WO2018209683A1 - 身份验证方法、设备、机器可读存储介质以及系统 - Google Patents

身份验证方法、设备、机器可读存储介质以及系统 Download PDF

Info

Publication number
WO2018209683A1
WO2018209683A1 PCT/CN2017/085081 CN2017085081W WO2018209683A1 WO 2018209683 A1 WO2018209683 A1 WO 2018209683A1 CN 2017085081 W CN2017085081 W CN 2017085081W WO 2018209683 A1 WO2018209683 A1 WO 2018209683A1
Authority
WO
WIPO (PCT)
Prior art keywords
drone
information
user
client
user identifier
Prior art date
Application number
PCT/CN2017/085081
Other languages
English (en)
French (fr)
Inventor
黄志聪
谢卓
闫伟
邹成
Original Assignee
深圳市大疆创新科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市大疆创新科技有限公司 filed Critical 深圳市大疆创新科技有限公司
Priority to CN201780004580.3A priority Critical patent/CN108702356A/zh
Priority to PCT/CN2017/085081 priority patent/WO2018209683A1/zh
Publication of WO2018209683A1 publication Critical patent/WO2018209683A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • H04B7/185Space-based or airborne stations; Stations for satellite systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • H04B7/185Space-based or airborne stations; Stations for satellite systems
    • H04B7/18502Airborne stations
    • H04B7/18506Communications with or from aircraft, i.e. aeronautical mobile service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos

