server to complete authentication.
65. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program which, when executed by a processor, implements the unmanned aerial vehicle loss authentication method of any of claims 1-16.
66. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program, which when executed by a processor implements the unmanned aerial vehicle loss authentication method of any of claims 17-42.
67. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program which, when executed by a processor, implements the unmanned aerial vehicle loss authentication method of any of claims 43-59.
CN202080081314.2A 2020-12-15 2020-12-15 Unmanned aerial vehicle loss authentication method and system, terminal equipment and remote control equipment Active CN114916248B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/136547 WO2022126381A1 (en) 2020-12-15 2020-12-15 Method and system for loss authentication of unmanned aerial vehicle, terminal device and remote control device

Publications (2)

Publication Number Publication Date
CN114916248A CN114916248A (en) 2022-08-16
CN114916248B true CN114916248B (en) 2024-03-08

Family

ID=82059884

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202080081314.2A Active CN114916248B (en) 2020-12-15 2020-12-15 Unmanned aerial vehicle loss authentication method and system, terminal equipment and remote control equipment

Country Status (2)

Country Link
CN (1) CN114916248B (en)
WO (1) WO2022126381A1 (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104724295A (en) * 2014-05-30 2015-06-24 广州安云电子科技有限公司 Universal interface system for unmanned aerial vehicle loads
CN105741525A (en) * 2016-02-24 2016-07-06 北京小米移动软件有限公司 Remote controller binding processing method, device and equipment
CN106131103A (en) * 2016-06-02 2016-11-16 广州极飞电子科技有限公司 Remote controller and the communication means of unmanned plane, device and system
CN108268151A (en) * 2016-12-30 2018-07-10 昊翔电能运动科技(昆山)有限公司 Control method, equipment and the device of remote control
CN108702356A (en) * 2017-05-19 2018-10-23 深圳市大疆创新科技有限公司 Auth method, equipment, machine readable storage medium and system
CN110007687A (en) * 2019-02-25 2019-07-12 中国电子科技集团公司电子科学研究院 A kind of unmanned plane hunting system
CN111917805A (en) * 2019-05-10 2020-11-10 梁友兵 Remote driving and controlling method through intelligent terminal

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104361741A (en) * 2014-12-08 2015-02-18 上海斐讯数据通信技术有限公司 Remote control system and method
US10703494B2 (en) * 2015-10-14 2020-07-07 Flirtey Holdings, Inc. Parachute control system for an unmanned aerial vehicle
US10560844B2 (en) * 2017-03-15 2020-02-11 International Business Machines Corporation Authentication of users for securing remote controlled devices

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104724295A (en) * 2014-05-30 2015-06-24 广州安云电子科技有限公司 Universal interface system for unmanned aerial vehicle loads
CN105741525A (en) * 2016-02-24 2016-07-06 北京小米移动软件有限公司 Remote controller binding processing method, device and equipment
CN106131103A (en) * 2016-06-02 2016-11-16 广州极飞电子科技有限公司 Remote controller and the communication means of unmanned plane, device and system
CN108268151A (en) * 2016-12-30 2018-07-10 昊翔电能运动科技(昆山)有限公司 Control method, equipment and the device of remote control
CN108702356A (en) * 2017-05-19 2018-10-23 深圳市大疆创新科技有限公司 Auth method, equipment, machine readable storage medium and system
CN110007687A (en) * 2019-02-25 2019-07-12 中国电子科技集团公司电子科学研究院 A kind of unmanned plane hunting system
CN111917805A (en) * 2019-05-10 2020-11-10 梁友兵 Remote driving and controlling method through intelligent terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
无人机消防实战应用及空中特情处置探讨;孙春辉;公安部上海消防研究所;第8-11页 *

Also Published As

Publication number Publication date
CN114916248A (en) 2022-08-16
WO2022126381A1 (en) 2022-06-23

Similar Documents

Publication Publication Date Title
US10652735B2 (en) Systems and methods for programming, controlling and monitoring wireless networks
US11812258B2 (en) Systems and methods for programming, controlling and monitoring wireless networks
CN104321220B (en) Access and portability as the user profiles of template storage
CN103532933B (en) The method and intelligent terminal of client operation mandate are realized by fingerprint identification
DE102013222428B4 (en) Credential verification and authorization solution for passenger vehicle rental
CN102983966B (en) encrypted content control device
US20230230175A1 (en) Systems and methods for using tokenized icons to provide insurance policy quotes
JP6953310B2 (en) Systems and methods for programming, controlling and monitoring wireless networks
CN109684811A (en) Pinpoint personal identification method, device and the server of authorization
US20150067805A1 (en) Making a user's data, settings, and licensed content available in the cloud
JP2004522373A5 (en)
CN101529908A (en) Content delivery server, content providing server, content delivery system, content delivery method, content providing method, terminal device, control program and computer readable recording medium
CN110061984A (en) Account switching method, onboard system and the vehicle of onboard system
TW202009834A (en) Core-body product push and core-body method and system
CN105245542A (en) Account authorization method, server and clients
CN106559312A (en) Group management and device based on controlled plant
US20180232825A1 (en) Automated entry
CN105959277A (en) Method of locking/unlocking computer screen based on NFC terminal
CN114916248B (en) Unmanned aerial vehicle loss authentication method and system, terminal equipment and remote control equipment
KR101234347B1 (en) Black box service providing method for vehicles enhanced security based on watermarking technique
Harris The Radical Scope of Tesla's Data Hoard: Every Tesla is providing reams of sensitive data about its driver's life
CN107070875A (en) Release the method and smart machine of smart machine and the binding relationship of user
US10964144B2 (en) Automated entry
CN112003899A (en) Vehicle account remote logout method and system
CN111091474A (en) Insurance pricing method, device, computer storage medium and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant