Dynamic safe command authorization method
A command authorization and dynamic security technology, applied in the direction of electrical components, transmission systems, etc., can solve the problems of lowering system safety factor, failure to realize authorized operation, and multiple retransmission of command data, so as to improve security performance, realize offline authorization, The effect of preventing data retransmission
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0026] A dynamic and secure command authorization method, the command sends data from the starting end of the link to the destination end, the command includes encrypted dynamic data and encrypted command data, and the dynamic data is transmitted in each link is changed with a synchronization factor, and the synchronization factor generates at least one refresh change in each link transmission, and the command data includes the command to be executed;
[0027] The destination end decrypts the transmitted data to obtain the synchronization factor in the command data and dynamic data, and judges whether the command data and synchronization factor meet various judgment conditions, and then decides whether to allow the command in the command data to be executed.
[0028] The synchronization factor follows an incremental function refresh change with each link transmission. The synchronization factor may be time, personnel, equipment, etc., and this embodiment uses time as the synch...
Embodiment 2
[0039] There is at least one transit terminal between the originating end and the destination end. The command is sent from the originating end of the link to the destination end after passing through the transit end. The command data is encrypted in the originating end and then sent to the transit end and then sent to the destination end. , the synchronization factor and dynamic data are refreshed and generated in the transfer terminal, and then the dynamic data is encrypted and sent to the destination end; the command data also includes the identity information of the transfer terminal.
[0040] In this embodiment, the encryption process of the dynamic data is as follows: at the originating end, the identity information of the destination end is encrypted with the key K to obtain the encrypted identity information of the destination end and sent to the transit end, and then the encrypted identity information of the destination end is passed at the transit end. The destination...
Embodiment 3
[0060] The difference between the third embodiment and the second embodiment is that there are multiple transit terminals, and the command is sent from the starting terminal of the link to the destination terminal through multiple transit terminals in sequence, and the synchronization factor and dynamic data are transmitted to the A refresh is generated in each transit terminal, and finally the data is transmitted to the destination terminal.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More