Definitions

  • the present invention relates to the field of drone technology, and more particularly to an authentication method, device, machine readable storage medium, and system.
  • Unmanned vehicles such as unmanned aerial vehicles (UAVs) have been developed for use in a variety of applications, including consumer and industrial applications. For example, drones can be manipulated for entertainment, photography/camera, surveillance, delivery, or other applications.
  • UAVs unmanned aerial vehicles
  • Drones expand all aspects of personal life. However, as the use of drones has become more prevalent, security issues and challenges have arisen. For example, when the drone's flight is not limited, the drone may fly over an area where flight is prohibited or should be prohibited. This may be intentional or unintentional. In some cases, novice users may lose control of the drone or are unfamiliar with aviation flight rules, and there is a potential for hijacking or hacking drone control.
  • the present invention provides an authentication method, apparatus, machine readable storage medium, and system.
  • a first aspect of the present invention provides an identity verification method, which is applied to a client, the client is capable of communicating with a server, and the client is capable of controlling a drone, and the method includes:
  • another authentication method is provided, which is applied to a server, the server communicates with a client, and the client can control the drone, and the method includes:
  • the client sends the verification page information to the client, so that the client displays the verification page according to the verification page information, and receives the user identifier and the identity verification information input by the user on the verification page; wherein the user identifier is a user Controlling, by the client, the credentials of the drone;
  • another authentication method is provided, which is applied to a drone, and the method includes: receiving identity verification information sent by a client;
  • the correspondence between the drone identification code and the authentication information is recorded locally, and the drone identification code is used to uniquely identify the drone.
  • a fourth aspect of the present invention provides a terminal device, wherein the terminal device is capable of communicating with a server, and the terminal device is capable of controlling a drone, and the terminal device includes:
  • a processor configured to obtain verification page information from the server, and display a verification page according to the verification page information; receive a user identifier and identity verification information input by the user on the verification page, where the user identifier is The user controls the credentials of the drone through the terminal device;
  • the processor is further configured to send the user identifier and the identity verification information to the server, so that the server records a correspondence between the user identifier and the identity verification information.
  • a fifth aspect of the present invention provides a server, where the server communicates with a client, and the client can control the drone, and the server includes:
  • a processor configured to send the verification page information to the client, so that the client displays the verification page according to the verification page information, and receives the user identifier and the identity verification information input by the user on the verification page;
  • the user identifier is a credential that the user controls the drone through the client; receiving the user identifier and the identity verification information sent by the client, and verifying the user identifier and the identity verification The correspondence of the information is recorded to the memory;
  • a storage configured to store a correspondence between the user identifier and the identity verification information.
  • a drone comprising:
  • a processor configured to receive the authentication information sent by the client, and record the correspondence between the UAV identification code and the authentication information to the memory, where the UAV identification code is used to uniquely identify the UAV;
  • a storage configured to store a correspondence between the UAV identification code and the identity verification information.
  • a seventh aspect of the present invention provides a machine readable storage medium, which is applicable to a terminal device, wherein the terminal device is capable of communicating with a server, the terminal device is capable of controlling the drone, and the machine readable storage medium stores a plurality of Computer instructions that, when executed, perform the following processing:
  • the device controls the credentials of the drone
  • a machine readable storage medium which is applied to a server, the server is in communication with a client, and the client is capable of controlling a drone, and the machine readable storage medium is stored
  • a machine readable storage medium for use in a drone.
  • a machine readable storage medium stores a plurality of computer instructions. When the computer instructions are executed, the following processing is performed: receiving an identity sent by a client The information is verified, and the correspondence between the drone identification code and the authentication information is recorded to the memory, and the drone identification code is used to uniquely identify the drone.
  • an identity verification system includes a client, a server, and a drone; the client can communicate with a server, and the client can control the drone;
  • the client is configured to obtain verification page information from the server, and according to the verification
  • the page information displays a verification page; receiving a user identifier and authentication information input by the user on the verification page; wherein the user identifier is a credential that the user controls the drone through the client; Sending the authentication information to the server;
  • the server is configured to send the verification page information to the client, and receive the user identifier and the identity verification information sent by the client, and record the user identifier and the identity verification. Correspondence of information.
  • an identity verification method for the drone is proposed, and the user identifier and the identity verification information can be bound, so that the real name system of the drone can be realized, and the drone can be used. Security, to avoid or reduce some security risks.
  • FIG. 1 is a schematic diagram of an application scenario of an embodiment
  • FIGS. 2A, 2B and 2C are schematic diagrams of an embodiment of an authentication method
  • 3A and 3B are schematic diagrams showing an embodiment of another authentication method
  • FIG. 4 is a schematic diagram of another embodiment of an authentication method
  • FIG. 5 is a schematic diagram of another embodiment of an authentication method
  • FIG. 6 is a schematic diagram of another embodiment of an authentication method
  • Figure 7 is a block diagram of an embodiment of a terminal device
  • Figure 8 is a block diagram of an embodiment of a server
  • Figure 9 is a block diagram of one embodiment of a drone.
  • first, second, third, etc. may be used to describe various information in the present invention, such information should not be limited to these terms. These terms are used to distinguish the same type of information from each other.
  • first information may also be referred to as the second information without departing from the scope of the invention.
  • second information may also be referred to as the first information.
  • word "if” may be interpreted as "when", or "when", or "in response to determination.”
  • the embodiment of the invention provides an identity verification method, which can be applied to a system including a terminal device, a server, and a drone.
  • the terminal device is provided with a client capable of communicating with the server and capable of controlling the drone.
  • FIG. 1 it is a schematic diagram of the application of the method.
  • the client can communicate with the server, and the connection manner of the two can be a wired connection or a wireless connection.
  • the connection mode is not limited, and the wireless connection in FIG. 1 (such as WiFi, OcuSync, Lightbridge, Auxiliary, etc.) ) as an example.
  • the client can control the drone, and the connection between the two can be wired or wireless.
  • the connection is not limited. In Figure 1, the wireless connection (such as WiFi, OcuSync, Lightbridge, Auxiliary, etc.) For example.
  • the client can be implemented by an APP (application) method, or by an SDK (Software Development Kit), or This is achieved by means of parameter adjustment (such as drone tuning software).
  • APP application
  • SDK Software Development Kit
  • the authentication is also a real-name system.
  • the server and/or the drone are bound to the following correspondence: the correspondence between the user identifier and the authentication information, or the drone identification code.
  • the authentication information can also be directly recorded on the server and/or the drone.
  • the authentication information is also used as the user identifier. The user can log in to the client through the authentication information, and the client does not operate through the client. Man-machine.
  • the user identifier (that is, the registered account) is used when the user logs in to the client, and the user controls the credentials of the drone through the client.
  • the user identifier is user123456, and the user can successfully log in to the client through user123456, and then, The operation of the drone can be controlled by the client.
  • the authentication information includes but is not limited to one or any combination of the following: a mobile phone number, an ID card, fingerprint information, a pupil information, a drone authentication ID of a specific institution (for example, a FAA drone ID), a user avatar, and the identity
  • a mobile phone number for example, a MCI, a MCI, a MCI, a MCI, a MCI, a MCI, a MCI, a MCI, Sprint, EarthLink, a MSN, or a Wi-Fi Protected Access (WPA)
  • a user avatar for example, a user'sonic authentication, a user'sonic authentication, or a user'sonic authentication, and the identity
  • the verification information There is no restriction on the verification information, as long as the user identity can be uniquely distinguished.
  • the drone identification code is a unique identifier for uniquely identifying the drone.
  • the UAV identification code may be an identification code for uniquely identifying the entire UAV, or may be an identification code for uniquely identifying one of the modules in the UAV, for example, uniquely identifying the flight within the UAV.
  • Embodiment 1 an authentication process of an unregistered user is taken as an example, and the client first connects to the server for identity verification, and then connects to the drone for operation.
  • FIG. 2A which is a flowchart of the identity verification method, the method may include the following steps:
  • Step 201 The client obtains the verification page information from the server, and displays the verification page according to the verification page information.
  • the verification page can be a page that requires authentication of the user.
  • Unregistered users refer to users who have not registered user IDs on the server, and cannot pass the user logo. Successfully log in to the client.
  • a registered user is a user who has registered a user ID on the server. You can successfully log in to the client through the user ID, and then control the drone through the client.
  • the registration request is sent to the client, the client receives the registration request, and sends a registration request to the server; after receiving the registration request, the server returns the verification page information to the client.
  • the client can display the verification page according to the verification page information.
  • the verification page information includes all the content required to display the verification page, and the verification page can be displayed based on the verification page information.
  • the server After receiving the registration request, the server is not registered as the unregistered user, that is, the unregistered user has not been authenticated, that is, the unregistered user has not authenticated, so the server sends the client to the client.
  • the returned verification page information including all the contents required by FIG. 2B/2C, based on these verification page information, finally displays the verification page shown in FIG. 2B/2C.
  • a page for instructing a user to enter authentication information may be referred to as a verification page.
  • the verification page not only needs to complete the authentication function, but also needs to complete the user registration function. That is to say, the user not only needs to input the authentication information on the verification page to complete the authentication function, but also needs to input the user identifier on the verification page to complete the user registration function, that is, apply for the user identifier to the server, and then log in to the client. end.
  • the foregoing authentication information may be a mobile phone number, as shown in FIG. 2B, or may be an identity card number, as shown in FIG. 2C.
  • the verification page may further include a verification code, and the user may receive the verification code sent by the server through the mobile phone, and input the received verification code to the verification page.
  • the authentication information can also be other content, and will not be described again.
  • Step 202 The client receives the user identifier and the authentication information input by the user on the verification page.
  • the user can input information such as the user identification and the authentication information on the verification page, and the client can receive the information input by the user.
  • the client may locally store the correspondence between the user identifier and the authentication information.
  • Step 203 The client sends the user identifier and the authentication information to the server.
  • Step 204 The server records the correspondence between the user identifier and the identity verification information.
  • the client can obtain the drone identification code from the drone and record the correspondence between the user identification, the authentication information, and the drone identification code locally.
  • the client may send the correspondence between the user identifier, the authentication information, and the drone identification code to the server, and the server may record the correspondence between the user identifier, the identity verification information, and the drone identification code.
  • the client can send the authentication information to the drone, and the drone can record the correspondence between the drone identification code and the authentication information; or the client can send the user identifier and the authentication information to the unmanned person.
  • the drone can record the correspondence between the drone identification code, the user identification, and the authentication information.
  • Case 1 When the client connects with the server, step 201-204 is performed, and the client is also unattended at this time.
  • step 201-204 When the client is connected to the server, step 201-204 is performed. Then, the connection between the client and the server is disconnected, and the client is connected to the drone to keep the client connected to the drone.
  • Case 3 when the client and the server are connected, perform step 201 - step 204, then the connection between the client and the server is disconnected, the client is connected with the drone, and then The connection between the client and the drone is disconnected, and the client is connected to the server.
  • the client before the step 203 is performed, the client first obtains the drone identification code from the drone, and can locally record the correspondence between the user identifier, the identity verification information, and the drone identification code. Then, in step 203, the client may send the correspondence between the user identifier, the authentication information, and the drone identification code to the server. Then, in step 204, the server can record the correspondence between the user identification, the authentication information, and the drone identification code. Further, after the client receives the user identifier and the authentication information input by the user, the client may send the identity verification information to the drone, and the drone may record the correspondence between the identifier of the drone and the identity verification information. Or, the client can send the user identifier and the authentication information to the drone, and the drone can record the correspondence between the drone identification code, the user identifier, and the authentication information.
  • the client after performing step 203, obtains the drone identification code from the drone, and locally records the correspondence between the user identifier, the authentication information, and the drone identification code, and the user identifier, The correspondence between the authentication information and the drone identification code is sent to the server. Then, the server records the correspondence between the user identification, the authentication information, and the drone identification code. Further, after the client receives the user identifier and the authentication information input by the user, the client may send the identity verification information to the drone, and the drone may record the correspondence between the identifier of the drone and the identity verification information. Or, the client can send the user identifier and the authentication information to the drone, and the drone can record the correspondence between the drone identification code, the user identifier, and the authentication information.
  • the client sends the authentication information to the drone, and the drone records the correspondence between the drone identification code and the authentication information; or the client sends the user identifier and the authentication information.
  • the drone records the correspondence between the drone identification code, the user identification, and the authentication information.
  • the client obtains the correspondence between the UAV identification code and the authentication information from the UAV, or obtains the correspondence between the UAV identification code, the user identification, and the authentication information.
  • the client locally records the correspondence between the user identifier, the authentication information, and the drone identification code, and sends the correspondence between the user identifier, the authentication information, and the drone identification code to the server, and the server records the user identifier. Correspondence between the authentication information and the drone identification code.
  • the client sends the authentication information to the drone, and the drone records the correspondence between the drone identification code and the authentication information; or the client sends the user identifier and the authentication information to none.
  • drone records the correspondence between the drone identification code, user identification and authentication information. Then, the client obtains the correspondence between the UAV identification code and the authentication information from the UAV, or obtains the correspondence between the UAV identification code, the user identification, and the authentication information. Then, the client locally records the correspondence between the user identifier, the authentication information, and the drone identification code, and sends the correspondence between the user identifier, the authentication information, and the drone identification code to the server, and the server records the user identifier. Correspondence between the authentication information and the drone identification code.
  • the client sends the authentication information to the drone, and the drone records the correspondence between the drone identification code and the authentication information; or The client sends the user identifier and the authentication information to the drone, and the drone records the correspondence between the drone identification code, the user identifier, and the authentication information. Then, the client obtains the correspondence between the UAV identification code and the authentication information from the UAV, or obtains the correspondence between the UAV identification code, the user identification, and the authentication information. Then, the client locally records the correspondence between the user identification, the authentication information, and the drone identification code.
  • the client After the client establishes a connection with the server, the client queries the correspondence between the user identifier, the authentication information, and the drone identification code locally, and associates the user identifier, the authentication information, and the drone identification code.
  • the relationship is sent to the server, and the server records the correspondence between the user identifier, the authentication information, and the drone identification code.
  • the client can directly directly display the UAV identification code and the user identification.
  • the correspondence with the authentication information is sent to the server. If the client obtains the correspondence between the UAV identification code and the authentication information from the UAV, the client may first query the user identifier corresponding to the authentication information from the local device (the corresponding relationship stored in step 202 may be queried).
  • the corresponding relationship between the UAV ID, the user ID, and the authentication information can be sent to the server; if the user is queried The identifier is different from the user ID currently logged in to the client, and the correspondence between the drone ID, the user ID, and the authentication information is no longer sent to the server.
  • the authentication process for unregistered users can be completed.
  • Embodiment 2 an authentication process of an unregistered user is taken as an example, and the client first connects to the drone for operation, and then connects to the server for identity verification.
  • the client when the client connects to the drone, the client is in operation because the unregistered user uses the client (ie, the user does not log in to the client through the legitimate user ID) to operate the drone.
  • the drone When the drone is operating, it can restrict the drone from flying in the designated area (such as limiting the height and/or limit of the drone, that is, limiting the flying height of the drone and/or limiting the flight of the drone Distance, etc., or, to limit the full functionality of the client (that is, the client cannot operate the drone, the drone does not fly) or part of the function (that is, the function of restricting the client to operate the drone, At this time, the drone does not fly; the client can only operate the drone to fly in a specific area, etc.).
  • the drone When the client connects to the drone, the drone detects that the unregistered user logs in to the client, and can restrict the drone from flying within the designated area (such as limiting the height and/or limit processing of the drone). ), or, prohibit the drone from taking off (such as by controlling the power supply, engine, etc., to achieve the function of prohibiting take-off).
  • the client can also display a login page to enable the user to log in through the user ID.
  • the unregistered user may be authenticated first, and the implementation process of the authentication is similar to the process of the first embodiment, and details are not described herein again.
  • the user can then log in to the client using the user ID obtained during the authentication process, which is described in the subsequent embodiments.
  • Embodiment 3 In this embodiment, the authentication process of the registered user is taken as an example. Referring to FIG. 3A, which is a flowchart of the identity verification method, the method may include the following steps:
  • Step 301 When the client receives the login request of the registered user, if the registered user has not performed the authentication, the verification page information is obtained from the server, and the verification page is displayed according to the verification page information.
  • the verification page can be a page that requires authentication of the user.
  • the user who uses the drone can be divided into the unregistered user and the registered user.
  • the unregistered user refers to the user who has not registered the user ID on the server, and cannot successfully log in to the client through the user ID.
  • a registered user is a user who has registered a user ID on the server. You can successfully log in to the client through the user ID, and then control the drone through the client.
  • a login request is sent to the client (the login request here is different from the above registration request, the login request is a request generated by the operation login page, and the registration request is a request generated by the operation registration page)
  • the client receives the login request, it first queries whether the registered user has authenticated; if so, the authentication process is no longer performed; if not, the login request is sent to the server; the server receives the request
  • the verification page information is returned to the client, and the client can display the verification page according to the verification page information.
  • the verification page information includes the need to display the verification page. All of the content, and the client can display the verification page based on the information of the verification page.
  • a page for instructing a user to enter authentication information may be referred to as a verification page.
  • the verification page For the authentication process of the registered user, the verification page only needs to complete the authentication function, and does not need to complete the user registration function. That is to say, since the registered user has registered the user identifier on the server, the user can input the already registered user identifier on the verification page, and input the authentication information on the verification page to complete the identity verification function.
  • the foregoing authentication information may be a mobile phone number or an identity card number.
  • the verification page may further include a verification code, and the user may receive the verification code sent by the server through the mobile phone, and input the received verification code to the verification page.
  • the authentication information can also be other content, and will not be described again.
  • the client needs to first query whether the registered user has been authenticated.
  • the query process may include, but is not limited to, the following method: if a connection is established between the client and the server, the client The terminal can locally query from the server or the client that the registered user has not been authenticated or has been authenticated. Alternatively, if no connection is established between the client and the server, and the client establishes a connection with the drone, the client can locally query from the drone or the client that the registered user has not authenticated or has been authenticated. verification.
  • Application scenario 1 During the registration process of an unregistered user, the client locally stores the correspondence between the user identifier, the drone identification code, and the authentication information. Based on this, when receiving the login request of the registered user, the client first parses the user identifier from the login request, and if the UAV identification code and/or the identity verification information corresponding to the user identifier is locally stored, You can directly determine that the registered user has been authenticated; otherwise, you can be sure that the registered user is not authenticated.
  • Application scenario 2 During the registration process of an unregistered user, the client locally stores the correspondence between the user identifier, the drone identification code, and the authentication information. Based on this, when receiving the login request of the registered user, the client first parses the user identifier from the login request, if the local storage has The UAV ID and/or authentication information corresponding to the user ID can directly determine that the registered user has been authenticated; otherwise, the UAV or the server can query that the registered user has not authenticated or has performed For the specific authentication process, refer to the subsequent application scenarios.
  • Application scenario 3 If the client establishes a connection with the server, but the client does not establish a connection with the drone, the client first parses the user identifier from the login request when receiving the login request of the registered user. The query message carrying the user identifier is then sent to the server. After receiving the query message, the server first parses the user identifier from the query message, and then, if the server locally stores the drone identification code and/or identity verification information corresponding to the user identifier, The information that the registered user has authenticated is sent to the client, so that the client can determine that the registered user has been authenticated; otherwise, the server sends the information that the registered user has not authenticated to the client, so that the client You can be sure that the registered user has not been authenticated.
  • Application scenario 4 If the client establishes a connection with the drone, but the client does not establish a connection with the server, the client first parses the user identifier from the login request when receiving the login request of the registered user. The query message carrying the user identification is then sent to the drone. After receiving the query message, the drone first parses the user identifier from the query message, and then, if the drone locally stores the drone identification code and/or identity verification information corresponding to the user identifier, Send the information that the registered user has been authenticated to the client, so that the client can determine that the registered user has been authenticated; otherwise, the drone sends the information that the registered user has not authenticated to the client, so that The client can determine that the registered user has not been authenticated.
  • the application scenario 5 If the client establishes a connection with the drone, and the client establishes a connection with the server, the client may process in the manner of the application scenario 3 or adopt the manner of the application scenario 4.
  • the process of “the client obtains the verification page information from the server” may include, but is not limited to, the following manner: if the drone does not currently take off , the client can obtain the verification page information directly from the server. In addition, if the drone is currently taking off, the client first records the information that the registered user needs to be authenticated; further, after the drone falls, if the client finds that the local record has been registered, If the user needs to authenticate the information, the client can obtain the verification page information from the server.
  • Step 302 The client receives the user identifier and the authentication information input by the user on the verification page.
  • the user can input information such as the user identification and the authentication information on the verification page, and the client can receive the information input by the user.
  • the client may locally store the correspondence between the user identifier and the authentication information.
  • Step 303 The client sends the user identifier and the identity verification information to the server.
  • Step 304 The server records the correspondence between the user identifier and the identity verification information.
  • the client can obtain the drone identification code from the drone and record the correspondence between the user identification, the authentication information, and the drone identification code locally.
  • the client may send the correspondence between the user identifier, the authentication information, and the drone identification code to the server, and the server may record the correspondence between the user identifier, the identity verification information, and the drone identification code.
  • the client can send the authentication information to the drone, and the drone can record the correspondence between the drone identification code and the authentication information; or the client can send the user identifier and the authentication information to the unmanned person.
  • the drone can record the correspondence between the drone identification code, the user identification, and the authentication information.
  • the authentication process for registered users can be completed.
  • Embodiment 4 In this embodiment, the authentication process of the registered user is taken as an example, and when the registered user logs in to the client, it is assumed that the client is connected to the server and the drone.
  • FIG. 4 which is a flowchart of the identity verification method, the method may include the following steps:
  • Step 401 When the client receives the login request of the registered user, if the registered user has not performed the authentication, the verification page information is obtained from the server, and the verification page is displayed according to the verification page information.
  • the verification page can be a page that requires authentication of the user.
  • the login request is sent to the client, and when receiving the login request, the client queries whether the registered user has authenticated; if yes, no longer enters Line authentication processing; if not, send a login request to the server. After receiving the login request, the server returns the verification page information to the client, and the client displays the verification page according to the verification page information.
  • the client parses the user identifier from the login request when receiving the login request of the registered user, and if there is a local storage corresponding to the user identifier
  • the machine identification code and/or the authentication information can be used to determine that the registered user has been authenticated; otherwise, the server sends a query message carrying the user identifier.
  • the server parses the user identifier from the query message. If the server locally stores the drone identification code and/or the identity verification information corresponding to the user identifier, the registered user has performed the The authentication information is sent to the client, so that the client can determine that the registered user has been authenticated; otherwise, the server sends the information that the registered user has not authenticated to the client, so that the client can determine that the registration has been registered. The user has not authenticated yet.
  • Step 402 The client receives the user identifier and the authentication information input by the user on the verification page.
  • step 403 the client obtains the drone identification code from the drone.
  • Step 404 The client locally records the correspondence between the user identifier, the identity verification information, and the UAV identification code, and sends the correspondence to the server.
  • Step 405 After receiving the correspondence between the user identifier, the identity verification information, and the UAV identification code, the server may record the correspondence locally.
  • Step 406 The client may send the authentication information to the drone, or the client may send the user identifier and the authentication information to the drone.
  • Step 407 The drone can record the correspondence between the UAV identification code and the identity verification information; or the UAV can record the correspondence between the UAV identification code, the user identifier, and the identity verification information.
  • step 403-step 407 is only an example, and other implementation manners are also possible.
  • specific implementation manners refer to several examples of the first case shown in FIG. 2, and details are not repeatedly described herein.
  • step 408 the client operates the drone. Among them, during the operation, because the user has After authentication, the client can operate the drone normally. For example, all functions of the client are enabled, and there is no restriction on the drone to fly in the designated area.
  • Embodiment 5 In this embodiment, the authentication process of the registered user is taken as an example, and when the registered user logs in to the client, it is assumed that the client is only connected to the server and is not connected to the client. Machine, connected to the drone after the registered user successfully logs in to the client.
  • FIG. 5 which is a flowchart of the identity verification method, the method may include the following steps:
  • Step 501 When the client receives the login request of the registered user, if the registered user has not performed the authentication, the verification page information is obtained from the server, and the verification page is displayed according to the verification page information.
