Unlock instant, AI-driven research and patent intelligence for your innovation.

An Embedded Device Authorization Management Method

An embedded device and authorization management technology, applied in the field of data security, can solve the problems of no operation identity check, operation management business scope cannot be effectively controlled, etc., and achieve the effect of easy deployment and improved security

Active Publication Date: 2022-03-11
广州芯德通信科技股份有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The invention proposes an embedded device authorization management method, which can provide operator identity check for operation management and control of the scope of operation management business, and can effectively solve the problems that the current embedded device management has no operation identity check, and the scope of operation management business cannot be effectively controlled. to meet the growing requirements of safety management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Embedded Device Authorization Management Method
  • An Embedded Device Authorization Management Method
  • An Embedded Device Authorization Management Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0070] like figure 1 , figure 2As shown, the present invention proposes a method for authorization management of embedded devices, and defines a simple and convenient interactive management protocol. The method is a TCP-based authorization management protocol, adopts a centralized authorization management mode, and accesses embedded devices Before, it was necessary to pass the centralized authorization management verification and authorization before logging in, operating and maintaining the equipment. The invention defines a TCP-based authorization management interaction protocol, adopts the server and client mode, the centralized authorization management device is the server, and the embedded device is the client. Password, the input user name and password are processed by the client module of the embedded device, and then sent to the authorization management server according to the interactive protocol found in this invention, and the authorization management server deter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an embedded device authorization management method, comprising: S1, the server sets the user name, password and operation authority of the operator; S2, the operator inputs the user name and password, and logs in the embedded device; S3, the embedded device sends a request message; S4, the server judges whether the request message is received, if yes, proceed to S5, otherwise return to S4; S5, the server processes and analyzes the message; S6, the server judges whether it is a valid message, if yes, proceed to S7, otherwise discard the message ; S7. The server sends the corresponding message according to the message information; S8. The embedded device judges whether the corresponding message is received. If yes, proceed to S9; otherwise, return to S8; , otherwise return to S2; S10, the embedded device accepts operator login, and opens operations according to authorized authority. The method is convenient, fast, efficient, easy to deploy, and can provide safe and reliable management authorization services for modern embedded industrial applications.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to an authorization management method for embedded devices. Background technique [0002] As embedded devices are more and more widely used, from industrial field applications to various IoT devices, the operation management control of these devices has attracted more and more attention, and its security management control has become more important. The operation and maintenance of industrial field management equipment generally supports IP-based remote management, and there is no effective supervision method for the identification of operators and operation and maintenance. IoT-like devices generally implement management and control access through Bluetooth, WiFi, or infrared, and lack the identity authentication and operation authority management of operators, which brings great hidden dangers to future security. Therefore, it is of great practical significance to provide a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/44G06F21/60
CPCG06F21/44G06F21/602
Inventor 蒋晓敏
Owner 广州芯德通信科技股份有限公司