白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Method of accessing functions of an embedded device

專(zhuān)利號(hào)
US10867077B2
公開(kāi)日期
2020-12-15
申請(qǐng)人
Schneider Electric Automation GmbH(DE Marktheidenfeld)
發(fā)明人
Ralf Berner; Thomas Gleixner
IPC分類(lèi)
G06F21/76; G05B19/042; G05B19/05; G06F21/31; G06F21/60
技術(shù)領(lǐng)域
embedded,functional,level,access,device,in,can,firewall,key,management
地域: Marktheidenfeld

摘要

A method for accessing functions of an embedded device, for example a controller programmable from memory, wherein function blocks of the embedded device are assigned to at least two hierarchically superimposed levels, an access to a function block of the embedded device occurs from outside of the embedded device by a data interface, and for access an authentication must occur for the level to which the respective function block is assigned, and again for each individual level above the level to which the function block is assigned, to permit execution of a function of the function block, wherein the functions of the function blocks permit access to a firmware of the embedded device.

說(shuō)明書(shū)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16

A code management 62 that represents the third sector of the PLC 10 sits on top of the operating system 46. The code management 62 substantially serves to execute a user program 64. The user program 64 can serve for the control of an automation plant, for example. The operating system 46 of the PLC 10 can generally also be called firmware and the user program 64 software or an application program.

To execute the user program 64, the code management 62 comprises libraries 66 that are not included in the information contained in the user program 64. The code management 62 furthermore comprises websites 68 that can be displayed by the web server 20 as well as a key management 70.

The key management 70 present in the embodiment essentially provides the functionality shown in FIG. 1 of the authentication at different levels 18, 22, 26, 30 by means of a plurality of authentication processes 34. The key management 70 additionally comprises a user management (not shown) in the form of an access control matrix (ACM). For the authentication, the key management generates the random numbers for the respective authentication processes 34. The key management 70 communicates with the different functional blocks 20, 24, 28, 32, 60 by means of a DBus 72. In this respect, communication takes place with the I/O management 58 for authentication for the first level 30 to permit hardware accesses 32 and accesses to the operating system kernel of the operating system 46 in the second level 26.

權(quán)利要求

1
微信群二維碼
意見(jiàn)反饋