  • the verification page can be a page that requires authentication of the user.
  • step 501 is similar to the process of step 401, and details are not repeated herein.
  • Step 502 The client receives the user identifier and the authentication information input by the user on the verification page.
  • Step 503 The client locally records the correspondence between the user identifier and the identity verification information.
  • Step 504 The client sends the correspondence between the user identifier and the authentication information to the server, where the server locally records the correspondence between the user identifier and the identity verification information.
  • Step 505 When the client connects to the drone, the client sends the authentication information to the drone, or the client can send the user identifier and the authentication information to the drone.
  • Step 506 The UAV can record the correspondence between the UAV identification code and the identity verification information; or the UAV can record the correspondence between the UAV identification code, the user identifier, and the identity verification information.
  • Step 507 The client obtains the correspondence between the UAV identification code and the authentication information from the UAV; or the client obtains the correspondence between the UAV identification code, the user identifier, and the authentication information from the UAV.
  • Step 508 The client sends the correspondence between the UAV identification code, the user identifier, and the authentication information to the server, so that the server locally records the correspondence.
  • step 509 the client operates the drone, that is, the client operates the drone normally.
  • Embodiment 6 In this embodiment, the authentication process of the registered user is taken as an example. When the registered user logs in to the client, it is assumed that the client is only connected to the drone and is not connected to the server. Referring to FIG. 6, which is a flowchart of the identity verification method, the method may include the following steps:
  • Step 601 When the client receives the login request of the registered user (that is, the user logs in to the client through the legal user ID), the client queries that the registered user has not authenticated.
  • the login request is sent to the client, and when receiving the login request, the client queries whether the registered user has authenticated; if yes, the authentication process is no longer performed; if not ( That is, no authentication has been performed yet, and step 602 is performed.
  • the client parses the user identifier from the login request when receiving the login request of the registered user, and if there is a local storage corresponding to the user identifier
  • the machine identification code and/or the authentication information can be used to determine that the registered user has been authenticated; otherwise, the query message carrying the user identifier is sent to the drone.
  • the drone After receiving the query message, the drone parses the user identifier from the query message, and if the drone locally stores the drone identification code and/or identity verification information corresponding to the user identifier, the registered user is The authenticated information is sent to the client, so that the client can determine that the registered user has been authenticated; otherwise, the drone sends the information that the registered user has not authenticated to the client, so that the client can Make sure the registered user has not been authenticated.
  • Step 602 The client restricts the drone from flying in the designated area (for example, the client limits the height and/or the limit of the drone, that is, the client can limit the flying height of the drone and/or limit the drone. The flight distance, etc.), and display the authentication page to enable the user to authenticate the user ID.
  • the client limits the height and/or the limit of the drone, that is, the client can limit the flying height of the drone and/or limit the drone.
  • the flight distance, etc. display the authentication page to enable the user to authenticate the user ID.
  • the client when the client connects to the drone, since the registered user logs in to the client, but the registered user has not authenticated, the client can restrict the operation when the drone is operated.
  • the man-machine flies within the designated area, such as the height limit and/or the limit treatment of the drone.
  • step 603 the drone restricts the drone from flying in the designated area; or, the drone is prohibited from taking off.
  • the client when the client connects to the drone, since the registered user logs in to the client, but the registered user has not authenticated, the client operates the drone while the drone is operating.
  • the user identifier of the login to the client can be detected, and since the UAV identification code and/or the authentication information corresponding to the user identifier are not recorded locally, and there is no corresponding relationship between the UAV identification code and the authentication information,
  • the drone determines that the registered user is not authenticated, and can restrict the drone from flying in the designated area (such as limiting the height and/or limit processing of the drone), or can prohibit the drone from taking off ( For example, by controlling the power supply, engine, etc., the prohibition of take-off function is realized.
  • Step 604 when the client connects to the server, the client obtains the verification page information from the server, and displays the verification page according to the verification page information.
  • the client can first query whether the registered user has been authenticated. If the authentication has not been performed, the authentication page information can be obtained from the server, and the verification page is displayed according to the verification page information. .
  • Step 605 The client receives the user identifier and the authentication information input by the user on the verification page.
  • Step 606 The client locally records the correspondence between the user identifier and the authentication information.
  • Step 607 The client sends the correspondence between the user identifier and the identity verification information to the server, where the server locally records the correspondence between the user identifier and the identity verification information.
  • Step 608 When the client connects to the drone, the client sends the authentication information to the drone, or the client can send the user identifier and the authentication information to the drone.
  • Step 609 The UAV can record the correspondence between the UAV identification code and the identity verification information; or the UAV can record the correspondence between the UAV identification code, the user identifier, and the identity verification information.
  • Step 610 The client obtains the correspondence between the UAV identification code and the authentication information from the UAV; or the client obtains the correspondence between the UAV identification code, the user identifier, and the authentication information from the UAV.
  • Step 611 The client sends the correspondence between the UAV identification code, the user identifier, and the authentication information to the server, so that the server locally records the correspondence.
  • steps 606- 611 are only an example, and other implementation manners are also possible.
  • For the specific implementation manner refer to the case 1 to the case 3 shown in FIG. 2, and details are not repeatedly described herein.
  • the client after the client restricts the drone from flying in the designated area, based on steps 604-611, the user identification has been authenticated, and therefore, the client can also remove the restriction that the drone is flying within the designated area.
  • the UAV after determining the correspondence between the UAV identification code and the authentication information locally, the UAV can also remove the restriction that the UAV can fly in the designated area.
  • Embodiment 7 According to actual needs, all users can be authenticated, or only some users can be authenticated. If all users are authenticated, all users adopt the process of the foregoing embodiment; if the user is authenticated for some users, only some users adopt the process of the above embodiment, and other users process, in this embodiment. No restrictions.
  • a user in a designated area (such as in China) operates a drone through a client
  • the user in the specified area can be authenticated; when the user outside the designated area operates the drone through the client.
  • you are outside you can not authenticate users outside the specified area.
  • the terminal device can determine whether it is in China based on information of the service provider (such as China Mobile, China Unicom, etc.). There is no restriction on the way to judge this. Alternatively, the terminal device can determine whether it is in China by using GPS (Global Positioning System) information, and there is no restriction on the manner of judgment. Wherein, if the terminal device is located in China, the client deployed in the terminal device knows that the user controlling the drone is a user in the designated area; if the terminal device is located outside the Chinese, the client deployed in the terminal device is informed to control the unmanned The user of the machine is not a user in the specified area. In addition, the server that communicates with the client can also know the above information.
  • the service provider such as China Mobile, China Unicom, etc.
  • GPS Global Positioning System
  • Embodiment 8 After receiving the correspondence between the user identifier, the authentication information, and the UAV identification code, the server may parse the UAV identification code from the request message if receiving the request message from the supervising device. And the identity verification information corresponding to the UAV identification code is locally queried from the server. Then, the server can send the queried authentication information to the supervising device. In this way, supervision The pipe device can obtain the identity verification information corresponding to the drone identification code, thereby obtaining the identity of the drone.
  • the slave device receives the corresponding device from the supervisory device.
  • the request message the drone can parse the drone identification code from the request message, and locally query the identity verification information corresponding to the drone identification code from the drone.
  • the drone can then send the queried authentication information to the supervisory device. In this way, the supervisory device can obtain the identity verification information corresponding to the drone identification code, thereby obtaining the identity of the drone.
  • Embodiment 9 After the drone takes off, the drone broadcasts the flight information of the drone in a specific frequency band.
  • the flight information may include, but is not limited to, one or any combination of the following: a user identifier (the user identifier is a user identifier currently logged in to the client, and may be the same as or different from the user identifier in the binding relationship.
  • a user identifier is a user identifier currently logged in to the client, and may be the same as or different from the user identifier in the binding relationship.
  • the user ID 1 is used to log in to the client, so that the correspondence between the user ID 1, the drone identification code, and the authentication information is recorded on the drone, the server, and the client.
  • the user ID is logged in to the client through the user ID 1, and the user ID here is the user ID 1; if the user ID 2 is logged in to the client, the user ID here is the user ID 2 ), drone identification code, flight time information (such as departure time, current time, etc.), flight speed information (such as average flight speed, maximum flight speed, etc.), starting position information (such as the starting position of the takeoff latitude and longitude), The current flight area information (such as the latitude and longitude of the current location) is not limited to this flight information.
  • the client can also broadcast the flight information of the drone in a specific frequency band.
  • the flight information may include, but is not limited to, one or any combination of the following: user identification, drone identification code, flight time information, flight speed information, starting position information, current flight area information.
  • a drone or client sends a broadcast message in a particular frequency band that can carry flight information for the drone.
  • the broadcast message can be encrypted by a predetermined encryption algorithm. Since broadcast messages are sent in a specific frequency band, broadcast messages can only be received by devices supporting a specific frequency band, while devices supporting a specific frequency band are usually used by supervisors to avoid information leakage. By encrypting the broadcast message, the security of the broadcast message transmission can be guaranteed.
  • the drone can also locally store flight information of the drone during the last N (eg, 5) flights so that the supervisor can query the drone's flight information from the drone.
  • N e.g. 5
  • N is an integer greater than or equal to 1, for example, the value of N is 5.
  • Embodiment 10 When a user logs in to the client through a valid user identifier, the client may also send the user identifier to the drone. After receiving the user identifier, the drone can store the user identifier locally.
  • the user identifier is the user identifier currently logged in to the client, and may be the same as the user identifier in the foregoing embodiment, or may be different.
  • the user ID 1 is used to log in to the client, so that the correspondence between the user ID 1, the drone identification code, and the authentication information is recorded on the drone, the server, and the client.
  • the user ID 1 can be sent to the drone, and the drone stores the user ID 1;
  • the client can send the user ID 2 to the drone, and the drone stores the user ID 2.
  • the drone may store the correspondence between the user identification, the drone identification code, and the authentication information in the same location as the flight information, or may store the information in a different location.
  • the drone may store the correspondence between the user identifier, the drone identification code, and the authentication information in the flash of the drone flight control (ie, the flight control system of the drone), and the flight information Stored in the flash of the drone flight control.
  • the drone stores the correspondence between the user identifier, the drone identification code, and the authentication information in the encryption chip of the drone flight control, and stores the flight information in the flash of the drone flight control.
  • the drone can store the above user identification (ie, a separate user identification) in the encryption chip of the drone flight control.
  • the above storage location is only an example, and there is no limitation on the storage location, as long as it is stored in the drone.
  • the authentication information may include a mobile phone number, and the user identifier may include a registered account; each identity verification information corresponds to one or more user identifiers; each identity verification information corresponds to one or more drone identification codes; The user IDs correspond to one or more drone identification codes.
  • the authentication information is a mobile phone number
  • the user may also click a button for obtaining the verification code, and the server may send the verification code to the terminal device corresponding to the mobile phone number, and the user This verification code can be entered on the verification page.
  • users can also To enter other content on the verification page, such as email, password, etc., there is no restriction on this.
  • the client After receiving the relevant information input by the user on the verification page, the client can interact with the server.
  • the value of the flag bit can be: 0 (initial state), 1 (indicating that it has been authenticated), 2 ( Indicates that it is not authenticated, 3 (indicating that authentication is not required); or, the value of this flag can be: 0 (initial state), 1 (indicating that it has been authenticated), 2 (indicating that it is not authenticated) ).
  • the initial value of all UAV flight control flags is 0.
  • the authentication that is, the correspondence between the user identification, the authentication information, and the drone identification code is recorded, or the correspondence between the authentication information and the drone identification code is recorded
  • the value of the flag is set to 1; if there is no authentication (that is, the above correspondence is not recorded), the drone can set the value of the flag to 2.
  • the value of the flag bit can be 0, 1, 2, or 3
  • the value of the flag bit of the drone is Set to 3. If the value of this flag can be 0, 1, 2, the value is no longer set to 3.
  • the drone is found to have a value of 2 after taking off, it means that the unmanned aircraft can restrict the drone from flying in the designated area, such as limiting the flying height of the drone. It is 30 meters and limits the flight distance of the drone to 50 meters. If the flag value is found to be 1, it means that the authentication has been verified, and the drone can not restrict the drone from flying in the designated area.
  • the function of binding and unbinding the identity verification information may also be implemented.
  • the function of the binding is as follows: After the user successfully logs in to the client, the user can query the binding authentication information in the center of the personal page. In this case, the user can modify the bound authentication information, for example, to the client. Enter the new authentication information, the client sends the new authentication information to the server, so that the server replaces the original authentication information with the new authentication information; in addition, the client sends the new authentication information to the drone. In order for the drone to replace the original authentication information with the new authentication information.
  • the process of replacing the original authentication information by using the new authentication information is similar to the implementation of the foregoing embodiment 3.
  • the difference is that the drone, the server, and the client do not directly record the user identifier, the drone identification code, and the identity. Verify the correspondence of the information, but the body in the original correspondence The verification information is replaced with the new authentication information, and the implementation will not be repeated here.
  • the unbind function means that after the user successfully logs in to the client, the user can query the bound authentication information in the center of the personal page. In this case, the user can unbind the bound authentication information, such as to the client.
  • the terminal sends the unbind information
  • the client sends a message carrying the unbind information (such as the authentication information) to the server, so that the server deletes the corresponding relationship of the authentication information, that is, deletes the authentication information, and the user identifier.
  • the correspondence between the drone identification codes is sent to the drone, so that the drone deletes the correspondence of the authentication information, that is, the correspondence between the identity verification information, the user identifier, and the drone identification code is deleted.
  • the embodiment of the present invention further provides a terminal device, wherein the terminal device can communicate with a server, and the terminal device can control the drone, as shown in FIG.
  • the terminal equipment includes:
  • a processor configured to obtain verification page information from the server, and display a verification page according to the verification page information; receive a user identifier and identity verification information input by the user on the verification page, where the user identifier is The user controls the credentials of the drone through the terminal device;
  • the processor is further configured to send the user identifier and the identity verification information to the server, so that the server records a correspondence between the user identifier and the identity verification information.
  • the terminal device may further include a transmitter and a receiver; the processor may obtain verification page information from the server by using a receiver, and receive, by the receiver, a user identifier and identity entered by the user on the verification page. And verifying the information; in addition, the processor may send the user identifier and the authentication information to the server by using a transmitter.
  • the terminal device further includes: a memory; the processor is further configured to acquire a drone identification code, where the drone identification code is used to uniquely identify the drone; Corresponding relationship between the identifier, the authentication information and the UAV identification code is recorded to a memory, and the UAV identification code is sent to the server, so that the server records the user identifier, the Corresponding relationship between the authentication information and the UAV identification code; the memory is configured to store a correspondence between the user identifier, the identity verification information, and the UAV identification code.
  • the processor may send the UAV identification code to the server through a transmitter.
  • the processor is further configured to: during the registration process of the unregistered user, obtain the verification page information from the server if the unregistered user has not authenticated; or During the use of the registered user, if the registered user has not been authenticated, and the drone is not currently taking off, the verification page information is obtained from the server.
  • the processor is further configured to: when the terminal device establishes a connection with the server, the server or the terminal device may query, that the registered user has not yet Performing authentication; or, when no connection is established between the terminal device and the server, and the terminal device establishes a connection with the drone, the drone or the terminal device may be It is found that the registered user has not been authenticated.
  • the processor is further configured to send the identity verification information to the drone, so that the drone records a correspondence between the drone identification code and the identity verification information; Or sending the user identifier and the identity verification information to the drone, so that the drone records a correspondence between the drone identification code, the user identifier, and the identity verification information.
  • the processor may send the identity verification information to the drone through a transmitter, or send the user identifier and the identity verification information to the drone.
  • the processor is further configured to acquire, from the drone, a correspondence between the UAV identification code, the user identifier, and the identity verification information, and identify the UAV identifier.
  • Corresponding relationship between the code, the user identifier, and the identity verification information is sent to the server, so that the server records the correspondence between the UAV identification code, the user identifier, and the identity verification information.
  • the corresponding relationship between the user identifier and the authentication information is sent to the server, so that the server records the correspondence between the UAV identification code, the user identifier, and the identity verification information.
  • the processor may send, by using a transmitter, a correspondence between the UAV identification code, the user identifier, and the identity verification information to the server; or, the UAV identification code, The corresponding relationship between the user identifier and the identity verification information is sent to the server.
  • the processor is further configured to log in when the user does not pass the valid user ID.
  • the terminal device When the terminal device is connected to the terminal device, the user is restricted to view all the functions or partial functions of the terminal device, and the login page is displayed to enable the user to log in through the user identifier; or, when the user logs in to the terminal device through a valid user identifier, The user identifier has not been authenticated, and the drone is restricted from flying within the designated area, and an authentication page is displayed to enable the user to authenticate the user identifier.
  • the processor is further configured to broadcast flight information of the drone in a specific frequency band after the drone takes off; the flight information includes one or any combination of the following: a user identifier, UAV identification code, flight time information, flight speed information, starting position information, current flight area information.
  • the processor can broadcast flight information of the drone through the transmitter.
  • the processor is further configured to send the user identifier to the drone when the user logs in to the client by using a valid user identifier, so that the drone storage device User ID.
  • the processor can transmit the user identification to the drone via a transmitter.
  • the embodiment of the present invention further provides a server, the server communicates with the client, and the client can control the drone, as shown in FIG.
  • the server includes: a processor, configured to send the verification page information to the client, so that the client displays the verification page according to the verification page information, and receives the user identifier and identity entered by the user on the verification page.
  • Verification information wherein the user identifier is a credential that the user controls the drone through the client; receiving the user identifier and the identity verification information sent by the client, and the user identifier and Corresponding relationship of the authentication information is recorded to a memory;
  • a storage configured to store a correspondence between the user identifier and the identity verification information.
  • the server may further include a transmitter and a receiver; the processor may send the verification page information to the client by using a transmitter, and the processor may receive, by the receiver, the location sent by the client. Describe the user identification and the authentication information.
  • the processor is further configured to receive a UAV identification code sent by the client, where the UAV identification code is used to uniquely identify the UAV; Corresponding relationship between the authentication information and the UAV identification code is recorded in the memory; the memory is further configured to store a correspondence between the user identifier, the identity verification information, and the UAV identification code.
  • the processor may receive the drone identification code sent by the client by using a receiver.
  • the processor is further configured to: after receiving the request message from the supervisory device, parse the drone identification code from the request message, and query the drone from the memory
  • the authentication information corresponding to the identification code is sent to the monitoring device by the queried authentication information.
  • the processor may receive a request message from the supervisory device by using a receiver, and the processor may send the queried authentication information to the supervisory device by using a transmitter.
  • an embodiment of the present invention further provides a drone.
  • the drone includes:
  • a processor configured to receive the authentication information sent by the client, and record the correspondence between the UAV identification code and the authentication information to the memory, where the UAV identification code is used to uniquely identify the UAV;
  • a storage configured to store a correspondence between the UAV identification code and the identity verification information.
  • the drone may further include: a transmitter and a receiver.
  • the processor can receive the authentication information sent by the client through the receiver.
  • the processor is further configured to receive a user identifier and identity verification information sent by the client, and record a correspondence between the UAV identification code, the user identifier, and the identity verification information to a memory;
  • the memory is further configured to store a correspondence between the UAV identification code, the user identifier, and the identity verification information.
  • the processor may further receive, by using the receiver, a user identifier and identity verification information sent by the client.
  • the processor is further configured to: after receiving the request message from the supervisory device, parse the drone identification code from the request message, and query the drone from the memory
  • the authentication information corresponding to the identification code is sent to the monitoring device by the queried authentication information.
  • the processor may receive a request message from the supervisory device by using a receiver, and the processor may send the queried authentication information to the supervisory device by using a transmitter.
  • the processor is further configured to receive a user identifier that is sent by the client and log in to the client, and record a user identifier that is logged in to the client to the memory; the memory is further used to Stores the user ID that is logged into the client.
  • the processor is further configured to restrict the UAV from flying in a designated area when the memory does not store a correspondence between the UAV identification code and the authentication information; or Disabling the drone to take off; after limiting the drone to fly in the designated area, when the memory stores the correspondence between the drone identification code and the authentication information, the unmanned person is released The limit of flight of the aircraft within the designated area.
  • the processor is further configured to broadcast the flight information of the drone in a specific frequency band after the drone takes off; wherein the flight information includes one or any combination of the following: a user identifier, an unmanned Machine identification code, flight time information, flight speed information, starting position information, current flight area information.
  • the processor can broadcast flight information of the drone through a transmitter.
  • the processor is further configured to record flight information of the drone during the last N flights to the memory; wherein the N is an integer greater than 1; the memory is further used For storing the flight information of the drone during the last N flights.
  • the embodiment of the present invention further provides a machine readable storage medium, which can be applied to a terminal device, wherein the terminal device can communicate with a server, the terminal
  • the device is capable of controlling a drone, the machine readable storage medium having a plurality of computer instructions stored thereon, the computer instructions being executed as follows:
  • the device controls the credentials of the drone
  • the computer instructions are also processed as follows when executed:
  • the computer instructions are also processed as follows when executed:
  • the verification page information is obtained from the server.
  • the verification page information is obtained from the server.
  • the computer instructions are also processed as follows when executed:
  • the server or the terminal device When the connection between the terminal device and the server is established, the server or the terminal device is queried that the registered user has not performed identity verification; or when the terminal device and the service are When no connection is established between the terminals, and the terminal device establishes a connection with the drone, it is queried from the drone or the terminal device that the registered user has not performed identity verification.
  • the computer instructions are also processed as follows when executed:
  • the computer instructions are also processed as follows when executed:
  • the computer instructions are also processed as follows when executed:
  • the embodiment of the present invention further provides a machine readable storage medium, where the machine readable storage medium can be applied to a server, the server communicates with a client, and the client
  • the terminal can control the drone, and the machine readable storage medium stores a plurality of computer instructions, and when the computer instructions are executed, the following processing is performed:
  • the computer instruction is further processed to: receive a drone identification code sent by the client, the drone identification code is used to uniquely identify the drone; A correspondence between the authentication information and the drone identification code is recorded to the memory.
  • the computer instructions are also processed as follows when executed:
  • the queried authentication information is sent to the supervisory device.
  • the embodiment of the present invention further provides a machine readable storage medium, which can be applied to a drone, and the machine readable storage medium stores a plurality of computer instructions.
  • the computer instruction is executed, the following processing is performed:
  • the computer instructions are also processed as follows when executed:
  • the computer instructions are also processed as follows when executed:
  • the queried authentication information is sent to the supervisory device.
  • the computer instructions are also processed as follows when executed:
  • an embodiment of the present invention may further provide an identity verification system, where the system includes a client, a server, and a drone; the client is capable of communicating with a server, The client can control the drone; where:
  • the client is configured to obtain verification page information from the server, and display a verification page according to the verification page information; receive a user identifier and identity verification information input by the user on the verification page; wherein the user The identifier is a credential that the user controls the drone through the client; and the user identifier and the authentication information are sent to the server;
  • the server is configured to send the verification page information to the client, and receive the user identifier and the identity verification information sent by the client, and record the user identifier and the identity verification. Correspondence of information.
  • the client is further configured to acquire a drone identification code, where the drone identification code is used to uniquely identify the drone; and record the user identifier, the identity verification information, and the location Corresponding relationship of the UAV identification code; sending the UAV identification code to the server;
  • the server is further configured to receive the UAV identification code sent by the client, and record a correspondence between the user identifier, the identity verification information, and the UAV identification code.
  • the client is further configured to send the authentication information to the drone; or send the user identifier and the identity verification information to the drone;
  • the UAV is configured to receive the authentication information sent by the client, record the correspondence between the UAV identification code and the identity verification information, or receive the user identifier and the identity verification information sent by the client, and record the unmanned Correspondence between the machine identification code, the user identification, and the authentication information.
  • the system, apparatus, module or unit set forth in the above embodiments may be implemented by a computer chip or entity Implemented, or implemented by a product with a certain function.
  • a typical implementation device is a computer, and the specific form of the computer may be a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email transceiver, and a game control.
  • embodiments of the invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware. Moreover, embodiments of the invention may take the form of a computer program product embodied on one or more computer usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
  • computer usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • these computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the instruction means implements the functions specified in one or more blocks of the flowchart or in a flow or block diagram of the flowchart.
  • embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware. Moreover, the invention can be embodied in the form of a computer program product embodied on one or more computer-usable storage media (which may include, but not limited to, disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
  • computer-usable storage media which may include, but not limited to, disk storage, CD-ROM, optical storage, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • Astronomy & Astrophysics (AREA)
  • Aviation & Aerospace Engineering (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

