Method for robot preventing hacker authority management

A technology of rights management and robotics, applied in digital transmission systems, electrical components, transmission systems, etc.

Inactive Publication Date: 2016-07-06
重庆友武科技有限公司
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For this reason, even if it is known that the robot network may be hacked, in order to complete the tasks that can only be completed on the Internet, the robot can only risk being hacked and controlled by the Internet.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0006] The robot anti-hacking rights management method of the present invention comprises step 1: the robot opens the network; step 2: reads the remote connection request sent by another node of the network; step 3: verifies the authenticity of the remote connection request sent by another node of the network ; Step 4: extract the motor control command contained in the remote connection request sent by another node of the network; Step 5: output the motor control command contained in the remote connection request sent by another node of the network; Step 6: wait for the motor to be triggered by The authenticity of the remote connection request sent by another node in the network; Step 7: If the authenticity signal of the remote connection request sent by another node in the network is valid, submit the authority management, if the motor trigger is sent by another node in the network If the authenticity signal of the remote connection request is invalid, solve the submission aut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for robot preventing hacker authority management. The method comprises following steps: extracting a motor control command contained in a remote connection request sent by another node of a network, outputting the motor control command contained in a remote connection request sent by another node of a network, and waiting for the motor to trigger the authenticity of the remote connection request sent by the another node of the network. The operation of the motor is controlled by the motor control command contained in the remote connection request sent by another node of the network. The information, pressing a button, is difficult for hackers to break. Therefore, by means of the method for robot preventing hacker authority management, the robot is made to effectively prevent hackers from obtaining management authority.

Description

technical field [0001] The invention relates to a rights management method, in particular to a robot anti-hacking rights management method. Background technique [0002] In the computer world, hackers are a long-known group. These people can silently invade people's computers and steal various private information, such as photos of the hacked computer owner, bank account numbers, passwords, etc. As long as there is a network, there will inevitably be the possibility of hacking. Robots are networked and can accomplish many important tasks. For this reason, even if it is known that the robot network may be hacked, in order to complete the tasks that can only be completed online, the robot can only risk being hacked and controlled by the network. Contents of the invention [0003] The technical problem to be solved by the present invention is to provide a robot anti-hacking authority management method, which can effectively prevent hackers from invading and controlling the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
Inventor 不公告发明人
Owner 重庆友武科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products