17789143. DEVICE SHARING METHOD AND ELECTRONIC DEVICE simplified abstract (HUAWEI TECHNOLOGIES CO., LTD.)
Contents
DEVICE SHARING METHOD AND ELECTRONIC DEVICE
Organization Name
Inventor(s)
DEVICE SHARING METHOD AND ELECTRONIC DEVICE - A simplified explanation of the abstract
This abstract first appeared for US patent application 17789143 titled 'DEVICE SHARING METHOD AND ELECTRONIC DEVICE
Simplified Explanation
The patent application describes a system for encrypting offline messages between devices using public keys and message leaving keys. Here is a simplified explanation of the abstract:
- The first device obtains the public key of a first home device and a message leaving key to encrypt an offline message between them.
- The first device also obtains the public key of a second device and a message leaving key to encrypt an offline message between them.
- The first device obtains a third message leaving key to encrypt an offline message between the second device and the first home device.
- The first device encrypts the public key of the second device and the third message leaving key using the first message leaving key, creating first encrypted information.
- The first device requests a server to push the first encrypted information to the first home device.
- The first device also encrypts the public key of the first home device and the third message leaving key using the second message leaving key.
Potential applications of this technology:
- Secure communication between devices: This system can be used to ensure that offline messages exchanged between devices are encrypted and secure.
- Home automation: The technology can be applied to home automation systems where devices need to exchange sensitive information securely.
- Internet of Things (IoT): IoT devices can use this system to encrypt offline messages and protect the privacy and security of the data they exchange.
Problems solved by this technology:
- Secure offline communication: The system solves the problem of securely exchanging offline messages between devices by using encryption keys.
- Protection of sensitive information: By encrypting the messages and keys, the technology ensures that sensitive information remains protected from unauthorized access.
Benefits of this technology:
- Enhanced security: The encryption of messages and keys adds an extra layer of security, making it difficult for unauthorized parties to access the information.
- Privacy protection: By encrypting the messages, the technology ensures that the content remains private and can only be accessed by authorized devices.
- Seamless communication: The system allows for offline messages to be securely exchanged between devices, enabling seamless communication even when devices are not connected to the internet.
Original Abstract Submitted
A first device obtains a public key of a first home device and a first message leaving key that is used to encrypt an offline message between the first device and the first home device; obtains a public key of a second device and a second message leaving key that is used to encrypt an offline message between the first device and the second device; obtains a third message leaving key used to encrypt an offline message between the second device and the first home device; encrypts the public key of the second device and the third message leaving key by using the first message leaving key, to obtain first encrypted information, and requests a server to push the first encrypted information to the first home device; and encrypts the public key of the first home device and the third message leaving key by using the second message leaving key.