Disclosure of Invention
The invention aims to solve the technical problem of providing an unmanned aerial vehicle supervision method based on unmanned aerial vehicle identity recognition and unmanned aerial vehicle flight state monitoring.
The invention solves the technical problem, and provides an unmanned aerial vehicle supervision method, which comprises the following steps:
installing a data unit on the unmanned aerial vehicle, writing an identity unique code into the data unit,
detecting the current state of the unmanned aerial vehicle according to the identity unique code before using the unmanned aerial vehicle, synchronizing and verifying the characteristic information if the unmanned aerial vehicle is bound, binding the characteristic information with the unmanned aerial vehicle, activating the unmanned aerial vehicle,
and recording the synchronous return of the flight data of the unmanned aerial vehicle, and realizing the supervision of the state of the unmanned aerial vehicle.
Still further, the unique drone identity code includes at least:
{ two-dimensional code, RF radio frequency code, factory ID number }.
Further, the feature information includes at least:
{ identification number, identity unique code, terminal device number }.
Furthermore, the method for detecting the unique code of the identity of the unmanned aerial vehicle before the unmanned aerial vehicle is used comprises the following steps:
monitoring the operation of the user at the terminal, obtaining the access authority of the camera/keyboard,
scanning the identity unique code on the unmanned aerial vehicle through a camera,
and/or, inputting the identity unique code on the unmanned aerial vehicle through a keyboard,
jumping to the current state query window of the unmanned aerial vehicle according to the identity unique code,
and accessing the server through the WEB server at the terminal, and displaying a response result in a window.
Furthermore, the method for identifying the unique identity code on the terminal comprises the following steps: one or more of WeChat public/service number, mobile side application program, WeChat H5 applet, mobile side WEB browser or PC side WEB browser.
Based on the above, the present invention further provides an unmanned aerial vehicle monitoring system, including: an unmanned aerial vehicle, a terminal and a server end,
the unmanned aerial vehicle includes: a data unit for writing an identity unique code,
the terminal includes: an identification unit and a binding unit,
the identification unit is used for detecting the current state of the unmanned aerial vehicle according to the identity unique code before the unmanned aerial vehicle is used,
the binding unit is used for detecting whether the current state of the unmanned aerial vehicle is bound, if so, the operation is not activated, and if not, the characteristic information is input to bind with the unmanned aerial vehicle,
the server side is used for synchronizing and verifying the characteristic information, binding the characteristic information with the unmanned aerial vehicle and activating the unmanned aerial vehicle.
Furthermore, the terminal also comprises a monitoring unit,
the monitoring unit is used for recording flight data of the unmanned aerial vehicle are synchronously transmitted back to the background server, and monitoring of the state of the unmanned aerial vehicle is achieved.
Furthermore, the data unit is further configured to,
by providing an identity unique code, detecting the state of the unmanned aerial vehicle as idle or binding at the server side,
starting to record flight data of the unmanned aerial vehicle after the binding unit activates the unmanned aerial vehicle,
and transmitting the flight data back to the terminal in real time,
the flight data includes at least: flight height and flight path.
Still further, after the flight of the unmanned aerial vehicle is finished, the terminal is further used for unbinding the unmanned aerial vehicle from the driver, and performing the following configuration:
the drones with the same unique code for the identity are bound/unbound with at most one driver,
and binding/unbinding the same driver with at most one unmanned aerial vehicle after the characteristic information is verified.
Further, the interfaces of the drone, the terminal and the server may be mutually invoked,
the server end is connected with the terminal through a local area network or a wide area network,
the terminal is connected with the unmanned aerial vehicle through a serial port communication module.
The invention has the beneficial effects that:
according to the unmanned aerial vehicle monitoring method, the data unit is installed on the unmanned aerial vehicle, the unique identity code is written in the data unit, the identity identification and activation of the unmanned aerial vehicle can be completed before the unmanned aerial vehicle flies, the synchronous transmission flight data is recorded while the unmanned aerial vehicle flies, and the state of the unmanned aerial vehicle can be monitored after the unmanned aerial vehicle flies. The current state of the unmanned aerial vehicle is detected according to the identity unique code before the unmanned aerial vehicle is used, if the unmanned aerial vehicle is bound, the characteristic information is synchronized and verified, the characteristic information is bound with the unmanned aerial vehicle, and the unmanned aerial vehicle is activated, so that the identity recognition of the unmanned aerial vehicle, the binding of a user and the monitoring of the flight state of the unmanned aerial vehicle are realized.
The present invention also provides a system comprising: unmanned aerial vehicle, terminal and server end, the user can accomplish the discernment to unmanned aerial vehicle through the terminal, then accomplishes the user at the server end and binds, can monitor unmanned aerial vehicle flight state after unmanned aerial vehicle binds and activates successfully.
Detailed Description
The principles of the present disclosure will now be described with reference to a few exemplary embodiments. It is understood that these examples are described solely for the purpose of illustration and to assist those of ordinary skill in the art in understanding and working the disclosure, and are not intended to suggest any limitation as to the scope of the disclosure. The disclosure described herein may be implemented in various ways other than those described below.
As used herein, the term "include" and its various variants are to be understood as open-ended terms, which mean "including, but not limited to. The term "based on" may be understood as "based at least in part on". The term "one embodiment" may be understood as "at least one embodiment". The term "another embodiment" may be understood as "at least one other embodiment".
Please refer to fig. 1, which is a schematic flow chart of a method for monitoring an unmanned aerial vehicle according to an embodiment of the present invention, including the following steps:
step S100 is to install a data unit on the drone, and write an identity unique code into the data unit, where as a preferred option in this embodiment, the identity unique code of the drone at least includes: { two-dimensional code, RF radio frequency code, factory ID number }. The unique code is equal to the motor vehicle engine code, and each unmanned aerial vehicle has the unique code as legal identity identification.
In some embodiments, if the identity unique code is a two-dimensional code, the model, parameters and use condition of the unmanned aerial vehicle are recorded in the two-dimensional code.
In some embodiments, if the unique identity code is an RF radio frequency code, the model, parameters, and usage of the drone may be identified by a code scanning device.
In some embodiments, if the unique identity code is a factory ID number, the unique identity code can be identified by manual entry or the like.
In some embodiments, the monitoring window of the drone is jumped to by scanning the two-dimensional code.
Step S101, before the unmanned aerial vehicle is used, the current state of the unmanned aerial vehicle is detected according to the identity unique code, if the unmanned aerial vehicle is bound, the feature information is synchronized and verified, the feature information is bound with the unmanned aerial vehicle, and the unmanned aerial vehicle is activated. As a preference in the present embodiment, the feature information includes at least: { identification number, identity unique code, terminal device number }. The characteristic information includes, but is not limited to, identification card information, driving license information, social security number information, fingerprint information, iris information, and the like. The identification card number is the user's identification card number. The identity unique code is the unique identification ID of the unmanned aerial vehicle. The terminal equipment number is the equipment number of the terminal, such as the IMSI parameter, the international mobile subscriber identity IMSI in order to correctly identify a mobile subscriber over the radio path and the entire GSM mobile communication network, a specific identity must be assigned to the mobile subscriber. The International Mobile Subscriber Identity (IMSI) is a mark for distinguishing the Mobile Subscriber, is stored in the SIM card, and can be used for distinguishing the effective information of the Mobile Subscriber. The total length of the device does not exceed 15 bits, and numbers ranging from 0 to 9 are also used. Also for example, the IMEI parameter, the international mobile station equipment identity IMEI, is a code that uniquely identifies a mobile station equipment as a 15 digit decimal number. According to the unique identity code, the current state of the unmanned aerial vehicle is detected, when the user uses the unmanned aerial vehicle, the user firstly logs in an operating system of a client through a terminal, the unique identity code of the unmanned aerial vehicle, namely the ID of the unmanned aerial vehicle, is scanned or manually input, the current state of the unmanned aerial vehicle is detected to be idle or bound in a background networking mode, namely the unmanned aerial vehicle can fly or cannot fly. The idle or bound state described in this embodiment means that the unmanned aerial vehicle needs to be bound with the driver before flying, and in the binding process, the problem of the flight of the unmanned aerial vehicle is taken charge of by the driver.
In some embodiments, the current state of the drone further includes: unbinding, binding failure, or unbinding failure.
In some embodiments, detecting whether the drone is idle or bound according to the identity unique code requires querying a correspondence between the unique code of the drone and the driver in a correspondence table in the database, as follows:
| unique code of unmanned aerial vehicle
|
Status of state
|
Driver's seat
|
| Wurenji001ED
|
Free up
|
Is free of
|
| Wurenji002WD
|
Binding state
|
B
|
| Wurenji003EK
|
Free up
|
Is free of
|
| Wurenji005ED
|
Binding state
|
A |
If nobody binds then synchronization and verifies characteristic information, will the characteristic information binds with above-mentioned unmanned aerial vehicle, activates unmanned aerial vehicle, binds characteristic information and unmanned aerial vehicle to activate unmanned aerial vehicle. The contents in binding are: ID card information, unmanned aerial vehicle driver's license bind with unmanned aerial vehicle, as follows:
| unique code of unmanned aerial vehicle
|
Status of state
|
Identity card information
|
Driver's seat
|
| Wurenji001ED
|
Binding state
|
IMSI
|
G
|
| Wurenji002WD
|
Binding state
|
IMSI
|
B
|
| Wurenji003EK
|
Free up
|
Is free of
|
Is free of
|
| Wurenji005ED
|
Binding state
|
Identity ID
|
A |
In some embodiments, the identity of a drone uniquely encoded with the same code is bound/unbound to at most one driver.
In some embodiments, the same driver, after verification of the characteristic information, binds/unbinds with at most one drone.
Step S102, recording the synchronous return of the flight data of the unmanned aerial vehicle, and realizing the supervision of the state of the unmanned aerial vehicle. Through installing a data unit, can detect unmanned aerial vehicle's current state according to the only code of identity in the data unit before unmanned aerial vehicle uses, and after unmanned aerial vehicle flies, through the data unit record unmanned aerial vehicle's the synchronous passback of flight data. Unified management and verification of the user identity and the flight control data before flight are realized.
As shown in fig. 2, as a preferred method in this embodiment, the method for detecting the unique identity code of the drone before using the drone includes:
step S1001 monitors the operation of the user on the terminal, obtains the access authority of the camera/keyboard,
step S1002 scans the identity unique code on the drone through a camera,
and/or, in step S1003, inputting an identity unique code on the unmanned aerial vehicle through a keyboard,
step S1004 jumps to the current status inquiry window of the drone according to the identity unique code,
step S1005 is to access the server through the WEB server at the terminal, and to display the response result on the window.
As a preferred option in this embodiment, the method for identifying the unique identity code on the terminal includes: one or more of WeChat public/service number, mobile side application program, WeChat H5 applet, mobile side WEB browser or PC side WEB browser.
Fig. 3 is a schematic diagram of a system structure in an embodiment of the present invention, where an unmanned aerial vehicle monitoring system in the embodiment includes: unmanned aerial vehicle 1, terminal 2 and server end 3, the user need log in terminal 2's user client operating system earlier when using unmanned aerial vehicle, and the only code of scanning or manual input identity is unmanned aerial vehicle ID promptly, through with 3 networking detection unmanned aerial vehicle states of server end for idle or bind in, unmanned aerial vehicle is for can flying or can not the flight state promptly. After the flight, the driver needs to be unbound with the unmanned aerial vehicle, the unmanned aerial vehicle can be used by other drivers after being unbound, and the driver can also be bound with other unmanned aerial vehicles to fly at the moment. The responsibility binding corresponding to the unmanned aerial vehicle and the driver can be done in the embodiment.
In some embodiments, if the drone is detected to be in the binding state, the activation fails; if the unmanned aerial vehicle is detected to be in an idle state, the user can bind.
In some embodiments, the user enters personal information including, but not limited to, a legitimate drone driver's license ID or identification number at the terminal 2.
If the legal driving information of the personnel at the terminal 2 is verified successfully, namely the unmanned aerial vehicle is successfully bound with the user, the unmanned aerial vehicle is controlled and responsible by the unique user in the bound state. After binding successfully with unmanned aerial vehicle, unmanned aerial vehicle receives the activation information, but unmanned aerial vehicle can get into flight mode.
Please refer to fig. 4, which is a schematic structural diagram of a system in a preferred embodiment of the present invention, in the system in this embodiment, the unmanned aerial vehicle 1 includes: a data unit 11, said data unit 11 being configured to write an identity unique code, said terminal 2 comprising: the unmanned aerial vehicle identification system comprises an identification unit 21 and a binding unit 22, wherein the identification unit 21 is used for detecting the current state of the unmanned aerial vehicle according to the identity unique code before the unmanned aerial vehicle is used, the binding unit 22 is used for detecting whether the current state of the unmanned aerial vehicle is bound, if the current state is bound, the operation is not activated, if the current state is idle, characteristic information is input and bound with the unmanned aerial vehicle, the server end 3 is used for synchronizing and verifying the characteristic information, and the characteristic information is bound with the unmanned aerial vehicle and activated. In this embodiment, the data module of the data unit 11 simultaneously enables the flight record and the data synchronous return function; the user can receive unmanned aerial vehicle flight data in real time at the terminal 2, wherein the unmanned aerial vehicle flight data comprises but is not limited to flight height, flight routes and the like; the user accessible ground station adjustment unmanned aerial vehicle flight mode when 2 discovery unmanned aerial vehicle flights unusually at terminal carries out the supervision, and the user need unbind unmanned aerial vehicle and driver by oneself after the flight finishes. The restricted flight area includes, but is not limited to, one of a dwell time, a flyable altitude, a flyable speed, or any combination thereof.
As shown in fig. 5, as a preferred option in this embodiment, the terminal 2 further includes a monitoring unit 23, where the monitoring unit 23 is configured to record flight data of the unmanned aerial vehicle and synchronously transmit the flight data back to the background server, so as to implement monitoring of the state of the unmanned aerial vehicle.
As shown in fig. 6, in this embodiment, preferably, the data unit 11 is further configured to perform the following operations:
step S11 is to provide the identity unique code, detect the status of the drone as idle or binding at the server side,
step S12 is to start recording the flight data of the drone after the binding unit activates the drone,
step S13 returns the flight data to the terminal in real time,
the flight data at least includes: flight height and flight path.
In some embodiments, the terminal 2 further comprises an encryption network card. When the server 3 is connected with the terminal 2 through a local area network or a wide area network, the communication safety is ensured. Strong access control based on encryption is realized through the encryption network card, so that communication between hosts and between the hosts and the gateway inside the local area network is effectively protected, and eavesdropping of a third computer inside the local area network is prevented; and after the mobile user installs the encryption network card, when the mobile user communicates with the server side, the encryption network card can ensure the safety of data flowing through the Internet, namely the safety of the outside of the local area network. The server 3 accesses the virtual internet MAC layer through the PCI interface after outputting data, and all data sent by the network interface in the equipment can be seen to be encrypted after being encrypted by AES and being output through the real internet MAC layer.
In some embodiments, the data unit 11 further includes an encryption serial port, and after the data output by the background is received by the virtual UART serial port, the AES hardware encryption is controlled by the soft core, and the data is output by the real serial port, so that the data is effectively guaranteed.
In some embodiments, the data unit 11 further includes a mobile device data encryption function as a device that can be used to encrypt and decrypt a usb or IDE hard disk, thereby performing encryption protection on the mobile device data.
In some embodiments, the terminal 2 uses the hardware description language VHDL to implement AES encryption and decryption on the digital logic level of the FPGA, and the information communication between the PC and the terminal, the encryption terminal and the decryption terminal is implemented through wired communication of UART.
In some embodiments, the terminal 2 is further configured to determine whether the unmanned aerial vehicle is within a preset no-fly range according to the geographic position information, prohibit the unmanned aerial vehicle from performing flight operations if the unmanned aerial vehicle is within the preset no-fly range, and return prompt information to a remote control device and/or a ground station of the unmanned aerial vehicle to prompt a user that the unmanned aerial vehicle is within a no-fly route or an airspace range, and allow the unmanned aerial vehicle to perform flight operations if the unmanned aerial vehicle is not within the no-fly route or the airspace range.
In some embodiments, the terminal 2 is further configured to determine whether the unmanned aerial vehicle is within a preset flyable range according to the geographic position information, and if so, allow the unmanned aerial vehicle to perform a flight operation.
In some embodiments, the terminal 2 is further configured to determine whether the unmanned aerial vehicle is in a restricted flight area according to the geographic position information, and if so, obtain a restriction condition corresponding to the restricted flight area, and send the restriction condition to the unmanned aerial vehicle, a remote control device of the unmanned aerial vehicle, or a ground station.
In some embodiments, the terminal 2 is further configured to determine whether the geographic location information is a preset authorized departure point, allow the unmanned aerial vehicle to execute a departure operation if the geographic location information is the preset authorized departure point, and prohibit the unmanned aerial vehicle from executing the departure operation if the geographic location information is the preset authorized departure point, and return a prompt message to a remote control device and/or a ground station of the unmanned aerial vehicle to prompt a user that the unmanned aerial vehicle is not at the authorized departure point.
In some embodiments, terminal 2 is a remote control terminal or a mobile phone.
Fig. 7 is a schematic structural diagram of the unmanned aerial vehicle and the terminal in fig. 3, after the flight of the unmanned aerial vehicle is finished, the terminal 2 is further used for unbinding the unmanned aerial vehicle 1 from the driver in this embodiment, and the following configuration is performed:
the unmanned aerial vehicle with the same unique code for the identity is bound/unbound with at most one driver,
and binding/unbinding the same driver with at most one unmanned aerial vehicle after the characteristic information is verified, so that one-machine-one-person responsibility binding can be realized.
As shown in fig. 8, which is a schematic diagram of a connection relationship in the system of the present invention, in the system of this embodiment, the unmanned aerial vehicle 1 includes: a data unit 11 for writing an identity unique code, the terminal 2 comprising: the identification element 21, bind the unit 22, the identification element 21 is used for detecting before unmanned aerial vehicle the only code of identity, bind the unit 22 for whether the current state that detects unmanned aerial vehicle is for binding, if for binding the state, then do not activate the operation, if idle state, then input characteristic information binds with unmanned aerial vehicle, server end 3, for synchronous and verify characteristic information, and will characteristic information binds with above-mentioned unmanned aerial vehicle, activates unmanned aerial vehicle the terminal and the interface of server end can recall each other, server end 3 with terminal 2 passes through local area network or wide area network and connects, terminal 2 with unmanned aerial vehicle 1 passes through serial communication module and connects.
In some embodiments, the local area network includes, but is not limited to, WI-FI constant/wired communication or bluetooth communication.
In some embodiments, the wide area network includes, but is not limited to, VHF or UHF bands.
In some embodiments, the wide area network includes, but is not limited to, GSM/GPRS/3G/4G/5G.
Fig. 9 is a schematic diagram showing the time sequence operation of the system in fig. 8, which includes the drone 1, the terminal 2 and the server 3,
installing a data unit on the unmanned aerial vehicle 1, writing an identity unique code into the data unit,
the current state of the drone is detected from said identity unique code before said terminal 2 uses the drone,
detecting whether the current state of the unmanned aerial vehicle is binding at the terminal 2, if so, not activating the operation, if not, inputting characteristic information to bind with the unmanned aerial vehicle,
and synchronizing and verifying the characteristic information at the server end 3, binding the characteristic information with the unmanned aerial vehicle, and activating the unmanned aerial vehicle 1.
Recording at unmanned aerial vehicle 1 unmanned aerial vehicle's flight data synchronous passback realizes the supervision to the unmanned aerial vehicle state.
Preferably, in this embodiment, the terminal 2 provides the identity unique code, and detects that the state of the drone is idle or bound at the server side,
starting to record flight data of the unmanned aerial vehicle after the binding unit activates the unmanned aerial vehicle,
and transmitting the flight data back to the terminal in real time,
the flight data includes at least: flight height and flight path.
As a preferred option in this embodiment, after the flight of the unmanned aerial vehicle is finished, the terminal is further configured to unbind the unmanned aerial vehicle from the driver, and perform the following configuration:
the unmanned aerial vehicle with the same unique code for the identity is bound/unbound with at most one driver,
and binding/unbinding the same driver with at most one unmanned aerial vehicle after the characteristic information is verified.
As a preferred option in this embodiment, the interfaces of the unmanned aerial vehicle 1, the terminal 2, and the server terminal 3 may be called to each other, the server terminal is connected to the terminal through a local area network or a wide area network, and the terminal is connected to the unmanned aerial vehicle through a serial port communication module.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
In general, the various embodiments of the disclosure may be implemented in hardware or special purpose circuits, software, logic or any combination thereof. Some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software which may be executed by a controller, microprocessor or other computing device. While various aspects of the disclosure may be illustrated and described as block diagrams, flow charts, or using some other pictorial representation, it is well understood that the blocks, apparatus, systems, techniques or methods described herein may be implemented in, without limitation, hardware, software, firmware, special purpose circuits or logic, general purpose hardware or controller or other computing devices, or some combination thereof.
Further, while operations are described in a particular order, this should not be understood as requiring that such operations be performed in the order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In some cases, multitasking or parallel processing may be advantageous. Similarly, while details of several specific implementations are included in the above discussion, these should not be construed as any limitation on the scope of the disclosure, but rather the description of features is directed to specific embodiments only. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination.