Honeywell International Inc.
TIME-CONSTRAINED AUTHENTICATION

Last updated:

Abstract:

In some examples, a device includes a receiver configured to receive a first message and receive a second message after receiving the first message, the first and second messages including first and second elements of a hash chain, respectively. The device also includes processing circuitry configured to apply a hash function to the second element of a hash chain to generate a hashed element and determine that the hashed element matches the first element in the hash chain. The processing circuitry is also configured to determine that the second message was received within an acceptable time window and determine that the second message is authentic in response to determining that the hashed element matches the first element in the hash chain and determining that the second message was received within the acceptable time window.

Status:
Application
Type:

Utility

Filling date:

10 Sep 2019

Issue date:

11 Mar 2021