Honeywell International Inc.
TIME-CONSTRAINED AUTHENTICATION
Last updated:
Abstract:
In some examples, a device includes a receiver configured to receive a first message and receive a second message after receiving the first message, the first and second messages including first and second elements of a hash chain, respectively. The device also includes processing circuitry configured to apply a hash function to the second element of a hash chain to generate a hashed element and determine that the hashed element matches the first element in the hash chain. The processing circuitry is also configured to determine that the second message was received within an acceptable time window and determine that the second message is authentic in response to determining that the hashed element matches the first element in the hash chain and determining that the second message was received within the acceptable time window.
Utility
10 Sep 2019
11 Mar 2021