Access method and system of unmanned aerial vehicle air traffic control system

An access method and air traffic control technology, applied in the field of control of unmanned aircraft, can solve problems such as unfavorable air traffic management, irregular use of airspace, and unlawful flight tasks, so as to improve soundness and safety, The effect of preventing accidents and eliminating management loopholes

Inactive Publication Date: 2017-05-10
NAT UNIV OF DEFENSE TECH
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The separation of the operator and the main body of the aircraft makes it difficult for the traditional air traffic management system to effectively supervise the unmanned aircraft and the person directly responsible
[0005] (2) The flight missions of unmanned aircraft are relatively random and disorderly. After an air accident or dangerous situation occurs, it is often difficult for the air traffic management department to trace and locate the person directly responsible for the unmanned aircraft. to punish
The problem with this type of unmanned aerial vehicle flight safety control system is that usually only emergency avoidance measures are taken during the flight when the danger is about to occur, so as to slow down the major losses caused by most of the foreseeable accidents, and cannot prevent the existence of the flight mission itself. mistakes, and the responsible person cannot be effectively supervised
However, the technical solution relies on private key electronic signatures and public key encrypted flight plans to bind the management control entity and the operator. First of all, the identity uncertainty caused by accidental or malicious key disclosure cannot be ruled out. It is necessary to tell the key to the other party so that the guard can be changed privately, which is not conducive to strict air traffic management
Second, the operator's failure to comply with the flight plan will only be held accountable when a flight accident is caused, and the accountability is not the ultimate goal of strengthening traffic control. legal mission
Third, the legality of the device cannot be verified without binding the flight device
[0010] For the third category of unmanned aerial vehicle air traffic management, the use of airspace is not standardized, and the flight tasks and responsible persons lack effective control, which still needs to be further studied

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access method and system of unmanned aerial vehicle air traffic control system
  • Access method and system of unmanned aerial vehicle air traffic control system
  • Access method and system of unmanned aerial vehicle air traffic control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042]The present invention will be further described in detail below with reference to the accompanying drawings and specific embodiments.

[0043] As shown in Figure 1, a method for accessing an unmanned aerial vehicle air traffic control system of the present invention includes the following steps:

[0044] S1: Encrypted storage of core data, ready for later verification.

[0045] The above-mentioned core data can be set according to actual needs, for example, it can include no-fly data, operator identity information, and equipment verification data.

[0046] No-fly data includes information about sensitive airspace that users cannot read.

[0047] The operator's identity verification can be fingerprint verification, face recognition, or other existing identity recognition methods. In this example, the operator identity information is verified by fingerprint, and the encrypted storage core data stores fingerprint information.

[0048] In this example, the device verifica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access method and system of an unmanned aerial vehicle air traffic control system. The method comprises the following steps: S1: storing core data in an encryption manner; S2: identity verification: performing validity verification on an operator and unmanned aerial vehicle driving aircraft equipment, wherein the validity verification comprises collecting operator identity information and aircraft equipment information, and comparing the operator identity information and the aircraft equipment information with the operator identity information and equipment verification data in the core data in step S1, wherein if the comparison result indicates match, the verification is passed, and the access system is activated, and on the contrary, the access system cannot be activated; S3: flight task application: after the access system is activated, performing identity binding on the unmanned aircraft and the operator to constitute a logic main body of the flight task application, wherein the logic main body applies for a flight task and airspace use from an air traffic management system; and S4: flight data supervision. The system is used for implementing the method. The access method and system disclosed by the invention has the advantages of simple principle, easy realization and effective technical management.

Description

technical field [0001] The present invention mainly relates to the technical field of management and control of unmanned aircraft, in particular to an access method and system of an unmanned aerial vehicle air traffic management system. Background technique [0002] The development of unmanned aerial vehicles can be traced back to the 1920s. Since the 1990s, it has been tested for military missions. Now it can be widely used in forest fire prevention, vegetation protection, power line inspection, commercial transportation, aerial photography, etc. With the vigorous development of the UAV market, the number of UAVs in my country has shown explosive growth. [0003] The unmanned aircraft system is composed of several parts such as remote control ground station, space communication link, aircraft and air traffic management system. Compared with manned aircraft, unmanned aircraft has the following two differences: [0004] (1) The operator is separated from the main body of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G08G5/00
CPCG08G5/006G08G5/0069
Inventor 庄东晔谢海斌尹栋朱燕红
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products