Authenticating communications

The embodiment of the invention generally relates to authenticating communications. A method of authenticating a source of a communication (20) includes executing a clock (990) for an operation period (510), and receiving a communication (20) from a remote device (110, 300) at a communication time c...

Full description

Saved in:
Bibliographic Details
Main Author CONDRA CURTIS GERALD
Format Patent
LanguageChinese
English
Published 01.02.2017
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The embodiment of the invention generally relates to authenticating communications. A method of authenticating a source of a communication (20) includes executing a clock (990) for an operation period (510), and receiving a communication (20) from a remote device (110, 300) at a communication time corresponding to a time interval (520) of a plurality of time intervals sequentially covering the operation period. Each time interval has an associated authentication value (B). The communication includes a commitment value (C). The method includes determining whether the commitment value matches the authentication value associated with the time interval corresponding to the communication time. The method includes processing the communication when the commitment value matches the authentication value associated with the time interval corresponding to the communication time. The authentication value associated with the time interval corresponding to the communication time includes a hash digest of a hash function (6
Bibliography:Application Number: CN201610586366