Unlock instant, AI-driven research and patent intelligence for your innovation.

UAV firmware protection system

A protection system and drone technology, applied in transmission systems, digital data protection, digital transmission systems, etc., can solve the problem of firmware protection strength relying on integrity verification, control illegal firmware implantation, and ensure flight safety. Effect

Inactive Publication Date: 2018-09-04
苏州光之翼智能科技有限公司
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Facing the increasing security requirements of drones, as the source of all security policies, it is far from enough to rely solely on integrity checks for the protection strength of firmware

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • UAV firmware protection system
  • UAV firmware protection system
  • UAV firmware protection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The present invention will be described in detail below with reference to the accompanying drawings and in combination with embodiments.

[0052] Such as figure 1 As shown, a UAV firmware protection system includes a UAV-side firmware module and a corresponding host-side firmware module, wherein,

[0053] The drone-side firmware module includes:

[0054] Bootrom module, the program block that is executed first after the chip is started, is executed after the firmware is loaded, and is used for signature authentication of the firmware;

[0055] Chip unique identification code, including the unique ID of each chip, used for symmetric encryption key;

[0056] The asymmetric encrypted private key is used for signature authentication when the firmware module on the drone side starts, and is burnt into the chip when the chip leaves the factory, and forms a set of asymmetric encrypted public keys with the asymmetric encrypted public key used to encrypt the firmware summary i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a UAV firmware protection system. The system comprises a UAV end firmware module and a corresponding host end firmware module. The UAV end firmware module comprises: aBootrom module, a chip unique identification code, an asymmetric encrypted private key, and firmware summary information. A firmware upgrade package sent by the host end firmware module to the UAV end firmware module comprises original firmware, encrypted firmware, CRC check information and firmware summary encryption information, and the firmware summary encryption information is decrypted intothe firmware summary information by the asymmetric encrypted private key in the UAV firmware module. According to the UAV firmware protection system disclosed by the present invention, by enabling anasymmetric authentication mechanism for firmware upgrade, that only authorized legal firmware is burned can be ensured, illegal firmware implantation can be effectively controlled, and flight safety is guaranteed.

Description

technical field [0001] The invention relates to the technical field of multi-axis aircraft, in particular to a UAV firmware protection system. Background technique [0002] With the widespread use of drones, the safety management requirements for drones are getting higher and higher. Typically, more protection mechanisms are added to the embedded firmware of drones, such as data encryption to prevent some key data from being illegally stolen; communication encryption to prevent others from intercepting drones; flight altitude / area restrictions to prevent aircraft from Fly in unauthorized areas. [0003] Such security implementations depend on the normal operation of the drone's firmware to function. As the source of everything, how to protect the drone's firmware is rarely involved. [0004] In an unprotected UAV system, illegal users can implant their own firmware by flashing the machine, so as to achieve arbitrary flight, which is a huge loophole for the safety of UAVs. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F8/65G06F11/10G06F21/62H04L9/06H04L9/08H04L9/32
CPCG06F8/65G06F11/1004G06F21/6209H04L9/0631H04L9/0643H04L9/0861H04L9/0894H04L9/3236
Inventor 王猛丁军翟国华冯翼颜丙葵
Owner 苏州光之翼智能科技有限公司