WO2022126381A1 - 无人机丢失认证方法和系统、终端设备及遥控设备 - Google Patents
无人机丢失认证方法和系统、终端设备及遥控设备 Download PDFInfo
- Publication number
- WO2022126381A1 WO2022126381A1 PCT/CN2020/136547 CN2020136547W WO2022126381A1 WO 2022126381 A1 WO2022126381 A1 WO 2022126381A1 CN 2020136547 W CN2020136547 W CN 2020136547W WO 2022126381 A1 WO2022126381 A1 WO 2022126381A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- drone
- remote control
- identification information
- remote controller
- information
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 139
- 238000012986 modification Methods 0.000 claims abstract description 32
- 230000004048 modification Effects 0.000 claims abstract description 32
- 230000004044 response Effects 0.000 claims abstract description 32
- 238000012790 confirmation Methods 0.000 claims description 37
- 238000004590 computer program Methods 0.000 claims description 35
- 230000006399 behavior Effects 0.000 claims description 8
- 230000000694 effects Effects 0.000 claims description 8
- 230000004913 activation Effects 0.000 claims description 7
- 238000010586 diagram Methods 0.000 description 8
- 230000008450 motivation Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- RZVHIXYEVGDQDX-UHFFFAOYSA-N 9,10-anthraquinone Chemical compound C1=CC=C2C(=O)C3=CC=CC=C3C(=O)C2=C1 RZVHIXYEVGDQDX-UHFFFAOYSA-N 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000013507 mapping Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Definitions
- the present application relates to the technical field of unmanned aerial vehicles, and in particular, to a method and system for authenticating the loss of an unmanned aerial vehicle, a method for authenticating the loss of a mobile device, a terminal device, a remote control device, and a computer-readable storage medium.
- UAVs At present, there are more and more applications of UAVs, for example, it is widely used in aerial photography, surveying and mapping and other fields, and its technology is becoming more and more mature.
- sensor technology obstacle avoidance algorithms and flight control, it is difficult to avoid flight failures such as drone bombing and signal loss during the flight of the drone. How to carry out the loss certification after the loss problem caused by the flight failure has become an urgent problem in the field of UAVs.
- the embodiments of the present application provide a method for authenticating the loss of an unmanned aerial vehicle, and one of the purposes is to solve the technical problem of how to authenticate the loss of an unmanned aerial vehicle.
- a first aspect of the embodiments of the present application provides a method for authenticating the loss of an unmanned aerial vehicle, which is applied to a terminal device, including:
- the operation of losing authentication is performed, and it is determined that the remote controller currently connected to the terminal device is the first remote controller that is uniquely bound to the first drone, and the first drone can only be used by the first drone.
- the only bound first remote control control is the first remote controller that is uniquely bound to the first drone, and the first drone can only be used by the first drone.
- Data modification is performed on the first remote controller according to the identification information of the first drone, so as to eliminate the ability of the first remote controller to control the first drone.
- a second aspect of the embodiments of the present application provides a method for authenticating the loss of an unmanned aerial vehicle, which is applied to a terminal device, including:
- the operation of losing authentication is performed, and it is determined that the remote controller currently connected to the terminal device is the first remote controller that is uniquely bound to the first drone recorded in the server, and the first drone only has can be controlled by the uniquely bound first remote controller;
- a third aspect of the embodiments of the present application provides a method for authenticating the loss of an unmanned aerial vehicle, which is applied to a remote control device, including:
- the operation of losing authentication is performed, and it is determined that the remote control device is the first remote control device that is uniquely bound to the first drone, and the first drone can only be bound by the uniquely bound first remote control device.
- Data modification is performed on the first remote control device according to the identification information of the first drone, so as to eliminate the ability of the first remote control device to control the first drone.
- a fourth aspect of the embodiments of the present application provides a method for authenticating the loss of a mobile device, which is applied to a terminal device, including:
- the remote controller currently connected to the terminal device is the first remote controller that is uniquely bound to the first movable device, and the first movable device can only be used by the The only bound first remote control control;
- Data modification is performed on the first remote controller according to the identification information of the first movable device, so as to eliminate the ability of the first remote controller to control the first movable device.
- a fifth aspect of the embodiments of the present application provides a terminal device, including: a processor and a memory storing a computer program, the processor implementing the method for authenticating the loss of a drone provided in the first aspect above when the processor executes the computer program.
- a sixth aspect of the embodiments of the present application provides a terminal device, including: a processor and a memory storing a computer program, the processor implements the method for authenticating the loss of an unmanned aerial vehicle provided in the second aspect when the processor executes the computer program.
- a seventh aspect of an embodiment of the present application provides a terminal device, including: a processor and a memory storing a computer program, where the processor implements the method for authenticating the loss of a drone provided in the third aspect when the processor executes the computer program.
- An eighth aspect of the embodiments of the present application is a system for authenticating the loss of an unmanned aerial vehicle, including: a terminal device, a remote control, and a server, wherein the terminal device is respectively connected to the remote control and the server;
- the server pre-records the binding information of the first drone and the first remote controller, wherein the first drone is uniquely bound to the first remote controller and can only be controlled by the first remote controller , the binding information includes at least the identification information of the first drone and the identification information of the first remote controller;
- the terminal device is used to obtain the user's operation of confirming the loss authentication of the first drone on the display interface; in response to the confirmation of the loss authentication operation, obtain the first remote control from the server identification information of the first remote control, and determine whether the currently connected remote control is the first remote control according to the identification information of the first remote control; if it is determined that the remote control is the first remote control, from the The server obtains the identification information of the first drone, and modifies the data of the first remote controller according to the identification information of the first drone, so as to eliminate the effect of the first remote controller on the first remote controller. The control ability of the drone; the result of the data modification is fed back to the server to complete the authentication.
- a ninth aspect of the embodiments of the present application provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, implements the method for authenticating the loss of an unmanned aerial vehicle provided in the first aspect above .
- a tenth aspect of the embodiments of the present application provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, implements the method for authenticating the loss of an unmanned aerial vehicle provided in the second aspect above .
- An eleventh aspect of the embodiments of the present application provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, realizes the UAV loss authentication provided in the third aspect above method.
- the UAV authentication loss method provided by the embodiment of the present application can eliminate the control of the first UAV by the first remote controller that is uniquely bound to the first UAV after the user requests for the loss authentication of the first UAV
- the first drone still only "recognizes" the first remote control, that is, only the first remote control is allowed to control it, the first remote control has lost the ability to control the first drone , at this time, the first drone is equivalent to a locked state without any remote control, which effectively realizes the loss authentication of the first drone, so that the user has no motivation to cheat insurance, and can Successfully certified drones can settle claims, which improves the quality of after-sales service.
- FIG. 1 is a flowchart of a first method for authenticating the loss of a drone provided by an embodiment of the present application.
- FIG. 2 to FIG. 8 are respectively diagrams 1 to 7 of the interactive interface provided by the embodiment of the present application.
- FIG. 9 is a flowchart of a second method for losing authentication of an unmanned aerial vehicle provided by an embodiment of the present application.
- FIG. 10 is a flowchart of a third UAV authentication loss method provided by an embodiment of the present application.
- FIG. 11 is a flowchart of a method for a mobile device authentication loss provided by an embodiment of the present application.
- FIG. 12 is a schematic structural diagram of a terminal device provided by an embodiment of the present application.
- FIG. 13 is a schematic structural diagram of a remote control device provided by an embodiment of the present application.
- After-sales service is a variety of services provided after the product is sold. When people buy a product, they not only pay attention to the product itself, but also pay attention to the after-sales service of the product. Products with good after-sales service can improve the market competitiveness of the product to a certain extent. . After-sales service of drones is an important factor for users to consider when purchasing drones. After purchasing a drone, in order to obtain better after-sales service, users can also purchase after-sales service products for drones, such as DJI Care. After purchasing drone after-sales service products, users can enjoy more comprehensive warranty services, so that they can use drones with more confidence.
- Drone loss happens from time to time.
- the drone may fall due to a collision during flight, lose contact due to poor signal, or force a landing due to insufficient power.
- the drone may fall or
- the landing location may be a place that is difficult for the user to find, or a place that the user cannot reach, such as a cliff, so that the user will not be able to provide the physical object of the drone when requesting a claim, and it is considered that the drone is lost. claims.
- the embodiment of the present application provides a method for authenticating the loss of a drone, which can remotely lock the drone so that it cannot be controlled by any remote control, effectively realizing the loss of the drone. Certification.
- FIG. 1 is a flowchart of a first method for authenticating the loss of a drone provided by an embodiment of the present application.
- the method can be applied to a terminal device, and the method can include the following steps:
- S102 Acquire an operation of the user confirming the loss authentication of the first drone on the display interface of the terminal device.
- S104 Perform the loss authentication operation in response to the confirmation, and determine that the remote controller currently connected to the terminal device is the first remote controller that is uniquely bound to the first drone.
- S106 Perform data modification on the first remote controller according to the identification information of the first drone, so as to eliminate the ability of the first remote controller to control the first drone.
- the terminal device may be any smart device such as a mobile phone, a tablet, a computer, etc.
- an application program may be installed on the terminal device, and the method for authenticating the loss of a drone provided by the embodiment of the present application may be implemented through the application program. .
- the binding of the first drone to the first remote control is done before the authentication is lost.
- the user can first establish a connection between the first drone, the first remote controller, and the terminal device, and realize the connection between the first drone and the first drone by performing corresponding operations on the display interface of the terminal device. Binding of the remote control.
- the user's operation may be a touch operation, an operation on a physical key, or a gesture operation or the like.
- the terminal device may establish a binding relationship between the first drone and the first remote controller after acquiring the user's operation of confirming binding of the first drone and the first remote controller on the display interface.
- first implementation When establishing the binding relationship between the first drone and the first remote controller, there can be multiple implementations, and two implementations are provided here, which can be referred to as the first implementation and the second implementation for convenience. implementation.
- the identification information of the first remote control can be obtained from the first remote control, and the identification information of the first remote control can be written into the first drone to complete the first drone and the first remote control.
- the only binding for the device After recording the identification information of the first remote controller, the first drone can determine whether the remote controller currently requested to be connected is the first remote controller according to the recorded identification information of the first remote controller every time it is connected to the remote controller. , if it is, the connection can be established and the control of the remote control can be accepted, otherwise the connection can be refused to realize the unique binding effect that only the first remote control can control the first drone.
- the identification information of the first drone obtained from the first drone can also be written into the first remote controller .
- the first drone and the first remote controller can write each other's identification information to each other.
- the first drone can only be uniquely bound to the first remote control, that is, the first drone can only write the identification information of one remote control, and the first remote control can not only be bound
- One drone can be bound to multiple drones, specifically, the identification information of multiple drones can be written in the first remote control.
- the first drone and the first remote control have written each other's identification information
- the first drone when the first drone is connected to any remote control, it can determine the current status according to the identification information of the first remote control recorded by itself. Whether the connected remote control is the first remote control, if so, the connection can be established; otherwise, the connection can be refused.
- the first remote control when the first remote control is connected to any drone, it can also determine whether the currently connected drone is the first drone according to the identification information of the first drone recorded by itself, and if so, The connection is established, otherwise the connection can be refused.
- both the first drone and the first remote controller need to verify each other's identification information during the mutual connection process, and if the mutual verification is successful, they are connected to each other.
- the binding relationship between the first drone and the first remote controller needs to be recorded in the server. Specifically, when the terminal device confirms to bind the first drone and the first remote controller according to the user's operation, the terminal device can obtain the corresponding binding information and send it to the server, so that the server can record the binding relationship.
- the binding information may include at least the identification information of the first drone and the identification information of the first remote controller, so that the server can establish a binding relationship between the first drone and the first remote controller.
- the server may establish a binding relationship among the currently logged-in user account, the first drone, and the first remote controller.
- the user Before binding the three, the user first registers a user account, and after connecting the first drone through the first remote control, obtains the identification information of the first drone, and binds the user account with the first drone Certainly. Then, based on the binding operation between the first remote control and the first drone, the identification information of the first remote control and the identification information of the first drone are obtained, and the currently logged-in user account, the first drone and the first drone are linked.
- the three remote controllers establish a binding relationship.
- the user can perform loss authentication for the first drone.
- the loss authentication in order to lock the first drone, the ability to control the first drone by the first remote controller that is uniquely bound to the first drone can be eliminated.
- the first drone since the first drone has already It cannot be controlled by a remote control other than the first remote control, and the first remote control cannot control the first drone after the loss authentication, so the first drone will be in a locked state where no remote control can be controlled, effectively realizing the
- the user has no incentive to cheat insurance, and can make claims for the lost drone that has been successfully authenticated.
- the operation of losing authentication includes an unbinding operation.
- the terminal device modifies the data of the first remote controller according to the identification information of the first drone, so as to unbind the first drone and the first remote controller, thereby Eliminate the ability of the first remote control to control the first drone
- the identification information of the first remote control bound to the first drone can be obtained from the server, and the identification information of the currently connected remote control can be obtained. By comparing the identification information of the currently connected remote control with the first remote control The identification information of the remote control is compared to determine whether the currently connected remote control is the first remote control. When it is determined that the currently connected remote control is the first remote control, the ability of the first remote control to operate on the first drone can be eliminated.
- the ability of the first remote controller to control the first drone is eliminated, that is, when the first remote controller is released from the binding relationship with the first drone, it can be achieved by modifying the data of the first remote controller. Specifically, in one embodiment, if the binding relationship between the first remote controller and the first drone is established through the first embodiment, that is, only the first drone is written with the first
- the identification information of a remote controller if the first remote controller does not write the identification information of the first drone, the identification information of the first drone recorded during binding can be obtained from the server, and the first drone's identification information can be obtained from the server.
- the identification information is written into the control blacklist of the first remote controller, so that the first remote controller loses the ability to control the first drone.
- the control blacklist may be pre-configured in the remote controller to store the identification information of the drone that the remote controller refuses to control.
- the first drone may be lost after the user's confirmation is obtained.
- a prompt message for prompting the user to send the first remote control back to the after-sales department is displayed on the display interface of the terminal device. Since the first drone is uniquely bound to the first remote control, by making the user send the first remote control back to the after-sales department, the user can lose the only means to control the first drone, and realize the control of the first drone. Lost authentication of the machine to achieve the effect of anti-fraud protection.
- the binding relationship between the first remote controller and the first drone is established through the second embodiment, that is, the first drone and the first remote controller have both written
- the identification information of the other party when the ability of the first remote control to control the first drone is eliminated, the identification information of the first drone recorded in the first remote control can be erased, so that the first remote control will not be able to Matches with the first drone, and loses the ability to control the first drone.
- the identification information of multiple drones may be recorded in the first remote controller, in order to avoid mistaken erasure, the identification information of the first drone recorded during binding can be obtained from the server, and based on the first The identification information of the man-machine erases the identification information recorded in the first remote controller.
- the account currently logged in by the user may be bound to multiple drones.
- the terminal device can obtain the selected drone from the server according to the user's selected operation on the drone.
- the server can directly send the identification information of the bound drone to the terminal device.
- the man-machine control ability needs to rewrite the identification information of the first drone into the first remote controller. Since data writing is relatively difficult, it can be ensured that the first drone is in a locked state that no remote control can control, effective loss authentication can be performed on the first drone, and a good anti-fraud effect is achieved.
- a message of successful data modification may be sent to the server, and the server may record that the first drone is in a lost or locked state based on the message of successful data modification , here, after the first drone is recorded as lost or locked, all business involving the first drone will be restricted or denied by the server.
- the server can return a successful recording message to the terminal device, and the terminal device can display the information about the lost authentication success on the display interface after receiving the successful recording message.
- the user can confirm on the display interface of the terminal device that the drone and the remote control are to be bound, and in response to the user's operation, the terminal device can obtain the currently connected first drone and the first drone.
- the respective identification information of the remote control, and these identification information can be displayed as binding information for the user to confirm before binding.
- the binding information may include, in addition to the respective identification information of the first drone and the first remote controller, the user's account information and the model information of the first drone, and the established binding relationship may be The binding relationship between the account, the first drone and the first remote control.
- FIG. 2 is an interactive interface diagram 1 provided by an embodiment of the present application.
- information for recommending or guiding the user to bind the drone to the remote control may be displayed on the display interface.
- recommend or guide there are many ways to recommend or guide. For example, you can ask the user whether to bind the drone and the remote control by popping up a clickable prompt bar on the homepage of the application. You can refer to Figure 3, the position pointed to by the hand pattern for the prompt bar.
- the user can be guided to click the "Next" button, and then the instructions on the binding between the drone and the remote control can be directly displayed, please refer to Figure 4.
- the identification information of the first drone may include the aircraft serial number or flight control serial number of the first drone, and the identification information of the first remote controller may include the chip ID and/or the first remote controller. or remote control serial number.
- the terminal device can determine the first drone to be authenticated as lost, and can display the aircraft information of the first drone for the user to confirm, as shown in FIG. 5 .
- the terminal device can start to perform loss authentication on the first drone, so as to determine whether the currently connected remote control is the first remote control, and if the first remote control is the first remote control A remote controller, which modifies the data of the first remote controller to eliminate its ability to control the first drone.
- the aircraft information of the first drone may at least include the identification information of the first drone, and in one embodiment, may also include the first drone model information.
- the identification information and the model information of the first drone are recorded in the server in advance, the identification information and the model information of the first drone can be obtained from the server for display.
- the user can obtain the flight status information of the first drone when the user controls the first drone to fly, and according to the flight status Status information, which can determine the current flight safety of the first drone, and if the flight safety is lower than the preset threshold, it can push the user whether to bind the currently connected remote control to the first drone.
- Ask for information By detecting the flight safety of the UAV in real time during flight, when it is judged that the flight safety is low, that is, when the UAV has a high probability of being lost, it can actively pop up the inquiry information or pop up a shortcut key bound with one key. , prompting users to quickly complete the binding of the drone, so that the binding can be completed before the accident occurs, preventing the loss of certification and the inability to obtain claims due to unbinding.
- the above-mentioned flight status information for determining flight safety may be various.
- the flight status information may include battery information and/or signal strength information, such as low battery power of the drone or connection with the remote control. When the connection signal is poor, it can be determined that the flight safety of the drone is low at this time, and the possibility of an accident is high.
- the flight environment information may be obtained by recognizing the image transmission image captured by the first drone.
- the flight environment information may include one or more of the following: a scene type corresponding to the environment in which the drone is currently located, surrounding obstacle information, and current weather information.
- the current flight safety of the drone is relatively low; if the surrounding area is determined through image recognition If the number of obstacles is large, it can also be determined that the current flight safety of the drone is low; if it is determined through image recognition that the current weather is not suitable for flying or is about to be unsuitable for flying, such as it has rained or is about to rain, it can be determined The current flight safety of drones is low.
- the flight data of the last time the user manipulated the first drone may also be obtained when the user performs loss authentication.
- the flight data stored locally by the terminal device may be uploaded to the server, and the server may determine whether the first drone has a landing behavior according to the flight data, so that the determination of the landing behavior may be performed according to the server. The result determines whether or not to grant lost certification.
- the terminal device can also locally determine whether the first drone has a landing behavior according to the flight data, so that the determination result of the landing behavior can be fed back to the server, and the server can decide according to the feedback result. Whether to give lost certification.
- the user may claim that the drone has been dropped in an unreachable area and the drone cannot be retrieved during the certification of the loss of the drone.
- the server can determine the possible landing position of the first drone according to the flight data, and determine whether the first drone has landed on a person according to the landing position. Hard-to-reach areas, so that the authenticity of what the user said can be verified to a certain extent and help decide whether to give loss authentication.
- the terminal device can also locally determine the landing position of the first drone according to the flight data, and determine whether the landing position belongs to an inaccessible area, and the final determination result can be Feedback to the server to help the server decide whether to give lost authentication.
- the landing position of the drone can be determined according to the GPS information in the flight data, or, with the permission of the user, can also be determined according to the image transmission image captured by the drone in the flight data.
- the user account can also participate in the binding, that is, the user account, the first drone and the first remote controller can be established. binding relationship.
- the user account can be an account pre-registered in the server by the user, and one user account can be bound to multiple drones.
- the binding between the user account and the drone can be done when the user activates the drone.
- the server can record the user's account. information and the identification information of the drone to establish a binding relationship between the user account and the drone.
- a display for reminding the user may be displayed on the display interface of the terminal device.
- the user when the user authenticates the loss of the first drone, if the remote controller currently connected to the terminal device is not the only first remote controller bound to the first drone, the user can
- the display interface displays the information of unbinding failure, and reminds the user to connect the correct remote control before unbinding, please refer to Figure 7.
- the user can unbind the first drone and the first remote controller . Specifically, after the user's operation of unbinding the first drone and the first remote controller on the display interface is obtained, according to the respective identification information of the first drone and the first remote controller recorded in the server, Determine whether the remote controller currently connected to the terminal device is the first remote controller and whether the drone currently connected is the first drone. After it is determined that the terminal device is currently connected to the first remote control and the first drone, the unbinding information may be displayed on the display interface, and the unbinding information may at least include the respective identifiers of the first drone and the first remote control. For information, please refer to Figure 8.
- the recorded identification information of the first remote control can be erased, and for the first remote control, if the first remote control records The identification information of the first drone (corresponding to the foregoing second embodiment), the recorded identification information of the first drone can be erased.
- the first UAV After the first UAV completes the loss authentication, no matter whether the user logs in to the account or not, and whether the remote control or terminal device is connected to the Internet (the server can be accessed), the first UAV cannot be authenticated to the first UAV.
- the process of controlling the first drone by man-machine control does not require the participation of the server. Compared with the method of recording the blacklist of drones in the server and restricting the control of drones based on the blacklist, there is no need to connect to the Internet.
- the UAV authentication loss method provided by the embodiment of the present application can eliminate the control of the first UAV by the first remote controller that is uniquely bound to the first UAV after the user requests for the loss authentication of the first UAV
- the first drone still only "recognizes" the first remote control, that is, only the first remote control is allowed to control it, the first remote control has lost the ability to control the first drone , at this time, the first drone is equivalent to a locked state without any remote control, which effectively realizes the loss authentication of the first drone, so that the user has no motivation to cheat insurance, and can Successfully certified drones can settle claims, which improves the quality of after-sales service.
- FIG. 9 is a flowchart of the second method for authentication loss of an unmanned aerial vehicle provided by an embodiment of the present application.
- the method can be applied to terminal equipment, and the method can include the following steps:
- the first drone can only be controlled by the uniquely bound first remote controller
- the obtaining of the operation of the user confirming the loss authentication of the first drone on the display interface of the terminal device includes:
- the selection operation determine the first drone to be authenticated as lost, and display the aircraft information of the first drone for the user to confirm;
- the aircraft information of the first drone includes at least identification information of the first drone.
- the aircraft information of the first drone further includes model information of the first drone.
- the first drone and the first remote controller are pre-bound in the following manner:
- the identification information of the first drone and the identification information of the first remote controller are sent to the server to record the binding relationship.
- establishing a binding relationship between the first drone and the first remote controller by at least using the identification information of the first remote controller includes:
- performing data modification on the first remote controller according to the identification information of the first drone including:
- the binding relationship is further established by using the identification information of the first drone.
- establishing a binding relationship between the first drone and the first remote controller by at least using the identification information of the first remote controller includes:
- the identification information of the first drone is written into the first remote controller, and the identification information of the first remote controller is written into the first drone.
- performing data modification on the first remote controller according to the identification information of the first drone including:
- the binding relationship includes a binding relationship among a user account, the first drone, and the first remote control.
- the obtaining of the user confirming the operation of binding the first drone currently connected to the terminal device with the first remote controller on the display interface includes:
- binding information for the user to confirm at least includes the respective identification information of the first drone and the first remote controller;
- the binding information further includes user account information.
- the method further includes:
- the determining that the remote controller currently connected to the terminal device is the first remote controller bound to the first drone recorded in the server includes:
- the identification information of the first remote control matches the identification information of the currently connected remote control, it is determined that the currently connected remote control is the first remote control.
- the method further includes:
- the identification information of the first drone includes an aircraft serial number of the first drone.
- the identification information of the first remote control includes a chip ID and/or a serial number of the first remote control.
- the method before establishing a binding relationship between the first drone and the first remote controller, the method further includes:
- the user is pushed with inquiry information on whether to bind the currently connected remote controller to the first drone.
- the flight status information includes: battery information and/or signal strength information.
- the flight safety is further determined according to the flight environment information of the first drone.
- the flight environment information is determined by identifying an image captured by the first drone.
- the flight environment information includes one or more of the following: a scene category to which the current environment belongs, obstacle information, and weather information.
- the method further includes:
- the determination result of the landing behavior is fed back to the server.
- the method further includes:
- the determination result of the unreachable area is fed back to the server.
- the method further includes:
- the flight data stored locally by the terminal device is uploaded to the server.
- the UAV authentication loss method provided by the embodiment of the present application can eliminate the control of the first UAV by the first remote controller that is uniquely bound to the first UAV after the user requests for the loss authentication of the first UAV
- the first drone still only "recognizes" the first remote control, that is, only the first remote control is allowed to control it, the first remote control has lost the ability to control the first drone , at this time, the first drone is equivalent to a locked state without any remote control, which effectively realizes the loss authentication of the first drone, so that the user has no motivation to cheat insurance, and can Claims with certified drones.
