CN115828314A - Unmanned aerial vehicle operation data evidence storing method and system - Google Patents

Unmanned aerial vehicle operation data evidence storing method and system Download PDF

Info

Publication number
CN115828314A
CN115828314A CN202111578176.1A CN202111578176A CN115828314A CN 115828314 A CN115828314 A CN 115828314A CN 202111578176 A CN202111578176 A CN 202111578176A CN 115828314 A CN115828314 A CN 115828314A
Authority
CN
China
Prior art keywords
data
unmanned aerial
aerial vehicle
flight
control station
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111578176.1A
Other languages
Chinese (zh)
Inventor
刘瑞
陈新锋
张雷
李海军
邹莹芝
韦艺
杨海涛
郑志刚
柏艺琴
刘艳思
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Academy of Civil Aviation Science and Technology
Original Assignee
China Academy of Civil Aviation Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Academy of Civil Aviation Science and Technology filed Critical China Academy of Civil Aviation Science and Technology
Priority to CN202111578176.1A priority Critical patent/CN115828314A/en
Publication of CN115828314A publication Critical patent/CN115828314A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides an unmanned aerial vehicle operation data evidence storing method and system, and belongs to the field of operation safety of specific unmanned aerial vehicles. Firstly, respectively allocating IDs to an unmanned aerial vehicle and an operation control station, and encrypting data generated in the operation of the unmanned aerial vehicle and then transmitting the encrypted data to the operation control station; after the unmanned aerial vehicle runs, the operation control station processes the data and uploads the processed data to the block chain. The invention can meet the requirements of a supervisor on data authenticity and non-tampering property, effectively protects the privacy data such as flight detailed data and flight control system logs and the like on the premise of ensuring the normative of the operation data of a specific type of unmanned aerial vehicle and the authenticity of uplink data, ensures the efficiency of the supervision of the operation safety of the unmanned aerial vehicle, and simultaneously ensures the efficiency of data uplink transmission.

Description

Unmanned aerial vehicle operation data evidence storing method and system
Technical Field
The invention belongs to the field of unmanned aerial vehicle operation safety, and particularly relates to an unmanned aerial vehicle operation data evidence storing method for operation supervision of a specific type of unmanned aerial vehicle, which is used for storing and verifying unmanned aerial vehicle operation data meeting the operation supervision requirements of the unmanned aerial vehicle.
Background
An unmanned aerial vehicle (unmanned aerial vehicle for short) is an airplane managed by a control station, and the unmanned aerial vehicle has the characteristics of low cost, convenience in operation, high flexibility and the like, so that various types of equipment can be carried to execute various tasks. In recent years, with the gradual maturity of unmanned aerial vehicle technology, unmanned aerial vehicles are widely applied to national production activities such as power transmission line inspection, national soil resource measurement, agriculture and forestry pesticide spraying, natural disaster emergency management and the like.
With the gradual promotion of the low-altitude airspace open policy, the total running amount of the domestic unmanned aerial vehicles is rapidly increased. In the operation of unmanned aerial vehicle that increases day by day fast, demonstrate the problem that the model is mixed and disorderly, equipment disperses, lacks unified management, introduced a large amount of potential safety hazards for airspace safety and ground personnel safety.
The special unmanned aerial vehicle is a civil unmanned aerial vehicle with the weight of the unmanned aerial vehicle more than 15 kilograms and less than or equal to 116 kilograms, or the total takeoff weight more than 25 kilograms and less than or equal to 150 kilograms. The invention is suitable for all unmanned aerial vehicles, but the unmanned aerial vehicle smaller than the specific unmanned aerial vehicle is not in the supervision range, the related operation data and records do not need to be reliably filed, the unmanned aerial vehicle larger than the bit point unmanned aerial vehicle is managed according to navigation, and the problem of data evidence can be solved by the method.
In order to deal with potential safety hazards in the operation of unmanned aerial vehicles and standardize the operation of the unmanned aerial vehicles, and ensure the life and property safety of national airspace and ground personnel, airspace safety supervision departments set out a series of regulations, consultation notices and industrial standards, such as light and small unmanned aerial vehicle operation regulations (AC-91-FS-2015) -31), specific unmanned aerial vehicle trial operation management regulations (AC-92-2019-01), light and small civil unmanned aerial vehicle flight dynamic data management regulations (AC-93-TM-2019-01), unmanned aerial vehicle cloud system interface data regulations (MH/T2009-2017 and the like, so as to realize the unified supervision on the operation of the unmanned aerial vehicles.
In conventional aircraft operation supervision, the primary means of supervision is the review of various operational-related records. The production of unmanned aerial vehicles is accompanied by the explosive development of information technology, so that the operation of unmanned aerial vehicles has natural digital characteristics, and the traditional supervision mode relying on paper record is difficult to apply. Considering unmanned aerial vehicle operation and the difference of having the man-machine operation, if adopting paper record supervision not only inefficiency to the unmanned aerial vehicle operation, can hinder the healthy development of unmanned aerial vehicle industry moreover. Data in electronic recording or information systems has extremely high volatility and volatility. Although the general electronic signature technology can solve the problem of changeability of partial format data and guarantee tamper-proof property of data or electronic records, the problem of changeability of the data or electronic records which cannot be solved is solved, namely, after electronic operation data of the unmanned aerial vehicle is maliciously deleted, a supervisor cannot carry out effective supervision.
The general block chain technology can solve the problems of changeability and extinguishability of electronic data to a certain extent through application of the distributed book technology. However, the operation data of the unmanned aerial vehicle is complex and variable, so that the problem that the block chain technology cannot meet the operation event/accident investigation of the unmanned aerial vehicle easily occurs in the application of the operation data storage certificate of the unmanned aerial vehicle, that is, whether the electronic data can comprehensively meet the operation supervision requirement of the unmanned aerial vehicle is difficult to guarantee, and therefore the block chain technology is difficult to actually develop in the application of the operation data storage certificate of the unmanned aerial vehicle.
Disclosure of Invention
The invention aims to solve the problems in the prior art and provides an unmanned aerial vehicle operation data evidence storing method and system, which can meet the requirements of tamper prevention and loss prevention on unmanned aerial vehicle operation electronic records and can also meet the requirements of data standardization, standardization and supervision.
The invention is realized by the following technical scheme:
the invention provides a method for storing and certifying the operation data of an unmanned aerial vehicle, which comprises the steps of firstly respectively allocating IDs to the unmanned aerial vehicle and an operation control station, and encrypting the data generated in the operation of the unmanned aerial vehicle and then transmitting the encrypted data to the operation control station; after the unmanned aerial vehicle runs, the operation control station processes the data and uploads the processed data to the block chain.
The invention is further improved in that:
the method comprises the following steps:
(1) Allocating unmanned aerial vehicle ID, namely UAVID to the unmanned aerial vehicle;
(2) Allocating a control end ID (identity), namely UACID (unmanned aerial vehicle identifier) to an operation control station of the unmanned aerial vehicle;
(3) Data generated in the operation of the unmanned aerial vehicle are encrypted and then transmitted to an operation control station;
(4) The operation control station receives, verifies and stores data;
(5) When the unmanned aerial vehicle finishes running, the running control station encodes the running task data to obtain EventData;
(6) The operation control station processes the flight event investigation evidence data and the privacy data to obtain evencedata;
(7) The operation control station uploads the EventData and the EidenceData serving as uplink data to a block chain, and obtains an on-chain evidence storage address of the flight event of the unmanned aerial vehicle;
(8) And after the supervision node acquires the uplink data of the operation control station, performing data verification and identity verification, if the verification is passed, analyzing the EventData to obtain an analysis result, and storing the analysis result and the EidenceData together.
The invention is further improved in that:
the operation of the step (1) comprises the following steps:
and taking the unmanned aerial vehicle real-name registration number as UAVID, taking the UAVID as a main body, signing and issuing a digital certificate private key, and synchronously sending a public key corresponding to the private key to a data monitoring party.
The invention is further improved in that:
the operation control station in the step (2) includes: an intelligent terminal, a remote controller, a ground control vehicle or an automatic control system;
the operation of the step (2) comprises the following steps:
and taking the MAC address of the operation control station as UACID, taking the UACID as a main body, signing and issuing a private key of a digital certificate, and synchronously sending a public key corresponding to the private key to a data monitoring party.
The invention is further improved in that:
the data in the step (3) includes operation data and sensor data, and specifically includes: longitude, latitude, altitude, airspeed, track angle;
the operation of the step (3) comprises:
and after the data is signed by using a private key corresponding to the UAVID, the data is sent to the operation control station at a specific frequency.
The invention is further improved in that:
the operation of the step (4) comprises the following steps:
and after receiving the data of the unmanned aerial vehicle, the operation control station performs data authenticity verification through a public key corresponding to UAVID, and if the data is true, the operation control station stores the data.
The invention is further improved in that:
the running task data in the step (5) comprises: flight mission data, maintenance mission data, and inspection mission data;
the operation of the step (5) comprises the following steps:
encoding flight mission data: sequentially connecting the flight task number, the flight time length, the take-off time, the landing time, the power device starting time, the power device shutdown time, the take-off oil quantity/electric quantity, the landing oil quantity/electric quantity and the flight abnormity code in series to obtain a flight task data code;
encoding maintenance task data: sequentially connecting the maintenance task number, the maintenance place, the maintenance type and the maintenance object number in series to obtain a maintenance task data code;
encoding the inspection task data: sequentially connecting the inspection task number and the flight task number in series to obtain an inspection task data code;
and serially connecting the flight task data codes, the maintenance task data codes and the inspection task data codes to form EventData.
The invention is further improved in that:
the flight event survey corroboration data and privacy data in the step (6) comprise: flight system logs, flight charts, flight mission books;
the operation of the step (6) comprises the following steps:
and (3) extracting summaries of a flight control system log, a flight chart and a flight mission book by using an SM3 algorithm to serve as evencedata.
The invention is further improved in that:
the method further comprises:
(9) And (3) verifying data in event investigation, and analyzing and utilizing the data:
when event investigation needs to be carried out recording, calling and analyzing, an unmanned aerial vehicle operator presents a chain certificate-storing address or an unmanned aerial vehicle UAVID of an investigated event to a data supervisor, and provides investigation evidence-assisting data or a recording original text with privacy data;
and after the data monitoring party receives the data, the authenticity, integrity and validity check of the data are completed, and when the data check is passed and the data are confirmed to be correct, the related data are used as original data for further business investigation.
In a second aspect of the present invention, there is provided an unmanned aerial vehicle operation data verification system, including:
the ID distribution unit is used for distributing the ID of the unmanned aerial vehicle to the unmanned aerial vehicle and distributing the ID of a control end to an operation control station of the unmanned aerial vehicle;
the encryption unit is used for encrypting data generated in the operation of the unmanned aerial vehicle and transmitting the encrypted data to the operation control station;
a receiving unit for receiving, verifying and storing data;
and the encoding processing unit is used for encoding the operation task data to obtain EventData when the unmanned aerial vehicle finishes operation, and processing the flight event investigation corroboration data and the privacy data to obtain Event data:
the uplink unit is used for uploading the EventData and the EidenceData serving as uplink data to the block chain and obtaining an on-chain evidence storage address of the flight event of the unmanned aerial vehicle;
and the checking unit is used for carrying out data checking and identity checking on the uplink data, analyzing the EventData to obtain an analysis result if the checking is passed, and storing the analysis result and the Event data together.
Compared with the prior art, the invention has the beneficial effects that:
(1) By the method, the operation data of the specific type of unmanned aerial vehicle can realize chain storage of the block chain, all real-name management nodes and primary nodes on the block chain have no direct interest relationship with operators of the specific type of unmanned aerial vehicle, and the requirements of a supervisor on data authenticity and no tampering can be met.
(2) According to the invention, the flight detailed data and privacy data such as the flight control system log are effectively protected on the premise of ensuring the normative of the operation data of the specific type of unmanned aerial vehicle and the authenticity of the uplink data.
(3) By the method and the system, the operating condition of the unmanned aerial vehicle can be quickly retrieved by the monitoring party by encoding the operating task data, and the corresponding operating record can be quickly retrieved, so that the efficiency of monitoring the operating safety of the unmanned aerial vehicle is ensured. Meanwhile, real-name registration information of the unmanned aerial vehicle can be analyzed from the running task codes, information such as a flight task number, UAVID (unmanned aerial vehicle UAVID) and flight time is compressed, and the efficiency of data uplink transmission is ensured.
Drawings
FIG. 1 is a block diagram of the steps of the method of the present invention;
FIG. 2 is a graph of the relationship between the points of the links of a block used in the method of the present invention;
fig. 3 shows the information flow to which the method of the invention relates.
Detailed Description
