Authenticating communications
The embodiment of the invention generally relates to authenticating communications. A method of authenticating a source of a communication (20) includes executing a clock (990) for an operation period (510), and receiving a communication (20) from a remote device (110, 300) at a communication time c...
Saved in:
Main Author | |
---|---|
Format | Patent |
Language | Chinese English |
Published |
01.02.2017
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The embodiment of the invention generally relates to authenticating communications. A method of authenticating a source of a communication (20) includes executing a clock (990) for an operation period (510), and receiving a communication (20) from a remote device (110, 300) at a communication time corresponding to a time interval (520) of a plurality of time intervals sequentially covering the operation period. Each time interval has an associated authentication value (B). The communication includes a commitment value (C). The method includes determining whether the commitment value matches the authentication value associated with the time interval corresponding to the communication time. The method includes processing the communication when the commitment value matches the authentication value associated with the time interval corresponding to the communication time. The authentication value associated with the time interval corresponding to the communication time includes a hash digest of a hash function (6 |
---|---|
Bibliography: | Application Number: CN201610586366 |