- FIG. 10 is a flowchart of the third method for authentication loss of an unmanned aerial vehicle provided by an embodiment of the present application.
- the method can be applied to remote control devices.
- the remote control device may have various implementations.
- the remote control device may be a combination of a terminal device and a remote control, for example, a whole formed by connecting the terminal device to the remote control in a wired or wireless manner.
- the remote control device may be an integrated device with its own remote control and display screen, which can establish a connection with the drone, or establish a connection with the server.
- the remote control device can be installed with an application program, and the display screen can be used to display the operation interface of the application program.
- the method may include the following steps:
- S1002 Acquire an operation of the user confirming the loss authentication of the first drone on the display interface of the remote control device.
- the first drone can only be controlled by the uniquely bound first remote control device.
- S1006. Perform data modification on the first remote control device according to the identification information of the first drone, so as to eliminate the ability of the first remote control device to control the first drone.
- the remote control device includes: a remote control and a terminal device, and the remote control is connected to the terminal device.
- the obtaining of the user confirming the operation of performing loss authentication on the first drone on the display interface of the remote control device includes:
- the selection operation determine the first drone to be authenticated as lost, and display the aircraft information of the first drone for the user to confirm;
- the aircraft information of the first drone includes at least identification information of the first drone.
- the aircraft information of the first drone further includes model information of the first drone.
- the first drone and the first remote control device are pre-bound in the following manner:
- the binding operation is performed in response to the confirmation, at least using the identification information of the first remote control device to establish a binding relationship between the first drone and the first remote control device.
- establishing a binding relationship between the first drone and the first remote control device by at least using the identification information of the first remote control device includes:
- performing data modification on the first remote control device according to the identification information of the first drone including:
- the binding relationship is further established by using the identification information of the first drone.
- establishing a binding relationship between the first drone and the first remote control device by at least using the identification information of the first remote control device includes:
- the identification information of the first drone is written into the first remote control device, and the identification information of the first remote control device is written into the first drone.
- performing data modification on the first remote control device according to the identification information of the first drone including:
- the binding relationship includes a binding relationship among the user account, the first drone and the first remote control device.
- the obtaining of the user confirming the operation of binding the first remote control device with the first drone on the display interface includes:
- binding information for the user to confirm at least includes the respective identification information of the first drone and the first remote control device;
- the binding information further includes user account information.
- the method further includes:
- the information recommending the user to bind the UAV to the remote control device is displayed on the display interface.
- the identification information of the first drone includes an aircraft serial number of the first drone.
- the identification information of the first remote control device includes a chip ID and/or a serial number of the remote control device of the first remote control device.
- the UAV authentication loss method provided by the embodiment of the present application can eliminate the manipulation of the first UAV by the first remote control device that is uniquely bound to the first UAV after the user requests for the loss authentication of the first UAV
- the first drone still only "recognizes" the first remote control device, that is, only the first remote control device is allowed to control it, the first remote control device has lost the ability to control the first drone , at this time, the first drone is equivalent to being in a locked state without any remote control device that can be controlled, which effectively realizes the loss authentication of the first drone, so that the user has no motive to cheat insurance, and can detect the loss of the first drone. Claims with certified drones.
- FIG. 11 is a flowchart of a method for a mobile device authentication loss provided by an embodiment of the present application.
- Movable devices may have electronic devices capable of movement, such as drones, unmanned vehicles, robots, unmanned boats, and the like.
- the method can be applied to terminal equipment, including:
- S1102 Acquire an operation of the user confirming the loss authentication of the first movable device on the display interface of the terminal device.
- the first movable device can only be controlled by the uniquely bound first remote control.
- the obtaining the operation that the user confirms the loss authentication on the first movable device on the display interface of the terminal device includes:
- the selection operation determine the first movable device to be authenticated as lost, and display the device information of the first movable device for the user to confirm;
- the device information of the first movable device includes at least identification information of the first movable device.
- the device information of the first movable device further includes model information of the first movable device.
- the first movable device and the first remote controller are pre-bound in the following manner:
- At least the identification information of the first remote control is used to establish a binding relationship between the first movable device and the first remote control.
- establishing a binding relationship between the first movable device and the first remote controller by at least using the identification information of the first remote controller includes:
- the performing data modification on the first remote controller according to the identification information of the first movable device includes:
- the binding relationship is further established by using the identification information of the first movable device.
- establishing a binding relationship between the first movable device and the first remote controller by at least using the identification information of the first remote controller includes:
- the identification information of the first movable device is written into the first remote control, and the identification information of the first remote control is written into the first movable device.
- the performing data modification on the first remote controller according to the identification information of the first movable device includes:
- the binding relationship includes a binding relationship among the user account, the first movable device and the first remote control.
- the obtaining the user's confirmation on the display interface to bind the first movable device currently connected to the terminal device and the first remote controller includes:
- binding information for user confirmation, the binding information at least includes the respective identification information of the first movable device and the first remote controller;
- the binding information further includes user account information.
- the method further includes:
- information recommending the user to bind the mobile device to the remote control is displayed on the display interface.
- the identification information of the first movable device includes a device serial number of the first movable device.
- the identification information of the first remote control includes a chip ID and/or a serial number of the first remote control.
- the method for lost authentication of a mobile device can eliminate the manipulation of the first mobile device by the first remote control device uniquely bound to the first mobile device after the user requests the loss authentication of the first mobile device
- the first movable device still only "recognizes" the first remote control device, that is, only the first remote control device is allowed to control it
- the first remote control device has lost the ability to control the first movable device
- the first movable device is equivalent to being in a locked state without any remote control device that can be manipulated, which effectively realizes the loss authentication of the first movable device, so that the user has no motive to cheat insurance, and can Claims with certified drones.
- FIG. 13 is a schematic structural diagram of a remote control device provided by an embodiment of the present application.
- the remote control device may include: a processor 1310 and a memory 1320 storing a computer program.
- the processor executes the computer program, the processor may implement the third UAV loss authentication method provided by the embodiment of the present application.
- FIG. 14 is a schematic structural diagram of the UAV lost authentication system provided by the embodiment of the present application.
- the system may include: a terminal device 1410, a remote controller 1420 and a server 1430, the terminal device being connected to the remote controller and the server respectively;
- the server pre-records the binding information of the first drone and the first remote controller, wherein the first drone is uniquely bound to the first remote controller and can only be controlled by the first remote controller , the binding information includes at least the identification information of the first drone and the identification information of the first remote controller;
- the terminal device is used to obtain the user's operation of confirming the loss authentication of the first drone on the display interface; in response to the confirmation of the loss authentication operation, obtain the first remote control from the server identification information of the first remote control, and determine whether the currently connected remote control is the first remote control according to the identification information of the first remote control; if it is determined that the remote control is the first remote control, from the The server obtains the identification information of the first drone, and modifies the data of the first remote controller according to the identification information of the first drone, so as to eliminate the effect of the first remote controller on the first remote controller. The control ability of the drone; the result of the data modification is fed back to the server to complete the authentication.
- the UAV authentication loss system provided by the embodiment of the present application can eliminate the control of the first UAV by the first remote controller that is uniquely bound to the first UAV after the user requests for the loss authentication of the first UAV
- the first drone still only "recognizes" the first remote control, that is, only the first remote control is allowed to control it, the first remote control has lost the ability to control the first drone , at this time, the first drone is equivalent to being in a locked state without any remote control, which realizes the effective loss authentication of the first drone, so that the user has no motivation to cheat insurance, and can authenticate the loss of the first drone.
- Embodiments of the present application further provide a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and when the computer program is executed by a processor, the first drone provided by the embodiments of the present application is lost. Authentication method.
- Embodiments of the present application further provide a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and when the computer program is executed by a processor, the second type of drone provided by the embodiment of the present application is lost. Authentication method.
- Embodiments of the present application further provide a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and when the computer program is executed by a processor, the third drone provided by the embodiments of the present application is lost. Authentication method.
- Embodiments of the present application may take the form of a computer program product implemented on one or more storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having program code embodied therein.
- Computer-usable storage media includes permanent and non-permanent, removable and non-removable media, and storage of information can be accomplished by any method or technology.
- Information may be computer readable instructions, data structures, modules of programs, or other data.
- Examples of computer storage media include, but are not limited to, phase-change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), Flash Memory or other memory technology, Compact Disc Read Only Memory (CD-ROM), Digital Versatile Disc (DVD) or other optical storage, Magnetic tape cassettes, magnetic tape magnetic disk storage or other magnetic storage devices or any other non-transmission medium that can be used to store information that can be accessed by a computing device.
- PRAM phase-change memory
- SRAM static random access memory
- DRAM dynamic random access memory
- RAM random access memory
- ROM read only memory
- EEPROM Electrically Erasable Programmable Read Only Memory
- Flash Memory or other memory technology
- CD-ROM Compact Disc Read Only Memory
- CD-ROM Compact Disc Read Only Memory
- DVD Digital Versatile Disc
- Magnetic tape cassettes magnetic tape magnetic disk storage or other magnetic storage devices or any other non-
Landscapes
- Selective Calling Equipment (AREA)
Abstract
本申请实施例公开了一种无人机丢失认证方法,应用于终端设备,包括:获取用户在终端设备的显示界面上确认对第一无人机进行丢失认证的操作;响应于所述确认进行丢失认证的操作,确定所述终端设备当前连接的遥控器为所述第一无人机唯一绑定的第一遥控器,所述第一无人机仅能被所述唯一绑定的第一遥控器操控;根据所述第一无人机的标识信息对所述第一遥控器进行数据修改,以消除所述第一遥控器对所述第一无人机的操控能力。本申请实施例公开的方法可以远程对无人机进行锁死,有效对无人机进行丢失认证。
Description
本申请涉及无人机技术领域,尤其涉及无人机丢失认证方法和系统、可移动设备丢失认证方法、终端设备、遥控设备及计算机可读存储介质。
目前,无人机的应用越来越多,例如,广泛应用于航拍、测绘等领域,其技术也越来越成熟。但受制于传感器技术、避障算法以及飞行控制的限制,在无人机飞行过程中,难以避免会产生无人机炸机、信号丢失等飞行故障。如何在飞行故障引起丢失问题后进行丢失认证,成为无人机领域亟需解决的问题。
发明内容
有鉴于此,本申请实施例提供了一种无人机丢失认证方法,目的之一是解决如何对无人机进行丢失认证的技术问题。
本申请实施例第一方面提供一种无人机丢失认证方法,应用于终端设备,包括:
获取用户在终端设备的显示界面上确认对第一无人机进行丢失认证的操作;
响应于所述确认进行丢失认证的操作,确定所述终端设备当前连接的遥控器为所述第一无人机唯一绑定的第一遥控器,所述第一无人机仅能被所述唯一绑定的第一遥控器操控;
根据所述第一无人机的标识信息对所述第一遥控器进行数据修改,以消除所述第一遥控器对所述第一无人机的操控能力。
本申请实施例第二方面提供一种无人机丢失认证方法,应用于终端设备,包括:
获取用户在终端设备的显示界面上确认对第一无人机进行丢失认证的操作;
响应于所述确认进行丢失认证的操作,确定所述终端设备当前连接的遥控器为服务器中记录的所述第一无人机唯一绑定的第一遥控器,所述第一无人机仅能被所述唯一绑定的第一遥控器操控;
从所述服务器获取所述第一无人机的标识信息,并根据所述第一无人机的标识信 息对所述第一遥控器进行数据修改,以消除所述第一遥控器对所述第一无人机的操控能力。
本申请实施例第三方面提供一种无人机丢失认证方法,应用于遥控设备,包括:
获取用户在遥控设备的显示界面上确认对第一无人机进行丢失认证的操作;
响应于所述确认进行丢失认证的操作,确定所述遥控设备为所述第一无人机唯一绑定的第一遥控设备,所述第一无人机仅能被所述唯一绑定的第一遥控设备操控;
根据所述第一无人机的标识信息对所述第一遥控设备进行数据修改,以消除所述第一遥控设备对所述第一无人机的操控能力。
本申请实施例第四方面提供一种可移动设备丢失认证方法,应用于终端设备,包括:
获取用户在终端设备的显示界面上确认对第一可移动设备进行丢失认证的操作;
响应于所述确认进行丢失认证的操作,确定所述终端设备当前连接的遥控器为所述第一可移动设备唯一绑定的第一遥控器,所述第一可移动设备仅能被所述唯一绑定的第一遥控器操控;
根据所述第一可移动设备的标识信息对所述第一遥控器进行数据修改,以消除所述第一遥控器对所述第一可移动设备的操控能力。
本申请实施例第五方面提供一种终端设备,包括:处理器和存储有计算机程序的存储器,所述处理器在执行所述计算机程序时实现上述第一方面提供的无人机丢失认证方法。
本申请实施例第六方面提供一种终端设备,包括:处理器和存储有计算机程序的存储器,所述处理器在执行所述计算机程序时实现上述第二方面提供的无人机丢失认证方法。
本申请实施例第七方面提供一种终端设备,包括:处理器和存储有计算机程序的存储器,所述处理器在执行所述计算机程序时实现上述第三方面提供的无人机丢失认证方法。
本申请实施例第八方面一种无人机丢失认证系统,包括:终端设备、遥控器和服务器,所述终端设备分别与所述遥控器和所述服务器连接;
所述服务器预先记录了第一无人机与第一遥控器的绑定信息,其中,所述第一无人机唯一绑定所述第一遥控器,仅能被所述第一遥控器操控,所述绑定信息至少包括所述第一无人机的标识信息与所述第一遥控器的标识信息;
所述终端设备用于,获取用户在显示界面上确认对所述第一无人机进行丢失认证 的操作;响应于所述确认进行丢失认证的操作,从所述服务器获取所述第一遥控器的标识信息,并根据所述第一遥控器的标识信息确定当前连接的所述遥控器是否为所述所述第一遥控器;若确定所述遥控器为所述第一遥控器,从所述服务器获取所述第一无人机的标识信息,并根据所述第一无人机的标识信息对所述第一遥控器进行数据修改,以消除所述第一遥控器对所述第一无人机的操控能力;将所述数据修改的结果反馈给所述服务器以完成认证。
本申请实施例第九方面提供一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序被处理器执行时实现上述第一方面提供的无人机丢失认证方法。
本申请实施例第十方面提供一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序被处理器执行时实现上述第二方面提供的无人机丢失认证方法。
本申请实施例第十一方面提供一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序被处理器执行时实现上述第三方面提供的无人机丢失认证方法。
本申请实施例提供的无人机认证丢失方法,可以在用户请求对第一无人机进行丢失认证后,消除第一无人机唯一绑定的第一遥控器对第一无人机的操控能力,如此,虽然第一无人机仍然只“认”第一遥控器,即只允许第一遥控器对其进行操控,但第一遥控器却已丧失了对第一无人机的操控能力,此时,第一无人机相当于处于一种没有任何遥控器可以操控的锁死状态,有效的实现了对第一无人机的丢失认证,使用户没有骗保的动机,可以对丢失认证成功的无人机进行理赔,提高了售后服务的质量。
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1是本申请实施例提供的第一种无人机丢失认证方法的流程图。
图2至图8分别是本申请实施例提供的交互界面图一至七。
图9是本申请实施例提供的第二种无人机认证丢失方法的流程图。
图10是本申请实施例提供的第三种无人机认证丢失方法的流程图。
图11是本申请实施例提供的可移动设备认证丢失方法的流程图。
图12是本申请实施例提供的终端设备的结构示意图。
图13是本申请实施例提供的遥控设备的结构示意图。
图14是本申请实施例提供的无人机丢失认证系统的结构示意图。
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
售后服务是产品出售以后所提供的各种服务,人们在购买一项产品时,除了关注产品本身以外,也会关注产品的售后服务,售后服务好的产品可以一定程度提高该产品的市场竞争力。无人机的售后服务是用户购买无人机时考虑的重要因素。在购买无人机后,为获得更优质的售后服务,用户还可以购买无人机的售后服务产品,比如DJI Care。在购买无人机售后服务产品后,用户可以享受更全面的保修服务,从而可以更放心的使用无人机。
但即便是如DJI Care的售后服务产品,也没有将无人机丢失的情况纳入保障范围内,即对无人机丢失的情况不进行理赔。之所以如此,是因为无法判断用户是真的丢失了无人机还是在骗保。对无人机丢失的情况不进行理赔,这一方面会增加用户购买无人机时的顾虑,因为无人机丢失并不是极小概率的事件,另一方面,用户可能为了能够获得理赔而冒险到危险区域(如悬崖)取回无人机,导致发生人身事故。
无人机丢失是时有发生的,比如无人机可能在飞行过程中因碰撞而坠落,因信号不佳而失联,或者因电量不足而强制降落,在这些情况中,无人机坠落或降落的地点可能是用户难以找到的地点,也可能是如悬崖等用户无法到达的地点,从而用户在要求理赔时将无法提供无人机的实物,被认定为无人机丢失的情况,不予以理赔。
为解决上述问题,本申请实施例提供了一种无人机丢失认证方法,可以远程将无人机锁死,使其处于不可被任何遥控器操控的状态,有效实现了对无人机的丢失认证。
可以参考图1,图1是本申请实施例提供的第一种无人机丢失认证方法的流程图,该方法可以应用于终端设备,该方法可以包括以下步骤:
S102、获取用户在终端设备的显示界面上确认对第一无人机进行丢失认证的操作。
S104、响应于所述确认进行丢失认证的操作,确定终端设备当前连接的遥控器为所述第一无人机唯一绑定的第一遥控器。
S106、根据所述第一无人机的标识信息对所述第一遥控器进行数据修改,以消除所述第一遥控器对所述第一无人机的操控能力。
所述终端设备可以是手机、平板、电脑等任一种智能设备,在一种实施方式中,可以在终端设备上安装应用程序,通过应用程序实现本申请实施例提供的无人机丢失认证方法。
第一无人机可以用于指代用户想要进行丢失认证的任一无人机,第一遥控器可以用于指代第一无人机在丢失之前唯一绑定的遥控器。需要说明的是,这里的唯一绑定是针对第一无人机而言的,即第一无人机仅能绑定一个遥控器,并且在绑定遥控器后,第一无人机仅能被绑定的遥控器操控,其他遥控器无法操控该第一无人机。但一个遥控器可以绑定多台无人机,比如第一遥控器可以同时是第一无人机与第二无人机唯一绑定的遥控器。
第一无人机与第一遥控器的绑定是在丢失认证之前完成的。在一种实施方式中,用户可以先建立第一无人机、第一遥控器与终端设备三者的连接,通过在终端设备的显示界面上进行相应的操作实现第一无人机与第一遥控器的绑定。这里,用户的操作可以是触摸操作,也可以是对实体按键的操作,也可以是手势操作等。终端设备在获取到用户在显示界面上进行的确认绑定第一无人机与第一遥控器的操作后,可以进行第一无人机与第一遥控器的绑定关系的建立。
在建立第一无人机与第一遥控器的绑定关系时,可以有多种实施方式,这里提供其中的两种实施方式,为方便指代,可以分别称为第一实施方式和第二实施方式。
在第一实施方式中,可以从第一遥控器处获取第一遥控器的标识信息,并将第一遥控器的标识信息写入第一无人机,完成第一无人机与第一遥控器的唯一绑定。第一无人机在记录第一遥控器的标识信息后,可以在每次与遥控器连接时,根据所记录的第一遥控器的标识信息确定当前请求连接的遥控器是否是第一遥控器,若是则可以建立连接,接受该遥控器的控制,否则可以拒绝连接,实现仅第一遥控器可对第一无人机进行操控的唯一绑定效果。
在第二实施方式中,除了将第一遥控器的标识信息写入第一无人机外,还可以将从第一无人机获取的第一无人机的标识信息写入第一遥控器。换言之,在第二实施方式中,第一无人机与第一遥控器可以互相写入对方的标识信息。这里,如前所述,第 一无人机仅能唯一绑定第一遥控器,即第一无人机仅能写入一个遥控器的标识信息,而第一遥控器并不是仅能绑定一台无人机,而是可以绑定多台无人机,具体的,即可以在第一遥控器中写入多台无人机的标识信息。
若第一无人机与第一遥控器互相写入了对方的标识信息,则第一无人机在与任一遥控器进行连接时,可以根据自身记录的第一遥控器的标识信息确定当前所连接的遥控器是否是第一遥控器,若是则可以建立连接,若否则可以拒绝连接。相应的,第一遥控器在与任一无人机连接时,也可以根据自身记录的第一无人机的标识信息确定当前所连接的无人机是否是第一无人机,若是则可以建立连接,若否则可以拒绝连接。换句话说,第一无人机和第一遥控器在相互连接过程中,均需要验证对方的标识信息,如相互验证成功,则相互连接。
第一无人机与第一遥控器的绑定关系需要在服务器中记录。具体的,当终端设备根据用户的操作确认要绑定第一无人机与第一遥控器时,终端设备可以获取相应的绑定信息发送给服务器,以便于服务器记录该绑定关系。这里,绑定信息至少可以包括第一无人机的标识信息和第一遥控器的标识信息,从而服务器可以对第一无人机与第一遥控器建立绑定关系。
在另一实施例中,服务器可以对当前登录的用户账户、第一无人机与第一遥控器三者建立绑定关系。在进行三者绑定之前,用户先注册用户账户,并通过第一遥控器连接第一无人机后,获取第一无人机的标识信息,并将用户账户与第一无人机进行绑定。然后基于第一遥控器和第一无人机的绑定操作,获取第一遥控器的标识信息和第一无人机的标识信息,将当前登录的用户账户、第一无人机与第一遥控器三者建立绑定关系。
在第一无人机与第一遥控器进行绑定之后,若第一无人机发生了丢失,用户可以对第一无人机进行丢失认证。在进行丢失认证时,为锁死第一无人机,可以消除第一无人机唯一绑定的第一遥控器对第一无人机的操控能力,如此,由于第一无人机本来已经不能被第一遥控器以外的遥控器操控,在进行丢失认证后第一遥控器也无法操控第一无人机,因此第一无人机将处于没有遥控器可以操控的锁死状态,有效实现了对第一无人机的丢失认证,使用户没有骗保的动机,可以对丢失认证成功的无人机进行理赔。
在本实施例中,所述丢失认证的操作包括解绑操作。终端设备响应于用户点的解绑操作,根据所述第一无人机的标识信息对所述第一遥控器进行数据修改,以对第一无人机和第一遥控器进行解绑,从而消除所述第一遥控器对所述第一无人机的操控能 力
而在消除第一遥控器对第一无人机的操控能力之前,对于终端设备当前连接的遥控器,需要确定其是否是第一无人机唯一绑定的第一遥控器。具体的,可以从服务器获取第一无人机绑定的第一遥控器的标识信息,并可以获取当前连接的遥控器的标识信息,通过将当前连接的遥控器的标识信息与所述第一遥控器的标识信息进行比较,可以确定当前连接的遥控器是否是所述第一遥控器。在确定当前连接的遥控器是所述第一遥控器时,可以对该第一遥控器消除其对第一无人机的操作能力。
在消除第一遥控器对第一无人机的操控能力,即对第一遥控器解除其与第一无人机的绑定关系时,可以通过对第一遥控器进行数据修改的方式实现。具体的,在一种实施方式中,若第一遥控器与第一无人机之间的绑定关系是通过所述第一实施方式建立的,即仅第一无人机中写入了第一遥控器的标识信息,第一遥控器并未写入第一无人机的标识信息,则可以从服务器获取绑定时记录的第一无人机的标识信息,将第一无人机的标识信息写入第一遥控器的控制黑名单中,使第一遥控器丧失对第一无人机的操控能力。这里,控制黑名单可以预先配置在遥控器中,用于存储该遥控器要拒绝操控的无人机的标识信息。
若第一遥控器与第一无人机之间的绑定关系是通过所述第一实施方式建立的,则在一种实施方式中,可以在获取到用户确认对第一无人机进行丢失认证的操作后,在终端设备的显示界面上显示用于提示用户将第一遥控器寄回售后部门的提示信息。由于第一无人机唯一绑定了第一遥控器,因此通过使用户将第一遥控器寄回售后部门,可以使用户失去唯一可以操控第一无人机的手段,实现对第一无人机的丢失认证,达到防骗保的效果。
在一种实施方式中,若第一遥控器与第一无人机之间的绑定关系是通过所述第二实施方式建立的,即第一无人机与第一遥控器均写入了对方的标识信息,则在消除第一遥控器对第一无人机的操控能力时,可以将第一遥控器中记录的第一无人机的标识信息擦除,从而第一遥控器将无法与第一无人机匹配,丧失对第一无人机的操控能力。这里,考虑到第一遥控器中可能记录了多台无人机的标识信息,为避免误擦除,可以从服务器获取绑定时记录的第一无人机的标识信息,并根据第一无人机的标识信息对第一遥控器中记录的标识信息进行擦除。这里,在服务器记录的信息中,用户当前所登录的账户可能绑定有多台无人机,此时,终端设备可以根据用户对无人机的选定操作,从服务器中获取用户所选定的要进行丢失认证的无人机的标识信息。在一个例子中,若当前账户仅绑定了一台无人机,则服务器可以直接将该绑定的无人机的标识信 息发送给终端设备。
上述通过擦除第一遥控器中记录的第一无人机的标识信息以消除第一遥控器对第一无人机的操控能力的方案,若用户想要恢复第一遥控器对第一无人机的操控能力,需要将第一无人机的标识信息重新写入第一遥控器。由于数据写入是较为困难的,,因此可以确保第一无人机处于没有遥控器可以控制的锁死状态,可以对第一无人机进行有效的丢失认证,有良好的防骗保效果。
在一种实施方式中,当对第一遥控器的数据修改成功后,可以将数据修改成功的消息发送给服务器,服务器基于该数据修改成功的消息可以记录第一无人机处于丢失或锁定状态,这里,在第一无人机被记录为丢失或锁定状态后,所有涉及第一无人机的业务都将被服务器限制或拒绝。完成记录后,服务器可以向终端设备返回记录成功的消息,终端设备在接收到该记录成功的消息后可以将丢失认证成功的信息显示在显示界面上。
在一种实施方式中,用户可以在终端设备的显示界面上确认要进行无人机与遥控器绑定,响应于用户的该操作,终端设备可以获取当前连接的第一无人机与第一遥控器各自的标识信息,并可以将这些标识信息作为绑定信息显示,以供用户进行绑定前确认。在获取到用户对这些绑定信息的确认操作后,可以进行第一无人机与第一遥控器的绑定,该部分内容在前文中已有说明,在此不再赘述。这里,绑定信息除了可以包括第一无人机与第一遥控器各自的标识信息以外,还可以包括用户的账户信息和第一无人机的机型信息,所建立的绑定关系可以是账户、第一无人机与第一遥控器三者的绑定关系。可以参考图2,图2是本申请实施例提供的交互界面图一。
