Dell products l.p. (20240129140). MUTUAL AUTHENTICATION IN EDGE COMPUTING simplified abstract

From WikiPatents
Revision as of 02:32, 26 April 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

MUTUAL AUTHENTICATION IN EDGE COMPUTING

Organization Name

dell products l.p.

Inventor(s)

Kai Chen of Shanghai (CN)

Jim Lewei Ji of Shanghai City (CN)

MUTUAL AUTHENTICATION IN EDGE COMPUTING - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240129140 titled 'MUTUAL AUTHENTICATION IN EDGE COMPUTING

Simplified Explanation

The abstract describes a patent application for an information handling system that can authenticate another system by generating keys based on physical and biological identifiers, encrypting a random message with the public key, and verifying decryption by the other system.

  • The information handling system receives a physical identifier, a biological identifier, and a timestamp from a second system.
  • It determines a public key and a private key for the second system based on the identifiers and timestamp.
  • A random message is generated and encrypted with the public key for the second system.
  • The encrypted message is transmitted to the second system.
  • If the second system successfully decrypts the message, authentication is confirmed.

Potential Applications

This technology could be applied in secure communication systems, access control systems, and biometric authentication systems.

Problems Solved

This technology solves the problem of securely authenticating another system based on physical and biological identifiers, reducing the risk of unauthorized access.

Benefits

The benefits of this technology include enhanced security, reliable authentication, and protection of sensitive information.

Potential Commercial Applications

A potential commercial application for this technology could be in the development of secure communication devices for industries such as healthcare, finance, and government.

Possible Prior Art

One possible prior art for this technology could be existing biometric authentication systems that use physical characteristics for identification and verification.

Unanswered Questions

How does this technology handle potential errors in the authentication process?

This technology does not specify how potential errors in the authentication process are handled, such as incorrect decryption of the random message.

What measures are in place to protect the privacy of the physical and biological identifiers used for authentication?

The patent application does not detail specific measures to protect the privacy of the physical and biological identifiers used for authentication, raising concerns about data security and confidentiality.


Original Abstract Submitted

an information handling system may include at least one processor and a memory. the information handling system may be configured to receive, from a second information handling system, a physical identifier, a biological identifier, and a timestamp; determine a public key and a private key for the second information handling system based on the physical identifier, the biological identifier, and the timestamp; generate a random message; encrypt the random message with the public key for the second information handling system; transmit the encrypted random message to the second information handling system; and in response to a determination that the second information handling system has successfully decrypted the random message, authenticate the second information handling system.