WO2017143570A1 - Procédé et dispositif pour une authentification de dispositif, dispositif d'authentification, véhicule aérien sans équipage et télécommande - Google Patents

Procédé et dispositif pour une authentification de dispositif, dispositif d'authentification, véhicule aérien sans équipage et télécommande Download PDF

Info

Publication number
WO2017143570A1
WO2017143570A1 PCT/CN2016/074581 CN2016074581W WO2017143570A1 WO 2017143570 A1 WO2017143570 A1 WO 2017143570A1 CN 2016074581 W CN2016074581 W CN 2016074581W WO 2017143570 A1 WO2017143570 A1 WO 2017143570A1
Authority
WO
WIPO (PCT)
Prior art keywords
drone
authentication
remote controller
authentication device
operation result
Prior art date
Application number
PCT/CN2016/074581
Other languages
English (en)
Chinese (zh)
Inventor
吴军
丘华良
尤中乾
梁泰文
Original Assignee
深圳市大疆创新科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市大疆创新科技有限公司 filed Critical 深圳市大疆创新科技有限公司
Priority to CN201680002825.4A priority Critical patent/CN106797387B/zh
Priority to PCT/CN2016/074581 priority patent/WO2017143570A1/fr
Publication of WO2017143570A1 publication Critical patent/WO2017143570A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C17/00Arrangements for transmitting signals characterised by the use of a wireless electrical link
    • G08C17/02Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Definitions

  • the embodiments of the present invention relate to the technical field of drones, and in particular, to a device authentication method, device, authentication device, drone, and remote controller.
  • the general way for the user to operate the drone is to use the remote control to realize the flight control of the drone by remote control.
  • the remote control to realize the flight control of the drone by remote control.
  • the smart phone can be connected with the remote controller, so that the smart phone can receive the image of the aerial image taken by the drone through the remote controller.
  • the premise that the smartphone can receive the image is that the smartphone can communicate with the drone or remote controller. Therefore, in order to ensure that the user terminal device such as a smart phone can receive the image image taken by the drone or can perform flight control on the drone, first, the user terminal device needs to authenticate the drone and the remote controller to determine the user terminal. The device can communicate with it.
  • the authentication method adopted is: an encryption authentication chip is implanted in both the drone and the remote controller, and based on the encryption authentication chip, the user terminal device respectively authenticates the drone and the remote controller.
  • the encryption authentication chip needs to be implanted in both the UAV and the remote controller, which not only increases the hardware cost, but also the authentication processing efficiency is relatively low.
  • Embodiments of the present invention provide a device authentication method, device, authentication device, a drone, and a remote controller, which enable high-efficiency authentication of different devices in the UAV system and reduce hardware costs through remote authentication.
  • a first aspect of the present invention provides a device authentication method, including:
  • the authentication device transmits authentication data to the drone to cause the drone to forward the authentication data to a remote controller, the authentication data being used to cause the remote controller to adopt a key pair included in the encryption authentication chip
  • the authentication data is subjected to an encryption operation to obtain an operation result; wherein the remote controller is implanted There is the encryption authentication chip;
  • the authentication device receives the operation result that the remote controller forwards through the drone
  • the authentication device determines that communication with the drone is determined when determining that the operation result is correct.
  • the determining, when determining that the operation result is correct, determining that the UAV can communicate with the UAV includes:
  • the authentication device performs an operation on the authentication data according to a locally stored encryption authentication algorithm to obtain a target operation result
  • the authentication device determines that communication with the drone is determined when determining that the operation result is consistent with the target operation result.
  • the determining, when determining that the operation result is correct, determining that the UAV can communicate with the UAV includes:
  • the authentication device determines that communication with the drone is possible when determining that the decrypted result is consistent with the authentication data.
  • the method further includes:
  • the authentication device authenticates the remote controller according to the encrypted authentication chip implanted in the remote controller.
  • the authentication device is connected to the drone The method further includes:
  • the authentication device directly receives data information sent by the drone to the authentication device, and the data information includes image data.
  • the authentication device is connected to the drone The method further includes:
  • the authentication device directly sends a drone upgrade command to the drone to enable the drone to execute the drone upgrade command to complete a corresponding upgrade operation.
  • the authentication device is connected to the drone, and the method further includes:
  • the authentication device directly sends a remote controller upgrade instruction to the drone to cause the drone to forward the remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction , complete the corresponding upgrade operation.
  • a second aspect of the present invention provides a device authentication method, including:
  • the drone receives the authentication data sent by the authentication device
  • the drone transmits the authentication data to the remote controller, so that the remote controller encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, and the remote controller is implanted There is the encryption authentication chip;
  • the drone receives the operation result sent by the remote controller, and sends the operation result to the authentication device, and when it is determined that the operation result is correct, determines that the communication device can communicate with the authentication device.
  • the drone is connected to the authentication device, the method further includes:
  • the drone directly transmits data information to the authentication device, the data information including image data.
  • the drone is connected to the authentication device, the method further includes:
  • the drone directly receives the drone upgrade command sent by the authentication device, and executes the drone upgrade command to complete the corresponding upgrade operation.
  • the drone is connected to the authentication device, the method further includes:
  • the drone directly receives the remote controller upgrade command sent by the authentication device, and forwards the remote controller upgrade command to the remote controller, so that the remote controller executes the remote controller upgrade command to complete the corresponding upgrade. operating.
  • a third aspect of the present invention provides a device authentication method, including:
  • the remote controller encrypts the authentication data by using a key included in the encryption authentication chip Calculating, obtaining the operation result, the remote controller is implanted with the encryption authentication chip;
  • the remote controller transmits the operation result to the drone to cause the drone to forward the operation result to the authentication device, and the operation result is used to cause the authentication device to determine When the result of the operation is correct, it is determined that the authentication device can communicate with the drone.
  • the cryptographic authentication chip implanted in the remote controller is further configured to enable the authentication device to perform the The remote control is authenticated.
  • the method further includes:
  • the remote controller receives a remote controller upgrade command sent from the authentication device and forwarded by the drone, and executes the remote controller upgrade command to complete a corresponding upgrade operation.
  • a fourth aspect of the present invention provides another device authentication method, including:
  • the authentication device transmits authentication data to the remote controller to cause the remote controller to forward the authentication data to the drone, the authentication data for causing the drone to adopt a key pair included in the encryption authentication chip
  • the authentication data is subjected to an encryption operation to obtain an operation result; wherein the encryption authentication chip is implanted in the drone;
  • the authentication device receives the operation result forwarded by the drone through the remote controller
  • the authentication device determines that communication with the remote controller is possible when determining that the operation result is correct.
  • the determining, when determining that the operation result is correct, determining that the remote controller can communicate with the remote controller includes:
  • the authentication device performs an operation on the authentication data according to a locally stored encryption authentication algorithm to obtain a target operation result
  • the authentication device determines that communication with the remote controller is possible when determining that the operation result is consistent with the target operation result.
  • the determining, when determining that the operation result is correct, determining that the remote controller can communicate with the remote controller includes:
  • the remote control communicates.
  • the authentication device is connected to the remote controller, the method further includes:
  • the authentication device directly sends a remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction to complete a corresponding upgrade operation.
  • the authentication device is connected to the remote controller, the method further includes:
  • the authentication device directly sends a drone upgrade command to the remote controller, so that the remote controller forwards the drone upgrade command to the drone, so that the drone performs the unmanned Machine upgrade instructions to complete the corresponding upgrade operation.
  • the authentication device is connected to the drone, the method further includes:
  • the authentication device directly receives data information sent by the drone to the authentication device, and the data information includes image data.
  • the authentication device is connected to the drone, the method further includes:
  • the authentication device directly sends a drone upgrade command to the drone to enable the drone to execute the drone upgrade command to complete a corresponding upgrade operation.
  • the method further includes:
  • the authentication device authenticates the drone according to the encrypted authentication chip implanted in the drone.
  • a fifth aspect of the present invention provides a device authentication method, including:
  • the remote controller receives the authentication data sent by the authentication device
  • the remote controller sends the authentication data to the drone, so that the drone encrypts the authentication data by using a key included in the encryption authentication chip, and obtains an operation result, in the drone Implanted with the encrypted authentication chip;
  • the remote controller receives the operation result sent by the drone, and sends the operation result to the authentication device, and determines that the communication device can communicate with the authentication device when determining that the operation result is correct.
  • the remote controller is connected to the authentication device, the method further includes:
  • the remote controller directly receives the remote controller upgrade command sent by the authentication device, and executes the remote controller upgrade command to complete the corresponding upgrade operation.
  • the remote controller is connected to the authentication device, the method further includes:
  • the remote controller directly receives the drone upgrade command sent by the authentication device, and forwards the drone upgrade command to the drone to enable the drone to execute the drone upgrade command , complete the corresponding upgrade operation.
  • a sixth aspect of the present invention provides a device authentication method, including:
  • the drone receives the authentication data sent by the remote controller, and the authentication data is sent by the authentication device to the remote controller and forwarded by the remote controller;
  • the UAV encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted in the UAV;
  • the drone transmits the operation result to the remote controller, so that the remote controller forwards the operation result to the authentication device, and the operation result is used to cause the authentication device to determine the When the result of the operation is correct, it is determined that the authentication device is capable of communicating with the remote controller.
  • the cryptographic authentication chip that is implanted in the UAV is further configured to enable the authentication device to perform, according to the cryptographic authentication chip pair The drone is certified.
  • the drone directly transmits data information to the authentication device, the data information including image data.
  • the drone is connected to the authentication device, the method further includes:
  • the drone directly receives the drone upgrade command sent by the authentication device, and executes the drone upgrade command to complete the corresponding upgrade operation.
  • the remote controller is connected to the authentication device, and the method further includes:
  • the drone receives the drone upgrade command sent from the authentication device and forwarded by the drone, and executes the drone upgrade command to complete a corresponding upgrade operation.
  • a seventh aspect of the present invention provides a device authentication device, where the device authentication device is disposed in an authentication device, where the device authentication device includes:
  • a sending module configured to send the authentication data to the drone, so that the drone forwards the authentication data to a remote controller, where the authentication data is used to enable the remote controller to adopt a key included in the encrypted authentication chip Performing an encryption operation on the authentication data to obtain an operation result; wherein the encryption authentication chip is implanted in the remote controller;
  • a receiving module configured to receive the operation result that is forwarded by the remote controller by the drone
  • a processing module configured to determine, when the operation result is correct, to be able to communicate with the drone.
  • the processing module is configured to: perform operation on the authentication data according to a locally stored encryption authentication algorithm, to obtain a target operation result;
  • the processing module is specifically configured to:
  • the processing module is further configured to:
  • the remote controller is authenticated according to the encrypted authentication chip implanted in the remote controller.
  • the authentication device is connected to the drone
  • the receiving module is further configured to:
  • the authentication device is connected to the UAV, and the sending module is further configured to:
  • the authentication device is connected to the drone
  • the sending module is further configured to:
  • An eighth aspect of the present invention provides a device authentication device, where the device authentication device is disposed in a drone, and the device authentication device includes:
  • a receiving module configured to receive authentication data sent by the authentication device
  • a sending module configured to send the authentication data to the remote controller, so that the remote controller performs encryption operation on the authentication data by using a key included in the encryption authentication chip, and obtains an operation result, where the remote controller is implanted There is the encryption authentication chip;
  • the receiving module is further configured to receive the operation result sent by the remote controller, and send the operation result to the authentication device, and when determining that the operation result is correct, determine that the operation may be performed with the authentication device. Communication.
  • the drone is connected to the authentication device, and the sending module is further configured to:
  • Data information is transmitted directly to the authentication device, the data information including image data.
  • the drone is connected to the authentication device, and the receiving module is further configured to:
  • the device also includes:
  • the processing module is configured to execute the drone upgrade command to complete a corresponding upgrade operation.
  • the drone is connected to the authentication device, and the receiving module is further configured to:
  • the sending module is further configured to: forward the remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction to complete a corresponding upgrade operation.
  • a ninth aspect of the present invention provides a device authentication device, where the device authentication device is disposed in a remote controller, and the device authentication device includes:
  • a receiving module configured to receive authentication data sent by the drone, where the authentication data is sent by the authentication device to the drone and forwarded by the drone;
  • a processing module configured to perform an encryption operation on the authentication data by using a key included in the encryption authentication chip, to obtain an operation result, where the remote authentication device is embedded with the encryption authentication chip;
  • a sending module configured to send the operation result to the drone, so that the drone forwards the operation result to the authentication device, where the operation result is used to make the authentication device determine When the operation result is correct, it is determined that the authentication device can communicate with the drone.
  • the cryptographic authentication chip implanted in the remote controller is further configured to enable the authentication device to perform the The remote control is authenticated.
  • the receiving module is further configured to:
  • the processing module is further configured to: execute the remote controller upgrade instruction to complete a corresponding upgrade operation.
  • a tenth aspect of the present invention provides a device authentication device, where the device authentication device is disposed in an authentication device, where the device authentication device includes:
  • a sending module configured to send the authentication data to the remote controller, so that the remote controller forwards the authentication data to the drone, and the authentication data is used to enable the drone to adopt a key included in the encrypted authentication chip Performing an encryption operation on the authentication data to obtain an operation result; wherein the encryption authentication chip is implanted in the UAV;
  • a receiving module configured to receive the operation result that is forwarded by the drone through the remote controller
  • a processing module configured to determine to be able to communicate with the remote controller when determining that the operation result is correct.
  • the processing module is specifically configured to:
  • the processing module is specifically configured to:
  • the authentication device is connected to the remote controller, and the sending module is further configured to:
  • the authentication device is connected to the remote controller, and the sending module is further configured to:
  • the authentication device is connected to the drone, and the receiving module is further configured to:
  • the authentication device is connected to the UAV, and the sending module is further configured to:
  • the processing module is further configured to:
  • the drone is authenticated according to the encrypted authentication chip implanted in the drone.
  • An eleventh aspect of the present invention provides a device authentication device in an unmanned aerial vehicle system, where the device authentication device is disposed in a remote controller, and the device authentication device includes:
  • a receiving module configured to receive authentication data sent by the authentication device
  • a sending module configured to send the authentication data to the drone, so that the drone encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, and the drone
  • the encrypted authentication chip is implanted therein;
  • the receiving module is further configured to receive the operation result sent by the UAV, and send the operation result to the authentication device, and determine that the authentication device can be used when determining that the operation result is correct Communicate.
  • the remote controller is connected to the authentication device, and the receiving module is further configured to:
  • the device also includes:
  • the processing module is configured to execute the remote controller upgrade instruction to complete a corresponding upgrade operation.
  • the remote controller is connected to the authentication device, and the receiving module is further configured to:
  • the sending module is further configured to: forward the UAV upgrade instruction to the UAV, so that the UAV performs the UAV upgrade instruction to complete a corresponding upgrade operation.
  • a twelfth aspect of the present invention provides a device authentication device in an unmanned aerial vehicle system, wherein the device authentication device is disposed in a drone, and the device authentication device includes:
  • a receiving module configured to receive authentication data sent by the remote controller, where the authentication data is sent by the authentication device to the remote controller and forwarded by the remote controller;
  • a processing module configured to perform encryption operation on the authentication data by using a key included in the encryption authentication chip, to obtain an operation result, where the encryption authentication chip is implanted in the UAV;
  • a sending module configured to send the operation result to the remote controller, so that the remote controller forwards the operation result to the authentication device, where the operation result is used to cause the authentication device to determine the When the result of the operation is correct, it is determined that the authentication device is capable of communicating with the remote controller.
  • the cryptographic authentication chip implanted in the drone is further configured to cause the authentication device to perform an authentication chip according to the encryption The drone is authenticated.
  • the drone is connected to the authentication device, and the sending module is further configured to:
  • Data information is transmitted directly to the authentication device, the data information including image data.
  • the drone is connected to the authentication device, the receiving module Also used for:
  • the processing module is further configured to: execute the drone upgrade instruction, and complete a corresponding upgrade operation.
  • the remote controller is connected to the authentication device, and the receiving module further Used for:
  • the processing module is further configured to: execute the drone upgrade instruction, and complete a corresponding upgrade operation.
  • a thirteenth aspect of the present invention provides an authentication device, including:
  • a receiver configured to receive the operation result that is forwarded by the remote controller by the drone
  • a processor configured to determine to be able to communicate with the drone when determining that the operation result is correct.
  • the processor is configured to: perform operation on the authentication data according to a locally stored encryption authentication algorithm, to obtain a target operation result;
  • the processor is specifically configured to:
  • Determining that the decryption result is consistent with the authentication data determining that the drone can communicate with the drone letter.
  • the processor is further configured to:
  • the remote controller is authenticated according to the encrypted authentication chip implanted in the remote controller.
  • the authentication device and the The human machine is connected, and the receiver is also used to:
  • the transmitter is also used to:
  • the transmitter is also used to:
  • a fourteenth aspect of the present invention provides a drone, comprising:
  • a receiver configured to receive authentication data sent by the authentication device
  • a transmitter configured to send the authentication data to the remote controller, so that the remote controller performs encryption operation on the authentication data by using a key included in the encryption authentication chip, and obtains an operation result, where the remote controller is implanted There is the encryption authentication chip;
  • the receiver is further configured to receive the operation result sent by the remote controller, and send the operation result to the authentication device, and when determining that the operation result is correct, determine that the operation may be performed with the authentication device. Communication.
  • the drone is connected to the authentication device, and the transmitter is further configured to:
  • Data information is transmitted directly to the authentication device, the data information including image data.
  • the drone is connected to the authentication device, and the receiver is further configured to:
  • the drone further includes:
  • the processor is configured to execute the drone upgrade instruction to complete a corresponding upgrade operation.
  • the drone is connected to the authentication device, and the receiver is further configured to:
  • the transmitter is further configured to: forward the remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction to complete a corresponding upgrade operation.
  • a fifteenth aspect of the present invention provides a remote controller, including:
  • a receiver configured to receive authentication data sent by the drone, where the authentication data is sent by the authentication device to the drone and forwarded by the drone;
  • a processor configured to perform an encryption operation on the authentication data by using a key included in the encryption authentication chip, to obtain an operation result, where the remote authentication device is embedded with the encryption authentication chip;
  • a transmitter configured to send the operation result to the drone, so that the drone forwards the operation result to the authentication device, where the operation result is used to cause the authentication device to determine When the operation result is correct, it is determined that the authentication device can communicate with the drone.
  • the cryptographic authentication chip implanted in the remote controller is further configured to enable the authentication device to perform authentication according to the encrypted authentication chip pair The remote controller performs authentication.
  • the receiver is further configured to:
  • the processor is further configured to: execute the remote controller upgrade instruction to complete a corresponding upgrade operation.
  • a sixteenth aspect of the present invention provides an authentication device, including:
  • a transmitter for transmitting authentication data to the remote controller to cause the remote controller to forward the authentication data to the drone, the authentication data for causing the drone to adopt a key included in the encryption authentication chip Performing an encryption operation on the authentication data to obtain an operation result; wherein the encryption authentication chip is implanted in the UAV;
  • a receiver configured to receive the operation result that is forwarded by the drone through the remote controller
  • a processor configured to determine, when the operation result is correct, to be able to communicate with the remote controller.
  • the processor is specifically configured to:
  • the processor is specifically configured to:
  • the authentication device is connected to the remote controller, and the transmitter is further configured to:
  • the authentication device is connected to the remote controller, and the transmitter is further configured to:
  • the authentication device is connected to the drone, and the receiver is further configured to:
  • the authentication device is connected to the drone, and the transmitter is further configured to:
  • the processor is further configured to:
  • the drone is authenticated according to the encrypted authentication chip implanted in the drone.
  • a seventeenth aspect of the present invention provides a remote controller, including:
  • a receiver configured to receive authentication data sent by the authentication device
  • a transmitter configured to send the authentication data to the drone, so that the drone encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, and the drone
  • the encrypted authentication chip is implanted therein;
  • the receiver is further configured to receive the operation result sent by the drone, and send the operation result to the authentication device, and determine that the authentication device can be used when determining that the operation result is correct Communicate.
  • the remote controller is connected to the authentication device, and the receiver is further configured to:
  • the remote controller further includes:
  • the processor is configured to execute the remote controller upgrade instruction to complete a corresponding upgrade operation.
  • the remote controller is connected to the authentication device, and the receiver is further configured to: directly receive the unsent sent by the authentication device Machine upgrade instruction;
  • the transmitter is further configured to: forward the UAV upgrade instruction to the UAV, so that the UAV performs the UAV upgrade instruction to complete a corresponding upgrade operation.
  • An eighteenth aspect of the present invention provides a drone, comprising:
  • a receiver configured to receive authentication data sent by a remote controller, where the authentication data is sent by the authentication device to the remote controller and forwarded by the remote controller;
  • a processor configured to perform an encryption operation on the authentication data by using a key included in the encryption authentication chip, to obtain an operation result, where the encryption authentication chip is implanted in the UAV;
  • a transmitter configured to send the operation result to the remote controller, to cause the remote controller to forward the operation result to the authentication device, where the operation result is used to cause the authentication device to determine the When the result of the operation is correct, it is determined that the authentication device is capable of communicating with the remote controller.
  • the cryptographic authentication chip implanted in the drone is further configured to cause the authentication device to perform the cryptographic authentication chip according to the cryptographic authentication chip.
  • the drone is authenticated.
  • the drone is connected to the authentication device, the transmitter Also used for:
  • Data information is transmitted directly to the authentication device, the data information including image data.
  • the drone is connected to the authentication device, the receiver Also used for:
  • the processor is further configured to: execute the drone upgrade instruction to complete a corresponding upgrade operation.
  • the remote controller is connected to the authentication device, and the receiver further For receiving: a drone upgrade instruction sent from the authentication device and forwarded by the drone;
  • the processor is further configured to: execute the drone upgrade instruction to complete a corresponding upgrade operation.
  • the device authentication method, device, authentication device, drone and remote controller provided by the invention, the authentication device sends the authentication data to the drone, so that the drone forwards the authentication data to the remote controller, and the authentication data is used to make the remote controller Encrypting the authentication data by using a key included in the encryption authentication chip to obtain an operation result; wherein the remote controller is embedded with an encryption authentication chip; the authentication device receives the operation result forwarded by the remote controller through the drone; and the authentication device When it is determined that the result of the operation is correct, it is determined that communication with the drone can be performed.
  • the authentication device realizes the authentication of the drone and the remote controller by using the remote authentication method only by using the encryption authentication chip embedded in the remote controller, which saves the certification cost and improves the authentication processing efficiency.
  • FIG. 1 is a schematic diagram of an authentication scenario according to an embodiment of the present invention
  • FIG. 1(b) is a schematic diagram of another authentication scenario according to an embodiment of the present invention.
  • Embodiment 1 of a device authentication method according to an embodiment of the present invention
  • FIG. 3 is a flowchart of Embodiment 2 of a device authentication method according to an embodiment of the present disclosure
  • Embodiment 4 is a flowchart of Embodiment 3 of a device authentication method according to an embodiment of the present invention.
  • FIG. 5 is a flowchart of Embodiment 4 of a device authentication method according to an embodiment of the present disclosure
  • FIG. 6 is a flowchart of Embodiment 5 of a device authentication method according to an embodiment of the present disclosure
  • FIG. 7 is a signaling interaction diagram of Embodiment 6 of a device authentication method according to an embodiment of the present disclosure.
  • FIG. 8 is a flowchart of Embodiment 7 of a device authentication method according to an embodiment of the present disclosure.
  • FIG. 9 is a flowchart of Embodiment 8 of a device authentication method according to an embodiment of the present disclosure.
  • FIG. 10 is a flowchart of Embodiment 9 of a device authentication method according to an embodiment of the present disclosure.
  • FIG. 11 is a flowchart of Embodiment 10 of a device authentication method according to an embodiment of the present disclosure.
  • FIG. 12 is a flowchart of Embodiment 11 of a device authentication method according to an embodiment of the present disclosure.
  • FIG. 13 is a signaling interaction diagram of Embodiment 12 of a device authentication method according to an embodiment of the present disclosure
  • FIG. 14 is a schematic structural diagram of Embodiment 1 of a device authentication apparatus according to an embodiment of the present disclosure
  • FIG. 15 is a schematic structural diagram of Embodiment 2 of a device authentication apparatus according to an embodiment of the present disclosure
  • FIG. 16 is a schematic structural diagram of Embodiment 3 of a device authentication apparatus according to an embodiment of the present disclosure.
  • FIG. 17 is a schematic structural diagram of Embodiment 4 of a device authentication apparatus according to an embodiment of the present disclosure.
  • FIG. 18 is a schematic structural diagram of Embodiment 5 of a device authentication apparatus according to an embodiment of the present disclosure.
  • FIG. 19 is a schematic structural diagram of Embodiment 6 of a device authentication apparatus according to an embodiment of the present disclosure.
  • FIG. 20 is a schematic structural diagram of Embodiment 1 of an authentication device according to an embodiment of the present disclosure.
  • FIG. 21 is a schematic structural diagram of Embodiment 1 of a drone according to an embodiment of the present invention.
  • FIG. 22 is a schematic structural diagram of Embodiment 1 of a remote controller according to an embodiment of the present disclosure
  • FIG. 23 is a schematic structural diagram of Embodiment 2 of an authentication device according to an embodiment of the present disclosure.
  • FIG. 24 is a schematic structural diagram of Embodiment 2 of a remote controller according to an embodiment of the present disclosure.
  • FIG. 25 is a schematic structural diagram of Embodiment 2 of a drone according to an embodiment of the present invention.
  • the unmanned aerial vehicle system includes an authentication device and an authenticated device, wherein the authenticated device includes a remote controller and a drone.
  • the authentication device is, for example, a terminal device such as a PC, a smart phone terminal, or a tablet computer.
  • an encrypted authentication chip is implanted only in one authenticated device.
  • connection relationship between the two authenticated devices and the authentication device is: the authentication device can be connected to the two authenticated devices through physical connection, and the two authenticated devices can be connected by wireless or wired communication.
  • the physical connection manner is, for example, connected through a serial bus.
  • FIG. 1(a) is a schematic diagram of an authentication scenario according to an embodiment of the present invention.
  • an encryption authentication chip is embedded in a remote controller, wherein the authentication device and the drone pass physical
  • the connection mode is connected, for example, through a serial port connection, and the wireless connection can be established by establishing a wireless link between the drone and the remote controller.
  • the authentication device can also establish a physical connection with the remote controller, so that in the authentication scenario, only by installing An encrypted authentication chip in the remote control can authenticate the drone and remote control.
  • FIG. 1(b) is a schematic diagram of another authentication scenario according to an embodiment of the present invention.
  • an encryption authentication chip is embedded in a drone, wherein the authentication device and the remote controller are physically connected.
  • the wireless connection between the drone and the remote can be established by establishing a wireless link.
  • the authentication device can also establish a physical connection with the drone, so that in the authentication scenario, only by installing An encrypted authentication chip in the drone can be used to authenticate the drone and remote control.
  • the device authentication method is described with reference to the embodiments shown in FIG. 2 to FIG. 7
  • the authentication scenario illustrated in FIG. 1( b ) referring to the authentication scenario illustrated in FIG. 1( b ), and FIG. 8 to FIG.
  • the embodiment shown in Fig. 13 describes a device authentication method.
  • FIG. 2 is a flowchart of Embodiment 1 of a device authentication method according to an embodiment of the present invention. As shown in FIG. 2, an execution body of the solution is an authentication device, and the method includes the following steps:
  • Step 101 The authentication device sends the authentication data to the drone, so that the drone forwards the authentication data to the remote controller, where the authentication data is used to enable the remote controller to perform encryption operation on the authentication data by using a key included in the encryption authentication chip. Get the result of the operation.
  • Step 102 The authentication device receives an operation result forwarded by the remote controller through the drone.
  • Step 103 When determining that the operation result is correct, the authentication device determines that communication with the drone can be performed.
  • the solution provided by the embodiment is described in conjunction with FIG. 1( a ), so that the authentication device is physically connected to the drone, and the drone is wirelessly connected to the remote controller, and the remote controller is embedded with the encryption authentication chip.
  • the authentication device implements the authentication of the drone through the encryption authentication chip in the remote controller. Since there is no encryption authentication chip in the drone, the method of authenticating the UAV through the encryption authentication chip in the remote controller is a remote authentication method.
  • the authentication device can send authentication data to the drone through a physical connection with the drone, and the authentication data can be a string. random number.
  • the drone forwards the authentication data to the remote controller.
  • the authentication device may carry the authentication data in the authentication request by sending an authentication request to the drone, so that the drone obtains the authentication data when receiving the authentication request carrying the authentication data, and The authentication data is forwarded to the remote controller.