在一种实施方式中,可以在确定用户完成无人机售后服务产品的激活后,在显示界面上显示用于推荐或引导用户进行无人机与遥控器绑定的信息。这里,推荐或引导的方式可以有多种,比如可以通过在应用程序首页弹出可点击的提示条询问用户是否进行无人机与遥控器的绑定,可以参考图3,手型图案所指位置为所述提示条。又比如,可以在售后服务产品激活成功后引导用户点击“下一步”的按钮,随后直接显示关于无人机与遥控器进行绑定的说明,可以参考图4。
在一种实施方式中,第一无人机的标识信息可以包括第一无人机的飞机序列号或飞控序列号,第一遥控器的标识信息可以包括第一遥控器的芯片ID和/或遥控器序列号。
在一种实施方式中,用户在进行丢失认证的操作时,可以先在终端设备的显示界面上选择要进行丢失认证的无人机。由于用户可以拥有多台无人机,并可以将多台无 人机绑定在一个账户下,因此,用户可以选择要进行丢失认证的无人机。根据用户的选择操作,终端设备可以确定要进行丢失认证的第一无人机,并可以将该第一无人机的飞机信息进行显示,以供用户进行确认,可以参考图5。在获取到用户对第一无人机的飞机信息的确认操作后,终端设备可以开始对第一无人机进行丢失认证,即可以确定当前连接的遥控器是否是第一遥控器,若是第一遥控器,对第一遥控器进行数据修改以消除其对第一无人机的操控能力。
在提供第一无人机的飞机信息供用户确认时,第一无人机的飞机信息至少可以包括第一无人机的标识信息,在一种实施方式中,还可以包括第一无人机的机型信息。这里,由于第一无人机的标识信息和机型信息均预先在服务器中进行了记录,因此可以从服务器获取该第一无人机的标识信息和机型信息以进行显示。
在一种实施方式中,若用户未将第一无人机与任何遥控器绑定,则可以在用户操控第一无人机飞行时,获取第一无人机的飞行状态信息,根据该飞行状态信息,可以确定第一无人机当前的飞行安全性,若所述飞行安全性低于预设阈值,则可以向用户推送是否将当前连接的遥控器与第一无人机进行绑定的询问信息。通过在飞行时实时检测无人机的飞行安全性,在判断飞行安全性低时,即无人机有较高概率发生丢失时,通过主动弹出询问信息或弹出一键绑定的快捷按键等方式,促使用户快速完成无人机的绑定,从而可以在事故发生之前完成绑定,防止因未绑定而无法进行丢失认证、无法获得理赔的情况发生。
上述的用于确定飞行安全性的飞行状态信息可以有多种,在一种实施方式中,飞行状态信息可以包括电量信息和/或信号强弱信息,比如无人机电量低或者与遥控器的连接信号差时,可以确定无人机此时的飞行安全性较低,出现事故的可能性较大。
进一步的,在确定无人机的飞行安全性时还可以根据无人机的飞行环境信息确定。这里,在一种实施方式中,飞行环境信息可以通过对第一无人机拍摄的图传图像识别得到。飞行环境信息可以包括以下一种或多种:无人机当前所处环境对应的场景类型、周边的障碍物信息、当前的天气信息。为便于理解,可以举个例子,比如通过图像识别确定无人机当前所处环境对应的场景类型是建筑群,则可以确定无人机当前的飞行安全性相对较低;若通过图像识别确定周边障碍物的数量较多,也可以确定无人机当前的飞行安全性较低;若通过图像识别确定当前的天气不适宜飞行或即将不适宜飞行,比如已经下雨或即将下雨,则可以确定无人机当前的飞行安全性较低。
在一种实施方式,为防止用户故意弄丢无人机以换取新机,还可以在用户进行丢失认证时,获取用户上一次操控第一无人机的飞行数据。这里,在一种实施方式中, 可以将终端设备本地存储的飞行数据可以上传至服务器,服务器可以根据所述飞行数据确定第一无人机是否有降落行为,从而可以根据所述降落行为的确定结果决定是否给予丢失认证。在一种实施方式中,也可以由终端设备本地根据所述飞行数据确定第一无人机是否有降落行为,从而可以将所述降落行为的确定结果反馈给服务器,服务器根据该反馈结果可以决定是否给予丢失认证。
在一些情况中,用户在进行无人机丢失认证时可能宣称其无人机掉落在不可到达的区域,无法取回无人机,为对用户所言内容的真实性进行核实,在一种实施方式中,若终端设备将所述飞行数据上传给服务器,则服务器可以根据所述飞行数据确定第一无人机可能的降落位置,并根据该降落位置确定第一无人机是否降落在人难以到达的区域,从而可以一定程度上核实用户所言内容的真实性,帮助决定是否给予丢失认证。在一种实施方式中,也可以由终端设备本地进行根据所述飞行数据确定第一无人机的降落位置、确定所述降落位置是否属于不可到达的区域的工作,并可以将最终的确定结果反馈给服务器,以帮助服务器决定是否给予丢失认证。这里,无人机的降落位置可以根据飞行数据中的GPS信息确定,或者,在用户允许的情况下,也可以根据飞行数据中的无人机所拍摄的图传图像确定。
在前文已有提及,在第一无人机与第一遥控器进行绑定时,用户账户也可以参与该绑定,即可以建立用户账户、第一无人机与第一遥控器三者的绑定关系。这里,用户账户可以是用户预先在服务器中注册的账户,一个用户账户可以绑定多台无人机。用户账户与无人机的绑定可以是用户在激活无人机时完成的,具体的,用户在第一次连接新购买的无人机并进行无人机激活时,服务器可以记录用户的账户信息与该无人机的标识信息,建立用户账户与该无人机的绑定关系。
在一种实施方式中,若第一无人机已经唯一绑定第一遥控器,若用户使用其他遥控器尝试与第一无人机连接,可以在终端设备的显示界面上显示用于提醒用户更换正确的遥控器的信息,可以参考图6。
在一种实施方式中,用户在对第一无人机进行丢失认证时,若终端设备当前连接的遥控器并非是第一无人机唯一绑定的第一遥控器,则可以在终端设备的显示界面上显示解绑失败的信息,并可以提醒用户连接正确的遥控器后再进行解绑,可以参考图7。
在一种实施方式中,若第一无人机与第一遥控器建立了绑定关系且第一无人机并未丢失,则用户可以对第一无人机与第一遥控器进行解绑。具体的,在获取到用户在显示界面上对第一无人机与第一遥控器进行解绑的操作后,可以根据服务器中记录的 第一无人机与第一遥控器各自的标识信息,确定终端设备当前连接的遥控器是否为所述第一遥控器、当前连接的无人机是否为所述第一无人机。在确定终端设备当前连接的是第一遥控器与第一无人机后,可以将解绑信息显示在显示界面上,解绑信息可以至少包括第一无人机与第一遥控器各自的标识信息,可以参考图8。在获取到用户对所述解绑信息的确定操作后,对第一无人机,可以擦除其记录的第一遥控器的标识信息,而对第一遥控器,若第一遥控器记录了第一无人机的标识信息(对应前文的第二实施方式),则可以擦除其所记录的第一无人机的标识信息。
本申请实施例提供的无人机认证丢失方法,第一无人机在完成丢失认证后,无论用户是否登陆账户,以及无论遥控器或者终端设备是否联网(可以访问服务器)都无法对第一无人机进行操控,防止第一无人机受控的过程不需要服务器的参与,这相比在服务器中记录无人机黑名单并基于黑名单对无人机进行限制控制的方式,无需联网,也不需要检测用户所操控的无人机,不会对用户的隐私造成侵犯;另外,限制控制的方式需要给相关app开通禁止遥控器控制无人机的权限,严重侵犯用户的权益。
本申请实施例提供的无人机认证丢失方法,可以在用户请求对第一无人机进行丢失认证后,消除第一无人机唯一绑定的第一遥控器对第一无人机的操控能力,如此,虽然第一无人机仍然只“认”第一遥控器,即只允许第一遥控器对其进行操控,但第一遥控器却已丧失了对第一无人机的操控能力,此时,第一无人机相当于处于一种没有任何遥控器可以操控的锁死状态,有效的实现了对第一无人机的丢失认证,使用户没有骗保的动机,可以对丢失认证成功的无人机进行理赔,提高了售后服务的质量。
下面可以参考图9,图9是本申请实施例提供的第二种无人机认证丢失方法的流程图。该方法可以应用于终端设备,该方法可以包括以下步骤:
S902、获取用户在终端设备的显示界面上确认对第一无人机进行丢失认证的操作。
S904、响应于所述确认进行丢失认证的操作,确定所述终端设备当前连接的遥控器为服务器中记录的所述第一无人机唯一绑定的第一遥控器。
其中,所述第一无人机仅能被所述唯一绑定的第一遥控器操控;
S906、从所述服务器获取所述第一无人机的标识信息,并根据所述第一无人机的标识信息对所述第一遥控器进行数据修改,以消除所述第一遥控器对所述第一无人机的操控能力。
可选的,所述获取用户在终端设备的显示界面上确认对第一无人机进行丢失认证的操作,包括:
获取用户在终端设备的显示界面上对要进行丢失认证的无人机的选择操作;
根据所述选择操作,确定要进行丢失认证的第一无人机,并显示所述第一无人机的飞机信息以供用户确认;
获取用户在所述显示界面上对所述第一无人机的飞机信息进行确认的操作。
可选的,所述第一无人机的飞机信息至少包括所述第一无人机的标识信息。
可选的,所述第一无人机的飞机信息还包括所述第一无人机的机型信息。
可选的,所述第一无人机与所述第一遥控器是预先通过以下方式进行绑定的:
获取用户在所述显示界面上确认对所述终端设备当前连接的第一无人机与第一遥控器进行绑定的操作;
响应于所述确认进行绑定的操作,至少利用所述第一遥控器的标识信息建立所述第一无人机与所述第一遥控器的绑定关系;
将所述第一无人机的标识信息与所述第一遥控器的标识信息发送给所述服务器以记录所述绑定关系。
可选的,所述至少利用所述第一遥控器的标识信息建立所述第一无人机与所述第一遥控器的绑定关系,包括:
将所述第一遥控器的标识信息写入所述第一遥控器。
可选的,所述根据所述第一无人机的标识信息对所述第一遥控器进行数据修改,包括:
将所述第一无人机的标识信息写入所述第一遥控器的控制黑名单。
可选的,所述绑定关系还利用所述第一无人机的标识信息建立。
可选的,所述至少利用所述第一遥控器的标识信息建立所述第一无人机与所述第一遥控器的绑定关系,包括:
将所述第一无人机的标识信息写入所述第一遥控器,将所述第一遥控器的标识信息写入所述第一无人机。
可选的,所述根据所述第一无人机的标识信息对所述第一遥控器进行数据修改,包括:
擦除所述第一遥控器记录的所述第一无人机的标识信息。
可选的,所述绑定关系包括用户账户、所述第一无人机以及所述第一遥控器三者的绑定关系。
可选的,所述获取用户在所述显示界面上确认对所述终端设备当前连接的第一无人机与第一遥控器进行绑定的操作,包括:
响应于用户在所述显示界面上确认进行无人机与遥控器绑定的操作,获取所述终 端设备当前连接的第一无人机与第一遥控器各自的标识信息;
显示绑定信息以供用户确认,所述绑定信息至少包括所述第一无人机与所述第一遥控器各自的标识信息;
获取用户在所述显示界面上对所述绑定信息的确认操作。
可选的,所述绑定信息还包括用户账户信息。
可选的,所述方法还包括:
在确定用户完成无人机售后服务产品的激活后,在所述显示界面上显示推荐用户进行无人机与遥控器绑定的信息。
可选的,所述确定终端设备当前连接的遥控器为服务器中记录的所述第一无人机绑定的第一遥控器,包括:
获取所述服务器记录的所述第一遥控器的标识信息;
若所述第一遥控器的标识信息与当前连接的遥控器的标识信息匹配,确定当前连接的遥控器为所述第一遥控器。
可选的,所述方法还包括:
将数据修改成功的结果发送给所述服务器;
获取所述服务器返回的认证成功的信息并显示在所述显示界面上。
可选的,所述第一无人机的标识信息包括所述第一无人机的飞机序列号。
可选的,所述第一遥控器的标识信息包括所述第一遥控器的芯片ID和/或遥控器序列号。
可选的,在所述第一无人机与所述第一遥控器建立绑定关系之前,所述方法还包括:
在用户操控所述第一无人机飞行时,获取所述第一无人机的飞行状态信息;
至少根据所述飞行状态信息,确定所述第一无人机当前的飞行安全性;
若所述飞行安全性低于预设阈值,向用户推送是否将当前连接的遥控器与所述第一无人机进行绑定的询问信息。
可选的,所述飞行状态信息包括:电量信息和/或信号强弱信息。
可选的,所述飞行安全性还根据所述第一无人机的飞行环境信息确定。
可选的,所述飞行环境信息是对所述第一无人机拍摄的图像进行识别确定的。
可选的,所述飞行环境信息包括以下一种或多种:当前环境所属的场景类别、障碍物信息、天气信息。
可选的,所述方法还包括:
获取用户上一次操控所述第一无人机的飞行数据;
根据所述飞行数据确定所述第一无人机是否有降落行为;
将所述降落行为的确定结果反馈给所述服务器。
可选的,所述方法还包括:
根据所述飞行数据确定所述第一无人机的降落位置;
确定所述降落位置是否属于不可到达的区域;
将所述不可到达的区域的确定结果反馈给所述服务器。
可选的,所述方法还包括:
响应于所述确认进行丢失认证的操作,将所述终端设备本地存储的飞行数据上传至服务器。
以上所提供的各种实施方式的无人机丢失认证方法,其具体实现在前文中已有相应说明,在此不再赘述。
本申请实施例提供的无人机认证丢失方法,可以在用户请求对第一无人机进行丢失认证后,消除第一无人机唯一绑定的第一遥控器对第一无人机的操控能力,如此,虽然第一无人机仍然只“认”第一遥控器,即只允许第一遥控器对其进行操控,但第一遥控器却已丧失了对第一无人机的操控能力,此时,第一无人机相当于处于一种没有任何遥控器可以操控的锁死状态,有效的实现了对第一无人机的丢失认证,使用户没有骗保的动机,可以对丢失认证成功的无人机进行理赔。
下面可以参考图10,图10是本申请实施例提供的第三种无人机认证丢失方法的流程图。该方法可以应用于遥控设备。这里,遥控设备可以有多种实施方式,在一种实施方式中,遥控设备可以是终端设备和遥控器的组合,例如可以是终端设备通过有线或无线的方式与遥控器连接后形成的整体。在一种实施方式中,遥控设备可以是一体化的设备,自带遥控器和显示屏,其可以与无人机建立连接,也可以与服务器建立连接。遥控设备可以安装有应用程序,显示屏可以用于显示应用程序的操作界面。
该方法可以包括以下步骤:
S1002、获取用户在遥控设备的显示界面上确认对第一无人机进行丢失认证的操作。
S1004、响应于所述确认进行丢失认证的操作,确定所述遥控设备为所述第一无人机唯一绑定的第一遥控设备。
其中,所述第一无人机仅能被所述唯一绑定的第一遥控设备操控。
S1006、根据所述第一无人机的标识信息对所述第一遥控设备进行数据修改,以消 除所述第一遥控设备对所述第一无人机的操控能力。
可选的,所述遥控设备包括:遥控器和终端设备,所述遥控器与所述终端设备连接。
可选的,所述获取用户在遥控设备的显示界面上确认对第一无人机进行丢失认证的操作,包括:
获取用户在遥控设备的显示界面上对要进行丢失认证的无人机的选择操作;
根据所述选择操作,确定要进行丢失认证的第一无人机,并显示所述第一无人机的飞机信息以供用户确认;
获取用户在所述显示界面上对所述第一无人机的飞机信息进行确认的操作。
可选的,所述第一无人机的飞机信息至少包括所述第一无人机的标识信息。
可选的,所述第一无人机的飞机信息还包括所述第一无人机的机型信息。
可选的,所述第一无人机与所述第一遥控设备是预先通过以下方式进行绑定的:
获取用户在所述显示界面上确认将所述第一遥控设备与所述第一无人机进行绑定的操作;
响应于所述确认进行绑定的操作,至少利用所述第一遥控设备的标识信息建立所述第一无人机与所述第一遥控设备的绑定关系。
可选的,所述至少利用所述第一遥控设备的标识信息建立所述第一无人机与所述第一遥控设备的绑定关系,包括:
将所述第一遥控设备的标识信息写入所述第一遥控设备。
可选的,所述根据所述第一无人机的标识信息对所述第一遥控设备进行数据修改,包括:
将所述第一无人机的标识信息写入所述第一遥控设备的控制黑名单。
可选的,所述绑定关系还利用所述第一无人机的标识信息建立。
可选的,所述至少利用所述第一遥控设备的标识信息建立所述第一无人机与所述第一遥控设备的绑定关系,包括:
将所述第一无人机的标识信息写入所述第一遥控设备,将所述第一遥控设备的标识信息写入所述第一无人机。
可选的,所述根据所述第一无人机的标识信息对所述第一遥控设备进行数据修改,包括:
擦除所述第一遥控设备记录的所述第一无人机的标识信息。
可选的,所述绑定关系包括用户账户、所述第一无人机以及所述第一遥控设备三 者的绑定关系。
可选的,所述获取用户在所述显示界面上确认将所述第一遥控设备与所述第一无人机进行绑定的操作,包括:
响应于用户在所述显示界面上确认进行无人机与遥控设备绑定的操作,获取所述第一遥控设备当前连接的第一无人机的标识信息以及所述第一遥控设备的标识信息;
显示绑定信息以供用户确认,所述绑定信息至少包括所述第一无人机与所述第一遥控设备各自的标识信息;
获取用户在所述显示界面上对所述绑定信息的确认操作。
可选的,所述绑定信息还包括用户账户信息。
可选的,所述方法还包括:
在确定用户完成无人机售后服务产品的激活后,在所述显示界面上显示推荐用户进行无人机与遥控设备绑定的信息。
可选的,所述第一无人机的标识信息包括所述第一无人机的飞机序列号。
可选的,所述第一遥控设备的标识信息包括所述第一遥控设备的芯片ID和/或遥控设备序列号。
以上所提供的各种实施方式的无人机丢失认证方法,其具体实现在前文中已有相应说明,在此不再赘述。
