Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An unmanned aerial vehicle and ground station capable of cooperating with an authentication communication mechanism and an authentication method

A technology of drones and ground stations, which is applied in the field of authentication and can solve problems such as the inability to solve the control security of multiple drones

Active Publication Date: 2019-03-05
陈昊
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, most UAV applications use a point-to-point communication method in which a single ground station controls a single UAV. The ground station only relies on the communication frequency band, transmission power and visible range to judge whether the UAV is controlled, and cannot solve the problem of transmission power in the same area. The control safety of multiple drones within the range and the control of "relay" drones beyond the visual range

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An unmanned aerial vehicle and ground station capable of cooperating with an authentication communication mechanism and an authentication method
  • An unmanned aerial vehicle and ground station capable of cooperating with an authentication communication mechanism and an authentication method
  • An unmanned aerial vehicle and ground station capable of cooperating with an authentication communication mechanism and an authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0121] Embodiment 1. An unmanned aerial vehicle that can cooperate with an authentication communication mechanism.

[0122] figure 1 It is a schematic diagram of the structure of the UAV that can cooperate with the authentication communication mechanism in Embodiment 1 of the present invention. The embodiment of the present invention will combine figure 1 Be specific.

[0123] Such as figure 1 As shown, the embodiment of the present invention provides a drone that can cooperate with the authentication communication mechanism, including the first communication data transmission module 101, the first authentication message processing module 102, the first storage module 103, and the first clock module 104, the first authentication message processing module 102, the first communication data transmission module 101, and the first clock module 104 can communicate bidirectionally, and the first storage module 103 is connected to the first authentication message processing module ...

Embodiment 2

[0146] Embodiment 2, a drone authentication method.

[0147] figure 2 It is a flowchart of the UAV authentication method in Embodiment 2 of the present invention, and the embodiment of the present invention will combine figure 2 Be specific.

[0148] Such as figure 2 As shown, the embodiment of the present invention provides a UAV authentication method, including the following steps:

[0149] Step S201: the UAV receives a data link authentication activation message sent from a ground station;

[0150] Step S202: The drone invokes the stored drone certificate, joins the local system time to construct a data link authentication request message and sends it to the ground station;

[0151] Step S203: The UAV receives the data link authentication response message forwarded by the ground station, wherein the data link authentication response message is issued after the ground station sends an identity authentication request message to the authentication center, The identity ...

Embodiment 3

[0177] Embodiment 3, a drone authentication method.

[0178] image 3 It is the flow chart of the UAV authentication method in Embodiment 3 of the present invention, and the embodiment of the present invention will combine image 3 Be specific.

[0179] Such as image 3 As shown, the embodiment of the present invention provides a UAV authentication method, including the following steps:

[0180] Step S301: After the UAV is successfully associated or re-associated with the ground station, UAV authentication is started;

[0181] Step S302: the UAV starts the T0 timer;

[0182] Step S303: Judging whether the T0 timer is overtime, if T0 is overtime, jump to step S315; otherwise, go to the next step;

[0183] Step S304: Judging whether the UAV has received the data link authentication activation message sent by the ground station, if yes, proceed to the next step; otherwise, jump back to step S303;

[0184] Step S305: The drone calls the stored drone certificate, and adds the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an unmanned aerial vehicle, a ground station and an authentication method that can cooperate with an authentication communication mechanism, and belongs to the technical field of authentication. The drone includes a first communication data transmission module, a first authentication message processing module, a first storage module and a first clock module. The ground station includes a second communication data transmission module, a second authentication message processing module, a second storage module, and a second clock module. The present invention can judge the identity legitimacy of the current UAV and ground station by verifying the UAV and ground station certificates that are currently associated and issued an authentication request, and prevent illegal UAVs from accessing the ground station network system and illegal ground station Controlling drones can also prevent user communication data from being illegally stolen, which greatly improves the security of drone communications.

Description

technical field [0001] The invention relates to the field of authentication, in particular to an unmanned aerial vehicle, a ground station and an authentication method that can cooperate with an authentication communication mechanism. Background technique [0002] UAVs have a wide range of applications in aerial photography, flight performances, disaster prevention and rescue, scientific investigation and other fields. With the rapid development of electronic technology, small and micro drones have made significant breakthroughs in remote control, battery life, and flight quality, and have become the focus of attention in the field of general aviation that has emerged in recent years, and are generally considered to have good development prospect. [0003] At present, unmanned aerial vehicles have begun to enter the consumer market, especially multi-rotor aircraft, typically, such as four-axis multi-rotor aircraft, which have become the first choice for aerial photography i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04B7/185H04W12/06
CPCH04B7/18506H04W12/06
Inventor 陈昊
Owner 陈昊
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products