Secure communication system, method and device
A security communication and key technology, applied in the field of security authentication and security communication, can solve the problems of deceiving the receiver, property loss of the system owner, system hijacking, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0200] refer to figure 1 Shown is a schematic diagram of the hardware architecture of a preferred embodiment of the secure communication system of the present invention.
[0201] In this embodiment, the secure communication system 1000 includes a communication device that communicates through a wireless network, such as a communication first party 1 and a communication second party 2 . The first communication party 1 and the second communication party 2 may be respectively the information sender and the information receiver in a one-way communication system, or the master and controlled parties in an asymmetric two-way communication system. For example, the first communication party 1 may be a flight controller, such as a remote controller, and the second communication party 2 may be an unmanned aerial vehicle or a camera module, a gimbal, etc. on an unmanned aerial vehicle.
[0202] In other embodiments, the first communication party 1 and the second communication party 2 ma...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