一种身份验证方法、设备、机器可读存储介质以及系统,所述方法应用于客户端,所述客户端能够与服务端进行通信,且所述客户端能够控制无人机,所述方法包括:从服务端获取到验证页面信息,并根据所述验证页面信息显示验证页面(201);接收用户在所述验证页面输入的用户标识和身份验证信息(202);其中,所述用户标识是用户通过所述客户端控制所述无人机的凭证;将所述用户标识和所述身份验证信息发送给所述服务端(203),以使所述服务端记录所述用户标识和所述身份验证信息的对应关系(204)。应用该方法,可以实现无人机的实名制,保证无人机使用的安全性。

Description

身份验证方法、设备、机器可读存储介质以及系统 技术领域
本发明涉及无人机技术领域,尤其涉及身份验证方法、设备、机器可读存储介质以及系统。
背景技术
诸如无人飞行器(UAV,简称无人机)等无人载具已被开发用于各种领域,包括消费者应用和行业应用。例如,可以操纵无人机用于娱乐、摄影/摄像、监视、递送或其他应用。
无人机拓展了个人生活的方方面面。然而,随着无人机的使用变得愈加普遍,出现了安全问题和挑战。例如,当无人机的飞行不受限时,无人机可能在禁止飞行或应当禁止飞行的区域上方飞行。这可能是有意或无意发生的。在一些情况下,新手用户可能失去对无人机的控制或者不熟悉航空飞行规则,还存在着劫持或黑客入侵无人机的控制的潜险。
目前,随着无人机的广泛使用,对安全性的要求越来越高,因此出现了对无人机进行实名制的需求,而传统方式没有针对无人机的实名制方式。
发明内容
本发明提供身份验证方法、设备、机器可读存储介质以及系统。
本发明第一方面,提供一种身份验证方法,应用于客户端,所述客户端能够与服务端进行通信,且所述客户端能够控制无人机,所述方法包括:
从服务端获取到验证页面信息,并根据所述验证页面信息显示验证页面;
接收用户在所述验证页面输入的用户标识和身份验证信息;其中,所述用户标识是用户通过所述客户端控制所述无人机的凭证;
将所述用户标识和所述身份验证信息发送给所述服务端,以使所述服务 端记录所述用户标识和所述身份验证信息的对应关系。
本发明第二方面,提供另一种身份验证方法,应用于服务端,所述服务端与客户端进行通信,且所述客户端能够控制无人机,所述方法包括:
将验证页面信息发送给客户端,以使所述客户端根据所述验证页面信息显示验证页面,并接收用户在所述验证页面输入的用户标识和身份验证信息;其中,所述用户标识是用户通过所述客户端控制所述无人机的凭证;
接收所述客户端发送的所述用户标识和所述身份验证信息;
记录所述用户标识和所述身份验证信息的对应关系。
本发明第三方面,提供另一种身份验证方法,应用于无人机,所述方法包括:接收客户端发送的身份验证信息;
在本地记录无人机标识码和所述身份验证信息的对应关系,所述无人机标识码用于唯一标识无人机。
本发明第四方面,提供一种终端设备,所述终端设备能够与服务端进行通信,且所述终端设备能够控制无人机,所述终端设备包括:
处理器,用于从所述服务端获取到验证页面信息,并根据所述验证页面信息显示验证页面;接收用户在所述验证页面输入的用户标识和身份验证信息,其中,所述用户标识是用户通过所述终端设备控制所述无人机的凭证;
所述处理器,还用于将所述用户标识和所述身份验证信息发送给所述服务端,以使所述服务端记录所述用户标识和所述身份验证信息的对应关系。
本发明第五方面,提供一种服务端,所述服务端与客户端进行通信,且所述客户端能够控制无人机,所述服务端包括:
处理器,用于将验证页面信息发送给所述客户端,以使所述客户端根据所述验证页面信息显示验证页面,并接收用户在所述验证页面输入的用户标识和身份验证信息;其中,所述用户标识是用户通过所述客户端控制所述无人机的凭证;接收所述客户端发送的所述用户标识和所述身份验证信息,并将所述用户标识和所述身份验证信息的对应关系记录到存储器;
存储器,用于存储所述用户标识和所述身份验证信息的对应关系。
本发明第六方面,提供一种无人机,所述无人机包括:
处理器,用于接收客户端发送的身份验证信息,并将无人机标识码和身份验证信息的对应关系记录到存储器,无人机标识码用于唯一标识无人机;
存储器,用于存储所述无人机标识码和所述身份验证信息的对应关系。
本发明第七方面,提供一种机器可读存储介质,应用于终端设备,所述终端设备能够与服务端进行通信,终端设备能够控制无人机,所述机器可读存储介质上存储有若干计算机指令,所述计算机指令被执行时进行如下处理:
从所述服务端获取到验证页面信息,并根据所述验证页面信息显示验证页面;接收用户在所述验证页面输入的用户标识和身份验证信息,其中,所述用户标识是用户通过所述终端设备控制所述无人机的凭证;
将所述用户标识和所述身份验证信息发送给所述服务端,以使所述服务端记录所述用户标识和所述身份验证信息的对应关系。
本发明第八方面,提供一种机器可读存储介质,应用于服务端,所述服务端与客户端进行通信,且所述客户端能够控制无人机,所述机器可读存储介质上存储有若干计算机指令,所述计算机指令被执行时进行如下处理:
将验证页面信息发送给所述客户端,以使所述客户端根据所述验证页面信息显示验证页面,并接收用户在所述验证页面输入的用户标识和身份验证信息;其中,所述用户标识是用户通过所述客户端控制所述无人机的凭证;
接收所述客户端发送的所述用户标识和所述身份验证信息;
将所述用户标识和所述身份验证信息的对应关系记录到存储器。
本发明第九方面,提供一种机器可读存储介质,应用于无人机,机器可读存储介质上存储有若干计算机指令,所述计算机指令被执行时进行如下处理:接收客户端发送的身份验证信息,并将无人机标识码和身份验证信息的对应关系记录到存储器,无人机标识码用于唯一标识无人机。
本发明第十方面,提供一种身份验证系统,所述系统包括客户端、服务端和无人机;所述客户端能够与服务端进行通信,客户端能够控制无人机;
所述客户端,用于从所述服务端获取到验证页面信息,并根据所述验证 页面信息显示验证页面;接收用户在所述验证页面输入的用户标识和身份验证信息;其中,所述用户标识是用户通过所述客户端控制所述无人机的凭证;将所述用户标识和所述身份验证信息发送给所述服务端;
所述服务端,用于将所述验证页面信息发送给所述客户端,并接收所述客户端发送的所述用户标识和所述身份验证信息,并记录所述用户标识和所述身份验证信息的对应关系。
基于上述技术方案,本发明实施例中,提出一种针对无人机的身份验证方式,可以将用户标识和身份验证信息进行绑定,这样,可以实现无人机的实名制,保证无人机使用的安全性,避免或者减少一些安全隐患。
附图说明
为了更加清楚地说明本发明实施例或者现有技术中的技术方案,下面将对本发明实施例或者现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明中记载的一些实施例,对于本领域普通技术人员来讲,还可以根据本发明实施例的这些附图获得其它的附图。
图1是一个实施例的应用场景示意图;
图2A、图2B和图2C是一个身份验证方法的实施例示意图;
图3A和图3B是另一个身份验证方法的实施例示意图;
图4是另一个身份验证方法的实施例示意图;
图5是另一个身份验证方法的实施例示意图;
图6是另一个身份验证方法的实施例示意图;
图7是终端设备的一个实施例框图;
图8是服务端的一个实施例框图;
图9是无人机的一个实施例框图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。另外,在不冲突的情况下,下述的实施例及实施例中的特征可以相互组合。
本发明使用的术语仅仅是出于描述特定实施例的目的,而非限制本发明。本发明和权利要求书所使用的单数形式的“一种”、“所述”和“该”也旨在包括多数形式,除非上下文清楚地表示其它含义。应当理解,本文中使用的术语“和/或”是指包含一个或多个相关联的列出项目的任何或所有可能组合。
尽管在本发明可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语用来将同一类型的信息彼此区分开。例如,在不脱离本发明范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。取决于语境,此外,所使用的词语“如果”可以被解释成为“在……时”,或者“当……时”,或者“响应于确定”。
本发明实施例提出一种身份验证方法,该方法可以应用于包括终端设备、服务端、无人机的系统,该终端设备中设置有能够与服务端进行通信、且能够控制无人机的客户端,参见图1所示,为该方法的应用于场景示意图。
其中,客户端能够与服务端进行通信,且二者的连接方式可以为有线连接或者无线连接,对此连接方式不做限制,在图1中以无线连接(如WiFi、OcuSync、Lightbridge、Auxiliary等)为例。此外,客户端能够控制无人机,且二者的连接方式可以为有线连接或者无线连接,对此连接方式不做限制,在图1中以无线连接(如WiFi、OcuSync、Lightbridge、Auxiliary等)为例。
在一个例子中,该客户端可以通过APP(应用程序)方式实现,也可以通过SDK(Software Development Kit,软件开发工具包)方式实现,还可以 通过调参(如无人机调参软件等)方式实现,对此实现方式不做限制。
在一个例子中,身份验证也就是实名制,在身份验证中,主要是在服务端和/或无人机绑定如下对应关系:用户标识和身份验证信息的对应关系,或者,无人机标识码和身份验证信息的对应关系,或者,用户标识、无人机标识码和身份验证信息的对应关系。当然,在实际应用中,还可以在服务端和/或无人机直接记录身份验证信息,该身份验证信息也作为用户标识,用户可以通过身份验证信息登录到客户端,并通过客户端操作无人机。
其中,用户标识(即注册账号)是用户登录到客户端时使用的,是用户通过客户端控制无人机的凭证,例如,用户标识为user123456,用户可通过user123456成功登录到客户端,然后,可以通过该客户端控制无人机的操作。
其中,身份验证信息包括但不限于以下之一或者任意组合:手机号、身份证、指纹信息、瞳孔信息、特定机构的无人机认证ID(例如FAA的drone ID)、用户头像,对此身份验证信息不做限制,只要能够唯一区分出用户身份即可。
其中,无人机标识码是一个唯一标识,用于唯一标识无人机。其中,该无人机标识码可以是用于唯一标识无人机整体的一个标识码,也可以是用于唯一标识无人机内其中一个模块的标识码,例如唯一标识无人机内的飞行控制器的标识码或唯一标识无人机内其他主要模块的标识码。
以下结合几个具体的实施例,对上述身份验证方法进行详细说明。
实施例一:在本实施例中,以未注册用户的身份验证过程为例进行说明,而且,客户端先连接到服务端进行身份验证,然后才连接到无人机进行操作。参见图2A所示,为该身份验证方法的流程图,该方法可以包括以下步骤:
步骤201,客户端从服务端获取到验证页面信息,并根据该验证页面信息显示验证页面。该验证页面可以是一个需要对用户进行身份验证的页面。
在实际应用中,可以将使用无人机的用户区分为未注册用户和已注册用户,未注册用户是指没有在服务端注册过用户标识的用户,无法通过用户标 识成功登录到客户端。已注册用户是指已经在服务端注册过用户标识的用户,可以通过用户标识成功登录到客户端,继而可以通过客户端控制无人机。
当未注册用户登录到客户端时,会向客户端发送注册请求,客户端接收该注册请求,并向服务端发送注册请求;服务端在接收到该注册请求后,向客户端返回验证页面信息,客户端可以根据该验证页面信息显示验证页面。如图2B和图2C所示,为验证页面的一个示例,验证页面信息包括显示该验证页面所需要的所有内容,且基于这些验证页面信息就可以显示该验证页面。
服务端在接收到该注册请求后,由于是未注册用户的注册过程,即没有对该未注册用户进行过身份验证,也就是,未注册用户还未进行身份验证,因此,服务端向客户端返回的验证页面信息,包含图2B/2C所需要的所有内容,基于这些验证页面信息,最终显示图2B/2C所示的验证页面。
在一个例子中,可以将用于指示用户输入身份验证信息的页面,称为验证页面。针对未注册用户的身份验证过程,该验证页面不仅需要完成身份验证功能,也需要完成用户注册功能。也就是说,用户不仅需要在该验证页面输入身份验证信息,以完成身份验证功能,还需要在该验证页面输入用户标识,以完成用户注册功能,即向服务端申请该用户标识,继而登录客户端。
其中,上述身份验证信息可以是手机号,如图2B所示,也可以是身份证号码,如图2C所示。当身份验证信息是手机号时,该验证页面还可以包括验证码,用户可以通过手机接收到服务端发送的验证码,并将接收到的验证码输入到验证页面。当然,身份验证信息也可以是其它内容,不再赘述。
步骤202,客户端接收用户在验证页面输入的用户标识和身份验证信息。
其中,客户端在显示验证页面后,用户就可以在该验证页面输入用户标识和身份验证信息等信息,而客户端可以接收到用户输入的这些信息。
在一个例子中,客户端在接收到用户在验证页面输入的用户标识和身份验证信息之后,可以在本地存储该用户标识和该身份验证信息的对应关系。
步骤203,客户端将该用户标识和该身份验证信息发送给服务端。
步骤204,服务端记录该用户标识和该身份验证信息的对应关系。
在一个例子中,客户端可以从无人机获取到无人机标识码,并在本地记录用户标识、身份验证信息和无人机标识码的对应关系。客户端可以将用户标识、身份验证信息和无人机标识码的对应关系发送给服务端,服务端可以记录用户标识、身份验证信息和无人机标识码的对应关系。客户端可以将该身份验证信息发送给无人机,无人机可以记录无人机标识码和身份验证信息的对应关系;或者,客户端可以将该用户标识和该身份验证信息发送给无人机,无人机可以记录无人机标识码、用户标识和身份验证信息的对应关系。
根据客户端与服务端、无人机的连接关系,可以将上述过程划分如下情况:情况一、在客户端与服务端连接时,执行步骤201-步骤204,且客户端此时也与无人机连接;情况二、在客户端与服务端连接时,执行步骤201-步骤204,然后,客户端与服务端的连接断开,客户端与无人机连接,在保持客户端与无人机连接的基础上,客户端与服务端连接;情况三、在客户端与服务端连接时,执行步骤201-步骤204,然后,客户端与服务端的连接断开,客户端与无人机连接,然后客户端与无人机的连接断开,客户端与服务端连接。
针对情况一,在一个例子中,执行步骤203之前,客户端先从无人机获取到无人机标识码,并可以在本地记录用户标识、身份验证信息和无人机标识码的对应关系。然后,在步骤203中,客户端可以将用户标识、身份验证信息和无人机标识码的对应关系发送给服务端。然后,在步骤204中,服务端可以记录用户标识、身份验证信息和无人机标识码的对应关系。进一步的,在客户端接收到用户输入的用户标识和身份验证信息后,客户端可以将该身份验证信息发送给无人机,无人机可以记录无人机标识码和身份验证信息的对应关系;或者,客户端可以将该用户标识和该身份验证信息发送给无人机,无人机可以记录无人机标识码、用户标识和身份验证信息的对应关系。
在另一个例子中,执行步骤203后,客户端从无人机获取到无人机标识码,并在本地记录用户标识、身份验证信息和无人机标识码的对应关系,并将用户标识、身份验证信息和无人机标识码的对应关系发送给服务端。然后,服务端记录用户标识、身份验证信息和无人机标识码的对应关系。进一步的,在客户端接收到用户输入的用户标识和身份验证信息后,客户端可以将该身份验证信息发送给无人机,无人机可以记录无人机标识码和身份验证信息的对应关系;或者,客户端可以将该用户标识和该身份验证信息发送给无人机,无人机可以记录无人机标识码、用户标识和身份验证信息的对应关系。
在另一个例子中,客户端将该身份验证信息发送给无人机,无人机记录无人机标识码和身份验证信息的对应关系;或者,客户端将该用户标识和该身份验证信息发送给无人机,无人机记录无人机标识码、用户标识和身份验证信息的对应关系。然后,客户端从无人机获取到无人机标识码和身份验证信息的对应关系,或者获取到无人机标识码、用户标识和身份验证信息的对应关系。然后,客户端在本地记录用户标识、身份验证信息和无人机标识码的对应关系,并将用户标识、身份验证信息和无人机标识码的对应关系发送给服务端,服务端记录用户标识、身份验证信息和无人机标识码的对应关系。
针对情况二,客户端将该身份验证信息发送给无人机,无人机记录无人机标识码和身份验证信息的对应关系;或者,客户端将该用户标识和该身份验证信息发送给无人机,无人机记录无人机标识码、用户标识和身份验证信息的对应关系。然后,客户端从无人机获取到无人机标识码和身份验证信息的对应关系,或者获取到无人机标识码、用户标识和身份验证信息的对应关系。然后,客户端在本地记录用户标识、身份验证信息和无人机标识码的对应关系,并将用户标识、身份验证信息和无人机标识码的对应关系发送给服务端,服务端记录用户标识、身份验证信息和无人机标识码的对应关系。
针对情况三,在客户端与无人机建立连接之后,客户端将该身份验证信息发送给无人机,无人机记录无人机标识码和身份验证信息的对应关系;或 者,客户端将该用户标识和该身份验证信息发送给无人机,无人机记录无人机标识码、用户标识和身份验证信息的对应关系。然后,客户端从无人机获取到无人机标识码和身份验证信息的对应关系,或者获取到无人机标识码、用户标识和身份验证信息的对应关系。然后,客户端在本地记录用户标识、身份验证信息和无人机标识码的对应关系。然后,在客户端与服务端建立连接之后,客户端从本地查询出用户标识、身份验证信息和无人机标识码的对应关系,并将用户标识、身份验证信息和无人机标识码的对应关系发送给服务端,服务端记录用户标识、身份验证信息和无人机标识码的对应关系。
针对上述情况一、情况二和情况三,若客户端从无人机获取到无人机标识码、用户标识和身份验证信息的对应关系,则客户端可以直接将无人机标识码、用户标识和身份验证信息的对应关系发送给服务端。若客户端从无人机获取到无人机标识码和身份验证信息的对应关系,则客户端可以先从本地查询出与该身份验证信息对应的用户标识(基于步骤202存储的对应关系可以查询出用户标识);若查询出的用户标识与当前登录到此客户端的用户标识相同,则可以将无人机标识码、用户标识和身份验证信息的对应关系发送给服务端;若查询出的用户标识与当前登录到此客户端的用户标识不同,则不再将无人机标识码、用户标识和身份验证信息的对应关系发送给服务端。
基于上述过程,就可以完成针对未注册用户的身份验证过程。
实施例二:在本实施例中,以未注册用户的身份验证过程为例进行说明,而且,客户端先连接到无人机进行操作,然后才连接到服务端进行身份验证。
在一个例子中,在客户端连接到无人机时,由于是未注册用户使用客户端(即用户未通过合法的用户标识登录到客户端)对无人机进行操作,因此,客户端在对无人机进行操作时,可以限制无人机在指定区域内飞行(如对无人机进行限高和/或限远处理,即限制无人机的飞行高度和/或限制无人机的飞行距离等),或者,限制客户端的全部功能(即客户端无法对无人机进行操作,此时无人机不起飞)或者部分功能(即限制客户端操作无人机飞行的功能, 此时无人机不起飞;限制客户端只能操作无人机在特定区域内飞行等)。
在客户端连接到无人机时,无人机检测到未注册用户登录到客户端时,可以限制无人机在指定区域内飞行(如对无人机进行限高和/或限远处理等),或者,禁止无人机起飞(如通过控制电源、发动机等,实现禁止起飞功能)。
在一个例子中,由于是未注册用户登录到客户端,因此,客户端还可以显示登录页面,以使用户通过用户标识登录。具体的,在客户端连接到服务端之后,基于此登录页面,可以先对未注册用户进行身份验证,身份验证的实现流程与与实施例一的流程类似,在此不再重复赘述。然后,用户就可以使用身份验证过程中得到的用户标识登录到客户端,其处理参见后续实施例。
实施例三:在本实施例中,以已注册用户的身份验证过程为例进行说明,参见图3A所示,为该身份验证方法的流程图,该方法可以包括以下步骤:
步骤301,客户端接收到已注册用户的登录请求时,若该已注册用户还未进行身份验证,则从服务端获取到验证页面信息,并根据该验证页面信息显示验证页面。该验证页面可以是一个需要对用户进行身份验证的页面。
在实际应用中,可以将使用无人机的用户区分为未注册用户和已注册用户,未注册用户是指没有在服务端注册过用户标识的用户,无法通过用户标识成功登录到客户端。已注册用户是指已经在服务端注册过用户标识的用户,可以通过用户标识成功登录到客户端,继而可以通过客户端控制无人机。