本申请实施例提供的无人机认证丢失方法,可以在用户请求对第一无人机进行丢失认证后,消除第一无人机唯一绑定的第一遥控设备对第一无人机的操控能力,如此,虽然第一无人机仍然只“认”第一遥控设备,即只允许第一遥控设备对其进行操控,但第一遥控设备却已丧失了对第一无人机的操控能力,此时,第一无人机相当于处于一种没有任何遥控设备可以操控的锁死状态,有效的实现了对第一无人机的丢失认证,使用户没有骗保的动机,可以对丢失认证成功的无人机进行理赔。
下面可以参考图11,图11是本申请实施例提供的可移动设备认证丢失方法的流程图。可移动设备可以具有以移动能力的电子设备,比如可以是无人机、无人车、机器人、无人船等等。该方法可以应用于终端设备,包括:
S1102、获取用户在终端设备的显示界面上确认对第一可移动设备进行丢失认证的操作。
S1104、响应于所述确认进行丢失认证的操作,确定所述终端设备当前连接的遥控器为所述第一可移动设备唯一绑定的第一遥控器。
所述第一可移动设备仅能被所述唯一绑定的第一遥控器操控。
S1106、根据所述第一可移动设备的标识信息对所述第一遥控器进行数据修改,以消除所述第一遥控器对所述第一可移动设备的操控能力可移动设备。
可选的,所述获取用户在终端设备的显示界面上确认对第一可移动设备进行丢失认证的操作,包括:
获取用户在终端设备的显示界面上对要进行丢失认证的可移动设备的选择操作;
根据所述选择操作,确定要进行丢失认证的第一可移动设备,并显示所述第一可移动设备的设备信息以供用户确认;
获取用户在所述显示界面上对所述第一可移动设备的设备信息进行确认的操作。
可选的,所述第一可移动设备的设备信息至少包括所述第一可移动设备的标识信息。
可选的,所述第一可移动设备的设备信息还包括所述第一可移动设备的机型信息。
可选的,所述第一可移动设备与所述第一遥控器是预先通过以下方式进行绑定的:
获取用户在所述显示界面上确认对所述终端设备当前连接的第一可移动设备与第一遥控器进行绑定的操作;
响应于所述确认进行绑定的操作,至少利用所述第一遥控器的标识信息建立所述第一可移动设备与所述第一遥控器的绑定关系。
可选的,所述至少利用所述第一遥控器的标识信息建立所述第一可移动设备与所述第一遥控器的绑定关系,包括:
将所述第一遥控器的标识信息写入所述第一可移动设备。
可选的,所述根据所述第一可移动设备的标识信息对所述第一遥控器进行数据修改,包括:
将所述第一可移动设备的标识信息写入所述第一遥控器的控制黑名单。
可选的,所述绑定关系还利用所述第一可移动设备的标识信息建立。
可选的,所述至少利用所述第一遥控器的标识信息建立所述第一可移动设备与所述第一遥控器的绑定关系,包括:
将所述第一可移动设备的标识信息写入所述第一遥控器,将所述第一遥控器的标识信息写入所述第一可移动设备。
可选的,所述根据所述第一可移动设备的标识信息对所述第一遥控器进行数据修改,包括:
擦除所述第一遥控器记录的所述第一可移动设备的标识信息。
可选的,所述绑定关系包括用户账户、所述第一可移动设备以及所述第一遥控器 三者的绑定关系。
可选的,所述获取用户在所述显示界面上确认对所述终端设备当前连接的第一可移动设备与第一遥控器进行绑定的操作,包括:
响应于用户在所述显示界面上确认进行可移动设备与遥控器绑定的操作,获取所述终端设备当前连接的第一可移动设备与第一遥控器各自的标识信息;
显示绑定信息以供用户确认,所述绑定信息至少包括所述第一可移动设备与所述第一遥控器各自的标识信息;
获取用户在所述显示界面上对所述绑定信息的确认操作。
可选的,所述绑定信息还包括用户账户信息。
可选的,所述方法还包括:
在确定用户完成可移动设备售后服务产品的激活后,在所述显示界面上显示推荐用户进行可移动设备与遥控器绑定的信息。
可选的,所述第一可移动设备的标识信息包括所述第一可移动设备的设备序列号。
可选的,所述第一遥控器的标识信息包括所述第一遥控器的芯片ID和/或遥控器序列号。
以上所提供的各种实施方式的可移动设备丢失认证方法,其具体实现在前文中已有相应说明,在此不再赘述。
本申请实施例提供的可移动设备认证丢失方法,可以在用户请求对第一可移动设备进行丢失认证后,消除第一可移动设备唯一绑定的第一遥控设备对第一可移动设备的操控能力,如此,虽然第一可移动设备仍然只“认”第一遥控设备,即只允许第一遥控设备对其进行操控,但第一遥控设备却已丧失了对第一可移动设备的操控能力,此时,第一可移动设备相当于处于一种没有任何遥控设备可以操控的锁死状态,有效的实现了对第一可移动设备的丢失认证,使用户没有骗保的动机,可以对丢失认证成功的无人机进行理赔。
可以参考图12,图12是本申请实施例提供的终端设备的结构示意图。该终端设备可以包括:处理器1210和存储有计算机程序的存储器1220,所述处理器在执行所述计算机程序时,可以实现本申请实施例提供的第一种或第二种无人机丢失认证方法。
可以参考图13,图13是本申请实施例提供的遥控设备的结构示意图。该遥控设备可以包括:处理器1310和存储有计算机程序的存储器1320,所述处理器在执行所述计算机程序时,可以实现本申请实施例提供的第三种无人机丢失认证方法。
还可以参考图14,图14是本申请实施例提供的无人机丢失认证系统的结构示意 图。该系统可以包括:终端设备1410、遥控器1420和服务器1430,所述终端设备分别与所述遥控器和所述服务器连接;
所述服务器预先记录了第一无人机与第一遥控器的绑定信息,其中,所述第一无人机唯一绑定所述第一遥控器,仅能被所述第一遥控器操控,所述绑定信息至少包括所述第一无人机的标识信息与所述第一遥控器的标识信息;
所述终端设备用于,获取用户在显示界面上确认对所述第一无人机进行丢失认证的操作;响应于所述确认进行丢失认证的操作,从所述服务器获取所述第一遥控器的标识信息,并根据所述第一遥控器的标识信息确定当前连接的所述遥控器是否为所述所述第一遥控器;若确定所述遥控器为所述第一遥控器,从所述服务器获取所述第一无人机的标识信息,并根据所述第一无人机的标识信息对所述第一遥控器进行数据修改,以消除所述第一遥控器对所述第一无人机的操控能力;将所述数据修改的结果反馈给所述服务器以完成认证。
本申请实施例提供的无人机认证丢失系统,可以在用户请求对第一无人机进行丢失认证后,消除第一无人机唯一绑定的第一遥控器对第一无人机的操控能力,如此,虽然第一无人机仍然只“认”第一遥控器,即只允许第一遥控器对其进行操控,但第一遥控器却已丧失了对第一无人机的操控能力,此时,第一无人机相当于处于一种没有任何遥控器可以操控的锁死状态,实现了对第一无人机有效的丢失认证,使用户没有骗保的动机,可以对丢失认证成功的无人机进行理赔。
本申请实施例还提供了一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序被处理器执行时实现本申请实施例提供的第一种无人机丢失认证方法。
本申请实施例还提供了一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序被处理器执行时实现本申请实施例提供的第二种无人机丢失认证方法。
本申请实施例还提供了一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序被处理器执行时实现本申请实施例提供的第三种无人机丢失认证方法。
以上针对每个保护主题均提供了多种实施方式,在不存在冲突或矛盾的基础上,本领域技术人员可以根据实际情况自由对各种实施方式进行组合,由此构成各种不同的技术方案。而本申请文件限于篇幅,未能对所有组合而得的技术方案展开说明,但可以理解的是,这些未能展开的技术方案也属于本申请实施例公开的范围。
本申请实施例可采用在一个或多个其中包含有程序代码的存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。计算机可用存储介质包括永久性和非永久性、可移动和非可移动媒体,可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括但不限于:相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。
需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。
以上对本发明实施例所提供的方法和装置进行了详细介绍,本文中应用了具体个例对本发明的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本发明的方法及其核心思想;同时,对于本领域的一般技术人员,依据本发明的思想,在具体实施方式及应用范围上均会有改变之处,综上所述,本说明书内容不应理解为对本发明的限制。
Claims (67)
- 一种无人机丢失认证方法,其特征在于,应用于终端设备,包括:获取用户在终端设备的显示界面上确认对第一无人机进行丢失认证的操作;响应于所述确认进行丢失认证的操作,确定所述终端设备当前连接的遥控器为所述第一无人机唯一绑定的第一遥控器,所述第一无人机仅能被所述唯一绑定的第一遥控器操控;根据所述第一无人机的标识信息对所述第一遥控器进行数据修改,以消除所述第一遥控器对所述第一无人机的操控能力。
- 根据权利要求1所述的方法,其特征在于,所述获取用户在终端设备的显示界面上确认对第一无人机进行丢失认证的操作,包括:获取用户在终端设备的显示界面上对要进行丢失认证的无人机的选择操作;根据所述选择操作,确定要进行丢失认证的第一无人机,并显示所述第一无人机的飞机信息以供用户确认;获取用户在所述显示界面上对所述第一无人机的飞机信息进行确认的操作。
- 根据权利要求2所述的方法,其特征在于,所述第一无人机的飞机信息至少包括所述第一无人机的标识信息。
- 根据权利要求3所述的方法,其特征在于,所述第一无人机的飞机信息还包括所述第一无人机的机型信息。
- 根据权利要求1所述的方法,其特征在于,所述第一无人机与所述第一遥控器是预先通过以下方式进行绑定的:获取用户在所述显示界面上确认对所述终端设备当前连接的第一无人机与第一遥控器进行绑定的操作;响应于所述确认进行绑定的操作,至少利用所述第一遥控器的标识信息建立所述第一无人机与所述第一遥控器的绑定关系。
- 根据权利要求5所述的方法,其特征在于,所述至少利用所述第一遥控器的标识信息建立所述第一无人机与所述第一遥控器的绑定关系,包括:将所述第一遥控器的标识信息写入所述第一无人机。
- 根据权利要求6所述的方法,其特征在于,所述根据所述第一无人机的标识信息对所述第一遥控器进行数据修改,包括:将所述第一无人机的标识信息写入所述第一遥控器的控制黑名单。
- 根据权利要求5所述的方法,其特征在于,所述绑定关系还利用所述第一无人 机的标识信息建立。
- 根据权利要求8所述的方法,其特征在于,所述至少利用所述第一遥控器的标识信息建立所述第一无人机与所述第一遥控器的绑定关系,包括:将所述第一无人机的标识信息写入所述第一遥控器,将所述第一遥控器的标识信息写入所述第一无人机。
- 根据权利要求9所述的方法,其特征在于,所述根据所述第一无人机的标识信息对所述第一遥控器进行数据修改,包括:擦除所述第一遥控器记录的所述第一无人机的标识信息。
- 根据权利要求5所述的方法,其特征在于,所述绑定关系包括用户账户、所述第一无人机以及所述第一遥控器三者的绑定关系。
- 根据权利要求5所述的方法,其特征在于,所述获取用户在所述显示界面上确认对所述终端设备当前连接的第一无人机与第一遥控器进行绑定的操作,包括:响应于用户在所述显示界面上确认进行无人机与遥控器绑定的操作,获取所述终端设备当前连接的第一无人机与第一遥控器各自的标识信息;显示绑定信息以供用户确认,所述绑定信息至少包括所述第一无人机与所述第一遥控器各自的标识信息;获取用户在所述显示界面上对所述绑定信息的确认操作。
- 根据权利要求12所述的方法,其特征在于,所述绑定信息还包括用户账户信息。
- 根据权利要求12所述的方法,其特征在于,所述方法还包括:在确定用户完成无人机售后服务产品的激活后,在所述显示界面上显示推荐用户进行无人机与遥控器绑定的信息。
- 根据权利要求1所述的方法,其特征在于,所述第一无人机的标识信息包括所述第一无人机的飞机序列号。
- 根据权利要求1所述的方法,其特征在于,所述第一遥控器的标识信息包括所述第一遥控器的芯片ID和/或遥控器序列号。
- 一种无人机丢失认证方法,其特征在于,应用于终端设备,包括:获取用户在终端设备的显示界面上确认对第一无人机进行丢失认证的操作;响应于所述确认进行丢失认证的操作,确定所述终端设备当前连接的遥控器为服务器中记录的所述第一无人机唯一绑定的第一遥控器,所述第一无人机仅能被所述唯 一绑定的第一遥控器操控;从所述服务器获取所述第一无人机的标识信息,并根据所述第一无人机的标识信息对所述第一遥控器进行数据修改,以消除所述第一遥控器对所述第一无人机的操控能力。
- 根据权利要求17所述的方法,其特征在于,所述获取用户在终端设备的显示界面上确认对第一无人机进行丢失认证的操作,包括:获取用户在终端设备的显示界面上对要进行丢失认证的无人机的选择操作;根据所述选择操作,确定要进行丢失认证的第一无人机,并显示所述第一无人机的飞机信息以供用户确认;获取用户在所述显示界面上对所述第一无人机的飞机信息进行确认的操作。
- 根据权利要求18所述的方法,其特征在于,所述第一无人机的飞机信息至少包括所述第一无人机的标识信息。
- 根据权利要求19所述的方法,其特征在于,所述第一无人机的飞机信息还包括所述第一无人机的机型信息。
- 根据权利要求17所述的方法,其特征在于,所述第一无人机与所述第一遥控器是预先通过以下方式进行绑定的:获取用户在所述显示界面上确认对所述终端设备当前连接的第一无人机与第一遥控器进行绑定的操作;响应于所述确认进行绑定的操作,至少利用所述第一遥控器的标识信息建立所述第一无人机与所述第一遥控器的绑定关系;将所述第一无人机的标识信息与所述第一遥控器的标识信息发送给所述服务器以记录所述绑定关系。
- 根据权利要求21所述的方法,其特征在于,所述至少利用所述第一遥控器的标识信息建立所述第一无人机与所述第一遥控器的绑定关系,包括:将所述第一遥控器的标识信息写入所述第一遥控器。
- 根据权利要求22所述的方法,其特征在于,所述根据所述第一无人机的标识信息对所述第一遥控器进行数据修改,包括:将所述第一无人机的标识信息写入所述第一遥控器的控制黑名单。
- 根据权利要求21所述的方法,其特征在于,所述绑定关系还利用所述第一无人机的标识信息建立。
- 根据权利要求24所述的方法,其特征在于,所述至少利用所述第一遥控器的 标识信息建立所述第一无人机与所述第一遥控器的绑定关系,包括:将所述第一无人机的标识信息写入所述第一遥控器,将所述第一遥控器的标识信息写入所述第一无人机。
- 根据权利要求25所述的方法,其特征在于,所述根据所述第一无人机的标识信息对所述第一遥控器进行数据修改,包括:擦除所述第一遥控器记录的所述第一无人机的标识信息。
- 根据权利要求21所述的方法,其特征在于,所述绑定关系包括用户账户、所述第一无人机以及所述第一遥控器三者的绑定关系。
- 根据权利要求21所述的方法,其特征在于,所述获取用户在所述显示界面上确认对所述终端设备当前连接的第一无人机与第一遥控器进行绑定的操作,包括:响应于用户在所述显示界面上确认进行无人机与遥控器绑定的操作,获取所述终端设备当前连接的第一无人机与第一遥控器各自的标识信息;显示绑定信息以供用户确认,所述绑定信息至少包括所述第一无人机与所述第一遥控器各自的标识信息;获取用户在所述显示界面上对所述绑定信息的确认操作。
- 根据权利要求28所述的方法,其特征在于,所述绑定信息还包括用户账户信息。
- 根据权利要求28所述的方法,其特征在于,所述方法还包括:在确定用户完成无人机售后服务产品的激活后,在所述显示界面上显示推荐用户进行无人机与遥控器绑定的信息。
- 根据权利要求17所述的方法,其特征在于,所述确定终端设备当前连接的遥控器为服务器中记录的所述第一无人机绑定的第一遥控器,包括:获取所述服务器记录的所述第一遥控器的标识信息;若所述第一遥控器的标识信息与当前连接的遥控器的标识信息匹配,确定当前连接的遥控器为所述第一遥控器。
- 根据权利要求17所述的方法,其特征在于,所述方法还包括:将数据修改成功的结果发送给所述服务器;获取所述服务器返回的认证成功的信息并显示在所述显示界面上。
- 根据权利要求17所述的方法,其特征在于,所述第一无人机的标识信息包括所述第一无人机的飞机序列号。
- 根据权利要求17所述的方法,其特征在于,所述第一遥控器的标识信息包括 所述第一遥控器的芯片ID和/或遥控器序列号。
- 根据权利要求17所述的方法,其特征在于,在所述第一无人机与所述第一遥控器建立绑定关系之前,所述方法还包括:在用户操控所述第一无人机飞行时,获取所述第一无人机的飞行状态信息;至少根据所述飞行状态信息,确定所述第一无人机当前的飞行安全性;若所述飞行安全性低于预设阈值,向用户推送是否将当前连接的遥控器与所述第一无人机进行绑定的询问信息。
