Unlock instant, AI-driven research and patent intelligence for your innovation.

Dynamic safe command authorization method

A command authorization and dynamic security technology, applied in the direction of electrical components, transmission systems, etc., can solve the problems of lowering system safety factor, failure to realize authorized operation, and multiple retransmission of command data, so as to improve security performance, realize offline authorization, The effect of preventing data retransmission

Active Publication Date: 2019-04-16
HASO XIAMEN INFO CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it is not enough to ensure the security of the system only through encryption, and the system still needs to be improved, because the master station often has the following defects when sending command data: 1. Multiple retransmissions lead to repeated operations on the smart terminal at the end, causing repeated unlocking of smart terminals such as smart locks, which brings security risks to the system; 2. After leaving the main station, offline authorization operations cannot be realized; 3. There may be Multiple transmissions of the same command data in the link, when the command data is intercepted, it is easy to be cracked, thereby reducing the system safety factor; 4. Authorization management cannot be performed according to different attributes (such as time, personnel, equipment, etc.)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] A dynamic and secure command authorization method, the command sends data from the starting end of the link to the destination end, the command includes encrypted dynamic data and encrypted command data, and the dynamic data is transmitted in each link is changed with a synchronization factor, and the synchronization factor generates at least one refresh change in each link transmission, and the command data includes the command to be executed;

[0027] The destination end decrypts the transmitted data to obtain the synchronization factor in the command data and dynamic data, and judges whether the command data and synchronization factor meet various judgment conditions, and then decides whether to allow the command in the command data to be executed.

[0028] The synchronization factor follows an incremental function refresh change with each link transmission. The synchronization factor may be time, personnel, equipment, etc., and this embodiment uses time as the synch...

Embodiment 2

[0039] There is at least one transit terminal between the originating end and the destination end. The command is sent from the originating end of the link to the destination end after passing through the transit end. The command data is encrypted in the originating end and then sent to the transit end and then sent to the destination end. , the synchronization factor and dynamic data are refreshed and generated in the transfer terminal, and then the dynamic data is encrypted and sent to the destination end; the command data also includes the identity information of the transfer terminal.

[0040] In this embodiment, the encryption process of the dynamic data is as follows: at the originating end, the identity information of the destination end is encrypted with the key K to obtain the encrypted identity information of the destination end and sent to the transit end, and then the encrypted identity information of the destination end is passed at the transit end. The destination...

Embodiment 3

[0060] The difference between the third embodiment and the second embodiment is that there are multiple transit terminals, and the command is sent from the starting terminal of the link to the destination terminal through multiple transit terminals in sequence, and the synchronization factor and dynamic data are transmitted to the A refresh is generated in each transit terminal, and finally the data is transmitted to the destination terminal.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a dynamic safe command authorization method. A command is sent to a destination end by an initiating terminal of a link; the command comprises encrypted dynamic data and encrypted command data; the dynamic data is changed along with the change of a synchronization factor in each link transmission; the synchronization factor generates at least one refresh change in each linktransmission; the command data comprises a command to be executed; and the destination end decrypts the transmitted data to obtain the synchronization factors in the command data and the dynamic data, and judges whether the command data and the synchronization factors meet various judgment conditions, so that whether the command in the command data is allowed to be executed or not is determined.The method has the advantages that dynamic transmission of data is achieved, data retransmission is prevented, the method supports off-line authorization, cracking is prevented, and the overall safetyperformance of a system is improved.

Description

technical field [0001] The invention relates to a dynamic and safe command authorization method. Background technique [0002] In the prior art, when a master station or a portable mobile device remotely authorizes and sends commands to smart terminals such as smart locks at the end, the command data is generally encrypted during transmission to ensure data transmission security. However, it is not enough to ensure the security of the system only through encryption, and the system still needs to be improved, because the master station often has the following defects when sending command data: 1. Multiple retransmissions lead to repeated operations on the smart terminal at the end, causing repeated unlocking of smart terminals such as smart locks, which brings security risks to the system; 2. After leaving the main station, offline authorization operations cannot be realized; 3. There may be Multiple transmissions of the same command data in the link, when the command data i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0457
Inventor 李平川陈孝顺马鹏祝恩国叶万余陈朝新
Owner HASO XIAMEN INFO CO LTD