白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Method of accessing functions of an embedded device

專利號
US10867077B2
公開日期
2020-12-15
申請人
Schneider Electric Automation GmbH(DE Marktheidenfeld)
發(fā)明人
Ralf Berner; Thomas Gleixner
IPC分類
G06F21/76; G05B19/042; G05B19/05; G06F21/31; G06F21/60
技術(shù)領(lǐng)域
embedded,functional,level,access,device,in,can,firewall,key,management
地域: Marktheidenfeld

摘要

A method for accessing functions of an embedded device, for example a controller programmable from memory, wherein function blocks of the embedded device are assigned to at least two hierarchically superimposed levels, an access to a function block of the embedded device occurs from outside of the embedded device by a data interface, and for access an authentication must occur for the level to which the respective function block is assigned, and again for each individual level above the level to which the function block is assigned, to permit execution of a function of the function block, wherein the functions of the function blocks permit access to a firmware of the embedded device.

說明書

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16

In accordance with a first advantageous embodiment, the functions of the functional blocks also permit access to the application program executed on the embedded device. Firmware is present on the embedded device that acts as the operating system. The firmware can also provide a so-called “runtime” that is preferably real-time capable and executes an application program. The application program can, for example, include control commands for controlling an industrial plant and the like. The functions of the functional blocks can therefore relate both to the firmware and to the application program. Access to functions of the firmware and/or of the application program can thus take place by the authentication for different levels.

In accordance with a further advantageous embodiment, the authentication for different levels takes place by different keys. The security of the embedded device is additionally increased by the use of different keys.

The embedded device preferably uses a key-based cryptographic process for the authentication for a level. A random number is, for example, generated, wherein the key for the authentication for the respective level is generated by encrypting the random number by means of a public key and the embedded device decrypts the key by means of a private key and compares the result of the decryption with the random number. The encryption of the random number can be carried out by a user who has access to the embedded device.

權(quán)利要求

1
微信群二維碼
意見反饋