The invention is described in further detail below with reference to the accompanying drawings:
as shown in fig. 1, the present invention provides a method for storing operating data of an unmanned aerial vehicle, wherein the method comprises:
(1) A drone ID (identity number) is assigned to a particular type of drone, i.e., UAVID:
the general UAVID is the same as the real-name registration number of the unmanned aerial vehicle, and the UAVID is used as a main body to issue a digital certificate private key for encryption of relevant operation data or sensor data of the unmanned aerial vehicle and trusted data tracing. The corresponding public key should be synchronously sent to a data supervisor, namely a civil aviation bureau, which needs to continuously perform qualified approval and supervision on the operation process of the unmanned aerial vehicle.
(2) And allocating a control end ID (identity), namely UACID:
the operation control station (also called ground control station) comprises: intelligent terminal, remote controller, ground control car or automatic control system etc.. The normal UACID should be the same as the MAC address of the operation control station, i.e., the MAC address of the operation control station is used as the UACID. And the UACID is taken as a main body, and a digital certificate private key is issued for encryption of flight mission data and trusted data tracing. The corresponding public key should be sent to the data administrator synchronously.
During practical application, after the unmanned aerial vehicle holder registers the real name of the unmanned aerial vehicle holder, the data supervisor can distribute an unmanned aerial vehicle ID to each unmanned aerial vehicle. The MAC address of each operation control station can be distributed by the owner of the unmanned aerial vehicle.
(3) The data generated in the operation of the unmanned aerial vehicle are encrypted and then transmitted to the operation control station:
the data includes operation data and sensor data, and specifically includes: longitude, latitude, altitude, elevation, airspeed, track angle, etc. And after the data is signed by using a private key corresponding to the UAVID, the data is sent to the operation control station at a specific frequency.
(4) The operation control station receives, verifies and stores data:
and after receiving the data of the unmanned aerial vehicle, the operation control station performs data authenticity verification through a public key corresponding to UAVID, and if the data is true, the operation control station stores the data, including the original text of the operation data or the sensor data, a signature packet during each receiving and the like.
(5) When the unmanned aerial vehicle finishes running, the running control station codes the running task data (the data related to the task is different in coding mode according to different types of the task) to obtain EventData.
The running task data includes: the flight mission data, the maintenance mission data and the inspection mission data are specifically encoded as follows:
the flight mission data is encoded as follows:
the method comprises the steps of sequentially connecting flying task numbers (0 + UAVID + flying date YYMMDD +4 digit sequence numbers), a takeoff airport code (3 digit letter), a landing airport code (3 digit letter), flying time (integer, second), takeoff time (hhmmss), landing time (hhmmss), power device starting time (hhmmss), power device shutdown time (hhmmss), takeoff oil quantity/electric quantity (2 digit after decimal point), landing oil quantity/electric quantity (2 digit after decimal point), flying abnormity codes (0 is no abnormity, 1 is air parking, 2 is communication interruption, 3 is alarm indication, 4 is foreign object damage, 5 is return flight/reserve descent, 6 is ignition, and 7 is maintenance error) in series to obtain flying task data codes, wherein the data can adopt "+" as a separator.
The repair order data is encoded as follows:
the maintenance task number (1 + UAVID + maintenance date YYMMDD +4 digit sequence number), the maintenance place (3 digit letter), the maintenance type (0 is routine maintenance, 1 is regular inspection maintenance, 2 is AD/SB execution, 3 is temporary troubleshooting), the maintenance object number (4 word code, can refer to ATA section number) are connected in series in turn to obtain the maintenance task data code, and the data can adopt "+" as a separator.
The inspection task data is encoded as follows:
the inspection task data refers specifically to the data of the pre-flight inspection, and the data is encoded as follows: the inspection task number (2 + + UAVID + inspection date YYMMDD + 4-bit sequential number) and the flight task number (0 + UAVID + flight date YYMMDD + 4-bit sequential number) are sequentially connected in series to obtain the inspection task data code, and the data can adopt "+" as a separator.
And the operation control station respectively encodes the three data according to different tasks.
EventData is formed by connecting the codes (flight mission data code, maintenance mission data code and inspection mission data code) in series, and the data uses "+" as a separator. The flight mission, the maintenance mission and the inspection mission are three parallel mission types which need to be stored with evidence, aiming at different mission types, data which need to be stored with evidence are different, for example, some missions may only be the flight mission, the flight mission data coding is used as EventData, some missions comprise the flight mission and the maintenance mission, the flight mission data coding and the maintenance mission data coding are connected in series as EventData, and the like.
(6) The operation control station processes the flight event investigation corroborative data and the privacy data to obtain evencedata:
flight event survey corroboration data and privacy data include: flight system logs, flight charts, flight mission books, and the like. The flight system log is data generated by the flight control system according to the operation data or the sensor data in the step (4), the flight chart is generated by an unmanned aerial vehicle navigation system or an unmanned aerial vehicle fence system, and the flight mission book is a manually filled PDF file or a database record, which are both existing data and are not described again.
And (6) extracting the abstracts of the relevant electronic records such as the flight control system logs, the flight chart, the flight mission book and the like by using the existing SM3 algorithm, wherein the abstracts are 256-bit character strings, the abstracts form the evencedata, the data volume is compressed by extracting the abstracts, and meanwhile, the flight detailed data, the flight control system logs and other privacy data are effectively protected on the premise of ensuring the normalization of the specific type of unmanned aerial vehicle operation data and the authenticity of the uplink data.
(7) Operating the control station to upload task data to the block chain, namely, uplink:
the operation control station takes the eventData and the eventData as original text of block chain chaining data (namely chaining the eventData and the eventData), performs data chaining work through a block chain information issuing mechanism after finishing data signature calculation, and obtains a chain on-chain evidence storage address of the flight event of the unmanned aerial vehicle.
(8) After the supervision node acquires the uplink data of the operation control station, data verification and identity verification are carried out, if the verification is passed, supervision index data (namely analysis EventData) in the uplink data are analyzed, the supervision index data comprise a flight task number, UAVID (unmanned aerial vehicle) and flight time, supervision data storage is completed together with the rest uplink data (namely the EventData), data obtained by analyzing the EventData are stored, and meanwhile the EventData are directly stored.
The supervision node is a primary or secondary node controlled by a data supervisor on the block chain, and the supervision node obtains the uplink data by using the evidence storage address in the step (7). Both the data verification and the identity verification are realized through a key pair, namely, through the digital certificate in (1) or (2).
The method further comprises:
(9) And (3) verifying data in event investigation, and analyzing and utilizing the data:
when event investigation occurs later and record calling analysis is needed, the unmanned aerial vehicle operator presents the evidence storage address of the investigated event or UAVID of the unmanned aerial vehicle to the data supervisor, and meanwhile, investigation evidence data or related record texts with privacy data are provided additionally (the data are stored by the operator). After receiving the relevant data, the data monitoring party completes the verification of authenticity, integrity and validity of the data (the verification is realized by adopting the existing method, and the data is not followed any more). When the data passes the verification and is confirmed to be correct, the related data (including the data existing on the blockchain and the original data without uplink (for evencedata, the uplink is the abstract value of the data original text, but the part of the data original text is not uplink, namely the original data without uplink) can be used as an original for further business investigation, when the verification is required, an unmanned aerial vehicle operator presents the data original text, extracts the abstract and compares the abstract with the uplink abstract, if the abstract is consistent, the related data original text is considered to be true and credible, otherwise, the data original text is considered to be tampered), and the specific business investigation method is the prior art and is not repeated herein.
The block chain used for storing the operation data of the unmanned aerial vehicle has the following characteristics:
(1) The nodes on the block chain are divided into a management node, a primary node, a secondary node and an application node according to different authorities, and the specific authorities are as follows:
the rights include:
and (4) certificate storage authority: refers to that uplink of operation data can be completed by the node.
And (3) consensus authority: the verification of the authenticity and the integrity of the uplink data can be completed through a consensus algorithm.
And (4) verifying the authority: it means that whether the data is already chain-credited can be completed through the verification algorithm.
Configuring the authority: the method can release the uplink data model in time according to the relevant supervision requirements of the unmanned aerial vehicle operation data evidence storage, and modify the structure and content of the relevant data in the EventData.
The access authority refers to the certificate storage authority of the first-level node or the second-level node which can be called in a limited way after identity verification.
a. The management node has the authority of storing certificate, identifying, verifying and configuring.
b. The primary node has the authority of storing certificate, common identification and verification.
c. The secondary node has the authority of storing certificate and verifying.
d. The application node has access rights.
The working process between the nodes is shown in fig. 2, and includes:
a1, a management node issues a data model configuration rule to a primary node and a secondary node, and the data normalization of chain connection of the primary node and the secondary node is ensured;
and A2, the management node provides data consensus service for the primary node and the secondary node and participates in voting of data authenticity and integrity. Data can be issued to the first-level node and the second-level node, and data chaining is achieved;
and A3, the primary node provides data consensus service for the secondary node and participates in voting of data authenticity and integrity. Data can be issued to the management node and the secondary node, and data uplink is realized;
a4, the secondary node can issue data to the management node and the primary node to realize data chaining;
and A5, the application node can call the data uplink function of the primary node or the secondary node according to the authorization to complete the uplink release of the data.
(2) All nodes on the block chain are in a real-name system, and all nodes need to be configured with digital certificates to complete verification of identity authenticity and ensure safety of data chaining.
(3) The integrity of uplink data on the block chain is completed by the management node and the primary node through a consensus algorithm. Verification of data integrity is generally accomplished in a 100% consistent manner, i.e., the verified data needs to be 100% identical to the data of the management node and the primary node.
The invention also provides an unmanned aerial vehicle operation data storage system, which comprises:
the ID distribution unit is used for distributing the ID of the unmanned aerial vehicle to the unmanned aerial vehicle and distributing the ID of a control end to an operation control station of the unmanned aerial vehicle;
the encryption unit is used for encrypting data generated in the operation of the unmanned aerial vehicle and transmitting the encrypted data to the operation control station;
a receiving unit for receiving, verifying and storing data;
and the encoding processing unit is used for encoding the operation task data to obtain EventData when the unmanned aerial vehicle finishes operation, and processing the flight event investigation corroboration data and the privacy data to obtain Event data:
the uplink unit is used for uploading the eventData and the evencedData serving as uplink data to the block chain and obtaining an on-chain evidence storage address of the flight event of the unmanned aerial vehicle;
and the checking unit is used for carrying out data checking and identity checking on the uplink data, analyzing the EventData to obtain an analysis result if the checking is passed, and storing the analysis result and the Event data together.
The examples of the invention are as follows:
as shown in fig. 3, the present embodiment includes the following steps:
step 1: unmanned aerial vehicle (real name registration number: UAV 12345678) flies data or sensor data to the operation control station according to the established frequency (generally 5 seconds 1 time), including longitude (accurate to 7 bits after decimal point, can multiply 7 bits after 10), latitude (accurate to 7 bits after decimal point, can multiply 7 bits after 10, transmit), height (accurate to 2 bits after decimal point, can multiply 2 bits after 10, transmit), altitude (accurate to 2 bits after decimal point, can multiply 2 bits after 10), speed (accurate to 1 bit after decimal point, can multiply 10, transmit), track angle (accurate to 1 bit after decimal point, can multiply 10, transmit). The data transmission may use the https protocol and the data may be concatenated, separated by a "+".
Step 2: and the operation control station receives the flight data and determines the authenticity and integrity of the data through the public key of the UAVID corresponding to the digital certificate. If the authenticity and integrity checks are passed, the operation control station stores the current set of flight data. After the flight mission is finished, the original text data of the flight mission (i.e. the EventData obtained by encoding) is obtained in a manual entry or system reading mode, for example, an unmanned aerial vehicle executing a patrol mission for 2 hours at an airport in great Khingan is only provided with the flight mission in this embodiment, and therefore the EventData is: "0UAV12345678202112051234+ JGD 7200+120000+140000+115000+141000+32.15+10.16+0"
Meanwhile, for evidence data including information such as flight charts, flight control system logs, flight data packets and the like, the SM3 algorithm is utilized to calculate the abstract of 256 bytes to serve as the evencedata of the flight mission.
Each flight task corresponds to one EventData and one evencedata
And step 3: and the operation control station takes the evencedata and the EventData as all evidence-storing data of the flight to carry out data chaining on the coded data. If the unmanned aerial vehicle operator is a medium-large company, the total flying amount is large, and high requirements are placed on the data concurrency amount and the evidence storage speed, data uplink can be performed in a self-established node mode (primary or secondary). If the unmanned aerial vehicle operator is a small-sized company, the total flying amount is less, and data chaining can be performed through the appointed primary node or secondary node in an authorized access mode.
And 4, step 4: the primary node or the secondary node realizes the diffusion transmission and the distributed storage of the uplink data by using the relevant characteristics and technologies of the block chain, and ensures the authenticity, the integrity and the non-tamper property of the data.
And 5: and the characteristic unmanned aerial vehicle operation safety monitoring party uses the management node or the primary node to monitor the block chain data, acquires the chain unmanned aerial vehicle data in time, and confirms the identity of the data sending party and the authenticity of the data per se through data verification and consensus. And if the identity of the data sender is credible and the authenticity of the data is credible, carrying out the next step.
Step 6: the supervisory system analyzes EventData, and the analysis result obtained after analyzing EventData "0UAV12345678202112051234+ JGD 7200+120000+140000+115000+141000+32.15+10.16+0" (EventData in this embodiment only has flight task code) in this example is as follows:
Figure BDA0003425301530000131
the task type is as follows: flight mission
Figure BDA0003425301530000132
Unmanned aerial vehicle numbering: UAV12345678
Figure BDA0003425301530000133
Flight mission of the unmanned aerial vehicle: UAV12345678202112051234
Figure BDA0003425301530000134
And (3) task time: 12 months and 5 days in 2021
Figure BDA0003425301530000135
Taking-off airport: daxing' an Ling Gagge Gardney airport
Figure BDA0003425301530000136
Landing the airport: daxing' an Ling Gagge Gardney airport
Figure BDA0003425301530000137
Flying oftentimes: 2 hours
Figure BDA0003425301530000138
Takeoff time: 12 o' clock 00 min 00 s
Figure BDA0003425301530000139
Landing time: 14 point 00 min 00 s
Figure BDA00034253015300001310
Starting time of an engine: 11 point 50 min 00 sec
Figure BDA00034253015300001311
The engine shutdown time: 14 point 10 min 00 s
Figure BDA00034253015300001312
When the engine is operating: 2 hours and 20 minutes
Figure BDA00034253015300001313
Oil mass at take-off: 31.15 gallons
Figure BDA00034253015300001314
Oil mass at landing: 10.16 gallons
Figure BDA00034253015300001315
Flight abnormity: is free of
Meanwhile, according to the flight mission and the unmanned aerial vehicle number, relevant information of an unmanned aerial vehicle operator, unmanned aerial vehicle airspace approval and unmanned aerial vehicle predetermined air routes can be searched and inquired.
And 7: when event investigation, spot check or annual review is required, corresponding event information (i.e. data monitored in the chain in step 5) can be called from the unmanned aerial vehicle supervision system.
And 8: the unmanned aerial vehicle operator provides the original files of the relevant evidence data, flight chart, flight control system log, flight data packet and other information.
And step 9: and the supervisor verifies the authenticity and credibility of the data provided by the unmanned aerial vehicle operator by using the block chain verification function and the timestamp information.
Step 10: the supervisor conducts an event survey or data analysis.
Through the steps, an unmanned aerial vehicle operator can timely complete the storage of the operation data of the unmanned aerial vehicle after a task, and the requirement of unmanned aerial vehicle supervision on data timeliness and authenticity is guaranteed to be met. Meanwhile, according to the method, the unmanned aerial vehicle operator can ensure the normalization of the uplink data, and the subsequent investigation and supervision are facilitated. Moreover, the unmanned aerial vehicle supervisory part can break away from unmanned aerial vehicle operator's system completely, independently develop unmanned aerial vehicle operation supervision and investigation work, and need not to visit unmanned aerial vehicle operator's system, and relevant investigation and analysis can not lead to unmanned aerial vehicle operator's system to shut down, can not cause adverse effect to unmanned aerial vehicle operator's normal production behavior.
Finally, it should be noted that the above-mentioned technical solution is only one embodiment of the present invention, and it will be apparent to those skilled in the art that various modifications and variations can be easily made based on the application method and principle of the present invention disclosed, and the method is not limited to the above-mentioned specific embodiment of the present invention, so that the above-mentioned embodiment is only preferred, and not restrictive.