  • An encryption authentication chip is embedded in the remote controller, and an encryption key is stored in the encryption authentication chip. Therefore, when receiving the authentication data, the remote controller performs encryption operation on the received authentication data using the key to obtain an operation result, and feeds back the operation result to the drone.
  • the drone forwards the received calculation result to the authentication device, and the authentication device verifies the correctness of the operation result. If the operation result is correct, the drone passes the authentication and can communicate with the authentication device.
  • the correctness verification method may be: the authentication device performs the operation on the sent authentication data according to the locally stored encryption authentication algorithm, and obtains the target operation result, if the operation result received from the drone and the target operation The results are consistent, it is determined that the drone has passed the certification and can The drone communicates.
  • the correctness verification mode may be implemented by using an asymmetric signature authentication method: the remote controller performs encryption operation processing on the authentication data based on a key (private key) included in the encryption authentication chip, at the authentication device.
  • the operation result may be decrypted according to the public key stored locally. If the authentication data obtained by the decryption is consistent with the authentication data sent by the decryption, it is determined that the drone has passed the authentication, and can and cannot The human machine communicates.
  • the authentication device can complete the authentication of the drone based on the encrypted authentication chip in the remote controller.
  • the drone and the remote controller have a pairing relationship, that is, the drone and the remote controller have a one-to-one correspondence. Therefore, in the case where the wireless communication link has been established between the drone and the remote controller, it can be considered that the drone and the remote controller have completed the pairing connection. Therefore, when the authentication device receives and verifies that the operation result forwarded by the drone is correct, the authentication device can determine that the drone has passed the authentication, and can also determine that the remote controller has passed the authentication, thereby simultaneously completing the unmanned aerial vehicle and the remote controller. Certification to improve the efficiency of certification processing.
  • the authentication of the remote controller by the authentication device may also be directly implemented based on the encryption authentication chip in the remote controller, that is, the authentication device is implanted according to the remote controller. Encrypt the authentication chip to authenticate the remote controller.
  • the authentication device can also be connected to the remote controller through a physical connection.
  • the authentication device can send the authentication data to the remote controller, and the remote controller encrypts the authentication data by using the key included in the encryption authentication chip, obtains the operation result, and feeds back to the authentication device.
  • the authentication device verifies that the result of the operation is correct, it is determined that the remote controller has passed the authentication.
  • the drone is equivalent to remotely using the operation result of the encrypted authentication chip in the remote controller, so that the authentication device realizes remote authentication of the drone and the remote controller.
  • the authentication device uses only one encryption authentication chip to implement authentication for different authenticated devices, thereby effectively reducing the hardware cost and improving the authentication processing efficiency of different authenticated devices.
  • FIG. 3 is a flowchart of Embodiment 2 of a device authentication method according to an embodiment of the present invention. As shown in FIG. 3, on the basis of the embodiment shown in FIG. 2, after the authentication device determines that it can communicate with the UAV, The method can also include the following steps:
  • Step 201 The authentication device is connected to the UAV, and the authentication device directly receives the data information sent by the UAV to the authentication device, where the data information includes image data.
  • the smartphone receives/downloads data information such as images taken by the drone by means of the drone transmitting the data information to the remote controller through a wireless link with the remote controller. Further, the remote controller forwards the data information to the smart phone based on the connection with the smart phone, which is inconvenient to operate, and the data transmission of the data received by the smart phone has a high delay due to factors such as the limitation of the bandwidth of the wireless link. .
  • the smart phone when the smart phone realizes remote authentication for the drone, the smart phone can be directly connected (physical connection or wireless connection) with the drone, thereby transmitting data information. Therefore, the drone can directly transmit data information such as image data to the smartphone, so that the smartphone can download the data information of the drone more quickly.
  • Embodiment 3 is a flowchart of Embodiment 3 of a device authentication method according to an embodiment of the present invention. As shown in FIG. 4, on the basis of the embodiment shown in FIG. 2, after the authentication device determines that it can communicate with the UAV, The method may further include the following step 301 or step 302:
  • Step 301 The authentication device is connected to the drone, and the authentication device directly sends the drone upgrade instruction to the drone to enable the drone to execute the drone upgrade command to complete the corresponding upgrade operation.
  • the smartphone is still used as the authentication device as an example.
  • the smart phone and the drone are directly connected (wireless connection or wireless connection), thereby realizing the intelligence. Communication between the mobile phone and the drone.
  • the software upgrade of the drone can be directly and conveniently completed through the smart phone.
  • the corresponding APP can be installed in the smart phone, so that the corresponding upgrade package can be directly sent to the drone in the drone upgrade instruction by triggering the APP, so that the drone performs the drone upgrade.
  • the instruction completes the corresponding upgrade operation.
  • the remote authentication of the drone based on the smart phone not only saves the certification cost, but also enables the upgrade of the drone directly and conveniently through the smart phone.
  • Step 302 The authentication device is connected to the drone, and the authentication device directly sends a remote controller upgrade instruction to the drone, so that the drone forwards the remote controller upgrade command to the remote controller, so that the remote controller executes the remote controller upgrade instruction. Complete the corresponding upgrade operation.
  • the software upgrade of the drone can be completed directly and conveniently through the smart phone, and the software upgrade of the remote controller can be completed through the forwarding of the drone.
  • the upgrade package for the remote controller is directly sent to the remote control in the remote control upgrade instruction, and the drone recognizes that the upgrade instruction is for the remote controller, Forwarding the remote controller upgrade command to the remote controller, so that the remote controller executes the remote controller upgrade command to complete the corresponding upgrade operation.
  • the remote authentication of the drone based on the smart phone not only saves the certification cost, but also enables the smart phone to conveniently upgrade the remote controller through the forwarding of the drone.
  • FIG. 5 is a flowchart of Embodiment 4 of a device authentication method according to an embodiment of the present invention. The embodiment is described by using a drone as an execution subject. As shown in FIG. 5, the method includes the following steps:
  • Step 401 The drone receives the authentication data sent by the authentication device.
  • Step 402 The UAV sends the authentication data to the remote controller, so that the remote controller encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, and the remote authentication device is embedded with the encryption authentication chip.
  • Step 403 The UAV receives the operation result sent by the remote controller, and sends the operation result to the authentication device. When determining that the operation result is correct, it is determined that the operation can be performed with the authentication device.
  • the authentication scenario applied in this embodiment is still the authentication scenario shown in FIG. 1(a): the remote authentication device is embedded with an encryption authentication chip, the authentication device is physically connected with the drone, and the drone establishes a wireless chain with the remote controller. road.
  • the authentication device can send authentication data to the drone through a physical connection with the drone, and the authentication data can be a string. random number.
  • the encryption authentication chip Since the encryption authentication chip is not installed in the drone, the authentication process cannot be completed by itself. Therefore, when receiving the authentication data transmitted by the authentication device, the drone forwards the authentication data to the remote controller.
  • the authentication device may carry the authentication data in the authentication request by sending an authentication request to the drone, so that the drone obtains the authentication data when receiving the authentication request carrying the authentication data, and The authentication data is forwarded to the remote controller.
  • the drone and the remote controller have a pairing relationship, that is, the drone and the remote controller have a one-to-one correspondence. Therefore, the drone and the remote control will first establish a wireless communication link, which can be recognized. The pairing connection has been completed for the drone and the remote control first. Therefore, after the drone receives the authentication data sent by the authentication device, the authentication data is forwarded to the corresponding remote controller based on the established pairing relationship.
  • An encryption authentication chip is embedded in the remote controller, and a key is stored in the encryption authentication chip. Therefore, when receiving the authentication data, the remote controller performs encryption operation on the received authentication data using the key to obtain an operation result, and feeds back the operation result to the drone.
  • the drone forwards the received calculation result to the authentication device, and the authentication device verifies the correctness of the operation result. If the operation result is correct, the drone passes the authentication and can communicate with the authentication device.
  • the correctness verification method may be: the authentication device performs the operation on the sent authentication data according to the locally stored encryption authentication algorithm, and obtains the target operation result, if the operation result received from the drone and the target operation The results are consistent, then it is determined that the drone has passed the authentication and the drone is capable of communicating with the authentication device.
  • the encryption authentication chip is not installed in the drone, when the authentication device needs to be authenticated, it needs to be remotely completed by means of the encryption authentication chip installed in the remote controller. Therefore, based on the above-mentioned remote authentication method and based on the pairing relationship between the drone and the remote controller, the authentication device can complete the simultaneous authentication of the drone and the remote controller based on the encrypted authentication chip in the remote controller, thereby saving cost and saving cost. Improve the efficiency of authentication processing.
  • the method may further include the following steps 404, 405 and 406. These three steps have no timing constraints.
  • Step 404 The drone is connected to the authentication device, and the drone directly sends data information to the authentication device, where the data information includes image data.
  • the smart phone when the smart phone realizes remote authentication for the drone, the smart phone can be directly connected (physical connection or wireless connection) to the drone, thereby transmitting data information, so no one
  • the machine can directly send data information such as image data to the smart phone, so that the smart phone can download the data information of the drone more quickly without the forwarding of the remote controller, thereby improving the data information transmission efficiency and shortening the transmission time.
  • Step 405 The drone is connected to the authentication device, and the drone directly receives the drone upgrade command sent by the authentication device, and executes the drone upgrade command to complete the corresponding upgrade operation.
  • the corresponding APP can be installed in the smart phone, so that the corresponding upgrade package can be directly sent to the drone in the drone upgrade instruction by triggering the APP, so that the drone can execute the drone upgrade instruction. , complete the corresponding upgrade operation.
  • the remote authentication of the drone based on the smart phone not only saves the certification cost, but also enables the upgrade of the drone directly and conveniently through the smart phone.
  • Step 406 The drone is connected to the authentication device, and the drone directly receives the remote controller upgrade command sent by the authentication device, and forwards the remote controller upgrade command to the remote controller, so that the remote controller executes the remote controller upgrade command to complete the corresponding upgrade operation. .
  • the smart phone when the drone has passed the authentication of the smart phone and the smart phone and the drone are directly connected, the smart phone can not only directly complete the software upgrade of the drone, but also pass the smart phone. The forwarding of the drone completes the software upgrade of the remote controller.
  • the upgrade package for the remote controller is directly sent to the remote control in the remote control upgrade instruction, and the drone recognizes that the upgrade instruction is for the remote controller, Forwarding the remote controller upgrade command to the remote controller, so that the remote controller executes the remote controller upgrade command to complete the corresponding upgrade operation.
  • the remote authentication of the drone based on the smart phone not only saves the certification cost, but also enables the smart phone to conveniently upgrade the remote controller through the forwarding of the drone.
  • FIG. 6 is a flowchart of Embodiment 5 of a device authentication method according to an embodiment of the present invention.
  • a remote controller is used as an execution subject. As shown in FIG. 6, the method includes the following steps:
  • Step 501 The remote controller receives the authentication data sent by the drone, and the authentication data is sent by the authentication device to the drone and forwarded by the drone.
  • Step 502 The remote controller encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted in the remote controller.
  • Step 503 The remote controller sends the operation result to the drone, so that the drone forwards the operation result to the authentication device, and the operation result is used to enable the authentication device to determine that the authentication device can be connected to the drone when determining the operation result is correct. Communicate.
  • the authentication scenario applied in this embodiment is still the authentication scenario shown in FIG. 1(a): the remote authentication device is embedded with an encryption authentication chip, the authentication device is physically connected with the drone, and the drone establishes a wireless chain with the remote controller. road.
  • the authentication device can send authentication data to the drone through a physical connection with the drone, and the authentication data can be a string. random number.
  • the encryption authentication chip Since the encryption authentication chip is not installed in the drone, the authentication process cannot be completed by itself. Therefore, when receiving the authentication data transmitted by the authentication device, the drone forwards the authentication data to the remote controller.
  • the drone and the remote controller have a pairing relationship, that is, the drone and the remote controller have a one-to-one correspondence. Therefore, the drone and the remote controller will first establish a wireless communication link, and it can be considered that the drone and the remote controller have first completed the pairing connection. Therefore, after the drone receives the authentication data sent by the authentication device, the authentication data is forwarded to the corresponding remote controller based on the established pairing relationship.
  • An encryption authentication chip is embedded in the remote controller, and a key is stored in the encryption authentication chip. Therefore, when receiving the authentication data, the remote controller performs encryption operation on the received authentication data using the key to obtain an operation result, and feeds back the operation result to the drone.
  • the drone forwards the received calculation result to the authentication device, and the authentication device verifies the correctness of the operation result. If the operation result is correct, the drone passes the authentication and can communicate with the authentication device.
  • the correctness verification mode may be: when the authentication device receives the operation result, the operation result may be decrypted according to the public key stored locally, and if the authentication data obtained by the decryption is consistent with the authentication data sent by the authentication device, Make sure the drone is certified to communicate with the drone.
  • the encryption authentication chip is not installed in the drone, when the authentication device needs to be authenticated, it needs to be remotely completed by means of the encryption authentication chip installed in the remote controller. Therefore, based on the above-mentioned remote authentication method and based on the pairing relationship between the drone and the remote controller, the authentication device can complete the simultaneous authentication of the drone and the remote controller based on the encrypted authentication chip in the remote controller, thereby saving cost and saving cost. Improve the efficiency of authentication processing.
  • the authentication of the remote controller by the authentication device may also be directly implemented based on the encryption authentication chip in the remote controller, that is, authentication.
  • the device authenticates the remote controller according to the encryption authentication chip implanted in the remote controller.
  • the authentication device can also be connected to the remote controller through a physical connection.
  • the authentication device can send the authentication data to the remote controller, and the remote controller encrypts the authentication data by using the key included in the encryption authentication chip, obtains the operation result, and feeds back to the authentication device.
  • the authentication device verifies that the result of the operation is correct, it is determined that the remote controller has passed the authentication.
  • step 503 the following step 504 is further included:
  • Step 504 The drone is connected to the authentication device, and the remote controller receives the remote controller upgrade instruction sent from the authentication device and forwarded by the drone, and executes the remote controller upgrade instruction to complete the corresponding upgrade operation.
  • the authentication device is still used as a smart phone.
  • the UAV has passed the authentication of the smart phone based on the encryption authentication chip in the remote controller, and the smart phone and the drone are directly connected, Software upgrades to the remote control can be done via a smartphone.
  • the software upgrade of the smart phone to the remote controller is performed by the drone, that is, the software upgrade of the remote controller is completed by the forwarding of the drone.
  • the upgrade package for the remote controller can be directly sent to the drone by directly triggering the upgrade package for the remote controller, and the drone recognizes that the upgrade command is for the remote controller. Then, the remote controller upgrade instruction is forwarded to the remote controller, so that the remote controller executes the remote controller upgrade instruction to complete the corresponding upgrade operation.
  • the remote authentication of the drone based on the smart phone not only saves the certification cost, but also enables the smart phone to conveniently upgrade the remote controller through the forwarding of the drone.
  • the above method embodiments are based on the authentication scenario of FIG. 1(a), and the device authentication method is introduced from the perspective of different execution entities.
  • the signaling interaction is introduced.
  • FIG. 7 is a signaling diagram of Embodiment 6 of a device authentication method according to an embodiment of the present invention. As shown in FIG. 7, the method includes the following steps:
  • Step 601 The authentication device sends the authentication data to the drone.
  • Step 602 The drone forwards the authentication data to the remote controller.
  • Step 603 The remote controller performs encryption operation on the authentication data by using a key included in the encrypted authentication chip installed therein to obtain an operation result.
  • Step 604 The remote controller sends the operation result to the drone.
  • Step 605 The drone forwards the operation result to the authentication device.
  • Step 606 When the authentication device determines that the operation result is correct, it is determined that the UAV can communicate with the UAV.
  • the device authentication method provided by the present invention is introduced in combination with the following method embodiments.
  • FIG. 8 is a flowchart of Embodiment 7 of a device authentication method according to an embodiment of the present invention. The embodiment is described by using an authentication device as an execution subject. As shown in FIG. 8, the method includes the following steps:
  • Step 701 The authentication device sends the authentication data to the remote controller, so that the remote controller forwards the authentication data to the drone, and the authentication data is used to enable the drone to perform encryption operation on the authentication data by using a key included in the encryption authentication chip.
  • the operation result is obtained; wherein the encryption authentication chip is implanted in the drone.
  • Step 702 The authentication device receives an operation result forwarded by the drone through the remote controller.
  • Step 703 The authentication device determines that communication with the remote controller is possible when determining that the operation result is correct.
  • the authentication device authenticates the remote controller through the encryption authentication chip in the drone. Since there is no encryption authentication chip in the remote controller, the method of authenticating the remote controller by using the encryption authentication chip in the drone is a remote authentication method.
  • the authentication device When the authentication device needs to authenticate the remote controller to determine whether it can communicate with the remote controller, the authentication device can transmit authentication data to the remote controller through a physical connection with the remote controller, and the authentication data can be a string of random numbers.
  • the remote controller forwards the authentication data to the drone.
  • the authentication device may carry the authentication data in the authentication request by sending the authentication request to the remote controller, so that the remote controller analyzes and obtains the authentication data when receiving the authentication request carrying the authentication data, and the The authentication data is forwarded to the drone.
  • An encryption authentication chip is embedded in the drone, and an encryption key is stored in the encryption authentication chip. Therefore, when the drone receives the authentication data, the host uses the key to encrypt the received authentication data. Calculate to obtain the result of the operation and feed back the result of the operation to the remote controller.
  • the remote controller forwards the received calculation result to the authentication device, and the authentication device verifies the correctness of the operation result. If the calculation result is correct, the remote controller passes the authentication and can communicate with the authentication device.
  • the correctness verification method may be: the authentication device performs the operation on the sent authentication data according to the locally stored encryption authentication algorithm, and obtains the target operation result, if the operation result received from the remote controller and the target operation result Consistent, it is determined that the remote controller is authenticated and can communicate with the remote controller.
  • the correctness verification mode may be implemented by using an asymmetric signature authentication method: the UAV encrypts the authentication data based on a key (private key) included in the encryption authentication chip, and the authentication device is used in the authentication device. Wherein, when it receives the operation result, the operation result may be decrypted according to the public key stored locally. If the authentication data obtained by the decryption is consistent with the authentication data sent by the decryption, it is determined that the remote controller passes the authentication, and can be remotely controlled. Communicate.
  • an asymmetric signature authentication method the UAV encrypts the authentication data based on a key (private key) included in the encryption authentication chip, and the authentication device is used in the authentication device.
  • the operation result may be decrypted according to the public key stored locally. If the authentication data obtained by the decryption is consistent with the authentication data sent by the decryption, it is determined that the remote controller passes the authentication, and can be remotely controlled. Communicate.
  • the authentication device can complete the authentication of the remote controller based on the encrypted authentication chip in the drone.
  • the drone and the remote controller have a pairing relationship, that is, the drone and the remote controller have a one-to-one correspondence. Therefore, in the case where the wireless communication link has been established between the drone and the remote controller, it can be considered that the drone and the remote controller have completed the pairing connection. Therefore, when the authentication device receives and verifies that the operation result forwarded by the remote controller is correct, the authentication device can determine that the remote controller has passed the authentication, and can also determine that the drone has passed the authentication, thereby completing the operation of the drone and the remote controller at the same time. Certification to improve the efficiency of certification processing.
  • the authentication of the UAV to the authentication device can also be directly implemented based on the encryption authentication chip in the UAV, that is, the authentication device is based on the UAV.
  • the embedded authentication chip is used to authenticate the drone.
  • the authentication device can also be connected to the drone by means of a physical connection.
  • the authentication device can send the authentication data to the drone, and the drone encrypts the authentication data using the key included in the encryption authentication chip, obtains the operation result, and feeds back to the authentication device.
  • the authentication device verifies that the result of the operation is correct, it is determined that the drone has passed the authentication.
  • the remote control is equivalent to remotely using the operation result of the encrypted authentication chip in the drone, so that the authentication device realizes remote authentication of the drone and the remote controller.
  • Certified device through the above remote In the authentication mode only one encryption authentication chip is used to implement authentication of different authenticated devices, thereby effectively reducing the hardware cost and improving the authentication processing efficiency of different authenticated devices.
  • FIG. 9 is a flowchart of Embodiment 8 of a device authentication method according to an embodiment of the present invention. As shown in FIG. 9 , on the basis of the embodiment shown in FIG. 8 , after the UAV passes the authentication of the authentication device, the method further The following steps 801, 802, 803, and 804 may be included. These four steps have no timing relationship and are optional for parallel.
  • Step 801 The authentication device is connected to the UAV, and the authentication device directly receives the data information sent by the UAV to the authentication device, where the data information includes image data.
  • the smartphone receives/downloads data information such as images taken by the drone by means of the drone transmitting the data information to the remote controller through a wireless link with the remote controller. Further, the remote controller forwards the data information to the smart phone based on the connection with the smart phone, which is inconvenient to operate, and the data transmission of the data received by the smart phone has a high time due to factors such as the limitation of the bandwidth of the wireless link. Delay.
  • the smart phone when the smart phone realizes remote authentication for the drone, the smart phone can be directly connected (physical connection or wireless connection) with the drone, thereby transmitting data information. Therefore, the drone can directly transmit data information such as image data to the smartphone, so that the smartphone can download the data information of the drone more quickly.
  • Step 802 The authentication device is connected to the drone, and the authentication device directly sends the drone upgrade instruction to the drone to enable the drone to execute the drone upgrade command to complete the corresponding upgrade operation.
  • the smartphone is still used as the authentication device as an example.
  • the smart phone and the drone can be directly connected (wireless connection or wireless connection), thereby realizing Communication between the smartphone and the drone.
  • the software upgrade of the drone can be directly and conveniently completed through the smart phone.
  • the corresponding APP can be installed in the smart phone, so that the corresponding upgrade package can be directly sent to the drone in the drone upgrade instruction by triggering the APP, so that the drone can execute the drone upgrade instruction. , complete the corresponding upgrade operation.
  • the remote authentication of the drone based on the smart phone not only saves the certification cost, but also enables the upgrade of the drone directly and conveniently through the smart phone.
  • Step 803 The authentication device is connected to the remote controller, and the authentication device directly sends the drone upgrade command to the remote controller, so that the remote controller forwards the drone upgrade command to the drone, so that the drone performs the drone upgrade command. Complete the corresponding upgrade operation.
  • the smart phone when the remote controller has passed the authentication of the smart phone based on the encryption authentication chip in the drone, and the smart phone is directly connected with the remote controller at this time, the smart phone can also complete the pair by using the remote controller.
  • the software upgrade of the smartphone to the drone is performed by the remote controller, that is, the software upgrade of the drone is completed by the forwarding of the remote controller.
  • the upgrade package for the drone can be directly sent to the remote controller by triggering the upgrade package for the drone, and the remote controller recognizes that the upgrade instruction is for the drone. Then, the drone upgrade command is forwarded to the drone, so that the drone executes the drone upgrade instruction and completes the corresponding upgrade operation.
  • Step 804 The authentication device is connected to the remote controller, and the authentication device directly sends a remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction to complete the corresponding upgrade operation.
  • the remote controller when the remote controller has passed the authentication of the smart phone, the smart phone and the remote controller can be directly connected (wireless connection or wireless connection), thereby realizing communication between the smart phone and the remote controller.
  • the remote controller has an upgrade requirement, the software upgrade of the remote controller can be directly and conveniently completed through the smart phone.
  • the corresponding APP can be installed in the smart phone, so that the corresponding upgrade package can be directly sent to the remote controller through the remote control upgrade instruction by triggering the APP, so that the remote controller executes the remote controller upgrade instruction to complete the corresponding Upgrade operation.
  • the remote authentication based on the smart phone to the remote controller not only saves the certification cost, but also enables the remote controller to be upgraded directly and conveniently through the smart phone.
  • FIG. 10 is a flowchart of Embodiment 9 of a device authentication method according to an embodiment of the present invention. The present embodiment is described from the perspective of a remote controller as an execution subject. As shown in FIG. 10, the method includes the following steps:
  • Step 901 The remote controller receives the authentication data sent by the authentication device.
  • Step 902 The remote controller sends the authentication data to the drone to enable the drone to adopt the encryption authentication.
  • the key included in the chip encrypts the authentication data to obtain an operation result, and the encrypted authentication chip is implanted in the drone.
  • Step 903 The remote controller receives the operation result sent by the drone, and sends the operation result to the authentication device, and determines that the communication device can communicate with the authentication device when the operation result is determined to be correct.
  • the authentication scenario applied in this embodiment is still the authentication scenario shown in FIG. 1(b): the encryption authentication chip is embedded in the drone, the authentication device is physically connected with the remote controller, and the wireless link is established between the drone and the remote controller. road.
  • the authentication device When the authentication device needs to authenticate the remote controller to determine whether it can communicate with the remote controller, the authentication device can transmit authentication data to the remote controller through a physical connection with the remote controller, and the authentication data can be a string of random numbers.
  • the remote controller forwards the authentication data to the drone.
  • the authentication device may carry the authentication data in the authentication request by sending the authentication request to the remote controller, so that the remote controller analyzes and obtains the authentication data when receiving the authentication request carrying the authentication data, and the The authentication data is forwarded to the drone.
  • the drone and the remote controller have a pairing relationship, that is, the drone and the remote controller have a one-to-one correspondence. Therefore, the drone and the remote controller will first establish a wireless communication link, and it can be considered that the drone and the remote controller have first completed the pairing connection. Therefore, after the remote controller receives the authentication data sent by the authentication device, the authentication data is forwarded to the corresponding drone based on the established pairing relationship.
  • An encryption authentication chip is embedded in the drone, and a key is stored in the encryption authentication chip. Therefore, when receiving the authentication data, the drone encrypts the received authentication data using the key to obtain an operation result, and feeds back the operation result to the remote controller.
  • the remote controller forwards the received calculation result to the authentication device, and the authentication device verifies the correctness of the operation result. If the calculation result is correct, the remote controller passes the authentication and can communicate with the authentication device.
  • the correctness verification method may be: the authentication device performs the operation on the sent authentication data according to the locally stored encryption authentication algorithm, and obtains the target operation result, if the operation result received from the remote controller and the target operation result Consistent, it is determined that the remote controller is authenticated and can communicate with the remote controller.
  • the encryption authentication chip is not installed in the remote controller, when the authentication device needs to be authenticated, it needs to be remotely completed by using the encryption authentication chip installed in the drone. Therefore, based on the above remote authentication method and based on the pairing relationship between the drone and the remote controller, the authentication device can complete the simultaneous authentication of the drone and the remote controller based on the encrypted authentication chip in the drone, thereby saving cost. It also improves the efficiency of authentication processing.
  • step 903 the following steps 904 and 905 are further included, where the two steps have no timing defined relationship.
  • Step 904 The remote controller is connected to the authentication device, and the remote controller directly receives the remote controller upgrade instruction sent by the authentication device, and executes the remote controller upgrade instruction to complete the corresponding upgrade operation.
  • the remote controller when the remote controller has passed the authentication of the smart phone, the smart phone and the remote controller can be directly connected (wireless connection or wireless connection), thereby realizing communication between the smart phone and the remote controller.
  • the remote controller has an upgrade requirement, the software upgrade of the remote controller can be directly and conveniently completed through the smart phone.
  • the corresponding APP can be installed in the smart phone, so that the corresponding upgrade package can be directly sent to the remote controller by means of triggering the APP, and the remote controller receives and executes the remote controller upgrade instruction to complete the corresponding Upgrade operation.
  • the remote authentication based on the smart phone to the remote controller not only saves the certification cost, but also enables the remote controller to be upgraded directly and conveniently through the smart phone.