当已注册用户登录到客户端时,会向客户端发送登录请求(此处的登录请求与上述的注册请求不同,登录请求是操作登录页面产生的请求,而注册请求是操作注册页面产生的请求),客户端在接收到该登录请求时,先查询该已注册用户是否已经进行身份验证;如果是,则不再进行身份验证处理;如果否,则向服务端发送登录请求;服务端在接收到该登录请求后,向客户端返回验证页面信息,客户端可以根据该验证页面信息显示验证页面。如图3B所示,为验证页面的一个示例,该验证页面信息包括显示该验证页面所需要 的所有内容,且客户端基于这些验证页面信息就可以显示出该验证页面。
在一个例子中,可以将用于指示用户输入身份验证信息的页面,称为验证页面。针对已注册用户的身份验证过程,该验证页面只需要完成身份验证功能,不需要完成用户注册功能。也就是说,由于已注册用户已经在服务端注册有用户标识,因此,用户可以在该验证页面输入已经注册的用户标识,并在该验证页面输入身份验证信息,就可以完成身份验证功能。
其中,上述身份验证信息可以是手机号,也可以是身份证号码。当身份验证信息是手机号时,该验证页面还可以包括验证码,用户可以通过手机接收到服务端发送的验证码,并将接收到的验证码输入到验证页面。当然,身份验证信息也可以是其它内容,不再赘述。
为了实现上述过程,则客户端需要先查询出已注册用户是否已经进行身份验证,针对这一查询过程,则可以包括但不限于如下方式:若客户端与服务端之间已经建立连接,则客户端可以从服务端或者客户端本地查询出已注册用户还未进行身份验证或者已经进行身份验证。或者,若客户端与服务端之间没有建立连接,且客户端与无人机建立连接,则客户端可以从无人机或者客户端本地查询出已注册用户还未进行身份验证或者已经进行身份验证。
以下结合几个具体应用场景对上述查询过程进行详细说明。
应用场景1、在未注册用户的注册过程中,客户端在本地存储用户标识、无人机标识码和身份验证信息的对应关系。基于此,客户端在接收到已注册用户的登录请求时,先从该登录请求中解析出用户标识,若本地存储有与该用户标识对应的无人机标识码和/或身份验证信息,就可以直接确定已注册用户已经进行身份验证;否则,就可以确定已注册用户未进行身份验证。
应用场景2、在未注册用户的注册过程中,客户端在本地存储用户标识、无人机标识码和身份验证信息的对应关系。基于此,客户端在接收到已注册用户的登录请求时,先从该登录请求中解析出用户标识,若本地存储有与该 用户标识对应的无人机标识码和/或身份验证信息,就可以直接确定已注册用户已经进行身份验证;否则,从无人机或者服务端查询出已注册用户还未进行身份验证或者已经进行身份验证,具体查询过程参见后续的应用场景。
应用场景3、若客户端与服务端建立连接,但是客户端与无人机未建立连接,则:客户端在接收到已注册用户的登录请求时,先从该登录请求中解析出用户标识,然后向服务端发送携带该用户标识的查询消息。服务端在接收该查询消息后,先从该查询消息中解析出该用户标识,然后,若服务端本地存储有与该用户标识对应的无人机标识码和/或身份验证信息,则将已注册用户已经进行身份验证的信息发送给客户端,这样,客户端可以确定已注册用户已经进行身份验证;否则,服务端将已注册用户未进行身份验证的信息发送给客户端,这样,客户端可以确定已注册用户还未进行身份验证。
应用场景4、若客户端与无人机建立连接,但是客户端与服务端未建立连接,则:客户端在接收到已注册用户的登录请求时,先从该登录请求中解析出用户标识,然后向无人机发送携带该用户标识的查询消息。无人机在接收该查询消息后,先从该查询消息中解析出该用户标识,然后,若无人机本地存储有与该用户标识对应的无人机标识码和/或身份验证信息,则将已注册用户已经进行身份验证的信息发送给客户端,这样,客户端可以确定已注册用户已经进行身份验证;否则,无人机将已注册用户未进行身份验证的信息发送给客户端,这样,客户端可以确定已注册用户还未进行身份验证。
应用场景5、若客户端与无人机建立连接,且客户端与服务端建立连接,则客户端可以采用应用场景3的方式处理,或者采用应用场景4的方式处理。
在一个例子中,客户端查询出已注册用户还未进行身份验证之后,针对“客户端从服务端获取到验证页面信息”的过程,可以包括但不限于如下方式:若无人机当前未起飞,则客户端可以直接从服务端获取到验证页面信息。此外,若无人机当前已经起飞,则客户端先记录已注册用户需要进行身份验证的信息;进一步的,在无人机降落后,若客户端发现本地记录有已注册用 户需要进行身份验证的信息,则客户端可以从服务端获取到验证页面信息。
步骤302,客户端接收用户在验证页面输入的用户标识和身份验证信息。
其中,客户端在显示验证页面后,用户就可以在该验证页面输入用户标识和身份验证信息等信息,而客户端可以接收到用户输入的这些信息。
在一个例子中,客户端在接收到用户在验证页面输入的用户标识和身份验证信息之后,可以在本地存储该用户标识和该身份验证信息的对应关系。
步骤303,客户端将该用户标识和该身份验证信息发送给服务端。
步骤304,服务端记录该用户标识和该身份验证信息的对应关系。
在一个例子中,客户端可以从无人机获取到无人机标识码,并在本地记录用户标识、身份验证信息和无人机标识码的对应关系。客户端可以将用户标识、身份验证信息和无人机标识码的对应关系发送给服务端,服务端可以记录用户标识、身份验证信息和无人机标识码的对应关系。客户端可以将该身份验证信息发送给无人机,无人机可以记录无人机标识码和身份验证信息的对应关系;或者,客户端可以将该用户标识和该身份验证信息发送给无人机,无人机可以记录无人机标识码、用户标识和身份验证信息的对应关系。
上述过程的详细处理,参见图2所示的三种情况,对此不再重复赘述。
基于上述过程,就可以完成针对已注册用户的身份验证过程。
实施例四:在本实施例中,以已注册用户的身份验证过程为例进行说明,而且,在已注册用户登录到客户端时,假设客户端连接到服务端和无人机。参见图4所示,为该身份验证方法的流程图,该方法可以包括以下步骤:
步骤401,客户端接收到已注册用户的登录请求时,若该已注册用户还未进行身份验证,则从服务端获取到验证页面信息,并根据该验证页面信息显示验证页面。该验证页面可以是一个需要对用户进行身份验证的页面。
当已注册用户登录到客户端时,向客户端发送登录请求,客户端在接收到该登录请求时,查询已注册用户是否已经进行身份验证;如果是,不再进 行身份验证处理;如果否,向服务端发送登录请求。服务端在收到登录请求后,向客户端返回验证页面信息,客户端根据该验证页面信息显示验证页面。
针对客户端查询已注册用户是否已经进行身份验证的过程,客户端在接收到已注册用户的登录请求时,从该登录请求中解析出用户标识,若本地存储有与该用户标识对应的无人机标识码和/或身份验证信息,就可以确定已注册用户已经进行身份验证;否则向服务端发送携带该用户标识的查询消息。
服务端在接收查询消息后,从该查询消息中解析出该用户标识,若服务端本地存储有与该用户标识对应的无人机标识码和/或身份验证信息,则将已注册用户已经进行身份验证的信息发送给客户端,这样,客户端可以确定已注册用户已经进行身份验证;否则,服务端将已注册用户未进行身份验证的信息发送给客户端,这样,客户端可以确定已注册用户还未进行身份验证。
步骤402,客户端接收用户在验证页面输入的用户标识和身份验证信息。
步骤403,客户端从无人机获取到无人机标识码。
步骤404,客户端在本地记录该用户标识、该身份验证信息和该无人机标识码的对应关系,并将该对应关系发送给服务端。
步骤405,服务端在接收到该用户标识、该身份验证信息和该无人机标识码的对应关系之后,可以在本地记录该对应关系。
步骤406,客户端可以将该身份验证信息发送给无人机,或者,客户端可以将该用户标识和该身份验证信息发送给无人机。
步骤407,无人机可以记录无人机标识码和身份验证信息的对应关系;或者,无人机可以记录无人机标识码、用户标识和身份验证信息的对应关系。
当然,上述步骤403-步骤407只是一个示例,还可以有其它实现方式,具体实现方式可以参见图2所示的情况一的几个例子,对此不再重复赘述。
步骤408,客户端对无人机进行操作。其中,在操作过程中,由于用户已 经进行身份验证,客户端可以正常操作无人机,例如,客户端的全部功能被启用,不用限制无人机在指定区域内飞行等,对此操作不做限制。
实施例五:在本实施例中,以已注册用户的身份验证过程为例进行说明,而且,在已注册用户登录到客户端时,假设客户端只连接到服务端,并未连接到无人机,在已注册用户成功登录到客户端之后,才连接到无人机。参见图5所示,为该身份验证方法的流程图,该方法可以包括以下步骤:
步骤501,客户端接收到已注册用户的登录请求时,若该已注册用户还未进行身份验证,则从服务端获取到验证页面信息,并根据该验证页面信息显示验证页面。该验证页面可以是一个需要对用户进行身份验证的页面。
其中,步骤501的过程与步骤401的过程类似,在此不再重复赘述。
步骤502,客户端接收用户在验证页面输入的用户标识和身份验证信息。
步骤503,客户端在本地记录该用户标识和该身份验证信息的对应关系。
步骤504,客户端将该用户标识和该身份验证信息的对应关系发送给服务端,服务端在本地记录该用户标识和该身份验证信息的对应关系。
步骤505,在客户端连接到无人机时,客户端将该身份验证信息发送给无人机,或者,客户端可以将该用户标识和该身份验证信息发送给无人机。
步骤506,无人机可以记录无人机标识码和身份验证信息的对应关系;或者,无人机可以记录无人机标识码、用户标识和身份验证信息的对应关系。
步骤507,客户端从无人机获取无人机标识码和身份验证信息的对应关系;或者,客户端从无人机获取无人机标识码、用户标识和身份验证信息的对应关系。
步骤508,客户端将无人机标识码、用户标识和身份验证信息的对应关系发送给服务端,以使服务端在本地记录该对应关系。
当然,上述步骤503-步骤508只是一个示例,还可以有其它实现方式, 具体实现方式可以参见图2所示的情况一至情况三,对此不再重复赘述。
步骤509,客户端对无人机进行操作,即客户端正常操作无人机。
实施例六:在本实施例中,以已注册用户的身份验证过程为例进行说明,在已注册用户登录到客户端时,假设客户端只连接到无人机,未连接到服务端。参见图6所示,为该身份验证方法的流程图,该方法可以包括以下步骤:
步骤601,客户端接收到已注册用户的登录请求(即用户通过合法的用户标识登录到客户端)时,客户端查询出已注册用户还未进行身份验证。
当已注册用户登录到客户端时,向客户端发送登录请求,客户端在接收到该登录请求时,查询已注册用户是否已经进行身份验证;如果是,不再进行身份验证处理;如果否(即还未进行身份验证),则执行步骤602。
针对客户端查询已注册用户是否已经进行身份验证的过程,客户端在接收到已注册用户的登录请求时,从该登录请求中解析出用户标识,若本地存储有与该用户标识对应的无人机标识码和/或身份验证信息,就可以确定已注册用户已经进行身份验证;否则向无人机发送携带该用户标识的查询消息。
无人机在接收查询消息后,从该查询消息中解析出该用户标识,若无人机本地存储有与该用户标识对应的无人机标识码和/或身份验证信息,则将已注册用户已经进行身份验证的信息发送给客户端,这样,客户端可以确定已注册用户已经进行身份验证;否则,无人机将已注册用户未进行身份验证的信息发送给客户端,这样,客户端可以确定已注册用户还未进行身份验证。
步骤602,客户端限制无人机在指定区域内飞行(如客户端对无人机进行限高和/或限远处理,即客户端可以限制无人机的飞行高度和/或限制无人机的飞行距离等),并显示认证页面,以使用户对用户标识进行身份验证。
具体的,在客户端连接到无人机时,由于是已注册用户登录到客户端,但是该已注册用户还未进行身份验证,因此,客户端在对无人机进行操作时,可以限制无人机在指定区域内飞行,如对无人机进行限高和/或限远处理。
步骤603,无人机限制无人机在指定区域内飞行;或者,禁止无人机起飞。
具体的,在客户端连接到无人机时,由于是已注册用户登录到客户端,但是该已注册用户还未进行身份验证,因此,客户端在对无人机进行操作时,无人机可以检测到登录该客户端的用户标识,且由于在本地没有记录与该用户标识对应的无人机标识码和/或身份验证信息,也没有无人机标识码和身份验证信息的对应关系,因此,无人机确定已注册用户未进行身份验证,可以限制无人机在指定区域内飞行(如对无人机进行限高和/或限远处理等),或者,可以禁止无人机起飞(如通过控制电源、发动机等,实现禁止起飞功能)。
步骤604,在客户端连接到服务端时,客户端从服务端获取到验证页面信息,并根据该验证页面信息显示验证页面。其中,在客户端连接到服务端时,可以先查询已注册用户是否已经进行身份验证,如果还未进行身份验证,就可以从服务端获取到验证页面信息,并根据该验证页面信息显示验证页面。
步骤605,客户端接收用户在验证页面输入的用户标识和身份验证信息。
步骤606,客户端在本地记录该用户标识和该身份验证信息的对应关系。
步骤607,客户端将该用户标识和该身份验证信息的对应关系发送给服务端,服务端在本地记录该用户标识和该身份验证信息的对应关系。
步骤608,在客户端连接到无人机时,客户端将该身份验证信息发送给无人机,或者,客户端可以将该用户标识和该身份验证信息发送给无人机。
步骤609,无人机可以记录无人机标识码和身份验证信息的对应关系;或者,无人机可以记录无人机标识码、用户标识和身份验证信息的对应关系。
步骤610,客户端从无人机获取无人机标识码和身份验证信息的对应关系;或者,客户端从无人机获取无人机标识码、用户标识和身份验证信息的对应关系。
步骤611,客户端将无人机标识码、用户标识和身份验证信息的对应关系发送给服务端,以使服务端在本地记录该对应关系。
当然,上述步骤606-步骤611只是一个示例,还可以有其它实现方式,具体实现方式可以参见图2所示的情况一至情况三,对此不再重复赘述。
此外,在客户端限制无人机在指定区域内飞行之后,基于步骤604-步骤611,则用户标识已经进行身份验证,因此,客户端还可以解除无人机在指定区域内飞行的限制。此外,无人机在确定本地记录有无人机标识码和身份验证信息的对应关系后,也可以解除无人机在指定区域内飞行的限制。
实施例七:根据实际需要,可以对所有用户都进行身份验证,也可以只对部分用户进行身份验证。若针对所有用户都进行身份验证,则所有用户均采用上述实施例的流程;若针对部分用户进行身份验证,则只有部分用户采用上述实施例的流程,而其它用户的处理方式,本实施例中不做限制。
在一个例子中,当指定区域内(如位于中国境内)的用户通过客户端操作无人机时,可以对指定区域内的用户进行身份验证;当指定区域外的用户通过客户端操作无人机时,可以不对指定区域外的用户进行身份验证。
为了获知是否为指定区域内的用户,则:由于客户端部署在终端设备(如手机),因此,终端设备可以基于服务商(如中国移动、中国联通等)的信息判断出自身是否在中国境内,对此判断方式不做限制。或者,终端设备可以通过GPS(Global Positioning System,全球定位系统)信息判断出自身是否在中国境内,对此判断方式不做限制。其中,若终端设备位于中国境内,则部署在终端设备的客户端获知控制无人机的用户是指定区域内的用户;若终端设备位于中国境外,则部署在终端设备的客户端获知控制无人机的用户不是指定区域内的用户。此外,与客户端通信的服务端也可以获知上述信息。
实施例八:服务端在记录用户标识、身份验证信息、无人机标识码的对应关系后,若接收到来自监管设备的请求消息,则可以从该请求消息中解析出无人机标识码,并从服务端本地查询出该无人机标识码对应的身份验证信息。然后,服务端可以将查询出的身份验证信息发送给监管设备。这样,监 管设备可以得到无人机标识码对应的身份验证信息,从而得到无人机的身份。
在另一个例子中,无人机在记录用户标识、身份验证信息、无人机标识码的对应关系后,或者记录身份验证信息、无人机标识码的对应关系后,若接收到来自监管设备的请求消息,则无人机可以从该请求消息中解析出无人机标识码,并从无人机本地查询出该无人机标识码对应的身份验证信息。然后,无人机可以将查询出的身份验证信息发送给监管设备。这样,监管设备可以得到无人机标识码对应的身份验证信息,从而得到无人机的身份。
实施例九:在无人机起飞后,无人机在特定频段广播无人机的飞行信息。其中,该飞行信息可以包括但不限于以下之一或者任意组合:用户标识(该用户标识是当前登录到客户端的用户标识,与上述绑定关系中的用户标识可能相同,也可能不同。例如,在身份验证过程中,通过用户标识1登录到客户端,这样,在无人机、服务端、客户端记录的都是用户标识1、无人机标识码、身份验证信息的对应关系。然后,在对无人机进行操作时,假设通过用户标识1登录到客户端,则此处的用户标识是用户标识1;假设通过用户标识2登录到客户端,则此处的用户标识是用户标识2)、无人机标识码、飞行时间信息(如起飞时间、当前时间等)、飞行速度信息(如飞行平均速度、飞行最高速度等)、起始位置信息(如起飞的起始位置经纬度)、当前飞行区域信息(如当前位置的经纬度),对此飞行信息不做限制。在无人机起飞后,客户端也可以在特定频段广播无人机的飞行信息。其中,该飞行信息可以包括但不限于以下之一或者任意组合:用户标识、无人机标识码、飞行时间信息、飞行速度信息、起始位置信息、当前飞行区域信息。
例如,无人机或者客户端在特定频段内发送广播消息,该广播消息可以携带无人机的飞行信息。而且,该广播消息可以经过预设加密算法的加密处理。由于是特定频段内发送广播消息,因此,广播消息只能被支持特定频段的设备接收,而支持特定频段的设备通常是监管人员使用的设备,从而避免信息泄露。通过对广播消息进行加密处理,可以保证广播消息传输的安全性。
在一个例子中,无人机还可以在本地存储无人机在最近N次(如5次)飞行时的飞行信息,以便监管人员从无人机上查询无人机的飞行信息。
其中,N为大于等于1的整数,如N的取值为5。
实施例十:当用户通过合法的用户标识登录到客户端时,客户端还可以将该用户标识发送给无人机。而无人机在接收到该用户标识后,可以在在本地存储该用户标识。其中,该用户标识是当前登录到客户端的用户标识,与上述实施例中的用户标识可能相同,也可能不同。例如,在身份验证过程中,通过用户标识1登录到客户端,这样,在无人机、服务端、客户端记录的都是用户标识1、无人机标识码、身份验证信息的对应关系。然后,在对无人机进行操作时,假设通过用户标识1登录到客户端,则可以将用户标识1发送给无人机,无人机存储的就是用户标识1;假设通过用户标识2登录到客户端,则可以将用户标识2发送给无人机,无人机存储的就是用户标识2。
在一个例子中,无人机可以将上述用户标识、无人机标识码、身份验证信息的对应关系,与上述飞行信息存储在相同的位置,也可以存储在不同的位置。例如,无人机可以将上述用户标识、无人机标识码、身份验证信息的对应关系,存储在无人机飞控(即无人机的飞行控制系统)的flash中,并将上述飞行信息存储在无人机飞控的flash中。或者,无人机将上述用户标识、无人机标识码、身份验证信息的对应关系,存储在无人机飞控的加密芯片中,并将上述飞行信息存储在无人机飞控的flash中。此外,无人机可以将上述用户标识(即单独的用户标识)存储在无人机飞控的加密芯片中。当然,上述存储位置只是一个示例,对此存储位置不做限制,只要存储在无人机即可。
实施例十一:身份验证信息可以包括手机号,用户标识可以包括注册账号;每个身份验证信息对应一个或者多个用户标识;每个身份验证信息对应一个或者多个无人机标识码;每个用户标识对应一个或者多个无人机标识码。
在一个例子中,若身份验证信息为手机号,则用户在验证页面输入手机号之后,还可以点击获取验证码的按钮,服务端可以将验证码发送至该手机号对应的终端设备,且用户可以在验证页面输入该验证码。当然,用户还可 以在验证页面输入其它内容,如邮箱、密码等,对此不做限制。客户端在接收到用户在验证页面输入的相关信息后,可以与服务端进行交互。
在一个例子中,还可以在无人机飞控中增加是否已经过身份验证的标志位,该标志位的取值可以为:0(初始状态)、1(表示已经过身份验证)、2(表示未经过身份验证)、3(表示不需要进行身份验证);或者,该标志位的取值可以为:0(初始状态)、1(表示已经过身份验证)、2(表示未经过身份验证)。