Claims (10)

1. The utility model provides an unmanned aerial vehicle operation data deposit certificate method which characterized in that: firstly, respectively allocating IDs to an unmanned aerial vehicle and an operation control station, and encrypting data generated in the operation of the unmanned aerial vehicle and then transmitting the encrypted data to the operation control station; after the unmanned aerial vehicle runs, the operation control station processes the data and uploads the processed data to the block chain.
2. The unmanned aerial vehicle operation data evidence storing method according to claim 1, characterized in that: the method comprises the following steps:
(1) Allocating unmanned aerial vehicle ID, namely UAVID to the unmanned aerial vehicle;
(2) Allocating a control end ID (identity), namely UACID (unmanned aerial vehicle identifier) to an operation control station of the unmanned aerial vehicle;
(3) Data generated in the operation of the unmanned aerial vehicle are encrypted and then transmitted to an operation control station;
(4) The operation control station receives, verifies and stores data;
(5) When the unmanned aerial vehicle finishes running, the running control station encodes the running task data to obtain EventData;
(6) The operation control station processes the flight event investigation corroborative data and the privacy data to obtain evencedata;
(7) The operation control station uploads the EventData and the EidenceData serving as uplink data to a block chain, and obtains an on-chain evidence storage address of the flight event of the unmanned aerial vehicle;
(8) And after the supervision node acquires the uplink data of the operation control station, performing data verification and identity verification, if the verification is passed, analyzing the EventData to obtain an analysis result, and storing the analysis result and the EidenceData together.
3. The unmanned aerial vehicle operation data evidence storing method according to claim 2, characterized in that: the operation of the step (1) comprises the following steps:
and taking the unmanned aerial vehicle real-name registration number as UAVID, taking the UAVID as a main body, signing and issuing a digital certificate private key, and synchronously sending a public key corresponding to the private key to a data monitoring party.
4. The unmanned aerial vehicle operation data evidence storing method according to claim 3, characterized in that: the operation control station in the step (2) includes: an intelligent terminal, a remote controller, a ground control vehicle or an automatic control system;
the operation of the step (2) comprises the following steps:
and taking the MAC address of the operation control station as UACID, taking the UACID as a main body, signing and issuing a private key of a digital certificate, and synchronously sending a public key corresponding to the private key to a data monitoring party.
5. The unmanned aerial vehicle operation data evidence storing method according to claim 4, characterized in that: the data in the step (3) includes operation data and sensor data, and specifically includes: longitude, latitude, altitude, airspeed, track angle;
the operation of the step (3) comprises the following steps:
and after the data is signed by using a private key corresponding to the UAVID, the data is sent to the operation control station at a specific frequency.
6. The unmanned aerial vehicle operation data evidence storing method according to claim 5, characterized in that: the operation of the step (4) comprises the following steps:
and after receiving the data of the unmanned aerial vehicle, the operation control station performs data authenticity verification through a public key corresponding to UAVID, and if the data is true, the operation control station stores the data.
7. The unmanned aerial vehicle operation data evidence storing method according to claim 6, characterized in that: the running task data in the step (5) includes: flight mission data, maintenance mission data, and inspection mission data;
the operation of the step (5) comprises the following steps:
encoding flight mission data: sequentially connecting the flight task number, the flight time length, the take-off time, the landing time, the power device starting time, the power device shutdown time, the take-off oil quantity/electric quantity, the landing oil quantity/electric quantity and the flight abnormity code in series to obtain a flight task data code;
encoding maintenance task data: sequentially connecting the maintenance task number, the maintenance place, the maintenance type and the maintenance object number in series to obtain a maintenance task data code;
encoding the inspection task data: sequentially connecting the inspection task number and the flight task number in series to obtain an inspection task data code;
and serially connecting the flight task data codes, the maintenance task data codes and the inspection task data codes to form EventData.
8. The unmanned aerial vehicle operation data evidence storing method according to claim 7, characterized in that: the flight event survey corroboration data and privacy data in the step (6) comprise: flight system logs, flight charts, flight mission books;
the operation of the step (6) comprises the following steps:
and (3) extracting summaries of a flight control system log, a flight chart and a flight mission book by using an SM3 algorithm to serve as evencedata.
9. The unmanned aerial vehicle operation data evidence storing method according to claim 8, characterized in that: the method further comprises:
(9) And (3) verifying data in event investigation, and analyzing and utilizing the data:
when event investigation needs to be carried out recording, calling and analyzing, an unmanned aerial vehicle operator presents a chain certificate-storing address or an unmanned aerial vehicle UAVID of an investigated event to a data supervisor, and provides investigation evidence-assisting data or a recording original text with privacy data;
and after the data monitoring party receives the data, the authenticity, integrity and validity check of the data are completed, and when the data check is passed and the data are confirmed to be correct, the related data are used as original data for further business investigation.
10. The utility model provides an unmanned aerial vehicle operation data system of depositing, its characterized in that: the system comprises:
the ID distribution unit is used for distributing the ID of the unmanned aerial vehicle to the unmanned aerial vehicle and distributing the ID of a control end to the operation control station of the unmanned aerial vehicle;
the encryption unit is used for encrypting data generated in the operation of the unmanned aerial vehicle and transmitting the encrypted data to the operation control station;
a receiving unit for receiving, verifying and storing data;
and the coding processing unit is used for coding the running task data to obtain EventData and processing the flight event investigation evidence data and the privacy data to obtain EidenceData when the unmanned aerial vehicle runs and finishes:
the uplink unit is used for uploading the EventData and the EidenceData serving as uplink data to the block chain and obtaining an on-chain evidence storage address of the flight event of the unmanned aerial vehicle;
and the checking unit is used for carrying out data checking and identity checking on the uplink data, analyzing the EventData to obtain an analysis result if the checking is passed, and storing the analysis result and the Event data together.
CN202111578176.1A 2021-12-22 2021-12-22 Unmanned aerial vehicle operation data evidence storing method and system Pending CN115828314A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111578176.1A CN115828314A (en) 2021-12-22 2021-12-22 Unmanned aerial vehicle operation data evidence storing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111578176.1A CN115828314A (en) 2021-12-22 2021-12-22 Unmanned aerial vehicle operation data evidence storing method and system