  • Step 905 The remote controller is connected to the authentication device, and the remote controller directly receives the drone upgrade command sent by the authentication device, and forwards the drone upgrade command to the drone, so that the drone performs the drone upgrade instruction and completes Corresponding upgrade operation.
  • the smart phone when the remote controller has passed the authentication of the smart phone based on the encryption authentication chip in the drone, and the smart phone is directly connected with the remote controller at this time, the smart phone can also complete the pair by using the remote controller.
  • the software upgrade of the smartphone to the drone is performed by the remote controller, that is, the software upgrade of the drone is completed by the forwarding of the remote controller.
  • the upgrade package for the drone can be directly sent to the remote controller by triggering the upgrade package for the drone, and the remote controller recognizes that the upgrade instruction is for the drone. Then, the drone upgrade command is forwarded to the drone, so that the drone executes the drone upgrade instruction and completes the corresponding upgrade operation.
  • FIG. 11 is a flowchart of Embodiment 10 of a device authentication method according to an embodiment of the present invention. The embodiment is described from the perspective of an unmanned aircraft as an execution subject. As shown in FIG. 11, the method includes the following steps:
  • Step 1001 The drone receives the authentication data sent by the remote controller, and the authentication data is sent by the authentication device to the remote controller and forwarded by the remote controller.
  • Step 1002 The UAV encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, and the encryption authentication chip is implanted in the UAV.
  • Step 1003 The drone sends the operation result to the remote controller, so that the remote controller forwards the operation result to the authentication device, and the operation result is used to enable the authentication device to determine that the authentication device can communicate with the remote controller when determining the operation result is correct.
  • the authentication scenario applied in this embodiment is still the authentication scenario shown in FIG. 1(b): the encryption authentication chip is embedded in the drone, the authentication device is physically connected with the remote controller, and the wireless link is established between the drone and the remote controller. road.
  • the authentication device When the authentication device needs to authenticate the remote controller to determine whether it can communicate with the remote controller, the authentication device can transmit authentication data to the remote controller through a physical connection with the remote controller, and the authentication data can be a string of random numbers.
  • the remote controller forwards the authentication data to the drone.
  • the drone and the remote controller have a pairing relationship, that is, the drone and the remote controller have a one-to-one correspondence. Therefore, the drone and the remote controller will first establish a wireless communication link, and it can be considered that the drone and the remote controller have first completed the pairing connection. Therefore, after the remote controller receives the authentication data sent by the authentication device, the authentication data is forwarded to the corresponding drone based on the established pairing relationship.
  • An encryption authentication chip is embedded in the drone, and a key is stored in the encryption authentication chip. Therefore, when receiving the authentication data, the drone encrypts the received authentication data using the key to obtain an operation result, and feeds back the operation result to the remote controller.
  • the remote controller forwards the received operation result to the authentication device, and the authentication device verifies the correctness of the operation result. If the operation result is correct, the remote controller passes the authentication and can Enough to communicate with the authentication device.
  • the correctness verification mode may be: when the authentication device receives the operation result, the operation result may be decrypted according to the public key stored locally, and if the authentication data obtained by the decryption is consistent with the authentication data sent by the authentication device, Make sure the remote is certified and able to communicate with the remote.
  • the encryption authentication chip is not installed in the remote controller, when the authentication device needs to be authenticated, it needs to be remotely completed by using the encryption authentication chip installed in the drone. Therefore, based on the above remote authentication method and based on the pairing relationship between the drone and the remote controller, the authentication device can complete the simultaneous authentication of the drone and the remote controller based on the encrypted authentication chip in the drone, thereby saving cost. It also improves the efficiency of authentication processing.
  • the authentication of the UAV to the authentication device can also be directly implemented based on the encryption authentication chip in the UAV, that is, the authentication device is based on the UAV.
  • the embedded encryption authentication chip authenticates the drone.
  • the authentication device can also be connected to the drone by means of a physical connection.
  • the authentication device can send the authentication data to the drone, and the drone encrypts the authentication data using the key included in the encryption authentication chip, obtains the operation result, and feeds back to the authentication device.
  • the authentication device verifies that the result of the operation is correct, it is determined that the drone has passed the authentication.
  • FIG. 12 is a flowchart of Embodiment 11 of a device authentication method according to an embodiment of the present invention. As shown in FIG. 12, on the basis of the embodiment shown in FIG. 11, after the UAV passes the authentication of the authentication device, the method is The following steps 1101, 1102, and 1103 may also be included. These three steps have no timing constraints.
  • Step 1101 The drone is connected to the authentication device, and the drone directly sends data information to the authentication device, where the data information includes image data.
  • the smart phone when the smart phone realizes remote authentication for the drone, the smart phone can be directly connected (physical connection or wireless connection) to the drone, thereby transmitting data information, so no one
  • the machine can send data information such as image data directly to the smartphone, so that the smart phone can download the data information of the drone more quickly without forwarding through the remote controller.
  • Step 1102 The UAV is connected to the authentication device, and the UAV directly receives the UAV upgrade command sent by the authentication device, and executes the UAV upgrade command to complete the corresponding upgrade operation.
  • the drone is directly connected to the authentication device.
  • the smart phone and the drone can communicate with each other.
  • the software upgrade of the drone can be directly and conveniently completed through the smart phone.
  • the corresponding APP can be installed in the smart phone, so that the corresponding upgrade package can be carried in the drone upgrade command and sent to the drone by triggering the APP, so that the drone can execute the drone upgrade command. Complete the corresponding upgrade operation.
  • the remote authentication of the drone based on the smart phone not only saves the certification cost, but also enables the upgrade of the drone directly and conveniently through the smart phone.
  • Step 1103 The remote controller is connected to the authentication device, and the drone receives the drone upgrade command sent from the authentication device and forwarded by the drone, and executes the drone upgrade command to complete the corresponding upgrade operation.
  • the smart phone when the remote controller has passed the authentication of the smart phone based on the encryption authentication chip in the drone, and the smart phone is directly connected with the remote controller at this time, the smart phone can also complete the pair by using the remote controller.
  • the software upgrade of the smartphone to the drone is performed by the remote controller, that is, the software upgrade of the drone is completed by the forwarding of the remote controller.
  • the upgrade package for the drone can be directly sent to the remote controller by triggering the upgrade package for the drone, and the remote controller recognizes that the upgrade instruction is for the drone. Then, the drone upgrade command is forwarded to the drone, so that the drone executes the drone upgrade instruction and completes the corresponding upgrade operation.
  • the above method embodiments are based on the authentication scenario of FIG. 1(b), and the device authentication method is introduced from the perspective of different execution entities.
  • the signaling interaction is introduced.
  • FIG. 13 is a signaling interaction diagram of Embodiment 12 of a device authentication method according to an embodiment of the present invention. As shown in FIG. 13, the method includes the following steps:
  • Step 1201 The authentication device sends the authentication data to the remote controller.
  • Step 1202 The remote controller forwards the authentication data to the drone.
  • Step 1203 The drone encrypts the authentication data by using a key included in the encrypted authentication chip installed therein to obtain an operation result.
  • Step 1204 The drone sends the operation result to the remote controller.
  • Step 1205 The remote controller forwards the operation result to the authentication device.
  • Step 1206 When the authentication device determines that the operation result is correct, it is determined that the remote controller can communicate with the remote controller.
  • FIG. 14 is a schematic structural diagram of Embodiment 1 of a device authentication apparatus according to an embodiment of the present invention.
  • the device authentication device is configured in an authentication device, such as a smart phone, a tablet computer, and the like, as shown in FIG. 14 .
  • the device authentication device includes: a sending module 11, a receiving module 12, and a processing module 13.
  • the sending module 11 is configured to send the authentication data to the drone to cause the drone to forward the authentication data to the remote controller, where the authentication data is used to enable the remote controller to adopt the encryption included in the encryption authentication chip
  • the key performs an encryption operation on the authentication data to obtain an operation result, wherein the encryption authentication chip is implanted in the remote controller.
  • the receiving module 12 is configured to receive the operation result that the remote controller forwards through the drone.
  • the processing module 13 is configured to determine that the UAV can communicate with the UAV when determining that the operation result is correct.
  • the processing module 13 is configured to: perform operation on the authentication data according to a locally stored encryption authentication algorithm to obtain a target operation result; and determine, when determining that the operation result is consistent with the target operation result, determining It is capable of communicating with the drone.
  • the processing module 13 is specifically configured to: decrypt the operation result; and determine to be able to communicate with the drone when determining that the decryption result is consistent with the authentication data.
  • processing module 13 is further configured to: authenticate the remote controller according to the encrypted authentication chip implanted in the remote controller.
  • the authentication device is connected to the UAV, and the receiving module 12 is further configured to: directly receive data information sent by the UAV, where the data information includes image data.
  • the authentication device is connected to the drone, and the sending module 11 is further configured to: directly send a drone upgrade instruction to the drone, so that the drone performs the Man-machine upgrade The instruction completes the corresponding upgrade operation.
  • the authentication device is connected to the drone, and the sending module 11 is further configured to:
  • the device authentication device provided by this embodiment may be used to perform the technical solution of the authentication device in the method embodiment shown in any one of FIG. 2 to FIG. 7.
  • the implementation principle and technical effects are similar, and details are not described herein again.
  • FIG. 15 is a schematic structural diagram of Embodiment 2 of a device authentication apparatus according to an embodiment of the present invention.
  • the device authentication apparatus is disposed in a UAV.
  • the device authentication apparatus includes: a receiving module 21, a sending module 22, Processing module 23.
  • the receiving module 21 is configured to receive authentication data sent by the authentication device.
  • the sending module 22 is configured to send the authentication data to the remote controller, so that the remote controller performs encryption operation on the authentication data by using a key included in the encryption authentication chip to obtain an operation result, where the remote controller is implanted
  • the encrypted authentication chip is included.
  • the receiving module 21 is further configured to receive the operation result sent by the remote controller, and send the operation result to the authentication device, and determine that the authentication device can be used when determining that the operation result is correct. Communicate.
  • the UAV is connected to the authentication device, and the sending module 22 is further configured to: directly send data information to the authentication device, where the data information includes image data.
  • the UAV is connected to the authentication device, and the receiving module 21 is further configured to: directly receive the UAV upgrade command sent by the authentication device.
  • the device further includes: a processing module 23, configured to execute the drone upgrade command, and complete a corresponding upgrade operation.
  • the drone is connected to the authentication device, and the receiving module 21 is further configured to: directly receive a remote controller upgrade command sent by the authentication device.
  • the sending module 22 is further configured to: forward the remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction to complete a corresponding upgrade operation.
  • the device authentication apparatus provided in this embodiment may be used to perform the implementation shown in any one of FIG. 2 to FIG. 7.
  • the technical solution of the UAV is similar in its implementation principle and technical effects, and will not be described again.
  • FIG. 16 is a schematic structural diagram of Embodiment 3 of a device authentication apparatus according to an embodiment of the present invention.
  • the device authentication apparatus is disposed in a remote controller.
  • the device authentication apparatus includes: a receiving module 31, a processing module 32, and a sending Module 33.
  • the receiving module 31 is configured to receive authentication data sent by the drone, and the authentication data is sent by the authentication device to the drone and forwarded by the drone.
  • the processing module 32 is configured to perform an encryption operation on the authentication data by using a key included in the encryption authentication chip, and obtain an operation result, where the encryption authentication chip is implanted in the remote controller.
  • a sending module 33 configured to send the operation result to the drone, so that the drone forwards the operation result to the authentication device, where the operation result is used to make the authentication device
  • the authentication device is capable of communicating with the drone.
  • the cryptographic authentication chip embedded in the remote controller is further configured to enable the authentication device to authenticate the remote controller according to the cryptographic authentication chip.
  • the receiving module 31 is further configured to: receive a remote controller upgrade instruction sent from the authentication device and forwarded by the drone.
  • the processing module 32 is further configured to: execute the remote controller upgrade instruction to complete a corresponding upgrade operation.
  • the device authentication device provided in this embodiment may be used to implement the technical solution of the remote controller in the embodiment shown in any of FIG. 2 to FIG. 7.
  • the implementation principle and technical effects are similar, and details are not described herein again.
  • FIG. 17 is a schematic structural diagram of Embodiment 4 of a device authentication apparatus according to an embodiment of the present invention.
  • the device authentication device is configured in an authentication device, such as a smart phone, a tablet computer, and the like, as shown in FIG.
  • the device authentication device includes a sending module 41, a receiving module 42, and a processing module 43.
  • the sending module 41 is configured to send the authentication data to the remote controller, so that the remote controller forwards the authentication data to the drone, and the authentication data is used to enable the drone to adopt the encryption included in the encryption authentication chip.
  • the key performs an encryption operation on the authentication data to obtain an operation result, wherein the encryption authentication chip is implanted in the drone.
  • the receiving module 42 is configured to receive the operation result that is forwarded by the drone through the remote controller.
  • the processing module 43 is configured to determine that the remote controller can communicate with the remote controller when determining that the operation result is correct.
  • the processing module 43 is specifically configured to: perform operation on the authentication data according to a locally stored encryption authentication algorithm to obtain a target operation result; and determine, when determining that the operation result is consistent with the target operation result, determine Communicate with the remote controller.
  • the processing module 43 is specifically configured to: decrypt the operation result; and determine to be able to communicate with the remote controller when determining that the decryption result is consistent with the authentication data.
  • the authentication device is connected to the remote controller, and the sending module 41 is further configured to: directly send a remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade command, Complete the corresponding upgrade operation.
  • the authentication device is connected to the remote controller, and the sending module 41 is further configured to: directly send a drone upgrade instruction to the remote controller, so that the remote controller upgrades the drone The instruction is forwarded to the drone, so that the drone executes the drone upgrade instruction to complete a corresponding upgrade operation.
  • the authentication device is connected to the UAV, and the receiving module 42 is further configured to: directly receive data information sent by the UAV to the authentication device, where the data information includes image data.
  • the authentication device is connected to the drone, and the sending module 41 is further configured to: directly send a drone upgrade instruction to the drone, so that the drone performs the The man-machine upgrade instruction completes the corresponding upgrade operation.
  • processing module 43 is further configured to: authenticate the drone according to the encrypted authentication chip implanted in the drone.
