首页>
外国专利>
COMPUTER-BASED SYSTEMS AND COMPUTING DEVICES CONFIGURED TO UTILIZE ONE OR MORE AUTHENTICATION SERVERS FOR SECURING DEVICE COMMANDS TRANSMISSIONS AND METHODS OF USE THEREOF
COMPUTER-BASED SYSTEMS AND COMPUTING DEVICES CONFIGURED TO UTILIZE ONE OR MORE AUTHENTICATION SERVERS FOR SECURING DEVICE COMMANDS TRANSMISSIONS AND METHODS OF USE THEREOF
展开▼
机译:基于计算机的系统和计算设备,被配置为利用一个或多个认证服务器来保护设备命令的传输和使用方法
展开▼
页面导航
摘要
著录项
相似文献
摘要
In some embodiments, securing device commands includes a first electronic device receiving a command authorization request message from a second electronic device, including a device command to be performed by the second electronic device, a command argument, and a first message authentication code (MAC) generated by applying a hash function to the device command, the command argument and a first counter value. The first electronic device generates a second MAC by applying the hash function to the device command, the command argument and a second counter value synchronized with the first counter value. The first electronic device compares the first MAC and the second MAC to authenticate the device command and transmit a command approval message or a command denial message. The command approval message causes the second electronic device to perform the device command and the command denial message causes the second electronic device to reject the device command.
展开▼