Supercharge Your Innovation With Domain-Expert AI Agents!

Information security protection monitoring method of LED asynchronous control card

An asynchronous control card and security monitoring technology, which is applied to the usage of multiple keys/algorithms, secure communication devices, public keys for secure communication, etc., to achieve the effect of improving security, ensuring integrity and confidentiality

Inactive Publication Date: 2016-06-29
NANJING UNIV
View PDF8 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing LED display asynchronous control system has great risks in data security. Since the LED asynchronous control card and the LED display are usually stored outdoors together in this system, once criminals find the control card, they can use it to replace it. Operating system, changing the transmitted data, pretending to be the publisher of the program and other means to play illegal videos in public places

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security protection monitoring method of LED asynchronous control card
  • Information security protection monitoring method of LED asynchronous control card
  • Information security protection monitoring method of LED asynchronous control card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Below in conjunction with accompanying drawing, the scheme of the present invention is described in detail

[0035] Such as figure 1 , the information security monitoring method of the LED asynchronous control card provided in this embodiment mainly solves the security problem of data transmission between the upper computer and the lower computer, ie, the LED asynchronous control card. Specifically, the connection interface between the upper computer and the LED asynchronous control card is a Gigabit Ethernet interface, and the connection methods include: direct connection with a wired network cable, local area network connection such as wireless network WiFi connection; wide area network connection such as internet connection.

[0036] At present, the password-based identity authentication method is the most widely used, and it is also the simplest authentication technology. Its advantages lie in the simplicity of implementation, low cost, and high speed. However, ther...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information security protection monitoring method of an LED asynchronous control card. The method comprises following measures of verifying mirror image security: using a chip electric fuse to store public key digests of a user for ensuring that an operating system is not damaged or forged when the LED asynchronous control card loads the mirror image; verifying identity security: when an upper computer in communication connection with the asynchronous control card starts building connection with the LED asynchronous control card, through verifying a digital certificate sent by the upper computer, verifying that a data transmission party has a playing qualification by the LED asynchronous control card; and verifying transmission security: after the upper computer and the LED asynchronous control card build connection, using a symmetrical public key encryption technique to encrypt transmission data. The method has the advantages that the method is based on an imx6 chip lower computer system; the CAAM encryption and decryption acceleration coprocessor of the system is utilized fully; secure transmission of massive data between the upper computer and the lower computer is realized; the program code cannot be maliciously modified; the normal playing of an LED large screen is ensured; and the security feature is improved.

Description

technical field [0001] The invention relates to the security of network communication of an embedded system, in particular to an information security monitoring method of an LED asynchronous control card based on a public key infrastructure. Background technique [0002] The LED display control system is divided into two types: synchronous control system and asynchronous control system in terms of display function. The synchronous control system mainly refers to that the LED display screen can display the image, video and other information displayed on the PC terminal in real time. The implementation of transmission and operation is more complicated. The asynchronous control system is also called the offline control system. The multimedia data to be displayed is edited by the host computer terminal, and is transferred to the memory in the asynchronous control system through serial ports, network ports and other interfaces in advance, and then controlled by the control syste...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/14H04L9/30H04L9/32G09G3/32
CPCH04L9/14H04L9/30H04L9/3242H04L9/3247H04L63/0435H04L63/0823H04L63/0853G09G3/32
Inventor 潘红兵杨博李可生李丽陆振飞王禛吴格李伟何书专
Owner NANJING UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More