  • the device authentication device provided in this embodiment may be used to perform the technical solution of the authentication device in the embodiment shown in any of FIG. 8 to FIG. 13 , and the implementation principle and technical effects are similar, and details are not described herein again.
  • FIG. 18 is a schematic structural diagram of Embodiment 5 of a device authentication apparatus according to an embodiment of the present invention.
  • the device authentication apparatus is disposed in a remote controller. As shown in FIG. 18, the device authentication apparatus includes: a receiving module 51 and a sending module 52.
  • the receiving module 51 is configured to receive authentication data sent by the authentication device.
  • a sending module 52 configured to send the authentication data to the drone to enable the drone to adopt
  • the key included in the encryption authentication chip performs an encryption operation on the authentication data to obtain a calculation result, and the encryption authentication chip is implanted in the drone.
  • the receiving module 51 is further configured to receive the operation result sent by the UAV, and send the operation result to the authentication device, and determine that the authentication can be performed when determining that the operation result is correct.
  • the device communicates.
  • the remote controller is connected to the authentication device, and the receiving module 51 is further configured to: directly receive a remote controller upgrade instruction sent by the authentication device.
  • the device further includes: a processing module 53 configured to execute the remote controller upgrade instruction to complete a corresponding upgrade operation.
  • the remote controller is connected to the authentication device, and the receiving module 51 is further configured to: directly receive the drone upgrade command sent by the authentication device.
  • the sending module 52 is further configured to: forward the drone upgrade command to the drone, so that the drone performs the drone upgrade command to complete a corresponding upgrade operation.
  • the device authentication device provided in this embodiment may be used to implement the technical solution of the remote controller in the embodiment shown in any of FIG. 8 to FIG. 13 , and the implementation principle and technical effects are similar, and details are not described herein.
  • FIG. 19 is a schematic structural diagram of Embodiment 6 of a device authentication apparatus according to an embodiment of the present invention.
  • the device authentication apparatus is disposed in a UAV.
  • the device authentication apparatus includes: a receiving module 61, a processing module 62, Send module 63.
  • the receiving module 61 is configured to receive authentication data sent by the remote controller, where the authentication data is sent by the authentication device to the remote controller and forwarded by the remote controller.
  • the processing module 62 is configured to perform an encryption operation on the authentication data by using a key included in the encryption authentication chip to obtain an operation result, where the encryption authentication chip is implanted in the UAV.
  • a sending module 63 configured to send the operation result to the remote controller, so that the remote controller forwards the operation result to the authentication device, where the operation result is used to cause the authentication device to determine When the result of the operation is correct, it is determined that the authentication device can communicate with the remote controller.
  • the cryptographic authentication chip implanted in the UAV is further configured to enable the authentication device to authenticate the UAV according to the cryptographic authentication chip.
  • the UAV is connected to the authentication device, and the sending module 63 is further configured to: directly send data information to the authentication device, where the data information includes image data.
  • the drone is connected to the authentication device, and the receiving module 61 is further configured to: directly receive the drone upgrade command sent by the authentication device.
  • the processing module 62 is further configured to: execute the drone upgrade instruction to complete a corresponding upgrade operation.
  • the remote controller is connected to the authentication device, and the receiving module 61 is further configured to: receive a drone upgrade command sent from the authentication device and forwarded by the drone.
  • the processing module 62 is further configured to: execute the drone upgrade instruction to complete a corresponding upgrade operation.
  • the device authentication device provided in this embodiment may be used to implement the technical solution of the UAV in the embodiment shown in any of FIG. 8 to FIG. 13 , and the implementation principle and technical effects are similar, and details are not described herein again.
  • FIG. 20 is a schematic structural diagram of Embodiment 1 of an authentication device according to an embodiment of the present invention. As shown in FIG. 20, the authentication device includes: a transmitter 71, a receiver 72, and a processor 73.
  • a transmitter 71 configured to send authentication data to the drone to cause the drone to forward the authentication data to a remote controller, where the authentication data is used to enable the remote controller to adopt a secret included in the encryption authentication chip
  • the key performs an encryption operation on the authentication data to obtain an operation result, wherein the encryption authentication chip is implanted in the remote controller.
  • the receiver 72 is configured to receive the operation result that is forwarded by the remote controller by the drone.
  • the processor 73 is configured to determine that the UAV can communicate with the UAV when determining that the operation result is correct.
  • the processor 73 is configured to: perform operation on the authentication data according to a locally stored encryption authentication algorithm to obtain a target operation result; and determine, when determining that the operation result is consistent with the target operation result, determining It is capable of communicating with the drone.
  • the processor 73 is specifically configured to: decrypt the operation result; and determine to be able to communicate with the drone when determining that the decryption result is consistent with the authentication data.
  • the processor 73 is further configured to: authenticate the remote controller according to the encrypted authentication chip implanted in the remote controller.
  • the authentication device is connected to the UAV, and the receiver 72 is further configured to: directly receive data information sent by the UAV, where the data information includes image data.
  • the authentication device is connected to the drone, and the transmitter 71 is further configured to: directly Sending a drone upgrade command to the drone to cause the drone to execute the drone upgrade command to complete a corresponding upgrade operation.
  • the authentication device is connected to the drone, and the transmitter 71 is further configured to: directly send a remote controller upgrade instruction to the drone, so that the drone will use the remote controller
  • the upgrade instruction is forwarded to the remote controller, so that the remote controller executes the remote controller upgrade instruction to complete a corresponding upgrade operation.
  • the authentication device provided in this embodiment may be used to perform the technical solution in the method embodiment shown in any one of FIG. 2 to FIG. 7.
  • the implementation principle and technical effects are similar, and details are not described herein again.
  • FIG. 21 is a schematic structural diagram of Embodiment 1 of a drone according to an embodiment of the present invention. As shown in FIG. 21, the UAV includes a receiver 81, a transmitter 82, and a processor 83.
  • the receiver 81 is configured to receive authentication data sent by the authentication device.
  • the transmitter 82 is configured to send the authentication data to the remote controller, so that the remote controller encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, where the remote controller is implanted
  • the encrypted authentication chip is included.
  • the receiver 81 is further configured to receive the operation result sent by the remote controller, and send the operation result to the authentication device, and determine that the authentication device can be used when determining that the operation result is correct. Communicate.
  • the drone is connected to the authentication device, and the transmitter 82 is further configured to: directly send data information to the authentication device, where the data information includes image data.
  • the drone is connected to the authentication device, and the receiver 81 is further configured to: directly receive the UAV upgrade command sent by the authentication device;
  • the processor 83 is configured to execute the drone upgrade command to complete a corresponding upgrade operation.
  • the drone is connected to the authentication device, and the receiver 81 is further configured to: directly receive a remote controller upgrade instruction sent by the authentication device.
  • the transmitter 82 is further configured to: forward the remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction to complete a corresponding upgrade operation.
  • the unmanned aerial vehicle provided in this embodiment can be used to perform the technical solution in the method embodiment shown in any one of FIG. 2 to FIG. 7.
  • the implementation principle and technical effects are similar, and details are not described herein again.
  • FIG. 22 is a schematic structural diagram of Embodiment 1 of a remote controller according to an embodiment of the present invention. As shown in FIG. 22, the remote controller includes a receiver 91, a processor 92, and a transmitter 93.
  • the receiver 91 is configured to receive authentication data sent by the drone, and the authentication data is sent by the authentication device to the drone and forwarded by the drone.
  • the processor 92 is configured to perform an encryption operation on the authentication data by using a key included in the encryption authentication chip, and obtain an operation result, where the encryption authentication chip is implanted in the remote controller.
  • a transmitter 93 configured to send the operation result to the drone, so that the drone forwards the operation result to the authentication device, where the operation result is used to make the authentication device
  • the authentication device is capable of communicating with the drone.
  • the cryptographic authentication chip implanted in the remote controller is further configured to enable the authentication device to authenticate the remote controller according to the cryptographic authentication chip.
  • the receiver 91 is further configured to: receive a remote controller upgrade instruction sent from the authentication device and forwarded by the drone.
  • the processor 92 is further configured to: execute the remote controller upgrade instruction to complete a corresponding upgrade operation.
  • the remote controller provided in this embodiment may be used to perform the technical solution in the method embodiment shown in any one of FIG. 2 to FIG. 7.
  • the implementation principle and technical effects are similar, and details are not described herein again.
  • FIG. 23 is a schematic structural diagram of Embodiment 2 of an authentication device according to an embodiment of the present invention. As shown in FIG. 23, the authentication device includes: a transmitter 1011, a receiver 1012, and a processor 1013.
  • the transmitter 1011 is configured to send authentication data to the remote controller, so that the remote controller forwards the authentication data to the drone, and the authentication data is used to enable the drone to adopt a secret included in the encryption authentication chip.
  • the key performs an encryption operation on the authentication data to obtain an operation result, wherein the encryption authentication chip is implanted in the drone.
  • the receiver 1012 is configured to receive the operation result that is forwarded by the drone through the remote controller.
  • the processor 1013 is configured to determine that the remote controller can communicate with the remote controller when determining that the operation result is correct.
  • the processor 1013 is specifically configured to:
  • the authentication data is calculated according to a locally stored encryption authentication algorithm to obtain a target operation result; when it is determined that the operation result is consistent with the target operation result, it is determined that the remote controller can communicate with the remote controller.
  • the processor 1013 is specifically configured to:
  • Decrypting the operation result determining that communication with the remote controller is possible when determining that the decryption result is consistent with the authentication data.
  • the processor 1013 is further configured to: authenticate the drone according to the encrypted authentication chip implanted in the drone.
  • the authentication device is connected to the remote controller, and the transmitter 1011 is further configured to: directly send a remote controller upgrade instruction to the remote controller, so that the remote controller executes the remote controller upgrade instruction, Complete the corresponding upgrade operation.
  • the authentication device is connected to the remote controller, and the transmitter 1011 is further configured to: directly send a drone upgrade instruction to the remote controller, so that the remote controller upgrades the drone The instruction is forwarded to the drone, so that the drone executes the drone upgrade instruction to complete a corresponding upgrade operation.
  • the authentication device is connected to the UAV, and the receiver 1012 is further configured to: directly receive data information sent by the UAV to the authentication device, where the data information includes image data.
  • the authentication device is connected to the drone, and the transmitter 1011 is further configured to: directly send a drone upgrade instruction to the drone, so that the drone performs the The man-machine upgrade instruction completes the corresponding upgrade operation.
  • the authentication device provided in this embodiment may be used to perform the technical solution in the embodiment shown in any of FIG. 8 to FIG. 13 , and the implementation principle and technical effects are similar, and details are not described herein again.
  • FIG. 24 is a schematic structural diagram of Embodiment 2 of a remote controller according to an embodiment of the present invention. As shown in FIG. 24, the remote controller includes: a receiver 1111 and a transmitter 1112.
  • the receiver 1111 is configured to receive authentication data sent by the authentication device.
  • the transmitter 1112 is configured to send the authentication data to the drone, so that the drone encrypts the authentication data by using a key included in the encryption authentication chip to obtain an operation result, where the unmanned person The encrypted authentication chip is implanted in the machine.
  • the receiver 1111 is further configured to receive the operation result sent by the UAV, and send the operation result to the authentication device, and when determining that the operation result is correct, determine that the operation result is The authentication device communicates.
  • the remote controller is connected to the authentication device, and the receiver 1111 is further configured to: directly receive a remote controller upgrade instruction sent by the authentication device.
  • the remote controller further includes a processor 1113, configured to execute the remote controller upgrade instruction, and complete a corresponding upgrade operation.
  • the remote controller is connected to the authentication device, and the receiver 1111 is further configured to: directly receive the drone upgrade command sent by the authentication device.
  • the transmitter 1112 is further configured to: forward the UAV upgrade instruction to the UAV, so that the UAV performs the UAV upgrade instruction to complete a corresponding upgrade operation.
  • the remote controller provided in this embodiment may be used to perform the technical solution in the embodiment shown in any of FIG. 8 to FIG. 13 , and the implementation principle and technical effects are similar, and details are not described herein again.
  • FIG. 25 is a schematic structural diagram of Embodiment 2 of a UAV according to an embodiment of the present invention. As shown in FIG. 25, the UAV includes: a receiver 1211, a processor 1212, and a transmitter 1213.
  • the receiver 1211 is configured to receive authentication data sent by the remote controller, where the authentication data is sent by the authentication device to the remote controller and forwarded by the remote controller.
  • the processor 1212 is configured to perform an encryption operation on the authentication data by using a key included in the encryption authentication chip to obtain an operation result, where the encryption authentication chip is implanted in the UAV.
  • a transmitter 1213 configured to send the operation result to the remote controller, so that the remote controller forwards the operation result to the authentication device, where the operation result is used to cause the authentication device to determine When the result of the operation is correct, it is determined that the authentication device can communicate with the remote controller.
  • the cryptographic authentication chip implanted in the UAV is further configured to enable the authentication device to authenticate the UAV according to the cryptographic authentication chip.
  • the drone is connected to the authentication device, and the transmitter 1213 is further configured to: directly send data information to the authentication device, where the data information includes image data.
  • the drone is connected to the authentication device, and the receiver 1211 is further configured to: directly receive the UAV upgrade command sent by the authentication device.
  • the processor 1212 is further configured to: execute the drone upgrade instruction to complete a corresponding upgrade operation.
  • the remote controller is connected to the authentication device, and the receiver 1211 is further configured to: Receiving a drone upgrade command issued by the authentication device and forwarded by the drone.
  • the processor 1212 is further configured to: execute the drone upgrade instruction to complete a corresponding upgrade operation.
  • the unmanned aerial vehicle provided in this embodiment can be used to implement the technical solution in the embodiment shown in any of FIG. 8 to FIG. 13 , and the implementation principle and technical effects are similar, and details are not described herein again.
  • the processor may be a central processing unit (English: Central Processing Unit, CPU for short), or may be other general-purpose processors, digital signals. Processor (English: Digital Signal Processor, DSP for short), Application Specific Integrated Circuit (ASIC), etc.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor or the like. The steps of the method disclosed in the embodiments of the present invention may be directly implemented as a hardware processor, or may be performed by a combination of hardware and software modules in the processor.
  • the aforementioned program can be stored in a computer readable storage medium.
  • the steps including the foregoing method embodiments are performed; and the foregoing storage medium includes: read-only memory (English: read-only memory, abbreviation: ROM), RAM, flash memory, hard disk, solid state hard disk, Magnetic tape (English: magnetic tape), floppy disk (English: floppy disk), optical disc (English: optical disc) and any combination thereof.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Selective Calling Equipment (AREA)
  • Telephonic Communication Services (AREA)

