CPC G06F 21/34 (2013.01) [G06F 21/33 (2013.01); G06F 21/42 (2013.01); G06F 21/602 (2013.01)] | 20 Claims |
1. A method for authenticating interactions in microcontroller- and/or FPGA-based devices or appliances independently of a system time, in particular in embedded systems and/or flame monitors, comprising the steps of:
calculating a cryptographic hash value in a requesting device and in an authenticating device on the basis of a shared secret used by both the requesting device and the authenticating device
using a TOTP module (12, 32) in the requesting device and a TOTP module in the authenticating device in accordance with the TOTP method, wherein instead of a system time a predefinable item of information for calculating respective hash values is fed to the TOTP modules of the requesting device and the authenticating device, in such a way that the predefinable item of information is generated or provided by the authenticating device and in response to a request from the requesting device or in response to direct input to the authenticating device is transmitted to the requesting device, where the predefinable item of information is fed to the TOTP module of the requesting device in order to compute a hash value, and
passing the hash value computed by the requesting device to the authenticating device, and if said hash value received by the authenticating device from the requesting device is identical to a hash value computed in the authenticating device using the predefined item of information, authentication is successful and an interaction is released, or otherwise blocked in a case of a mismatch.
|