其中,所有无人机飞控的标志位初始值为0。在连网后,若已经过身份验证(即记录了用户标识、身份验证信息和无人机标识码的对应关系,或者记录了身份验证信息和无人机标识码的对应关系),则无人机将该标志位的取值设置为1;若没有经过身份验证(即未记录上述对应关系),则无人机可以将该标志位的取值设置为2。在实际应用中,若该标志位的取值可以为0、1、2、3,则:若指定区域外的用户通过客户端操作无人机时,则无人机将该标志位的取值设置为3。若该标志位的取值可以为0、1、2,则不再将取值设置为3。
基于上述标志位,无人机在起飞后,若发现标志位取值为2,则表示没有经过身份验证,无人机可以限制无人机在指定区域内飞行,如限制无人机的飞行高度为30米,限制无人机的飞行距离为50米。若发现标志位取值为1,则表示已经过身份验证,无人机可以不限制无人机在指定区域内飞行。
在一个例子中,在记录用户标识、无人机标识码、身份验证信息的对应关系后,还可以实现身份验证信息的换绑和解绑功能。其中,换绑功能是指:用户成功登录到客户端后,在个人页面中心,可以查询到绑定的身份验证信息,此时,用户可以对绑定的身份验证信息进行修改,如向客户端输入新身份验证信息,客户端将新身份验证信息发送给服务端,以使服务端使用新身份验证信息替换原有的身份验证信息;此外,客户端将新身份验证信息发送给无人机,以使无人机使用新身份验证信息替换原有的身份验证信息。
针对使用新身份验证信息替换原有的身份验证信息的过程,与上述实施例三的实现类似,区别在于:无人机、服务端、客户端不是直接记录用户标识、无人机标识码、身份验证信息的对应关系,而是将原有对应关系中的身 份验证信息,替换为新身份验证信息,对此实现方式不再重复赘述。
其中,解绑功能是指:用户成功登录到客户端后,在个人页面中心,可以查询到绑定的身份验证信息,此时,用户可以对绑定的身份验证信息进行解绑,如向客户端发送解绑信息,客户端将携带解绑信息(如身份验证信息)的消息发送给服务端,以使服务端删除该身份验证信息的对应关系,即删除该身份验证信息、与用户标识和无人机标识码的对应关系。此外,将携带解绑信息的消息发送给无人机,以使无人机删除该身份验证信息的对应关系,即删除该身份验证信息、与用户标识和无人机标识码的对应关系。
基于与上述方法同样的发明构思,本发明实施例中还提供一种终端设备,所述终端设备能够与服务端进行通信,且所述终端设备能够控制无人机,如图7所示,所述终端设备包括:
处理器,用于从所述服务端获取到验证页面信息,并根据所述验证页面信息显示验证页面;接收用户在所述验证页面输入的用户标识和身份验证信息,其中,所述用户标识是用户通过所述终端设备控制所述无人机的凭证;
所述处理器,还用于将所述用户标识和所述身份验证信息发送给所述服务端,以使所述服务端记录所述用户标识和所述身份验证信息的对应关系。
其中,所述终端设备还可以包括发射器和接收器;所述处理器可以通过接收器从所述服务端获取到验证页面信息,通过接收器接收用户在所述验证页面输入的用户标识和身份验证信息;此外,所述处理器可以通过发射器将所述用户标识和所述身份验证信息发送给所述服务端。
在一个例子中,所述终端设备还包括:存储器;所述处理器,还用于获取无人机标识码,所述无人机标识码用于唯一标识所述无人机;将所述用户标识、所述身份验证信息和所述无人机标识码的对应关系记录到存储器,并将所述无人机标识码发送给服务端,以使所述服务端记录所述用户标识、所述身份验证信息和所述无人机标识码的对应关系;所述存储器,用于存储所述用户标识、所述身份验证信息和所述无人机标识码的对应关系。
其中,所述处理器可以通过发射器将所述无人机标识码发送给服务端。
在一个例子中,所述处理器,还用于在未注册用户的注册过程中,若所述未注册用户还未进行身份验证,则从所述服务端获取到验证页面信息;或者,在已注册用户的使用过程中,若所述已注册用户还未进行身份验证,且所述无人机当前未起飞,则从所述服务端获取到验证页面信息。
在一个例子中,所述处理器,还用于当所述终端设备与所述服务端之间建立连接时,则可以从所述服务端或者所述终端设备查询出所述已注册用户还未进行身份验证;或者,当所述终端设备与所述服务端之间没有建立连接,且所述终端设备与所述无人机建立连接时,则可以从所述无人机或者所述终端设备查询出所述已注册用户还未进行身份验证。
在一个例子中,所述处理器,还用于将所述身份验证信息发送给所述无人机,以使所述无人机记录无人机标识码和所述身份验证信息的对应关系;或者,将所述用户标识和所述身份验证信息发送给所述无人机,以使所述无人机记录无人机标识码、所述用户标识和所述身份验证信息的对应关系。
其中,所述处理器可以通过发射器将所述身份验证信息发送给所述无人机,或者,将所述用户标识和所述身份验证信息发送给所述无人机。
在一个例子中,所述处理器,还用于从所述无人机获取所述无人机标识码、所述用户标识和所述身份验证信息的对应关系,并将所述无人机标识码、所述用户标识和所述身份验证信息的对应关系发送给所述服务端,以使所述服务端记录所述无人机标识码、所述用户标识和所述身份验证信息的对应关系;或,从所述无人机获取所述无人机标识码和所述身份验证信息的对应关系;获取与所述身份验证信息对应的用户标识,并将所述无人机标识码、所述用户标识和所述身份验证信息的对应关系发送给所述服务端,以使所述服务端记录所述无人机标识码、所述用户标识和所述身份验证信息的对应关系。
其中,所述处理器可以通过发射器将所述无人机标识码、所述用户标识和所述身份验证信息的对应关系发送给所述服务端;或者,将所述无人机标识码、所述用户标识和所述身份验证信息的对应关系发送给所述服务端。
在一个例子中,所述处理器,还用于当用户未通过合法的用户标识登录 到所述终端设备时,限制所述终端设备的全部功能或者部分功能,并显示登录页面,以使用户通过用户标识登录;或者,当用户通过合法的用户标识登录到所述终端设备时,若所述用户标识还未进行身份验证,限制所述无人机在指定区域内飞行,显示认证页面,以使用户对所述用户标识进行身份验证。
在一个例子中,所述处理器,还用于在所述无人机起飞后,在特定频段广播所述无人机的飞行信息;所述飞行信息包括以下之一或者任意组合:用户标识、无人机标识码、飞行时间信息、飞行速度信息、起始位置信息、当前飞行区域信息。其中,所述处理器可以通过发射器广播无人机的飞行信息。
在一个例子中,所述处理器,还用于当用户通过合法的用户标识登录到所述客户端时,将所述用户标识发送给所述无人机,以使所述无人机存储所述用户标识。所述处理器可以通过发射器将所述用户标识发送给所述无人机。
基于与上述方法同样的发明构思,本发明实施例中还提供一种服务端,所述服务端与客户端进行通信,且所述客户端能够控制无人机,如图8所示,所述服务端包括:处理器,用于将验证页面信息发送给所述客户端,以使所述客户端根据所述验证页面信息显示验证页面,并接收用户在所述验证页面输入的用户标识和身份验证信息;其中,所述用户标识是用户通过所述客户端控制所述无人机的凭证;接收所述客户端发送的所述用户标识和所述身份验证信息,并将所述用户标识和所述身份验证信息的对应关系记录到存储器;
存储器,用于存储所述用户标识和所述身份验证信息的对应关系。
其中,所述服务端还可以包括发射器和接收器;所述处理器可以通过发射器将验证页面信息发送给所述客户端,所述处理器可以通过接收器接收所述客户端发送的所述用户标识和所述身份验证信息。
在一个例子中,所述处理器,还用于接收所述客户端发送的无人机标识码,所述无人机标识码用于唯一标识所述无人机;将所述用户标识、所述身份验证信息和所述无人机标识码的对应关系记录到所述存储器;所述存储器,还用于存储所述用户标识、所述身份验证信息和无人机标识码的对应关系。
其中,所述处理器可以通过接收器接收所述客户端发送的无人机标识码。
在一个例子中,所述处理器,还用于在接收到来自监管设备的请求消息后,从所述请求消息中解析出无人机标识码,并从所述存储器查询出所述无人机标识码对应的身份验证信息;将查询出的身份验证信息发送给所述监管设备。其中,所述处理器可以通过接收器接收来自监管设备的请求消息,所述处理器可以通过发射器将查询出的身份验证信息发送给所述监管设备。
基于与上述方法同样的发明构思,本发明实施例中还提供一种无人机,如图9所示,所述无人机包括:
处理器,用于接收客户端发送的身份验证信息,并将无人机标识码和身份验证信息的对应关系记录到存储器,无人机标识码用于唯一标识无人机;
存储器,用于存储所述无人机标识码和所述身份验证信息的对应关系。
其中,所述无人机还可以包括:发射器和接收器。
所述处理器可以通过接收器接收客户端发送的身份验证信息。
在一个例子中,所述处理器,还用于接收客户端发送的用户标识和身份验证信息,并将无人机标识码、所述用户标识和所述身份验证信息的对应关系记录到存储器;所述存储器,还用于存储所述无人机标识码、所述用户标识和所述身份验证信息的对应关系。其中,所述处理器还可以通过所述接收器接收客户端发送的用户标识和身份验证信息。
在一个例子中,所述处理器,还用于在接收到来自监管设备的请求消息后,从所述请求消息中解析出无人机标识码,并从所述存储器查询出所述无人机标识码对应的身份验证信息;将查询出的身份验证信息发送给所述监管设备。其中,所述处理器可以通过接收器接收来自监管设备的请求消息,所述处理器可以通过发射器将查询出的身份验证信息发送给所述监管设备。
在一个例子中,所述处理器,还用于接收客户端发送的登录到所述客户端的用户标识,并将登录到所述客户端的用户标识记录到所述存储器;所述存储器,还用于存储登录到所述客户端的用户标识。
在一个例子中,所述处理器,还用于当所述存储器没有存储无人机标识码和身份验证信息的对应关系时,则限制所述无人机在指定区域内飞行;或 者,禁止所述无人机起飞;在限制所述无人机在指定区域内飞行之后,当所述存储器存储有无人机标识码和身份验证信息的对应关系时,则解除所述无人机在所述指定区域内飞行的限制。
所述处理器,还用于在所述无人机起飞后,在特定频段内广播所述无人机的飞行信息;其中,所述飞行信息包括以下之一或者任意组合:用户标识、无人机标识码、飞行时间信息、飞行速度信息、起始位置信息、当前飞行区域信息。其中,所述处理器可以通过发射器广播所述无人机的飞行信息。
在一个例子中,所述处理器,还用于将所述无人机最近N次飞行时的飞行信息记录到所述存储器;其中,所述N为大于1的整数;所述存储器,还用于存储所述无人机最近N次飞行时的飞行信息。
基于与上述方法同样的发明构思,本发明实施例中还提供一种机器可读存储介质,该机器可读存储介质可以应用于终端设备,所述终端设备能够与服务端进行通信,所述终端设备能够控制无人机,所述机器可读存储介质上存储有若干计算机指令,所述计算机指令被执行时进行如下处理:
从所述服务端获取到验证页面信息,并根据所述验证页面信息显示验证页面;接收用户在所述验证页面输入的用户标识和身份验证信息,其中,所述用户标识是用户通过所述终端设备控制所述无人机的凭证;
将所述用户标识和所述身份验证信息发送给所述服务端,以使所述服务端记录所述用户标识和所述身份验证信息的对应关系。
在一个例子中,所述计算机指令被执行时还进行如下处理:
获取无人机标识码,所述无人机标识码用于唯一标识所述无人机;
将所述用户标识、所述身份验证信息和所述无人机标识码的对应关系记录到存储器,并将所述无人机标识码发送给服务端,以使所述服务端记录所述用户标识、所述身份验证信息和所述无人机标识码的对应关系。
在一个例子中,所述计算机指令被执行时还进行如下处理:
在未注册用户的注册过程中,若所述未注册用户还未进行身份验证,则从所述服务端获取到验证页面信息;或者,
在已注册用户的使用过程中,若所述已注册用户还未进行身份验证,且所述无人机当前未起飞,则从所述服务端获取到验证页面信息。
在一个例子中,所述计算机指令被执行时还进行如下处理:
当所述终端设备与所述服务端之间建立连接时,从所述服务端或者所述终端设备查询出所述已注册用户还未进行身份验证;或者,当所述终端设备与所述服务端之间没有建立连接,且所述终端设备与所述无人机建立连接时,从所述无人机或者所述终端设备查询出所述已注册用户还未进行身份验证。
在一个例子中,所述计算机指令被执行时还进行如下处理:
将所述身份验证信息发送给所述无人机,以使所述无人机记录无人机标识码和所述身份验证信息的对应关系;或者,
将所述用户标识和所述身份验证信息发送给所述无人机,以使所述无人机记录无人机标识码、所述用户标识和所述身份验证信息的对应关系。
在一个例子中,所述计算机指令被执行时还进行如下处理:
从所述无人机获取所述无人机标识码、所述用户标识和所述身份验证信息的对应关系,并将所述无人机标识码、所述用户标识和所述身份验证信息的对应关系发送给所述服务端,以使所述服务端记录所述无人机标识码、所述用户标识和所述身份验证信息的对应关系;或者,
从所述无人机获取所述无人机标识码和所述身份验证信息的对应关系;获取与所述身份验证信息对应的用户标识,并将所述无人机标识码、所述用户标识和所述身份验证信息的对应关系发送给所述服务端,以使所述服务端记录所述无人机标识码、所述用户标识和所述身份验证信息的对应关系。
在一个例子中,所述计算机指令被执行时还进行如下处理:
当用户未通过合法的用户标识登录到所述终端设备时,则限制所述终端设备的全部功能或者部分功能,并显示登录页面,以使用户通过用户标识登录;或者,当用户通过合法的用户标识登录到所述终端设备时,若所述用户标识还未进行身份验证,则限制所述无人机在指定区域内飞行,并显示认证页面,以使用户对所述用户标识进行身份验证。
基于与上述方法同样的发明构思,本发明实施例中还提供一种机器可读存储介质,该机器可读存储介质可以应用于服务端,所述服务端与客户端进行通信,且所述客户端能够控制无人机,所述机器可读存储介质上存储有若干计算机指令,所述计算机指令被执行时进行如下处理:
将验证页面信息发送给所述客户端,以使所述客户端根据所述验证页面信息显示验证页面,并接收用户在所述验证页面输入的用户标识和身份验证信息;其中,所述用户标识是用户通过所述客户端控制所述无人机的凭证;
接收所述客户端发送的所述用户标识和所述身份验证信息;
将所述用户标识和所述身份验证信息的对应关系记录到存储器。
所述计算机指令被执行时还进行如下处理:接收所述客户端发送的无人机标识码,所述无人机标识码用于唯一标识所述无人机;将所述用户标识、所述身份验证信息和所述无人机标识码的对应关系记录到所述存储器。
在一个例子中,所述计算机指令被执行时还进行如下处理:
在接收到来自监管设备的请求消息后,从所述请求消息中解析出无人机标识码,并从所述存储器查询出所述无人机标识码对应的身份验证信息;
将查询出的身份验证信息发送给所述监管设备。
基于与上述方法同样的发明构思,本发明实施例中还提供一种机器可读存储介质,该机器可读存储介质可以应用于无人机,所述机器可读存储介质上存储有若干计算机指令,所述计算机指令被执行时进行如下处理:
接收客户端发送的身份验证信息,并将无人机标识码和身份验证信息的对应关系记录到存储器,无人机标识码用于唯一标识无人机。
在一个例子中,所述计算机指令被执行时还进行如下处理:
接收客户端发送的用户标识和身份验证信息,并将无人机标识码、所述用户标识和所述身份验证信息的对应关系记录到存储器。
在一个例子中,所述计算机指令被执行时还进行如下处理:
在接收到来自监管设备的请求消息后,从所述请求消息中解析出无人机标识码,并从所述存储器查询出所述无人机标识码对应的身份验证信息;
将查询出的身份验证信息发送给所述监管设备。
在一个例子中,所述计算机指令被执行时还进行如下处理:
当所述存储器没有存储无人机标识码和身份验证信息的对应关系时,则限制所述无人机在指定区域内飞行;或者,禁止所述无人机起飞;在限制所述无人机在指定区域内飞行之后,当所述存储器存储有无人机标识码和身份验证信息的对应关系时,则解除所述无人机在所述指定区域内飞行的限制。
基于与上述方法同样的发明构思,本发明实施例中还可以提供一种身份验证系统,所述系统包括客户端、服务端和无人机;所述客户端能够与服务端进行通信,所述客户端能够控制无人机;其中:
所述客户端,用于从所述服务端获取到验证页面信息,并根据所述验证页面信息显示验证页面;接收用户在所述验证页面输入的用户标识和身份验证信息;其中,所述用户标识是用户通过所述客户端控制所述无人机的凭证;将所述用户标识和所述身份验证信息发送给所述服务端;
所述服务端,用于将所述验证页面信息发送给所述客户端,并接收所述客户端发送的所述用户标识和所述身份验证信息,并记录所述用户标识和所述身份验证信息的对应关系。
在一个例子中,所述客户端,还用于获取无人机标识码,所述无人机标识码用于唯一标识所述无人机;记录所述用户标识、所述身份验证信息和所述无人机标识码的对应关系;将所述无人机标识码发送给所述服务端;
所述服务端,还用于接收所述客户端发送的无人机标识码,并记录所述用户标识、所述身份验证信息和所述无人机标识码的对应关系。
在一个例子中,所述客户端,还用于将所述身份验证信息发送给所述无人机;或者,将所述用户标识和所述身份验证信息发送给所述无人机;
所述无人机,用于接收客户端发送的身份验证信息,记录无人机标识码和所述身份验证信息的对应关系;或者,接收客户端发送的用户标识和身份验证信息,记录无人机标识码、所述用户标识和身份验证信息的对应关系。
上述实施例阐明的系统、装置、模块或单元,可以由计算机芯片或实体 实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机,计算机的具体形式可以是个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件收发设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任意几种设备的组合。
为了描述的方便,描述以上装置时以功能分为各种单元分别描述。当然,在实施本发明时可以把各单元的功能在同一个或多个软件和/或硬件中实现。
本领域内的技术人员应明白,本发明实施例可提供为方法、系统、或计算机程序产品。因此,本发明可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明实施例可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本发明是参照根据本发明实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可以由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其它可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其它可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
而且,这些计算机程序指令也可以存储在能引导计算机或其它可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或者多个流程和/或方框图一个方框或者多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其它可编程数据处理设备,使得在计算机或者其它可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其它可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
本领域技术人员应明白,本发明的实施例可提供为方法、系统或计算机程序产品。因此,本发明可以采用完全硬件实施例、完全软件实施例、或者结合软件和硬件方面的实施例的形式。而且,本发明可以采用在一个或者多个其中包含有计算机可用程序代码的计算机可用存储介质(可以包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
以上所述仅为本发明实施例而已,并不用于限制本发明。对于本领域技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原理之内所作的任何修改、等同替换、改进,均应包含在本发明的权利要求范围之内。

Claims (70)

  1. 一种身份验证方法,其特征在于,应用于客户端,所述客户端能够与服务端进行通信,且所述客户端能够控制无人机,所述方法包括:
    从服务端获取到验证页面信息,并根据所述验证页面信息显示验证页面;
    接收用户在所述验证页面输入的用户标识和身份验证信息;其中,所述用户标识是用户通过所述客户端控制所述无人机的凭证;
    将所述用户标识和所述身份验证信息发送给所述服务端,以使所述服务端记录所述用户标识和所述身份验证信息的对应关系。
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    获取无人机标识码,所述无人机标识码用于唯一标识所述无人机;
    记录所述用户标识、所述身份验证信息和所述无人机标识码的对应关系;
    将所述无人机标识码发送给所述服务端,以使所述服务端记录所述用户标识、所述身份验证信息和所述无人机标识码的对应关系。
  3. 根据权利要求1所述的方法,其特征在于,
    所述从服务端获取到验证页面信息,包括:在未注册用户的注册过程中,若所述未注册用户还未进行身份验证,则从所述服务端获取到验证页面信息。
  4. 根据权利要求1所述的方法,其特征在于,
    所述从服务端获取到验证页面信息,包括:
    在已注册用户的使用过程中,若所述已注册用户还未进行身份验证,且所述无人机当前未起飞,则从所述服务端获取到验证页面信息。
  5. 根据权利要求4所述的方法,其特征在于,所述方法还包括:
    在已注册用户的使用过程中,若所述已注册用户还未进行身份验证,且所述无人机当前已经起飞,则记录所述已注册用户需要进行身份验证的信息;
    在所述无人机降落后,则从所述服务端获取到验证页面信息。
  6. 根据权利要求4所述的方法,其特征在于,所述方法还包括:
    若所述客户端与所述服务端之间已经建立连接,则从所述服务端或者所述客户端本地查询出所述已注册用户还未进行身份验证;或者,
    若所述客户端与所述服务端之间没有建立连接,且所述客户端与所述无人机建立连接,则从所述无人机或者所述客户端本地查询出所述已注册用户还未进行身份验证。
  7. 根据权利要求1所述的方法,其特征在于,所述接收用户在所述验证页面输入的用户标识和身份验证信息之后,所述方法还包括:
    将所述身份验证信息发送给所述无人机,以使所述无人机记录无人机标识码和所述身份验证信息的对应关系;或者,
    将所述用户标识和所述身份验证信息发送给所述无人机,以使所述无人机记录无人机标识码、所述用户标识和所述身份验证信息的对应关系。
  8. 根据权利要求7所述的方法,其特征在于,所述方法还包括:
    从所述无人机获取所述无人机标识码、所述用户标识和所述身份验证信息的对应关系,并将所述无人机标识码、所述用户标识和所述身份验证信息的对应关系发送给所述服务端,以使所述服务端记录所述无人机标识码、所述用户标识和所述身份验证信息的对应关系。
  9. 根据权利要求7所述的方法,其特征在于,所述方法还包括:
    从所述无人机获取所述无人机标识码和所述身份验证信息的对应关系;
    获取与所述身份验证信息对应的用户标识,并将所述无人机标识码、所述用户标识和所述身份验证信息的对应关系发送给所述服务端,以使所述服务端记录所述无人机标识码、所述用户标识和所述身份验证信息的对应关系。
  10. 根据权利要求9所述的方法,其特征在于,
    所述获取与所述身份验证信息对应的用户标识之后,所述方法还包括:
    若获取的用户标识与登录到所述客户端的用户标识相同,则将所述无人机标识码、所述用户标识和所述身份验证信息的对应关系发送给所述服务端。
  11. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    当用户未通过合法的用户标识登录到所述客户端时,则限制所述客户端的全部功能或者部分功能,并显示登录页面,以使用户通过用户标识登录。
  12. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    当用户通过合法的用户标识登录到所述客户端时,若所述用户标识还未进行身份验证,则限制所述无人机在指定区域内飞行,并显示认证页面,以使用户对所述用户标识进行身份验证。
  13. 根据权利要求12所述的方法,其特征在于,所述方法还包括:
    若所述客户端与所述服务端之间已经建立连接,则从所述服务端或者所述客户端本地查询出所述用户标识还未进行身份验证;或者,若所述客户端与所述服务端之间没有建立连接,且所述客户端与所述无人机建立连接,则从所述无人机或者所述客户端本地查询出所述用户标识还未进行身份验证。
  14. 根据权利要求12所述的方法,其特征在于,所述方法还包括:
    在限制所述无人机在指定区域内飞行之后,若所述用户标识已经进行身份验证,则解除所述无人机在所述指定区域内飞行的限制。
  15. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    在所述无人机起飞后,在特定频段广播所述无人机的飞行信息。
  16. 根据权利要求15所述的方法,其特征在于,
    所述飞行信息包括以下之一或者任意组合:用户标识、无人机标识码、飞行时间信息、飞行速度信息、起始位置信息、当前飞行区域信息。
  17. 根据权利要求1所述的方法,其特征在于,
    所述身份验证信息包括手机号,所述用户标识包括注册账号;其中,每个身份验证信息对应一个或者多个用户标识;每个身份验证信息对应一个或者多个无人机标识码;每个用户标识对应一个无人机标识码。
  18. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    当用户通过合法的用户标识登录到所述客户端时,将所述用户标识发送给所述无人机,以使所述无人机存储所述用户标识。
  19. 一种身份验证方法,其特征在于,应用于服务端,所述服务端与客户端进行通信,且所述客户端能够控制无人机,所述方法包括:
    将验证页面信息发送给客户端,以使所述客户端根据所述验证页面信息显示验证页面,并接收用户在所述验证页面输入的用户标识和身份验证信息; 其中,所述用户标识是用户通过所述客户端控制所述无人机的凭证;
    接收所述客户端发送的所述用户标识和所述身份验证信息;
    记录所述用户标识和所述身份验证信息的对应关系。
  20. 根据权利要求19所述的方法,其特征在于,所述方法还包括:
    接收所述客户端发送的无人机标识码,所述无人机标识码用于唯一标识所述无人机;
    记录所述用户标识、所述身份验证信息和所述无人机标识码的对应关系。
  21. 根据权利要求20所述的方法,其特征在于,所述方法还包括:
    在接收到来自客户端的请求消息后,从所述请求消息中解析出用户标识;
    若所述服务端本地记录有所述用户标识对应的身份验证信息,则将所述用户标识已经进行身份验证的信息发送给所述客户端;
    若所述服务端本地没有记录所述用户标识对应的身份验证信息,则将所述用户标识还未进行身份验证的信息发送给所述客户端。
  22. 根据权利要求20所述的方法,其特征在于,所述方法还包括:
    在接收到来自监管设备的请求消息后,从所述请求消息中解析出无人机标识码,并从所述服务端本地查询出所述无人机标识码对应的身份验证信息;
    将查询出的身份验证信息发送给所述监管设备。
  23. 根据权利要求19所述的方法,其特征在于,
    所述身份验证信息包括手机号,所述用户标识包括注册账号;其中,每个身份验证信息对应一个或者多个用户标识;每个身份验证信息对应一个或者多个无人机标识码;每个用户标识对应一个无人机标识码。
  24. 一种身份验证方法,其特征在于,应用于无人机,所述方法包括:
    接收客户端发送的身份验证信息;
    在本地记录无人机标识码和所述身份验证信息的对应关系,所述无人机标识码用于唯一标识无人机。
  25. 根据权利要求24所述的方法,其特征在于,所述方法还包括:
    接收客户端发送的用户标识和身份验证信息;
    在本地记录无人机标识码、所述用户标识和身份验证信息的对应关系。
  26. 根据权利要求25所述的方法,其特征在于,所述方法还包括:
    在接收到来自客户端的请求消息后,从所述请求消息中解析出用户标识;
    若所述无人机本地记录有所述用户标识对应的身份验证信息,则将所述用户标识已经进行身份验证的信息发送给所述客户端;
    若所述无人机本地没有记录所述用户标识对应的身份验证信息,则将所述用户标识还未进行身份验证的信息发送给所述客户端。
  27. 根据权利要求24所述的方法,其特征在于,所述方法还包括:
    在接收到来自监管设备的请求消息后,从所述请求消息中解析出无人机标识码,并从所述无人机本地查询出所述无人机标识码对应的身份验证信息;
    将查询出的身份验证信息发送给所述监管设备。
  28. 根据权利要求24所述的方法,其特征在于,所述方法还包括:
    接收客户端发送的登录到所述客户端的用户标识;
    在本地存储登录到所述客户端的用户标识。
  29. 根据权利要求24所述的方法,其特征在于,所述方法还包括:
    若本地没有记录无人机标识码和身份验证信息的对应关系,则限制所述无人机在指定区域内飞行;或者,禁止所述无人机起飞。
  30. 根据权利要求29所述的方法,其特征在于,
    所述限制所述无人机在指定区域内飞行之后,所述方法还包括:
    若本地记录有无人机标识码和身份验证信息的对应关系,则解除所述无人机在所述指定区域内飞行的限制。
  31. 根据权利要求24所述的方法,其特征在于,所述方法还包括:
    在所述无人机起飞后,在特定频段内广播所述无人机的飞行信息。
  32. 根据权利要求31所述的方法,其特征在于,
    所述飞行信息包括以下之一或者任意组合:用户标识、无人机标识码、飞行时间信息、飞行速度信息、起始位置信息、当前飞行区域信息。
  33. 根据权利要求24所述的方法,其特征在于,所述方法还包括:
    在本地存储所述无人机最近N次飞行时的飞行信息,N为大于1的整数。
  34. 根据权利要求24所述的方法,其特征在于,
    所述身份验证信息包括手机号,所述用户标识包括注册账号;其中,每个身份验证信息对应一个或者多个用户标识;每个身份验证信息对应一个或者多个无人机标识码;每个用户标识对应一个无人机标识码。
  35. 一种终端设备,其特征在于,所述终端设备能够与服务端进行通信,且所述终端设备能够控制无人机,所述终端设备包括:
    处理器,用于从所述服务端获取到验证页面信息,并根据所述验证页面信息显示验证页面;接收用户在所述验证页面输入的用户标识和身份验证信息,其中,所述用户标识是用户通过所述终端设备控制所述无人机的凭证;
    所述处理器,还用于将所述用户标识和所述身份验证信息发送给所述服务端,以使所述服务端记录所述用户标识和所述身份验证信息的对应关系。
  36. 根据权利要求35所述的终端设备,其特征在于,还包括:存储器;
    所述处理器,还用于获取无人机标识码,所述无人机标识码用于唯一标识所述无人机;将所述用户标识、所述身份验证信息和所述无人机标识码的对应关系记录到存储器,并将所述无人机标识码发送给服务端,以使所述服务端记录所述用户标识、所述身份验证信息和所述无人机标识码的对应关系;
    所述存储器,用于存储所述用户标识、所述身份验证信息和所述无人机标识码的对应关系。
  37. 根据权利要求35所述的终端设备,其特征在于,
    所述处理器,还用于在未注册用户的注册过程中,若所述未注册用户还未进行身份验证,则从所述服务端获取到验证页面信息;或者,
    在已注册用户的使用过程中,若所述已注册用户还未进行身份验证,且所述无人机当前未起飞,则从所述服务端获取到验证页面信息。
  38. 根据权利要求37所述的终端设备,其特征在于,所述处理器,还用于当所述终端设备与所述服务端之间建立连接时,从所述服务端或者所述终端设备查询出所述已注册用户还未进行身份验证;或者,当所述终端设备与 所述服务端之间没有建立连接,且所述终端设备与所述无人机建立连接时,从所述无人机或者所述终端设备查询出所述已注册用户还未进行身份验证。
  39. 根据权利要求35所述的终端设备,其特征在于,
    所述处理器,还用于将所述身份验证信息发送给所述无人机,以使所述无人机记录无人机标识码和所述身份验证信息的对应关系;或者,
    将所述用户标识和所述身份验证信息发送给所述无人机,以使所述无人机记录无人机标识码、所述用户标识和所述身份验证信息的对应关系。
  40. 根据权利要求39所述的终端设备,其特征在于,
    所述处理器,还用于从所述无人机获取所述无人机标识码、所述用户标识和所述身份验证信息的对应关系,并将所述无人机标识码、所述用户标识和所述身份验证信息的对应关系发送给所述服务端,以使所述服务端记录所述无人机标识码、所述用户标识和所述身份验证信息的对应关系;或者,
    从所述无人机获取所述无人机标识码和所述身份验证信息的对应关系;获取与所述身份验证信息对应的用户标识,并将所述无人机标识码、所述用户标识和所述身份验证信息的对应关系发送给所述服务端,以使所述服务端记录所述无人机标识码、所述用户标识和所述身份验证信息的对应关系。
  41. 根据权利要求35所述的终端设备,其特征在于,
    所述处理器,还用于当用户未通过合法的用户标识登录到所述终端设备时,则限制所述终端设备的全部功能或者部分功能,并显示登录页面,以使用户通过用户标识登录;或者,当用户通过合法的用户标识登录到所述终端设备时,若所述用户标识还未进行身份验证,则限制所述无人机在指定区域内飞行,并显示认证页面,以使用户对所述用户标识进行身份验证。
  42. 根据权利要求35所述的终端设备,其特征在于,
    所述处理器,还用于在所述无人机起飞后,在特定频段广播所述无人机的飞行信息;所述飞行信息包括以下之一或者任意组合:用户标识、无人机标识码、飞行时间信息、飞行速度信息、起始位置信息、当前飞行区域信息。
  43. 根据权利要求35所述的终端设备,其特征在于,
    所述处理器,还用于当用户通过合法的用户标识登录到所述客户端时,将所述用户标识发送给所述无人机,以使所述无人机存储所述用户标识。
  44. 一种服务端,其特征在于,所述服务端与客户端进行通信,且所述客户端能够控制无人机,所述服务端包括:
    处理器,用于将验证页面信息发送给所述客户端,以使所述客户端根据所述验证页面信息显示验证页面,并接收用户在所述验证页面输入的用户标识和身份验证信息;其中,所述用户标识是用户通过所述客户端控制所述无人机的凭证;接收所述客户端发送的所述用户标识和所述身份验证信息,并将所述用户标识和所述身份验证信息的对应关系记录到存储器;
    存储器,用于存储所述用户标识和所述身份验证信息的对应关系。
  45. 根据权利要求44所述的服务端,其特征在于,
    所述处理器,还用于接收所述客户端发送的无人机标识码,所述无人机标识码用于唯一标识所述无人机;将所述用户标识、所述身份验证信息和所述无人机标识码的对应关系记录到所述存储器;
    所述存储器,还用于存储所述用户标识、所述身份验证信息和所述无人机标识码的对应关系。
  46. 根据权利要求45所述的服务端,其特征在于,
    所述处理器,还用于在接收到来自监管设备的请求消息后,从所述请求消息中解析出无人机标识码,并从所述存储器查询出所述无人机标识码对应的身份验证信息;将查询出的身份验证信息发送给所述监管设备。
  47. 一种无人机,其特征在于,所述无人机包括:
    处理器,用于接收客户端发送的身份验证信息,并将无人机标识码和身份验证信息的对应关系记录到存储器,无人机标识码用于唯一标识无人机;
    存储器,用于存储所述无人机标识码和所述身份验证信息的对应关系。
  48. 根据权利要求47所述的无人机,其特征在于,
    所述处理器,还用于接收客户端发送的用户标识和身份验证信息,并将无人机标识码、所述用户标识和所述身份验证信息的对应关系记录到存储器;
    所述存储器,还用于存储所述无人机标识码、所述用户标识和所述身份验证信息的对应关系。
  49. 根据权利要求48所述的无人机,其特征在于,
    所述处理器,还用于在接收到来自监管设备的请求消息后,从所述请求消息中解析出无人机标识码,并从所述存储器查询出所述无人机标识码对应的身份验证信息;将查询出的身份验证信息发送给所述监管设备。
  50. 根据权利要求47所述的无人机,其特征在于,
    所述处理器,还用于接收客户端发送的登录到所述客户端的用户标识,并将登录到所述客户端的用户标识记录到所述存储器;
    所述存储器,还用于存储登录到所述客户端的用户标识。
  51. 根据权利要求47所述的无人机,其特征在于,所述处理器,还用于当所述存储器没有存储无人机标识码和身份验证信息的对应关系时,则限制所述无人机在指定区域内飞行;或者,禁止所述无人机起飞;在限制所述无人机在指定区域内飞行之后,当所述存储器存储有无人机标识码和身份验证信息的对应关系时,则解除所述无人机在所述指定区域内飞行的限制。
  52. 根据权利要求47所述的无人机,其特征在于,所述处理器,还用于在所述无人机起飞后,在特定频段内广播所述无人机的飞行信息;其中,所述飞行信息包括以下之一或者任意组合:用户标识、无人机标识码、飞行时间信息、飞行速度信息、起始位置信息、当前飞行区域信息。
  53. 根据权利要求47所述的无人机,其特征在于,
    所述处理器,还用于将所述无人机最近N次飞行时的飞行信息记录到所述存储器;其中,所述N为大于1的整数;
    所述存储器,还用于存储所述无人机最近N次飞行时的飞行信息。
  54. 一种机器可读存储介质,其特征在于,应用于终端设备,所述终端设备能够与服务端进行通信,所述终端设备能够控制无人机,所述机器可读存储介质上存储有若干计算机指令,所述计算机指令被执行时进行如下处理:
    从所述服务端获取到验证页面信息,并根据所述验证页面信息显示验证 页面;接收用户在所述验证页面输入的用户标识和身份验证信息,其中,所述用户标识是用户通过所述终端设备控制所述无人机的凭证;
    将所述用户标识和所述身份验证信息发送给所述服务端,以使所述服务端记录所述用户标识和所述身份验证信息的对应关系。
  55. 根据权利要求54所述的机器可读存储介质,其特征在于,
    所述计算机指令被执行时还进行如下处理:
    获取无人机标识码,所述无人机标识码用于唯一标识所述无人机;
    将所述用户标识、所述身份验证信息和所述无人机标识码的对应关系记录到存储器,并将所述无人机标识码发送给服务端,以使所述服务端记录所述用户标识、所述身份验证信息和所述无人机标识码的对应关系。
  56. 根据权利要求54所述的机器可读存储介质,其特征在于,
    所述计算机指令被执行时还进行如下处理:
    在未注册用户的注册过程中,若所述未注册用户还未进行身份验证,则从所述服务端获取到验证页面信息;或者,
    在已注册用户的使用过程中,若所述已注册用户还未进行身份验证,且所述无人机当前未起飞,则从所述服务端获取到验证页面信息。
  57. 根据权利要求54所述的机器可读存储介质,其特征在于,
    所述计算机指令被执行时还进行如下处理:
    当所述终端设备与所述服务端之间建立连接时,从所述服务端或者所述终端设备查询出所述已注册用户还未进行身份验证;或者,当所述终端设备与所述服务端之间没有建立连接,且所述终端设备与所述无人机建立连接时,从所述无人机或者所述终端设备查询出所述已注册用户还未进行身份验证。
  58. 根据权利要求54所述的机器可读存储介质,其特征在于,
    所述计算机指令被执行时还进行如下处理:
    将所述身份验证信息发送给所述无人机,以使所述无人机记录无人机标识码和所述身份验证信息的对应关系;或者,
    将所述用户标识和所述身份验证信息发送给所述无人机,以使所述无人 机记录无人机标识码、所述用户标识和所述身份验证信息的对应关系。
  59. 根据权利要求54所述的机器可读存储介质,其特征在于,
    所述计算机指令被执行时还进行如下处理:
    从所述无人机获取所述无人机标识码、所述用户标识和所述身份验证信息的对应关系,并将所述无人机标识码、所述用户标识和所述身份验证信息的对应关系发送给所述服务端,以使所述服务端记录所述无人机标识码、所述用户标识和所述身份验证信息的对应关系;或者,
    从所述无人机获取所述无人机标识码和所述身份验证信息的对应关系;获取与所述身份验证信息对应的用户标识,并将所述无人机标识码、所述用户标识和所述身份验证信息的对应关系发送给所述服务端,以使所述服务端记录所述无人机标识码、所述用户标识和所述身份验证信息的对应关系。
  60. 根据权利要求54所述的机器可读存储介质,其特征在于,
    所述计算机指令被执行时还进行如下处理:
    当用户未通过合法的用户标识登录到所述终端设备时,则限制所述终端设备的全部功能或者部分功能,并显示登录页面,以使用户通过用户标识登录;或者,当用户通过合法的用户标识登录到所述终端设备时,若所述用户标识还未进行身份验证,则限制所述无人机在指定区域内飞行,并显示认证页面,以使用户对所述用户标识进行身份验证。
  61. 一种机器可读存储介质,其特征在于,应用于服务端,所述服务端与客户端进行通信,且所述客户端能够控制无人机,所述机器可读存储介质上存储有若干计算机指令,所述计算机指令被执行时进行如下处理:
    将验证页面信息发送给所述客户端,以使所述客户端根据所述验证页面信息显示验证页面,并接收用户在所述验证页面输入的用户标识和身份验证信息;其中,所述用户标识是用户通过所述客户端控制所述无人机的凭证;
    接收所述客户端发送的所述用户标识和所述身份验证信息;
    将所述用户标识和所述身份验证信息的对应关系记录到存储器。
  62. 根据权利要求61所述的机器可读存储介质,其特征在于,
    所述计算机指令被执行时还进行如下处理:接收所述客户端发送的无人机标识码,所述无人机标识码用于唯一标识所述无人机;将所述用户标识、所述身份验证信息和所述无人机标识码的对应关系记录到所述存储器。
  63. 根据权利要求62所述的机器可读存储介质,其特征在于,
    所述计算机指令被执行时还进行如下处理:
    在接收到来自监管设备的请求消息后,从所述请求消息中解析出无人机标识码,并从所述存储器查询出所述无人机标识码对应的身份验证信息;
    将查询出的身份验证信息发送给所述监管设备。
  64. 一种机器可读存储介质,其特征在于,应用于无人机,机器可读存储介质上存储有若干计算机指令,所述计算机指令被执行时进行如下处理:
    接收客户端发送的身份验证信息,并将无人机标识码和身份验证信息的对应关系记录到存储器,无人机标识码用于唯一标识无人机。
  65. 根据权利要求64所述的机器可读存储介质,其特征在于,
    所述计算机指令被执行时还进行如下处理:
    接收客户端发送的用户标识和身份验证信息,并将无人机标识码、所述用户标识和所述身份验证信息的对应关系记录到存储器。
  66. 根据权利要求64所述的机器可读存储介质,其特征在于,
    所述计算机指令被执行时还进行如下处理:
    在接收到来自监管设备的请求消息后,从所述请求消息中解析出无人机标识码,并从所述存储器查询出所述无人机标识码对应的身份验证信息;
    将查询出的身份验证信息发送给所述监管设备。
  67. 根据权利要求64所述的机器可读存储介质,其特征在于,
    所述计算机指令被执行时还进行如下处理:
    当所述存储器没有存储无人机标识码和身份验证信息的对应关系时,则限制所述无人机在指定区域内飞行;或者,禁止所述无人机起飞;在限制所述无人机在指定区域内飞行之后,当所述存储器存储有无人机标识码和身份验证信息的对应关系时,则解除所述无人机在所述指定区域内飞行的限制。
  68. 一种身份验证系统,其特征在于,所述系统包括客户端、服务端和无人机;所述客户端能够与服务端进行通信,所述客户端能够控制无人机;
    所述客户端,用于从所述服务端获取到验证页面信息,并根据所述验证页面信息显示验证页面;接收用户在所述验证页面输入的用户标识和身份验证信息;其中,所述用户标识是用户通过所述客户端控制所述无人机的凭证;将所述用户标识和所述身份验证信息发送给所述服务端;
    所述服务端,用于将所述验证页面信息发送给所述客户端,并接收所述客户端发送的所述用户标识和所述身份验证信息,并记录所述用户标识和所述身份验证信息的对应关系。
  69. 根据权利要求68所述的系统,其特征在于,
    所述客户端,还用于获取无人机标识码,所述无人机标识码用于唯一标识所述无人机;记录所述用户标识、所述身份验证信息和所述无人机标识码的对应关系;将所述无人机标识码发送给所述服务端;
    所述服务端,还用于接收所述客户端发送的无人机标识码,并记录所述用户标识、所述身份验证信息和所述无人机标识码的对应关系。
  70. 根据权利要求68所述的系统,其特征在于,
    所述客户端,还用于将所述身份验证信息发送给所述无人机;或者,将所述用户标识和所述身份验证信息发送给所述无人机;
    所述无人机,用于接收客户端发送的身份验证信息,记录无人机标识码和所述身份验证信息的对应关系;或者,接收客户端发送的用户标识和身份验证信息,记录无人机标识码、所述用户标识和身份验证信息的对应关系。
PCT/CN2017/085081 2017-05-19 2017-05-19 身份验证方法、设备、机器可读存储介质以及系统 WO2018209683A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201780004580.3A CN108702356A (zh) 2017-05-19 2017-05-19 身份验证方法、设备、机器可读存储介质以及系统
PCT/CN2017/085081 WO2018209683A1 (zh) 2017-05-19 2017-05-19 身份验证方法、设备、机器可读存储介质以及系统

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/085081 WO2018209683A1 (zh) 2017-05-19 2017-05-19 身份验证方法、设备、机器可读存储介质以及系统

Publications (1)

Publication Number Publication Date
WO2018209683A1 true WO2018209683A1 (zh) 2018-11-22

Family

ID=63843753

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/085081 WO2018209683A1 (zh) 2017-05-19 2017-05-19 身份验证方法、设备、机器可读存储介质以及系统

Country Status (2)

Country Link
CN (1) CN108702356A (zh)
WO (1) WO2018209683A1 (zh)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111198737A (zh) * 2019-12-16 2020-05-26 上海淇玥信息技术有限公司 基于用户状态特征的页面展示方法及其装置、系统、服务器、存储介质
CN111259369A (zh) * 2018-12-03 2020-06-09 北京京东尚科信息技术有限公司 一种人机身份验证方法和系统
CN111814014A (zh) * 2019-04-10 2020-10-23 阿里巴巴集团控股有限公司 信息交互方法、设备以及存储介质
CN112235729A (zh) * 2020-10-13 2021-01-15 中国联合网络通信集团有限公司 网联无人机的控制方法、系统、终端设备及存储介质
CN112734273A (zh) * 2021-01-19 2021-04-30 北京三快在线科技有限公司 无人机配送系统、控制方法及控制装置、电子设备

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020087210A1 (zh) * 2018-10-29 2020-05-07 深圳市大疆创新科技有限公司 无人机控制方法、无人机及控制无人机的终端
CN110661564A (zh) * 2018-11-17 2020-01-07 珠海市磐石电子科技有限公司 一种行驶装置的监控方法及辅助监控装置
CN109886017A (zh) * 2019-01-24 2019-06-14 国网浙江省电力有限公司电力科学研究院 一种基于c4.5决策树的手机特征检测优化改进算法
CN110392049A (zh) * 2019-07-10 2019-10-29 同济大学 机载无人机身份识别模块与实名认证方法
CN112584344B (zh) * 2019-09-30 2022-06-14 华为技术有限公司 无人机的身份标识认证方法、相关装置及系统
WO2021072763A1 (zh) * 2019-10-18 2021-04-22 深圳市大疆创新科技有限公司 无人机激活方法、无人机解绑方法、设备及存储介质
CN114600487B (zh) * 2019-11-04 2023-12-08 华为技术有限公司 身份认证方法及通信装置
CN112513765A (zh) * 2020-02-26 2021-03-16 深圳市大疆创新科技有限公司 信息处理方法、电子设备、信息处理系统和可读存储介质
CN112579232B (zh) * 2020-12-09 2022-05-10 珠海格力电器股份有限公司 内容显示方法、装置、电子设备及计算机存储介质
WO2022126381A1 (zh) * 2020-12-15 2022-06-23 深圳市大疆创新科技有限公司 无人机丢失认证方法和系统、终端设备及遥控设备
WO2022193124A1 (zh) * 2021-03-16 2022-09-22 深圳市大疆创新科技有限公司 控制方法、丢失认证方法、系统、设备及存储介质
CN115774456A (zh) * 2021-09-06 2023-03-10 北京三快在线科技有限公司 一种无人机的控制方法及装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104936180A (zh) * 2015-06-26 2015-09-23 陈昊 一种针对无人机和地面站提供鉴权服务的鉴权系统及方法
CN105025014A (zh) * 2015-06-18 2015-11-04 顺丰科技有限公司 无人机启用方法、系统及装置
CN106060079A (zh) * 2016-07-11 2016-10-26 顺丰科技有限公司 无人机认证系统及方法
US20170011340A1 (en) * 2015-07-08 2017-01-12 Ebay Inc. Public transport infrastructure facilitated drone delivery
CN106686013A (zh) * 2017-03-10 2017-05-17 湖北天专科技有限公司 一种无人飞行器身份识别装置、识别系统及其识别方法

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9467828B2 (en) * 2013-11-08 2016-10-11 Gogo Llc Systems and methods for configuring an electronic device for cellular-based communications
WO2016154949A1 (en) * 2015-03-31 2016-10-06 SZ DJI Technology Co., Ltd. Authentication systems and methods for generating flight regulations
CN104955047B (zh) * 2015-06-26 2018-08-07 陈昊 一种针对无人机提供鉴权服务的鉴权中心及鉴权方法
GB2542474A (en) * 2015-07-17 2017-03-22 Relmatech Ltd An aircraft controlled by a secure integrated airspace management system
CN105608930B (zh) * 2016-02-03 2018-11-30 辽宁猎鹰航空科技有限公司 无人机安全管理系统及方法
CN105843183A (zh) * 2016-03-10 2016-08-10 赛度科技(北京)有限责任公司 一种基于4g/wifi网络通讯技术的无人机综合运行管理系统
CN205656502U (zh) * 2016-05-09 2016-10-19 王彦成 无人机管控装置及相应的系统
CN106652568A (zh) * 2016-12-30 2017-05-10 中国人民解放军国防科学技术大学 一种无人机空管系统接入方法及系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105025014A (zh) * 2015-06-18 2015-11-04 顺丰科技有限公司 无人机启用方法、系统及装置
CN104936180A (zh) * 2015-06-26 2015-09-23 陈昊 一种针对无人机和地面站提供鉴权服务的鉴权系统及方法
US20170011340A1 (en) * 2015-07-08 2017-01-12 Ebay Inc. Public transport infrastructure facilitated drone delivery
CN106060079A (zh) * 2016-07-11 2016-10-26 顺丰科技有限公司 无人机认证系统及方法
CN106686013A (zh) * 2017-03-10 2017-05-17 湖北天专科技有限公司 一种无人飞行器身份识别装置、识别系统及其识别方法

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111259369A (zh) * 2018-12-03 2020-06-09 北京京东尚科信息技术有限公司 一种人机身份验证方法和系统
CN111259369B (zh) * 2018-12-03 2024-04-12 北京京东尚科信息技术有限公司 一种人机身份验证方法和系统
CN111814014A (zh) * 2019-04-10 2020-10-23 阿里巴巴集团控股有限公司 信息交互方法、设备以及存储介质
CN111814014B (zh) * 2019-04-10 2024-02-02 阿里巴巴集团控股有限公司 信息交互方法、设备以及存储介质
CN111198737A (zh) * 2019-12-16 2020-05-26 上海淇玥信息技术有限公司 基于用户状态特征的页面展示方法及其装置、系统、服务器、存储介质
CN112235729A (zh) * 2020-10-13 2021-01-15 中国联合网络通信集团有限公司 网联无人机的控制方法、系统、终端设备及存储介质
CN112235729B (zh) * 2020-10-13 2023-06-27 中国联合网络通信集团有限公司 网联无人机的控制方法、系统、终端设备及存储介质
CN112734273A (zh) * 2021-01-19 2021-04-30 北京三快在线科技有限公司 无人机配送系统、控制方法及控制装置、电子设备

Also Published As

Publication number Publication date
CN108702356A (zh) 2018-10-23

Similar Documents

Publication Publication Date Title
WO2018209683A1 (zh) 身份验证方法、设备、机器可读存储介质以及系统
US20230021634A1 (en) OTA System Software Upgrade Control Method and Terminal Device
US9894526B2 (en) Mobile applications using vehicle telematics data
CN107331213B (zh) 一种无人机监管方法、系统
US9936390B2 (en) Method and apparatus of triggering applications in a wireless environment
KR102112106B1 (ko) 서비스 계층 동적 권한부여
US20190103030A1 (en) Aerial vehicle identification beacon and reader system
US20220286847A1 (en) Method for pairing a mobile device with a wireless network
US20150350820A1 (en) Beacon additional service of electronic device and electronic device for same background arts
US8923817B2 (en) Mobility device security
US10111025B2 (en) Service providing terminal connection method and apparatus
US20220263815A1 (en) Multiple application authentication
US20150248640A1 (en) 3d model and beacon for automatic delivery of goods
KR102279136B1 (ko) 드론,드론 관리 서버 및 이들에 의한 드론의 비행 제어 방법
US10560844B2 (en) Authentication of users for securing remote controlled devices
US10993090B2 (en) Network access method, apparatus, and system
WO2018228386A1 (zh) 信息传输的方法及无人机、非暂态计算机可读存储介质、计算机程序产品和电子设备
US11238147B2 (en) Methods and systems for verifying applications
US20160065553A1 (en) Method, system and recording medium for service account authentication
US11363017B2 (en) Smart home network security through blockchain
US20210064756A1 (en) Methods and systems for verifying applications
CN115136625A (zh) 一种车机系统登录方法及相关装置
EP3315405A1 (en) Collaborative security system to control drones
US20240056292A1 (en) Electronic device for providing bidirectional key exchange protocol on basis of location and operation method thereof
US20220329615A1 (en) Method of processing network security policy of electronic device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17910290

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17910290

Country of ref document: EP

Kind code of ref document: A1