Equipment configuration method, system and device, electronic equipment and storage medium

A device configuration and device technology, applied in the security field, can solve problems such as low security

Pending Publication Date: 2022-04-08
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the embodiments of the present application is to provide a device configuration method, system, device,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equipment configuration method, system and device, electronic equipment and storage medium
  • Equipment configuration method, system and device, electronic equipment and storage medium
  • Equipment configuration method, system and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the drawings in the embodiments of the present application.

[0058] It should be noted that the terms "system" and "network" in the embodiments of the present invention may be used interchangeably. "Multiple" means two or more, in view of this, "multiple" can also be understood as "at least two" in the embodiments of the present invention. "And / or" describes the association relationship of associated objects, indicating that there may be three types of relationships, for example, A and / or B may indicate: A exists alone, A and B exist simultaneously, and B exists independently. In addition, the character " / ", unless otherwise specified, generally indicates that the associated objects before and after are in an "or" relationship.

[0059] The embodiment of the present application provides a device configuration method, which is appli...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an equipment configuration method, system and device, electronic equipment and a storage medium, and relates to the technical field of safety. According to the method, encrypted configuration information is obtained through a device to be configured, the device to be configured decrypts the encrypted configuration information and verifies whether the configuration information is tampered or not according to a hash result because the device to be configured obtains the encrypted configuration information, and when the configuration information is not tampered, a configuration process is executed. Therefore, the problem that the to-be-configured device is subjected to security threats due to the fact that the configuration information is tampered can be avoided, and the security of the configuration process is ensured.

Description

technical field [0001] The present application relates to the field of security technologies, and in particular, relates to a device configuration method, system, device, electronic device, and storage medium. Background technique [0002] In the general environment of the information age, the rapid development of network technology has affected all walks of life. The huge network scale and its complex structure also make the complexity of connected devices higher and higher, and the increase in complexity also directly increases the requirements for mass configuration, online, and maintenance of them. [0003] The traditional method generally uses manual on-site configuration. During the configuration process, the device is directly configured. If the obtained configuration information is illegally tampered with, it may cause a greater security threat to the device. Therefore, the existing manual The configuration method makes the configuration process less secure. Conte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L41/0803H04L9/40H04L67/02G06F21/60
Inventor 田静伟姚竞聪
Owner BEIJING TOPSEC NETWORK SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products