Safety access method for sensor, sensor and safety access system

A security access and sensor technology, which is applied in the field of sensors and security access systems, can solve the problems of hidden dangers of sensors and no consideration of safety management, and achieve the effect of realizing safe access management and avoiding hidden dangers

Inactive Publication Date: 2010-06-09
卓望数码技术(深圳)有限公司
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Taking card readers as an example, common card readers usually only contain functional modules, without considering the issue of security management
When the card reader is installed on the terminal of the application device, on the one hand, the device can be opened to various business uses, and at the same time, it may also be used by various malicious software or Trojan horse programs, which brings great security risks to the use of sensors.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety access method for sensor, sensor and safety access system
  • Safety access method for sensor, sensor and safety access system
  • Safety access method for sensor, sensor and safety access system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0025] figure 1 It is a schematic diagram of the structural composition of a security access system in an embodiment of the present invention. As shown in the figure, the security access system includes a sensor 10 and an application device terminal 20, wherein:

[0026] The sensor 10 is used to be called by the application software in the application device terminal 20 to perform business processing, and store the code signing certificate. Specifica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a safety access method for a sensor. The method comprises the following steps: when monitoring that service software calls service of the sensor, intercepting the service calling of the service software; acquiring a signature configuration file of the service software, wherein the signature configuration file comprises a program file and a signature ciphertext; calling a code signing certificate in the sensor to authenticate and sign the signature configuration file; and when the signature configuration file is authenticated and signed successfully, calling the service of the sensor through the service software. Correspondingly, the embodiment of the invention also provides a sensor, an application equipment terminal of the sensor and a safety access system. The implementation of the safety access method can realize the safety access management of sensor equipment, and avoids potential safety hazard caused by calling the sensor by various malicious software or a Trojan program.

Description

technical field [0001] The invention relates to the technical field of applied electronics, in particular to a method for securely accessing a sensor, a sensor and a system for securely accessing. Background technique [0002] With the development of radio frequency technology and sensor technology and the promotion of products, more and more sensors have entered various industries, including card readers, USB_Key, etc. At the same time, the security management of sensor devices is facing more and more challenges. Taking card readers as an example, common card readers usually only contain functional modules, without considering the issue of security management. When the card reader is installed on the terminal of the application device, on the one hand, the device can be opened to various business uses, and at the same time, it may be used by various malicious software or Trojan horse programs, so it brings great security risks to the use of sensors. . Contents of the inv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 吴勇邓辉
Owner 卓望数码技术(深圳)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products