17968237. MUTUAL AUTHENTICATION IN EDGE COMPUTING simplified abstract (Dell Products L.P.)

From WikiPatents
Revision as of 05:46, 26 April 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

MUTUAL AUTHENTICATION IN EDGE COMPUTING

Organization Name

Dell Products L.P.

Inventor(s)

Kai Chen of Shanghai (CN)

Jim Lewei Ji of Shanghai City (CN)

MUTUAL AUTHENTICATION IN EDGE COMPUTING - A simplified explanation of the abstract

This abstract first appeared for US patent application 17968237 titled 'MUTUAL AUTHENTICATION IN EDGE COMPUTING

Simplified Explanation

The abstract describes a patent application for an information handling system that can securely authenticate another system by generating keys based on physical and biological identifiers, encrypting a random message with the public key, and transmitting it for decryption by the other system.

  • Information handling system with processor and memory
  • Receives physical identifier, biological identifier, and timestamp from another system
  • Generates public and private keys based on identifiers and timestamp
  • Encrypts random message with public key
  • Transmits encrypted message to other system
  • Authenticates other system upon successful decryption

Potential Applications

This technology could be applied in various industries where secure authentication is crucial, such as:

  • Banking and financial services
  • Healthcare and medical records
  • Government and military systems

Problems Solved

This technology addresses the issue of secure authentication and communication between information handling systems, ensuring that only authorized systems can access sensitive data.

Benefits

The benefits of this technology include:

  • Enhanced security and protection of sensitive information
  • Efficient and reliable authentication process
  • Reduced risk of unauthorized access or data breaches

Potential Commercial Applications

The potential commercial applications of this technology include:

  • Secure communication systems for businesses
  • Authentication solutions for online transactions
  • Data protection services for sensitive industries

Possible Prior Art

One possible prior art for this technology could be existing encryption and authentication methods used in information security systems.

Unanswered Questions

How does this technology compare to existing authentication methods?

This article does not provide a direct comparison to existing authentication methods, leaving the reader to wonder about the specific advantages and disadvantages of this technology in relation to others.

What are the potential limitations or vulnerabilities of this authentication process?

The article does not address any potential limitations or vulnerabilities of the authentication process, leaving room for further exploration into the security aspects of the technology.


Original Abstract Submitted

An information handling system may include at least one processor and a memory. The information handling system may be configured to receive, from a second information handling system, a physical identifier, a biological identifier, and a timestamp; determine a public key and a private key for the second information handling system based on the physical identifier, the biological identifier, and the timestamp; generate a random message; encrypt the random message with the public key for the second information handling system; transmit the encrypted random message to the second information handling system; and in response to a determination that the second information handling system has successfully decrypted the random message, authenticate the second information handling system.