Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Instruction reinforcing and discriminating method and system for unmanned plane

A technology of drones and instructions, applied in transmission systems, digital transmission systems, public keys for secure communications, etc. Effects of Intrusion and Malware Destruction

Inactive Publication Date: 2017-09-12
李维刚 +1
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) As an emerging market for drones, companies mostly complete the manufacturing of drones by integrating components, which cannot avoid related loopholes in hardware modules or software systems, leading to the risk of hackers;
[0005] (2) The traditional fixed frequency + frequency hopping anti-jamming method only solves the problem of timely and accurate UAV communication, but the communication data is still in plain text. Hackers may find loopholes to simulate the UAV’s remote control equipment to attack, thereby hijacking a drone;
[0009] For the above-mentioned security solutions, whether it is access authentication or data encryption, it can only solve some problems of UAVs, especially whether UAVs should execute remote control commands. At present, the security community has not been able to provide an effective and concise solution. With the safety verification mechanism, drones can only passively receive instructions and execute them, which bury a great hidden danger for the safety of drones, and hijacking incidents of powerful drones are inevitable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Instruction reinforcing and discriminating method and system for unmanned plane
  • Instruction reinforcing and discriminating method and system for unmanned plane

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The following will be combined with figure 1 And attached figure 2 , clearly and completely describe the technical solutions in the embodiments of the present invention, obviously, the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments obtained by persons of ordinary skill in the art based on the embodiments of the present invention belong to the protection scope of the present invention.

[0036] A method and system for reinforcement and identification of UAV instructions according to the present invention, in the process of realizing the reinforcement and identification of UAV instructions, includes the following steps:

[0037] (1) The key management system that identifies the public key generates a corresponding identification private key for the sender of the instruction and the drone according to the unique identification, and writes the identification private key into the security chip (the metho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an instruction reinforcing and discriminating method and system for an unmanned plane. During the implementation of instruction reinforcing, the method comprises a step of instruction reinforcing: reinforcing the instruction through the identification secret key of an instruction sender when the instruction sender sends an instruction to an opposite side, packaging the instruction and reinforcing data, and transmitting the package to the opposite side; a step of instruction discriminating which comprises the substeps: (1), enabling an instruction receiving side to receive the instruction and the reinforcing data, verifying the authenticity of the instruction reinforcing information, and switching to a substep (2) if the verification is passed; (2), obtaining the identification of the instruction sender and an instruction timestamp from the reinforcing data, and verifying whether the identification of the instruction sender is valid or not and whether the instruction is in an allowed time range or not: executing the instruction if the verification is passed, or else refusing the execution. The instruction reinforcing and discriminating is based on a combined public key system and a national commercial password algorithm SM9. The method achieves a purpose that the unmanned plane carries out the verification of the validity of a remote instruction, and can effectively prevents a hacker from attacking the unmanned plane.

Description

technical field [0001] The invention relates to a UAV command reinforcement technology. The instruction sender provides evidence, and the executor verifies the evidence to ensure the authenticity and integrity of the instruction, which prevents the instruction from being tampered or impersonated by hackers or viruses during network transmission. Technical method. Command reinforcement can effectively prevent drones from being used by hackers to carry out virus, Trojan and malicious code attacks, and provide drones with a technical method to effectively verify the authenticity and integrity of remote commands, so that drones have command selectivity ability to execute. Background technique [0002] At the 315 party in 2016, according to CCTV reports, under the control of hackers, DJI drones broke away from the control of the owner and were at the mercy of hackers. The transmission of data and instructions between the UAV and its flight control system and the ground workstat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30H04L9/00
Inventor 李维刚
Owner 李维刚
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products