Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data security transmission method and system of embedded AI chip on edge side of unmanned aerial vehicle

A data security and transmission system technology, applied in computer security devices, digital data protection, electrical digital data processing, etc., can solve problems affecting system security, limited data security protection capabilities of embedded AI chips, and inability to upload data. To achieve the effect of improving the security of data interaction

Active Publication Date: 2022-04-05
广州中科智云科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the processing capability of the embedded AI chip on the edge side is limited after all. In some cases, the embedded AI still needs to interact with the server for data, such as the upgrade of the AI ​​processing model, the reporting of some data logs, and cannot be processed by edge computing. data upload, etc.
Moreover, the data security protection capability of the embedded AI chip on the edge side is also limited. The embedded AI chip itself or its data interaction process with the server may be illegally invaded, affecting the security of the entire system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security transmission method and system of embedded AI chip on edge side of unmanned aerial vehicle
  • Data security transmission method and system of embedded AI chip on edge side of unmanned aerial vehicle
  • Data security transmission method and system of embedded AI chip on edge side of unmanned aerial vehicle

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. The components of the embodiments of the application generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations.

[0074] Please refer to figure 1 , figure 1 A schematic diagram of a data security transmission system of an embedded AI chip on the edge side of a drone provided for this embodiment. The data security transmission system of an embedded AI chip on the edge side of a drone may include an embedded An AI chip 20 and a server 10 that can communicate with the embedded AI chip ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application provides a method and system for secure data transmission of an embedded AI chip on the edge side of a UAV. The embedded AI chip generates a first unique identifier corresponding to the embedded AI chip, and encrypts the first unique identifier to generate and identify it. string, and send the encrypted identification string to the server. The server obtains the program information of the embedded AI chip, generates the second unique identifier corresponding to the embedded AI chip, and compares the second unique identifier with the first unique identifier. If the comparison results are consistent, the verification is passed, and the server generates a dynamic The 3DES encryption key and dynamic 3DES decryption key are encapsulated into a response message and returned to the embedded AI chip. In this way, the embedded AI chip can use the dynamic 3DES encryption key and dynamic 3DES decryption key to encrypt or decrypt the data interacted with the server, thereby improving the security of data interaction between the drone and the server .

Description

technical field [0001] The present application relates to the technical field of unmanned aerial vehicles, in particular, to a method and system for secure data transmission of an embedded AI chip on the edge side of an unmanned aerial vehicle. Background technique [0002] With the development of AI technology, the degree of optimization of AI algorithms is increasing day by day, which enables AI algorithms to run in terminal devices with embedded AI chips in the form of edge computing. Taking drones as an example, drones with embedded AI chips can independently perform some data processing tasks without relying on the server, for example, analyze images to perform target tracking, route planning, flight obstacle avoidance, etc. action. [0003] However, the processing capability of the embedded AI chip on the edge side is limited after all. In some cases, the embedded AI still needs to interact with the server for data, such as the upgrade of the AI ​​processing model, th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06V20/17G06V10/44G06V10/774G06V10/80G06K9/62G06F21/60
CPCG06F21/602G06F18/253G06F18/214
Inventor 张凡刘正坤林典润席忠进田宏亮吴丹妮赵淑根
Owner 广州中科智云科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products