Abstract

La présente invention concerne un procédé et un dispositif pour une authentification de dispositif, un dispositif d'authentification, un véhicule aérien sans équipage et une télécommande. Le procédé comprend les opérations suivantes : le dispositif d'authentification envoie des données d'authentification au véhicule aérien sans équipage de telle sorte que le véhicule aérien sans équipage transfère les données d'authentification à la télécommande, les données d'authentification étant utilisées pour permettre à la télécommande de chiffrer les données d'authentification à l'aide d'une clé contenue dans une puce d'authentification de chiffrement pour obtenir un résultat d'opération, la télécommande comprenant la puce d'authentification de chiffrement ; le dispositif d'authentification reçoit le résultat d'opération transféré par la télécommande par l'intermédiaire du véhicule aérien sans équipage ; et le dispositif d'authentification détermine qu'il est possible de communiquer avec le véhicule aérien sans équipage lors de la détermination du fait que le résultat d'opération est correct. Par l'intermédiaire du mode d'authentification à distance, le dispositif d'authentification peut réaliser l'authentification du véhicule aérien sans équipage et de la télécommande uniquement par utilisation de la puce d'authentification de chiffrement incorporée dans la télécommande, permettant ainsi d'économiser le coût d'authentification, et d'améliorer l'efficacité de traitement d'authentification.
PCT/CN2016/074581 2016-02-25 2016-02-25 Procédé et dispositif pour une authentification de dispositif, dispositif d'authentification, véhicule aérien sans équipage et télécommande WO2017143570A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201680002825.4A CN106797387B (zh) 2016-02-25 2016-02-25 设备认证方法、装置、认证设备、无人机和遥控器
PCT/CN2016/074581 WO2017143570A1 (fr) 2016-02-25 2016-02-25 Procédé et dispositif pour une authentification de dispositif, dispositif d'authentification, véhicule aérien sans équipage et télécommande

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/074581 WO2017143570A1 (fr) 2016-02-25 2016-02-25 Procédé et dispositif pour une authentification de dispositif, dispositif d'authentification, véhicule aérien sans équipage et télécommande

Publications (1)

Publication Number Publication Date
WO2017143570A1 true WO2017143570A1 (fr) 2017-08-31

Family

ID=58952265

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/074581 WO2017143570A1 (fr) 2016-02-25 2016-02-25 Procédé et dispositif pour une authentification de dispositif, dispositif d'authentification, véhicule aérien sans équipage et télécommande

Country Status (2)

Country Link
CN (1) CN106797387B (fr)
WO (1) WO2017143570A1 (fr)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109298874A (zh) * 2017-07-24 2019-02-01 深圳市中兴微电子技术有限公司 一种无人机软件升级系统及方法
CN110383189A (zh) * 2018-03-30 2019-10-25 深圳市大疆创新科技有限公司 无人机控制方法和控制装置

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140372774A1 (en) * 2013-06-12 2014-12-18 Convida Wireless, Llc Context And Power Control Information Management For Proximity Services
CN104809918A (zh) * 2015-05-27 2015-07-29 张忠义 一种无人机飞行管理方法
KR101541359B1 (ko) * 2013-10-21 2015-08-03 동국대학교 산학협력단 무인배달 서비스 방법 및 시스템
CN104898654A (zh) * 2015-05-19 2015-09-09 吴晗 无人机远程控制系统及方法
CN104918020A (zh) * 2015-06-17 2015-09-16 宋克凡 一种无人机模拟驾驶显示装置
CN104980210A (zh) * 2015-06-26 2015-10-14 陈昊 一种可配合鉴权通信机制的无人机与地面站及鉴权方法
CN104993928A (zh) * 2015-05-11 2015-10-21 昆明理工大学 一种基于实时嵌入式控制系统的无人机安全通信链路加密方法
CN104994112A (zh) * 2015-07-23 2015-10-21 陈昊 一种无人机与地面站通信数据链加密的方法
CN105139693A (zh) * 2015-07-28 2015-12-09 顺丰科技有限公司 无人机监控方法及无人机管理平台
CN105261189A (zh) * 2015-11-16 2016-01-20 英华达(上海)科技有限公司 一种无人机的飞行控制方法及系统
CN105353700A (zh) * 2015-10-30 2016-02-24 周丽娜 一种具有安全控制系统的无人机

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103914076B (zh) * 2014-03-28 2017-02-15 浙江吉利控股集团有限公司 一种基于无人机的货物传送系统和方法
CN105206116B (zh) * 2015-10-10 2017-09-22 杨珊珊 无人飞行器飞行区域验证装置及其验证方法

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140372774A1 (en) * 2013-06-12 2014-12-18 Convida Wireless, Llc Context And Power Control Information Management For Proximity Services
KR101541359B1 (ko) * 2013-10-21 2015-08-03 동국대학교 산학협력단 무인배달 서비스 방법 및 시스템
CN104993928A (zh) * 2015-05-11 2015-10-21 昆明理工大学 一种基于实时嵌入式控制系统的无人机安全通信链路加密方法
CN104898654A (zh) * 2015-05-19 2015-09-09 吴晗 无人机远程控制系统及方法
CN104809918A (zh) * 2015-05-27 2015-07-29 张忠义 一种无人机飞行管理方法
CN104918020A (zh) * 2015-06-17 2015-09-16 宋克凡 一种无人机模拟驾驶显示装置
CN104980210A (zh) * 2015-06-26 2015-10-14 陈昊 一种可配合鉴权通信机制的无人机与地面站及鉴权方法
CN104994112A (zh) * 2015-07-23 2015-10-21 陈昊 一种无人机与地面站通信数据链加密的方法
CN105139693A (zh) * 2015-07-28 2015-12-09 顺丰科技有限公司 无人机监控方法及无人机管理平台
CN105353700A (zh) * 2015-10-30 2016-02-24 周丽娜 一种具有安全控制系统的无人机
CN105261189A (zh) * 2015-11-16 2016-01-20 英华达(上海)科技有限公司 一种无人机的飞行控制方法及系统

Also Published As

Publication number Publication date
CN106797387A (zh) 2017-05-31
CN106797387B (zh) 2020-12-18

Similar Documents

Publication Publication Date Title
EP3513525B1 (fr) Communication d'élément sécurisé d'environnement d'exécution de confiance
CN112987581B (zh) 用于智能家居设备的控制方法及其介质和终端
TWI643508B (zh) 用於物聯網智能設備的智慧路由系統
US10958664B2 (en) Method of performing integrity verification between client and server and encryption security protocol-based communication method of supporting integrity verification between client and server
CN107637039B (zh) 执行所有者转移的系统和转移设备所有权的方法和系统
WO2018019069A1 (fr) Procédé et appareil d'exploitation de ressource
WO2019029471A1 (fr) Réseau bluetooth et procédé de configuration de réseau
CN104661219B (zh) 一种无线设备的通讯方法、无线设备和服务器
CN106850680B (zh) 一种用于轨道交通设备的智能身份认证方法及装置
JP7024980B2 (ja) コンピューティングデバイスの遠隔制御
EP3001351A1 (fr) Procédé d'authentification d'identité d'utilisateur, terminal et terminal de service
US12041169B2 (en) Electronic device and method, performed by electronic device, of transmitting control command to target device
WO2017167188A1 (fr) Procédé et appareil de communication sécurisée pour un véhicule, système multimédia pour un véhicule, et véhicule
US10372656B2 (en) System, apparatus and method for providing trusted input/output communications
TWI636373B (zh) Method and device for authorizing between devices
WO2019007252A1 (fr) Procédé et appareil de commande
TWI553504B (zh) 雲端加密系統及方法
US9058500B2 (en) Method and apparatus for inputting data
WO2017152875A1 (fr) Procédé et appareil de communication sécurisée pour un véhicule, système multimédia de véhicule et véhicule
KR102026375B1 (ko) 웨어러블 디바이스 통신 지원 장치 및 방법
JP2020078067A5 (fr)
WO2023279897A1 (fr) Procédé et système de liaison sécurisée, support de stockage et appareil électronique
WO2019120231A1 (fr) Procédé et dispositif permettant de déterminer un état de confiance d'un tpm et support de stockage
WO2017143570A1 (fr) Procédé et dispositif pour une authentification de dispositif, dispositif d'authentification, véhicule aérien sans équipage et télécommande
WO2014173222A1 (fr) Dispositif de sécurité et système d'affichage

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16891024

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 16891024

Country of ref document: EP

Kind code of ref document: A1