Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method for secure access and management control of ocf equipment based on asymmetric encryption algorithm

An asymmetric encryption and secure access technology, applied in the field of secure access and management control, to achieve the effect of simplifying complexity and reducing overhead

Active Publication Date: 2020-08-21
上海润欣科技股份有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Aiming at the complexity of implementing security control and digital interaction of existing OCF equipment based on the OCF protocol, a new OCF equipment security control scheme is needed to simplify the complexity of OCF equipment security control and digital interaction under a certain security level. sex

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for secure access and management control of ocf equipment based on asymmetric encryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to make the technical means, creative features, objectives and effects achieved by the present invention easy to understand, the present invention will be further described below in conjunction with specific illustrations.

[0019] This solution is based on an asymmetric encryption algorithm to realize the secure access and management control of OCF equipment. This solution only performs simple asymmetric encryption through all control instructions and data to achieve effective simplification while ensuring a certain level of security. The complexity of OCF device security control and data interaction implementation.

[0020] Specifically, this solution is different from the SSL implementation. Only the OCF client generates a set of key pairs, and the public key method is given to the OCF server, that is, the private key cPK in the key pair is saved by the OCF client, and the key pair The public key cPK_pub in is distributed to the OCF server that the client ne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an OCF equipment security access and management control method based on an asymmetric encryption algorithm. The method comprises the steps that a public key and private key pair is generated by an OCF client, and the public key is operated by an OCF server; in the data interaction process, a control instruction of the OCF client is encrypted by the private key of the client and decrypted by the public key after being sent to the OCF server; and data reported by the OCF server is encrypted by the public key of the client and decrypted by the private key after being sent to the OCF client. According to the scheme, on the premise that the data interaction security is guaranteed, the overhead of the OCF server is greatly reduced, and the achievement complexity of OCF equipment security control and data interaction is effectively reduced.

Description

technical field [0001] The invention relates to a network security technology, in particular to the security access and management control technology of OCF equipment. Background technique [0002] The OCF network consists of a client and a server. The OCF server is generally a limited device running on an embedded system. The OCF server node only needs to consume a small amount of resources to complete networking and data transmission. Because the node access conditions of the restricted device network are low, third parties can obtain the confidential information of the device with only a simple attack operation, which brings great economic losses to users. [0003] Currently, commonly used network security protocols are as follows: [0004] The SSL protocol using public key technology has become an industrial standard for secure communication on the Internet. The Secure Sockets Layer protocol enables user / server application communication to be protected from eavesdroppi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0442H04L63/06
Inventor 李永华万昊汪子元陈科锦谢松
Owner 上海润欣科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products