Method for establishing equipment secure access

A technology for secure access and equipment, applied in the field of Internet portal service systems for CE equipment, it can solve problems such as not very comprehensive, complicated implementation of security pipelines, and inability to obtain real applications, and achieve secure interconnection and interoperability. Effect

Inactive Publication Date: 2010-06-23
TCL CORPORATION
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The introduction of IGRS and UPNP technologies can effectively solve the problems of interconnection and resource sharing between various devices, but these two standards are not very comprehensive in terms of security considerations and handling
Taking the IGRS standard as an example, the current security measures mainly include the following two aspects: 1. With the help of the security mechanism of the underlying physical network, for example, for wireless networks, the encryption mechanism of wireless WEP can be used, but for wired networks, there is no With such a guarantee, for security solutions that rely on the underlying physical network, interconnection and intercommunication can be realized based on different physical networks, but when the underlying communication method changes, security cannot be guaranteed; 2. Use a secure pipeline mechanism at the application layer , this approach also has problems. The implementation of the security pipeline is too complicated, and the configuration and management are too difficult. So until today, there are almost no IGRS devices that truly implement the security pipeline.
[0003] The highest level of safety management should be to include human factors. Only combining the wisdom of the human brain is the best way to judge whether an operation is safe. Other methods that rely on machines have more or less problems. For consumer electronics Ease of use for users is paramount in terms of devices, and a security mechanism that is too complex to use will almost certainly fail to be of real use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0009] The present invention complements and perfects the security of the IGRS standard system, and introduces a security mechanism of manual intervention and judgment. With the help of this security mechanism, while significantly enhancing the security of interconnection and intercommunication, it slightly increases the security of users. In order to make the purpose, technical solution and advantages of the present invention clearer, please refer to the following detailed description.

[0010] The technical solution of the present invention is applicable to the application scenario of interconnection between two different devices. When performing interconnection and intercommunication to complete a task, one device is used as a server, and the other device is used as a client, and the security work mainly focuses on On the server side, it is reflected in how the server controls the client's access rights, especially the access rights to specific files.

[0011] There are two...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of Internet applications and relates to a method for establishing device secure access, which comprises the following steps: a client device carries out the on-line declaration; a server selects the client device, generates a corresponding token according to the granted access authority and sends to a client; the client receives the token, and adds the token in a service call request message; the server checks the service call request of the client, and compares the token with a token access authority control table maintained by the token, judges the access authority of the client owning the token, and responding to an operation request of the client. The method transfer the complicated secure algorithm realized by relying on machine to people to control the secure access, and the mechanism is more applicable to being realized on consumable electronic equipment. Different equipment can carry out interconnection and interoperability more securely through the simple extension of IGRS protocol.

Description

technical field [0001] The invention belongs to the field of Internet application, and in particular relates to an Internet portal service system and method for CE equipment. Background technique [0002] The 3C-oriented digital home is a dynamic environment. When a new device is added to the home network, it can be recognized by other devices in the network. At the same time, it can also discover other devices and coordinate with each other. The proposal of IGRS and UPNP technologies can effectively solve the problems of interconnection and resource sharing among various devices, but the consideration and treatment of security in these two standards are not very comprehensive. Taking the IGRS standard as an example, the current security measures mainly include the following two aspects: 1. With the help of the security mechanism of the underlying physical network, for example, for wireless networks, the encryption mechanism of wireless WEP can be used, but for wired network...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04L9/00H04W12/08
Inventor 孙翀
Owner TCL CORPORATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products