Method and apparatus for providing secure provider service access
A technology for service access and suppliers, applied in the direction of security devices, computer security devices, instruments, etc., can solve problems such as weak authentication schemes, lack of open specifications, lack of hardware and firmware technology supplier interworking, etc., to achieve easy implementation and satisfaction The effect of cybersecurity requirements
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0036] figure 1 An appliance 1 is shown operating in accordance with a method of providing access to a security provider service that allows customers to restrict access rights to the appliance. current figure 1 The modules and components depicted in are exemplary only, and may include or at least be connectedly coupled to other devices. According to the present aspect, the device 1 operates according to a set of instructions stored on the configuration storage device 10 . Typically such a configuration storage device 10 provides firmware and is arranged as an integral part of the device such that the device 1 and the configuration storage device 10 are realized as a single hardware component, with the configuration storage device 10 being non-detachably attached to the device 1 . A person skilled in the art realizes that the configuration storage means 10 can also be arranged outside the device 1 and provide a corresponding interface for operating the device.
[0037] As s...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


