Commodity transportation method based on network connection unmanned aerial vehicle, user side and secret key management platform
A key management and client-side technology, applied in the field of computer-readable storage media, can solve problems such as man-in-the-middle attacks, labor demand, high labor costs, and poor user experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0044] In order to enable those skilled in the art to better understand the technical solutions of the present disclosure, the present disclosure will be further described in detail below in conjunction with the accompanying drawings and embodiments.
[0045] Wherein, the terms used in the embodiments of the present disclosure are only for the purpose of describing specific embodiments, and are not intended to limit the present disclosure. As used in the examples of this disclosure and the appended claims, the singular forms "a", "said" and "the" are also intended to include the plural forms unless the context clearly dictates otherwise.
[0046] In the process of commodity transportation, the "last mile" delivery link of logistics transportation services cannot guarantee the security of the communication process due to the uncertainty of identity recognition when drone equipment transports goods, and the existence of man-in-the-middle attacks. There are problems of how to com...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


