白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Method of accessing functions of an embedded device

專利號
US10867077B2
公開日期
2020-12-15
申請人
Schneider Electric Automation GmbH(DE Marktheidenfeld)
發(fā)明人
Ralf Berner; Thomas Gleixner
IPC分類
G06F21/76; G05B19/042; G05B19/05; G06F21/31; G06F21/60
技術(shù)領(lǐng)域
embedded,functional,level,access,device,in,can,firewall,key,management
地域: Marktheidenfeld

摘要

A method for accessing functions of an embedded device, for example a controller programmable from memory, wherein function blocks of the embedded device are assigned to at least two hierarchically superimposed levels, an access to a function block of the embedded device occurs from outside of the embedded device by a data interface, and for access an authentication must occur for the level to which the respective function block is assigned, and again for each individual level above the level to which the function block is assigned, to permit execution of a function of the function block, wherein the functions of the function blocks permit access to a firmware of the embedded device.

說明書

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16

A user can establish a data connection to the embedded device using a web browser during the operation of the embedded device, whereupon the web server of the embedded device transmits a random number to the browser. The random number can be encrypted in the browser (e.g. by means of a plug-in) and in the public key of a certificate. The encrypted random number is sent back to the web server of the embedded device and is decrypted by the web server by means of the private key. If the random number and the decrypted value agree, a respective functional block is released. If access to a functional block in a lower level is requested by means of the browser, the previously described authentication is carried out several times after one another using different random numbers. No intervention of the user is required for this purpose.

In accordance with the above example, a symmetrical encryption process can also be used instead of the asymmetrical encryption process. The random number can then be respectively encrypted in the browser and decrypted in the embedded device using the same key.

權(quán)利要求

1
微信群二維碼
意見反饋