白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Method of accessing functions of an embedded device

專利號(hào)
US10867077B2
公開日期
2020-12-15
申請(qǐng)人
Schneider Electric Automation GmbH(DE Marktheidenfeld)
發(fā)明人
Ralf Berner; Thomas Gleixner
IPC分類
G06F21/76; G05B19/042; G05B19/05; G06F21/31; G06F21/60
技術(shù)領(lǐng)域
embedded,functional,level,access,device,in,can,firewall,key,management
地域: Marktheidenfeld

摘要

A method for accessing functions of an embedded device, for example a controller programmable from memory, wherein function blocks of the embedded device are assigned to at least two hierarchically superimposed levels, an access to a function block of the embedded device occurs from outside of the embedded device by a data interface, and for access an authentication must occur for the level to which the respective function block is assigned, and again for each individual level above the level to which the function block is assigned, to permit execution of a function of the function block, wherein the functions of the function blocks permit access to a firmware of the embedded device.

說明書

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
  • (b) access to a functional block of the embedded device from outside the embedded device takes place by means of a data interface; and
  • (c) an authentication has to take place during the access for the level with which the respective functional block is associated and again for every single level disposed above the level associated with the functional block to permit an execution of a function of the functional block, wherein the functions of the functional blocks permit access to firmware of the embedded device.
  • It is in this respect the underlying recognition of the invention that the security of the embedded device can be greatly increased if the embedded device is itself equipped with security functions. For this purpose, the functions of the embedded device are divided into functional blocks that are in turn associated with levels disposed above one another hierarchically. In order, for example, to access a level below the topmost level, an authentication must first take place for the topmost level. Subsequently, another authentication has to be carried out for the lower level.

    The security mechanism thus implemented is based on a layered principle that makes multiple authentications necessary for functions in lower levels. The security, in particular of functional blocks in lower levels, is considerably increased on the basis of the optionally required multiple authentication.

    權(quán)利要求

    1
    微信群二維碼
    意見反饋