Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authority control method, authority control equipment, user equipment and system

A technology of access control and user equipment, applied in the field of information security, can solve problems such as vulnerability to attack and reverse code cracking, and achieve the effect of high security and flexibility

Active Publication Date: 2019-06-18
OPEN SECURITY RES INC
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to its own limitations, this kind of approach is vulnerable to attacks and cracked by reverse code

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authority control method, authority control equipment, user equipment and system
  • Authority control method, authority control equipment, user equipment and system
  • Authority control method, authority control equipment, user equipment and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0037] The user equipment in the embodiment of the present invention includes any product that can add a digital chip. For example, mobile phones, door locks, storage controllers, hard disks, servers, data centers and other devices, that is, devices that require authorization and have hardware modules that can generate physical unclonable fun...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention relates to an authority control method, authority control equipment, user equipment and a system. The method comprises the following steps: extracting a physical unclonable function value of user equipment; Setting a physical unclonable function value of the user equipment as a trust root; Encrypting a preset application in the user equipment; And generating and sending authority control information to the user equipment so as to authorize a preset application in the user equipment, cancel authorization for an authorized application in the user equipment or adjust an authorization range. According to the embodiment of the invention, the remote authority control system is established by taking the physical unclonable function value of the user equipment as the trust root, the security is high, and the flexibility is high.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to an authority control method, authority control equipment, user equipment and a system. Background technique [0002] Currently, when manufacturers with core technology sell their products to downstream customers, they hope to protect the core technology information involved in their products because of the uniqueness of their technology. In the prior art, protection is often carried out by software means, for example, by inputting the authorization code on the packaging box to complete remote authorization; or by white box key or other software means for protection. However, due to its own limitations, this kind of approach is vulnerable to attacks and reverse code cracking. How to enhance the protection strength is a technical problem to be solved urgently in this field. Contents of the invention [0003] Embodiments of the present invention provide an a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45G06F21/44
Inventor 周煜梁
Owner OPEN SECURITY RES INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products