Unlock instant, AI-driven research and patent intelligence for your innovation.

A Dynamic and Secure Command Authorization Method

A command authorization and dynamic security technology, applied in transmission systems, electrical components, etc., can solve problems such as reducing the system safety factor, failing to realize authorized operations, and retransmitting command data multiple times, so as to improve security performance, realize offline authorization, The effect of preventing data retransmission

Active Publication Date: 2021-06-25
HASO XIAMEN INFO CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it is not enough to ensure the security of the system only through encryption, and the system still needs to be improved, because the master station often has the following defects when sending command data: 1. Multiple retransmissions lead to repeated operations on the smart terminal at the end, causing repeated unlocking of smart terminals such as smart locks, which brings security risks to the system; 2. After leaving the main station, offline authorization operations cannot be realized; 3. There may be Multiple transmissions of the same command data in the link, when the command data is intercepted, it is easy to be cracked, thereby reducing the system safety factor; 4. Authorization management cannot be performed according to different attributes (such as time, personnel, equipment, etc.)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] A dynamic and secure command authorization method, the command sends data from the starting end of the link to the destination end, the command includes encrypted dynamic data and encrypted command data, and the dynamic data is transmitted in each link is changed with a synchronization factor, and the synchronization factor generates at least one refresh change in each link transmission, and the command data includes the command to be executed;

[0027] The destination end decrypts the transmitted data to obtain the synchronization factor in the command data and dynamic data, and judges whether the command data and synchronization factor meet various judgment conditions, and then decides whether to allow the command in the command data to be executed.

[0028] The synchronization factor follows an incremental function refresh change with each link transmission. The synchronization factor may be time, personnel, equipment, etc., and this embodiment uses time as the synch...

Embodiment 2

[0039] There is at least one transit terminal between the originating end and the destination end. The command is sent from the originating end of the link to the destination end after passing through the transit end. The command data is encrypted in the originating end and then sent to the transit end and then sent to the destination end. , the synchronization factor and dynamic data are refreshed and generated in the transfer terminal, and then the dynamic data is encrypted and sent to the destination end; the command data also includes the identity information of the transfer terminal.

[0040] In this embodiment, the encryption process of the dynamic data is as follows: at the originating end, the identity information of the destination end is encrypted with the key K to obtain the encrypted identity information of the destination end and sent to the transit end, and then the encrypted identity information of the destination end is passed at the transit end. The destination...

Embodiment 3

[0060] The difference between the third embodiment and the second embodiment is that there are a plurality of transfer terminals, and the command is sent from the starting end of the link to the destination end through a plurality of transfer terminals in sequence, and the synchronization factor and dynamic data are transmitted to the A refresh is generated in each transit terminal, and finally the data is transmitted to the destination terminal.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a dynamic and safe command authorization method. The command sends data from the starting end of the link to the destination end. The command includes encrypted dynamic data and encrypted command data. The dynamic data is transmitted every time The link transmission of the link changes with the change of a synchronization factor, and the synchronization factor generates at least one refresh change in each link transmission, and the command data contains the command to be executed; the destination end is transmitted to Decrypt the data to obtain the synchronization factor in the command data and dynamic data, and judge whether the command data and synchronization factor meet various judgment conditions, and then decide whether to allow the command in the command data to be executed. It has the following advantages: realize dynamic transmission of data, prevent data retransmission, support offline authorization, prevent cracking, and improve the overall security performance of the system.

Description

technical field [0001] The invention relates to a dynamic and safe command authorization method. Background technique [0002] In the prior art, when a master station or a portable mobile device remotely authorizes and sends commands to smart terminals such as smart locks at the end, the command data is generally encrypted during transmission to ensure data transmission security. However, it is not enough to ensure the security of the system only through encryption, and the system still needs to be improved, because the master station often has the following defects when sending command data: 1. Multiple retransmissions lead to repeated operations on the smart terminal at the end, causing repeated unlocking of smart terminals such as smart locks, which brings security risks to the system; 2. After leaving the main station, offline authorization operations cannot be realized; 3. There may be Multiple transmissions of the same command data in the link, when the command data i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0457
Inventor 李平川陈孝顺马鹏祝恩国叶万余陈朝新
Owner HASO XIAMEN INFO CO LTD