Unlock instant, AI-driven research and patent intelligence for your innovation.

Commodity transportation method based on network connection unmanned aerial vehicle, user side and secret key management platform

A key management and client-side technology, applied in the field of computer-readable storage media, can solve problems such as man-in-the-middle attacks, labor demand, high labor costs, and poor user experience

Active Publication Date: 2021-03-26
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the delivery link of the "last mile" logistics transportation service, due to the uncertainty of identity recognition when drone equipment transports goods, there is an attack by a middleman, the security of the communication process cannot be guaranteed, and there is a problem of how to complete the line. Due to the problems of confidential payment and ensuring the safety of goods collected by users, the "last mile" of logistics transportation still needs to be completed by manpower, so that the demand for labor and labor costs remain high; moreover, due to the increasing traffic congestion on the road, transportation services Efficiency cannot be guaranteed, leading to poor user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Commodity transportation method based on network connection unmanned aerial vehicle, user side and secret key management platform
  • Commodity transportation method based on network connection unmanned aerial vehicle, user side and secret key management platform
  • Commodity transportation method based on network connection unmanned aerial vehicle, user side and secret key management platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to enable those skilled in the art to better understand the technical solutions of the present disclosure, the present disclosure will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0045] Wherein, the terms used in the embodiments of the present disclosure are only for the purpose of describing specific embodiments, and are not intended to limit the present disclosure. As used in the examples of this disclosure and the appended claims, the singular forms "a", "said" and "the" are also intended to include the plural forms unless the context clearly dictates otherwise.

[0046] In the process of commodity transportation, the "last mile" delivery link of logistics transportation services cannot guarantee the security of the communication process due to the uncertainty of identity recognition when drone equipment transports goods, and the existence of man-in-the-middle attacks. There are problems of how to com...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a commodity transportation method based on a network connection unmanned aerial vehicle, a user side, a secret key management platform, computer equipment and a storage medium,and the method comprises the steps of obtaining a part of private keys from the secret key management platform, and obtaining the remaining private keys from a secret key generation platform; synthesizing a user complete private key according to the user parameters, part of private keys and the remaining private keys; sending the commodity order to an e-commerce platform, so that the e-commerce platform synthesizes a user public key according to the public parameter and the user identifier obtained from the key management platform, allocates an order commodity and a commodity taking code to the unmanned aerial vehicle, and transports the commodity to a target position; receiving the order information encrypted by the user public key and sent by the e-commerce platform, and decrypting the order information by using the user complete private key to complete payment; and after payment is completed, obtaining a goods taking code from the e-commerce platform, and verifying and extracting the goods at the unmanned aerial vehicle. According to the technical scheme, the safety of the communication process can be guaranteed, and commodities transported by the unmanned aerial vehicle can safely and reliably reach the hand of a user.

Description

technical field [0001] The disclosure belongs to the field of logistics transportation, and specifically relates to a commodity transportation method based on a networked drone, a user terminal, a key management platform, a computer device, and a computer-readable storage medium. Background technique [0002] The logistics industry has become one of the important industries supporting the development of my country's national economy, and it has become increasingly indispensable to people's modern life. At present, logistics and transportation are mainly completed manually, which has gradually become stretched for the rapidly increasing business volume of related companies. Therefore, the logistics and transportation industry urgently needs more intelligent, automated and precise solutions to gradually replace the existing manual delivery methods and achieve long-term goals such as greatly reducing costs and improving efficiency. [0003] Based on the above background, intel...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q10/08G06Q20/38G06Q20/42G06Q30/06
CPCG06Q10/083G06Q20/3829G06Q20/42G06Q30/0633Y02D30/70
Inventor 刘牧洲
Owner CHINA UNITED NETWORK COMM GRP CO LTD