An Embedded Device Authorization Management Method
An embedded device and authorization management technology, applied in the field of data security, can solve the problems of no operation identity check, operation management business scope cannot be effectively controlled, etc., and achieve the effect of easy deployment and improved security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0070] like figure 1 , figure 2As shown, the present invention proposes a method for authorization management of embedded devices, and defines a simple and convenient interactive management protocol. The method is a TCP-based authorization management protocol, adopts a centralized authorization management mode, and accesses embedded devices Before, it was necessary to pass the centralized authorization management verification and authorization before logging in, operating and maintaining the equipment. The invention defines a TCP-based authorization management interaction protocol, adopts the server and client mode, the centralized authorization management device is the server, and the embedded device is the client. Password, the input user name and password are processed by the client module of the embedded device, and then sent to the authorization management server according to the interactive protocol found in this invention, and the authorization management server deter...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


