User's Manual

Table Of Contents
iChip Embedded Web Server
AT+i Programmer‘s Manual Version 8.32 27-7
In addition to specifying iChip configuration parameters and Parameter Tags, it is also
possible to display iChip reports and iChip‘s LAN MAC address. For example:
<table>
<tr>
<td width=250><b>MAC Address: ~MACA~ <b></td>
</tr>
<tr>
<td width=250><b>Bootblock Version: BBIC~RP3~</b> </td>
<td width=400><b>Firmware Version: ~RP1~</b></td>
</tr>
<tr>
<td width=250><b>Serial Number: ~RP5~ </b></td>
<td width=400><b>Hardware Version: ~RP0~</b></td>
</tr>
</table>
27.10 Security and Restrictions
The authorization to view and update iChip‘s configuration parameters, firmware, or
application website via the web can be password-protected using the
AT+iRPG parameter
(Remote Parameter Group/Password).
When the RPG parameter in an iChip device contains a value, it is considered a password
that restricts remote iChip parameter viewing/updates. By default, iChip‘s configuration
site can be viewed (browsed), unless the Security Disable Mode (SDM) bit 3 is set, in
which case the user is authenticated by submitting the RPG value. To enable remote
updates, a distant user is always authenticated by submitting that value. The iChip
configuration site includes an authentication form that automatically pops up on the
remote browser when parameter updates are attempted. The password submitted through
this form must match the actual value of iChip‘s local RPG parameter. Otherwise, remote
value updates are rejected.
iChip uses the industry standard SHA1 algorithm to authenticate the remote user.
According to SHA1, the password typed into the authentication form is not literally
communicated back to iChip. Rather, a SHA1-encrypted token is transferred. To achieve
this, iChip‘s web server sends a JavaScript, which calculates SHA1 encryption at the
browser end together with the authentication form. iChip also issues a different random
number, used as part of the encryption key, each time authentication is required, to
eliminate the possibility of impersonation based on eavesdropping to a legal
authentication session.
If the RPG parameter is empty (AT+iRPG=‗‘), remote iChip configuration parameter
update is fully restricted. In other words, it is not possible to update configuration
parameter values using a remote browser. Conversely, if the RPG parameter contains an
(*) character (match any), the configuration parameters can be updated freely, without
requiring authentication at all.