Publications (1)

Publication Number Publication Date
CN115828314A true CN115828314A (en) 2023-03-21

Family

ID=85515545

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111578176.1A Pending CN115828314A (en) 2021-12-22 2021-12-22 Unmanned aerial vehicle operation data evidence storing method and system

Country Status (1)

Country Link
CN (1) CN115828314A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116744252A (en) * 2023-05-15 2023-09-12 北京金和网络股份有限公司 System for guaranteeing authenticity of collected data of unmanned aerial vehicle

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116744252A (en) * 2023-05-15 2023-09-12 北京金和网络股份有限公司 System for guaranteeing authenticity of collected data of unmanned aerial vehicle

Similar Documents

Publication Publication Date Title
EP2870706B1 (en) System and method for air-to-ground data streaming
US11716334B2 (en) Transport communication management
US20200310408A1 (en) Unmanned aerial vehicle system providing secure communication, data transfer, and tracking
US10121384B2 (en) Aircraft performance predictions
CN105160514A (en) Public security integrated management system and public security integrated management method
CN110677430B (en) User risk degree evaluation method and system based on log data of network security equipment
CN111127689A (en) System and method for managing and controlling inspection service of unmanned aerial vehicle
CN113077168B (en) Machine patrol operation risk management and control system and method
CN109992623B (en) Block chain-based aviation service data sharing method and related equipment
EP3094948B1 (en) Web-based recorder configuration utility
CN106055984A (en) Classified management method applied to security baseline software
CN115828314A (en) Unmanned aerial vehicle operation data evidence storing method and system
CN107424442A (en) Fence and the unmanned aerial vehicle (UAV) control method based on fence
WO2021202545A1 (en) Blockchain-based hybrid authentication
CN110633811A (en) Electronic signature system for civil aviation maintenance
Pollard et al. Connected aircraft: Cyber-safety risks, insider threat, and management approaches
CN113096447A (en) Airspace authorization coordination operation method
KR101614742B1 (en) Management apparatus
CN113222488B (en) Unmanned aerial vehicle logistics operation and aviation management method applying block chain technology
Guzairov et al. Simulation modelling of the transmission system of the telemetric information on the status of the on-board aircraft status
CN110365467B (en) Unmanned aerial vehicle behavior supervision system and method
Frid et al. Architecture of modular system for assessing security of telemetry information transmission system
US20240119760A1 (en) Generating and securely transferring aircraft maintenance and operations data
Rencher et al. Opportunities, Challenges and Requirements for Use of Blockchain in Unmanned Aircraft Systems Operating Below 400ft Above Ground Level for Commercial Use
Masi et al. Reaching the L1 EU CCMS level: the experience of Autostrade Per L’Italia

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination