US 12,093,361 B2
Method for authenticating interactions independent of a system time, device for carrying out this method and flame detector comprising such a device
Lorenz Miething, Freiburg (DE); Lukas Fey, Emmendingen (DE); and Fabian Nöller, Emmendingen (DE)
Assigned to DURAG GmbH, (DE)
Filed by DURAG GmbH, Hamburg (DE)
Filed on Mar. 25, 2022, as Appl. No. 17/704,108.
Claims priority of application No. 102021112041.1 (DE), filed on May 7, 2021.
Prior Publication US 2022/0358200 A1, Nov. 10, 2022
Int. Cl. G06F 21/34 (2013.01); G06F 21/33 (2013.01); G06F 21/42 (2013.01); G06F 21/60 (2013.01)
CPC G06F 21/34 (2013.01) [G06F 21/33 (2013.01); G06F 21/42 (2013.01); G06F 21/602 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for authenticating interactions in microcontroller- and/or FPGA-based devices or appliances independently of a system time, in particular in embedded systems and/or flame monitors, comprising the steps of:
calculating a cryptographic hash value in a requesting device and in an authenticating device on the basis of a shared secret used by both the requesting device and the authenticating device
using a TOTP module (12, 32) in the requesting device and a TOTP module in the authenticating device in accordance with the TOTP method, wherein instead of a system time a predefinable item of information for calculating respective hash values is fed to the TOTP modules of the requesting device and the authenticating device, in such a way that the predefinable item of information is generated or provided by the authenticating device and in response to a request from the requesting device or in response to direct input to the authenticating device is transmitted to the requesting device, where the predefinable item of information is fed to the TOTP module of the requesting device in order to compute a hash value, and
passing the hash value computed by the requesting device to the authenticating device, and if said hash value received by the authenticating device from the requesting device is identical to a hash value computed in the authenticating device using the predefined item of information, authentication is successful and an interaction is released, or otherwise blocked in a case of a mismatch.