- 根据权利要求35所述的方法,其特征在于,所述飞行状态信息包括:电量信息和/或信号强弱信息。
- 根据权利要求35所述的方法,其特征在于,所述飞行安全性还根据所述第一无人机的飞行环境信息确定。
- 根据权利要求37所述的方法,其特征在于,所述飞行环境信息是对所述第一无人机拍摄的图像进行识别确定的。
- 根据权利要求37所述的方法,其特征在于,所述飞行环境信息包括以下一种或多种:当前环境所属的场景类别、障碍物信息、天气信息。
- 根据权利要求17所述的方法,其特征在于,所述方法还包括:获取用户上一次操控所述第一无人机的飞行数据;根据所述飞行数据确定所述第一无人机是否有降落行为;将所述降落行为的确定结果反馈给所述服务器。
- 根据权利要求40所述的方法,其特征在于,所述方法还包括:根据所述飞行数据确定所述第一无人机的降落位置;确定所述降落位置是否属于不可到达的区域;将所述不可到达的区域的确定结果反馈给所述服务器。
- 根据权利要求17所述的方法,其特征在于,所述方法还包括:响应于所述确认进行丢失认证的操作,将所述终端设备本地存储的飞行数据上传至服务器。
- 一种无人机丢失认证方法,其特征在于,应用于遥控设备,包括:获取用户在遥控设备的显示界面上确认对第一无人机进行丢失认证的操作;响应于所述确认进行丢失认证的操作,确定所述遥控设备为所述第一无人机唯一绑定的第一遥控设备,所述第一无人机仅能被所述唯一绑定的第一遥控设备操控;根据所述第一无人机的标识信息对所述第一遥控设备进行数据修改,以消除所述第一遥控设备对所述第一无人机的操控能力。
- 根据权利要求43所述的方法,其特征在于,所述遥控设备包括:遥控器和终端设备,所述遥控器与所述终端设备连接。
- 根据权利要求43所述的方法,其特征在于,所述获取用户在遥控设备的显示界面上确认对第一无人机进行丢失认证的操作,包括:获取用户在遥控设备的显示界面上对要进行丢失认证的无人机的选择操作;根据所述选择操作,确定要进行丢失认证的第一无人机,并显示所述第一无人机的飞机信息以供用户确认;获取用户在所述显示界面上对所述第一无人机的飞机信息进行确认的操作。
- 根据权利要求45所述的方法,其特征在于,所述第一无人机的飞机信息至少包括所述第一无人机的标识信息。
- 根据权利要求46所述的方法,其特征在于,所述第一无人机的飞机信息还包括所述第一无人机的机型信息。
- 根据权利要求43所述的方法,其特征在于,所述第一无人机与所述第一遥控设备是预先通过以下方式进行绑定的:获取用户在所述显示界面上确认将所述第一遥控设备与所述第一无人机进行绑定的操作;响应于所述确认进行绑定的操作,至少利用所述第一遥控设备的标识信息建立所述第一无人机与所述第一遥控设备的绑定关系。
- 根据权利要求48所述的方法,其特征在于,所述至少利用所述第一遥控设备的标识信息建立所述第一无人机与所述第一遥控设备的绑定关系,包括:将所述第一遥控设备的标识信息写入所述第一遥控设备。
- 根据权利要求49所述的方法,其特征在于,所述根据所述第一无人机的标识信息对所述第一遥控设备进行数据修改,包括:将所述第一无人机的标识信息写入所述第一遥控设备的控制黑名单。
- 根据权利要求48所述的方法,其特征在于,所述绑定关系还利用所述第一无人机的标识信息建立。
- 根据权利要求51所述的方法,其特征在于,所述至少利用所述第一遥控设备的标识信息建立所述第一无人机与所述第一遥控设备的绑定关系,包括:将所述第一无人机的标识信息写入所述第一遥控设备,将所述第一遥控设备的标 识信息写入所述第一无人机。
- 根据权利要求52所述的方法,其特征在于,所述根据所述第一无人机的标识信息对所述第一遥控设备进行数据修改,包括:擦除所述第一遥控设备记录的所述第一无人机的标识信息。
- 根据权利要求48所述的方法,其特征在于,所述绑定关系包括用户账户、所述第一无人机以及所述第一遥控设备三者的绑定关系。
- 根据权利要求48所述的方法,其特征在于,所述获取用户在所述显示界面上确认将所述第一遥控设备与所述第一无人机进行绑定的操作,包括:响应于用户在所述显示界面上确认进行无人机与遥控设备绑定的操作,获取所述第一遥控设备当前连接的第一无人机的标识信息以及所述第一遥控设备的标识信息;显示绑定信息以供用户确认,所述绑定信息至少包括所述第一无人机与所述第一遥控设备各自的标识信息;获取用户在所述显示界面上对所述绑定信息的确认操作。
- 根据权利要求55所述的方法,其特征在于,所述绑定信息还包括用户账户信息。
- 根据权利要求55所述的方法,其特征在于,所述方法还包括:在确定用户完成无人机售后服务产品的激活后,在所述显示界面上显示推荐用户进行无人机与遥控设备绑定的信息。
- 根据权利要求43所述的方法,其特征在于,所述第一无人机的标识信息包括所述第一无人机的飞机序列号。
- 根据权利要求43所述的方法,其特征在于,所述第一遥控设备的标识信息包括所述第一遥控设备的芯片ID和/或遥控设备序列号。
- 一种可移动设备丢失认证方法,其特征在于,应用于终端设备,包括:获取用户在终端设备的显示界面上确认对第一可移动设备进行丢失认证的操作;响应于所述确认进行丢失认证的操作,确定所述终端设备当前连接的遥控器为所述第一可移动设备唯一绑定的第一遥控器,所述第一可移动设备仅能被所述唯一绑定的第一遥控器操控;根据所述第一可移动设备的标识信息对所述第一遥控器进行数据修改,以消除所述第一遥控器对所述第一可移动设备的操控能力。
- 一种终端设备,其特征在于,包括:处理器和存储有计算机程序的存储器, 所述处理器在执行所述计算机程序时实现如权利要求1-16任一项所述的无人机丢失认证方法。
- 一种终端设备,其特征在于,包括:处理器和存储有计算机程序的存储器,所述处理器在执行所述计算机程序时实现如权利要求17-42任一项所述的无人机丢失认证方法。
- 一种遥控设备,其特征在于,包括:处理器和存储有计算机程序的存储器,所述处理器在执行所述计算机程序时实现如权利要求43-59任一项所述的无人机丢失认证方法。
- 一种无人机丢失认证系统,其特征在于,包括:终端设备、遥控器和服务器,所述终端设备分别与所述遥控器和所述服务器连接;所述服务器预先记录了第一无人机与第一遥控器的绑定信息,其中,所述第一无人机唯一绑定所述第一遥控器,仅能被所述第一遥控器操控,所述绑定信息至少包括所述第一无人机的标识信息与所述第一遥控器的标识信息;所述终端设备用于,获取用户在显示界面上确认对所述第一无人机进行丢失认证的操作;响应于所述确认进行丢失认证的操作,从所述服务器获取所述第一遥控器的标识信息,并根据所述第一遥控器的标识信息确定当前连接的所述遥控器是否为所述所述第一遥控器;若确定所述遥控器为所述第一遥控器,从所述服务器获取所述第一无人机的标识信息,并根据所述第一无人机的标识信息对所述第一遥控器进行数据修改,以消除所述第一遥控器对所述第一无人机的操控能力;将所述数据修改的结果反馈给所述服务器以完成认证。
- 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机程序,所述计算机程序被处理器执行时实现如权利要求1-26任一项所述的无人机丢失认证方法。
- 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机程序,所述计算机程序被处理器执行时实现如权利要求27-42任一项所述的无人机丢失认证方法。
- 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机程序,所述计算机程序被处理器执行时实现如权利要求43-59任一项所述的无人机丢失认证方法。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2020/136547 WO2022126381A1 (zh) | 2020-12-15 | 2020-12-15 | 无人机丢失认证方法和系统、终端设备及遥控设备 |
CN202080081314.2A CN114916248B (zh) | 2020-12-15 | 2020-12-15 | 无人机丢失认证方法和系统、终端设备及遥控设备 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2020/136547 WO2022126381A1 (zh) | 2020-12-15 | 2020-12-15 | 无人机丢失认证方法和系统、终端设备及遥控设备 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022126381A1 true WO2022126381A1 (zh) | 2022-06-23 |
Family
ID=82059884
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/136547 WO2022126381A1 (zh) | 2020-12-15 | 2020-12-15 | 无人机丢失认证方法和系统、终端设备及遥控设备 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN114916248B (zh) |
WO (1) | WO2022126381A1 (zh) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104361741A (zh) * | 2014-12-08 | 2015-02-18 | 上海斐讯数据通信技术有限公司 | 遥控系统及方法 |
CN105741525A (zh) * | 2016-02-24 | 2016-07-06 | 北京小米移动软件有限公司 | 遥控器绑定的处理方法、装置和设备 |
CN106131103A (zh) * | 2016-06-02 | 2016-11-16 | 广州极飞电子科技有限公司 | 遥控器与无人机的通信方法、装置和系统 |
US20190373468A1 (en) * | 2017-03-15 | 2019-12-05 | International Business Machines Corporation | Authentication of users for securing remote controlled devices |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104724295B (zh) * | 2014-05-30 | 2016-12-07 | 广州安云电子科技有限公司 | 一种无人机载荷通用接口系统 |
EP3362360B1 (en) * | 2015-10-14 | 2023-06-14 | Flirtey Holdings, Inc. | Parachute control system for an unmanned aerial vehicle |
CN108268151A (zh) * | 2016-12-30 | 2018-07-10 | 昊翔电能运动科技(昆山)有限公司 | 控制遥控装置的方法、设备及装置 |
CN108702356A (zh) * | 2017-05-19 | 2018-10-23 | 深圳市大疆创新科技有限公司 | 身份验证方法、设备、机器可读存储介质以及系统 |
CN110007687B (zh) * | 2019-02-25 | 2023-07-21 | 中电科翌智航(重庆)科技有限公司 | 一种无人机搜寻系统 |
CN111917805A (zh) * | 2019-05-10 | 2020-11-10 | 梁友兵 | 一种通过智能终端远程驾驶与控制的方法 |
-
2020
- 2020-12-15 WO PCT/CN2020/136547 patent/WO2022126381A1/zh active Application Filing
- 2020-12-15 CN CN202080081314.2A patent/CN114916248B/zh active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104361741A (zh) * | 2014-12-08 | 2015-02-18 | 上海斐讯数据通信技术有限公司 | 遥控系统及方法 |
CN105741525A (zh) * | 2016-02-24 | 2016-07-06 | 北京小米移动软件有限公司 | 遥控器绑定的处理方法、装置和设备 |
CN106131103A (zh) * | 2016-06-02 | 2016-11-16 | 广州极飞电子科技有限公司 | 遥控器与无人机的通信方法、装置和系统 |
US20190373468A1 (en) * | 2017-03-15 | 2019-12-05 | International Business Machines Corporation | Authentication of users for securing remote controlled devices |
Also Published As
Publication number | Publication date |
---|---|
CN114916248B (zh) | 2024-03-08 |
CN114916248A (zh) | 2022-08-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fairfield | Owned: Property, privacy, and the new digital serfdom | |
US10059342B2 (en) | Global standard template creation, storage, and modification | |
US20130298215A1 (en) | Single sign-on user registration for online or client account services | |
CN103532933B (zh) | 通过指纹确认实现客户端操作授权的方法和智能终端 | |
US20120311624A1 (en) | Generating, editing, and sharing movie quotes | |
WO2020228442A1 (zh) | 一种车钥匙的控制方法和装置 | |
CN105678872A (zh) | 一种门禁管理系统及其授权方法和门禁终端设备 | |
CN105023438A (zh) | 一种停车场无人化管理方法及系统 | |
CN102077210A (zh) | 带有多个认证竖井的临时存储设备的授权 | |
CN102243590A (zh) | 用于在外部设备上的应用程序和车辆系统之间通信的方法 | |
CN105245542B (zh) | 账号授权方法、服务器及客户端 | |
US20180196960A1 (en) | Dispatching identity information from secure hardware appliance | |
WO2023185492A1 (zh) | 车辆控制器诊断方法、装置、设备和介质 | |
CN113709688A (zh) | 应用于车辆的数据处理方法及装置 | |
CN115733663A (zh) | 登录方法、装置、电子设备和存储介质 | |
CN107567021A (zh) | 一种用于对用户设备进行无线连接预授权的方法与设备 | |
WO2022202980A1 (ja) | オブジェクト管理システム | |
US11181908B2 (en) | Access rights of telepresence robots | |
CN105869255A (zh) | 一种基于移动终端的智能门禁控制方法及系统 | |
CN106559312A (zh) | 基于受控设备的群组管理方法和装置 | |
CN106385397B (zh) | 网络接入设备访问控制及类型配置方法和装置 | |
WO2022126381A1 (zh) | 无人机丢失认证方法和系统、终端设备及遥控设备 | |
CN107070875A (zh) | 解除智能设备与用户的绑定关系的方法及智能设备 | |
CN109462629A (zh) | 车辆信息处理方法、装置及车库系统 | |
KR101342406B1 (ko) | 통신 네트워크에서 가상 아이디를 이용한 대화 시스템 및 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20965399 Country of ref document: EP Kind code of ref document: A1 |