Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Control system and method with authentication function

A technology for control systems and authentication methods, applied in the usage of multiple keys/algorithms, user identity/authority verification, etc., and can solve problems such as inability to conform to users, password changes, and inability to randomly change

Active Publication Date: 2009-01-14
CHROMA ELECTRONICS SHENZHEN
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Although the above-mentioned prior art can achieve the functions of encryption and decryption, because its encryption and decryption procedures are fixed patterns and cannot be changed randomly, and in this system, it is necessary to first identify the device to which it belongs with identification data in various devices. The device uses the backup password to confirm the action. It only has a one-way protection mechanism during encryption and decryption, and the set password cannot be dynamically changed; therefore, the general existing technology cannot meet the needs of users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control system and method with authentication function
  • Control system and method with authentication function
  • Control system and method with authentication function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Regarding the control system and method with authentication function described in the present invention, further understanding can be obtained through the following detailed description of the invention and the accompanying drawings.

[0032] Since there are many kinds of communication interfaces of instruments at present, such as GPIB, RS232 / 482 / 485, USB, Ethernet, etc., the present invention will be applicable to all models. When these common communication interfaces are used for information transmission, the The content can be monitored, which means that these communication data are completely open, so the present invention designs an authentication device and its related method, even if the communication data is completely open, it can also achieve the effect of confidentiality. The following will describe this in detail Invented design.

[0033] First of all, please refer to FIG. 1 , which is the basic concept of the design of the present invention and also a schem...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A control system with authentication function for protecting program inventor developed and device. The system comprises a first device including a executive program for controlling the first device and a first key which has information enciphering function and deciphering function; a second device including a control program and a second key which has information enciphering and deciphering function, connecting with the first device through a communication interface; in addition, enciphered information of the first key must be deciphered by using the second key, and enciphered information of the second key must be deciphered by using the first key, the first key and second key needs to cooperate for authentication and the first device and second device will execute function.

Description

technical field [0001] The present invention relates to an authentication device and its related method, in particular to an authentication device and method capable of protecting the program and equipment developed by the inventor, and in particular to a control system with an authentication function. systems and methods. Background technique [0002] At present, the common remote-controllable instruments, the control commands are all open on the standard communication interface, and those who are interested can use the ready-made software as long as they design the same command format, resulting in the loss of the development software instrument manufacturer; some instruments Manufacturers will use special communication interfaces to avoid plagiarism, but the development of new communication interfaces will also increase the cost of development and the difficulty of maintenance. As for the software part, common protection methods such as registration codes, software start...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/16
Inventor 陈泓斌曾焕舜
Owner CHROMA ELECTRONICS SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products